An Open Hardware Laser Engraver For Everyone

Right now, you can get a diode laser engraver on eBay for around $100 USD. That sounds like a deal, but it’ll probably use some arcane proprietary software, won’t be terribly accurate, and the laser itself will almost certainly be fully exposed. Of course there’s no shortage of DIY builds which improve upon this situation greatly, but unfortunately the documentation and instructions to replicate them yourself often leave a lot to be desired.

To get a safe and accurate laser platform into the hands of hackers everywhere, we need more well documented open source designs that are actually built with community in mind. Projects like the Engravinator from [Adam Haile]. This isn’t a one-off design with documentation thrown together after the fact, it’s a fully open hardware engraver with a concise assembly guide that’s built from 3D printed parts and readily available components. You’re free to source and print the parts yourself or, eventually, purchase everything as a kit.

Pen-equipped Engravinator

The microwave-sized Engravinator is built from standard 2020 aluminum extrusion, and offers a workable area of 130mm x 130mm. There’s a hatch on the front of the enclosure for objects that are small enough to fit inside the machine, but the open bottom and handles on the top also allow the user to place the Engravinator directly onto the work surface. [Adam] says this feature can be especially useful if you’re looking to burn a design into a tabletop or other large object.

Outside of the aluminum extrusion and miscellaneous hardware that make up the frame, most of the other parts are 3D printed. Released under the CERN Open Hardware License v1.2 and distributed as both STL and STEP files, the printable parts for the Engravinator are ripe for modification should you be so inclined. The same goes for the DXF files for the enclosure panels, which will need to be cut out of orange acrylic with a CNC or (ironically) a laser.

Continue reading “An Open Hardware Laser Engraver For Everyone”

Giving Sight To The Blind With A Wave Of The Hand

[Jakob Kilian] is working on a glove that he hopes will let the blind “see” their surroundings.

One of the most fascinating examples of the human brain’s plasticity is in its ability to map one sense to another. Some people, for example, report being able to see sound, giving them a supernatural ability to distinguish tones. This effect has also been observed in the visually impaired. There are experiments where grids of electrodes were placed on the tongue or mechanical actuators were placed on the lower back. The signals from a camera were fed into these grids and translated in to shocks or movement. The interesting effect is that the users quickly learned to distinguish objects from this low resolution input. As they continued to use these devices they actually reported seeing the objects as their visual centers took over interpreting this input.

Most of these projects are quite bulky and the usual mess you’d expect from a university laboratory. [Jakob]’s project appears to trend to a much more user-friendly product. A grid of haptics are placed on the back of the user’s hand along with a depth camera. Not only is it somewhat unobtrusive, the back of the hand is very sensitive to touch and the camera is in a prime position to be positioned for a look around the world.

[Jakob] admits that, as an interaction designer, his hardware hacking skills are still growing. To us, the polish and thought that went into this is already quite impressive, so it’s no wonder he’s one of the Hackaday Prize Finalists.

Blend Your Last Frogs. Google Turns A Blind Eye To Flash.

Google has announced that it will no longer index Flash files.

Journey with me to a time in a faraway internet; a time before we had monetized social media. A time when the page you shared with your friends was your page and not a page on someone’s network. Way back when Visual Basic was what Python is now and JavaScript was a hack mostly used for cool effects. A hero arose. Macromedia Flash opened the gates to the interactive web, and for a chunk of time it consumed more than a decent portion of humanity’s attention and artistic output.

Computer art was growing, but was it public? How many grandmothers would see a demo?

New grounds were paved and anyone who wanted to become an animator or a web designer could manage it in a few tutorials. Only a few years before Flash took off, people had started talking about computers as a source for art in mostly theoretical terms. There were demoscenes, university studies, and professional communities, of course, but were they truly public? Suddenly Flash made computer art an everyday thing. How could computers not be used for art? In schools and offices all over the world people of varying technical skill would get links to games, animation, and clever sites sent by their friends and colleagues.

For 23 years Flash has had this incredible creative legacy. Yet it’s not perfect by any means. It’s a constant headache for our friendly neighborhood super-conglomerates. Apple hates how it drains the battery on their mobile devices, and that it’s a little village outside of their walled garden. Microsoft sees it as another endless security violation. They all saw it as a competitor product eating their proprietary code bases. Continue reading “Blend Your Last Frogs. Google Turns A Blind Eye To Flash.”

Supercon Keynote: Dr. Megan Wachs On RISC-V

Hackaday has open-source running deep in our veins — and that goes for hardware as well as software. After all, it’s great to run open-source software, but if it’s running on black-box hardware, the system is only half open. While software has benefited mightily from all of the advantages of community development, the hardware world has been only recently catching up. And so we’ve been following the RISC-V open-source CPU development with our full attention.

Dr. Wachs, making her own wedding ring.

Our keynote speaker for the 2019 Hackaday Superconference is Dr. Megan Wachs, the VP of Engineering at SiFive, the company founded by the creators of the RISC-V instruction-set architecture (ISA). She has also chaired the RISC-V Foundation Debug Task Group, so it’s safe to say that she knows RISC-V inside and out. If there’s one talk we’d like to hear on the past, present, and future of the architecture, this is it.

The RISC-V isn’t a particular chip, but rather it’s a design for how a CPU works, and a standard for the lowest-level language that the machine speaks. In contrast to proprietary CPUs, RISC-V CPUs from disparate vendors can all use the same software tools, unifying and opening their development. Moreover, open hardware implementations for the silicon itself mean that new players can enter the space more easily, bring their unique ideas to life faster, and we’ll all benefit. We can all work together.

It’s no coincidence that this year’s Supercon badge has two RISC-V cores running in its FPGA fabric. When we went shopping around for an open CPU core design, we had a few complete RISC-V systems to pick from, full compiler and development toolchains to write code for them, and of course, implementations in Verilog ready to flash into the FPGA. The rich, open ecosystem around RISC-V made it a no-brainer for us, just as it does for companies making neural-network peripherals or even commodity microcontrollers. You’ll be seeing a lot more RISC-V systems in the near future, on your workbench and in your pocket.

We’re tremendously excited to hear more about the project from the inside, and absolutely looking forward to Megan’s keynote speech!

The Hackaday Superconference is completely sold out, but that doesn’t mean that you have to miss out. We’ll be live-streaming the keynote and all other talks on the Supercon main stage, so subscribe our YouTube channel and you won’t miss a thing.

Ramen Pen Lets You Doodle With Noodles

Don’t write off your weird ideas — turn them into reality. For years, woodworkers have used pen bodies as a canvas for showing off beautiful wood. But what’s the fun in that? [JPayneWoodworking] made a pen out of Ramen noodles just to see if he could.

The process is pretty straightforward, as he explains in the build video after the break. He hammered the uncooked noodle mass into pieces small enough to fit a pen blank mold, but not so small that they’re unrecognizable. Then he poured in pigmented epoxy in orange, silver, and black. [JPayneWoodworking] chose those colors for Halloween, but rather than looking freaky, we think it makes the pen look like a bowl of beef broth-y goodness from a fancy Ramen place.

After adding the flavor packet pigments, he put it in a pressure tank to remove all air pockets. Once it sets up, the process is the same as any other pen blank — take it for a spin on the lathe, polish it up, ream it out, and fit it with the parts from a pen kit. We’d like to see the look on the face of the next person to ask [JPayneWoodworking] for a pen.

Want to get into woodworking just to make weird stuff like this? We don’t blame you. But how does a hardware hacker such as yourself get started? [Dan Maloney]’s got you covered.

Continue reading “Ramen Pen Lets You Doodle With Noodles”

Qantas’ Research Flight Travels 115% Of Range With Undercrowded Cabin

Long-haul flights can be a real pain when you’re trying to get around the world. Typically, they’re achieved by including a stop along the way, with the layover forcing passengers to deplane and kill time before continuing the flight. As planes have improved over the years, airlines have begun to introduce more direct flights where possible, negating this frustration.

Australian flag carrier Qantas are at the forefront of this push, recently attempting a direct flight from New York to Sydney. This required careful planning and preparation, and the research flight is intended to be a trial run ahead of future commercial operations. How did they keep the plane — and the passengers — in the air for this extremely long haul? The short answer is that they cheated with no cargo and by pampering their 85% empty passenger cabin. Yet they plan to leverage what they learn to begin operating 10,000+ mile non-stop passenger flights — besting the current record by 10% — as soon as four years from now.
Continue reading “Qantas’ Research Flight Travels 115% Of Range With Undercrowded Cabin”

Laser-Based Audio Injection On Voice-Controllable Systems

In one of the cooler hacks we’ve seen recently, a bunch of hacking academics at the University of Michigan researched the ability to flicker a laser at audible sound frequencies to see if they could remotely operate microphones simply by shining a light on them. The results are outstanding.

While most Hackers will have heard about ‘The Thing’ – a famous hack where Russian KGB agents would aim a radio transmitter at the great seal in the US embassy,  almost none of us will have thought of using lasers shined in from distant locations to hack modern audio devices such as Alexa or Google Assistant. In the name of due diligence, we checked it out on Wikipedia: ‘The Photoacoustic Effect’ , and indeed it is real – first discovered in 1880 by Alexander Bell! The pulsing light is heating the microphone element and causing it to vibrate along with the beam’s intensity. Getting long range out of such a system is a non-trivial product of telescopes, lasers, and careful alignment, but it can be made to work.

Digging deeper into the hack, we find that the actual microphone that is vulnerable is the MEMS type, such as the Knowles SPV0842LR5H. This attack is relatively easy to prevent; manufacturers would simply need to install screens to prevent light from hitting the microphones. For devices already installed in our homes, we recommend either putting a cardboard box over them or moving them away from windows where unscrupulous neighbors or KGB agents could gain access. This does make us wonder if MEMS mics are also vulnerable to radio waves.

As far as mobile phones are concerned, the researchers were able to talk into an iPhone XR at 10 metres, which means that, very possibly, anybody with a hand held ultra violet / infra red equipped flashlight could hack our phones at close range in a bar, for example. The counter-measures are simple – just stick some black electrical tape over the microphone port at the bottom of the phone. Or stay out of those dodgy bars. Continue reading “Laser-Based Audio Injection On Voice-Controllable Systems”