Do You Need The Raspberry Pi Camera Module V3?

This month came the announcement of some new camera modules from Raspberry Pi. All eyes were on version 3 of their standard camera module, but they also sneaked out a new version of their high quality camera with an M12 lens mount. The version 3 module is definitely worth a look, so I jumped on a train to Cambridge for the Raspberry Pi Store, and bought myself one for review.

There’s nothing new about a Pi camera module as they’ve been available for years in both official and third party forms, so to be noteworthy the new one has to offer something a bit special. It uses a 12 megapixel sensor, and is available both in autofocus and wide angle versions in both standard and NoIR variants. Wide angle and autofocus modules may be new in the official cameras, but these are both things which have been on the third-party market for years.

So if an autofocus camera module for your Pi isn’t that new, what can we bring to a review that isn’t simply exclaiming over the small things? Perhaps it’s better instead to view the new camera in the context of the state of the Pi camera ecosystem, and what better way to do that than to turn a Pi and some modules into a usable camera! Continue reading “Do You Need The Raspberry Pi Camera Module V3?”

Open-Sourcing The Lisa, Mac’s Bigger Sister

Forty years ago, on January 19th of 1983, Apple released the Lisa, which was in many ways a revolutionary system. On January 19th of 2023, to celebrate the system’s 40th birthday, the Computer History Museum released the source code for Lisa OS version 3.1 under the Apple Academic License Agreement. Written in Pascal, the source includes over 1,300 source files, covering the OS itself, the Lisa Toolkit development system and a number of applications. The questions one might ask at this point include what the Apple Lisa even is, and why it was such an important system in computer history.

This especially in light of the terrible flop that the Lisa turned out to be, with only 10,000 units sold over two years. Part of this failure was definitely due to the introductory price, that was set at $9,995 (over $27,000 in 2021 dollars). Although it featured an OS with memory protection, despite the lack of an MMU on the Motorola 68k, among other advanced features that placed it well beyond other desktop computers of the time, it got quickly crushed in the market by Apple’s MacIntosh, even after successive Lisa successor releases that sought to address its shortcomings.

Continue reading “Open-Sourcing The Lisa, Mac’s Bigger Sister”

Broken Genes And Scrambled Proteins: How Radiation Causes Biological Damage

If decades of cheesy sci-fi and pop culture have taught us anything, it’s that radiation is a universally bad thing that invariably causes the genetic mutations that gifted us with everything from Godzilla to Blinky the Three-Eyed Fish. There’s a kernel of truth there, of course. One only needs to look at pictures of what happened to Hiroshima survivors or the first responders at Chernobyl to see extreme examples of what radiation can do to living tissues.

But as is usually the case, a closer look at examples a little further away from the extremes can be instructive, and tell us a little more about how radiation, both ionizing and non-ionizing, can cause damage to biochemical structures and processes. Doing so reveals that, while DNA is certainly in the crosshairs for damage by radiation, it’s not the only target — proteins, carbohydrates, and even the lipids that form the membranes within cells are subject to radiation damage, both directly and indirectly. And the mechanisms underlying all of this end up revealing a lot about how life evolved, as well as being interesting in their own right.

Continue reading “Broken Genes And Scrambled Proteins: How Radiation Causes Biological Damage”

NASA Lunar Probe Finds Out It’s Not Easy Being Green

If you’re a space fan, these are very exciting days. There’s so much happening overhead that sometimes it can be difficult to keep up with the latest news. Artemis I just got back from the Moon, the International Space Station crew are dealing with a busted Soyuz, SpaceX is making incredible progress with their Starship architecture, CubeSats are being flung all over the solar system, and it seems like every month a new company is unveiling their own commercially-developed launch vehicle.

Lunar Flashlight

So with everything going on, we wouldn’t be surprised if you haven’t heard about NASA’s Lunar Flashlight mission. The briefcase-sized spacecraft was launched aboard a special “rideshare” flight of SpaceX’s Falcon 9 rocket back on December 11th — tagging along with two other craft heading to our nearest celestial neighbor, the Japanese Hakuto-R lander, and a small rover developed by the United Arab Emirates. There was a time when a launch like that would have been big news, but being that it was only the second of seven launches that SpaceX performed in December alone, it didn’t make many headlines.

But recently, that’s started to change. There’s a growing buzz around Lunar Flashlight, though unfortunately, not for the reasons we’d usually hope. It seems the diminutive explorer has run into some trouble with its cutting-edge “green” propellant system, and unless the issue can be resolved soon, the promising mission could come to an end before it even had a chance to start.

Continue reading “NASA Lunar Probe Finds Out It’s Not Easy Being Green”

Machining With Electricity Explored In The Hack Chat

As a Hackaday reader, it’s safe to assume you’ve got a better than average understanding of electricity. There’s also an excellent chance you’re familiar with machining, and may even have a lathe or old mill in the workshop. But combining the two, and actually machining a piece of metal with electricity, isn’t something that many home gamers can boast first-hand experience with.

Daniel Herrington

Of course, that doesn’t mean there isn’t an interest. To help answer the burning (or at least, sparking) questions from the community, CEO and founder of Voxel Innovations Daniel Herrington stopped by this week’s Hack Chat to talk about the cutting edge of both electric discharge machining (EDM) and the closely related field of electrochemical machining (ECM). While his company uses the technology to produce components at incredible scales, Daniel got his start tinkering in the garage like so many of us, enabling him to provide both a professional and hobbyist prospective on the technologies.

Naturally, the first big question to be addressed was the difference between EDM and ECM. Put simply, electric discharge machining uses high-voltage to literally blast away material from the workpiece. The resulting finish is generally rough, and progress through the material tends to be slow, but it’s relatively simple to implement.

In contrast electrochemical machining could be thought of as a sort of reverse electroplating process, as the material being removed from the workpiece is dissolved and transferred to the cathode — though in practice the flow of pressurized electrolyte keeps it from actually plating the negatively charged tool. ECM is a faster process than EDM and allows for an exceptionally smooth surface finish, but is considerably more challenging from a technical perspective. Continue reading “Machining With Electricity Explored In The Hack Chat”

New Study Tells Us Where To Hide When The Nukes Are Coming

Geopolitics is a funny thing. Decades can go by with little concern, only for old grudges to suddenly boil to the surface and get the sabers a-rattlin’. When those sabers happen to be nuclear weapons, it can be enough to have you mulling the value of a bomb shelter in your own backyard.

Yes, every time the world takes a turn for the worse, we start contemplating what we’d do in the event of a nuclear attack. It’s already common knowledge that stout reinforced concrete buildings offer more protection than other flimsier structures. However, a new study has used computer modelling to highlight the best places to hide within such a building to maximise your chances of survival.

Continue reading “New Study Tells Us Where To Hide When The Nukes Are Coming”

Punycodes Explained

When you’re restricted to ASCII, how can you represent more complex things like emojis or non-Latin characters? One answer is Punycode, which is a way to represent Unicode characters in ASCII. However, while you could technically encode the raw bits of Unicode into characters, like Base64, there’s a snag. The Domain Name System (DNS) generally requires that hostnames are case-insensitive, so whether you type in HACKADAY.com, HackADay.com, or just hackaday.com, it all goes to the same place.

[A. Costello] at the University of California, Berkley proposed the idea of Punycode in RFC 3492 in March 2003. It outlines a simple algorithm where all regular ASCII characters are pulled out and stuck on one side with a separator in between, in this case, a hyphen. Then the Unicode characters are encoded and stuck on the end of the string.

First, the numeric codepoint and position in the string are multiplied together. Then the number is encoded as a Base-36 (a-z and 0-9) variable-length integer. For example, a greeting and the Greek for thanks, “Hey, ευχαριστώ” becomes “Hey, -mxahn5algcq2″. Similarly, the beautiful city of München becomes mnchen-3ya. Continue reading “Punycodes Explained”