Language Selection

English French German Italian Portuguese Spanish

Researcher publishes specs for real Linux-powered Star Trek tricorder

Filed under
Linux
Gadgets

The Star Trek tricorder has become a reality, thanks to the hobby project of a cognitive science researcher. Dr. Peter Jansen has developed a handheld mobile computing device that has a number of sophisticated embedded sensors. The device is modeled after the distinctive design of the 24th-century tricorder.

He began working on the project in 2007 and aims to make it easy for others to reproduce his designs. He has made complete schematics for two of his four models available under the terms of the TAPR non-commercial hardware license. The underlying source code of the device's software environment is available under the GPL. In a blog post about the project, Jansen explained that he hopes his project will encourage scientific curiosity and help people better understand the world.

rest here




More in Tux Machines

OSS Leftovers

  • Using Open Source Software in a SecDevOps Environment
    On 21 June 2018 the Open Source Software3 Institute is hosting a discussion that should be of high interest to enterprise technologists in the DC/Northern Virginia, Maryland area. From their invite: Come hear from our panelists about how the worlds of Open Source Software and the Secure Development / Operations (SecDevOps) intersect and strengthen one another. SecDevOps seeks to embed security in the development process as deeply as DevOps has done with operations, and Open Source Software is a major factor in Security, Development, and Operations. Tickets are free, but you need to register soon because seating is limited.
  • TenFourFox FPR8b1 available
    TenFourFox Feature Parity Release 8 beta 1 is now available (downloads, release notes, hashes). There is much less in this release than I wanted because of a family member in the hospital and several technical roadblocks. Of note, I've officially abandoned CSS grid again after an extensive testing period due to the fact that we would need substantial work to get a functional implementation, and a partially functional implementation is worse than none at all (in the latter case, we simply gracefully degrade into block-level divs). I also was not able to finish the HTML input date picker implementation, though I've managed to still get a fair amount completed of it, and I'll keep working on that for FPR9. The good news is, once the date picker is done, the time picker will use nearly exactly the same internal plumbing and can just be patterned off it in the same way. Unlike Firefox's implementation, as I've previously mentioned our version uses native OS X controls instead of XUL, which also makes it faster. That said, it is a ghastly hack on the Cocoa widget side and required some tricky programming on 10.4 which will be the subject of a later blog post.
  • GNU dbm 1.15
    GDBM tries to detect inconsistencies in input database files as early as possible. When an inconcistency is detected, a helpful diagnostics is returned and the database is marked as needing recovery. From this moment on, any GDBM function trying to access the database will immediately return error code (instead of eventually segfaulting as previous versions did). In order to reconstruct the database and return it to healthy state, the gdbm_recover function should be used.

Server: GNU/Linux Dominance in Supercomputers, Windows Dominance in Downtime

  • Five Supercomputers That Aren't Supercomputers
    A supercomputer, of course, isn't really a "computer." It's not one giant processor sitting atop an even larger motherboard. Instead, it's a network of thousands of computers tied together to form a single whole, dedicated to a singular set of tasks. They tend to be really fast, but according to the folks at the International Supercomputing Conference, speed is not a prerequisite for being a supercomputer. But speed does help them process tons of data quickly to help solve some of the world's most pressing problems. Summit, for example, is already booked for things such as cancer research; energy research, to model a fusion reactor and its magnetically confined plasma tohasten commercial development of fusion energy; and medical research using AI, centering around identifying patterns in the function and evolution of human proteins and cellular systems to increase understanding of Alzheimer’s, heart disease, or addiction, and to inform the drug discovery process.
  • Office 365 is suffering widespread borkage across Blighty
     

    Some users are complaining that O365 is "completely unusable" with others are reporting a noticeable slowdown, whinging that it's taking 30 minutes to send and receive emails.  

Google: VR180, Android and the Asus Chromebook Flip C101

Security Leftovers

  • Hackers May Have Already Defeated Apple’s USB Restricted Mode For iPhone
    Recently, the iPhone-maker announced a security feature to prevent unauthorized cracking of iPhones. When the device isn’t unlocked for an hour, the Lightning port can be used for nothing but charging. The feature is a part of the iOS 12 update, which is expected to launch later this month.
  • Cops Are Confident iPhone Hackers Have Found a Workaround to Apple’s New Security Feature
    Apple confirmed to The New York Times Wednesday it was going to introduce a new security feature, first reported by Motherboard. USB Restricted Mode, as the new feature is called, essentially turns the iPhone’s lightning cable port into a charge-only interface if someone hasn’t unlocked the device with its passcode within the last hour, meaning phone forensic tools shouldn’t be able to unlock phones. Naturally, this feature has sent waves throughout the mobile phone forensics and law enforcement communities, as accessing iPhones may now be substantially harder, with investigators having to rush a seized phone to an unlocking device as quickly as possible. That includes GrayKey, a relatively new and increasingly popular iPhone cracking tool. But forensics experts suggest that Grayshift, the company behind the tech, is not giving up yet.
  • How Secure Are Wi-Fi Security Cameras?
  • Trump-Kim Meeting Was a Magnet For Russian Cyberattacks