This Unique Flip-Flop Uses Chemistry And Lasers

One of the first logic circuits most of us learn about is the humble flip-flop. They’re easy enough to build with just a couple of NOR or NAND gates, and even building one up from discrete components isn’t too much of a chore. But building a flip-flop from chemicals and lasers is another thing entirely.

That’s the path [Markus Bindhammer] took for his photochromic molecular switch. We suspect this is less of an attempt at a practical optical logic component and more of a demonstration project, but either way, it’s pretty cool. Photochromism is the property by which molecules reversibly rearrange themselves and change color upon exposure to light, the most common example being glass that darkens automatically in the sun. This principle can be used to create an optical flip-flop, which [Markus] refers to as an “RS” type but we’re pretty sure he means “SR.”

The electronics for this are pretty simple, with two laser modules and their drivers, a power supply, and an Arduino to run everything. The optics are straightforward as well — a beam splitter that directs the beams from each laser onto the target, which is a glass cuvette filled with a clear epoxy resin mixed with a photochromic chemical. [Markus] chose spiropyran as the pigment, which when bathed in UV light undergoes an intramolecular carbon-oxygen bond breakage that turns it into the dark blue pigment merocyanine. Hitting the spot with a red laser or heating the cuvette causes the C-O bond to reform, fading the blue spot.

The video below shows the intensely blue dot spot developing under UV light and rapidly fading thanks to just the ambient temperature. To make the effect last longer, [Markus] cools the target with a spritz from a CO2 cartridge. We imagine other photochromic chemicals could also be employed here, as could some kind of photometric sensor to read the current state of the flip-flop. Even as it is, though, this is an interesting way to put chemistry and optics to work.

Continue reading “This Unique Flip-Flop Uses Chemistry And Lasers”

Autofeeding CNC Lathe Cranks Out Parts All By Itself

The trouble with building a business around selling low-margin widgets is that you have to find a way to make a lot of them to make it worth your while. And if the widget in question is labor-intensive to make, you’ve got to find ways to reduce your inputs. That sounds like a job for industrial automation, a solution that’s often out of reach of small shops, for all the obvious reasons. Not if you’re clever about things, though, as this fully automated CNC lathe work cell shows.

This build comes to us from the woodshop of [Maher Lagha], where he’s making wooden honey dippers. Wooden dowel blanks are dispensed from an infeed rack and chucked between centers on the headstock and pneumatic tailstock. A two-axis stage in front of the workpiece moves a tool against the spinning stock, carving out the honey dipper in just a few minutes. When the lathe work is done, the spindle stops, the tailstock pulls the honey dipper back off the headstock, and a pneumatic piston unceremoniously whacks the almost-finished part — it looks like it still needs a little manual post-processing — into a bin. Lather, rinse, repeat, profit.

[Maher] doesn’t provide many details, but just looking at the work cell shows a veritable feast of industrial automation equipment. The spindle and tailstock of the lathe sit on a bed made from a massive slab of aluminum extrusion, and the X- and Y-axes use linear rails and ballscrews. And mindful of the effects of wood chips on delicate mechanisms, [Maher] did a good job of containing the mess with a host of acrylic guards.

As we said when we saw [Maher]’s wooden coaster work cell a while back, the wood widget business must be pretty good to justify automation like this. What’s nice with both these rigs is that they look like they could be quickly reprogrammed and retooled to create other products. Pretty impressive.

Continue reading “Autofeeding CNC Lathe Cranks Out Parts All By Itself”

X-Ray Investigations Hack Chat

Join us on Wednesday, January 24 at noon Pacific for the X-Ray Investigation Hack Chat with Ahron Wayne!

It’s hard to imagine a world where we didn’t figure out how to use X-rays to peer inside things. Before Röntgen’s discovery that X-rays could penetrate living tissue, doctors had only limited (and often unpleasant) ways to get a look at what was going on inside the human body, and few of us would want to return to those days.

As fantastically useful as X-rays and later computed tomography (CT) became in medicine, it didn’t take too long for other uses for the technology to come along. Non-clinical applications for X-ray and CT abound, including their use in non-invasively exploring relics of immense archaeological value. One recent effort in this space that gained a lot of coverage in the press was the combination of CT imaging and machine learning to read the ink inside carbonized papyrus scrolls from the ruins of Pompeii.

join-hack-chatThe result was the “Vesuvius Challenge,” where different teams looked for techniques to virtually unwrap the roasted relics. Ahron’s contribution to the project was a little unusual — he bought a used desktop CT scanner, fixed it up, and started experimenting with reading ink from the carbonized remains of simulated papyrus scrolls. In other words, he made some scrolls, cooked them to beyond well-done in the oven, and tried to understand what happens to ink on papyrus that gets blasted by a volcano. If that’s not enough to get you to stop by the Hack Chat when Ahron joins us, we’re not sure what else would be! Suffice it to say we’re pretty excited about what Ahron has to say about DIY CT,  X-rays, collaborative open-source citizen science, and unwrapping the mysteries of Pompeii.

Our Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, January 24 at 12:00 PM Pacific time. If time zones have you tied up, we have a handy time zone converter.

Featured image: Daderot, CC0, via Wikimedia Commons

Hackaday Links Column Banner

Hackaday Links: January 21, 2024

Have you noticed any apps missing from your Android phone lately? We haven’t but then again, we try to keep the number of apps on our phone to a minimum, just because it seems like the prudent thing to do. But apparently, Google is summarily removing apps from the Play Store, often taking the extra step of silently removing the apps from phones. The article, which seems to focus mainly on games, and has a particular bone to pick about the removal of RPG Wayward Souls, isn’t clear about how widespread the deletions are, or what exactly the reason behind the removals could be. But they sure are exercised about it, and rightly so since in some cases the deleted games have actually been paid for by the users, and Google pretty much says that if you think you’re getting a refund, think again. They make some interesting points, such as this being the very definition of larceny, while also acknowledging that in all likelihood Google has a get-out-of-jail-free card buried in some EULA somewhere permitting them to do exactly what they’re doing. Google’s gonna Google, right?

Continue reading “Hackaday Links: January 21, 2024”

Erasing EEPROMs Isn’t Always As Easy As It Seems

When is 14 volts not actually 14 volts? Given [Anders Nielsen]’s recent struggles with erasing an old-school EEPROM, it’s when you really need it that things tend to go pear-shaped.

A little background is perhaps in order. [Anders] is working on a scratch-built programmer for ROMs to complement his 65uino project, which puts a complete 6502 computer into the footprint of an Arduino Uno. He wisely started the ROM programmer project at the beginning, which was to generate the correct voltages for programming. This turned out to be not as easy as you might think thanks to the solderless breadboard’s parasitic effects on the MIC2288 switching boost regulator he chose.

The video below is a continuation of the programmer build, which ends up being just as fraught as the first part. Being able to generate the programming voltages is one thing; getting them onto the right pins at the right time using nothing but the 5-volt GPIOs on a microcontroller is another. In true retro fashion, [Anders] tackled that problem with a pair of small-signal transistors, which seemed to work once the resistor values were sorted, at least when applying a 12-volt signal intended to show the ROM’s hard-coded manufacturer ID on the data bus.

But erasing the ROM, which requires 14 volts while the chip enable line is held high for 100 ms, proved a little trickier. Despite multiple tries, the ROM wouldn’t erase thanks to the 14-volt rail being dragged down to around 9 volts. [Anders] fixed that with a new base resistor on the driver, to increase the current and keep the voltage up where it needs to be. Just goes to show you that the data sheets don’t always tell the whole story.

We’ve been enjoying the unfolding story of this programmer, and we’re looking forward to the next installment.

Continue reading “Erasing EEPROMs Isn’t Always As Easy As It Seems”

Alarm Panel Hack Defeats Encryption By Ignoring It

As frustrating as it may be for a company to lock you into its ecosystem by encrypting their protocols, you have to admit that it presents an enticing challenge. Cracking encryption can be more trouble than it’s worth, though, especially when a device gives you all the tools you need to do an end-run around their encryption.

We’ll explain. For [Valdez], the encrypted communication protocols between a DSC alarm panel and the control pads on the system were serious impediments to integration into Home Assistant. While there are integrations available for these alarm panels, they rely on third-party clouds, which means that not only is your security system potentially telling another computer all your juicy details, but there’s also the very real possibility that the cloud system can either break or be shut down; remember the Chamberlain MyQ fiasco?

With these facts in mind, [Valdez] came up with a clever workaround to DSC encryption by focusing on physically interfacing with the keypad. The device has a common 16×2 LCD and a 25-key keypad, and a little poking around with a multimeter and a $20 logic analyzer eventually showed that the LCD had an HD44780 controller, and revealed all the lines needed to decode the display with an ESP32. Next up was interfacing with the keypad, which also involved a little multimeter work to determine that the keys were hooked up in a 5×5 matrix. Ten GPIOs on the ESP32 made it possible to virtually push any key; however, the ten relays [Valdez] originally used to do the switching proved unwieldy. That led to an optocoupler design, sadly not as clicky but certainly more compact and streamlined, and enabling complete control over the alarm system from Home Assistant.

We love this solution because, as [Valdez] aptly points out, the weakest point in any system is the place where it can’t be encrypted. Information has to flow between the user and the control panel, and by providing the electronic equivalents to eyes and fingers, the underlying encryption is moot. Hats off to [Valdez] for an excellent hack, and for sharing the wealth with the HA community.

Lessons Learned From A High-Voltage Power Supply

When you set out to build a 60,000-volt power supply and find out that it “only” delivers a measly 50,000 volts, you naturally have to dive in and see where things can be improved. And boy, did [Advanced Tinkering] find some things to improve.

First things first: if you haven’t seen [Advanced]’s first pass at a high-voltage supply, you should go check that out. We really liked the design of that one, and were particularly impressed with the attention to detail, all of which seemed to be wisely geared to the safe operation of the supply. But as it turns out, the margin of safety in the original design wasn’t as good as it could be. Of most concern was the need to physically touch the supply to control it, an obvious problem should something go wrong anywhere along the HV path, which includes a ZVS-driven flyback and an epoxy-potted Crockcroft-Walton voltage multiplier.

To make things a little more hands-off, [AT] added a pneumatically actuated switch to the supply, along with some indicator lights to help prevent him from leaving the supply powered up. He also reworked the low-voltage DC supply section, replacing a fixed-voltage supply and a DC-DC converter with a variable DC supply. This had the side benefit of providing a little bit more voltage to the ZVS driver, which goosed up the HV output a bit. The biggest change, though, was to the potted part of the HV section, which showed signs of arcing to the chassis. It turns out that even at 100% infill, 3D printed PLA isn’t a great choice for HV projects; more epoxy was the answer to that problem. Along with rewinding the primary on the flyback transformer, the power supply not only hit the 60-kV spec, but even went a little past that — and all without any of that pesky arcing.

We thought [Advanced Tinkering]’s first pass on this build was pretty slick, but we’re glad to see that it’s even better now. And we’re still keen to see how this supply will be put to use; honestly, the brief teaser at the end of the video wasn’t much help in guessing what it could be.

Continue reading “Lessons Learned From A High-Voltage Power Supply”