Posted on 01/17/2026 1:44:58 AM PST by SmokingJoe
Elon Musk just dropped a NUKE on medical careers (Jan 2026):
“Don’t go into medical school.” Elon: “Yes. Pointless.”
Prediction: → 3 years → Optimus robots > best human surgeons on Earth (at scale) → 4–5 years → Best medicine in the world = FREE & better than what presidents get today
The moment he basically says goodbye to traditional medicine forever 👇 (1:19 clip)
Abundance incoming… or mass white-coat unemployment?
(Excerpt) Read more at x.com ...
Good poit.
That doctor may lose her license over that dumb act. Some politician in one of the state’s she is licensed in is asking for her to lose it.
She Messed Around & Found Out (MAFO). I’m qouting what I heard Hegseth say on TV once :)
They really are after me!

This js a good thing because we don't want to be treated by a woke doctor who claims that a man can get pregnant.
A robot is not going to have this problem.
Pay scale or size?
“This is a good thing because we don’t want to be treated by a woke doctor who claims that a man can get pregnant.
“A robot is not going to have this problem.“
It will if it’s programmed that way.
The same way a surgeon notices a change in pallor, sweat, skin tone indicating possible stress of lying.
I'll ask for Grok.
I am still waiting for the roadster he unveiled in 2017 ...
man has always imagined some sort of utopia, this one is called autopia I guess.
“they’ve got these little wheeled delivery bots running around the streets...too easy to pick up and thrown into an electronically sealed compartment of a boxed truck and the contents taken and the precious metals sold.”
Who sends their gold deliveries by little wheeled delivery bots?
“You cant get hacked unless connected to internet. “
Anyone could dump the cards into the bin.
The IBM could also be accessed via the phone line.
“Before internet we had IBM 360 Computers which never got hacked, never needed security apps.”
Absolutely false.
Around here you can’t find a GP with a geiger counter.
Great! Look how pliant our flesh and blood medical community has proven to be. MASKS, Horse Paste, red meat kills, coffee is deadly, cholesterol is the devil’s potion, one egg per week, cut off the kids’ privates homosexuality has no relation to AIDS epidemic, tampons for men .....
Hospitals are equipped with two or more emergency generators. The electrical outlets for critical machines are connected to that backup system. The surgical suite has its own set of backup generators. When main power is lost, no critical device is affected.
Virtually every hospital in America has a diesel generator on site that kicks on during an outage. About once a week they automatically fire up for testing. Look around your hospital parking lot. That rectangle built out of cinder block, with a fat exhaust pipe protruding above, is most likely a generator.
My outfit had a 36o, 1620, and a GE computer. In 23 years not a single hack I was with them.
Depends on who programs the robots.
“My outfit had a 36o, 1620, and a GE computer. In 23 years not a single hack I was with them.”
Understanding The Top Security Threats For IBM 360
The IBM 360 was designed in the days when the issues of security were not considered seriously, and therefore, the IBM 360 system was vulnerable to many security threats. Some of the top security threats for the IBM 360 include:
Unauthorized Access: The actual comparison between the IBM 360 and modern systems’ access control looks less rigorous than today’s systems, so it is easier for intruders to obtain access to confidential data or other resources of the computer system.
Malware Infections: The IBM 360 had the weakness of being susceptible to viruses and worms, and these could bring about the collapse of the system at any given time.
Physical Security Breaches: In terms of physical security, IBM 360 had its lacks which would not allow the system to be entirely secured from physical manipulation or even actual theft of the physical components of the machine.
Outdated Software and Firmware: The system itself was the IBM 360 system, the software and firmware for which grew old and thus became vulnerable to known bugs that were within the ability of attackers to weaponize.
Lack of Logging and Monitoring: IBM’s 360 logging and monitoring was not very efficient, therefore it was hard to notice that there were breaches in the system or even worse to respond to them.
https://www.avatier.com/blog/introduction-to-ibm-360-and-its-security-vulnerabilities/
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.