Robert Sawyer - The Terminal Experiment

Здесь есть возможность читать онлайн «Robert Sawyer - The Terminal Experiment» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Год выпуска: 1995, ISBN: 1995, Издательство: Harper Prism, Жанр: Фантастика и фэнтези, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

The Terminal Experiment: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Terminal Experiment»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The Terminal Experiment The story was first serialised in
magazine in the mid-December 1994 to March 1995 issues, under the name
, before its first novel publication in May, 1995.
Won Nebula Award for Best Novel in 1995.
Nominated for Hugo Award for Best Novel in 1996.

The Terminal Experiment — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Terminal Experiment», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Sarkar had been working in the AI lab when the receptionist had called him. He’d left the door open. By the time he got back there, Jorgenson was looming over the main console, unplugging the keyboard. He motioned to one of his associates who handed him another keyboard with a glossy black housing and silver keys. A diagnostic unit: every keystroke typed, every response from the computer, every disk-access delay would be recorded.

“Hey!” shouted Sarkar. “These are delicate systems. Be careful.”

Jorgenson ignored him. He sat on the barstool and pulled a vinyl folder out of his briefcase. It contained an assortment of diskettes, CDs, and PCMCIA cards. He selected a card that would fit the drive on the console, inserted it, then hit some keys on his keyboard.

The computer’s monitor cleared, then filled with diagnostic information about the system.

“Top of the line,” said Jorgenson, impressed. “Fully populated with 512 gigabytes of RAM, five parallel math coprocessors, self-referential bus architecture.” He tapped the space bar; another screen came up. “Latest firmware revision, too. Nice.”

He exited his program and began listing directories at the system prompt.

“What are you looking for?” asked Sarkar.

“Anything,” said Sandra, entering the room. “Everything.” Then, to Jorgenson: “Any problems?”

“Not so far. He was already logged in, so we didn’t need to crack the password file.”

Sarkar was edging away from the group toward a console on the other side of the room — a console with a microphone stalk sticking up from it.

“Login,” said Sarkar in a low voice, then, without waiting for the prompt, “Login name Sarkar.”

“Hello, Sarkar,” said the computer. “Shall I terminate your other session?”

Sandra Philo had come up behind him, the rounded front of her stunner pressing into the small of his back. “Don’t do that,” she said simply. She reached over to the console and flicked off the switch marked “Voice Input.”

At that point, Kawalski, the liaison officer from York, appeared at the entrance to the room. “They’ve got a barber’s chair upstairs,” he said generally to the group, then, looking at Sarkar, “You give haircuts here?”

Sarkar shook his head. “It’s actually a dentist’s chair.”

Jorgenson spoke without looking up. “Scanning room, no doubt,” he said. Then, to Sarkar: “I enjoyed your paper in last month’s Journal of AI Studies . I’ll want to search that room next.” He went back to typing commands on his black-and-silver keyboard.

Sarkar sounded exasperated. “If you would just tell me what you’re looking for…”

“Damn,” said Jorgenson. “There are several encrypted banks here.”

Sandra looked at Sarkar. “What’s the decryption key?”

Sarkar, feeling perhaps that he had some measure of control at last, said, “I do not believe I’m obligated to tell you.”

Jorgenson got up from the stool. Without a word, a second analyst sat down on it and began typing commands.

“Doesn’t matter,” said Jorgenson with a shrug. “Valentina was with the KGB, back when there was such a thing. There’s not much she can’t crack.”

Valentina popped a new datacard into the card slot, and typed furiously with two fingers. After several minutes, she looked at Sarkar, her face full of disappointment. Sarkar brightened visibly — perhaps she wasn’t as good as Jorgenson had said. But then Sarkar’s heart fell. The disappointment on her face was simply that of someone who’d been hoping for a good challenge, and had failed to find it. “The Hunsacker algorithm?” she said in a heavily accented voice, shaking her head. “You could have done better than that.” Valentina pressed a few more keys and the screen, which to this point had been filled with gibberish, was replaced with English source-code listings.

She got up. and Jorgenson went back to work. He cleared the screen, then replaced Valentina’s datacard with another of his own. “Initiating search,” he said. The screen filled with a multicolumn list of two hundred or so terms in alphabetical order.

“There’s massive storage online here,” said Jorgenson, “under a variety of compression schemes. It’ll take a while to hunt through it all.” He got up. “I’m going up to look at that scanning room.”

Peter had an evening board meeting at North York General today, and rather than waste the morning fighting the telephones at the office he decided to do some work from home. But he was having trouble concentrating. Sarkar had said he’d have the virus finished today, but Peter still felt he should be doing something himself. Around ten-thirty, he logged into Mirror Image, hoping to see if he could fathom how the sims had gotten outside.

After dialing in, he issued the WHO command to see whether Sarkar was also online — Peter wanted to send him an E-mail hello. He was indeed. Peter then issued WHAT to see what sort of activity Sarkar was doing; if it was a background task, he probably wasn’t actually sitting at the terminal, and so the E-mail would be a waste of time.

WHAT reported the following:

Node | User | Logged in at | Task

002 | Sarkar | 08:14:22 | text search

Well, a text search could be either background or foreground. Peter had high-level supervisory privileges on Sarkar’s systems. He called for an echoing of the task at node 002 on his own monitor. The screen filled with a list of search terms, and a constantly updated tally of hits. Some, such as Toronto, had hundreds of hits so far, but others…

Christ , thought Peter. Look at that…

Sarkar was searching for “Hobson” and “Pete*” and “Cath*” and…

Peter tapped out an E-mail message: “Nosy, aren’t we?” He was about to send it when he noticed the full search parameters in the status line: “Search all systems; within each system, search all online and offline storage and all working memory.”

A search like that could take hours. Sarkar would never order something like that — he was too well organized not to have at least some idea how to narrow the search.

Peter glanced at the other search terms.

Oh, shit.

“Larsen,” “Hans,” “adultery,” “affair.”

Shit. Shit. Shit. No way Sarkar would be doing a search like that. Someone else was inside the system.

Node 002 was the AI lab at Mirror Image. Peter swung his chair to face his phone and hit the speed-dialer key for there.

The phone rang in the AI lab. “May I get that?” asked Sarkar.

Sandra nodded. She was watching the screen intently. Lots of hits on the common words — “affair” had over four hundred so far — but none on Hobson or Larsen.

Sarkar moved across the room to the videophone and hit the ANSWER key.

The Bell Canada logo backflipped away. Peter saw Sarkar’s face, looking worried.

“What’s — ” said Peter, but that’s all he said. In the background, over Sarkar’s shoulder, he saw a profile of Sandra Philo. Peter broke the connection at once.

Philo there, at Mirror Image.

A raid. A goddamned raid.

Peter looked at his screen, slaved to node 002. Still no hits on “Hobson.”

He thought for a second, then began tapping keys. Peter spun off a second session under Sarkar’s login name, using the password he’d heard Sarkar use before. He then accessed the diagnostic-tools subdirectory and called up a file listing. There were hundreds of programs, including one called TEXTREP. That sounded promising. He called up help on it.

Good. Exactly what he needed. Syntax: search-term, replacement-term, search parameters.

Peter typed “TEXTREP / Hobson / Roddenberry / AI7-AI10” — meaning change all occurrences of “Hobson” to “Roddenberry” on artificial-intelligence systems seven through ten.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The Terminal Experiment»

Представляем Вашему вниманию похожие книги на «The Terminal Experiment» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «The Terminal Experiment»

Обсуждение, отзывы о книге «The Terminal Experiment» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x