Powering external devices directly from a PC’s I/O ports has been a thing long before USB was even a twinkle in an engineer’s eye. Some of us may remember the all too common PS/2 pass-through leads that’d tap into the 275 mA that is available via these ports. When USB was first released, it initially provided a maximum of 500 mA which USB 3.0 increased to 900 mA.
For the longest time, this provided power was meant only to provide a way for peripherals like keyboards, mice and similar trivial devices to be powered rather than require each of these to come with its own power adapter. As the number of computer-connected gadgets increased USB would become the primary way to not only power small devices directly, but to also charge battery-powered devices and ultimately deliver power more generally.
Which brings us to the USB Power Delivery (USB-PD) protocol. Confusingly, USB-PD encompasses a number of different standards, ranging from fixed voltage charging to Programmable Power Supply and Adjustable Voltage Supply. What are the exact differences between these modes, and how does one go about using them? Continue reading “Powering Up With USB: Untangling The USB Power Delivery Standards”
Whenever anyone mentions the word “antibodies” these days, it’s sure to grab your attention. Thoughts generally flow to the human immune system and the role it plays in the ongoing COVID-19 pandemic, and to how our bodies fight off disease in general. The immune system is complex in the extreme, but pretty much everyone knows that antibodies are part of it and that they’re vital to the ability of the body to recognize and neutralize invaders like bacteria and viruses.
But as important as antibodies are to long-term immunity and the avoidance of disease, that’s far from all they’re good for. The incredible specificity of antibodies to their target antigens makes them powerful tools for biological research and clinical diagnostics, like rapid COVID-19 testing. The specificity of antibodies has also opened up therapeutic modalities that were once the stuff of science-fiction, where custom-built antibodies act like a guided missile to directly attack not only a specific protein in the body, but sometimes even a specific part of a protein.
Making these therapies work, though, requires special antibodies: monoclonal antibodies. These are very much in the news recently, not only as a possible treatment for COVID-19 but also to treat everything from rheumatoid arthritis to the very worst forms of cancer. But what exactly are monoclonal antibodies, how are they made, and how do they work?
Continue reading “Monoclonal Antibodies: The Guided Missiles Of Medicine”
Maritime shipping is big business, with gigantic container ships responsible for moving the vast majority of the world’s goods from point A to points B, C and D. Of course, there’s a significant environmental impact from all this activity, something ill befitting the cleaner, cooler world we hope the future will be. Thus, alternatives to the fossil fuel burning ships of old must be found. To that end, Norwegian company Yara International has developed a zero-emission ship by the name of Yara Birkeland, which aims to show the way forward into a world of electric, autonomous sea transport.
Continue reading “The World’s First Autonomous Electric Cargo Ship Is Due To Set Sail”
The world faces many terrestrial crises right now, so it’s easy to forget that giant space rocks may one day threaten the very existence of entire civilizations. Yes, the threat of asteroid strikes is a remote one, but nevertheless something humanity may have to face one day, and one day soon.
NASA takes the issue seriously, and has staffed its Planetary Defence Coordination Office since 2016. In service to these efforts, it’s also developing a mission to research how dangerous androids may be deflected. The Double Asteroid Redirection Test, or DART, is set to launch within the next year. Continue reading “NASA Are Squaring Up Against The Asteroid Threat”
Death and passwords: two things we just can’t avoid. With so much of our lives tied up in cloud services nowadays, there’s good reason to worry about what happens to these accounts if we drop dead tomorrow. For many of us, important documents, photos, financial information and other data will be locked behind a login prompt. Your payment methods will also expire shortly after you have, which could lead to data loss if not handled promptly. The most obvious way to address this is to give a trusted party access in case of emergency.
A Bad Solution
Let’s start with the simplest solution: using the same password everywhere. Great, all you need to do is put this on a Post-it note, stuff it in an envelope, and let someone know where to find it. Unfortunately, using a single password for many services is a terrible idea. Password breaches happen, and if you’re using a single password across the internet, they can be disastrous.
Password breaches are usually the result of an attacker finding a vulnerability that allows reading password data from an application’s database. Odds are high that your information has been leaked in one of these breaches. You can check if your email is on a list of known breaches with Have I Been Pwned. Don’t feel bad if you’ve been pwned, my email shows up on six different breaches, and this service only indexes publicly known breaches!
Depending on the competency of the company that was breached, your password may have been stolen in a few different formats. In the worst case, the passwords were stored as-is (i.e., cleartext), and the breach contains your actual password. Nowadays, storing passwords in cleartext is never considered acceptable. A hash of the password is stored instead. Attackers need to use a tool like hashcat to try to recover the passwords via brute force hash cracking. This is slow for complex passwords, but is always getting faster as GPUs improve.
So we really need to use different passwords everywhere, or our Tumblr account from 2013 could give access to our bank account. Given the large number of services we use and our inability to remember passwords, we’re going to need to use a password manager. Continue reading “The Postmortem Password Problem”
Have you heard about this One? At least three United States senators have, and they want to know what Amazon plans to do with all the biometric data collected by the Amazon One program. It’s their new contactless payment method that uses your unique palm print instead of cards or phones to make purchases, gain access to venues of work and play, and enter or pay in whatever other spaces Amazon can invade down the line. The idea is that one day, we’ll all be able to leave our homes without any form of money or ID of any kind, because we’ll all be stored away in Bezos’ big biometric file cabinet.
We tossed this one around in the writer’s room back when the Amazon One concept was nothing but a pile of buzzwords and a render or two, but these kiosks are now active in 50+ Whole Foods and Amazon 4-Star locations across the US. Here’s the deal: you can only sign up at a participating store that has a kiosk, because they have to scan your palms into the system. We were worried that the signup kiosk could easily take fingerprint scans at the same time, but according to the gifs in Morning Brew’s review, it just uses another of their point-of-sale palm scanners along with a touch screen and a card reader. But you still have to hover your entire hand over it, so who’s to say that the scan ends where the fingers begin?
Continue reading “Ask Hackaday: What Is Amazon Thinking By Entering The Palm-Reading Business?”
Computers in working order and with correct software don’t make mistakes. People, however, make plenty of mistakes (including writing bad software or breaking computers). In quality circles, there’s a Japanese term, poka yoke, which roughly means ‘error avoidance’. The idea is to avoid errors by making them too obvious for them to occur. For example, consider a SIM card in your phone. The little diagonal corner means it only goes in one way. If you put it in the wrong way, it is obviously wrong.
To be successful at poka yoke, you have to be able to imagine what a user might do wrong and then come up with some way to make it obvious that it is wrong. There are examples of this all around us and we sometimes don’t even know it. For example, what do your credit card number, your car’s VIN code, and a UPC code on a can of beans have in common?
Continue reading “Tech In Plain Sight: Check Digits And Human Error”