I Want To Believe: How To Make Technology Value Judgements

In the iconic 1990s TV series The X Files, David Duchovny’s FBI agent-paranormal investigator Fox Mulder has a poster on his office wall. It shows a flying saucer in flight, with the slogan “I Want To Believe”. It perfectly sums up the dilemma the character faces. And while I’m guessing that only a few Hackaday readers have gone down the full lizard-people rabbit hole, wanting to believe is probably something that a lot of us who love sci-fi understand. It would be a fascinating event for science if a real extraterrestrial craft would show up, so of course we want to believe to some extent, even if we’re not seriously expecting it to appear in a Midwestern cornfield and break out the probes any time soon.

By All Means Believe. But Don’t Wreck Your Career

The first page of a scientific paper: "Electrochemically induced nuclear fusion of deuterium".
The infamous Fleischmann and Pons paper from 1989 on cold fusion.

Outside the realm of TV drama and science fiction it’s a sentiment that also applies in more credible situations. Back at the end of the 1980s for example when so-called cold fusion became a global story it seemed as though we might be on the verge of the Holy Grail of clean energy breakthroughs. Sadly we never got our Mr. Fusion to power our DeLorean, and the scientific proof was revealed to be on very weak foundations. The careers of the two researchers involved were irreparably damaged, and the entire field became a byword for junk science. A more recently story in a similar vein is the EM drive, a theoretical reactionless force generator that was promising enough at one point that even NASA performed some research on it. Sadly there were no magic engines forthcoming, so while it was worth reporting on the initial excitement, we’re guessing the story won’t come back.

When evaluating a scientific or technical breakthrough that seems as miraculous as it is unexpected then, of course we all want to believe. We evaluate based on the information we have in front of us though, and we all have a credibility pyramid. There’s nothing wrong with having an interest in fields that are more hope than delivery, indeed almost every technology that powers our world will at some time have to overcome skepticism in its gestation period. Perhaps it’s best to say that it’s okay to have hope, but hope shouldn’t override our scrutiny of the proof. Of course I want a perpetual motion machine, who wouldn’t, but as a fictional engineer once allegedly said, “Ye cannae change the laws of physics”. Continue reading “I Want To Believe: How To Make Technology Value Judgements”

Ask Hackaday: How Much Would You Stake On An Online Retailer

On the bench where this is being written, there’s a Mitutoyo vernier caliper. It’s the base model with a proper vernier scale, but it’s beautifully made, and it’s enjoyable to see younger hardware hackers puzzle over how to use it. It cost about thirty British pounds a few years ago, but when it comes to quality metrology instruments that’s really cheap. The sky really is the limit for those in search of ultimate accuracy and precision. We can see then why this Redditor was upset when the $400 Mitutoyo they ordered from Amazon turned out to be nothing of the sort. We can’t even call it a fake, it’s just a very cheap instrument stuffed oddly, into a genuine Mitutoyo box.

Naturally we hope they received a refund, but it does raise the question when buying from large online retailers; how much are we prepared to risk? We buy plenty of stuff from AliExpress in out community, but in that case the slight element of chance which comes with random Chinese manufacture is offset by the low prices. Meanwhile the likes of Amazon have worked hard to establish themselves as trusted brands, but is that misplaced? They are after all simply clearing houses for third party products, and evidently have little care for what’s in the box. The £30 base model caliper mentioned above is an acceptable punt, but at what point should we go to a specialist and pay more for some confidence in the product?

It’s a question worth pondering as we hit the “Buy now” button without thinking. What’s your view? Let us know in the comments. Meanwhile, we can all be caught with our online purchases.

Thanks [JohnU] for the tip.

Mechanisms: Tension Control Bolts

If there’s an enduring image of how large steel structures used to be made, it’s probably the hot riveting process. You’ve probably seen grainy old black-and-white films of a riveting gang — universally men in bib overalls with no more safety equipment than a cigarette, heating rivets to red heat in a forge and tossing them up to the riveters with a pair of tongs. There, the rivet is caught with a metal funnel or even a gloved hand, slipped into a waiting hole in a flange connecting a beam to a column, and beaten into submission by a pair of men with pneumatic hammers.

Dirty, hot, and dangerous though the work was, hot riveted joints were a practical and proven way to join members together in steel structures, and chances are good that any commercial building that dates from before the 1960s or so has at least some riveted joints. But times change and technology marches on, and riveted joints largely fell out of fashion in the construction trades in favor of bolted connections. Riveting crews of three or more men were replaced by a single ironworker making hundreds of predictable and precisely tensioned connections, resulting in better joints at lower costs.

Bolted joints being torqued to specs with an electric wrench might not have the flair of red-hot rivets flying around the job site, but they certainly have a lot of engineering behind them. And as it turns out, the secret to turning bolting into a one-person job is mostly in the bolt itself.

Continue reading “Mechanisms: Tension Control Bolts”

What Happens If You Speedrun Making A CPU?

Usually, designing a CPU is a lengthy process, especially so if you’re making a new ISA too. This is something that can take months or even years before you first get code to run. But what if it wasn’t? What if one were to try to make a CPU as fast as humanly possible? That’s what I asked myself a couple weeks ago.

Left-to-right: Green, orange and red rectangle with 1:2 aspect ratio. Each rectangle further right has 4x the area of its neighbor on the left.
Relative ROM size. Left: Stovepipe, center: [Ben Eater]’s, right: GR8CPU Rev. 2
Enter the “Stovepipe” CPU (I don’t have an explanation for that name other than that I “needed” one). Stovepipe’s hardware was made in under 4 hours, excluding a couple small bugfixes. I started by designing the ISA, which is the simplest ISA I ever made. Instead of continuously adding things to make it more useful, I removed things that weren’t strictly necessary until I was satisfied. Eventually, all that was left were 8 major opcodes and a mere 512 bits to represent it all. That is far less than GR8CPU (8192 bit), my previous in this class of CPU, and still less than [Ben Eater]’s breadboard CPU (2048 bit), which is actually less flexible than Stovepipe. All that while taking orders of magnitude less time to create than either larger CPU. How does that compare to other CPUs? And: How is that possible?
Continue reading “What Happens If You Speedrun Making A CPU?”

Hacker Tactic: Building Blocks

The software and hardware worlds have overlaps, and it’s worth looking over the fence to see if there’s anything you missed. You might’ve already noticed that we hackers use PCB modules and devboards in the same way that programmers might use libraries and frameworks. You’ll find way more parallels if you think about it.

Building blocks are about belonging to a community, being able to draw from it. Sometimes it’s a community of one, but you might just find that building blocks help you reach other people easily, touching upon common elements between projects that both you and some other hacker might be planning out. With every building block, you make your or someone else’s next project quicker, and maybe you make it possible.

Sometimes, however, building blocks are about being lazy.

Continue reading “Hacker Tactic: Building Blocks”

A Hacker’s Travel Guide To Europe

This summer, I was pleasantly surprised when a friend of mine from Chicago turned up at one of the hacker camps I attended. A few days of hanging out in the sun ensued, doing cool hacker camp stuff, drinking unusual beverages, and generally having fun. It strikes me as a shame that this is such a rare occurrence, and since Hackaday is an American organisation and I am in a sense writing from its European outpost, I should do what I can to encourage my other friends from the USA and other parts of the world to visit. So here I’m trying to write a hacker’s guide to visiting Europe, in the hope that I’ll see more of you at future camps and other events.

It’s Intimidating. But Don’t Worry.

Danish road sign: "Se efter tog", or according to Google Translate: "Look for trains".
Yes. We’d find this intimidating, too. Bewitchedroutine, Public domain.

First of all, I know that it’s intimidating to travel to an unfamiliar place where the language and customs may be different. I’m from England, which sits on a small island in the North Atlantic, and believe it or not it’s intimidating for us to start traveling too. It involves leaving the safety of home and crossing the sea whether by flight, ferry, or tunnel, and that lies outside one’s regular comfort zone.

Americans live in a country that’s almost a continent in its own right, so you can satisfy your travel lust without leaving home. Thus of course the idea of landing in Germany or the Netherlands is intimidating. But transatlantic flights are surprisingly cheap in the scheme of international travel because of intense competition, so I’m here to reassure you that you can travel my continent ‘s hacker community without either feeling out of your depth, or breaking the bank.

Continue reading “A Hacker’s Travel Guide To Europe”

Mining And Refining: Mine Dewatering

From space, the most striking feature of our Pale Blue Dot is exactly what makes it blue: all that water. About three-quarters of the globe is covered with liquid water, and our atmosphere is a thick gaseous soup laden with water vapor. Almost everywhere you look there’s water, and even where there’s no obvious surface water, chances are good that more water than you could use in a lifetime lies just below your feet, and accessing it could be as easy as an afternoon’s work with a shovel.

And therein lies the rub for those who delve into the Earth’s depths for the minerals and other resources we need to function as a society — if you dig deep enough, water is going to become a problem. The Earth’s crust holds something like 44 million cubic kilometers of largely hidden water, and it doesn’t take much to release it from the geological structures holding it back and restricting its flow. One simple mineshaft chasing a coal seam or a shaft dug in the wrong place, and suddenly all the hard-won workings are nothing but flooded holes in the ground. Add to that the enormous open-pit mines dotting the surface of the planet that resemble nothing so much as empty lakes waiting to fill back up with water if given a chance, and the scale of the problem water presents to mining operations becomes clear.

Dewatering mines is a complex engineering problem, one that intersects and overlaps multiple fields of expertise. Geotechnical engineers work alongside mining engineers, hydrogeologists, and environmental engineers to devise cost-effective ways to control the flow of water into mines, redirect it when they can, and remove it when there’s no alternative.

Continue reading “Mining And Refining: Mine Dewatering”