The Hoard Potato: Robot Keyboard Zeerust

Jan 06, 2009 20:42

Today at work, I noticed a Star Wars action figure of a droid that came with a "data entry terminal" as an accessory. I don't remember which of the half-dozen movies this droid showed up in, but I do remember him clearly, standing in the background, tapping data into his terminal.

My first impression was that this was a classic example of ZeerustRead more... )

hoard potato, movie, science fiction, mad science, slandom, work

Leave a comment

Comments 6

araquan January 7 2009, 05:43:37 UTC
There was a lot of that in WALL-E too- robots pushing buttons and using keypads to access devices, input data, etc. I figured it was probably just easier to have a human-friendly interface and code the robots to deal with that than it was to maintain two parallel command interfaces and equip every robot and input device with a plug.

Then again, even in Star Wars, certain mechanoids (astromech units in particular) did have the ability to tap directly into a computer system- and apparently droids so equipped could tell the system to do almost any arbitrary task, or ask for any arbitrary information, and it would usually comply readily, even if it was a military computer. Clearly authentication wasn't a high priority amongst Imperial systems designers...

Reply

athelind January 7 2009, 07:51:49 UTC
Y'know, when you look at it, it's pretty obvious that R2-D2 was NOT a factory-standard R2 unit, but somebody's specialized intrusion-and-hacking droid.

As well as the secret leader of the Rebellion.

Reply

araquan January 7 2009, 15:18:36 UTC
Well, the R2 series were designed to be equipped with all manner of aftermarket upgrade modules, but even still, the hardware for direct communication was probably pretty standard on an astromech unit, given their duties. Of course, R2-D2's software was probably another matter entirely...

Reply


(The comment has been removed)

athelind January 7 2009, 17:06:37 UTC
...the robot can also use a 50's style gas pump, and pump gas.

I'd file that under "uniformity in user interfaces", all right!

Reply


twentythoughts January 7 2009, 09:03:27 UTC
Ah, but what if you infected the keyboard-tapping robot with a virus that made him tap in malicious commands? There's always a way!

Reply

athelind January 7 2009, 17:05:10 UTC
Note that I said "check", not "block". It's a chokepoint: it renders systems LESS vulnerable, not INvulnerable -- plus, it's easier to isolate infected systems if they're not physically connected.

Reply


Leave a comment

Up