The somewhat regular Hardware Developers Didactic Galactic was a few days ago in San Francisco. Here’s the video to prove it. Highlights include [James Whong] from Moooshimeter, the two-input multimeter, [Mark Garrison] from Saleae, and a half-dozen other people giving talks on how to develop hardware.
[Taylor] made a portable NES with a retron, a new-ish NES clone that somehow fits entirely in a glop top IC. The controllers sucked, but [Taylor] made a new one with touch sensors. All that was required was eight transistors. The enclosure is an Altoid tin, and everything works great.
Here’s a YouTube channel you should subscribe to: Ham College. The latest episode covers the history of radio receivers and a crystal radio demonstration. They’re also going through some of the Technical class question pool, providing the answers and justification for those answers.
[Prusa] just relaunched prusaprinters and he’s churning out new content for it. Up now is an interview with [Rick Nidata] and his awesome printed container ship.
The tip line is overflowing with ESP8266 breakout boards. Here’s the simplest one of them all. It’s a breadboard adapter with stickers on the pin headers. Turn that into a right-angle breadboard adapter, and you’ll really have something.
Here’s something that’s a bit old, but still great. [Dillon Markey], one of the stop-motion animators for Robot Chicken modified a Nintendo Power Glove for animation duties. It seems to work great, despite being so bad. Thanks [Nicholas] for the link.
[David] the Swede – a consummate remote control professional we’ve seen a few times before – just flew his tricopter in a mall so dead it has its own Wikipedia page. Awesome tricopter, awesome location, awesome video, although we have to wonder how a few really, really bright LEDs would make this video look.
Here’s an item from the tip line. [Mark] wrote in with an email, “Why do you put names in [square brackets] in the blog entries? Just curious.” The official, [Caleb]-era answer to that question is that sometimes people have bizarre names that just don’t work in text. Imagine the sentence, “[12VDC] connected the wires to the terminal” without brackets. The semi-official answer I give is, “because.”
Filed under: Hackaday Columns, Hackaday links
Sometimes, along comes a build project that is not so much a fail, as how not to do it. First off, some of us here had to look up what a Pocky is, never having heard, seen or tasted one – seriously. Once satisfied, we turned our attention to [Michael]’s Automated Pocky Dispenser. Took a while for us to figure out if it’s useful or not. But it’s a fun, quick project that [Michael] put together in around an hour using parts lying around in his office.
For those of you who’d like to know, a Pocky is a chocolate-coated biscuit stick, although you can also buy it in other flavors. You can grab one from a box, but maybe it tastes better when you dispense it by banging a big red button. [Michael] says he used incredibly advanced construction techniques, but we leave it to our readers to decide on that. The key element of the build is the special “flexible coupling” that he built to transfer the rotation of the stepper motor to the dispensing mechanism. The rest of the build consists of an Arduino, stepper motor, driver, and giant red button. Special motor driving code ensures that the dispenser wiggles back and forth every time, preventing any stuck Pocky’s. And the Electronics are, well, hanging out for all to see. Happy with the success of his build, [Michael] is planning an upgraded version – to connect the Pocky Dispenser to the cloud for statistical gathering of office Pocky habits. He claims even Google does not have that data. To see the dispenser in action, check out the video below.
Filed under: misc hacks
Around this time last year we were planning our trip to the Vintage Computer Festival East in Wall, NJ. This year we’re doing it all over again, and according to the announcements coming out of the planning committee, it’s going to be a very, very cool event.
This year marks fifty years since the release of the PDP-8, regarded as the first commercially successful computer ever. The historic Straight-8 from the infamous RESISTORS has been restored over the past few months, and it’s going to be turned on again for the festival. There will also be a half a dozen other PDP-8s at the event, but these are 8/M, 8/E, and 8/L models and not constructed completely out of discrete diode transistor logic.
Keynote speakers include [Wesley Clark], designer of the LINC computer and [Bob Frankston], co-creator of Visicalc. There will, of course, be a ton of educational and historical sessions on Friday. Our own [Bil Herd] will be there talking about vintage microcomputer architectures along with a dozen other fascinating people talking about really interesting stuff
As far as exhibits go, there’s literally everything you could imagine when it comes to retro computers. There will of course be a fully restored and functional PDP Straight 8, along with PDP-11s, Apple Newtons, Ataris, Network gaming on C64s. Hollerith cards, VisiCalc, mainframes, teletypes, video toasters, an RTTY amateur radio station (KC1CKV), a flea market/consignment thing, and all sorts of retro goodies. Oh, a Fairlight CMI will also be there. I don’t know how they got that one.
More info for VCF East at the official site, Facebook, and Twitter. If you’re in the area and want to exhibit something really, really cool, there’s still room for more. If you want a better feel for what will be going down at VCF East, check out our megapost wrapup from last year.
Of course if New Jersey isn’t your thing and you live a few blocks down from Peachtree Avenue, Lane, or Street, VCF Southeast 3.0 will be held in Roswell, Georgia the first weekend in May.
Filed under: Hackaday Columns, slider
[bhunting] lives right up against the Rockies, and for a while he’s wanted to measure the temperature variations against the inside of his house against the temperature swings outside. The sensible way to do this would be to put a few wireless temperature-logging probes around the house, and log all that data with a computer. A temperature sensor, microcontroller, wireless module, battery, case, and miscellaneous parts meant each node in the sensor grid would cost about $10. The other day, [bhunting] came across the exact same thing in the clearance bin of Walmart – $10 for a wireless temperature sensor, and the only thing he would have to do is reverse engineer the protocol.
These wireless temperature sensors are exactly what you would expect for a cheap piece of Chinese electronics found in the clearance bin at Walmart. There’s a small radio operating at 433MHz, a temperature sensor, and a microcontroller under a blob of epoxy. The microcontroller and transmitter board in the temperature sensor were only attached by a ribbon cable, and each of the lines were labeled. After finding power and ground, [bhunting] took a scope to the wires that provided the data to the radio and took a look at it with a logic analyzer.
After a bit of work, [bhunting] was able to figure out how the temperature sensor sent data back to the base station, and with a bit of surgery to one of these base stations, he had a way to read the temperature data with an Arduino. From there, it’s just a data logging problem that’s easily solved with Excel, and [bhunting] has exactly what he originally wanted, thanks to a find in the Walmart clearance bin.
Filed under: hardware, home hacks
Want to build up a desktop CNC machine without breaking your pocketbook? [James Coleman], [Nadya Peek], and [Ilan Moyer] of MIT Media Labs have cooked up a modular cardboard CNC that gives you the backbone from which you can design your own machine.
The CNC build comprises of design instructions for a single axis linear stage and single axis rotary stage with several ideas on how to combine multiple of these axes together to construct a particular machine. Whether your milling wood, laser-engraving your desk, or pipetting your bacteria samples, the designs [Dropbox] and physical components can be adopted for your end-application.
Perhaps the most interesting aspect of this project is that, at the high level, it is not just a cnc, but a framework known as Gestalt. This architecture enables users to develop their own machine configuration consisting of multiple software nodes linked together with high-level Python Code. Most of the high level computation is organized by a Python library that calls compiled C-code. This high-level framework processes instructions through the desired machine’s kinematics to output commands to the motor controllers. Finally, the top-level interface does away with the archaic GCode with two alternatives: a Python interface consisting of function calls to procedures and a remote interface to make procedure calls through http requests. While the downside of a motion control language is that commands have no standardization; they are, however, far more human-readable, a benefit that plays into the Gestalt Framework’s aim “to be accessible to individuals for personal use.”
In the paper [PDF], [Ilan] expresses the notion of a tool as an impedance-matching device, an instrument that extends the reach of our creativity to bend and morph a broader range of shapes into forms from our imagination. Where our hands fail in their imprecision and weakness, tools bridge this gap. Gestalt and the Cardboard CNC are first steps to creating a framework so that anyone can design and realize their own impedance-matching device, whether they’re weaving steel cables or carving wood.
The folks at MIT Media Labs a familiar heavy-hitters in this field of low-cost machinery, especially the kind that fit in a suitcase. We’re thrilled to see a build that reaches out directly to the community.
Filed under: cnc hacks, slider
Many of the early applications for the much anticipated Oculus Rift VR rig have been in gaming. But it’s interesting to see some more useful applications besides gaming, before it’s commercial release sometime this year. [JoLau] at the Institute i4Ds of FHNW School of Engineering wanted to go a step beyond rendering virtual worlds. So he built the Intuitive Rift Explorer a.k.a IRE. The IRE is a moving reality system consisting of a gimbaled stereo-vision camera rig transmitting video to the Rift, and matching head movements received from the Oculus Rift. The vision platform is mounted on a Remote-controlled robot which is completely wireless.
One of the big challenges with using VR headsets is lag, causing motion sickness in some cases. He had to tackle the problem of latency – reducing the time from moving the head to getting a matching image on the headset – Oculus Rift team specified it should be less than 20ms. The other important requirement is a high frame rate, in this case 60 frames per second. [JoLau] succeeded in overcoming most of the problems, although in conclusion he does mention a couple of enhancements that he would like to add, given more time.
[JoLau] provides a detailed description of the various sub-systems that make up IRE – the Stereo camera, audio and video transmission, media processing, servo driven gimbal for the stereo camera, and control system code. [JoLau]’s reasoning on some of the interesting hardware choices for several components used in the project makes for interesting reading. Watch a video of the IRE in action below.
Filed under: Virtual Reality
Most of us know that we should lock our computers when we step away from them. This will prevent any unauthorized users from gaining access to our files. Most companies have some sort of policy in regards to this, and many even automatically lock the screen after a set amount of time with no activity. In some cases, the computers are configured to lock and display a screen saver. In these cases, it may be possible for a local attacker to bypass the lock screen.
[Adrian] explains that the screen saver is configured via a registry key. The key contains the path to a .src file, which will be played by the Adobe Flash Player when the screen saver is activated. When the victim locks their screen and steps away from the computer, an attacker can swoop in and defeat the lock screen with a few mouse clicks.
First the attacker will right-click anywhere on the screen. This opens a small menu. The attacker can then choose the “Global settings” menu option. From there, the attacker will click on “Advanced – Trusted Location Settings – Add – Add File”. This opens up the standard windows “Open” dialog that allows you to choose a file. All that is required at this point is to right-click on any folder and choose “Open in a new window”. This causes the folder to be opened in a normal Windows Explorer window, and from there it’s game over. This window can be used to open files and execute programs, all while the screen is still locked.
[Adrian] explains that the only remediation method he knows of is to modify the code in the .swf file to disable the right-click menu. The only other option is to completely disable the flash screen saver. This may be the safest option since the screen saver is most likely unnecessary.
Filed under: security hacks
There is something refreshing about a neat, portable audio hack – especially one than involves making a DIY Speaker Box from scratch. [Dave] had some time to spare and his ShapeOko was lying idle and hankering for some attention. He needed a small speaker that he could place outside when entertaining guests. After some quick homework, he zeroed in on the speakers he would use.
Using some online resources , he did some basic math to figure out the box size and shape, but then eventually threw caution to the wind and went ahead with the design he had in mind. Most speaker box builds use some form of wood or MDF. [Dave] had 9mm thick ABS sheets lying around and decided to use them instead. He used an interesting technique for putting the box together. The front and rear panels had slots milled in to them to follow the shape of the side panels. The two side panels had strategically cut slots half way through the thickness of the ABS to make it easier to heat bend them. He then used a heat gun to bend the side panels to fit them to the slots on the front and back panels. In the end, we’re guessing he used just four pieces of ABS to build a complex shape. Since the HiVi B3N speakers are full range, he also built a 1st order crossover to make sure the highs were diverted to the tweeters. All in all, a neat, clean build.
Filed under: cnc hacks, portable audio hacks
[JoshBaker] wanted to make something special for his brother this past Christmas. He decided on making a wooden game board version of the Settlers of Catan game. [Josh] used CorelDraw to construct the vector images needed for the board. Then, he set out cutting the base, engraving and cutting out the many wooden pieces with a laser cutter. All the pieces were stained and then sealed with polyurethane. He assembled the base so that the removable hex tiles, ports, and resource numbers sit nicely in the recessed parts and don’t shift during gameplay. He complemented the board with tokens and game pieces that he hand-painted. [Josh] also created a new set of cards to fit with the board’s aesthetic.
The board is done incredibly well, not to mention beautiful to look at. The hex tiles’ designs are very detailed. The stained and engraved wood really adds to the atmosphere of the game. We featured a coffee table that would be perfect to play it on. [Josh] has listed all of the vector files for the version he gave his brother, as well as additional ones for the Cities and Knights Expansion. We wish we could have seen the look on his brother’s face when he got such an awesome Christmas gift!
Filed under: cnc hacks, Holiday Hacks
Every few months a game comes along which is so addictive, players can’t seem to put it down – no matter how frustrating it may get. Last year one of those games was Super Hexagon. After fighting his way through several levels, [Val] decided that designing a bot to beat the game would be more efficient than doing it himself. Having played a few rounds of Super Hexagon ourselves, we can’t fault him on that front!
At its core, Super Hexagon is a simple game. Walls move from the screen edges toward a ship located near the center of the screen. The player uses the arrow keys to “orbit” the ship around a central shape. Avoid getting crushed by the walls, and you’re golden. However, the entire game board is constantly spinning, expanding, contracting, flashing, and generally doing things to disorient the player while ever more complex wall patterns move in to kill you. In short, Super Hexagaon makes Touhou bullet hell games look like a cakewalk.
The first step in beating the game is to capture the screen. [Val] tried Fraps and VLC, but lags of 2 seconds or more were not going to work. Then [Val] turned to DLL Injection. Super Hexagon calls the OpenGL function glutSwapBuffers() to implement double buffering. Every frame of the game is rendered in the background. Once rendering is complete glutSwapBuffers() is called to swap the buffers, and the process starts over again. [Val] changed the game code such that his own frame capture function would be called instead of glutSwapBuffers(). Once he was done capturing the game’s video buffer, [Val] then called the real glutSwapBuffers() function. It worked perfectly.
Now that he had an image, [Val] used OpenCV to process it. Although game is graphically very noisy, there are only a few colors used at any one time. It didn’t take much work to come up with an algorithm which would create a binary image of the walls and the ship itself.
[Val] cast rays from the center of each wall through the center of the screen. The ray which was longest before intersecting another wall would be the best escape route. This simple solution worked, but only for about 40 seconds. At that point, Super Hexagon would start throwing more complex patterns, and the AI would fail. The final solution was to create an accessibility condition which also took into account how much space was available between the various approaching walls. This new version of the AI was able to beat the game.
So was this a more efficient method than grinding through Super Hexagon manually? Since [Val] now knows all about DLL injection and OpenCV, we sure think it was!
Click past the break to see the [Val’s] bot in action!
Filed under: video hacks
[James Bruton] is busy working on his latest project, a “scrap metal sculpture”-inspired Alien Xenomorph suit. However, he wanted to get a boost in height as well as a digitigrade stance. To that end, [James] 3D-printed a pair of customized stilts. Each stilt consisted of a lifter with several parts laminated together using acetone. He bolted an old pair of shoes onto the stilts, adding straps across the toes to keep the shoes from lifting up.
While the stilts worked very well, [James] wanted to add soles to them to give him some traction as he walked – falling while in a Xenomorph costume composed of sharp plastic sounds painful enough! He decided to hybrid print the soles using ABS and Ninjaflex. The ABS part of the sole was then acetone-welded to the bottom of the stilts.
[James] hopes to add some claws for effect, so long as they don’t impede his walking too much. He has already completed a good amount of the 3D-printed suit. We know the finished project is going to be amazing: [James] has created everything from Daleks to Iron Man!
Filed under: 3d Printer hacks, wearable hacks
The Spark Electron was released a few days ago, giving anyone with the Arduino IDE the ability to send data out over a GSM network. Of course, the Electron is just a GSM module tied to a microcontroller, and you can do the same thing with a Pi, some components, and a bit of wire.
The build is fairly basic – just an Adafruit Fona, a 2000 mah LiPo battery, a charge controller, and a fancy Hackaday Perma-Proto Hat, although a piece of perf board would work just as well in the case of the perma-proto board. Connections were as simple as power, ground, TX and RX. With a few libraries, you can access a Pi over the Internet anywhere that has cell service, or send data from the Pi without a WiFi connection.
If you decide to replicate this project, be aware you have an option of soldering the Fona module right side up or upside down. The former gives you pretty blinking LEDs, while the latter allows you to access the SIM. Tough choices, indeed.
Filed under: Raspberry Pi
Let’s face it, we’re all a bit obsessed with tools. Whether it’s an oscilloscope or a screwdriver, having just the right tool can be the difference between loving what you are doing, or dreading it. But oddly enough, not much is talked about tool organization. We tend to think that how you organize your tools is just as import as the tools themselves.
[Adam Savage] of Mythbusters fame might just be the king of tool organization. In this thread on the Replica Props Forum, [Adam] shares the design and construction of two sets of mobile tool boxes he built while working at Industrial Light and Magic. The idea is simple: First Order Retrievability. That is, you should never have to move one tool to get to another. That in turn affords the fastest, most efficient way of working.
The evolution of this idea started with medical bags (the kind doctors would use, back in the day when doctors still made house calls), but as [Adam’s] tool collection grew, the leather was no match for 50 pounds of tools. So, he stepped up to two aluminum tool boxes. Adding wheels and a scissor lift allowed for a moveable set, at just the right height, that are always in reach. Perfect for model making, where being able to move to different parts of a model, and taking your tools with you is key. If you’re looking for a list of what’s inside [Adam]’s box of wonder, here you go.
What are some of your favorite ways of organizing your tools? What tips or tricks do you have? Post a picture or description in the comments. I’m sure we all could learn a bit from one another.
Filed under: tool hacks
About six months ago, we saw [tshen2]’s work on the DSP 01, a 2-input, 6-output DSP and crossover for extreme audiophiles, and we’re not talking about oxygen free rooms here. The DSP 01 turns a USB audio output into six outputs that will give you perfectly flat eq across bass, mids, and highs, integrates with a 6x100W amplifier, and compensates for room noise. There was a huge update to the project recently and [tshen] is more than happy to share the details
Getting to this phase of the project hasn’t been without its problems. To get the DSP communicating to a computer through a USB port, [tshen2] found a potential solution in the CP2114 USB to I2S Bridge. This device should function as a USB audio sink, translating digital audio into something the DSP understands. This chip did not work in [tshen]’s design. The CP2114 simply does I2S wrong; the I2S spec says the clock must be continuous. This chip implements I2S with a SPI, firmware, and a few other things, making it incompatible with to-spec I2S.
While there was some problems with getting audio in to the device, the core of the device has remained unchanged. [tshen2] is still using the Analog Devices DSP, with the interesting SigmaStudio being used to compensate for the frequency response of the room. This real, legit, science-based audiophile territory here, and an impressive development for a field that – sometimes understandably – doesn’t get the respect it deserves.
Filed under: digital audio hacks
[Nathan] is a mobile application developer. He was recently debugging one of his new applications when he stumbled into an interesting security vulnerability while running a program called Charles. Charles is a web proxy that allows you to monitor and analyze the web traffic between your computer and the Internet. The program essentially acts as a man in the middle, allowing you to view all of the request and response data and usually giving you the ability to manipulate it.
While debugging his app, [Nathan] realized he was going to need a ride soon. After opening up the Uber app, he it occurred to him that he was still inspecting this traffic. He decided to poke around and see if he could find anything interesting. Communication from the Uber app to the Uber data center is done via HTTPS. This means that it’s encrypted to protect your information. However, if you are trying to inspect your own traffic you can use Charles to sign your own SSL certificate and decrypt all the information. That’s exactly what [Nathan] did. He doesn’t mention it in his blog post, but we have to wonder if the Uber app warned him of the invalid SSL certificate. If not, this could pose a privacy issue for other users if someone were to perform a man in the middle attack on an unsuspecting victim.
[Nathan] poked around the various requests until he saw something intriguing. There was one repeated request that is used by Uber to “receive and communicate rider location, driver availability, application configurations settings and more”. He noticed that within this request, there is a variable called “isAdmin” and it was set to false. [Nathan] used Charles to intercept this request and change the value to true. He wasn’t sure that it would do anything, but sure enough this unlocked some new features normally only accessible to Uber employees. We’re not exactly sure what these features are good for, but obviously they aren’t meant to be used by just anybody.
Filed under: security hacks
Even the most well designed crypto algorithms can be broken if someone is smart enough to connect an oscilloscope to a processor. Over the last 15 years or so, an entire domain of embedded security has cropped up around the techniques of power and side channel analysis. The tools are expensive and rare, but [Colin O’Flynn] and the ChipWhisperer are here to bring a new era of hardware security to the masses.
The ChipWhisperer was the second place winner of last year’s Hackaday Prize. It’s an interesting domain of security research, and something that was previously extremely expensive to study. If you’re looking for a general overview of what the ChipWhisperer does, you might want to check out when we bumped into [Colin] at DEFCON last year.
While the original goal of the ChipWhisperer was to bring the cost of the tools required for power and side channel analysis down to something a hackerspace or researcher could afford, this was still too expensive for a Kickstarter campaign. To that end, [Colin] designed the ChipWhisperer Lite, a cut-down version, but still something that does most of what the original could do.
There are two parts to the ChipWhisperer Lite – the main section contains a big microcontroller, a big FPGA, and a high gain, low noise amplifier. This is the core of the ChipWhisperer, and it’s where all the power analysis happens. The other part is a target board containing an XMega microcontroller. This is where you’ll run all your encryption algorithms, and where you’ll find out if they can be broken by power analysis. The main board and target board are held together by a break-away connection, so if you want to run a power analysis on another board, just snap the ChipWhisperer in half.
[Colin] is offering up a ChipWhisperer Lite for around $200 USD – far, far less than what these tools cost just a year ago. We’re looking forward to a successful campaign and all the neat findings people with this board will find.
Filed under: Crowd Funding, security hacks
[Helios Labs] recently published version two of their 3D printed fish feeder. The system is designed to feed their fish twice a day. The design consists of nine separate STL files and can be mounted to a planter hanging above a fish tank in an aquaponics system. It probably wouldn’t take much to modify the design to work with a regular fish tank, though.
The system is very simple. The unit is primarily a box, or hopper, that holds the fish food. Towards the bottom is a 3D printed auger. The auger is super glued to the gear of a servo. The 9g servo is small and comes with internal limiters that only allow it to rotate about 180 degrees. The servo must be opened up and the limiters must be removed in order to enable a full 360 degree rotation. The servo is controlled by an Arduino, which can be mounted directly to the 3D printed case. The auger is designed in such a way as to prevent the fish food from accidentally entering the electronics compartment.
You might think that this project would use a real-time clock chip, or possibly interface with a computer to keep the time. Instead, the code simply feeds the fish one time as soon as it’s plugged in. Then it uses the “delay” function in order to wait a set period of time before feeding the fish a second time. In the example code this is set to 28,800,000 milliseconds, or eight hours. After feeding the fish a second time, the delay function is called again in order to wait until the original starting time.
Filed under: 3d Printer hacks, Arduino Hacks
Oscilloscopes are one of the most often used tools of the engineer, hacker, or maker. Voltmeters can do a lot, but when you really need to get a good look at a signal, a good scope is invaluable. This week’s hacklet is triggered by the rising slope of some of the best Oscilloscope projects on Hackaday.io!
We start with [DainBramage’s] recent project Stretching the Limits of a Rigol DS-1102E Scope. The new Rigol ds1054z may be getting all the press lately, but the older DS-1102E (100 MHz) model is still a very capable scope. [DainBramage] broke out his vintage Singer CSM-1 service monitor to generate frequencies all the way up to 500 MHz. The Rigol did admirably well, detecting a sine wave all the way up to 500 MHz. This is in part due to the scope’s 1 gigasample-per-second sampling rate. Once things got beyond the specified limit of 100 MHz though, the signal began to attenuate. Not bad for pushing a low-end scope way beyond its limits!
Next up is [Bruce Land] with his PIC32 oscilloscope. Microcontroller scope projects are nothing new, but one that runs at nearly 1 MHz sampling rate while generating NTSC composite video is nothing to sneeze at. [Bruce] pulled this off by using Direct Memory Access (DMA) to move the data from the ADC to memory, and to get the video data from memory to the I/O pins used to generate video. The video itself is created by a resistor tree DAC. All you need to make black and white video is three resistors and two I/O pins. [Bruce] says the entire scope cost about $4.00 us in parts!
[Jacob Christ] mixed art and science with his chipKIT Oscilloscope Plotter. [Jacob] used a Microchip PIC32 based Fubarino to draw patterns on his scope. To do this the scope must be set to X-Y mode. [Jacob] paired his Fubarino with a MCP4902 Digital to Analog Converter (DAC). Using a dedicated DAC is a great way to do this. [Jacob’s] images are a testament to that, as they’re some of the cleanest “scope art” drawings we’ve seen. Much like [Bruce Land], [Jacob] used his project as the basis for a college class. In fact, the image to the left was created by one of his students!
Want more scope goodness? Check out our new Oscilloscope Projects List!Hackaday.io Update!
Hackaday.io is getting new features every day. Our dev team has just rolled out a new gallery view. Just click on a project’s featured image, or the “View Gallery” button, and you will be taken to a gallery view of every image used in the project – including log images. YouTube videos will render in the gallery as well. It’s a great way to view a timeline of progress for some of the projects on hackaday.io. For a great example of this, check out OpenMV’s gallery.
In other Hackaday.io news, check out the Caption CERN Contest! Every week we put up a new image from CERN’s archives. The Hackaday.io user who comes up with the funniest caption wins a T-Shirt from The Hackaday Store!
Looks like we’ve hit the end of the trace for this Hacklet. Same hack time, same hack channel, bringing you the best of Hackaday.io!
Filed under: Hackaday Columns
So you’ve finished your project. You’ve got a wonderful circuit, a beautiful PCB, and everything works perfectly. You’re done right? Well, maybe not. Sure, a bare PCB might be fine for a dev board, but what if you have a LCD to mount, a knob that needs turning, and buttons that need pressing. Yeah, that potentiometer hanging off the board by a few wires isn’t so pretty, is it? So it’s time for a case. Yuck. We all hate modifying cases.
[Electrodacus] came up with a clever solution in the form of stacking PCBs to form a case. In his project, he actually has the circuitry spread across 3 PCBs, and uses surface mount connectors to connect them in a stack. Along the edges are specifically shaped PCBs to complete the enclosure. This technique could be used with only one PCB containing all the circuitry, and the others acting as the case sides and top.
In this solar battery management project, the base layer has most of the power circuitry. This layer uses an aluminum metal core PCB for heat dissipation. The center layer is home for the micro controller and supporting components. And the top layer is the “front panel” with capacitive touch buttons and a cut out for a LCD. The top layer silk screen contains the logo, button markings, and the pin out of all the connectors.
If you hate drilling and filling cases (as much as we do), this technique might be right for your next project.
[via EEVBlog Forums]
Filed under: hardware
If you’ve ever lived in a building with manually controlled central heating, you’ll probably understand [Martin]’s motivation for this hack. These heating systems often have old fashioned valves to control the radiator. No Nest support, no thermostat, just a knob you turn.
To solve this problem, [Martin] built a Wi-Fi enabled thermostat. This impressive build brings together a custom PCB based on the ESP8266 Wi-Fi microcontroller and a mobile-friendly web UI based on the Open Thermostat Scheduler. The project’s web server is fully self-contained on the ESP8266.
To replace that manual value, [Martin] used a thermoelectric actuator from a Swiss company called HERZ. This is driven by a relay, which is controlled by the ESP8266 microcontroller. Based on the schedule and the measured temperature, the actuator lets fluid flow through the radiator and heat the room.
As a bonus, the device supports NTP for getting the time, MQTT for publishing real-time data, and ThingSpeak for logging and graphing historic data. The source code and design files are available under a Creative Commons license.
Filed under: home hacks