Show #34 | GLAZED Conf and Kyle Ellicott

Interview with Kyle Ellicott, Founder of the Stained Glass Labs Incubator

A better picture of Kyle Ellicott

Kyle is an acomplished entreprenuer and jokingly says all he had to do to start his incubator was: “sign a piece of paper, call a few people and boom it happened!”.

Everybody in the SF Area check out the GLAZED conference happening on SEPTEMBER 28-30, 2013.

Glazed Conference Logo

Here are some of the interview questions:

  • Will wearable technology always need my smartphone?
  • Do you think we will get to the point of a Brain-Computer interface being mainstream?
  • Do you envision Bitcoin intersecting with wearable technology?
  • Battery life / energy harvesting
  • When you’re looking at startup teams, are you more concerned with the idea and story, or things they’ve already been able to execute?
  • Does outsourcing turn you off when looking at startups?
  • What is the most ridiculous “slide ware” you’ve ever seen?
  • If somebody wanted to pitch to you, what would be the best approach?
  • Did you go to college? if so did it prepare you for what you’re doing today?
  • Who is one person who really influenced, your “Hero”?

    Ron Conway, Warren Buffett, Jim Cramer, Kyle’s Father and Grandfather

    (Cramer’s book: Confessions of a Street Addict)
  • Call to action for anything you are excited about?

Contact info for kyle:
Stained Glass Labs Incubator

After the interview Merrick shares a registration for which we talked about in the last episode:

Sign up for codepub today!

Music: DC Breaks, Skism – Killer Ft. Dee Freer (Tantrum Desire Remix)

  Download Podcast #34 GLAZED Conf and Kyle Ellicot

Ben and Sam Catch up in this week’s BONUS episode which was recorded moments after the end of show 33.
We talk about Bitcoin and more. Also, Mike Shaw gives us epic feedback regarding Jump List parser code he’s posted.

  Download Podcast #33B WHY YOU NO SHIP?

Show #33 | Snowden’s Rogue Drone

Show #32 | Meteor.js Hackathon
Coverage of Meteor.js Hackathon hash tag: #meteorhack. Ben and David go to a Hackathon and are Victorious! We take home a Meteor AR Drone 2.0 as a prize!

  Download Podcast #32 Meteor.js Hackathon

Show #31 | Bitcoin 2013
Coverage of Bitoin 2013 conference hash tag: #bitcoin2013.

ASIC miner

  Download Podcast #31 Bitcion 2013

Show #30 | ASIC Powered Floating Island
Special guest David Sykora!
This week we talk hardware, BitCoin, LiteCoin, Asic Miners, Routers, Peace Corps and more!

Ben’s Blanket Fort:

Merrick gets upset about doors:

Ben and David's Robot!!

Ben’s video with stolen robot parts. (there’s also another video on that same channel)

  Download Podcast #30 ASIC Powered Floating Island

Show #29 | Glitches In Sam’s Homeless Matrix

Show Notes:
This week we talk BitCoin, QuadCopters, Tech Company subpoena woes, and good office culture. Also there is a major glitch in Sam’s Matrix:

Music: Orkidea – Unity (Solarstone Pure Mix)

More comments about the show in Google Plus

  Download Podcast #29 Glitches in Sam’s Homeless Matrix

Show #14 | Sam’s obsession with CD-RWs

Sam’s obsession with CDRWs

This show we take it deep into QR Code territory. Topics include:

- Our first ever bitcoin donation!
- Manually checking your iDevice *.IPA files for malware.
- Sam’s obsession w/ CDRW’s
- Really bad jokes in QR Codes
- Old school CD technology
- Please check out Krayon’s blog
- Sam & Merrick interview Ben about his job/micro-controllers/embedded systems
- CDCheck free software
- unetbootin:
- Avira anti virus boot cd
- CDROM Forward Error correction

Show #13 | This may break your iThing

iOSDevCamp coverage, recorded July 25, 2011

Official Website:
- 4Sight:
- Real Money Slots:
- Mashboard
- RMS used for icons
- Google+ and why it’s so much better than Facebook

Bitcoin Cents:
- Neal mentions: The attacks we covered last week are “Probably not a problem” according to this wiki page

- Fail depth is level 2 :)


Download MP3, This may break your iThing

Show #12 | My Bitcoin brings all the girls to the yard

Bitcoin Extravaganza, recorded July 12, 2011:

For starters, all knowledge comes from the original Bitcoin Whitepaper:
- What is currency vs fiat currency.  Why does it matter if currency is rare? Brief history of bartering, banking, fractional reserve banking
- What is Bitcoin? Creator: Satoshi Nakamoto
- Why do Bitcoins have value?
- Describe btc client, what are transactions?
- All transactions are somewhat anonymous, all you give out is your public key
- last was $14.03
- Describe a block. Hard work done to get hash with leading 0’s. No known shortcut for this work
- Block chain, hashing
- 6 steps of network transactions
- All transactions are public. The block chain provides a Balance Sheet for all nodes in the network
- Chain theoretically grows at 4.2 megs a year but…blk001.dat 327megs, blkindex.dat 166megs
- Currency generated via blocks. Right you pay 50 btc to yourself if you ‘win’ a block by solving the hash. Chance of win = your-cpu / total-network-cpu
- Difficulty is adjusted every 2016 blocks or 2 weeks
- Right now difficulty is 52 bits: (number of 0’s in hex * 4) + top bits on first 0xHEX number) (
- Target money supply such that no more than 21 million coins ever exist.  Exponentially decreasing. First 4 years half of the coins ever are minted, next 4 years half of remaining minted. This is done by blocks winning 25, then 12.5 then 6.25 etc. Bitcoin supports fractions of coins up to 6 digits.
- Question: BTCs will invariably become “lost” due to people’s computers crashing, wallet.dat corruption, etc. Over the looong term won’t hundreds of thousands of BTCs be missing? How can they be “replaced” or “replenished?” What about hoarding?
- Bitcoin client no longer can do CPU generation
- Mining pools
- SIDETRACK to CPU vs CPU pipelines
- What is a pipeline?
- Bitcoin Watch (Market Data)
- Bitcoin mining hardware comparison
- MaxPC Dream Machine

Attack Vectors on Bitcoin
- There is an infeasible kind of attack. Redo the block chain from the start
- Only kind of attack is spending coins twice, requires forking blockchain from the now. Only possible to work if your-attacking-cpus > total-network-cpu (aka 51%)
- System designed so that the most lucrative way to attack is it to mine
- CANNOT GIVE AWAY OTHER PEOPLES BITCOINS due to public private key signing

Elliptic curve DSA signatures:
U.S. Department of Commerce, National Institute of Standards and Technology
See Section (4.7)

SHORT SUMMARY of public private key pairs
x private key
y public key
q and p are primes associated with the pair, g also related
Such math as y = g ^ x mod p

- Intellicache, (listener: Mike Shaw) points out that running a VM totally from RAM is EPIC. Problem is that the poster on reddit is moving VMs into and out of his RAM disk. He relies on dropbox to sync any changes he makes inside these RAM only VMs.
- If you use IntelliCache the RAM drive here could be used to dynamically cache any part of any running virtual machine it will keeping changes persistant to disk. If you shutdown all vm’s, the write caches flush before the VM’s shutdown. All that is left on the RAMdisk is read caches. These can safely be deleted once the machine is off. Rebooting host has same effect.
- Also I wasn’t clear, but my best suggestions for IntelliCache with SSD is to use SSDs for IntelliCache drive and slower spinning disks (aka thumpers) for your backend storage



Download MP3, My Bitcoin brings all the girls to the yard