Rethinking Automated Bed Leveling For 3D Printers

Automatic bed leveling is the next killer feature that will be found on all commercial filament printers. It’s a problem that has been solved a few dozen times already; there are just so many ways you can go about it. The Printrbot uses an inductive sensor to determine the position of the metal bed in relation to the nozzle. The Lulzbot Mini touches the nozzle itself to four contacts on the corner of the bed. There are even a few projects that will mechanically level the bed with the help of a system of cams and springs. It’s a difficult problem, and none of these solutions are perfect. [mjrice] has been thinking about the problem, and he hit upon a solution that is simple, elegant, and can be replicated on a 3D printer. It’s the RepRap solution to 3D printing, and it looks cool, to boot.

Instead of using the nozzle as a contact, getting an inductive sensor, or fabricating a baroque system of gears and cams, [mjrice] is doing this the old-fashioned way: a simple microswitch, the same type of switch you would find on the limit switches of any RepRap. Having a switch at the same Z position as a nozzle is an iffy idea, so [mjrice] made this switch retract into the extruder during printing, without using any motors, servos, or other electromechanical contrivances.

The key to this setup is a simple spring and a rack gear. When this rack gear is hit from the left side, it moves an arm and places the switch down on the bed. Hit the rack from the right side, and the switch folds up into the extruder. Combine this with a bit of G-code at the beginning of the print, and the switch will move down, figure out the actual height of the bed, and flip up out of the way. Beautiful, elegant, and the algorithms for bed leveling are already in most major printer firmwares.

You can check out the video of the mechanism below. It’s a great little device, and since it’s on a RepRap first, it’s not going to show up in a proprietary 3D printer next.

Continue reading “Rethinking Automated Bed Leveling For 3D Printers”

Ask Hackaday: Selling CAD Prints That Are Not Yours

[Louise] tried out her new E3D Cyclops dual extrusion system by printing a superb model dragon. The piece was sculpted in Blender, stands 13cm tall and can be made without supports. It’s an impressive piece of artwork that reflects the maker’s skill, dedication and hard work. She shared her creation on the popular Thingiverse website which allows others to download the file for use on their own 3D printer. You can imagine her surprise when she stumbled upon her work being sold on eBay.

It turns out that the owner of the eBay store is not just selling [Louise]’s work, he’s selling thousands of other models taken from the Thingiverse site. This sketchy and highly unethical business model has not gone unnoticed, and several people have launched complaints to both Thingiverse and eBay. Now, there are lots of things to talk about here, but the 800 pound high voltage transformer in the room is the legality of the whole thing. What he’s doing might be unethical, but is it illegal?

When [Louise] politely asked the eBay store owner to remove her work, he responded with:

“When you uploaded your items onto Thingiverse for mass distribution, you lost all rights to them whatsoever. They entered what is known in the legal world as “public domain”. The single exception to public domain rules are original works of art. No court in the USA has yet ruled a CAD model an original work or art.”

Most of the uploaded CAD models on Thingiverse are done under the Creative Commons license, which is pretty clear in its assertion that anyone can profit from the work. This would seem to put the eBay store owner in the clear for selling the work, but it should be noted that he’s not properly attributing the work to the original creator. There are other derivatives of the license, some of which prohibit commercial use of the work. In these cases, the eBay store owner would seem to be involved in an obvious violation of the license.

There are also questions stirring with his use of images.  He’s not taking the CAD model and making his own prints for images. He lifting the images of the prints from the Thingiverse site along with the CAD files. It’s a literal copy/paste business model.

With that said,  the eBay store owner makes a fairly solid argument in the comments section of the post that broke the news. Search for the poster named “JPL” and the giant brick of text to read it. He argues that the Thingiverse non-commercial license is just lip service and has no legal authority. One example of this is how they often provide links to companies that will print a CAD design on the same page of a design that’s marked as non-commercial. He sums up one of many good points with the quote below:

“While we could list several other ways Thingiverse makes (money), any creator should get the picture by now-Thingiverse exists to make Stratasys (money) off of creators’ designs in direct violation of its very own “non-commercial” license. If a creator is OK with a billion-dollar Israeli company monetizing his/her designs, but hates on a Philly startup trying to make ends-meet, then they have a very strange position indeed.”

OK Hackaday readers, you have heard both sides of the issue. Here’s the question(s):

1.  Is the eBay seller involved in illegal activity?

2. Can he change his approach to stay within the limits of the license? For instance, what if he credits the                      original maker on the sale page?

3. How would you feel if you found your CAD file for sale on his eBay store?

A Field Guide To The North American Utility Pole

We live under the umbrella of an intricate and fascinating web of infrastructure that enables every aspect of modern technology. But how often do we really look at it? I’ve been intrigued by utility poles for years, and I’ve picked up a thing or two that I’d like to share. Bear in mind these are just my observations from the ground in my area; I’m sure utility professionals will have better information, and regional practices will no doubt lead to very different equipment arrangements. But here’s a little of what I’ve picked up over my years as a pole geek.

Continue reading “A Field Guide To The North American Utility Pole”

Linux Mint Hacked Briefly – Bad ISOs, Compromised Forum

On February 20th, servers hosting the Linux Mint web site were compromised and the site was modified to point to a version of Mint with a backdoor installed. Very few people were impacted, fortunately; only those who downloaded Mint 17.3 Cinnamon on February 20th. The forum user database was also compromised.

What is most impressive here is not that Linux Mint was compromised, but the response and security measures that were already in place that prevented this from becoming a bigger problem. First, it was detected the same day that it was a problem, so the vulnerability only lasted less than a day. Second, it only affected downloads of a specific version, and only if they clicked a specific link, so anyone who was downloading from a direct HTTP request or a torrent is unaffected. Third, they were able to track down the names of three people in Bulgaria who are responsible for this hack.

As far as the forum compromise, the breech netted usernames, emails, and encrypted passwords, as well as personal information that forum users may have entered in signatures or private messages. It’s always nice to see when compromised sites are not storing passwords in plain text, though.

There is one security measure which should have protected against this and failed for a couple of reasons, and that’s the signature. Normally, the file download is accompanied by a signature which is generated from the file, like an MD5 or SHA checksum. By generating the checksum of the downloaded ISO file and comparing it to the reported signature on the web site, one can confirm that the file has downloaded correctly and that it is the same file. In this case anyone downloading the bad ISO should have caught that the downloaded file was not the official one because the signatures did not match. This can fail. Most people are too lazy to check (and there is no automated checking process). More importantly, because the attackers controlled the web site, they could change the site to report any signature they wanted, including the signature for the bad ISO file.

If you are affected by this, you should change your password on the forum and anywhere you use the same email/password. More importantly, as great as the verification signature is, shouldn’t there be a better way to verify so that people use it regularly and so that it can’t be compromised so easily?

Kicking The Tires Before You Buy: 3d Printers

So you’re looking to buy your first 3D printer, and your index finger is quivering over that 300 US Dollar printer on Amazon.com. Stop! You’re about to have a bad time. 3D printing has come a long way, but most 3D printers are designed through witchcraft, legends, and tall tales rather than any rigorous engineering process. I would say most 3D printer designs are either just plain bad, or designed by a team of Chinese engineers applying all their ingenuity to cost cutting. There are a few that are well designed, and there is a comparatively higher price tag attached.

I’ll start by going through some of the myths and legends that show up in 3D printers. After that I’ll go through some of the common, mostly gimmick, features that typically hinder your printer’s ability, rather than adding any useful function. Next I’ll go onto the things that will actually make your printer better. Finally, I’ll add some special consideration if you’re a beginner buying your first printer.

Continue reading “Kicking The Tires Before You Buy: 3d Printers”

Shoot Darts At The Shins Of Total Strangers

[Michael Brumlow] found us and sent us a link. Within a few seconds, we were driving a webcam-enabled Nerf dart tank through his office and trying not to hit walls or get stepped on by his co-workers. Unfortunately, it was out of darts at the time, but you can find them all over the floor if you scout around.

screenshot_remote_botAll of the code details, including the link where you can test drive it yourself, are up on [Michael]’s GitHub. The brains are an Intel Edison board, and the brawns are supplied by an Arduino motor controller shield and (for the latest version) a chassis bought from China.

It runs fairly smoothly, considering the long round trip from [Michael]’s office in Texas, through wherever Amazon keeps their Web Services, over to us in Germany and back. Once we got used to the slight lag, and started using the keyboard’s arrow keys for control, we were driving around like a pro.

It’s got a few glitches still, like the camera periodically overheating and running out of WiFi distance. [Michael] said he’d try to keep it charged up and running while you give it a shot. The controls are multiplexed in the cloud, so your chance of steering it is as good as anyone else’s. It’ll be interesting to see what happens when thousands of Hackaday readers try to control it at once!

It takes a certain kind of bravery to put your telepresence robot up on the open Internets. So kudos to you, [Michael], and we hope that you manage to get some work done this week, even though you will have all of Hackaday driving into your cubicle walls.

Punch Card Reader For The 10 Types Of People In The World

Punch card data input is so 1890 US Census, right? Maybe not, if your goal is to educate kids about binary numbers and how they can encode characters. In which case, this paper clip and metal tape punch card reader might be just the thing you need.

Built as part of the educational outreach efforts of the MakeICT hackerspace, this project allows kids and adults to play with binary numbers and get some instant feedback. The reader itself is a simple affair of wood and plastic; bent paperclips make contact with a foil tape strip and LEDs show the state of the five input bits. A card is provided to students with spaces for the letters of a word that they want to input, along with a table to translate each letter into a number. Students use a paper punch to encode each character in binary. As the card is pulled through the reader, the letters are spoken by the Pi in turn and the whole word is pronounced at the end.

We’ll no doubt hear quibbles with the decision not to use ASCII for the character set, but we can see the logic in keeping the number of bits to a minimum and not distracting from the learning process. What’s cool about this is that it engages kids on so many levels. They learn about binary numbers, encoding systems, interfacing a computer to the real world, and if they care to delve deeper, they can learn about the code behind everything. It’s a great hook into the hacking arts.

And once the kids learn a thing or two, maybe they can use this punch-card Twitter interface to tweet their new-found knowledge.


Raspberry_Pi_LogoSmall

The Raspberry Pi Zero contest is presented by Hackaday and Adafruit. Prizes include Raspberry Pi Zeros from Adafruit and gift cards to The Hackaday Store!
See All the Entries || Enter Your Project Now!