The Astronomical Promises Of The Fisher Space Pen

We’ve all heard of the Fisher Space Pen. Heck, there’s even an episode of Seinfeld that focuses on this fountain of ink, which is supposed to be ready for action no matter what you throw at it. The legend of the Fisher Space Pen says that it can and will write from any angle, in extreme temperatures, underwater, and most importantly, in zero gravity. While this technology is a definite prerequisite for astronauts in space, it has a long list of practical Earthbound applications as well (though it would be nice if it also wrote on any substrate).

You’ve probably heard the main myth of the Fisher Space Pen, which is that NASA spent millions to develop it, followed quickly by the accompanying joke that the Russian cosmonauts simply used pencils. The truth is, NASA had already tried pencils and decided that graphite particles were too much of an issue because they would potentially clog the instruments, like bags of ruffled potato chips and unsecured ant farms.

A Space-Worthy Instrument Indeed

Usually, it’s government agencies that advance technology, and then it trickles down to the consumer market at some point. But NASA didn’t develop the Space Pen. No government agency did. Paul Fisher of the Fisher Pen Company privately spent most of the 1960s working on a pressurized pen that didn’t require gravity in the hopes of getting NASA’s attention and business. It worked, and NASA motivated him to keep going until he was successful.

An original Fisher Space Pen AG-7 atop the Apollo 11 flight plan.
The pen that went to the moon. Image via Sebastien Billard

Then they tested the hell out of it in all possible positions, exposed it to extreme temperatures between -50 °F and 400 °F (-45 °C to 204 °C), and wrote legible laundry lists in atmospheres ranging from pure oxygen to a total vacuum. So, how does this marvel of engineering work?

The Fisher Space Pen’s ink cartridge is pressurized to 45 PSI with nitrogen, which keeps oxygen out in the same manner as potato chip bags. Inside is a particularly viscous, gel-like ink that turns to liquid when it meets up with friction from the precision-fit tungsten carbide ballpoint.

Between the viscosity and the precision fit of the ballpoint, the pen shouldn’t ever leak, but as you’ll see in the video below, (spoiler alert!) snapping an original Space Pen cartridge results in a quick flood of thick ooze as the ink is forced out by the nitrogen.

Continue reading “The Astronomical Promises Of The Fisher Space Pen”

A macro keypad making music.

Meet The Marvelous Macro Music Maker

Do you kind of want a macropad, but aren’t sure that you would use it? Hackaday alum [Jeremy Cook] is now making and selling the JC Pro Macro on Tindie, which is exactly what it sounds like — a Pro Micro-based macro keypad with an OLED screen and a rotary encoder. In the video below, [Jeremy] shows how he made it into a music maker by adding a speaker and a small solenoid that does percussion, all while retaining the original macro pad functionality.

[Jeremy]’s original idea for a drum was to have a servo seesawing a chopstick back and forth on the table as one might nervously twiddle a pencil. That didn’t work out so well, so he switched to the solenoid and printed a thing to hold it upright, and we absolutely love it. The drum is controlled with the rotary encoder: push to turn the beat on or off and crank it to change the BPM.

To make it easier to connect up the solenoid and speaker, [Jeremy] had a little I²C helper board fabricated. There’s one SVG connection and another with power and ground swapped in the event it is needed. If you’re interested in the JC Pro Macro, you can pick it up in various forms over on Tindie. Of course, you might want to wait for version 2, which is coming to Kickstarter in October.

There are many ways to make a macro keyboard. Here’s one that also takes gesture input.

Continue reading “Meet The Marvelous Macro Music Maker”

Roll-on/roll-off vessel docking

RORO Vessels: Driving Cars Across The Ocean

YouTube does a pretty good job of making itself a target for criticism, but one thing you can say about their algorithms: when they work, they really work. Case in point, the other day I found a suggestion in my feed for a very recent video about salvaging a shipwreck. I can’t begin to guess what combination of view history and metadata Google mined to come to the conclusion that I’d be interested in this video, but they hit the nail on the head.

But more importantly, their algorithmic assessment of my interests must have been a goldmine to them — or it could have been if I didn’t have a minefield of ad blockers protecting me — because I fell down a rabbit hole that led me to a bunch of interesting videos. As it turns out, the shipwreck in that first video was of a cargo ship that was carrying thousands of brand-new automobiles, which were all destroyed in the fire and subsequent capsizing of a “roll-on/roll-off” (RORO) vessel off the coast of Georgia (the state, not the country) in 2019.

Thus began my journey into RORO vessels, on which automobiles and other bulky cargo are transported around the world. And while my personal assessment of the interests of Hackaday readers probably is not as finely tuned as Google’s algos, I figured there’s a better than decent chance that people might enjoy tagging along too.

Continue reading “RORO Vessels: Driving Cars Across The Ocean”

Bluetooth Vulnerability: Arbitrary Code Execution On The ESP32, Among Others

Bluetooth has become widely popular since its introduction in 1999. However, it’s also had its fair share of security problems over the years. Just recently, a research group from the Singapore University of Technology and Design found a serious vulnerability in a large variety of Bluetooth devices. Having now been disclosed, it is known as the BrakTooth vulnerability.

Full details are not yet available; the research team is waiting until October to publicly release proof-of-concept code in order to give time for companies to patch their devices. The basic idea however, is in the name. “Brak” is the Norweigan word for “crash,” with “tooth” referring to Bluetooth itself. The attack involves repeatedly attempting to crash devices to force them into undesired operation.

The Espressif ESP32 is perhaps one of the worst affected. Found in all manner of IoT devices, the ESP32 can be fooled into executing arbitrary code via this vulnerability, which can do everything from clearing the devices RAM to flipping GPIO pins. In smart home applications or other security-critical situations, this could have dire consequences.

Other chipsets are affected to varying degrees, including parts from manufacturers like Texas Instruments and Cypress Semiconductor. Some parts are vulnerable to denial of service, while audio devices may be frozen up or shut down by the attack. The group claims over 1400 products could be affected by the bug.

Firmware patches are being rolled out, and researcher [Matheus E. Garbelini] has released code to build a sniffer device for the vulnerability on GitHub. If you’re involved with the design or manufacture of Bluetooth hardware, it might pay to start doing some homework on this one! Concerned vendors can apply for proof-of-concept test code here.

Download From NFC Datalogger, No App Required

The plethora of wireless technologies has made internet-connected devices the norm, but it’s not always necessary if you don’t need real-time updates. Whether it’s due to battery life, or location and range constraints, downloading data directly from the device whenever possible might be a viable solution. [Malcolm Mackay] demonstrates an elegant solution on the open source cuplTag temperature/humidity logger, using any NFC-enabled smartphone, without requiring a custom app.

The cuplTag utilizes the feature on NFC-enabled smartphones to automatically open a URL provided by the cuplTag. It encodes the sensor data from the sensor unit as a circular buffer in a ~1 kB URL, which automatically uploads to a web frontend that plots the data. (You can use their server or run your own.)

This means that data can be collected by anyone with the appropriate phone with zero setup. The data is displayed on the web app and can be downloaded as a CSV. To deter spoofing, each tag ships with a secret key which is used to generate a unique HMAC every time the circular buffer changes.

Battery life is a priority on the cuplTag, and it’s theoretically capable of running seven years on a single CR1220 coin cell using the current-sipping Texas Instruments MSP430 microcontroller. The hardware, firmware, and server-side frontend and backend code are all open source and available on GitHub.

Earlier this year, we held a data logging contest, and featured submissions that monitored everything from your garden’s moisture levels to your caffeine intake.

Even Faster Fourier Transforms On The Raspbery Pi Zero

Oftentimes in computing, we start doing a thing, and we’re glad we’re doing it. But then we realise, it would be much nicer if we could do it much faster. [Ricardo de Azambuja] was in just such a situation when working with the Raspberry Pi Zero, and realised that there were some techniques that could drastically speed up Fast Fourier Transforms (FFT) on the platform. Thus, he got to work.

The trick is using the Raspberry Pi Zero’s GPU to handle the FFTs instead of the CPU itself. This netted Ricardo a 7x speed upgrade for 1-dimensional FFTs, and a 2x speed upgrade for 2-dimensional operations.

The idea was cribbed from work we featured many years ago, which provided a similar speed up to the very first Raspberry Pi. Given the Pi Zero uses the same SoC as the original Raspberry Pi but at a higher clock rate, this makes perfect sense. However, in this case, [Ricardo] implemented the code in Python instead of C as suits his use case.

[Ricardo] uses the code with his Maple Syrup Pi Camera project, which pairs a Coral USB machine learning accelerator with a Pi Zero and a camera to achieve tasks such as automatic licence plate recognition or facemask detection. Fun!

3D Printed Sensor Detects Glyphosate

Typically, detecting glyphosate — a herbicide — in a beverage requires a sophisticated test setup. But Washington State University has a 3D printed sensor that uses nanotubes to simplify the detection of the toxin.

The idea is very similar to inexpensive blood glucose monitors. The test will eventually find use for human samples, but the initial testing was for detecting contamination in orange juice.

Continue reading “3D Printed Sensor Detects Glyphosate”