When [Bunny] moved into his apartment in Singapore he was surprised to find that a huge building project was just getting started on the other side of the block. Being the curious sort, he was always interested in what was going on, but just looking in on the project occasionally wasn’t enough. Instead, he set up a camera and made a time-lapse video.
This isn’t hard, you can find a slew of intervalometer projects which we’ve covered over the years. But being that [Bunnie] is one of the designers of the Chumby One, and frequently performs hacks on the hardware, it’s no surprise that he chose to use that hardware for the project.
Luckily, he’s sharing the steps he used to get Chumby capturing images. He mentions the hardest part is finding a compatible USB camera. If you have one that works with a 2008 Linux kernel you should be fine. The rest is done with shell scripts. Mplayer captures the images when the script is called from a cron job. Once all the frames are captured, he used mencoder to stitch the JPEGs into a movie. See the result after the break.
Continue reading “[Bunnie] mods Chumby to capture epic time-lapse video”
A few years back [Bunnie] took a crack at cracking the security fuses on a PIC microcontroller. Like most of the common 8-bit microcontrollers kicking around these days, the 18F1320 that he’s working with has a set of security fuses which prevent read back of the flash memory and EEPROM inside. The only way to reset those security fuses is by erasing the entire chip, which also means the data you sought in the first place would be wiped out. That is, if you were limited to using orthodox methods.
[Bunnie] had a set of the chips professionally uncapped, removing the plastic case without damaging the silicon die inside. He set to work inspecting the goodies inside with an electron microscope and managed to hammer out a rudimentary map of the layout. Turns out that flash memory can be erased with ultraviolet light, just like old EPROM chips. Microchip thought of that and placed some shielding over the security fuses to prevent them being reset in this manner. But [Bunnie] managed to do so anyway, creating an electrical tape mask to protect the rest of the data stored in the chip while bouncing UV light underneath the shielding at an angle.
Want to uncap some chips of your own without enlisting the help of others? Give this method a try.
[via Dangerous Prototypes]
[bunnie] is one of the main people behind the Chumby, and even he can’t resist modding the things. He decided to outfit one with a larger LCD – using a stereo microscope to do the really fine pitch work – and a laser cutter to create a custom bezel for the finished piece. The new LCD is still a touchscreen and allows the Chumby to display 640×480 resolution over the stock 320×240. The mod requires a few parts, but the ultimate difficulty is caused by the surface mount connectors. If you’d rather have some software fun, you might want to check out [bunnie]’s Chumby wifi sniffer.
[Bunnie] was at Burning Man this year, and to illuminate his camp members in the dark and dusty nights of the playa, he created a blinky badge. This isn’t just any badge stuffed with RGB LEDs; each of the badges were unique by the end of Burning Man. These badges were made unique not by twiddling dials or pressing buttons; all the color patterns were bred with badge sex.
This social experiment to replicate nature’s most popular means of creating more nature is built around a peer to peer radio. Each badge is equipped with a radio, a circle of RGB LEDs, and a bit of code that expresses the pattern of lights on the badge as a sequence of genes. When one badge gives consent to another badge, they ‘breed’, creating a new pattern of lights. If you’re wondering about the specifics of the act, each badge is a hermaphrodite, and each badge transmits a ‘sperm’ to fertilize the other plant’s ‘egg’. There’s even a rare trait included in the genome of the badge; each badge has a 3% chance of having a white pixel that moves around the circle of LEDs. [Bunnie] found this trait was more common after a few days, suggesting that people were selectively breeding their badges.
Of course, finding potential mates is a paramount concern for any sexual organism, and the sex badge has this covered, too. The 900MHz radio listens for other badges in close proximity, and when any are found their owners are displayed on an OLED display. This came in handy for [Bunnie] more than a few times – there’s no phones out there, and simply knowing your friends are within a hundred meters or so is a big help.
The entire badge platform is documented online, along with the code and spec for badge genes. Badges with some sort of wireless communication have been around for a while, but this is the first time that communication has been used for something more than sharing contact information or implementing a chat room. It’s a great idea, and something we hope to see more of in future con badges.
Last weekend was the Open Hardware Summit in Philadelphia, and the attendees were nearly entirely people who build Open Source Hardware. The definition of Open Source Hardware has been around for a while, but without a certification process, the Open Hardware movement has lacked the social proof required of such a movement; there is no official process to go through that will certify hardware as open hardware, and there technically isn’t a logo you can slap on a silkscreen layer that says your project is open hardware.
Now, the time has come for an Open Hardware Certification. At OHSummit this weekend, the Open Source Hardware Association (OSHWA) announced the creation of a certification process for Open Source Hardware.
Continue reading “Open Source Hardware Certification Announced”
Kickstarter started out as a platform for group buys, low-volume manufacturing, and a place to fund projects that would otherwise go unfinished. It would be naive of anyone to think this would last forever, and since these humble beginnings, we’re well into Peak Kickstarter. Now, Kickstarter, Indiegogo, and every other crowdfunding platform is just another mouthpiece for product launches, and just another strategy for anyone who needs or wants money, but has never heard of a business loan.
Of course there will be some shady businesses trying to cash in on the Kickstarter craze, and over the last few years we’ve done our best to point out the bad ones. Finding every terrible Kickstarter is several full-time jobs, but we’ve done our best to weed out these shining examples of the worst. Following up on these failed projects is something we have been neglecting, but no longer.
Below are some of the most outrageous Kickstarters and crowdfunding campaigns we’ve run across, and the current status of these failed entrepreneurial endeavors.
Continue reading “Where Are They Now: Terrible Kickstarters”
Hackaday loves to spread the message of the hardware hacking lifestyle. That’s only possible where there are hardware hackers willing to spend their time getting together to talk the future of the hardware industry, and to celebrate where we are now. We’re honored that you came out en masse for our Shenzhen Workshop and Meetup!
Zero to Product
[Matt Berggren] has presented his Zero to Product workshop a few times now as part of our Hackaday Prize Worldwide series. This spring that included Los Angeles, San Francisco, and ten days ago it was Shezhen, China.
[Matt] leading Zero to Product workshop
Participants designing a PCB
All levels of experience are welcome
We partnered with MakerCamp, a week-long initiative that pulled in people from all over China to build a Makerspace inside of a shipping container. Successful in their work, the program then hosted workshops. The one caveat, Shenzhen in June is a hot and sticky affair. Luckly our friends at Seeed Studio were kind enough to open their climate-controlled doors to us. The day-long workshop explored circuit board design, using Cadsoft Eagle as the EDA software to lay out a development board for the popular ESP8266 module.
Continue reading “The Spirit of Hackaday Shines in Shenzhen”