Orion Ceases Operations, Future Of Meade Unclear

There was a time when building a telescope was a rite of passage for budding astronomers, much as building a radio was the coming age for electronics folks. These days, many things are cheaper to buy than build, even though we do enjoy building anything we can. Orion was a big name in telescopes for many years. Their parent company also owned Meade and Coronado, both well-known optical brands. A recent video from [Reflactor] brought it to our attention that Orion abruptly ceased operations on July 9th.

We always hate to hear when well-known brands that serve a big part of our community vanish. According to [Reflactor], people who have telescopes with the company for repair are likely to never see them again. [Dylan O’Donnell] also had a video about it (see below), and, as he notes, at that time, the website was still operating, but it’s gone now. To add further fuel to the fire Sky & Telescope ran an article on July 12th saying that Meade was also on the chopping block, although at the time of this writing, their site is still online.

You have to wonder what problems you might have selling telescopes today. Many people live where there is light pollution. We’d like to think there are still people who want to ponder the universe from their backyard, though.

There are still people selling telescopes, so presumably, one of them — maybe Celestron — will take up the slack. Or maybe we’ll see a resurgence in telescope homebrewing.

After all, if you have a 3D printer, you could make a 114/900 mm telescope on a tight budget. Or, try IKEA.

Continue reading “Orion Ceases Operations, Future Of Meade Unclear”

Microsoft Sculpt Keyboard Lives Again With RP2040

Hackaday readers are likely the kind of folks that have a favorite keyboard, so you can probably imagine how devastating it would be to find out that the board you’ve sworn by for years is going out of production. Even worse, the board has some internal gremlins that show up after a few years of use, so functional ones in the second-hand market are becoming increasingly rare. So what do you do?

This is the position [TechBeret] recently found himself in with his beloved Sculpt keyboard. When Microsoft decided to step back from the peripheral market last year, he started looking at alternatives. Finding none of them appealing, he decided instead to breathe new life into the ergonomic keyboard with the RP2040. Every aspect of the resurrection is covered in a phenomenally detailed write-up on his blog, making this a valuable case study in modernizing peripherals with the popular microcontroller.

Continue reading “Microsoft Sculpt Keyboard Lives Again With RP2040”

Mainframe Chip Has 360MB Of On-Chip Cache

It is hard to imagine what a mainframe or supercomputer can do when we all have what amounts to supercomputers on our desks. But if you look at something like IBM’s mainframe Telum chip, you’ll get some ideas. The Telum II has “only” eight cores, but they run at 5.5 GHz. Unimpressed? It also has 360 MB of on-chip cache and I/O and AI accelerators. A mainframe might use 32 of these chips, by the way.

[Clamchowder] explains in the post how the cache has a unique architecture. There are actually ten 36 MB L2 caches on the chip. There are eight caches, one for each core, plus one for the I/O accelerator, and another one that is uncommitted.

A typical CPU will have a shared L3 cache, but with so much L2 cache, IBM went a different direction. As [Clamchowder] explains, the chip reuses the L2 capacity to form a virtual L3 cache. Each cache has a saturation metric and when one cache gets full, some of its data goes to a less saturated cache block.

Remember the uncommitted cache block? It always has the lowest saturation metric so, typically, unless the same data happens to be in another cache, it gets moved to the spare block.

There’s more to it than that — read the original post for more details. You’ll even read speculation about how IBM managed a virtual L4 cache, across CPUs.

Cache has been a security bane lately on desktop CPUs. But done right, it is good for performance.

Printed In Space: 3D-Printed Metal Parts Shown Off After Returning From The ISS

The European Space Agency (ESA) is showing 3D-printed metal parts made onboard the International Space Station using a printer and materials the agency sent earlier this year.  While 3D printing onboard the ISS is nothing new, the printing of metal parts in space is an important advancement. The agency’s goals are to be able to produce more tools and spares in situ rather than having to rely on resupply missions. An ambitious idea being pitched is to use captured space debris as input as well, which would further decrease the ISS’s dependence on Earth and expensive cargo runs from the bottom of the gravity well.

Continue reading “Printed In Space: 3D-Printed Metal Parts Shown Off After Returning From The ISS”

Hackaday Links Column Banner

Hackaday Links: September 8, 2024

OK, sit down, everyone — we don’t want you falling over and hurting yourself when you learn the news that actually yes, your phone has been listening to your conversations all along. Shocking, we know, but that certainly seems to be what an outfit called Cox Media Group (CMG) does with its “Active Listening” software, according to a leaked slide deck that was used to pitch potential investors. The gist is that the software uses a smartphone’s microphone to listen to conversations and pick out keywords that it feeds to its partners, namely Google, Facebook, and Amazon so that they can target you with directed advertisements. Ever have an IRL conversation about something totally random only to start seeing references to that subject pop up where they never did before? We sure have, and while “relationship mining” seemed like a more parsimonious explanation back in 2017, the state of tech makes eavesdropping far more plausible today. Then there’s the whole thing of basically being caught red-handed. The Big Three all huffed and puffed about how they were shocked, SHOCKED to learn that this was going on, with reactions ranging from outright denial of ever partnering with CMG to quietly severing their relationship with the company. So much for years of gaslighting on this.

Continue reading “Hackaday Links: September 8, 2024”

Self Driving Cars Learn From Our Eyes

[Michelle Hampson] reports in IEEE Spectrum that Chinese researchers may improve self-driving cars by mimicking how the human eye works. In some autonomous cars, two cameras use polarizing filters to help understand details about what the car sees. However, these filters can penalize the car’s vision in low light conditions.

Humans, however, have excellent vision in low-lighting conditions. The Retinex theory (based on the Land Effect discovered by [Edwin Land]) attributes this to the fact that our eyes sense both the reflectance and the illumination of light. The new approach processes polarized light from the car’s cameras in the same way.

Continue reading “Self Driving Cars Learn From Our Eyes”

Reverse Engineering The Web API Of An Akaso EK7000 Action Camera

Recently, [Richard Audette] bought an Akaso EK7000 action camera for his daughter’s no-smartphones-allowed summer camp, which meant that after his daughter returned from said camp, he was free to tinker with this new toy. Although he was not interested in peeling open the camera to ogle its innards, [Richard] was very much into using the WiFi-based remote control without being forced into using the ‘Akaso Go’ smartphone app. To do this, he had to figure out the details of what the Android app does so that it could be replicated. He provided a fake camera WiFi hotspot for the app in order to learn its secrets.

Normally, the camera creates a WiFi hotspot with a specific SSID (iCam-AKASO_C_1e96) and password (1234567890) which the Android app connects to before contacting the camera’s IP address at 192.72.1.1. The app then shows a live view and allows you to copy over snapshots and videos. Initially, [Richard] tried to decompile the Android app using JADX, but the decompiled code contained so many URLs that it was hard to make heads or tails of it. In addition, the app supports many different Akaso camera models, making it harder to focus on the part for this particular camera.

Continue reading “Reverse Engineering The Web API Of An Akaso EK7000 Action Camera”