Code of the Lifemaker By James P. Hogan

Make a Factory,” i.e., robots. And that was where everything really started to

go wrong.

The robots contained small internal processors that could be reprogramed via

radiolink from the factory computers for each new task to be accomplished. This

allowed the robots to proceed with their various jobs under autonomous local

control and freed up the central computers for other work while they were

waiting for the next “Done that—what do I do now?” signal. Hence many software

mechanisms existed for initiating data transfers between the factory computers

and the remote processors inside the robots.

When the copying of the “How to Make a Factory” file from the ship to Factory

One was attempted, the wrong software linkages were activated; instead of

finding their way into the factory’s central system, the subfiles containing the

manufacturing information for the various robots were merely relayed through the

factory and beamed out into the local memories of the respective robot types to

which they pertained. No copies at all were retained in the factory databank.

And even worse, the originals inside the ship managed to self-destruct in the

process and were irretrievably erased. The only copies of the “How to Make a

Fred-type Robot” subfile were the ones contained inside the Fred-types out on

the surface. And the same was true for all the other types as well.

So when the factory’s Supervisor program ordered the Scheduler program to

schedule more robots for manufacture, and the Scheduler lodged a request with

the Databank Manager for the relevant subfiles, the Databank Manager found that

it couldn’t deliver. Neither could it obtain a recopy from the ship. The

Databank Manager reported the problem to the Scheduler; the Scheduler complained

to the Supervisor; the Supervisor blamed the Communications Manager; the

Communications Manager demanded an explanation from the Message Handler; and

after a lot of mutual electronic recriminations and accusations, the system

logging and diagnostic programs determined that the missing subfiles had last

been tracked streaming out through the transmission buffers on their way to the

robots outside. Under a stem directive from the Supervisor, the Communications

Manager selected a Fred from the first category of robots called for on the

Scheduler’s list, and beamed it a message telling it to send its subfile back

again.

But the Fred didn’t have a complete copy of the subfile; its local memory simply

hadn’t been big enough to hold all of it. And for the same reason, none of the

other Freds could return a full copy either. They had been sprayed in succession

with the datastream like buckets being filled from a fire-hose, and all had

ended up with different portions of the subfile; but they appeared to have

preserved the whole subfile among them. So the Supervisor had to retrieve

different pieces from different Freds to fit them together again in a way that

made sense. And that was how it arrived at the version it eventually handed to

the Scheduler for manufacture.

Unfortunately, the instruction to store the information for future reference got

lost somewhere, and for each batch of Freds the relevant “How to Make” subfile

was promptly erased as soon as the Manufacturing Manager had finished with it.

Hence when Factory One had spent some time producing parts for Factory Two and

needed to expand its robot workforce to begin surveying sites for Factory Three,

the Supervisor had to go through the whole rigmarole again. And the same process

was necessary whenever a new run was scheduled to provide replacements for

robots that had broken down or were wearing out.

All of this took up excessive amounts of processor time, loaded up the

communications channels, and was generally inefficient in the ways that cost

accountants worry about. The alien programers had been suitably indoctrinated by

the alien cost accountants who ran the business— as always—and had written the

Supervisor as a flexible, self-modifying learning program that would detect such

inefficiencies, grow unhappy about them, and seek ways to improve things. After

a few trials, the Supervisor found that some of the Freds contained about half

their respective subfiles, which meant that a complete copy could be obtained by

interrogating just two individuals instead of many. Accordingly it made a note

Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178

Leave a Reply 0

Your email address will not be published. Required fields are marked *