Skip to main content

How It Works: Star Wars: The Clone Wars

“Bold yellow letters appear over a starfield; “Star Wars: The Clone Wars.” 
  • The English Audio description in front of every episode.

This is a lot more theoretical than I’m used to. I had to watch several episodes to get enough material I was happy with. 

(Oh, woe is me, I had to watch a great television program!)

Let’s get started.

"Looks like you used a macro protocol to wipe them all simultaneously. Impressive."
  • S1,E18, “The Mystery of The Thousand Moons”

While this is something made up for the show, I did end up searching macro protocol and coming across this page before the Wookiepedia page.

“Protocol macros enable data to be sent to and received from external devices by simply executing the PMCR(260) instruction in the CPU Unit. “

That’s done via a serial port…but this is for industrial automation - Though many droids in the SWverse are seen as less refined and more industrial, let’s pretend that the serial port is through the long part of the face of a B1 Battle Droid.

Since  CPUs performance basic control, arithmetic, logical, and input/output (I/O),  it might be plausible in this world of space-magic. 

“I’m going to try and override the controls”
  • S2, E8, “Brain Invaders”

You hear that a lot in science fiction, don’t you?

Here, mind-controlled clones (clones created to serve the Republic and Jedi) have been mind-controlled and have taken over the bridge of a ship, blocking access to the cockpit.

Barriss (A Padawan; Jedi student) tries to use presumably the permissions she has on an account to remove the shields stopping her and Ahsoka (Another Jedi student) from progressing to the bridge.

The interface? About 7 large, square buttons and a screen. Maybe there’s biometric security authentication at some point.

By the way; This is one of my favorite episodes of the show.

“We’re unable to reach him.”
“It could be a solar storm. Or they’re rebooting their communications systems.”
  • The Clone Wars, 2008

Before it was a show, it was a movie. This was my first time watching it, and Palpatine has asked Mace Windu to contact Anakin and Obi-Wan, but the nearest space cruiser to the planet Christophsis can’t contact the pair, and so they send a small craft with a messenger.

Quite a lot of things can interfere with communications, even if they’re wireless; Microwave waves, frequency bleed, malicious interference by a third party, materials in buildings, and especially the gaping void of space.

I mean, I can only imagine that last bit.

Turns out the Jedi also couldn’t send messages from the planet. So my guess is malicious interference so far.

Does nobody in a galaxy far, far away know about bottom-up troubleshooting? Ping or Traceroute?

The messenger - Ahsoka’s first appearance! - Says that they could try relaying a message through the signal on the craft.

Let’s assume everyone above tried that already and that it would take a closer distance far from prying eyes to convey the messages, probably far overhead, near the atmosphere.

And it would appear that does it; The craft is near the cruiser in space, relaying a message from the three on the ground via hologram.

Malevolent forces were prepared to interfere with communication from a large ship, not a small one. Score one!

Check out some more information about GPS interference;

“It’s no use, their comlinks are on a different scramble set.”
  • S1, E5; “Rookies”

My first instinct was to say “Frequencies are different”.

That still might be a possibility, and I realized; Comlinks are sometimes used at extreme distances.

See the “Brain Invaders” entry above; Once Ahsoka actually had to get to a hologram projector to contact Anakin, who was on another ship. 

Sometimes she could use her comlink when one was on a planet and another on a ship. 

Other times, an actual hologram could appear, but that may simply be functionality not used often.

So this may simply be a case of playing fast and loose with space technology.

Or; Frequencies are different. 

“……The vault will go into immediate shutdown. No one will get in or out. This will give you very little time before the emergency generator cycles and takes over.”
“You’ll use this [a very small device, presumably to copy or hold files] to find and download the exact files from the main frame.” This is one of the most secure banks in the galaxy, but it was designed to keep people out."

  • Season 6, The Lost Missions - An Old Friend

First, this is a very secure bank. Make sure no outsider USB ports or drives can attach to your planets-wide banking infrastructure. In a world where you can fly spaceships, assume someone getting around your security system to steal files is exactly what they want to do and plan accordingly.

Bonus: I watch these with the audio captions on Netflix, and sometimes the commentator gets really excited. I had a good laugh at “They head STRAIGHT FOR A CLIFF…THEY FLY OVER THE EDGE….and land on the shuttle.”


Popular posts from this blog

What Do You Need? [AKA; List of Offered Services] (2020)

I am a remote consultant. I enjoy having the flexibility to take on temporary projects from time to time! I start at part-time, temp work for now. If we like each other, we can renegotiate. If anything sounds weird, out there, or unusual - Feel free to e-mail me. Doesn't have to be tech-related. I just have to find it interesting and flexible.

What I do for you:
Simplified writing about tech. [Example Job Description, 2, 3] You want to pay me to write more of *waves hand* this blog? I am game.
Technical Analyst [Example Job Description]
UX Auditing [See Here]eCommerce merchandising [See Here]Entry-Level Web Support [Example Job Description]
Email Marketing Specialist [Example Job Description]  ProofreadingText-based support [Example Description]. 
The following is what I was trained in. Roles will be considered if I feel it's the best fir for you. Still part-time, contract, and/or temporary
Cisco routing and switching technician

Find me on Jumpstart and CareerVill…

Azure Networking Options - Core Cloud Services

I have done a lot of AWS things on here. Time to give Azure some attention. After all, since employers don't think Cisco or COMPTIA certifications are important, maybe Microsoft ones are?

First, let's really think about why these are the two biggest cloud services providers in the world:

They've been doing internet things for a long time.Amazon launched in 1995, a virtual bookstore.
Microsoft, well, you know. 

They've lived, breathed, and frankly, created, infrastructure that we use today, that they're selling to us today. Of course the Store of Everything and the Company of Everything would encourage us to put everything in their hands.

Also: Azure has a lot less silly names for modules. Important. I appreciate straightforwardness.

I said 'a lot less', not '100% sensible names'

Microsoft has a clear set of Azure Fundamentals that anyone can interact with. Let's talk about networking basics, basically to say, again, "Hi, employers, I have an …

Search and Infiltrate: How to Deeply Investigate a Company's People [6/4/2020]

Latest Update - 6/4/2020

This is a bit of an impromptu post after reading this article.

I had a small thread about this on Twitter, a blog post is a lot better to get the information out in a clear way.

Have you ever used, came across a group of people who match Your Dream Company, Dream Location, and do your Dream Job on LinkedIn...and they're not active?

What was the POINT, am I right?  A place for professionals to network, but they're not active ...because they have a job to do! You want to be like that!

Unfortunately, in this day and age, unless you have a 'relationship' with someone, they're not going to help you.


(Note: 'relationship' is different than relationship).

I'm not here to talk bad about recruiters - They have a difficult job, I know I couldn't do it! - And even they want a relationship before they place you somewhere, competency be damned.

What do you do instead?


(Note; I'm using my own URL for this and …