Hackers need fuel to hack. In general that fuel comes in the form of food, water, and caffeine. Not necessarily in that order. While soda or energy drinks will do in a pinch, the best hackers know that the purest form of caffeine comes from coffee. This of course means that there have been decades of coffee hacks. The first Internet-connected coffee pot dates all way back to 1991, before the web even had pictures. We’ve come a long way since then. This week on the Hacklet we’re checking out some of the best coffee hacks on Hackaday.io!
We start with [opeRaptor] and CoffeeOfThings. [OpeRaptor] has created a wireless, internet connected coffee carafe. The carafe has three CdS cells which enable it to detect how much black gold is left in the pot. A TMP36 sensor reports the current coffee temperature. Data is sent out via a NRF24l01 radio. The brains of the coffee pot is an MSP430 microcontroller. All this runs from a simple CR2032 coin cell. A base station receives the coffee data, displays it on a very nice Vacuum fluorescent Display (VFD). An ESP8266 then passes the data on to the internet.
Next up is [magnustron] with quad-386 coffee heater. No one likes a cold cup of coffee. Everyone loves old CPUs. [Magnustron] turned these two shower thoughts into a the world’s first USB powered quad CPU coffee warmer with data logging capabilities. A simple ATtiny461 micro runs the show. PC connectivity is via USB using the V-USB library. [Magnustron] has gotten the CPUs to warm up, but is having some issues with switching. them on. Turning all four heaters on too quickly causes the rail to droop, leading to dropped USB connections. Those power-hungry 386 chips may be a bit too much for a single USB connection. It might be time to add an external power supply.
Next is [kesh1030] with Using Waste Coffee As A Biodiesel Source. Coffee isn’t just liquid energy. There’s oil in them there grounds. Millions of pounds of used coffee grounds produced every year can be converted to biodiesel fuel. [Kesh1030] experimented with different coffee grounds, and different ways to prepare them. The oil was extracted from the coffee using hexane, which is a bit of a nasty solvent. [Kesh1030] used a fume hood to stay safe. He found that homogenized coffee grounds had an 11.87% oil yield. Used homogenized coffee grounds weren’t far behind, with 9.82% yield of oil. Nearly 10% per weight yield isn’t too shabby, considering this is all going into the trash.
Finally, we have [saadcaffeine] with Caffeinator: gravity powered geek fuel dripper. This is a project of few words, but the images tell much of the story. [Saadcaffeine] created his own cold drip iced coffee maker using upcycled and found components. Three clothes hangers form an ingenious tripod. The tripod holds two soda bottles – the water reservoir and the brew pot. Water is restricted by small holes in the soda bottle caps. This allows it to drop slowly though the machine, giving it time to soak up all the caffeinated goodness. The result is a fresh cup of cold drip. Just add ice and enjoy a quick power up!
If you want to see more coffee hacks, check out our new coffee projects list. See a project I might have missed? Don’t be shy, just drop me a message on Hackaday.io. That’s it for this week’s Hacklet, As always, see you next week. Same hack time, same hack channel, bringing you the best of Hackaday.io!
Many productive hackers bleed a dark ochre. The prevailing theory among a certain group of commenters is that they’re full of it, but it’s actually a healthy sign of a low blood content in the healthy hacker’s coffee stream. [Bharath] is among those who enjoy the caffeinated bean juice on a daily basis. However, he’d suffer from a terrible condition known as cold coffee. To combat this, he built an app-enabled, wirelessly chargeable, self-heating coffee mug.
We know that most hackers don’t start off planning to build objects with ridiculous feature lists, it just happens. Is there an alternate Murphy’s law for this? Any feature that can be added will? The project started off as some low ohm resistors attached to a rechargeable power bank. A insulated flask with a removable inner stainless steel lining was chosen. The resistors were fixed to the outside with a thermal epoxy.
However, how do we control the resistors? We don’t want to burn through our battery right away (which could end up more literally than one would like), so [Bharath] added a Linkit One microcontroller from Seeed Studio. With all this power at his disposal, it was natural to add Bluetooth, a temperature sensor, and app control to the cup.
After getting it all together, he realized that while the insides were perfectly isolated from the liquids held in the flask under normal use, the hole he’d have to cut to connect to the charging circuit would provide an unacceptable ingress point for water. To combat this he added the wireless charging functionality.
With his flask in hand, we’re sure the mood boost from not having to slog through the dregs of a cold container of coffee will produce a measureable improvement in productivity. Video after the break.
Continue reading “Hackaday Prize Entry: Wirelessly Charged Self-Heating Coffee Mug”
The folks at Q42 write code, lots of it, and this implies the copious consumption of coffee. In more primitive times, an actual human person would measure how many cups were consumed and update a counter on their website once a day. That had to be fixed, obviously, so they hacked their coffee machine so it publishes the amount of coffee being consumed by itself. Their Jura coffee machine makes good coffee, but it wasn’t hacker friendly at all. No API, no documentation, non-standard serial port and encrypted EEPROM contents. It seems the manufacturer tried every trick to keep the hackers away — challenge accepted.
The folks at Q42 found details of the Jura encryption protocol from the internet, and then hooked up a Raspberry-Pi via serial UART to the Jura. Encryption consisted of taking each byte and breaking it up in to 4 bytes, with the data being loaded in bit positions 2 and 5 of each of the 4 bytes, which got OR’ed into 0x5B. To figure out where the counter data was stored by the machine in the EEPROM, they took a data dump of the contents, poured a shot of coffee, took another memory dump, and then compared the two.
Once they had this all figured out, the Raspberry-Pi was no longer required, and was replaced with the more appropriate Particle Photon. The Photon is put on a bread board and stuck with Velcro to the back of the coffee machine, with three wires connected to the serial port on the machine.
If you’d like to dig in to their code, checkout their GitHub repository. Seems the guys at Q42 love playing games too – check out 0h h1 and 0h n0.
Thanks [Max] for letting us know about this.
Do you love coffee? Of course you do. Do you sometimes wish you could drink coffee instead of water? Do you want to void the warranty on your hot water heater? Yes? Well, then we have the hack for you!
A Norweigan science show called Ikke gjør dette hjemme (Do Not Try This at Home) decided it would be fun to see what would happen if you turned your hot water heater into a giant coffee machine. They didn’t put much effort into the conversion, in fact, they just opened up the tank and poured copious amounts of instant coffee into the tank. But they did it, and that saves us from wondering if it’s possible. Spoiler: It is.
Stick around after the break to see the water run brown — in a good way.
Continue reading “Coffee Straight From The Tap”
[Stian] thought it would be nice if his coworkers could be electronically notified when the latest batch of coffee is ready. He ended up building an inexpensive coffee alarm system to do exactly that. When the coffee is done, the brewer can press a giant button to notify the rest of the office that it’s time for a cuppa joe.
[Stian’s] first project requirement was to activate the system using a big physical button. He chose a button from Sparkfun, although he ended up modifying it to better suit his needs. The original button came with a single LED built-in. This wasn’t enough for [Stian], so he added two more LEDs. All three LEDs are driven by a ULN2003A NPN transistor array. Now he can flash them in sequence to make a simple animation.
This momentary push button supplies power to a ESP8266 microcontroller using a soft latch power switch. When the momentary switch is pressed, it supplies power to the latch. The latch then powers up the main circuit and continues supplying power even when the push button is released. The reason for this power trickery is to conserve power from the 18650 li-on battery.
The core functionality of the alarm uses a combination of physical hardware and two cloud-based services. The ESP8266 was chosen because it includes a built-in WiFi chip and it only costs five dollars. The microcontroller is configured to connect to the WiFi network with the push of a button. The device also monitors the giant alarm button.
When the button is pressed, it sends an HTTP request to a custom clojure app running on a cloud service called Heroku. The clojure app then stores brewing information in a database and sends a notification to the Slack cloud service. Slack is a sort of project management app that allows multiple users to work on projects and communicate easier over the internet. [Stian] has tapped into it in order to send the actual text notification to his coworkers to let them know that the coffee is ready. Be sure to watch the demo video below. Continue reading “Alarm Notifies the Office When the Coffee is Ready”
Last weekend saw the announcement of ProxyHam, a device that anonymizes Internet activity by jumping on WiFi from public libraries and cafes over a 900MHz radio link. The project mysteriously disappeared and was stricken from the DEFCON schedule. No one knows why, but we spent some time speculating on that and on what hardware was actually used in the undisclosed build.
[Samy Kamkar] has just improved on the ProxyHam concept with ProxyGambit, a device that decouples your location from your IP address. But [Samy]’s build isn’t limited to ProxyHam’s claimed two-mile range. ProxyGambit can work anywhere on the planet over a 2G connection, or up to 10km (6 miles) away through a line-of-sight point to point wireless link.
The more GSM version of ProxyGambit uses two Adafruit FONA GSM breakout boards, two Arduinos, and two Raspberry Pis. The FONA board produces an outbound TCP connection over 2G. The Arduino serves as a serial connection over a reverse TCP tunnel and connects directly to the UART of a Raspberry Pi. The Pi is simply a network bridge at either end of the connection. By reverse tunneling a TCP connection through the ‘throwaway’ part of the build, [Samy] can get an Internet connection anywhere that has 2G service.
Although it’s just a proof of concept and should not be used by anyone who actually needs anonymity, the ProxyGambit does have a few advantages over the ProxyHam. It’s usable just about everywhere on the planet, and not just within two miles of the public WiFi access point. The source for ProxyGambit is also available, something that will never be said of the ProxyHam.
We’re no stranger to coffee roasting hacks, but it’s been a while since we’ve seen a new DIY roaster design. Thankfully [Larry] has been hacking together a small-batch roaster with a bunch of off-the-shelf parts. He was originally trying to make a fully-automated roasting system, but after a bunch of failed prototypes, he settled on a simple roaster design that works great.
[Larry]’s roaster is designed for small batches of coffee (about 3oz). He has a small hopper with a motorized auger (cannibalized from a chocolate fountain) which drops coffee down into his roasting basket. The basket is mounted to a cordless screwdriver which rotates it to agitate the beans inside. A small camp stove provides the heat, which is placed right under the basket. The beans churn around in the roasting basket and heat up until they reach the desired roast level (typically between first and second crack).
Once the roasting is complete, another hand drill rotates the basket assembly to dump out the coffee. [Larry]’s build includes an assortment of knobs and switches which control the auger, basket speed, bean dumping, and even a “speedometer” gauge that shows how fast the basket is rotating. Want to build your own roaster? Check out the instructions for building [Larry]’s roaster or some other builds we’ve featured before.