Metronome Flashes And Vibrates To The Beat

Annoying though they can be, if you play any kind of instrument, you will definitely benefit from using a metronome. While many of them thock or otherwise tock, the VRRVRR metronome from [Turi] works a little differently.

In addition to flashing LEDs, the VRRVRR contains a small vibrating motor. If you’re wondering about the name, it comes from the fact that it vibrates and makes a sort of vrr vrr sound. Need to be quiet? A small switch on the side shuts off the vibrations.

The 4×4 keypad really allowed [Turi] to cram in a bunch of features using both short and long press to do different things. On short press, the digits set the tempo. When not typing in a tempo, zero can be used to enter a tempo by tapping. The letters load preset tempos, and the +/- keys increase and decrease it.

Inside the basswood enclosure is a Raspberry Pi Pico, the vibration motor, and various other bits and bobs that make it go. There’s even an LED to indicate that it’s time to charge the lithium battery. If you want to build your own, head on over to GitHub, but be sure to take the brief VRRVRR tour after the break.

We don’t see too many metronomes around here, but we do have this nice teardown to offer you.

Continue reading “Metronome Flashes And Vibrates To The Beat”

House Training A Military TA-1024A Field Telephone

After spotting some interesting military phones at a museum, [CuriousMarc] wondered what it would take to retrofit these heavy duty pieces of telecom equipment for civilian use. He knew most of the internals would be a lost cause, but reasoned that if he could reverse engineer key elements such as the handset and keypad, he might be able to connect them to the electronics of a standard telephone. Luckily for us, he was kind enough to document the process.

There were a number of interesting problems that needed to be solved, but the first and perhaps largest of them was the unusual wiring of the keypad. It wasn’t connected in the way modern hackers like us might expect, and [CuriousMarc] had to end up doing some pretty significant rewiring. By cutting the existing traces on the PCB with a Dremel and drilling new holes to run his wires around the back, he was able to convert it over to a wiring scheme that contemporary touch tone phones could use.

An adapter needed to be fabricated to mount a basic electret microphone in place of the original dynamic one, but the original speaker was usable. He wanted to adapt the magnetic sensor that detected when the handset was off the hook, but in the end it was much easier to just drill a small hole and use a standard push button.

The main board of the phone is a perfect example of the gorgeous spare-no-expense construction you’d expect from a military communications device, but unfortunately it had to go in the bin. In its place is the guts of a lowly RCA phone that was purchased for the princely sum of $9.99. [CuriousMarc] won’t be able to contact NORAD anymore, but at least he’ll be able to order a pizza. The red buttons on the keypad, originally used to set the priority level of the call on the military’s AUTOVON telephone network, have now been wired to more mundane features of the phone such as redial.

While this is fine for a one-off project, we’d love to see a drop-in POTS or VoIP conversion for these phones that didn’t involve so much modification and rewiring. Now that we have some documentation for things like the keypad and hook sensor, it shouldn’t be hard to take their idiosyncrasies into account with a custom PCB. Dragging vintage gear into the modern era is always a favorite pastime for hackers, so maybe somebody out there will be inspired to take on the challenge.

Continue reading “House Training A Military TA-1024A Field Telephone”

Simple Keypad Scanning With SPI And Some Hardware

16-button keypads have a clever method of encoding their data into 8 pins. Pins are mapped to four rows and four columns on the keypad. A user reads the keypad by bringing each row up to logic: HIGH, and reading the corresponding column values, (HIGH or LOW). Keypad scanning can be farmed out to a microcontroller with a simple finite-state machine and some button debouncing techniques. [Mario], [Glen], and [Paul] on the Netduino forums took an entirely different route: they’ve designed and implemented a Keypad Scanner using any microcontrollers SPI peripheral and a 74HC595 Shift register.

The trio’s solution is an elegant adventure into circuit design. With two diodes and a voltage divider, they devise a simple circuit that pulls the SPI MISO line LOW if a button in the corresponding circuit’s row is pushed closed. Copied four-fold, this circuit joins the rows and columns of the 74HC595 to the keypad matrix. To scan across the four columns, the microcontroller performs an SPI transfer of the key value: 0x01. To decode which button is pushed, the value received back from the SPI bus encodes which button was pushed out of the 16 possible buttons. Note: some cases for ambiguity as to “which button was pressed” do exist if multiple buttons are pushed at the same time, but for the general case where we’re punching in values one-by-one, this circuit works perfectly.

The team’s hack is a clever use of existing hardware to outsource a microcontroller’s software problem to hardware while leveraging the SPI peripheral to cleverly decrypt and retrieve data back from the keypad. Kudos to the team of three over at the Netduino Forums, and we’re always thrilled to see and idea grow from one person to the next. In case you want to take a step lower and build up the keypad itself, here’s a blast from the past that does just that.

Modular Security System Is Portable Too

diy_security_system

Hackaday reader [Oneironaut] wrote in to share a modular, portable security system he built for himself.

He likes visiting the Caribbean, but his favorite vacation spot is apparently rife with cat burglars. He enjoys sleeping with the windows open and wanted to find a way to scare off ne’er do wells. At home, there are a few different buildings on the property he owns, and he was looking to keep curious trespassers away.

The alarm system was built using a matrix keypad that interfaces with an ATMega88 micro controller. The micro controller handles all the logic for the system, triggering an attached “pocket alarm” when ever the sensor is tripped. Like most household alarms, it is armed and disarmed via the keypad, giving the user 60 seconds to enter the disarm code if the alarm has been mistakenly tripped. A wide array of trigger methods can be used, from mercury switches to motion detectors, since his alarm uses a simple plug interface that accepts any two-wire sensor.

Now, no one is claiming that this is high security by any means – the alarm addresses a couple of specific scenarios that apply to [Oneironaut], which may also be applicable to others out there. At the end of the day, the alarm is more meant to scare an intruder into fleeing than anything else, and in that respect, it works perfectly.

Continue reading to see a quick video demonstration of his alarm system in action.

Continue reading “Modular Security System Is Portable Too”