Virtual Reality Experiment Tricks Your Feet Into Walking While Sitting Down

The whole idea behind virtual reality is that you don’t really know what’s going on in the world around you. You only know what your senses tell you is there. If you can fake out your vision, for example, then your brain won’t realize you are floating in a tank providing power for the robot hordes. However, scientists in Japan think that you can even fool your feet into thinking they are walking when they aren’t. In a recent paper, they describe a test they did that combined audio cues with buzzing on different parts of the feet to simulate the feel of walking.

The trick only requires four transducers, two on each foot. They tested several different configurations of what the effect looked like in the participant’s virtual reality headgear. Tests were performed in third person didn’t cause test subjects to associate the foot vibrations with walking. But the first-person perspective caused sensations of walking, with a full-body avatar working the best, compared to showing just hands and feet or no avatar at all.

Making people think they are walking in VR can be tricky but it does explain how they fit all that stuff in a little holodeck. Of course, it is nice if you can also sense walking and use it to move your avatar, but that’s another problem.

Clay Pot MP3 Player Whipped Up With The Freedom-K64F

In the streaming era, few of us think about MP3s on a day to day basis anymore. Our music collection is managed by warring executives in streaming companies from far-off lands. However, for [vinod], they’re still useful — seeing as he just built himself an MP3 player that fits in a clay pot.

The build is based on the FRDMK64F development board, packing a powerful 120 MHz ARM chip. This has enough grunt to decode MP3s on the fly, using the Helix MP3 decoder library. The MP3s themselves are streamed off an SD card, using the faster SDIO access method rather than relying on slower SPI. Once decoded, the resulting PCM audio data is shifted out via a DAC using the chip’s DMA hardware, allowing for smooth, glitch-free playback. Output to a big woofer is via a 15 W class D amplifier, with the whole rig powered from a USB powerbank.

With all the electronics piled on the back of a big woofer speaker with lashings of hot glue, the final result is quite imposing; all the more so when installed neatly inside a clay pot acting as a bass reflex enclosure. We’ve seen some concrete cast speakers before, but not nearly enough hacker projects in clay. Please rectify this, and inform us once you’ve done so. Thanks in advance — video after the break!

Continue reading “Clay Pot MP3 Player Whipped Up With The Freedom-K64F”

Fail Of The Week: Mistaking Units For Values

Usually when we post a Fail Of The Week, it’s a heroic tale of a project made with the best of intentions that somehow failed to hit its mark. The communicator that didn’t, or the 3D-printed linkage that pushed the boundaries of squirted plastic a little bit too far. But today we’re bringing you something from a source that should be above reproach, thanks to [Boldport] bringing us a Twitter conversation between [Stargirl] and [Ticktok] about a Texas Instruments datasheet.

The SN65220 schematic
The SN65220 schematic

The SN65220 is a suppressor chip for USB ports, designed to protect whatever the USB hardware is from voltage spikes. You probably have several of them without realising it, the tiny six-pin package nestling on the PCB next to the USB connector. Its data sheet reveals that it needs a resistor network between it and the USB device it protects, and it’s this that is the source of the fail.

There are two resistors, a 15kO and a 27O, 15k ohms, and 270 ohms, right? Looking more closely though, that 27O is not 270 with a zero, but 27O with a capital “O”, so in fact 27 ohms.

The symbol for resistance has for many decades been an uppercase Greek Omega, or Ω. It’s understood that sometimes a typeface doesn’t contain Greek letters, so there is a widely used convention of using an uppercase “R” to represent it, followed by a “K” for kilo-ohms, an “M” for mega-ohms, and so on. Thus a 270 ohm resistor will often be written as 270R, and 270 kilo-ohm one as 270K. In the case of a fractional value the convention is to put the fraction after the letter, so for example 2.7kilo-ohms becomes 2K7. For some reason the editor of the TI datasheet has taken it upon themselves to use an uppercase “O” to represent “Ohms”, leading to ambiguity over values below 1 kilo-ohm.

We can’t imagine an engineer would have made that choice so we’re looking towards their publishing department on this one, and meanwhile we wonder how many USB devices have gone to manufacture with a 270R resistor in their data path. After all, putting the wrong resistor in can affect any of us.

Hack The Cloud!

The obvious rants against software or services “in the cloud” are that you don’t own it, your data isn’t on your own hard drive, or that, when the interwebs are down, you just can’t get your work done. But the one that really grinds my gears is that, at least for many cloud services, you just can’t play around with them. Why does that matter? Well, as a hacker type, of course, I like to fool around, but more deeply, I feel that this invitation to play around is what’s going to grow up the next generation of hackers. Openness matters not just for now, but also for the future.

Of course, it’s unfair to pin all of this on the cloud. There are plenty of services with nice open APIs that let you play around with their systems as much as you want — witness the abundance of amusing things you can do with Twitter or Twitch. Still, every day seems to bring another formerly-open API that gets bought up by some wealthy company and shut down. I built a nice “is it going to rain today” display out of a meter-long WS2812 strip and an ESP8266, but Dark Sky API got bought up by Apple and is going dark soon (tee-hee!) leaving me thinking of how I’m going to get easy weather data in the next few months.

Whisper your tip in our earOr take my e-mail annunciator. I wrote a little script that, when I have new mail that’s work related or from my wife (read: important), it displays the subject line on a VFD that I have perched on my monitor. This works with Gmail, which I have to use for work, because they support IMAP so at least I can do cool things with the mail once it reaches my server. But can I do anything with Google Groups, which we use for the Hackaday Tip Line? Fat chance!

So there’s good “cloud” and there’s bad “cloud”. Good cloud is open cloud. Good cloud invites you to play, to innovate, and to come up with the right solutions for yourself. Good cloud gives you access to your data. Good cloud is hackable cloud. Let’s see more of that.

Taking Reverse Engineering To The Skies: Cheap Drone Gets PX4 Autopilot

Sometimes bad software is all that is holding good hardware back. [Michael Melchior] wanted to scavenge some motors and propellers for another project, so he bought an inexpensive quadcopter intending to use it for parts. [Michael] was so surprised at the quality of the hardware contained in his $100 drone that he decided to reverse engineer his quadcopter and give the autopilot firmware a serious upgrade.

Upon stripping the drone down, [Michael] found that it came with a flight management unit based on the STM32F405RG, an Inertial Measurement Unit, magnetic compass, barometric pressure sensor, GPS, WiFi radio, camera with tilt, optical flow sensor, and ultrasonic distance sensor, plus batteries and charger! The flight management unit also had unpopulated headers for SWD, and—although the manufacturer’s firmware was protected from reading—write protection hadn’t been enabled, so [Michael] was free to flash his own firmware.

We highly recommend you take a look at [Michael]’s 10 part tour de force of reverse engineering which includes a man-in-the-middle attack with a Raspberry Pi to work out its WiFi communication, porting the open-source autopilot PX4 to the new airframe, and deciphering unknown serial protocols. There are even amusing shenanigans like putting batteries in the oven and freezer to help figure out which registers are used as temperature sensors. He achieves liftoff at the end, and we can’t wait to see what else he’s able to make it do in the future.

Of course, [Michael] is no stranger to hacking imported quadcopters, and if you’re interested in PX4 but want something quieter than a quadcopter, take a look at this autopilot-equipped glider.

WSPR May Hold The Key To MH370 Final Position

The disappearance of Malaysia Airlines flight MH370 after an unexplained course change sent it flying south over the Indian Ocean in March 2014 still holds the mystery of the wreck’s final location. There have been a variety of efforts to narrow down a possible search area over the years, and now we have news of a further angle from an unexpected source. It’s possible that the aircraft’s path could show up in radio scatter detectable as anomalously long-distance contacts using the amateur radio WSPR protocol.

WSPR is a low-power amateur radio mode designed to probe and record the radio propagation capabilities of the atmosphere. Transmit beacons and receiving stations run continuously, and all contacts however fleeting are recorded to an online database. This can be mined by researchers with an interest in the atmosphere, but in this case it might also provide clues to the missing airliner’s flightpath. By searching for anomalously long-distance WSPR contacts whose path crosses the expected position of MH370 it’s possible to spot moments when the aircraft formed a reflector for the radio waves. These contacts can then either confirm positions already estimated using other methods, or even provide further course points. It’s an impressive demonstration of the unexpected data that can lurk in a trove such as the WSPR logbook, and also that while messing about on the airwaves the marks we leave behind us can have more benefit than simply bragging rights over the DX we’ve worked.

If this WSPR business intrigues you, then have a read of the piece in our $50 Ham series about it.

Header: Laurent ERRERA from L’Union, France, CC BY-SA 2.0.

[via Southgate ARC]

Building A Gas-Powered Pressure Washer

While you can always buy the tools you need, there’s something to be said for the satisfaction gained when you pick up a tool you built yourself. [Workshop From Scratch] has built a following out of building his own gear, the latest of which involved putting together a gas-powered pressure washer.

The key to the build was to keep things completely self-contained. All the consumables – water, soap, and wax – are kept onboard the washer to avoid having to run hoses and so on. A small gas engine is the heart of the build, hooked up to a high-pressure water pump. It even comes complete with a starter motor, making it a certified luxury garden tool. It’s also hooked up to two tanks holding cleaning solutions for car washing purposes, which feed into the pump via an auxiliary port for mixing. It’s all assembled on a custom steel frame welded together from rectangular hollow sections.

It’s a build that demonstrates how you can use your skills to build tools that suit your workflow, rather than just putting up with whatever is available off-the-shelf. We’ve seen his work before, too – building other tools like this motorised plasma cutter. Video after the break.

Continue reading “Building A Gas-Powered Pressure Washer”