Surfing Like It’s 1998, The Dreamcast’s Still Got It!

If you were a keen console gamer at the end of the 1990s, the chances are you lusted after a Sega Dreamcast. Here was a console that promised to be like no other, a compact machine with built-in PowerVR 3D acceleration (heavy stuff back then!), the ability to run Windows CE in some form, and for the first time, built-in Internet connectivity. Games would no longer be plastic cartridges as they had been on previous Sega consoles, instead they would come on a proprietary DVD-like Sega disc format.

It was a shame then that the Dreamcast never really succeeded in capitalizing on its promise. Everyone was talking about the upcoming Sony Playstation 2, and disappointing Dreamcast sales led Sega to withdraw both the console, and themselves from the hardware market entirely.

There remains a hard core of Dreamcast enthusiasts though, and they continue to push the platform forward.The folks at the Dreamcast Junkyard decided to go backwards a little when they resurrected the console’s dial-up modem to see whether a platform from nearly twenty years ago could still cut it in 2017. This isn’t as easy a task as you’d imagine, because, well, who uses dial-up these days? Certainly in the UK where they’re based it’s almost unheard of. They were able to find a pay-as-you go dial-up provider though, and arming themselves with the most recent Dreamkey V3.0 browser disc were able to get online.

As you might expect, the results are hilariously awful for the most part. Modern web sites that rely on CSS fail to render or even indeed to load, but retro sites like those in the Dreamcast community appear as they should. There is a video we’ve put below the break showing the rather tortuous process, though sadly they didn’t think to load the Hackaday Retro Edition. It does however feature the rarely-seen keyboard and mouse accessories.

Continue reading “Surfing Like It’s 1998, The Dreamcast’s Still Got It!”

How An Oscilloscope Probe Works, And Other Stories

The oscilloscope is probably the most versatile piece of test equipment you can have on your electronics bench, offering a multitude of possibilities for measuring timing, frequency and voltage as well as subtleties in your circuits revealed by the shape of the waveforms they produce.

On the front of a modern ‘scope is a BNC socket, into which you can feed your signal to be investigated. If however you simply hook up a co-axial BNC lead between source and ‘scope, you’ll immediately notice some problems. Your waveforms will be distorted. In the simplest terms your square waves will no longer be square.

Why is this? Crucial to the operation of an oscilloscope is a very high input impedance, to minimise current draw on the circuit it is investigating. Thus the first thing that you will find behind that BNC socket is a 1 megohm resistor to ground, or at least if not a physical resistor then other circuitry that presents its equivalent. This high resistance does its job of presenting a high impedance to the outside world, but comes with a penalty. Because of its high value, the effects of even a small external capacitance can be enough to create a surprisingly effective low or high pass filter, which in turn can distort the waveform you expect on the screen.

The answer to this problem is to be found in your oscilloscope probe. It might seem that the probe is simply a plug with a bit of wire to a rigid point with an earth clip, but in reality it contains a simple yet clever mitigation of the capacitance problem.

Continue reading “How An Oscilloscope Probe Works, And Other Stories”

Mechanical Music Maker Throws Stones

When we think of a xylophone we envision hitting the keys from above with mallets. But this robot instrument launches stones from below to play a tune. [Niel] calls the device a Pinger and it is part of a Rock Band — all instruments using rocks.

Although the original post has “xylophone” in it, this musical instrument is technically a glockenspiel because it uses metal keys instead of wood. Either way, it’s a work of art; the instrument’s creator ([Neil Mendoza]) was participating in Adobe’s Autodesk’s Pier 9 artist-in-residence program when he built it.

The keys were cut using a water jet, a process not easily in reach for most of us. But you could make do with a different process in a pinch. On the face of it, fabrication seems simple, but there’s software to calculate the right size for the keys depending on the material. The cuts need to be precise to yield an in-tune instrument.

The circular part is laser-cut acrylic, acting as a base for each key. Below the plate there is a cylinder positioned in the middle of the bar which keeps the stone from getting away. When the solenoid fires, the stone flies up and strikes the key, creating a ringing tone but also adding to the body of sound with a rattle when it falls back down to the base. The entire thing is driven by MIDI, so it can play a lot of tunes besides the biographical “Here Comes the Sun” (since, apparently, the pebbles are out in the sun). Check that out in the video below.

This couldn’t help but remind us of another solenoid-driven xylophone — whose keys were machined out of aluminum stock. There’s also the multixylophoniomnibus.

Continue reading “Mechanical Music Maker Throws Stones”

This WAV File Can Confuse Your Fitbit

As the devices with which we surround ourselves become ever more connected to the rest of the world, a lot more thought is being given to their security with respect to the internet. It’s important to remember though that this is not the only possible attack vector through which they could be compromised. All devices that incorporate sensors or indicators have the potential to be exploited in some way, whether that is as simple as sniffing the data stream expressed through a flashing LED, or a more complex attack.

Researchers at the University of Michigan and the University of South Carolina have demonstrated a successful attack against MEMS accelerometers such as you might find in a smartphone. They are using carefully crafted sound waves, and can replicate at will any output the device should be capable of returning.

MEMS accelerometers have a microscopic sprung weight with protruding plates that form part of a set of capacitors. The displacement of the weight due to acceleration is measured by looking at the difference between the capacitance on either side of the plates.

The team describe their work in the video we’ve put below the break, though frustratingly they don’t go into quite enough detail other than mentioning anti-aliasing. We suspect that they vibrate the weight such that it matches the sampling frequency of the sensor, and constantly registers a reading at a point on its travel they can dial in through the phase of their applied sound. They demonstrate interference with a model car controlled by a smartphone, and spurious steps added to a Fitbit. The whole thing is enough for the New York Times to worry about hacking a phone with sound waves, which is rather a predictable overreaction that is not shared by the researchers themselves.

Continue reading “This WAV File Can Confuse Your Fitbit”