Thoughts on technology, programming, systems & all the rest
Simulation of random mutation and non-random fitness-based cumulative string selection that Richard Dawkins discusses in 'The Blind Watchmaker'. An attempt to enhance the string mutation by adding dynamical complexity to the algorithm through control parameters and configurations.
Roomba's drive mechanism is perfect. In this post, I propose and explore a solution to implement such a 2-drive mechanism and extend it's controllability to an HMI via a single input (mouse or touch) from a web browser.
When a system is modeled to fit the constraints of mathematical framework, the associated tools becomes available at system's disposal. In 'the blind watchmaker', the author describes genetic evolutionary space as a n-dimensional space which resembles a Hilbert space.
If you don't have a secured server running to host and distribute your iOS application, you can host it on a server that has SSL and point to it from within your LAN's unsecured resource. Steps outlined.
Solar eclipse of 2017 and Annie Dillard's timeless essay
Dillard's 'The Total Eclipse' is probably the best description I have read about a Solar eclipse. The 2017 eclipse was a perfect opportunity to revisit it.
On kernel compilation failures
The night falls, the wall speaks,And the clock slows the ticks;
As the horses galloped down the memory lanes,Our voices flickered, and the wick flamed;
Darkness deepened, while I laughed with you,I didn’t knew, you were leaving me cold & blue;
Multifold sudo make clean make failed,Its a 128 and I have lost you yet again...
This is a continuation of my previous post 'A secured gateway to home-brewed HA solution', where I explored a methodology to make requests to microcontrollers running in an unsecured network from Internet, this posts discusses a solution to go other way around to deliver messages.
Exhilarated about my new Dobsonian Newtonian 8-inch telescope from Orion!
As a IOT enthusiast, there are many reasons to be worried about developing on an unsecured hardware connected to a network. In this post, I explore a workaround solution to make HTTP requests to all such unsecured nodes from an external network securely.
IOT hardware enthusiasts: Implementing a communications protocol from grounds up is an indulging fun in itself. Unless you run into noise. I found out the culprit of noise in mine was some ghost capacitance.
IOT enthusiasts: With a matrix key layout, it is possible to integrate NC*NR keys with the processor. In this post, I explore an algorithm to increase this count to (NC*NR)+NC/R
IOT enthusiasts: A reference for myself and anyone else trying to integrate a NT7108C based 128x64 graphics LCD in their embedded system.