The World’s First Autonomous Electric Cargo Ship Is Due To Set Sail

Maritime shipping is big business, with gigantic container ships responsible for moving the vast majority of the world’s goods from point A to points B, C and D. Of course, there’s a significant environmental impact from all this activity, something ill befitting the cleaner, cooler world we hope the future will be. Thus, alternatives to the fossil fuel burning ships of old must be found. To that end, Norwegian company Yara International has developed a zero-emission ship by the name of Yara Birkeland, which aims to show the way forward into a world of electric, autonomous sea transport. 

Continue reading “The World’s First Autonomous Electric Cargo Ship Is Due To Set Sail”

Pulling the Google logo off of a smartphone

Pining For A De-Googled Smartphone

Last summer in the first swings of the global pandemic, sitting at home finally able to tackle some of my electronics projects now that I wasn’t wasting three hours a day commuting to a cubicle farm, I found myself ordering a new smartphone. Not the latest Samsung or Apple offering with their boring, predictable UIs, though. This was the Linux-only PinePhone, which lacks the standard Android interface plastered over an otherwise deeply hidden Linux kernel.

As a bit of a digital privacy nut, the lack of Google software on this phone seemed intriguing as well, and although there were plenty of warnings that this was a phone still in its development stages it seemed like I might be able to overcome any obstacles and actually use the device for daily use. What followed, though, was a challenging year of poking, prodding, and tinkering before it got to the point where it can finally replace an average Android smartphone and its Google-based spyware with something that suits my privacy-centered requirements, even if I do admittedly have to sacrifice some functionality.

Continue reading “Pining For A De-Googled Smartphone”

The Postmortem Password Problem

Death and passwords: two things we just can’t avoid. With so much of our lives tied up in cloud services nowadays, there’s good reason to worry about what happens to these accounts if we drop dead tomorrow. For many of us, important documents, photos, financial information and other data will be locked behind a login prompt. Your payment methods will also expire shortly after you have, which could lead to data loss if not handled promptly. The most obvious way to address this is to give a trusted party access in case of emergency.

A Bad Solution

Let’s start with the simplest solution: using the same password everywhere.  Great, all you need to do is put this on a Post-it note, stuff it in an envelope, and let someone know where to find it. Unfortunately, using a single password for many services is a terrible idea. Password breaches happen, and if you’re using a single password across the internet, they can be disastrous.

Password breaches are usually the result of an attacker finding a vulnerability that allows reading password data from an application’s database. Odds are high that your information has been leaked in one of these breaches. You can check if your email is on a list of known breaches with Have I Been Pwned. Don’t feel bad if you’ve been pwned, my email shows up on six different breaches, and this service only indexes publicly known breaches!

Depending on the competency of the company that was breached, your password may have been stolen in a few different formats. In the worst case, the passwords were stored as-is (i.e., cleartext), and the breach contains your actual password. Nowadays, storing passwords in cleartext is never considered acceptable. A hash of the password is stored instead. Attackers need to use a tool like hashcat to try to recover the passwords via brute force hash cracking. This is slow for complex passwords, but is always getting faster as GPUs improve.

So we really need to use different passwords everywhere, or our Tumblr account from 2013 could give access to our bank account. Given the large number of services we use and our inability to remember passwords, we’re going to need to use a password manager. Continue reading “The Postmortem Password Problem”

Bar code shown in a 3D plain in Vaporwave Aesthetic

Tech In Plain Sight: Check Digits And Human Error

Computers in working order and with correct software don’t make mistakes. People, however, make plenty of mistakes (including writing bad software or breaking computers). In quality circles, there’s a Japanese term, poka yoke, which roughly means ‘error avoidance’. The idea is to avoid errors by making them too obvious for them to occur. For example, consider a SIM card in your phone. The little diagonal corner means it only goes in one way. If you put it in the wrong way, it is obviously wrong.

To be successful at poka yoke, you have to be able to imagine what a user might do wrong and then come up with some way to make it obvious that it is wrong. There are examples of this all around us and we sometimes don’t even know it. For example, what do your credit card number, your car’s VIN code, and a UPC code on a can of beans have in common?

Continue reading “Tech In Plain Sight: Check Digits And Human Error”

Open-Source Insulin: Biohackers Aiming For Distributed Production

When you’ve got a diabetic in your life, there are few moments in any day that are free from thoughts about insulin. Insulin is literally the first coherent thought I have every morning, when I check my daughter’s blood glucose level while she’s still asleep, and the last thought as I turn out the lights, making sure she has enough in her insulin pump to get through the night. And in between, with the constant need to calculate dosing, adjust levels, add corrections for an unexpected snack, or just looking in the fridge and counting up the number of backup vials we have on hand, insulin is a frequent if often unwanted intruder on my thoughts.

And now, as my daughter gets older and seeks like any teenager to become more independent, new thoughts about insulin have started to crop up. Insulin is expensive, and while we have excellent insurance, that can always change in a heartbeat. But even if it does, the insulin must flow — she has no choice in the matter. And so I thought it would be instructional to take a look at how insulin is made on a commercial scale, in the context of a growing movement of biohackers who are looking to build a more distributed system of insulin production. Their goal is to make insulin affordable, and with a vested interest, I want to know if they’ve got any chance of making that goal a reality.

Continue reading “Open-Source Insulin: Biohackers Aiming For Distributed Production”

Neuromorphic Computing: What Is It And Where Are We At?

For the last hundred or so years, collectively as humanity, we’ve been dreaming, thinking, writing, singing, and producing movies about a machine that could think, reason, and be intelligent in a similar way to us. The stories beginning with “Erewhon” published in 1872 by Sam Butler, Edgar Allan Poe’s “Maelzel’s Chess Player,” and the 1927 film “Metropolis” showed the idea that a machine could think and reason like a person. Not in magic or fantastical way. They drew from the automata of ancient Greece and Egypt and combined notions of philosophers such as Aristotle, Ramon Llull, Hobbes, and thousands of others.

Their notions of the human mind led them to believe that all rational thought could be expressed as algebra or logic. Later the arrival of circuits, computers, and Moore’s law led to continual speculation that human-level intelligence was just around the corner. Some have heralded it as the savior of humanity, where others portray a calamity as a second intelligent entity rises to crush the first (humans).

The flame of computerized artificial intelligence has brightly burned a few times before, such as in the 1950s, 1980s, and 2010s. Unfortunately, both prior AI booms have been followed by an “AI winter” that falls out of fashion for failing to deliver on expectations. This winter is often blamed on a lack of computer power, inadequate understanding of the brain, or hype and over-speculation. In the midst of our current AI summer, most AI researchers focus on using the steadily increasing computer power available to increase the depth of their neural nets. Despite their name, neural nets are inspired by the neurons in the brain and share only surface-level similarities.

Some researchers believe that human-level general intelligence can be achieved by simply adding more and more layers to these simplified convolutional systems fed by an ever-increasing trove of data. This point is backed up by the incredible things these networks can produce, and it gets a little better every year. However, despite what wonders deep neural nets produce, they still specialize and excel at just one thing. A superhuman Atari playing AI cannot make music or think about weather patterns without a human adding those capabilities. Furthermore, the quality of the input data dramatically impacts the quality of the net, and the ability to make an inference is limited, producing disappointing results in some domains. Some think that recurrent neural nets will never gain the sort of general intelligence and flexibility that our brains offer.

However, some researchers are trying to creating something more brainlike by, you guessed it, more closely emulates a brain. Given that we are in a golden age of computer architecture, now seems the time to create new hardware. This type of hardware is known as Neuromorphic hardware.

Continue reading “Neuromorphic Computing: What Is It And Where Are We At?”

radio direction finding

Where’s That Radio? A Brief History Of Direction Finding

We think of radio navigation and direction finding as something fairly modern. However, it might surprise you that direction finding is nearly as old as radio itself. In 1888, Heinrich Hertz noted that signals were strongest when in one orientation of a loop antenna and weakest 90 degrees rotated. By 1900, experimenters noted dipoles exhibit similar behavior and it wasn’t long before antennas were made to rotate to either maximize signal or locate the transmitter.

British radio direction finding truck from 1927; public domain
British radio direction finding truck from 1927; public domain

Of course, there is one problem. You can’t actually tell which side of the antenna is pointing to the signal with a loop or a dipole. So if the antenna is pointing north, the signal might be to the north but it could also be to the south. Still, in some cases that’s enough information.

John Stone patented a system like this in 1901. Well-known radio experimenter Lee De Forest also had a novel system in 1904. These systems all suffered from a variety of issues. At shortwave frequencies, multipath propagation can confuse the receiver and while longwave signals need very large antennas. Most of the antennas moved, but some — like one by Marconi — used multiple elements and a switch.

However, there are special cases where these limitations are acceptable. For example, when Pan Am needed to navigate airplanes over the ocean in the 1930s, Hugo Leuteritz who had worked at RCA before Pan Am, used a loop antenna at the airport to locate a transmitter on the plane. Since you knew which side of the antenna the airplane must be on, the bidirectional detection wasn’t a problem.

Continue reading “Where’s That Radio? A Brief History Of Direction Finding”