Red Bull Flugtag Meeting Minutes 04-21

buildscc | 14 Jul 2010 | | meeting-minutes


Glider Millenium Falcon Dirigible Bicycle

Design Considerations:

Balance Design vs. Distance

Device + Payload <= 450 lbs

No “stored energy”

Forms to fill out:

They exist in print somewhere. Mainly require normal information plus a sketch of our design. Due May 18th.

Older · View Archive (146)

Hacker Movie Festival

We should throw a hacker movie festival on campus. This would require cooking copious amounts of popcorn and projecting classic hacker movies onto the walls of a BU machine room or otherwise questionably fitting cyberpunk-y location. Or just securing room 330 in CAS, depending on how many collective strings we can pull.

Possible movies:

  • WarGames
  • TRON
  • The Manhattan Project
  • Sneakers
  • The Pirates of Silicon Valley
  • Hackers
  • Takedown
  • Antitrust
  • Johnny Mnemonic
  • 23 (1998)
  • RevolutionOS

What say ye, oh undulating masses of techies? Comment below.

Also, thanks to Prof. Kinraide for this idea :D

Possible additional Movies or snippits:

  • The Conversation (1974) - You can never be too paranoid ;-)
  • Ghost in the Shell (1995) - or just the scene with the reality loop.
  • Ghost in the Shell 2: Innocence (2004) - or just the uber cool scene where the firewall (complete with robot “watchdogs”) is breached on the robot production ship.
  • Possible TV episodes or snippits: La Femme Nikita: #215 “Fuzzy Logic” - [Birkoff] (TENSE VOICE) Sir, I’m sorry, we’re in the middle of a multiple anomaly. There is also some episode where birkoff actually feeds actual *nix commands (a ps pipe and then a kill I think) to an operative in the field :-)
  • La Femme Nikita: #103 “Simone” Ah, here it is… BIRKOFF: Sit down at the main keyboard. (Nikita scoots over to the keyboard, staying low) Type exactly what I tell you. PS dash E. PS dash… All right. That’s got to be it. It’s the only process I don’t recognize. All right, type this in; Kill, space, minus-nine, space, 313. Okay? You got that? That should do it. […] Tense seconds shoot past as automatic gunfire rattles all around.
  • Dr. Who - all of it. IMHO Dr. Who is the media character I’ve seen that best exemplifies the hacker (sometimes called “ethical hacker” since media have conflated “hacker” to mean “cracker”).


Rear-Projection Touchscreen: Code and Design

BUILDS and Furst Labs are working together to perfect a multi-touch screen.

The physical screen must be engineered for optimal finger blob-tracking.

Fingers are individually tracked on the surface using modified web cameras.

The camera input is fed into custom tracker program designed by Furst Labs which implements the latest standard of Open Computer Vision.

The tracker program then sends the individual tracked data points over a modified Tangible User Interface Objects protocol tunneled through the Open Sound Control protocol to another custom Furst Labs built program for gesture tracking and recognition.

Once gestures have been recognised this program responds appropriately by either opening other applications or interacting with the user’s graphical interface.


John-Nicholas Furst (Project Leader)