Friday, November 3, 2017
Monday, October 30, 2017
I have set up a new marilynwolf.us for my books. I can also use it to host this blog but the formatting system doesn't make it easy to feature both the books and the blog on the homepage. I have an experimental setup on marilynwolf.us. Please go there, check it out, and let me know which you prefer. You can email me at firstname.lastname@example.org. Thanks!
Sunday, October 29, 2017
I am thinking about using one of these radios as the starting point for a hybrid digital/analog radio. By tapping signals the signals in the radio and connecting them to analog/digital converters, I can ship them to a computer or FPGA for digital processing. Many software-defined radio rigs run at relatively low sample rates and so do most of their digital processing in the baseband. A fancy data acquisition card could let me move the interface earlier in the radio, perhaps all the way to the first stage of amplification after the antenna. This sort of project would be a good way for me to get my hands dirty with software-defined radio; it would also be fun to compare the signal characteristics of the analog and digital versions. All of these plans, of course, depend on time permitting from other projects and duties. We shall see how things play out.
Monday, October 23, 2017
Gizmodo reports here on a proposal by the FAA to ban devices with lithium-ion batteries in checked-in luggage. They would like to see such a ban to be worldwide. Their concern is based upon a test in which a lithium-ion battery caught fire next to a bottle of dry shampoo; the resulting fire was too fierce to be contained by aircraft fire suppression systems.
Monday, October 16, 2017
I have set up a Twitter account, @Apollo50Wolf, for the commemoration of the 50th anniversaries of the events of the Apollo program. Watch this feed for tweets on the anniversaries of Apollo events. The feed will start with Apollo 4, an unmanned test launch, on November 9.
Anandtech reports here on vulnerabilities in the WiFi encryption protocol. These flaws are in the WPA2 standard itself, not merely in some implementation of that standard. The proof-of-concept attack, developed at KU Leuven, is known as KRACK.