Hackaday Links Column Banner

Hackaday Links: December 11, 2022

“They paved paradise and put up a parking lot.” That might be stretching things a bit, especially when the “paradise” in question is in New Jersey, but there’s a move afoot to redevelop the site of the original “Big Bang Antenna” that has some people pretty upset. Known simply as “The Horn Antenna” since it was built by Bell Labs in 1959 atop a hill in Holmdel, New Jersey, the antenna was originally designed to study long-distance microwave communications. But in 1964, Bell Labs researchers Arno Penzias and Robert Wilson accidentally discovered the microwave remnants of the Big Bang, the cosmic background radiation, using the antenna, earning it a place in scientific history. So far, the only action taken by the township committee has been to authorize a study to look into whether the site should be redeveloped. But the fact that the site is one of the highest points in Monmouth County with sweeping views of Manhattan has some people wondering what’s really on tap for the site. A petition to save the antenna currently has about 3,400 signatures, so you might want to check that out — after all, you don’t know what you’ve got ’til it’s gone.

Continue reading “Hackaday Links: December 11, 2022”

Fossil Files: My .Emacs

Last week, I wrote about cargo culting in a much more general context, so this week I’m going to come clean. The file that had me thinking about the topic was the worst case you’ve probably ever seen: I have a .emacs file kicking around that I haven’t really understood since I copied it from someone else – probably Ben Scarlet whose name is enshrined therein – in the computer lab in 1994! Yes, my .emacs file is nearly 30, and I still don’t really understand it, not exactly.

Now in my defence, I switched up to vim as my main editor a few years ago, but this one file has seen duty on Pentiums running pre-1.0 versions of Linux, on IBM RS/6000 machines in the aforementioned computer lab, and on a series of laptops and desktops that I’ve owned over the years. It got me through undergrad, grad school, and a decade of work. It has served me well. And if I fired up emacs right now, it would still be here.

For those of you out there who don’t use emacs, the .emacs file is a configuration file. It says how to interpret different files based on their extensions, defines some special key combos, and perhaps most importantly, defines how code syntax highlighting works. It’s basically all of the idiosyncratic look-and-feel stuff in emacs, and it’s what makes my emacs mine. But I don’t understand it.

Why? Because it’s written in LISP, for GNU’s sake, and because it references all manner of cryptic internal variables that emacs uses under the hood. I’m absolutely not saying that I haven’t tweaked some of the colors around, or monkey-patched something in here or there, but the extent is always limited to whatever I can get away with, without having to really learn LISP.

This ancient fossil of a file is testament to two things. The emacs codebase has been stable enough that it still works after all this time, but also that emacs is so damn complicated and written in an obscure enough language that I have never put the time in to really grok it – the barriers are too high and the payoff for the effort too low. I have no doubt that I could figure it out for real, but I just haven’t.

So I just schlep this file around, from computer to computer, without understanding it and without particularly wanting to. Except now that I write this. Damnit.

Featured image: “A Dusty Old Book” by Marco Verch Professional.

Hackaday Podcast 196: Flexing Hard PCBs, Dangers Of White Filament, And The Jetsons’ Kitchen Computer

This week, Editor-in-Chief Elliot Williams and Managing Editor Tom Nardi start the Hackaday Podcast by talking about another podcast that’s talking about…Hackaday. Or more accurately, the recent Hackaday Supercon. After confirming the public’s adoration, conversation moves on to designing flexible PCBs with code, adding a rotary dial to your mechanical keyboard, and a simulator that lets you visualize an extinction-level event. We’ll wrap things up by playing the world’s smallest violin for mildly inconvenienced closed source software developers, and wonder how the world might have been different if the lady of the house had learned to read binary back in 1969.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Download the podcast and play it on your Palm Pilot!

Continue reading “Hackaday Podcast 196: Flexing Hard PCBs, Dangers Of White Filament, And The Jetsons’ Kitchen Computer”

This Week In Security: Rackspace Falls Over, Poison Ping, And The WordPress Race

In what’s being described as a Humpty-Dumpty incident, Rackspace customers have lost access to their hosted Exchange service, and by extension, lots of archived emails. The first official word of trouble came on December 2nd, and it quickly became clear that this was more than the typical intern-tripped-over-the-cable incident. Nearly a week later, Rackspace confirmed what observers were beginning to suspect, it was a ransomware attack. There’s not a lot of other answers yet, and the incident FAQ answers are all variations on a theme.

Our investigation into the incident is ongoing and will take time to complete. To ensure the integrity of the ongoing investigation, we do not have additional details to share at this time.

Knowing the security issues that have plagued Microsoft Exchange over the last couple of months, one has to wonder if Rackspace was breached as a result of the PowerShell problems. What’s staggering is that a week after the incident, Rackspace still has no timeline for service restoration.

Rackspace isn’t the only major ransomware attack this week, as a hospital in Versailles has partially shut down due to another ransomware attack. Operations were canceled, and work has to be done the old fashioned way, without the network to support.

Continue reading “This Week In Security: Rackspace Falls Over, Poison Ping, And The WordPress Race”

Build A Better Mousetrap… But It Better Be Better!

As creative problem solvers, we like to “think outside the box,” and we should strive for that. But what happens if your strange idea isn’t kept in check by cooler heads? There is a real danger — especially if you work alone — to falling so in love with your idea, that you lose sight of what it really means to be better.

Case in point. The self-parking car. Well, not the modern variant, which seems to work pretty well. But did you know that the self-parking car was invented in the 1930s and used an extra fifth wheel? Hard to imagine? See the video below. History tells us that the idea didn’t catch on.

Continue reading “Build A Better Mousetrap… But It Better Be Better!”

Love AI, But Don’t Love It Too Much

The up-and-coming Wonder of the World in software and  information circles , and particularly in those circles who talk about them, is AI. Give a magic machine a lot of stuff, ask it a question, and it will give you a meaningful and useful answer. It will create art, write books, compose music, and generally Change The World As We Know It. All this is genuinely impressive stuff, as anyone who has played with DALL-E will tell you. But it’s important to think about what the technology can and can’t do that’s new so as to not become caught up in the hype, and in doing that I’m immediately drawn to a previous career of mine. Continue reading “Love AI, But Don’t Love It Too Much”

All About USB-C: Introduction For Hackers

We’ve now had at least five years of USB-C ports in our devices. It’s a standard that many manufacturers and hackers can get behind. Initially, there was plenty of confusion about what we’d actually encounter out there, and manufacturer-induced aberrations have put some people off. However, USB-C is here to stay, and I’d like to show you how USB-C actually gets used out there, what you can expect out of it as a power user, and what you can get out of it as a hobbyist.

Modern devices have a set of common needs – they need a power input, or a power output, sometimes both, typically a USB2 connection, and often some higher-speed connectivity like a display output/input or USB 3. USB-C is an interface that aims to be able to take care of all of those. Everything aforementioned is optional, which is a blessing and a curse, but you can quickly learn to distinguish what to expect out of a device based on how it looks; if ever in doubt, I’d like to show you how to check.

Continue reading “All About USB-C: Introduction For Hackers”