Remember Your Birthday For Fifty Years

Our Coin Cell Challenge competition has turned up some amazing entries, things that we wouldn’t have thought possible from such meagre power sources. Take [Vishnu M Aiea]’s entry for instance, a device which he claims can light up as a birthday reminder every year for up to fifty years.

At its heart is a modified Arduino Nano clone that draws a measured 608 nA from a CR2450N. From the specification of the cell he has calculated the 50 year maximum figure, as well as a possible 29 years for a CR2032 and 64 years for a CR2477. He does however note that this does not take self-discharge into account, but you can probably afford a new battery in a decade or so.

The Arduino clone carefully selected for its “P” version low-power processor has had its serial bridge IC removed to achieve this power consumption, as well as a voltage regulator and some discrete components. Interestingly he notes that the ATMega168P is even more frugal than its 328 cousin, so he’s used the former chip. A selection of internal flags are set for minimal power consumption, and the internal oscillator is selected to use as low a clock speed as possible. There is an Intersil ISL1208 low power RTC chip mounted on a piece of stripboard to provide the timing, and of course an LED to provide the essential birthday alert.

When the LED lights for the big day there’s always the hope you’ll receive another coin cell, this time powering an edge-lit musical birthday card.

 

Win Big Prizes With Repairs You Can Print

Another month, another contest, and this time we’re looking for the best 3D printed repairs you’ve built.

The Repairs You Can Print Contest on Hackaday.io is a challenge to show off the real reason you bought a 3D printer. We want to see replacement parts, improved functionality, or a tool or jig that made a tough repair a snap. Think of this as the opposite of printing low poly Pokemon or Fallout armor. This is a contest to demonstrate the most utilitarian uses of a 3D printer. Whether you fixed your refrigerator, luggage, jet engine, vacuum cleaner, bike headlight, or anything else, we want to see how you did it!

The top twenty projects in the Repairs You Can Print contest will be rewarded with $100 in Tindie credit. That’s a Benjamin to spend on parts, upgrades, and components to take your next project to the next level!

Students and Organizations Can Win Big

The Best Student and Best Organization will win a Prusa i3 MK3!

This contest is open to everyone, but we’re also looking for the best projects to come from students and hackerspaces. We’ll be giving away two amazing 3D printers to the best Student entry and best Organization entry. These two top projects will be awarded an Original Prusa i3 MK3 with the Quad Material upgrade kit. This is one of the finest 3D printers you can buy right now, and we’re giving these away to the best student, hackerspaces, robotics club, or tool lending library.

If you have a project in mind, head on over to Hackaday.io and create a project demonstrating your 3D printed repair!

What is This Contest All About?

This contest is all about Repairs You Can Print, but what does that actually mean? Instead of printing Pokemon or plastic baubles on your desktop CNC machine, we’re looking for replacement parts. We’re looking for commercial, off the shelf items that were broken, but repaired with the help of a 3D printer. Is your repair good enough to show off as part of the contest? Yes! That’s the point, we want to see the clever repair jobs that people often don’t spend much time talking about because they just work.

Need some examples? Sure thing.

A while back, [Elliot Williams], one of the fantastic Hackaday Editors, had a broken vacuum cleaner. The wheels were crap, but luckily they were designed as a single part that snaps into a swivel socket. Over six or so years, the original wheels in this vacuum gave out, but a replacement part was quickly printed and stuffed into the socket. The new wheels have been going strong for a year now. That’s an entire year of use for a vacuum for five cents worth of plastic and an hour’s worth of printing time.

Need another example? My suitcase was apparently dragged behind a luggage cart for miles at either ORD or PHL. When it arrived on the baggage carousel, one wheel was shredded, and the wheel mount was ground down to almost the axle. The rest of the bag was still good, and I just removed the old wheel, salvaged the bearings, and printed a new wheel out of PLA. This suitcase has now traveled 60,000 miles with a 3D printed wheel, and it’s only now looking worse for wear.

How To Get In On The Action

We’re looking for the best repairs, jigs, and tools you’ve ever printed. To get started, head on over to Hackaday.io, create a new project, and document your repair. The Repairs You Can Print contest will run from Tuesday, January 16th, 2018 through 12 PM PST Tuesday, February 20th, 2018. Here’s a handy count down timer for ‘ya.

Miss Beatrice Shilling Saves The Spitfire

On a bright spring morning in 1940, the Royal Air Force pilot was in the fight of his life. Strapped into his brand new Supermarine Spitfire, he was locked in mortal combat with a Luftwaffe pilot over the English Channel in the opening days of the Battle of Britain. The Spitfire was behind the Messerschmitt and almost within range to unleash a deadly barrage of rounds from the four eight Browning machine guns in the leading edges of the elliptical wings. With the German plane just below the centerline of the gunsight’s crosshairs, the British pilot pushed the Spit’s lollipop stick forward to dive slightly and rake his rounds across the Bf-109. He felt the tug of the harness on his shoulders keeping him in his seat as the nimble fighter pulled a negative-g dive, and he lined up the fatal shot.

But the powerful V-12 Merlin engine sputtered, black smoke trailing along the fuselage as the engine cut out. Without power, the young pilot watched in horror as the three-bladed propeller wound to a stop. With the cold Channel waters looming in his windscreen, there was no time to restart the engine. The pilot bailed out in the nick of time, watching his beautiful plane cartwheel into the water as he floated down to join it, wondering what had just happened.

Continue reading “Miss Beatrice Shilling Saves The Spitfire”

You’ll Really Want An “Undo” Button When You Accidentally Send A Ballistic Missile Warning

Hawaiians started their weekend with quite a fright, waking up Saturday morning to a ballistic missile alert that turned out to be a false alarm. In between the public anger, profuse apologies from officials, and geopolitical commentary, it might be hard to find some information for the more technical-minded. For this audience, The Atlantic has compiled a brief history of infrastructure behind emergency alerts.

As a system intended to announce life-critical information when seconds count, all information on the system is prepared ahead of time for immediate delivery. As a large hodgepodge linking together multiple government IT systems, there’s no surprise it is unwieldy to use. These two aspects collided Saturday morning: there was no prepared “Sorry, false alarm” retraction message so one had to be built from scratch using specialized equipment, uploaded across systems, and broadcast 38 minutes after the initial false alarm. In the context of government bureaucracy, that was really fast and must have required hacking through red tape behind the scenes.

However, a single person’s mistake causing such chaos and requiring that much time to correct is unacceptable. This episode has already prompted a lot of questions whose answers will hopefully improve the alert system for everyone’s benefit. At the very least, a retraction is now part of the list of prepared messages. But we’ve also attracted attention of malicious hackers to this system with obvious problems in design, in implementation, and also has access to emergency broadcast channels. The system needs to be fixed before any more chaotic false alarms – either accidental or malicious – erode its credibility.

We’ve covered both the cold-war era CONELRAD and the more recent Emergency Broadcast System. We’ve also seen Dallas’ tornado siren warning system hacked. They weren’t the first, they won’t be the last.

(Image: Test launch of an unarmed Minuteman III ICBM via US Air Force.)

New Part Day: MEMS Loudspeakers

MEMS, or Micro ElectroMechanical Systems, are the enabling technology that brings us smartphones, quadcopters, tire pressure monitors, and a million other devices we take for granted today. At its most basic level, MEMS is simply machining away silicon wafers to make not electronic parts, but electromechanical parts. The microphone in your cell phone isn’t an electret mic you would find in an old brick phone from the 80s — it’s a carefully crafted bit of silicon, packed in epoxy, and hanging off a serial bus.

Despite the incredible success of MEMS technology, there is still something in your smartphone that’s built on 19th-century technology. Loudspeakers haven’t changed ever, and the speaker in your newest iThing is still a coil of wire and some sort of cone.

Now there’s finally a MEMS loudspeaker A company called USound has developed the first loudspeaker that isn’t just a bunch of wire and a magnet. This is a speaker built from a silicon wafer that can be as small as 3 mm square, and as thin as 1 mm. Since these speakers are built on silicon, you can also add an amp right onto the package. This is quite literally a speaker on a chip, and we’d bet that there are already engineers at Samsung looking at stuffing this into a flagship phone.

ST and USound announced these extraordinarily small speakers would actually be made, but so far it’s been just that — an announcement. This changed at CES where ST demonstrated VR goggles with multiple MEMS speakers. Does this mean MEMS speakers are on their way to Mouser and Digikey? We eagerly await the product announcement and demo dev board kit.

Raspberry Pi Offers Soulless Work Oversight

If you’re like us, you spend more time than you care to admit staring at a computer screen. Whether it’s trying to find the right words for a blog post or troubleshooting some code, the end result is the same: an otherwise normally functioning human being is reduced to a slack-jawed zombie. Wouldn’t it be nice to be able to quantify just how much of your life is being wasted basking in the flickering glow of your monitor? Surely that wouldn’t be a crushingly depressing piece of information to have at the end of the week.

With the magic of modern technology, you need wonder no longer. Prolific hacker [dekuNukem] has created the aptly named “facepunch”, which allows you to “punch in” with nothing more than your face. Just sit down in front of your Raspberry Pi’s camera, and the numbers start ticking away. It’s like the little clock in the front of a taxi: except at the end you don’t have to pay anyone, you just have to come to terms with what your life has become. So that’s cool.

It doesn’t take much hardware to play along at home. All you need is a Raspberry Pi and the official camera accessory. Though for the full effect you should add one of the displays supported by the Luma.OLED driver so you can see the minutes and hours ticking away in real-time.

To get the facial recognition going, all you need to do is take a well-lit picture of your face and save it as a 400×400 JPEG. The Python 3 script will take care of the rest: checking the frames from the camera every few seconds to see if your beautiful mug is in the frame, and incrementing the counters accordingly.

Even if you’re not in the market for an Orwellian electronic supervisor, this project is a great example to get you started in the world of facial recognition. With a little luck, you’ll be weaponizing it in no time.

Fooling Speech Recognition With Hidden Voice Commands

It’s 2018, and while true hoverboards still elude humanity, some future predictions have come true. It’s now possible to talk to computers, and most of the time they might even understand you. Speech recognition is usually achieved through the use of neural networks to process audio, in a way that some suggest mimics the operation of the human brain. However, as it turns out, they can be easily fooled.

The attack begins with an audio sample, generally of a simple spoken phrase, though music can also be used. The desired text that the computer should hear instead is then fed into an algorithm along with the audio sample. This function returns a low value when the output of the speech recognition system matches the desired attack phrase. The input audio file is gradually modified using the mathematics of gradient descent, creating a result that to a human sounds like one thing, and to a machine, something else entirely.

The audio files are available on the site for your own experimental purposes. In a noisy environment with poor audio coupling between speakers and a Google Pixel, results were poor – OK Google only heard the human phrase, not the encoded attack phrase. Given that the sound quality was poor, and the files were generated with a different speech model, this is not entirely surprising. We’d love to hear the results of your experiments in the comments.

It’s all a part of [Nicholas]’s PhD studies around the strengths and pitfalls of neural networks. It highlights the fact that neural networks don’t always work in the way we think they do. Google’s Inception is susceptible to similar attacks with images, as we’ve seen recently.

[Thanks to Wolfgang for the tip!]