Op Amp Contest: Magnetic Core Memory The Dr Cockroach Way

No matter how memory technology marches on, magnetic core memory is still cool. Radiation-hard, nonvolatile, and so pretty. What’s there not to love? [Mark Nesselhaus] is no stranger to fun in-your-face electronics builds — judging from his hackaday.io projects — and this entry to the Hackaday Op-Amp contest is no outlier. This is a sixteen-bit magnetic core RAM demonstrator built upon glass using copper tape and solder, which always looks great and is actually not all that hard to do yourself provided you grab a new scalpel blade from the pack before starting.

Transformer-coupled differential front-end amplifier driving an SR latch.

For the uninitiated, the crossed X and Y wires each host a hard magnetic toroid which can only be magnetised by a field beyond a certain threshold due to the shape of the B-H curve of ferrite materials. The idea is for a required threshold current, drive the selected X line and Y line each with a current half of this value, so that only the selected core bit ‘sees’ the full field value, and flips state. This means that only a single bit can be written for each core plane, so to form longer words these layers are stacked, producing some wonderful cubic structures. These magnetic circuits are responsible for putting a human on the moon.

Reading the bit state is basically the opposite. A third sense wire is passed sequentially through each bit in the array. By driving a current the opposite way through the selected core bit, if the core was previously magnetised then the sense wire will read a short pulse that can be amplified and registered. The eagle-eyed will realise that reading is a destructive process, so this needs to be followed up by a write-back process to refresh the bit, although the core state will persist without power, giving the memory nonvolatile behaviour.

[Mark] utilises a simple discrete transistor differential transformed-coupled front end which senses the tiny current pulse and passes it along to a Set-Reset latch for visualisation. This simple concept could easily be extended to make this a practical memory, but for now, addressing is courtesy of a pair of crocodile clips and a discrete write/read pulse switch. We will watch with interest how far this goes.

DIY core memory builds are not a regular occurrence around these parts, but we see them from time to time, like this polished 64-bit setup. Core arrays are not the only magnetic memory in town, we’ve also seen DIY core rope memories as well.

Continue reading “Op Amp Contest: Magnetic Core Memory The Dr Cockroach Way”

Arduino Magnetic Core Memory Shield

mag_core_memory

Magnetic core memory turns 60 years old today, and as a tribute [Ben North and Oliver Nash] have created a 32-bit magnetic core memory board for the Arduino.

Magnetic core memory was used from the 1950s through the 1970s, and provided a non-volatile means for storing data, as each magnetic core retained its orientation, even when the power was cut. While it sounds a lot like a modern hard drive, these devices were used in the same fashion as RAM is utilized today.

While the pair used surplus ferrite cores manufactured just before magnetic memory stopped being produced, they did allow themselves to use some modern components. Items such as transistors and logic gates were not available to the first magnetic core memory manufacturers, but the use of these items helped them complete the project in a reasonable amount of time.

Their final result is a magnetic memory board which can be used by any USB-enabled device and is reliable enough to withstand billions of read/write transactions.

Soviet-Era Auto Dialler Uses Magnetic Rope Core Memory

We’ve seen a few interesting magnetic core memories on these fine pages over the years, but we don’t recall seeing too many user programmable magnetic core memory devices. This interesting Russian telephone auto dialer in its day would have been a very useful device, capable of storing and dialing forty user programmable 7-digit numbers. [mikeselectricstuff] tore into one (video, embedded below), and found some very interesting tech. For its era, this is high technology stuff. Older Russian tech has a reputation for incredibly ingenious use of older parts, that can’t be denied. After all, if it works, then there’s no need to change it. But anyway, what’s interesting here is how the designers decided to solve the problem of programming and recalling of numbers, without using a microprocessor, by using discrete logic and core rope memory.

This is the same technology used by the Apollo Guidance Computer, but in a user configurable form, and obviously much smaller storage capacity. The core array consists of seven, four-bit words, one word per telephone digit, which will be read out sequentially bottom to top. The way you program your number is to take your programming wire, insert it into the appropriate hole (one row related to numbers 1-20, the other row is shifted 1-20 for the second bank) and thread it along the cores in a weave type pattern. Along the way, the wire is passed through or bypasses a particular core, depending upon the digit you are coding for. They key for this encoding is written on the device’s lid. At the end, you then need to terminate the wire in the matching top connector, to allow the circuit to be completed.

As far as we can tell, the encoding is a binary sequence, with a special ‘stop’ code to indicate telephone numbers with less than seven digits. We shall leave further analysis to interested parties, and just point you at the Original manufacturer schematics. Enjoy!

Of course we’re not just going to mention rope core memory and the AGC without linking to a fantastic article about the very same, and if that’s wetting your appetite for making a rope core memory, here’s a little thing about that too!

Continue reading “Soviet-Era Auto Dialler Uses Magnetic Rope Core Memory”

Visualizing Magnetic Memory With Core 64

For the vast majority of us, computer memory is a somewhat abstract idea. Whether you’re declaring a variable in Python or setting a register in Verilog, the data goes — somewhere — and the rest really isn’t your problem. You may have deliberately chosen the exact address to write to, but its not like you can glance at a stick of RAM and see the data. And you almost certainly can’t rewrite it by hand. (If you can do either of those things, let us know.)

These limitations must have bothered [Andy Geppert], because he set out to bring computer memory into the tangible (or at least, visible) world with his interactive memory badge Core 64. [Andy] has gone through a few different iterations, but essentially Core 64 is an 8×8 grid of woven core memory, which stores each bit via magnetic polarization, with a field of LEDs behind it that allow you to visualize what’s stored. The real beauty of this setup is that it it can be used to display 64 pixel graphics. Better yet — a bit can be rewritten by introducing a magnetic field at the wire junction. In other words, throw a magnet on a stick into the mix and you have yourself a tiny drawing tablet!

This isn’t the first time we’ve seen cool experiments with core memory, and not even the first time we’ve seen [Andy] use it to make something awesome, but it really illuminates how the technology works. Being able to not only see memory being written but to manually write to it makes it all so much realer, somehow.

Continue reading “Visualizing Magnetic Memory With Core 64”

Earth’s Oxygen Levels And Magnetic Field Strength Show Strong Correlation

Time series of O2 (blue) and VGADM (red). (Credit: Weijia Kuang, Science Advances, 2025)
Time series of O2 (blue) and VGADM (red). (Credit: Weijia Kuang, Science Advances, 2025)

In an Earth-sized take on the age-old ‘correlation or causality’ question, researchers have come across a fascinating match between Earth’s magnetic field and its oxygen levels since the Cambrian explosion, about 500 million years ago. The full results by [Weijia Kuang] et al. were published in Science Advances, where the authors speculate that this high correlation between the geomagnetic dipole and oxygen levels as recorded in the Earth’s geological mineral record may be indicative of the Earth’s geological processes affecting the evolution of lifeforms in its biosphere.

As with any such correlation, one has to entertain the notion that said correlation might be spurious or indirectly related before assuming a strong causal link. Here it is for example known already that the solar winds affect the Earth’s atmosphere and with it the geomagnetic field, as more intense solar winds increase the loss of oxygen into space, but this does not affect the strength of the geomagnetic field, just its shape. The question is thus whether there is a mechanism that would affect this field strength and consequently cause the loss of oxygen to the solar winds to spike.

Here the authors suggest that the Earth’s core dynamics – critical to the geomagnetic field – may play a major role, with conceivably the core-mantle interactions over the course of millions of years affecting it. As supercontinents like Pangea formed, broke up and partially reformed again, the impact of this material solidifying and melting could have been the underlying cause of these fluctuations in oxygen and magnetic field strength levels.

Although hard to say at this point in time, it may very well be that this correlation is causal, albeit as symptoms of activity of the Earth’s core and liquid mantle.

Render of a simple clockwork orrery

Planetary Poetry With A Tiny Digital Core

Some hacks just tickle the brain in a very particular way. They’re, for a change, not overly engineered; they’re just elegant, anachronistic, and full of mischief. That’s exactly what [Frans] pulls off with A Gentleman’s Orrery, a tiny, simple clockwork solar system. Composed of shiny brass and the poise of 18th-century craftsmanship, it hides a modern secret: there’s barely any clockwork inside. You can build it yourself.

Mechanism of a simple clockwork orreryPeek behind the polished face and you’ll find a mechanical sleight of hand. This isn’t your grandfather’s gear-laden planetarium. Instead of that, it operates on a pared-down system that relies on a stepper motor, driving planetary movement through a 0.8 mm axle nested inside a 1 mm brass tube. That micro-mechanical coupling, aided by a couple of bevel gears, manages to rotate the Moon just right, including its orientation. Most of the movement relies on clever design, not gear cascades. The real wizardry happens under the hood: a 3D-printed chassis cradles an ESP32-C6, a TTP223 capacitive touch module, STSPIN220 driver, and even a reed switch with magnetic charging.

You can even swap out the brass for a stone shell where the full moon acts as the touch control. It’s tactile, it’s poetic, and therefore, a nice hack for a weekend project. To build it yourself, read [Frans]’ Instructable.

Continue reading “Planetary Poetry With A Tiny Digital Core”

This Week In Security: Lingering Spectre, Deep Fakes, And CoreAudio

Spectre lives. We’ve got two separate pieces of research, each finding new processor primitives that allow Spectre-style memory leaks. Before we dive into the details of the new techniques, let’s quickly remind ourselves what Spectre is. Modern CPUs use a variety of clever tricks to execute code faster, and one of the stumbling blocks is memory latency. When a program reaches a branch in execution, the program will proceed in one of two possible directions, and it’s often a value from memory that determines which branch is taken. Rather than wait for the memory to be fetched, modern CPUs will predict which branch execution will take, and speculatively execute the code down that branch. Once the memory is fetched and the branch is properly evaluated, the speculatively executed code is rewound if the guess was wrong, or made authoritative if the guess was correct. Spectre is the realization that incorrect branch prediction can change the contents of the CPU cache, and those changes can be detected through cache timing measurements. The end result is that arbitrary system memory can be leaked from a low privileged or even sandboxed user process.

In response to Spectre, OS developers and CPU designers have added domain isolation protections, that prevent branch prediction poisoning in an attack process from affecting the branch prediction in the kernel or another process. Training Solo is the clever idea from VUSec that branch prediction poisoning could just be done from within the kernel space, and avoid any domain switching at all. That can be done through cBPF, the classic Berkeley Packet Filter (BPF) kernel VM. By default, all users on a Linux system can run cBPF code, throwing the doors back open for Spectre shenanigans. There’s also an address collision attack where an unrelated branch can be used to train a target branch. Researchers also discovered a pair of CVEs in Intel’s CPUs, where prediction training was broken in specific cases, allowing for a wild 17 kB/sec memory leak.

Continue reading “This Week In Security: Lingering Spectre, Deep Fakes, And CoreAudio”