Why Ada Is The Language You Want To Be Programming Your Systems With

The Ada programming language was born in the mid-1970s, when the US Department of Defense (DoD) and the UK’s Ministry Of Defence sought to replace the hundreds of specialized programming languages used for the embedded computer systems that increasingly made up essential parts of military projects.  Instead, Ada was designed …read more

Continue reading Why Ada Is The Language You Want To Be Programming Your Systems With

A Funny Thing Happened on Ada Lovelace Day…

Today is Ada Lovelace Day, a day to celebrate and encourage women in the fields of science and technology. The day is named after “Augusta Ada King-Noel, Countess of Lovelace, born Byron”, or Lady Ada Lovelace for short. You can read up more on her life and contribution to computer science at Wikipedia, for instance.

But it’s not really fair to half of the world’s population to dedicate just one day to observing the contributions of female scientists and then lavish all the laurels solely on Lovelace. So last year, the day after Ada Lovelace day, Brian Benchoff sent an …read more

Continue reading A Funny Thing Happened on Ada Lovelace Day…

Happy Ada Lovelace Day!

Today is Ada Lovelace Day, a day to celebrate and encourage women in the fields of science and technology. The day is named after Augusta Ada King-Noel, Countess of Lovelace, born Byron. (You can see why we just call her Ada Lovelace.) She was a brilliant mathematician, and the writer of what’s probably the first real computer program — it computed the Bernoulli series. At least according Charles Babbage, in correspondence to Michael Faraday, she was an “enchanted math fairy”. Not only a proto-coder, she wrote almost all of the existing documentation about Babbage’s computation engine. She’s a stellar example …read more

Continue reading Happy Ada Lovelace Day!

Three of our Favorite Hackers

It’s one thing to pull off a hack, it’s another entirely to explain it so that everyone can understand. [Micah Elizabeth Scott] took a really complicated concept (power glitching attacks) and boiled a successful reverse engineering process into one incredible video. We know, watching 30 minutes of video these days is a huge ask, just watch it and thank us later.

She explains the process of dumping firmware from a Wacom tablet by hacking what the USB descriptors share. This involves altering the power rail smoothing circuit, building her own clock control board to work with the target hardware and …read more

Continue reading Three of our Favorite Hackers