Author Archive

DIY optical power meter with SFP module and Arduino idea

Fifer optics power meter is an important tool for debugging fiber optics networks. I have earlier tested a cheap commercial fiber optic power meter a at Fiber optics power meter posting. Hardware hackers ares famous for building their own test equipment. The basic operation of optical power meter is quite simple: take a suitable detector,

Cassini Dives Into Saturn Today: Here’s When and How to Watch

https://www.space.com/38160-when-how-watch-cassini-saturn-dive.html Today (Sept. 15), NASA’s Cassini spacecraftwill dive into Saturn’s atmosphere and disintegrate. You can watch the action live right here on Space.com The $3.26 billion Cassini-Huygens mission — a joint effort of NASA, the European Space Agency and the Italian Space Agency — launched toward Saturn in 1997 and arrived at the system in 2004.  “We’ll be

This Giant Infographic Compares Bitcoin, Ethereum, and Other Major Cryptocurrencies

http://www.visualcapitalist.com/comparing-bitcoin-ethereum-cryptos/ Unless you’ve been hiding under a rock, you’re probably aware that we’re in the middle of a cryptocurrency explosion. In one year, the value of all currencies increased a staggering 1,466% – and newer coins like Ethereum have even joined Bitcoin in gaining some mainstream acceptance. A major problem still exists for the layman: it’s

Bluetooth Vulnerability Affects All Major OS

https://hackaday.com/2017/09/14/bluetooth-vulnerability-affects-all-major-os/ Turn off your Bluetooth! I checked that mine was turned off after reading this: Security researchers from Armis Labs recently published a whitepaper unveiling eight critical 0-day Bluetooth-related vulnerabilities, affecting Linux, Windows, Android and iOS operating systems. These vulnerabilities alone or combined can lead to privileged code execution on a target device. The only requirement is:

Use Raspberry Pi for radio receiving and re-transmitting

As the popularity of IoT devices grow, it’s only natural that security holes in some of the systems will become apparent. IoT Devices May Be Susceptible to Replay Attacks with a Raspberry Pi and RTL-SDR Dongle andAttack Some Wireless Devices With A Raspberry Pi And An RTL-SDR articles tell that an easy way to make a

Five technologies for building 5G | EDN

http://www.edn.com/electronics-blogs/5g-waves/4458807/Five-technologies-for-building-5G?utm_content=buffer90279&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer 5G is widely considered a mobile technology that won’t be available until perhaps 2020 or 2021, and even then, not widely.  Cisco predicts that by 2021, a 5G connection will generate 4.7 times more traffic than the average 4G connection. 5G will be a quantum leap from today’s LTE-Advanced networks. 

Apple announces the iPhone 8 and iPhone 8 Plus | TechCrunch

https://techcrunch.com/2017/09/12/apple-announces-the-iphone-8-and-iphone-8-plus/?ncid=rss&utm_source=tcfbpage&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=FaceBook&sr_share=facebook Apple just unveiled the iPhone 8 and iPhone 8 Plus at its press event.