ROBERT A. HEINLEIN ISAAC ASIMOV Including Venture Science Fiction
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Very Short History of Cyberpunk
A Very Short History of Cyberpunk Marcus Janni Pivato Many people seem to think that William Gibson invented The cyberpunk genre in 1984, but in fact the cyberpunk aesthetic was alive well before Neuromancer (1984). For example, in my opinion, Ridley Scott's 1982 movie, Blade Runner, captures the quintessence of the cyberpunk aesthetic: a juxtaposition of high technology with social decay as a troubling allegory of the relationship between humanity and machines ---in particular, artificially intelligent machines. I believe the aesthetic of the movie originates from Scott's own vision, because I didn't really find it in the Philip K. Dick's novel, Do Androids Dream of Electric Sheep (1968), upon which the movie is (very loosely) based. Neuromancer made a big splash not because it was the "first" cyberpunk novel, but rather, because it perfectly captured the Zeitgeist of anxiety and wonder that prevailed at the dawning of the present era of globalized economics, digital telecommunications, and exponential technological progress --things which we now take for granted but which, in the early 1980s were still new and frightening. For example, Gibson's novels exhibit a fascination with the "Japanification" of Western culture --then a major concern, but now a forgotten and laughable anxiety. This is also visible in the futuristic Los Angeles of Scott’s Blade Runner. Another early cyberpunk author is K.W. Jeter, whose imaginative and disturbing novels Dr. Adder (1984) and The Glass Hammer (1985) exemplify the dark underside of the genre. Some people also identify Rudy Rucker and Bruce Sterling as progenitors of cyberpunk. -
The Paleoecology and Fire History from Crater Lake
THE PALEOECOLOGY AND FIRE HISTORY FROM CRATER LAKE, COLORADO: THE LAST 1000 YEARS By Charles T. Mogen A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Environmental Science and Policy Northern Arizona University August 2018 Approved: R. Scott Anderson, Ph.D., Chair Nicholas P. McKay, Ph.D. Darrell S. Kaufman, Ph.D. Abstract High-resolution pollen, plant macrofossil, charcoal and pyrogenic Polycyclic Aromatic Hydrocarbon (PAH) records were developed from a 154 cm long sediment core collected from Crater Lake (37.39°N, 106.70°W; 3328 m asl), San Juan Mountains, Colorado. Several studies have explored Holocene paleo-vegetation and fire histories from mixed conifer and subalpine bogs and lakes in the San Juan and southern Rocky Mountains utilizing both palynological and charcoal studies, but most have been at relatively low resolution. In addition to presenting the highest resolution palynological study over the last 1000 years from the southern Rocky Mountains, this thesis also presents the first high-resolution pyrogenic PAH and charcoal paired analysis aimed at understanding both long-term fire history and the unresolved relationship between how each of these proxies depict paleofire events. Pollen assemblages, pollen ratios, and paleofire activity, indicated by charcoal and pyrogenic PAH records, were used to infer past climatic conditions. Although the ecosystem surrounding Crater Lake has remained a largely spruce (Picea) dominated forest, the proxies developed in this thesis suggest there were two distinct climate intervals between ~1035 to ~1350 CE and ~1350 to ~1850 CE in the southern Rocky Mountains, associated with the Medieval Climate Anomaly (MCA) and Little Ice Age (LIA) respectively. -
The Fundamental Articles of I.AM Cyborg Law
Beijing Law Review, 2020, 11, 911-946 https://www.scirp.org/journal/blr ISSN Online: 2159-4635 ISSN Print: 2159-4627 The Fundamental Articles of I.AM Cyborg Law Stephen Castell CASTELL Consulting, Witham, UK How to cite this paper: Castell, S. (2020). Abstract The Fundamental Articles of I.AM Cyborg Law. Beijing Law Review, 11, 911-946. Author Isaac Asimov first fictionally proposed the “Three Laws of Robotics” https://doi.org/10.4236/blr.2020.114055 in 1942. The word “cyborg” appeared in 1960, describing imagined beings with both artificial and biological parts. My own 1973 neologisms, “neural Received: November 2, 2020 plug compatibility”, and “softwiring” predicted the computer software-driven Accepted: December 15, 2020 Published: December 18, 2020 future evolution of man-machine neural interconnection and synthesis. To- day, Human-AI Brain Interface cyborg experiments and “brain-hacking” de- Copyright © 2020 by author(s) and vices are being trialed. The growth also of Artificial Intelligence (AI)-driven Scientific Research Publishing Inc. Data Analytics software and increasing instances of “Government by Algo- This work is licensed under the Creative Commons Attribution International rithm” have revealed these advances as being largely unregulated, with insuf- License (CC BY 4.0). ficient legal frameworks. In a recent article, I noted that, with automation of http://creativecommons.org/licenses/by/4.0/ legal processes and judicial decision-making being increasingly discussed, Open Access RoboJudge has all but already arrived; and I discerned also the cautionary Castell’s Second Dictum: “You cannot construct an algorithm that will relia- bly decide whether or not any algorithm is ethical”. -
Grumbles from the Grave
GRUMBLES FROM THE GRAVE Robert A. Heinlein Edited by Virginia Heinlein A Del Rey Book BALLANTINE BOOKS • NEW YORK For Heinlein's Children A Del Rey Book Published by Ballantine Books Copyright © 1989 by the Robert A. and Virginia Heinlein Trust, UDT 20 June 1983 All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Ballantine Books, a division of Random House, Inc., New York, and simultaneously in Canada by Random House of Canada Limited, Toronto. Grateful acknowledgment is made to the following for permission to reprint the following material: Davis Publications, Inc. Excerpts from ten letters written by John W. Campbell as editor of Astounding Science Fiction. Copyright ® 1989 by Davis Publications, Inc. Putnam Publishing Group: Excerpt from the original manuscript of Podkayne of Mars by Robert A. Heinlein. Copyright ® 1963 by Robert A. Heinlein. Reprinted by permission of the Putnam Publishing Group. Library of Congress Catalog Card Number: 89-6859 ISBN 0-345-36941-6 Manufactured in the United States of America First Hardcover Edition: January 1990 First Mass Market Edition: December 1990 CONTENTS Foreword A Short Biography of Robert A. Heinlein by Virginia Heinlein CHAPTER I In the Beginning CHAPTER II Beginnings CHAPTER III The Slicks and the Scribner's Juveniles CHAPTER IV The Last of the Juveniles CHAPTER V The Best Laid Plans CHAPTER VI About Writing Methods and Cutting CHAPTER VII Building CHAPTER VIII Fan Mail and Other Time Wasters CHAPTER IX Miscellany CHAPTER X Sales and Rejections CHAPTER XI Adult Novels CHAPTER XII Travel CHAPTER XIII Potpourri CHAPTER XIV Stranger CHAPTER XV Echoes from Stranger AFTERWORD APPENDIX A Cuts in Red Planet APPENDIX B Postlude to Podkayne of Mars—Original Version APPENDIX C Heinlein Retrospective, October 6, 1988 Bibliography Index FOREWORD This book does not contain the polished prose one normally associates with the Heinlein stories and articles of later years. -
Middleware in Action 2007
Technology Assessment from Ken North Computing, LLC Middleware in Action Industrial Strength Data Access May 2007 Middleware in Action: Industrial Strength Data Access Table of Contents 1.0 Introduction ............................................................................................................. 2 Mature Technology .........................................................................................................3 Scalability, Interoperability, High Availability ...................................................................5 Components, XML and Services-Oriented Architecture..................................................6 Best-of-Breed Middleware...............................................................................................7 Pay Now or Pay Later .....................................................................................................7 2.0 Architectures for Distributed Computing.................................................................. 8 2.1 Leveraging Infrastructure ........................................................................................ 8 2.2 Multi-Tier, N-Tier Architecture ................................................................................. 9 2.3 Persistence, Client-Server Databases, Distributed Data ....................................... 10 Client-Server SQL Processing ......................................................................................10 Client Libraries .............................................................................................................. -
A La Torre Aaker Aalbers Aaldert Aarmour Aaron
A LA TORRE ABDIE ABLEMAN ABRAMOWITCH AAKER ABE ABLES ABRAMOWITZ AALBERS ABEE ABLETSON ABRAMOWSKY AALDERT ABEEL ABLETT ABRAMS AARMOUR ABEELS ABLEY ABRAMSEN AARON ABEKE ABLI ABRAMSKI AARONS ABEKEN ABLITT ABRAMSON AARONSON ABEKING ABLOTT ABRAMZON AASEN ABEL ABNER ABRASHKIN ABAD ABELA ABNETT ABRELL ABADAM ABELE ABNEY ABREU ABADIE ABELER ABORDEAN ABREY ABALOS ABELES ABORDENE ABRIANI ABARCA ABELI ABOT ABRIL ABATE ABELIN ABOTS ABRLI ABB ABELL ABOTSON ABRUZZO ABBA ABELLA ABOTT ABSALOM ABBARCROMBIE ABELLE ABOTTS ABSALON ABBAS ABELLS ABOTTSON ABSHALON ABBAT ABELMAN ABRAHAM ABSHER ABBATE ABELS ABRAHAMER ABSHIRE ABBATIELLO ABELSON ABRAHAMI ABSOLEM ABBATT ABEMA ABRAHAMIAN ABSOLOM ABBAY ABEN ABRAHAMOF ABSOLON ABBAYE ABENDROTH ABRAHAMOFF ABSON ABBAYS ABER ABRAHAMOV ABSTON ABBDIE ABERCROMBIE ABRAHAMOVITZ ABT ABBE ABERCROMBY ABRAHAMOWICZ ABTS ABBEKE ABERCRUMBIE ABRAHAMS ABURN ABBEL ABERCRUMBY ABRAHAMS ABY ABBELD ABERCRUMMY ABRAHAMSEN ABYRCRUMBIE ABBELL ABERDEAN ABRAHAMSOHN ABYRCRUMBY ABBELLS ABERDEEN ABRAHAMSON AC ABBELS ABERDEIN ABRAHAMSSON ACASTER ABBEMA ABERDENE ABRAHAMY ACCA ABBEN ABERG ABRAHM ACCARDI ABBERCROMBIE ABERLE ABRAHMOV ACCARDO ABBERCROMMIE ABERLI ABRAHMOVICI ACE ABBERCRUMBIE ABERLIN ABRAHMS ACERO ABBERDENE ABERNATHY ABRAHMSON ACESTER ABBERDINE ABERNETHY ABRAM ACETO ABBERLEY ABERT ABRAMCHIK ACEVEDO ABBETT ABEYTA ABRAMCIK ACEVES ABBEY ABHERCROMBIE ABRAMI ACHARD ABBIE ABHIRCROMBIE ABRAMIN ACHENBACH ABBING ABIRCOMBIE ABRAMINO ACHENSON ABBIRCROMBIE ABIRCROMBIE ABRAMO ACHERSON ABBIRCROMBY ABIRCROMBY ABRAMOF ACHESON ABBIRCRUMMY ABIRCROMMBIE ABRAMOFF -
The Cyborg Prophecy: Reading Between Isaac Asimov's Lines
The Cyborg Prophecy: Reading between Isaac Asimov’s Lines Rudrani Gangopadhyay Jadavpur University, Kolkata Abstract: Donna Haraway’s “Cyborg Manifesto” describes the Cyborg as a conjunction of technology and discourse. It argues that a prosthesis becomes a cyborg element when it is integrated with the identity of an individual, and a cyborg is created by the almost symbiotic union of robotic and organic elements. Isaac Asimov, in his short story “The Bicentennial Man” for example, narrates the story of such a remarkable union of robotic and human parts and asserts, at the end, that the resultant system is, essentially, human. A cyborg, therefore, is ‘meta-human’, being somewhat enhanced (by the use of technology) in certain ways in comparison to a human being. There isa mass cyborgization of the global population taking place today. The kind of blurring of boundaries between exogenous and endogenous parts within the system of a human being that one had, so far, only come across in science fiction, is fast coming to life. The obvious example of prosthetics aside, gadgets like cellphone headsets, touchscreen phones and similar electronic devices have been rendered extensions of the human system, merging seamlessly with the organic identities and consequently, making cyborgs out of everyone. The relevance of literature featuring cyborgs, which have, in a way, acted as prophecies for human civilization, therefore cannot be emphasized enough. This paper explores the cyborg identity in select works of Isaac Asimov and reflect on the fast occurring cyborgization of the (meta-)human race in reality. Keywords: Science Fiction, Isaac Asimov, Cyborg, Cybernetics, Body Studies Donna Haraway, in the famous “Cyborg Manifesto,” describes a cyborg as a conjunction of technology and discourse (Haraway 149). -
Read Ebook {PDF EPUB} the Moon Maze Game by Larry Niven the Moon Maze Game by Larry Niven
Read Ebook {PDF EPUB} The Moon Maze Game by Larry Niven The Moon Maze Game by Larry Niven. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 661a828c784f2c22 • Your IP : 116.202.236.252 • Performance & security by Cloudflare. The Moon Maze Game by Larry Niven. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. -
A Practical Attack on Broadcast RC4
A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4is the most widely deployed stream cipher in software applications. In this paper we describe a major statistical weakness in RC4, which makes it trivial to distinguish between short outputs of RC4 and random strings by analyzing their second bytes. This weakness can be used to mount a practical ciphertext-only attack on RC4in some broadcast applications, in which the same plaintext is sent to multiple recipients under different keys. 1 Introduction A large number of stream ciphers were proposed and implemented over the last twenty years. Most of these ciphers were based on various combinations of linear feedback shift registers, which were easy to implement in hardware, but relatively slow in software. In 1987Ron Rivest designed the RC4 stream cipher, which was based on a different and more software friendly paradigm. It was integrated into Microsoft Windows, Lotus Notes, Apple AOCE, Oracle Secure SQL, and many other applications, and has thus become the most widely used software- based stream cipher. In addition, it was chosen to be part of the Cellular Digital Packet Data specification. Its design was kept a trade secret until 1994, when someone anonymously posted its source code to the Cypherpunks mailing list. The correctness of this unofficial description was confirmed by comparing its outputs to those produced by licensed implementations. RC4 has a secret internal state which is a permutation of all the N =2n possible n bits words. -
In the United States Bankruptcy Court for the District of Delaware
Case 21-10527-JTD Doc 285 Filed 04/14/21 Page 1 of 68 IN THE UNITED STATES BANKRUPTCY COURT FOR THE DISTRICT OF DELAWARE ) In re: ) Chapter 11 ) CARBONLITE HOLDINGS LLC, et al.,1 ) Case No. 21-10527 (JTD) ) Debtors. ) (Jointly Administered) ) AFFIDAVIT OF SERVICE I, Victoria X. Tran, depose and say that I am employed by Stretto, the claims and noticing agent for the Debtors in the above-captioned case. On April 10, 2021, at my direction and under my supervision, employees of Stretto caused the following documents to be served via first-class mail on the service list attached hereto as Exhibit A, and via electronic mail on the service list attached hereto as Exhibit B: Notice of Proposed Sale or Sales of Substantially All of the Debtors’ Assets, Free and Clear of All Encumbrances, Other Than Assumed Liabilities, and Scheduling Final Sale Hearing Related Thereto (Docket No. 268) Notice of Proposed Assumption and Assignment of Designated Executory Contracts and Unexpired Leases (Docket No. 269) Furthermore, on April 10, 2021, at my direction and under my supervision, employees of Stretto caused the following documents to be served via first-class mail on the service list attached hereto as Exhibit C, and via electronic mail on the service list attached hereto as Exhibit D: Notice of Proposed Sale or Sales of Substantially All of the Debtors’ Assets, Free and Clear of All Encumbrances, Other Than Assumed Liabilities, and Scheduling Final Sale Hearing Related Thereto (Docket No. 268, Pages 1-4) Notice of Proposed Assumption and Assignment of Designated Executory Contracts and Unexpired Leases (Docket No. -
Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK{ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition Promotor: Proefschrift voorgedragen tot Prof. Dr. ir. Bart Preneel het behalen van het doctoraat in de ingenieurswetenschappen door Souradyuti Paul November 2006 KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK{ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition Jury: Proefschrift voorgedragen tot Prof. Dr. ir. Etienne Aernoudt, voorzitter het behalen van het doctoraat Prof. Dr. ir. Bart Preneel, promotor in de ingenieurswetenschappen Prof. Dr. ir. Andr´eBarb´e door Prof. Dr. ir. Marc Van Barel Prof. Dr. ir. Joos Vandewalle Souradyuti Paul Prof. Dr. Lars Knudsen (Technical University, Denmark) U.D.C. 681.3*D46 November 2006 ⃝c Katholieke Universiteit Leuven { Faculteit Ingenieurswetenschappen Arenbergkasteel, B-3001 Heverlee (Belgium) Alle rechten voorbehouden. Niets uit deze uitgave mag vermenigvuldigd en/of openbaar gemaakt worden door middel van druk, fotocopie, microfilm, elektron- isch of op welke andere wijze ook zonder voorafgaande schriftelijke toestemming van de uitgever. All rights reserved. No part of the publication may be reproduced in any form by print, photoprint, microfilm or any other means without written permission from the publisher. D/2006/7515/88 ISBN 978-90-5682-754-0 To my parents for their unyielding ambition to see me educated and Prof. Bimal Roy for making cryptology possible in my life ... My Gratitude It feels awkward to claim the thesis to be singularly mine as a great number of people, directly or indirectly, participated in the process to make it see the light of day. -
Den Necessity Issue 1.Pub
1 Wednesday, August 6, 2008 Morning Edition Summerfaire on Barrayar The Blue Bear Necessities A Convention with Altitude The Imperial Summerfaire Re‐ ception promises to be the social Even as you read these words, Visitors also may want to take it event of the season. There will be you are 5,280 feet above mean‐sea‐ easy for their first day, not push music, dancing, and other fun level or as we like to say, “a mile themselves physically and moderate things to see and do. closer to the stars.” their alcohol and caffeine intake until Mingle with the galactic elite in While this is not high enough to their body adjusts. your best Betan sarong, Komarran cause altitude sickness in most Being a mile closer to the stars trousers, or your own version of people, some may experience includes our sun, so wear sunscreen interplanetary chic. Donʹt forget temporary shortness of breath; if so, with a sun protective factor (SPF) of how much Barrayarans appreciate just rest for a minute. Dehydration at least 15, good quality sunglasses, uniforms! Well‐behaved off‐world is a more serious problem—experts and a hat. Use a lip balm. mercenary and military members recommend visitors drink at least Those who are not in good are welcome; please have your legal two glasses more water (eight total) cardiovascular health, older representative research the laws than they do normally. Beverages Americans, or experiencing other against dueling. Imp Sec will be with caffeine, sugar, and alcohol do health problems including diabetes, watching as there have been ru‐ not prevent dehydration and may experience altitude sickness mors of spies.