Open-Sourcing The Lisa, Mac’s Bigger Sister

Forty years ago, on January 19th of 1983, Apple released the Lisa, which was in many ways a revolutionary system. On January 19th of 2023, to celebrate the system’s 40th birthday, the Computer History Museum released the source code for Lisa OS version 3.1 under the Apple Academic License Agreement. Written in Pascal, the source includes over 1,300 source files, covering the OS itself, the Lisa Toolkit development system and a number of applications. The questions one might ask at this point include what the Apple Lisa even is, and why it was such an important system in computer history.

This especially in light of the terrible flop that the Lisa turned out to be, with only 10,000 units sold over two years. Part of this failure was definitely due to the introductory price, that was set at $9,995 (over $27,000 in 2021 dollars). Although it featured an OS with memory protection, despite the lack of an MMU on the Motorola 68k, among other advanced features that placed it well beyond other desktop computers of the time, it got quickly crushed in the market by Apple’s MacIntosh, even after successive Lisa successor releases that sought to address its shortcomings.

Continue reading “Open-Sourcing The Lisa, Mac’s Bigger Sister”

NASA Lunar Probe Finds Out It’s Not Easy Being Green

If you’re a space fan, these are very exciting days. There’s so much happening overhead that sometimes it can be difficult to keep up with the latest news. Artemis I just got back from the Moon, the International Space Station crew are dealing with a busted Soyuz, SpaceX is making incredible progress with their Starship architecture, CubeSats are being flung all over the solar system, and it seems like every month a new company is unveiling their own commercially-developed launch vehicle.

Lunar Flashlight

So with everything going on, we wouldn’t be surprised if you haven’t heard about NASA’s Lunar Flashlight mission. The briefcase-sized spacecraft was launched aboard a special “rideshare” flight of SpaceX’s Falcon 9 rocket back on December 11th — tagging along with two other craft heading to our nearest celestial neighbor, the Japanese Hakuto-R lander, and a small rover developed by the United Arab Emirates. There was a time when a launch like that would have been big news, but being that it was only the second of seven launches that SpaceX performed in December alone, it didn’t make many headlines.

But recently, that’s started to change. There’s a growing buzz around Lunar Flashlight, though unfortunately, not for the reasons we’d usually hope. It seems the diminutive explorer has run into some trouble with its cutting-edge “green” propellant system, and unless the issue can be resolved soon, the promising mission could come to an end before it even had a chance to start.

Continue reading “NASA Lunar Probe Finds Out It’s Not Easy Being Green”

Punycodes Explained

When you’re restricted to ASCII, how can you represent more complex things like emojis or non-Latin characters? One answer is Punycode, which is a way to represent Unicode characters in ASCII. However, while you could technically encode the raw bits of Unicode into characters, like Base64, there’s a snag. The Domain Name System (DNS) generally requires that hostnames are case-insensitive, so whether you type in HACKADAY.com, HackADay.com, or just hackaday.com, it all goes to the same place.

[A. Costello] at the University of California, Berkley proposed the idea of Punycode in RFC 3492 in March 2003. It outlines a simple algorithm where all regular ASCII characters are pulled out and stuck on one side with a separator in between, in this case, a hyphen. Then the Unicode characters are encoded and stuck on the end of the string.

First, the numeric codepoint and position in the string are multiplied together. Then the number is encoded as a Base-36 (a-z and 0-9) variable-length integer. For example, a greeting and the Greek for thanks, “Hey, ευχαριστώ” becomes “Hey, -mxahn5algcq2″. Similarly, the beautiful city of München becomes mnchen-3ya. Continue reading “Punycodes Explained”

AI-Controlled Twitch V-Tuber Has More Followers Than You

Surely we have all at least heard of Twitch by now. For the as-yet uninitiated: imagine you had your own TV channel. What would you do on it? Although Twitch really got going as a place for gamers to stream the action, there are almost as many people jamming out on their guitars, or building guitars, or just talking about guitars. And that’s just the example that uses guitars — if you can think of it, someone is probably doing it live on Twitch, within the Terms of Service, of course.

Along with the legions of people showing their faces and singing their hearts out, you have people in partial disguise, and then you have v-tubers. That stands for virtual tubers, and it just means that the person is using an anime avatar to convey themselves.

Now that you’re all caught up, let’s digest the following item together: there’s a v-tuber on Twitch that’s controlled entirely by AI. Let me run that by you again: there’s a person called [Vedal] who operates a Twitch channel. Rather than stream themselves building Mad Max-style vehicles and fighting them in a post-apocalyptic wasteland, or singing Joni Mitchell tunes, [Vedal] pulls the strings of an AI they created, which is represented by an animated character cleverly named Neuro-sama. Not only does Neuro-sama know how to play Minecraft and osu!, she speaks gamer and interacts regularly with chat in snarky, 21st century fashion. And that really is the key behind Twitch success — interacting with chat in a meaningful way.

Continue reading “AI-Controlled Twitch V-Tuber Has More Followers Than You”

Wizards Slay The Dragon That Lays The Golden Egg

Hail, and well met adventurers! There’s rumors of dark dealings, and mysterious machinations from that group of Western mystics, Wizards of the Coast (WotC). If this pernicious plot is allowed to succeed, a wave of darkness will spread over this land of Open Source gaming, the vile legal fog sticking to and tainting everything it touches. Our quest today is to determine the truth of these words, and determine a defense for the world of open gaming, and indeed perhaps the entire free world! Beware, the following adventure will delve into the bleak magic of licensing, contract law, and litigation.

Ah, Dungeons and Dragons. The original creation of Gary Gygax, refined by countless others, this table-top role-playing game has brought entertainment and much more to millions of players for years. In 2000, WotC made a decision that opened the mechanics of that universe to everyone. The 3rd Edition of Dungeons and Dragons was released under the Open Gaming License, a very intentional port of Open Source licensing to table-top gaming — obviously inspired by the GNU Public License. Ryan Dancey was one of the drivers behind the new approach, and made this statement about it:

I think there’s a very, very strong business case that can be made for the idea of embracing the ideas at the heart of the Open Source movement and finding a place for them in gaming. […] One of my fundamental arguments is that by pursuing the Open Gaming concept, Wizards can establish a clear policy on what it will, and will not allow people to do with its copyrighted materials. Just that alone should spur a huge surge in independent content creation that will feed into the D&D network.

Continue reading “Wizards Slay The Dragon That Lays The Golden Egg”

The Intricacies Of Creating Fuel For Nuclear Reactors

All nuclear fission power reactors run on fuel containing uranium and other isotopes, but fueling a nuclear reactor is a lot more complicated than driving up to them with a dump truck filled with uranium ore and filling ‘er up. Although nuclear fission is simple enough that it can occur without human intervention as happened for example at the Oklo natural fission reactors, within a commercial reactor the goal is to create a nuclear chain reaction that targets a high burn-up (fission rate), with an as constant as possible release of energy.

Each different fission reactor design makes a number of assumptions about the fuel rods that are inserted into it. These assumptions can be about the enrichment ratio of the fissile isotopes like U-235, the density of individual fuel pellets, the spacing between the fuel rods containing these pellets, the configuration of said fuel rods along with any control, moderator and other elements. and so on.

Today’s light water reactors, heavy water reactors, fast neutron reactors, high temperature reactors and kin all have their own fuel preferences as a result, with high-assay low-enriched (HALEU) fuel being the new hot thing for new reactor designs. Let’s take a look at what goes into these fuel recipes.

Continue reading “The Intricacies Of Creating Fuel For Nuclear Reactors”

The Surprisingly Simple Way To Steal Cryptocurrency

In the news a few days ago, the revelation that Luke Dashjr, a core Bitcoin developer, had his wallet compromised, and lost 200 BTC. A small fortune, and something of a shock. I’m guessing that someone with that expertise would not have left his private key lying around, so as a cryptocurrency non-enthusiast I’m left curious as to how the attackers might have done it. So I phoned a few friends who do walk those paths for an explanation, and the result was a fascinating conversation or two. The most probable answer is still that someone broke into his computer and copied the keys — straight-up computer theft. But there’s another possible avenue that doesn’t involve stealing anything, and is surprisingly simple. Continue reading “The Surprisingly Simple Way To Steal Cryptocurrency”