The fastest remote-controlled airplane flight ever recorded took place in 2018, with a top speed of 545 miles/hour. That’s 877 km/h, or Mach 0.77!
What was the limiting factor, preventing the pilot-and-designer Spencer Lisenby’s plane from going any faster? The airstream over parts of the wing hitting the sound barrier, and the resulting mini sonic booms wreaking havoc on the aerodynamics. What kind of supercharged jet motor can propel a model plane faster than its wings can carry it? Absolutely none; the fastest RC planes are, surprisingly, gliders.
Dynamic soaring (DS) was first harnessed to propel model planes sometime in the mid 1990s. Since then, an informal international competition among pilots has pushed the state of the art further and further, and in just 20 years the top measured speed has more than tripled. But dynamic soaring is anything but new. Indeed, it’s been possible ever since there has been wind and slopes on the earth. Albatrosses, the long-distance champs of the animal kingdom, have been “DSing” forever, and we’ve known about it for a century.
DS is the highest-tech frontier in model flight, and is full of interesting physical phenomena and engineering challenges. Until now, the planes have all been piloted remotely by people, but reaching new high speeds might require the fast reaction times of onboard silicon, in addition to a new generation of aircraft designs. The “free” speed boost that gliders can get from dynamic soaring could extend the range of unmanned aerial vehicles, when the conditions are right. In short, DS is at a turning point, and things are just about to get very interesting. It’s time you got to know dynamic soaring.
Continue reading “Dynamic Soaring: 545 MPH RC Planes Have No Motor”
Nintendo wasn’t always in the videogames business. Long before Mario, the company was one of the foremost producers of Hanafuda playing cards in Japan. From 1930 until 1959, Nintendo ran its printing business from a four-story art deco style building that featured distinctive plaques at the front entrance. We now have a chance to print those former Nintendo HQ plaques at home thanks to [Mr. Talida] who shared some 3D models on Twitter. Talida, a self-described “retro video game archivist”, recreated the plaques via photogrammetry from a number of reference photos he took from a visit to the Kyoto site late last year.
These 3D models come at a crucial time as the old Nintendo HQ building, which sat dormant for years, is set to be turned into a boutique hotel next year. According to JPC, the hotel will feature twenty rooms, a restaurant, and a gym and is expected to be completed by summer 2021 (although that estimate was from the “before” times). The renovation is expected to retain as much of the original exterior’s appearance as possible, but the Nintendo plaques almost assuredly will not be included. For a first-person tour of the former Nintendo headquarters building, there is a video from the world2529 YouTube channel provided below.
It is encouraging to see examples of this DIY-style of historical preservation. Many companies have proven themselves to be less-than-stellar stewards of their own history. Though if his Twitter timeline is any indication, [Mr. Talida] is up to something further with this photogrammetry project. A video export exhibiting a fully textured 3D model of the old Nintendo headquarters’ entrance was published recently along with the words, “What have I done.”
Continue reading “3D Print A Piece Of Nintendo History Before The Real One Is Gone”
There is a scene from the movie RED (Retired, Extremely Dangerous) where Bruce Willis encounters a highly-secure door with a constantly changing lock code deep inside the CIA. Knowing the lock would be impossible to break, he simply destroyed the wall next to the door, reached through, and opened the door from the other side. We thought about that when we saw [raelize’s] hack to bypass the ESP32’s security measures.
Before you throw out all your ESP32 spy gadgets, though, be aware that the V3 silicon can be made to prevent the attack. V1 and V2, however, have a flaw that — if you know how to exploit it — renders secure boot and flash encryption almost meaningless.
Continue reading “ESP32 Vulnerability Affects Older Chips”