Hard Disk Drives Have Made Precision Engineering Commonplace

Modern-day hard disk drives (HDDs) hold the interesting juxtaposition of being simultaneously the pinnacle of mass-produced, high-precision mechanical engineering, as well as the most scorned storage technology. Despite being called derogatory names such as ‘spinning rust’, most of these drives manage a lifetime of spinning ultra-smooth magnetic storage platters only nanometers removed from the recording and reading heads whose read arms are twitching around using actuators that manage to position the head precisely above the correct microscopic magnetic trace within milliseconds.

Despite decade after decade of more and more of these magnetic traces being crammed on a single square millimeter of these platters, and the simple read and write heads being replaced every few years by more and more complicated ones, hard drive reliability has gone up. The second quarter report from storage company Backblaze on their HDDs shows that the annual failure rate has gone significantly down compared to last year.

The question is whether this means that HDDs stand to become only more reliable over time, and how upcoming technologies like MAMR and HAMR may affect these metrics over the coming decades.

Continue reading “Hard Disk Drives Have Made Precision Engineering Commonplace”

Teleconferencing Like It’s 1988: Connecting Vintage Hardware To Zoom

Hang up your car phone and toss that fax machine in the garbage. Even back in the late 80s it was possible to do away with these primitive technologies in favor of video conferencing, even though this technology didn’t catch on en masse until recently. In fact, Mitsubishi released a piece of video conferencing equipment called the VisiTel that can be put to use today, provided you can do a bit of work to get it to play along nicely with modern technology.

[Alex] was lucky enough to have one of these on hand, as soon as it was powered up he was able to get to work deciphering the messaging protocol of the device. To do this he showed the camera certain pictures with known properties and measured the output waveforms coming from the device, which were AM modulated over an RJ9 connection which he had changed to a 3.5 mm headphone jack.

It communicates in a series of pictures instead of sending an actual video signal, so [Alex] had a lot of work to do to properly encode and decode the stream. He goes into incredible detail on his project page about this process and is worth a read for anyone interested in signal processing. Ultimately, [Alex] was able to patch this classic piece of technology into a Zoom call and the picture quality is excellent when viewed through the lens of $399 80s technology.

We have been seeing a lot of other hacks around video conferencing in the past six months as well, such as physical mute buttons and a mirror that improves eye contact through the webcam.

Displaying Incoming Server Attacks By Giving Server Logs A Scoreboard

In the server world, it’s a foregone conclusion that ports shouldn’t be exposed to the greater Internet if they don’t need to be. There are malicious bots everywhere that will try and randomly access anything connected to a network, and it’s best just to shut them off completely. If you have to have a port open, like 22 for SSH, it’ll need to be secured properly and monitored so that the administrator can keep track of it. Usually this is done in a system log and put to the side, but [Nick] wanted a more up-front reminder of just how many attempts were being made to log into his systems.

This build actively monitors attempts to log into his server on port 22 and notifies him via a numerical display and series of LEDs. It’s based on a Raspberry Pi Zero W housed in a 3D-printed case, and works by interfacing with a program called fail2ban running on the server. fail2ban‘s primary job is to block IP addresses that fail a certain number of login attempts on a server, but being FOSS it can be modified for situations like this. With some Python code running on the Pi, it is able to gather data fed to it from fail2ban and display it.

[Nick] was able to see immediate results too. Within 24 hours he saw 1633 login attempts on a server with normal login enabled, which was promptly shown on the display. A video of the counter in action is linked below. You don’t always need a secondary display if you need real-time information on your server, though. This Pi server has its own display built right in to its case.

Continue reading “Displaying Incoming Server Attacks By Giving Server Logs A Scoreboard”