Et Tu, Red Hat?

Something odd happened to git.centos.org last week. That’s the repository where Red Hat has traditionally published the source code to everything that’s a part of Red Hat Enterprise Linux (RHEL) to fulfill the requirements of the GPL license. Last week, those packages just stopped flowing. Updates weren’t being published. And finally, Red Hat has published a clear answer to why:

Red Hat has decided to continue to use the Customer Portal to share source code with our partners and customers, while treating CentOS Stream as the venue for collaboration with the community.

Sounds innocuous, but what’s really going on here? Let’s have a look at the Red Hat family: RHEL, CentOS, and Fedora.

RHEL is the enterprise Linux distribution that is Red Hat’s bread and butter. Fedora is RHEL’s upstream distribution, where changes happen fast and things occasionally break. CentOS started off as a community repackaging of RHEL, as allowed under the GPL and other Open Source licenses, for people who liked the stability but didn’t need the software support that you’re paying for when you buy RHEL.

Red Hat took over the reigns of CentOS back in 2014, and then imposed the transition to CentOS Stream in 2020, to some consternation. This placed CentOS Stream between the upstream Fedora, and the downstream RHEL. Some people missed the stability of the old CentOS, and in response a handful of efforts spun up to fill the gap, like Alma Linux and Rocky Linux. These projects took the source from git.centos.org, and rebuilt them into usable community operating systems, staying closer to RHEL in the process.

Red Hat has published a longer statement elaborating on the growth of CentOS Stream, but it ends with an interesting statement: “Red Hat customers and partners can access RHEL sources via the customer and partner portals, in accordance with their subscription agreement.” What exactly is in that subscription agreement? Well according to Alma Linux, “the way we understand it today, Red Hat’s user interface agreements indicate that re-publishing sources acquired through the customer portal would be a violation of those agreements.” Continue reading “Et Tu, Red Hat?”

China Plans Its Own Megaconstellation To Challenge Starlink

Satellite internet used to be a woeful thing. Early networks relied on satellites in geostationary orbits, with high latency and minimal bandwidth keeping user demand low. That was until Starlink came along, and provided high-speed, low-latency internet access using a fleet of thousands of satellites in Low Earth orbit.

Starlink has already ruffled feathers due to concerns around light pollution and space junk in particular. Now, it appears that China may be readying its own competing constellation to avoid being crowded out of low orbits by the increasingly-popular service.

Continue reading “China Plans Its Own Megaconstellation To Challenge Starlink”

Congratulations To Our Op-Amp Challenge Winners!

The real world is analog, and the op-amp is the indispensable building block of many analog circuits. We wanted to give you analog fanatics out there a chance to shine and to encourage our digital brothers and sisters to dip their toes in the murky waters where ones and zeroes define the ends of a spectrum rather than representing the only choice. Hence, we presented the Op Amp Challenge. And you did not disappoint!

We received 83 entries, and it was extraordinarily hard to pick the winners. But since we had three $150 DigiKey shopping sprees to give away, our six judges buckled down and picked their favorites. Whether or not you’ve got the Golden Rules of the ideal op-amp tattooed on your arm, you’ll enjoy looking through all of the projects here. But without further ado…

The Winners

[Craig]’s Op Art is an X-Y voltage generator to plug into an oscilloscope and make classic Lissajous and other spirograph-like images, and it’s all done in analog. Maybe it was his incredible documentation, the nice use of a classic three-op-amp tunable oscillator, or the pun hidden in the title. Whatever the case, it wowed our judges and picked up a deserved place in the top three.

Hearkening back to the pre-digital dinosaur days, [Rainer Glaschick]’s Flexible Analog Computer is a modular analog computer prototyping system on a breadboard backplane. Since you have to re-wire up an analog computer for your particular, it’s great that [Rainer] gave us a bunch of examples on his website as well, including a lunar lander and classic Lorenz attractor demos.

And there was no way that [Chris]’s interactive analog LED wave array wouldn’t place in the top three. It’s a huge 2D analog simulation that runs entirely on op-amps, sensing when your hand moves across any part of its surface and radiating waves out from there. You have to admire the massive scale here, and you simply must check out the video of it in action. Glorious!

Continue reading “Congratulations To Our Op-Amp Challenge Winners!”

Cottonization: Making Hemp And Flax Fibers Into The Better Cotton

These days it’s hard to imagine that fabrics were ever made out of anything other than cotton or synthetic fibers, yet it wasn’t too long ago that hemp and flax-based fabrics — linen — were the rule rather than the exception. Cotton production has for centuries had the major disadvantages of requiring a lot of water and pesticides, and harvesting the cotton was very labor-intensive, making cotton rather expensive. In order to make separating the cotton fibers from the seed easier, improved versions of the cotton gin (‘cotton engine’) were developed, with the 19th century’s industrial revolution enabling a fully automated version.

What makes cotton attractive is the ease of processing these fibers, which are part of the seed pod. These fibers are 25 mm – 60 mm long, 12 μm – 45 μm fine fibers that can be pulled off the seeds and spun into yarn or whatever else is needed for the final product, much like wool. Hemp and flax fibers, in contrast, are extracted from the plant stem in the form of bast fibers. Rather than being pure cellulose, these fibers are mostly a mixture of cellulose, lignin, hemicellulose and pectin, which provide the plant with rigidity, but also makes these fibers coarse and stiff.

The main purpose of cottonization is to remove as much of these non-cellulosic components as possible, leaving mostly pure cellulose fibers that not only match the handleability of cotton fibers, but are also generally more durable. Yet cottonization used to be a long and tedious process, which made bast fiber-based textiles expensive. Fortunately, the steam explosion cottonization method that we’ll be looking at here may be one of the methods by which the market will be blown open for these green and durable fibers.

Continue reading “Cottonization: Making Hemp And Flax Fibers Into The Better Cotton”

Review: InfiRay P2 Pro Thermal Camera

It probably won’t surprise you to learn that Hackaday is constantly hounded by companies that want us to review their latest and greatest gadget. After all, getting us to post about their product is cheaper, easier, and arguably more effective than trying to come up with their own ad campaign. But if you’ve been with us for awhile, you’ll also know that in-house reviews aren’t something we actually do very often.

The reason is simple: we’re only interested in devices or products that offer something useful or unique to this community. As such, the vast majority of these offers get ignored. I’ll give you an example. For whatever reason, multiple companies have been trying desperately to send me electric bikes with five-figure price tags this year. But since there’s no obvious way to turn that into useful content for the readers of Hackaday, I’m still stuck pedaling myself around like it’s the 1900s. I kid of course…I haven’t dared to get on a bike in a decade.

So I don’t mind telling you that, when InfiRay contacted me about reviewing their P2 Pro thermal camera, the email very nearly went into the trash. We’ve seen these kind of phone-based thermal cameras before, and it seemed to be more of the same. But after taking a close look at the specs, accessories, and claims laid out in the marketing material, I thought this one might be worth checking out first-hand.

Continue reading “Review: InfiRay P2 Pro Thermal Camera”

Hinged Parts For The 8th Grade Set

I recently agreed to run a 3D printing camp for 8th graders. If you’ve never shared your knowledge with kids, you should. It is a great experience. However, it isn’t without its challenges. One thing I’ve learned: don’t show the kids things that you don’t want them to try to print.

I learned this, of course, the hard way. I have several “flexy”3D prints. You know the kind. Flexy dinosaurs, cats, hedgehogs, and the like. They all have several segments and a little hinge so the segments wobble. The problem is the kids wanted to print their own creations with flexy hinges.

I’ve built a few print-in-place hinges, but not using Tinkercad, the software of choice for the camp. While I was sure it was possible, it seemed daunting to get the class to learn how to do it. Luckily, there’s an easy way to add hinges like this to a Tinkercad design. There was only one problem.

Continue reading “Hinged Parts For The 8th Grade Set”

The Simplest Social Engineering Hack Of Them All

Here at Hackaday we cover news and interesting features for the hacker community, with an emphasis more on the hardware side. Nevertheless we also cover stories from time to time from the broader world of security. These usually involve vulnerabilities discovered through the patient work of software or hardware researchers, and are certainly what we’d call hacking. But what about those information security breaches that aren’t hacks like that at all? What happens when the person being breached simply gives you the information?

I’ve got one, and while it’s Not A Hack, it’s definitely something that we and those outside our community need to talk about. I’m talking about the depressingly common occurrence of organisations who should know better, gifting their letterhead to all and sundry in the form of freely editable Word documents. Continue reading “The Simplest Social Engineering Hack Of Them All”