Animatronic Stuffed Animals Stripped Bare


For those who have ever wondered what Chicken-Dancing Elmo’s mechanical parts look like without the fur and the chicken costume (and who among us hasn’t?), [Matt Kirkland] posted the photos above, along with several other animatronic, walking, talking and other mechanical stuffed toys stripped of all their fur and stuffing. These before and after shots were ostensibly taken for unspecified “research purposes,” but if you ask us, any research that takes a knife to Elmo is the most valid kind.

[via Kottke]

High Power LED Blinking Circuit

[youtube=http://www.youtube.com/watch?v=mNDu56oGNck]
Evil Mad Scientist Labs brings us this easy to make LED blinking circuit. The idea is to put a LED in series with a small blinking incandescent bulb from a string of Christmas lights. The bulb has an internal bimetallic strip that bends out of shape when it heats up, cutting the circuit. when it cools enough, it returns to its original shape and closes the circuit again, making the bulb and the LED turn on. Both lights have short period of sustained light when they are initially powered up since the bimetallic strip is still warming up.

The project uses a 5W blue LED, the aforementioned bulb, and a 6V battery pack loaded with 3 AAA batteries. The battery pack and the lights are all attached to a small section of perforated board. Duplicating this project should be easy and provide a very bright LED, but to make a 5W LED shine its brightest, a larger bulb and a heatsink will be necessary.

World’s Oldest Computer Music Unveiled


Fans of music made with obsolete technology are in for a treat: recordings of a Ferranti Mark 1 computer playing Baa Baa Black Sheep and In the Mood were recently released, and they are thought to be the oldest recordings of computer generated music in existence.

The Ferranti Mark 1 is a commercial version of Manchester University’s SSEM computer (aka Baby), which preceded several more well known computers like UNIVAC and EDVAC. It was one of the first computers that didn’t require a great deal of hardware rewiring to perform different tasks, making it ideal for this sort of purpose. It is not known whether the program was written to play these songs only or for more diverse composition and playback, but the author, [Chris Strachey] was known to be a friend of the legendary [Alan Turing]. The recording was released as part of the Manchester SSEM’s 60th anniversary celebration.

Anonymizing Clothing


Though much of [citizenFinerran]’s intent in designing a suit that camouflages the wearer from security camera footage was philosophical, it is designed with a very tangible purpose in mind. The suit does not provide true camouflage (to say nothing of true invisibility), but it does create enough moving visual obstructions to make the wearer completely anonymous on film. More details on this and other invisibility cloaks after the break.

Continue reading “Anonymizing Clothing”

Hacking Sleep Part Deux


The Boston Globe recently posted some tips to help you get the most from your naps. The information comes in the form of a chart with numerous facts about naps, including the timeline of events in a typical nap, information about chronotypes, and ideas on how to fall asleep quickly and stay asleep. Since our post on polyphasic sleep, we’ve been interested in sleep techniques that essentially trick the body into feeling as rested as possible (the crudest form of biohacking, in our opinion). Many of these techniques are certainly applicable to polyphasic sleep, but one of the most interesting concepts, chronotypes, is not. Chronotypes are simply profiles of sleep habits that denote the times a person’s body is more readily disposed to fall asleep; since polyphasic sleep requires practitioners to sleep several times a day, it is always in conflict with the person’s chronotype at some point in the day. Nonetheless, the chart should help you stay alive if you ever have several back-to-back intercontinental flights.

[via Lifehacker]

IPhone Used To Control Squad Of UAVs

[youtube=http://www.youtube.com/watch?v=CRcld5aAN2E&hl=en]
Building UAVs
is only half the work involved in making them fly; the other half is a control system. The Center for Collaborative Control of Unmanned Vehicles (C3UV) from the University of Califorina, Berkeley has devised a way to control a squad of RC airplanes with an iPhone. The system works by submitting commands and coordinates to a web site via the iPhone’s web browser. The site then sends the commands to the team of drones, which carry out the orders. The drones are outfitted with cameras and a tracking device, which allows them to be monitored on the ground using Google Maps.

The iPhone Terms of Service specifically prohibits it being used to drive remote vehicles, but that shouldn’t really pose a problem: since the orders are deployed via the iPhone’s web browser, they could technically be given by any web-enabled device. Before anyone cries foul, though, bear in mind that the idea is to issue orders from the field, and the iPhone is perhaps the most high-profile mobile web device on the market, which maximizes the project’s exposure. Still, we can’t help but think that they’d have gotten more media attention if they had used a hacked Kindle instead.

High Profile Hackers Get Their Day In Court


The court cases against high profile hackers [Gary McKinnon], [Gregory King], and [Robert Matthew Bentley] all had major developments last week, with [King] and [Bentley] sentenced to time in prison and [McKinnon] in a tenuous
state fighting extradition.

Both [King] (aka Silenz) and [Bentley] (aka LSDigital) will serve time for crimes related to botnets, but where [King] used one to stage DDOS attacks, [Bentley] used them to create spam. [King]’s botnet had 7,000 nodes, and though the court did not release the size of [Bentley]’s botnet, all of his bots were computers in the Rubbermaid company. [King] agreed to a two-year sentence, while [Bentley] was sentenced to 41 months.

[McKinnon] (aka Solo) who is of British origin, may serve up to 60 years in prison for mounting the “biggest military hack ever” on U.S. government computers. Between 2001 and 2002, he allegedly hacked into 97 computers in U.S. military and NASA networks. To be charged in American courts, though, he would have to be extradited first, and his extradition appeal to British courts is currently pending.