For those of a certain vintage, no better day at school could be had than the days when the teacher decided to take it easy and put on a film. The familiar green-blue Bell+Howell 16mm projector in the center of the classroom, the dimmed lights, the chance to spend an hour doing something other than the normal drudgery — it all contributed to a palpable excitement, no matter what the content on that reel of film.
But the best days of all (at least for me) were when one of the Bell Laboratory Science Series films was queued up. The films may look a bit schlocky to the 21st-century eye, but they were groundbreaking at the time. Produced as TV specials to be aired during the “family hour,” each film is a combination of live-action for the grown-ups and animation for the kiddies that covers a specific scientific topic ranging from solar physics with the series premiere Our Mr. Sun to human psychology in Gateways to the Mind. The series even took a stab at explaining genetics with Thread of Life in 1960, an ambitious effort given that Watson and Crick had only published their model of DNA in 1953 and were still two years shy of their Nobel Prize.
Produced between 1956 and 1964, the series enlisted some really big Hollywood names. Frank Capra, director of Christmas staple It’s a Wonderful Life, helmed the first four films. The series featured exposition by “Dr. Research,” played by Dr. Frank Baxter, an English professor. His sidekick was usually referred to as “Mr. Fiction Writer” and first played by Eddie Albert of Green Acres fame. A list of voice actors and animators for the series reads like a who’s who of the golden age of animation: Daws Butler, Hans Conried, Sterling Halloway, Chuck Jones, Maurice Noble, Bob McKimson, Friz Freleng, and queen and king themselves, June Foray and Mel Blanc. Later films were produced by Warner Brothers and Walt Disney Studios, with Disney starring in the final film. The combined star power really helped propel the films and help Bell Labs deliver their message.
Continue reading “Retrotechtacular: The Bell Laboratory Science Series”
You’ve heard of Bell Labs, but likely you can’t go far beyond naming the most well-known of discoveries from the Lab: the invention of the transistor. It’s a remarkable accomplishment of technological research, the electronic switch on which all of our modern digital society has been built. But the Bell Labs story goes so far beyond that singular discovery. In fact, the development of the transistor is a microcosm of the Labs themselves.
The pursuit of pure science laid the foundation for great discovery. Yes, the transistor was conceived, prototyped, proven, and then reliably manufactured at the Labs. But the framework that made this possible was the material researchers and prototyping ninjas who bridged the gap between the theory and the physical. The technology was built on what is now a common material; semiconducting substances which would not have been possible without the Labs refinement of the process for developing perfectly pure substances reliably doped to produce the n-type and p-type substances that made diode and transistor possible.
Continue reading “Books You Should Read: The Idea Factory”
A bewildering amount of engineering was thrown at the various challenges presented to the United States by the end of World War II and the beginning of the Cold War. From the Interstate Highway System to the population shift from cities to suburbs, infrastructure of all types was being constructed at a rapid pace, fueled by reasonable assessments of extant and future threats seasoned with a dash of paranoia, and funded by bulging federal coffers due to post-war prosperity and booming populations. No project seemed too big, and each pushed the bleeding edge of technology at the time.
Some of these critical infrastructure projects have gone the way of the dodo, supplanted by newer technologies that rendered them obsolete. Relics of these projects still dot the American landscape today, and are easy to find if you know where to look. One that always fascinated me was the network of microwave radio relay stations that once stitched the country together. From mountaintop to mountaintop, they stood silent and largely unattended, but they once buzzed with the business of a nation. Here’s how they came to be, and how they eventually made themselves relics.
Continue reading “Horns Across America: The AT&T Long Lines Network”
Back in May, Amazon announced the Echo Show, its new version of Alexa with a 7 inch touchscreen. The Echo Show is an interesting device, but will the great unwashed masses pony up $229 to buy the show? That’s $50 more than the original Echo, or $180 more than the Echo Dot. With 5.2 million units sold in 2016, Echo has been a resounding success. This has been in part due to Amazon’s open approach to the API. Anyone can build an Alexa compatible device using a Raspberry Pi. Google has (finally) followed suit with their Home device.
It’s not just the hardware that is accessible. Skills Kit, the programmer interface for extending Echo’s functionality, is also open. At CES this year, Alexa was the belle of the ball. Third party devices are being introduced from all corners, all of them connecting to Amazon’s cloud and responding to the “Alexa” keyword.
The Echo Show takes the family in a new direction. Adding a touch screen gives the user a window on the the world not available with voice interactions. Echo Show also includes a camera, which opens up a whole new set of privacy and security questions. Amazon touts it as a device for viewing security cameras, watching YouTube videos, and making video calls. This puts Echo Show dangerously close to the internet appliance category, essentially a barren wasteland littered with the corpses of previous devices. Does anyone remember when Palm tried this with the 3Com Ergo Audrey? How about the i-Opener? Will Alexa persevere and succeed where others have failed? A lot of it will depend on the third party developers, and how Amazon treats them.
Continue reading “Amazon Echo Show”
It was a dark and stormy afternoon, the kind you get on the east side of the country. I was drinking a coffee, sitting in a camping chair in front of my door, and watching like a hawk for the treacherous cable man to show up. This day there would be no escape. There would be no gently rapping the door with a supple sheepskin leather glove before scurrying away for another union mandated coffee break. I was waiting, I was kind of grumpy, and by God today would be the day. Today would be the day that after hours on hold, after three missed appointments, after they lost my records twice; I would get an answer on whether or not they could actually service internet to my apartment. If I was lucky, and the answer was yes, then approximately two to three thousand years later they would run a cable from the telephone pole to my house and I could stop commandeering WiFi from the pizza shop across from me.
It’s important to note that I was in the middle of the city. I wasn’t out in the boonies. Every house on the block but mine had cable. While this is dumb, it begins to make more sense when you dive into the history. Louisville, Kentucky is a strange place. It used to be the gateway to the west. Ships would crawl up its river until they reached the falls. Then porters would charge an exorbitant fee to carry all those goods down to the bottom of the falls where they would be loaded on a ship and be sent ever westward. Resulting in every rich merchant, captain, and manufacturer in the region having a nice house there. Ever wonder why the Derby is in Louisville and the Queen comes to visit sometimes? It probably has something to do with it having the highest concentration of Victorian buildings and mansions outside of New York City.
Continue reading “Victorians and Fiber, Louisville’s Quest For Fast Internet”
It is hard to remember, but there was a time when you couldn’t hook much to a telephone line except a telephone. Although landlines are slowly falling out of favor, you can still get corded and wireless phones, answering machines, and even dial up modems. Alarm systems sometimes connect to the phone system along with medical monitoring devices and a host of other accessories.
All of that’s possible because of a Texan named Tom Carter. Tom Carter was the David that stood up to one of the biggest Goliath’s of his day: the phone company. The phone company had a legal monopoly on providing phone service. The reasoning was that it didn’t make sense to have multiple competing companies trying to run wires to every house and business in the country. Makes sense, right?
Continue reading “Retrotechtacular: Tom Carter Revolutionized your Phone”
[HeadlessZeke] was excited to try out his new AT&T wireless cable box, but was quickly dismayed by the required wireless access point that came bundled with it. Apparently in order to use the cable box, you also need to have this access point enabled. Not one to blindly put unknown devices on his network, [HeadlessZeke] did some investigating.
The wireless access point was an Arris VAP2500. At first glance, things seemed pretty good. It used WPA2 encryption with a long and seemingly random key. Some more digging revealed a host of security problems, however.
It didn’t take long for [HeadlessZeke] to find the web administration portal. Of course, it required authentication and he didn’t know the credentials. [HeadlessZeke] tried connecting to as many pages as he could, but they all required user authentication. All but one. There existed a plain text file in the root of the web server called “admin.conf”. It contained a list of usernames and hashed passwords. That was strike one for this device.
[HeadlessZeke] could have attempted to crack the passwords but he decided to go further down this rabbit hole instead. He pulled the source code out of the firmware and looked at the authentication mechanism. The system checks the username and password and then sets a cookie to let the system know the user is authenticated. It sounds fine, but upon further inspection it turned out that the data in the cookie was simply an MD5 hash of the username. This may not sound bad, but it means that all you have to do to authenticate is manually create your own cookie with the MD5 hash of any user you want to use. The system will see that cookie and assume you’ve authenticated. You don’t even have to have the password! Strike two.
Now that [HeadlessZeke] was logged into the administration site, he was able to gain access to more functions. One page actually allows the user to select a command from a drop down box and then apply a text argument to go with that command. The command is then run in the device’s shell. It turned out the text arguments were not sanitized at all. This meant that [HeadlessZeke] could append extra commands to the initial command and run any shell command he wanted. That’s strike three. Three strikes and you’re out!
[HeadlessZeke] reported these vulnerabilities to Arris and they have now been patched in the latest firmware version. Something tells us there are likely many more vulnerabilities in this device, though.