Toddler EV Gets Big Boy Battery Upgrade

No matter the type of vehicle we drive, it has a battery. Those batteries wear out over time. Even high end EV’s have batteries with a finite life. But when your EV uses Lead Acid batteries, that life is measured on a much shorter scale. This is especially true when the EV is driven by a driver that takes up scarcely more space in their EV than a stuffed tiger toy! Thankfully, the little girl in question has a mechanic:

A 3d printed adapter sends go-juice to the DC-DC converter

Her daddy, [Brian Lough], who documented the swift conversion of his daughter’s toy truck from Lead Acid to Li-Ion in the video which you can see below the break.

Facing challenges similar to that of actual road worthy passenger vehicles, [Brian] teamed up with [bitluni] to solve them. The 12 V SLA battery was being replaced with a 20 V Li-Ion pack from a power tool. A 3d printed adapter was enlisted to break out the power pins on the pack. The excessive voltage was handled with a DC-to-DC converter that, after a bit of tweaking, was putting out a solid 12 V.

What we love about the hack is that it’s one anybody can do, and it gives an inkling of what type of engineering goes into even larger projects. And be sure to watch the video to the end for the adorable and giggly results!

Speaking of larger projects, check out the reverse engineering required in this Lead Acid to Li-Ion conversion we covered in 2016.

Continue reading “Toddler EV Gets Big Boy Battery Upgrade”

A TRS-80 with a small PCB attached

Hackaday Prize 2022: Modern Plug-in Gives TRS-80 Its Voice Back

Like artificial intelligence, speech synthesis was one of those applications that promised to revolutionize computing in the 1980s, only to fizzle out after people realized that a robotic voice reading out predefined sentences was not actually that useful. Nevertheless, computer manufacturers didn’t want to miss out on the hype and speech synthesizers became a relatively common add-on for a typical home computer.

Those add-ons were usually built around a custom voice-synthesis chip. If that chip fails, you’re out of luck: many were made in limited quantities by small companies and are impossible to find today. So if you’ve got a Tandy TRS-80 Voice Synthesizer with a dodgy SC-01-A chip, you’ll definitely want to check out [Michael Wessel]’s Talker/80 project. It’s a plug-in module for the TRS-80 that’s software compatible with the original Voice Synthesizer, but built from modern components. Synthesis is still performed by a custom IC, but now it’s using the more common Epson S1V30120 text-to-speech chip.

A speech synthesis PCB for a TRS-80The Talker/80 also has an ATmega644, which connects to the TRS-80’s expansion port on one side and to the Epson chip on the other. It can either emulate the original SC-01-A, in which case it expects text to be split into separate phonemes, or it can be set to an “advanced” mode in which it can directly process normal English text. In either case the voice sounds quite different from what original, although the new voice is arguably a little clearer.

We’ve seen modern speech synthesizers made for several classic computers: you can hook up the same Epson chip to an Amstrad CPC, or an ESP8266 to a VIC-20. If you’ve got an actual working SC-01-A but no vintage computer to use it with, you can also control it with an Arduino.

Continue reading “Hackaday Prize 2022: Modern Plug-in Gives TRS-80 Its Voice Back”

Why Fedora Decided To Give CC0 Licensed Code The Boot

The term “open source” can be tricky. For many people, it’s taken to mean that a particular piece of software is free and that they can do whatever they wish with it. But the reality is far more complex, and the actual rights you’re afforded as the user depend entirely on which license the developers chose to release their code under. Open source code can cost money, open source code can place limits on how you use it, and in some cases, open source code can even get you into trouble down the line.

Which is precisely what the Fedora Project is looking to avoid with their recent decision to reject all code licensed under the Creative Common’s “Public Domain Dedication” CC0 license. It will still be allowed for content such as artwork, and there may even be exceptions made for existing packages on a case-by-case basis, but CC0 will soon be stricken from the list of accepted code licenses for all new submissions.

Fedora turning their nose up at a software license wouldn’t normally be newsworthy. In fact, there’s a fairly long list of licenses that the project deems unacceptable for inclusion. The surprising part here is that CC0 was once an accepted license, and is just now being reclassified due to an evolving mindset within the larger free and open source (FOSS) community.

So what’s the problem with CC0 that’s convinced Fedora to distance themselves from it, and does this mean you shouldn’t be using the license for your own projects?

Continue reading “Why Fedora Decided To Give CC0 Licensed Code The Boot”

Hackaday Podcast 179: Danger Chess, Corona Motors, An Omni-Walker, And A Fast Talking Telescope

Join Hackaday Editor-in-Chief Elliot Williams and Staff Writer Dan Maloney for their take on the hottest hacks in a hot, hot week. We found a bunch of unusual mechanisms this week, like an omnidirectional robot that’s not quite wheeled but not quite a walker either. Or, if you’d rather fly, there’s a UAV that’s basically a flying propeller. There’s danger afoot too, with news of a chess-playing robot with a nasty streak, a laser engraver that’ll probably blind you, and a high-voltage corona motor that actually does useful work. We’ll use our X-ray vision to take a deep dive into a 60-GHz phased array antenna, let a baby teach a machine what it means to be hungry, and build a couple of toy cameras just for funsies. Balloons as a UI? Maybe someday, thanks to ultrasonic levitation. And we’ll wrap things up by snooping in on the Webb telescope’s communications, as we find out how many people it takes to make wire harnesses. Spoiler alert: it’s a lot.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download here!

Continue reading “Hackaday Podcast 179: Danger Chess, Corona Motors, An Omni-Walker, And A Fast Talking Telescope”

Go Big Or Go Home: 0.6 Mm Nozzles Are The Future

Most desktop fused deposition modeling (FDM) 3D printers these days use a 0.4 mm nozzle. While many people have tried smaller nozzles to get finer detail and much larger nozzles to get faster printing speed, most people stick with the stock value as a good trade-off between the two. That’s the conventional wisdom, anyway. However, [Thomas Sanladerer] asserts that with modern slicers, the 0.4 mm nozzle isn’t the best choice and recommends you move up to 0.6 mm.

If you know [Thomas], you know he wouldn’t make a claim like that without doing his homework. He backs it up with testing, and you can see his thoughts on the subject and the test results in the video below. The entire thing hinges on the Ultimaker-developed Arachne perimeter generator that’s currently available in the alpha version of PrusaSlicer.

We’ve experimented with nozzles as small as 0.1 mm and, honestly, it still looks like an FDM 3D print and printing takes forever at that size. But these days, if we really care about the detail we are probably going to print with resin, anyway.

There are a few slicer settings to consider and you can see the whole setup in the video. The part where an SLA test part is printed with both nozzles is particularly telling. This is something that probably shouldn’t print well with an FDM at all. Both nozzles had problems but in different areas.

Continue reading “Go Big Or Go Home: 0.6 Mm Nozzles Are The Future”

This Week In Security: Symbiote, Smart Locks, And CosmicStrand

Symbiote is a particularly nasty Linux rootkit, and we have the interesting case of two separate analysis releasing this week. Up first is [CyberMasterV] taking apart a very early sample of the malware. The primary purpose of Symbiote seems to be capturing SSH logins, and this version does so by hooking the Pluggable Authentication Modules (PAM) system to capture users logging in to the machine it resides on. It also watches for SSH and SCP binaries, and sniffs the terminal used by those binaries, thereby capturing outgoing credentials.

All this data gets packaged up as DNS queries and shuffled off to the Command and Control server. “Easy”, I hear you say, “just block DNS traffic to everywhere except a trusted DNS provider.” It’s more clever than that. The data is in the form of valid DNS subdomains. In full, it’s a DNS request to PacketNumber.MachineID.Data.px32.nss.atendimento-estilo[.]com, all appropriately encoded to be valid. Every request will be for a unique host name, so every request gets forwarded to the C&C controller, which does double duty as the authoritative DNS resolver for that domain. You might get some mileage out of blocking (or at least logging) very long DNS queries.

Symbiote also replaces the typical files and devices you would look at to find a potential problem. For instance, /proc/net/tcp is where the kernel reports open TCP connections. On an infected machine, a copy of this file is maintained by the malware, conveniently leaving out the connections resulting from the infections. Symbiote has a hook in fopen, so whenever a process tries to read this location, the read is redirected to the cooked version, neatly hiding the rootkit. This stealth feature is apparently also used to hide other malware from the same attackers that may be on the same machine.
Continue reading “This Week In Security: Symbiote, Smart Locks, And CosmicStrand”

PERSEUS-9, The Dual-6502 Portable Machine That Should Have Been

A question: does anyone who was around in the early days of the 8-bit computer revolution remember a dual-CPU 6502 portable machine like this one? Or just a dual-CPU machine? Or even just a reasonably portable computer? We don’t, but that begs a further question: if [Mitsuru Yamada] can build such a machine today with parts that were available in the era, why weren’t these a thing back then?

We’re not sure we have an answer to that question, but it just may be that nobody thought of it. Or, if they did, the idea of putting two expensive CPUs into a single machine was perhaps too exorbitant to take seriously. Regardless, the homemade mobile is another in a growing line of beautifully crafted machines in the PERSEUS line, all of which have a wonderfully similar look and feel.

For the PERSEUS-9, [Yamada-san] chose a weatherproof aluminum enclosure with just the right form-factor for a mobile computer, as well as a sturdy industrial look. Under the hood, there are two gorgeous wire-wrap boards, one of which is home to the 48-key keyboard and the 40×7 alphanumeric LED matrix display, while the other is a densely packed work of art holding the two 6502s and a host of other DIPs.

The machine is a combination of his PERSEUS-8 computer, his 6802 serial terminal, and the CI-2 floating point interpreter he built for the PERSEUS-8. A brief video of the assembly of this delightful machine is below. One of the many things about these builds that impress us is the precision with which the case is machined, apparently all by hand. How he managed to drill out all those holes for the keyboard without having one even slightly out of alignment without the aid of CNC is beyond us.

Continue reading “PERSEUS-9, The Dual-6502 Portable Machine That Should Have Been”