Talk:The Last Enemy (TV series)
From Wikipedia, the free encyclopedia
Where did detailed information for unaired episodes originate from? 90.192.86.109 (talk) 00:52, 27 February 2008 (UTC)
- DVD rips of the episodes have shown up on BitTorrent, so one possibility is that somebody watched those and wrote them up. Daedae (talk) 04:15, 8 March 2008 (UTC)
- Presumably the rips are from TV - so how did they rip something that hasn't even been aired. The only way this could have been posted is if it leaked from the BBC, if tapes were stolen or if someone hacked into the BBC.--Sabrown100 (talk) 19:03, 9 March 2008 (UTC)
- The detailed info originated from www.bbc.co.uk/pressoffice/proginfo
- Presumably the rips are from TV - so how did they rip something that hasn't even been aired. The only way this could have been posted is if it leaked from the BBC, if tapes were stolen or if someone hacked into the BBC.--Sabrown100 (talk) 19:03, 9 March 2008 (UTC)
"showing some signs of OCD" - presumably obsessive-compulsive disorder, but I think the acronym might need explaining for some readers.83.170.105.48 (talk) 20:48, 3 March 2008 (UTC)
[edit] Is this a horror show?
Given the completely screwed up nature of the world this is set in, the invincible nature of the 'monster', the implied low-IQ of the entire population (in reality the government can't keep up with the people's use of technology, NOT the other way round), the 'it's never going to get better' ending, and the obvious intention for the viewer to find many of the themes depicted abhorant- is this a horror story? Cause those are all familiar hall marks of any horror film. ANTIcarrot (talk) 22:01, 16 March 2008 (UTC)
[edit] Plausibility
Any such database would be (a) a vandal-magnet; (b) subject to all the problems that beset computers (lightning down the connections, incompatibility etc); (c) Murphy's Law as applied to computers (the military computer which decided it was meant to spot "pictures with clouds in them" rather than "pictures with tanks in them"; (d) arouse contrariness, conspiracy theorists, fan clubs and all the other minor "us and them" groupings; (e) subject those attempting to make use of the information to data overload on bizarre subjects and false positives (the crossword setter in WWII who thought up, by accident, the names of several ongoing military operations. There are, no doubt, sevaral more reasons against. And - what if the computer decides that "MP/senior figure X" meets all the criteria of being a "destabilising force" - based on a collection of unconnected statements?
Also it is probably more difficult than suggested to target specific groups - eg the Yorkshire people identified by DNA as having ancestors from completely different parts of the Roman Empire, being soldiers on Hadrian's Wall. Jackiespeel (talk) 16:58, 17 March 2008 (UTC)
A few more points
Whether or not acting out of criminal intent people will find ways of working around such systems - even without resorting to the Data Protection Act, human rights legislation and similar - finding out information by pursuing tangents etc. As with Heisenberg's Principle, the subjects change their behaviour because they are being looked at.
Computers in general tend to go wrong - and for TIA to "work" the entire population of the globe would have to be monitored (with all the complications that arise from considering the potential interactions of some 6.5 billion people - six degrees of separation and all.
It is said that the military regularly prepares for the last war: the same would apply in fields such as this - how often would the "wrong question" in general be asked?
"It is impossible to make anything foolproof, because fools are so ingenious." Jackiespeel (talk) 18:33, 1 April 2008 (UTC)