Category: Original Art

A lot of programming languages these days feature lambda functions, or what I would be just as happy to call anonymous functions. Some people make a big deal out of these but the core idea is very simple. Sometimes you need a little snippet of code that you only need in one place — most […]
The Ada programming language was born in the mid-1970s, when the US Department of Defense (DoD) and the UK’s Ministry Of Defence sought to replace the hundreds of specialized programming languages used for the embedded computer systems that increasingly made up essential parts of military projects.  Instead, Ada was designed to be be a single […]
Chances are pretty good that at some time in your life, you’ve crossed paths with a norovirus. And chances are that you remember the encounter vividly, or at least its aftermath. I recall a run-in with the bug one Christmas, when my parents brought over more than just toys for the kids when they visited. […]
When the Raspberry Pi 4 was released, many looked at the dual micro HDMI ports with disdain. Why would an SBC like the Raspberry Pi need two HDMI ports? The answer was that the Pi 4 is finally fast enough to work as a desktop replacement, and the killer feature (for many of us) for […]
Today marks exactly 15 years since Hackaday began featuring one Hack a Day, and we’ve haven’t missed a day since. Over 5,477 days we’ve published 34,057 articles, and the Hackaday community has logged 903,114 comments. It’s an amazing body of work from our writers and editors, a humbling level of involvement from our readers, and […]
Many of us don’t think too much about radiation levels in our area, until a nuclear disaster hits and questions are raised. Radiation monitoring is an important undertaking, both from a public health perspective and as a way to monitor things like weapon development. So why is it done, how is it done, and what […]
I’m often asked to design customer and employee tracking systems. There are quite a few ways to do it, and it’s an interesting intersection of engineering and ethics – what information is reasonable to collect in different contexts, anonymizing and securely storing it, and at a fundamental level whether the entire system should exist at […]
For anyone that’s ever been broken down along a remote stretch of highway and desperately searched for a cell signal, knowing that a constellation of communications satellites is zipping by overhead is cold comfort indeed. One needs specialized gear to tap into the satphone network, few of us can justify the expense of satellite phone […]
Of the $11.7 million companies lose to cyber attacks each year, an estimated 90% begin with a phone call or a chat with support, showing that the human factor is clearly an important facet of security and that security training is seriously lacking in most companies. Between open-source intelligence (OSINT) — the data the leaks […]
On August 8th, an experimental nuclear device exploded at a military test facility in Nyonoksa, Russia. Thirty kilometers away, radiation levels in the city of Severodvinsk reportedly peaked at twenty times normal levels for the span of a few hours. Rumors began circulating about the severity of the event, and conflicting reports regarding forced evacuations […]