VK-01 Is A Bartender You Don’t Need To Tip

[Donald Bell’s] robotic bartender entry into the 2020 Cocktail Robotics Grand Challenge is one of those things that sounds easy until you start getting into the details. After all, how hard is it to dispense some liquids into a glass? Harder than you might think. Sure there are pumps — [Donald] uses peristaltic pumps — but there’s also two Raspberry Pis, an ESP8622, and at least one more microcontroller lurking underneath. You can see a video about the device below.

Even if you don’t want a refreshing libation, you’ll probably like the VK-01’s Bladerunner cyberpunk styling. What we really enjoyed about the post was that it took you through the concept sketches, some of the design trades, and even a cardboard prototype.

Continue reading “VK-01 Is A Bartender You Don’t Need To Tip”

Playing The Pixelflut

Every hacker gathering needs as many pixels as its hackers can get their hands on. Get a group together and you’ll be blinded by the amount of light on display. (We propose “a blinkenlights” as the taxonomic name for such a group.) At a large gathering, what better way to show of your elite hacking ability than a “competition” over who can paint an LED canvas the best? Enter Pixelflut, the multiplayer drawing canvas.

Pixelflut has been around since at least 2012, but it came to this author’s attention after editor [Jenny List] noted it in her review of SHA 2017. What was that beguiling display behind the central bar? It turns out it was a display driven by a server running Pixelflut. A Pixelflut server exposes a display which can be drawn on by sending commands over the network in an extremely simple protocol. There are just four ASCII commands supported by every server — essentially get pixel, set pixel, screen size, and help — so implementing either a client or server is a snap, and that’s sort of the point.

While the original implementations appear to be written by [defnull] at the link at the top, in some sense Pixelflut is more of a common protocol than an implementation. In a sense, one “plays” one of a variety of Pixelflut minigames. When there is a display in a shared space the game is who can control the most area by drawing the fastest, either by being clever or by consuming as much bandwidth as possible.

Then there is the game of who can write the fastest more battle-hardened server possible in order to handle all that traffic without collapsing. To give a sense of scale, one installation at 36c3 reported that a truly gargantuan 0.5 petabytes of data were spent at a peak of rate of more than 30 gigabits/second, just painting pixels! That’s bound to bog down all but the most lithe server implementation. (“Flut” is “flood” in German.)

While hacker camps may be on pause for the foreseeable future, writing a performant Pixelflut client or server seems like an excellent way to sharpen one’s skills while we wait for their return. For a video example check out the embed after the break. Have a favorite implementation? Tell us about it in the comments!

Continue reading “Playing The Pixelflut”

How Many Of You Are There, Really?

We’re now accustomed to hearing, “We’re all special in our own unique ways.” But what if we weren’t really aren’t all that unique? Many people think there are no more than two political opinions, maybe a handful of religious beliefs, and certainly no more than one way to characterize a hack. But despite this controversy in other aspects as life, at least we can all rely on the uniqueness of our individual names. Or can you?

You ever thought there were too many people named [insert name here]? Well, [Nicole] thought there were too many people who shared her name in her home country of Belgium and decided to make an art piece out of it.

She was able to find data on the first names of people in Belgium and wrote a Python script…er…used Excel to find the number of Nicoles in each zip code. She then created a 3D map of Belgium divided into each province with the height of each province proportional to the number of Nicoles in that area. A pretty simple print job that any standard 3D printer can probably do these days.

Not much of a “do something” hack, but could make for a cool demotivational ornament that will constantly remind us just how unique we really are.

Happy hacking!

Continue reading “How Many Of You Are There, Really?”

2020: Everything Is Virtual

It’s like the dystopian future arrived out of the blue. From one year to the next we went from holing up in overly air-conditioned hotel ballrooms and actually meeting our fellow meatbags in the flesh, to huddling in our pods and staring at the screens. I’m looking for the taps to hook me in to the Matrix at this point.

But if you haven’t yet received your flying car or your daily Soma ration, you can still take comfort in one thing: all of the hacker conferences are streaming live, as if it were some fantastic cyber-future! In fact, as we type this, someone is telling you how to print your way to free drinks on USAir flights as part of HOPE’s offering, but the talks will continue for the next few days. (Go straight to live stream one.)

If retrocomputing is more your thing, Saturday marks the start of the virtual Vintage Computer Festival West of which Hackaday is a proud sponsor. (Here’s the schedule.)

And next weekend is DEF CON in Safe Mode with Networking. While we can totally imagine how the talks and demo sessions will work, the Villages, informal talks and hack-togethers based on a common theme, will be a real test of distributed conferencing.

OK, I’ll admit it: I really miss getting together with folks and having the truly random conversations that pre-scripted teleconferences just don’t seem to facilitate. Lobbycon suffers in lockdown. But if you’ve never been to any of these events, and you just want a taste of the talks and presentations at least, now’s your chance to get in for free. And if you like what you see, and if the virus lets us, we’ll see you in person next summer!

You’ve Got Rat!

If you home has never been subject to a rodent invasion then you are fortunate. Our world is full of rats and mice, and despite the best efforts of humanity to keep them at bay it is inevitable that a few will find their way through. For [Marius Taciuc] this became a problem, as his traps needed constant checking to avoid the prospect of a festering rat carcass. His solution? A humane trap equipped with an ESP8266, that notifies him when the rodent is incarcerated.

The tech behind it is about as simple as it’s possible to get, the trap’s door activates a switch, that powers on an ESP8266 module. The ESP’s code simply wakes it up, connects to a wireless network, and sends a query to IFTTT with a call to a service that sends him an email alert. There’s no need to monitor any GPIO lines or have any code running to keep an eye on the trap, it’s all purely a function of the power switch.

The trap itself is interesting, in that it’s a home-made one constructed from soldered copper wire. Sadly there are few details of its construction, but you can see more of it including a live rat inside it, in the video below the break. And if making a trap catches your interest, we can help you there.

Continue reading “You’ve Got Rat!”

This Mini Soviet Micro Will Have Astounding Attention To Detail

As the retro craze has gone mainstream, we’ve grown used to seeing “mini” versions of classic hardware, preloaded with a selection of games and ready for a wallow in nostalgia. Unfortunately for fans of the less well known platforms, the only devices to get the mini treatment so far are popular ones such as the Nintendo consoles, or the Commodore 64. This is something [Svofski] is aiming to change for one classic micro, by producing a mini version of the Soviet Vector-06c. And unlike the Commodore with its fake keyboard, this one will work in its entirety and have a fully-functional keyboard.

It’s a build that’s not finished yet. But in this case that’s no bad thing, because such is the extreme attention to detail that you’ll want to stick around and watch it unfold. The electronics will come courtesy of an FPGA recreation of the hardware, while the Vector’s unique keyboard is being recreated in miniature, with keycaps designed to fit a particular Alps switch. These are 3D-printed, painted, and then marked with their decals using stencils carefully etched from copper sheet. Even if you have no interest in the Vector-06c, these techniques could find a place in so many other projects.

The wonderfully ingenious and diverse world of Soviet technology has found its way onto these pages many times over the years, including at least one other microcomputer, and even a supercomputer. If your interests extend behind the Iron Curtain though, you might wish to read our colleague [Voja Antonic]’s account of hacking in Communist Yugoslavia.

Reverse Engineering The Charge Pump Of An 8086 Microprocessor

You’d think that the 8086 microprocessor, a 40-year-old chip with a mere 29,000 transistors on board that kicked off the 16-bit PC revolution, would have no more tales left to tell. But as [Ken Shirriff] discovered, reverse engineering the chip from die photos reveals some hidden depths.

The focus of [Ken]’s exploration of the venerable chip is the charge pump, a circuit that he explains was used to provide a bias voltage across the substrate of the chip. Early chips generally took this -5 volt bias voltage from a pin, which meant designers had to provide a bipolar power supply. To reduce the engineering effort needed to incorporate the 8086 into designs, Intel opted for an on-board charge pump to generate the bias voltage. The circuit consists of a ring oscillator made from a trio of inverters, a pair of transistors, and some diodes to act as check valves. By alternately charging a capacitor and switching its polarity relative to the substrate, the needed -5 volt bias is created.

Given the circuit required, it was pretty easy for [Ken] to locate it on the die. The charge pump takes up a relatively huge amount of die space, which speaks to the engineering decisions Intel made when deciding to include it. [Ken] drills down to a very low level on the circuit, with fascinating details on how the MOSFETs were constructed, and why eight transistors were used instead of two diodes. As usual, his die photos are top quality, as are his explanations of what’s going on down inside the silicon.

If you’re somehow just stumbling upon [Ken]’s body of work, you’re in for a real treat. To get you started, you’ll want to check out how he found pi baked into the silicon of the 8087 coprocessor, or perhaps his die-level exploration of different Game Boy audio chips.