Why You (Probably) Won’t Be Building A Replica Amiga Anytime Soon

Early in 2019, it  became apparent that the retro-industrial complex had reached new highs of innovation and productivity. It was now possible to create entirely new Commdore 64s from scratch, thanks to the combined efforts of a series of disparate projects. It seems as if the best selling computer of all time may indeed live forever.

Naturally, this raises questions as to the C64’s proud successor, the Amiga. Due to a variety of reasons, it’s less likely we’ll see scratch-build Amiga 500s popping out of the woodwork anytime soon. Let’s look at what it would take, and maybe, just maybe, in a few years you’ll be firing up Lotus II (or, ideally, Jaguar XJ220: The Game) on your brand new rig running Workbench 1.3. Continue reading “Why You (Probably) Won’t Be Building A Replica Amiga Anytime Soon”

Retrotechtacular: The Nernst Lamp

After dominating the illumination market for more than a century, it’s easy to think of the glowing filament of the standard incandescent lamp as the only way people found to turn electricity into light. But plenty of fertile minds turned out alternative designs, one of which is the fascinating Nernst lamp, which we’d previously never heard of.

If the name sounds familiar, it’s likely through exposure to [Walther Nernst]’s equation for electrochemistry, or for his “New Heat Theorem” which eventually became the Third Law of Thermodynamics. Pal of [Einstein] and eventual Nobel laureate, [Nernst] was also a bit of a tinkerer, and he came up with a design for an incandescent lamp in 1897 that was twice as efficient as carbon-filament lamps. The video below, from the Edison Tech Center, details the design, which used a ceramic “glower rod” that would incandesce when current flowed through it. The glower, though, was not conductive until it was quite hot, so separate heater coils that gave the glower a start on the process were included; these were switched off by a relay built into the base of the lamp once the glower started conducting.

It’s a complicated design, but its efficiency, coupled with a better light spectrum and the fact that it didn’t need a vacuum bulb since the glower wouldn’t oxidize like a carbon or tungsten filament, gave it certain advantages that let it stake out a decent share of the early market for electric illumination. It was even the light source for one of the first facsimile machines. We find it a very clever use of what were at the time exotic materials, and wonder if this could have lead to something like vacuum tubes without the vacuum.

Continue reading “Retrotechtacular: The Nernst Lamp”

Linux-Fu: Automation For Chrome And The Desktop By Matching Screenshots

I will be the first to admit it. This is almost not — at least not specifically — a Linux article. The subject? An automation tool for Chrome or Firefox. But before you hit the back button, hear me out. Sure, this Chrome plugin started out as a tool to automatically test web pages and automate repetitive tasks in the browser. However, it can extend that power to all programs on your computer. So, in theory, you can use it to graphically build macros that can interact with desktop applications in surprisingly sophisticated ways. In theory, anyway; there are a few problems.

The program has a few different names. Most documentation says UI Vision RPA, although there are some references to Kantu, which appears to be an older name. RPA is an acronym for Robotic Process Automation, which is an industry buzz word.

Let’s take it for a spin and see what it’s all about.

Continue reading “Linux-Fu: Automation For Chrome And The Desktop By Matching Screenshots”

PPE Testing Hack Chat

Join us on Wednesday, June 17 at noon Pacific for the PPE Testing Hack Chat with Hiram Gay and Lex Kravitz!

When the COVID-19 pandemic unfolded in early 2020, the hacker community responded in the most natural way possible: by making stuff. Isolation and idleness lead to a creative surge as hackers got to work on not only long-deferred fun projects but also potential solutions to problems raised by an overloaded medical system and choked supply chains. And so workshops and hackerspaces the world over churned out everything from novel ventilators to social-distancing aids.

But perhaps the greatest amount of creative energy was set loose on the problem of personal protective equipment, or PPE. This was due in no small part to predictions of a severe shortage of the masks, gowns, and gloves that front-line medical workers would need to keep them safe while caring for pandemic victims, but perhaps also because, at least compared to the complexity of something like a ventilator, building a mask seems easy. And indeed it is as long as you leave unanswered the crucial question: does the thing work?

Answering that question is not as easy as it seems, though. It’s not enough to assume that putting some filtration between the user and the world will work; you’ve got to actually make measurements. Hiram Gay and Lex Kravitz, colleagues at the Washington University School of Medicine in St. Louis, actually crunched the numbers on the full-face snorkel mask they modified for use as a face shield for medical PPE, and they have a lot of insights to share about proper testing of such devices. They’ll join the Hack Chat this week to discuss their findings, offer advice to builders, and reveal how they came up with their idea for a different way to build and test PPE.

join-hack-chatOur Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, June 17 at 12:00 PM Pacific time. If time zones have you down, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about.
Continue reading “PPE Testing Hack Chat”

Hackaday Links Column Banner

Hackaday Links: June 14, 2020

You say you want to go to Mars, but the vanishingly thin atmosphere, the toxic and corrosive soil, the bitter cold, the deadly radiation that sleets down constantly, and the long, perilous journey that you probably won’t return from has turned you off a little. Fear not, because there’s still a way for you to get at least part of you to Mars: your intelligence. Curiosity, the Mars rover that’s on the eighth year of its 90-day mission, is completely remote-controlled, and NASA would like to add some self-driving capabilities to it. Which is why they’re asking for human help in classifying thousands of images of the Martian surface. By annotating images and pointing out what looks like soil and what looks like rock, you’ll be training an algorithm that one day might be sent up to the rover. If you’ve got the time, give it a shot — it seems a better use of time than training our eventual AI overlords.

We got a tip this week that ASTM, the international standards organization, has made its collection of standards for testing PPE available to the public. With titles like “Standard Test Method for Resistance of Medical Face Masks to Penetration by Synthetic Blood (Horizontal Projection of Fixed Volume at a Known Velocity)”, it seems like the standards body wants to make sure that that homebrew PPE gets tested properly before being put into service. The timing of this release is fortuitous since this week’s Hack Chat features Hiram Gay and Lex Kravitz, colleagues from the Washington University School of Medicine who will talk about what they did to test a respirator made from a full-face snorkel mask.

There’s little doubt that Lego played a huge part in the development of many engineers, and many of us never really put them away for good. We still pull them out occasionally, for fun or even for work, especially the Technic parts, which make a great prototyping system. But what if you need a Technic piece that you don’t have, or one that never existed in the first place? Easy — design and print your own custom Technic pieces. Lego Part Designer is a web app that breaks Technic parts down into five possible blocks, and lets you combine them as you see fit. We doubt that most FDM printers can deal with the fine tolerances needed for that satisfying Lego fit, but good enough might be all you need to get a design working.

Chances are pretty good that you’ve participated in more than a few video conferencing sessions lately, and if you’re anything like us you’ve found the experience somewhat lacking. The standard UI, with everyone in the conference organized in orderly rows and columns, reminds us of either a police line-up or the opening of The Brady Bunch, neither of which is particularly appealing. The paradigm could use a little rethinking, which is what Laptops in Space aims to do. By putting each participant’s video feed in a virtual laptop and letting them float in space, you’re supposed to have a more organic meeting experience. There’s a tweet with a short clip, or you can try it yourself. We’re not sure how we feel about it yet, but we’re glad someone is at least trying something new in this space.

And finally, if you’re in need of a primer on charlieplexing, or perhaps just need to brush up on the topic, [pileofstuff] has just released a video that might be just what you need. He explains the tri-state logic LED multiplexing method in detail, and even goes into some alternate uses, like using optocouplers to drive higher loads. We like his style — informal, but with a good level of detail that serves as a jumping-off point for further exploration.

Machine Builds Rise From The Ashes

I was enchanted by a failed project this week. [Andrew Consroe]’s CNC scroll saw doesn’t work yet, but the emphasis is on the word “yet”. Heck, even when it does work, it might not make sense, but that’s not the point anyway.

cncsaw_thumb.jpg?w=250

A scroll saw table has a vertical reciprocating blade perpendicular to a table, a lot like a band saw but with a shorter blade. You push the wood sheet to be cut into the blade, and because it’s thin, you can twist and turn all sorts of interesting jigsaw-puzzle shapes. [Andrew] automated this with an X-Y gantry and an innovative geared rotating ring, needed to keep the wood fed into the cutting edge of the blade.

It’s a crazy contraption, and a difficult and unique movement planning problem, and watching it move in the video is a joy. But it’s not working either: errors in the motion add up over a cut, and he’s ended up snapping a blade on every piece. And this is version three of the device!

But here comes the inspiration. First, the only reason he’s filming this is to keep a log of how the project looked at this phase — he’s already planning out the next one. Second, this is the soul of learning by doing. You don’t learn anything unless you’re trying something new.

And finally, [Andrew]’s project reminds me of why I love machine builds in the age of rapid prototyping. Blazing through three entirely different machines cost him essentially nothing. Tearing apart version one left him with the same stepper motors, aluminum extrusions, and electronics as when he started out. Except that he now knew so much more about his particular problem space. Now he’s ready to go again.

So if you’re at all robotically inclined, but you’re looking at the cost of motors, belts, bearings, and steel, don’t think of it as an expense for this project, but for years’ worth of iterations, and maybe even fully different machines.

Just be sure to take [Andrew]’s lead and get it down and documented before you take it apart! Heck, send it in to Hackaday and it’ll live forever.

This Week In Security: Crosstalk, TLS Resumption, And Brave Shenanigans

Intel announced CrossTalk, a new side-channel attack that can leak data from CPU buffers. It’s the same story we’ve heard before. Bits of internal CPU state can be inferred by other processes. This attack is a bit different, in that it can leak data across CPU cores. Only a few CPU instructions are vulnerable, like RDRAND, RDSEEED, and EGETKEY. Those particular instructions matter, because they’re used in Intel’s Secure Enclave and OpenSSL, to name a couple of important examples.
Continue reading “This Week In Security: Crosstalk, TLS Resumption, And Brave Shenanigans”