ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Arguably the Most Important Computer in Star Wars

b2ap3_thumbnail_death_star_may_the_fourth_400.jpgToday is known the world over as Star Wars Day (May the 4th be with you). We want to take this opportunity to look at the technology of one of our favorite movie franchises. Given how much exciting technology there is in the fictional Star Wars universe, picking just one technology can be difficult. Since we work with computers, let’s look at one of the most important computers in the film, the X-wing targeting computer.

The targeting computer has a prominent role in the first movie, “A New Hope.” Wookieepedia describes the targeting computer as:

A targeting computer (also called a target device) was a device used aboard starships to aid pilots in targeting their weapons. A target was considered vulnerable when it was aligned with the electronic crosshairs of a targeting computer's gun-sights.

targeting computer in blog 1

When Luke Skywalker leads a squadron of Rebel Alliance pilots to assault the Death Star, we get to see the targeting computer in action. Each starship pilot, including Luke, is equipped with a targeting computer. For the Rebel’s risky attack plan to work, they had to shoot a proton torpedo straight down the Death Star’s exposed exhaust port; a shot described by another pilot in the briefing as “impossible.”

To which our hero Luke arrogantly replied, “I used to bull's-eye womp rats in my T-16 back home. They're not much bigger than two meters."

As you can see, the entire plan depended on the Rebel’s targeting computers functioning properly. If the a targeting computer’s calibration was off, even by a slight fraction, then the shot would miss its mark and the sacrifices of brave pilots like Porkins would be all for naught.

targeting computer in blog 2

As is the case with most military technology, the bad guys have access to it too. You might remember that Darth Vader participated in the battle with his TIE Advanced x1 starship. For Darth Vader’s ship, the targeting computer onboard seemed to work just fine, allowing him to easily shoot down those pesky Rebel pilots.

target locked on x wing

As much as equipment like targeting computers makes things easier for starship pilots, it’s not a technology that works perfect 100 percent of the time. In fact, you might recall that there were a few unsuccessful shots taken by the Rebels at the Death Stars’ exhaust port before Luke hit his mark.

How could it be that a trained starship pilot armed with an advanced targeting computer could have missed like that? Perhaps we’re looking at a sabotage situation at the hands of the Empire. Could it be that an Empire spy hacked the Rebel’s targeting computers and recalibrated them, making it impossible to hit such a small target at such a high rate of speed? This very well could have been the case.

Think about it. Maybe the Empire wanted the Rebels to know about the Death-Star-exhaust-port vulnerability because they also had an inside person at the rebel base to mess with their targeting computers. A sabotage like this would render the Rebel fighters useless against a megaweapon like the Death Star, allowing the Empire to easily defeat the Rebel squadron on their terms. Essentially, “It’s a trap.”

targeting computer in blog 3

This J.J. Abrams-like plot twist could have been the case. Why else would Luke, just a few scenes earlier, comment on how easy of a shot it was going to be? Plus, in well-concealed sabotage like this, there could be only one person that would be able to see the whole situation unfold and give the Rebels adequate warning. Namely, someone who is omnipresent and has an ax to grind against the Empire, AKA, Ben Kenobi.

When posthumous Obi Wan made himself known to Luke in that X-wing cockpit, he had one clear message to deliver to the young Jedi, “Put away that targeting computer. Trust your instincts. Use the Force.” Not fully understanding why, Luke decided to let go and do what the ghost says, and well, you know how well that worked out.

targeting computer in blog 4

Moral of the story, whether you’re using technology to run your business or to take down the Empire, it makes everything we do much easier. Although, like the Rebel pilots, let’s not become so dependant upon technology that we don’t see the big picture because we have totally removed ourselves from influences that we can’t see, like our conscious, our feelings, and even the Force.

May the 4th be with you!

Images courtesy of the Walt Disney corporation.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media Users VoIP Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery IT Support Browser Windows 10 Managed Service Apps Miscellaneous Cloud Computing Outsourced IT Remote Work Managed Service Provider Data Management Internet of Things Saving Money Operating System Government Windows Workplace Strategy Gadgets Artificial Intelligence Managed IT services Networking App WiFi Virtualization Information Spam Remote Mobile Device Management Business Technology Bandwidth Encryption Blockchain Server Gmail Office Budget Two-factor Authentication Office 365 Employee/Employer Relationship Apple History Information Technology Data Security Big Data Conferencing Wi-Fi BDR Cybercrime Health Access Control Analytics Save Money Remote Computing Help Desk Patch Management Hacking Remote Monitoring Vendor Hacker Cost Management IT Management Training Voice over Internet Protocol Employer-Employee Relationship Compliance Document Management Outlook Password Project Management BYOD Computing Applications Vendor Management Hard Drive Money Vulnerabilities Search... Customer Service Unified Threat Management Best Practice Firewall Mobile Office Legal Retail Augmented Reality Word Alert Managed Services Data storage IBM Data loss Hiring/Firing Website Travel Virtual Reality Social Engineering The Internet of Things Cryptocurrency Paperless Office Antivirus YouTube Black Market Chrome Maintenance Cleaning Robot Laptop Data Breach Mobile Computing Websites Mobility Marketing Meetings Windows 11 Running Cable Social Sports Monitoring Google Maps DDoS Twitter SaaS Scam Healthcare Storage Remote Workers Law Enforcement End of Support iPhone Printer Cortana Windows 7 VPN Education Free Resource Content Filtering Update How To User Router Bluetooth Taxes Distributed Denial of Service Images 101 Office Tips Integration Private Cloud Memory Display Virtual Assistant Physical Security Employees Wireless Technology Avoiding Downtime Politics Machine Learning Settings PowerPoint eWaste Holidays Administration Processor Start Menu Solid State Drive Downloads Downtime Presentation Computer Care Cooperation Specifications Safety IT Consultant Video Conferencing Vulnerability Virtual Machines Chromebook Software as a Service Virtual Desktop Drones Data Protection Experience Customer Relationship Management Computer Repair Automobile Co-Managed IT Multi-factor Authentication Professional Services Entertainment How To Saving Time Microchip Flexibility Disaster Managed Services Provider Computers Bitcoin Tech Terms Virtual Private Network Lithium-ion battery Hack Identity Theft Telephone Notifications Managed IT Digital HIPAA Unified Communications Current Events Google Docs Processors Excel Solutions Security Cameras Access Securty Trends Supply Chain Management Mobile Technology Value Devices Cyber security Shortcuts Time Management Business Owner Customer Resource management Organization Music Public Cloud Domains Fileless Malware Smart Devices Tip of the week Audit Spyware Gamification Remote Working Company Culture Regulations Trend Micro Be Proactive Botnet Telephone System AI File Sharing Directions Digital Security Cameras Micrsooft Backup and Disaster Recovery Electronic Health Records Transportation Rental Service Redundancy Flash Cache Content Public Speaking Desktop Wasting Time Accountants eCommerce Modem Workplace Strategies Telephone Systems Unified Threat Management Streaming Media Inbound Marketing Electronic Medical Records Business Growth Workers Videos Database Surveillance Keyboard Printing CCTV Hard Drives Managing Costs Equifax intranet SSID Banking Touchscreen Health IT Google Wallet Electronic Payment Media Deep Learning Wireless Tactics Development Computer Malfunction Shortcut Hard Drive Disposal Employer/Employee Relationships Messenger Emergency Vendor Mangement Username Heating/Cooling Virtual Machine Environment Startup Optimization Social Networking Freedom of Information Smart Technology Business Metrics Windows XP Reviews Hosted Solution Samsung Navigation 2FA Uninterrupted Power Supply Phone System Addiction Webcam email scam Teamwork Books Language Business Mangement Data Storage Society Mobile Security Hypervisor Legislation News Medical IT User Tip Shopping Tablets Reading Evernote Paperless Monitors Network Management Visible Light Communication SQL Server Google Calendar PCI DSS Windows 8 Supercomputer Licensing Proxy Server Gig Economy Computer Accessories Emails Humor Fake News Supply Chain Virus Relocation Business Communications Displays Staffing Service Level Agreement Internet Service Provider Advertising Motion Sickness Computing Infrastructure Azure Device security Managed IT Service Comparison Work/Life Balance Google Drive Management Regulations Compliance Tech Support IP Address Wireless Headphones Memes Microsoft Excel Workplace Knowledge Tech Human Resources Corporate Profile Going Green Net Neutrality Business Cards In Internet of Things Television Telephony Error Financial Data Employer Employee Relationship Bookmark Risk Management Network Congestion Cabling IT Scams Hacks Reliable Computing Term Google Apps Writing Tablet Recovery Download G Suite Competition Piracy HTML Mouse VoIP Troubleshooting Telework Tracking Browsers Smartwatch Nanotechnology Communitications Entrepreneur Microsoft 365 Cables LiFi Scalability Google Play Documents Upload Procurement Web Server Application Software License Business Intelligence Administrator SharePoint Text Messaging Social Network FinTech Proactive IT Digital Payment Data Analysis CES Worker Screen Reader IT Assessment Point of Sale Bring Your Own Device

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?