If you are British, you probably already know where this is going. For the rest of you, it might help to know that The Infinite Monkey Cage is an odd little show on BBC Radio 4 (and they’ve been on tour, too). It is the show that asks a question you probably never asked: “What would happen if a physicist and a comedian had a radio show?”
The answer, it turns out, is some science information that is anything but dry. If you are prone to listening to radio programs or podcasts, you might find some interesting tidbits in the Cage. A two-part episode on general relativity was especially interesting although it isn’t exactly like their regular program.
The physicist in question is [Brian Cox] who is an Advanced Fellow of particle physics at the University of Manchester. The comic, [Robin Ince] is not only a comedian, but also a writer, an impressionist, and has an honorary doctorate from Royal Holloway, University of London.
If you poke around the BBC’s site, you can find plenty of episodes to stream or download. General relativity is just one of the topics. You might also enjoy episodes on artificial intelligence or the science of sound.
If you need more comedy connections, consider that [Eric Idle] is responsible for the theme song. Of course, we cover relativity (and other topics) in a hopefully amusing style. Americans typically get British humor, or they don’t. There’s no in between. The good part about these is that if you don’t get the humor, there’s still the science content. Contrast this to the very funny (if you get it) Look Around You series that is probably not the best place to get scientific information (see the video below).
Continue reading “The Infinite Monkey Cage And General Relativity”






[Rand] fixed the problem by adding a second ESP8266 module. The first is the listener. It listens for WiFi access points. Once an AP is found, it sends this information to the second jammer” module via a unidirectional single line serial link. The jammer module pumps out deauth packets at full speed. He even managed to create a single executable which performs as both listener and jammer. At boot, the software sends out a series 0xFF bytes through the serial port. The listener has its serial transmit pin directly connected to the jammer’s serial receive line. When the jammer receives the 0xFF bytes, it jumps into the correct function. This was more than enough to kick that pesky Android phone off the network. As with the original article, we have to stress that you should only use modules like these for testing on your own equipment. Be careful out there folks!





