Skip to main content

How It Works: Star Wars: The Clone Wars

“Bold yellow letters appear over a starfield; “Star Wars: The Clone Wars.” 
  • The English Audio description in front of every episode.

This is a lot more theoretical than I’m used to. I had to watch several episodes to get enough material I was happy with. 

(Oh, woe is me, I had to watch a great television program!)

Let’s get started.

"Looks like you used a macro protocol to wipe them all simultaneously. Impressive."
  • S1,E18, “The Mystery of The Thousand Moons”

While this is something made up for the show, I did end up searching macro protocol and coming across this page before the Wookiepedia page.

“Protocol macros enable data to be sent to and received from external devices by simply executing the PMCR(260) instruction in the CPU Unit. “

That’s done via a serial port…but this is for industrial automation - Though many droids in the SWverse are seen as less refined and more industrial, let’s pretend that the serial port is through the long part of the face of a B1 Battle Droid.

Since  CPUs performance basic control, arithmetic, logical, and input/output (I/O),  it might be plausible in this world of space-magic. 

“I’m going to try and override the controls”
  • S2, E8, “Brain Invaders”

You hear that a lot in science fiction, don’t you?

Here, mind-controlled clones (clones created to serve the Republic and Jedi) have been mind-controlled and have taken over the bridge of a ship, blocking access to the cockpit.

Barriss (A Padawan; Jedi student) tries to use presumably the permissions she has on an account to remove the shields stopping her and Ahsoka (Another Jedi student) from progressing to the bridge.

The interface? About 7 large, square buttons and a screen. Maybe there’s biometric security authentication at some point.

By the way; This is one of my favorite episodes of the show.

“We’re unable to reach him.”
“It could be a solar storm. Or they’re rebooting their communications systems.”
  • The Clone Wars, 2008

Before it was a show, it was a movie. This was my first time watching it, and Palpatine has asked Mace Windu to contact Anakin and Obi-Wan, but the nearest space cruiser to the planet Christophsis can’t contact the pair, and so they send a small craft with a messenger.

Quite a lot of things can interfere with communications, even if they’re wireless; Microwave waves, frequency bleed, malicious interference by a third party, materials in buildings, and especially the gaping void of space.

I mean, I can only imagine that last bit.

Turns out the Jedi also couldn’t send messages from the planet. So my guess is malicious interference so far.

Does nobody in a galaxy far, far away know about bottom-up troubleshooting? Ping or Traceroute?

The messenger - Ahsoka’s first appearance! - Says that they could try relaying a message through the signal on the craft.

Let’s assume everyone above tried that already and that it would take a closer distance far from prying eyes to convey the messages, probably far overhead, near the atmosphere.

And it would appear that does it; The craft is near the cruiser in space, relaying a message from the three on the ground via hologram.

Malevolent forces were prepared to interfere with communication from a large ship, not a small one. Score one!

Check out some more information about GPS interference;

“It’s no use, their comlinks are on a different scramble set.”
  • S1, E5; “Rookies”

My first instinct was to say “Frequencies are different”.

That still might be a possibility, and I realized; Comlinks are sometimes used at extreme distances.

See the “Brain Invaders” entry above; Once Ahsoka actually had to get to a hologram projector to contact Anakin, who was on another ship. 

Sometimes she could use her comlink when one was on a planet and another on a ship. 

Other times, an actual hologram could appear, but that may simply be functionality not used often.

So this may simply be a case of playing fast and loose with space technology.

Or; Frequencies are different. 

“……The vault will go into immediate shutdown. No one will get in or out. This will give you very little time before the emergency generator cycles and takes over.”
“You’ll use this [a very small device, presumably to copy or hold files] to find and download the exact files from the main frame.” This is one of the most secure banks in the galaxy, but it was designed to keep people out."

  • Season 6, The Lost Missions - An Old Friend

First, this is a very secure bank. Make sure no outsider USB ports or drives can attach to your planets-wide banking infrastructure. In a world where you can fly spaceships, assume someone getting around your security system to steal files is exactly what they want to do and plan accordingly.

Bonus: I watch these with the audio captions on Netflix, and sometimes the commentator gets really excited. I had a good laugh at “They head STRAIGHT FOR A CLIFF…THEY FLY OVER THE EDGE….and land on the shuttle.”


Popular posts from this blog

What Do You Need? [AKA; List of Offered Services / My Next Role] (2020)

I am a trusted outsourced remote consultant for your company.   I enjoy having the flexibility to take on temporary projects from time to time! I start at part-time, temp work for now. If we like each other, we can renegotiate. If anything sounds weird, out there, or unusual - Feel free to e-mail me .  3 Services Offered Writing :      You want to pay me to write more of *waves hand* this blog? I am game .     I write B2C e-mails going out to over 280 people weekly. [ Example Job Description ]        Auditing :        Something doesn't work on your page or in your app. I can find it, or you can lose business. [ Here ] [ Example Job Description ]   I really enjoy testing apps and webpage concepts! I have an iPhone and Android phones ready. Technical: Still as-needed, always remote, contract, or temporary. IT Operations Tech [ Example Job Description ]     Hardware and SaaS support.     Cisco routing and switching (Networking). CCNA, A+, Sec+, Azure certified WORKING ON: Junos

Portfolio of UX/Product Feedback [Vol. 1]

I browse websites and apps, while making note of things I find frustrating for end users. You have probably been linked here from a form or my resume. If you have any questions about what I'm looking for in a role, click here .   This post is not to shame, but to point out errors and hopefully make my talent for finding and documenting such mistakes clear to someone hiring. Contents: Instances where I offer constructive feedback on someone's website, logo, or app. Actions that were taken by the developers or artists.  I'm glad you want your webpages to be the best they can be with my help; If you need your sites audited, e-mail me . Latest Update -  November 20th, 2020.   Vol. 2 is here .

Contactless Tech’s Role in the New Guest Experience ft. Intelity and The George

 Contactless hospitality technology is growing. You want to get away, and you'll be damned if a little thing like a deadly virus will stop you! But you still don't want to touch things. Ew. During the chat between INTELITY CEO Robert Stevenson and THE GEORGE Director of Operations Kerrie Hunter, you’ll learn how the historic boutique hotel has adapted a mobile-first guest experience in the wake of COVID-19—and how they see contactless technology affecting the future of hospitality. I don't remember how I found INTELITY (probably hoping to score a position with them), but I liked them enough to stay on the e-mail lists.