Altium Has Its 2kicad Moment

Around these parts we tend to be exponents of the KiCad lifestyle; what better way to design a PCBA than with free and open source tools that run anywhere? But there are still capabilities in commercial EDA packages that haven’t found their way into KiCad yet, so it may not always be the best tool for the job. Altium Designer is a popular non-libre option, but at up to tens of thousands of USD per seat it’s not always a good fit for users and businesses without a serious need.

It’s hard to find an exciting photo of a dialog box

What do you do as a KiCad user who encounters a design in Altium you’d like to work with? Well as of April 3rd 2020, [Thomas Pointhuber] has merged the beginnings of a native Altium importer into KiCad which looks to be slated for the 6.0 release. As [Thomas] himself points out in the patch submission, this is hardly the first time a 3rd party Altium importer has been published. His new work is a translation of the Perl plugin altium2kicad by [thesourcerer8]. And back in January another user left a comment with links to four other (non-KiCad) tools to handle Altium files.

If you’d like to try out this nifty new feature for yourself, CNX has a great walkthrough starting at building KiCad from source. As for documents to test against the classic BeagleBone Black sources seen above can be found at on GitHub. Head past the break to check out the very boring, but very exciting video of the importer at work, courtesy of [Thomas] himself. We can’t wait to give this a shot!

Thanks for the tip [Chris Gammell]!

Continue reading “Altium Has Its 2kicad Moment”

Three Years Of HardwareX: Where Are They Now?

After three years of online publications, HardwareX may have solidified itself as an academic journal for open-source hardware. We originally wrote about HardwareX back in 2016. At the time, HardwareX hadn’t even published its first issue and only begun soliciting manuscripts. Now after three years of publishing, six issues as of October 2019 (with the seventh scheduled for April 2020), and an impact factor of 4.33, it’s fair to say that Elsevier’s push into open-access publications is on a path to success.

To give you a bit of background, HardwareX aims to promote the reproducibility of scientific work by giving researchers an avenue to publish all the hardware and software hacks that often get buried in traditional manuscripts. The format of HardwareX articles is a bit different than most academic journals. HardwareX articles look more like project pages similar to Hackaday.io. (Maybe we inspired them a bit? Who knows.)

It’s a bold attempt on Elsevier’s part because although open-access is held as an ideal scenario for scientific work, such efforts often come under quite a bit of scrutiny in the academic community. Don’t ask us. We can’t relate.

Either way, we genuinely wish Elsevier all the best and will keep our eyes on HardwareX. Maybe some of our readers should consider publishing their projects in HardwareX.

A Hacker’s Guide To JTAG

If you’re reading Hackaday, you’ve almost certainly heard of JTAG. There’s an excellent chance you’ve even used it once or twice to reflash an unruly piece of hardware. But how well do you actually know JTAG? More specifically, do you know how useful it can be when reverse engineering hardware?

Whether you’re a JTAG veteran or a novice, this phenomenal guide written by [wrongbaud] is sure to teach you a thing or two. Starting with a low-level explanation of how the interface actually works, the guide takes you though discovering JTAG ports on unknown targets, the current state-of-the-art in open source tools to interact with the device, and finally shows a real-world example of pulling and analyzing a gadget’s firmware.

There’s no way to do his write-up justice with a breakdown or a summary, so we won’t even try. Just get comfortable, maybe grab a drink, and dive in. It’s certainly not a short read, but there isn’t a wasted word on the page. Every piece of the puzzle, from how to figure out an unlabeled pinout to determining the instruction length, is explained in exactly the amount of detail you’re looking for. This is a guide for hackers written by a hacker, and it shows.

It will probably come as no surprise to find this isn’t the first time [wrongbaud] has done a deep dive like this. Over the last few months we’ve been covering his series of practical reverse engineering guides, and each one has been an invaluable resource. Perfect study guides for when a global pandemic has you stuck in the house.

BINA-VIEW: A Fascinating Mechanical Interference Display

[Fran Blanche] tears down this fascinating display in a video teardown, embedded below.

These displays can support up to 64 characters of the buyer’s choosing which is controlled by 6 bits, surprisingly only requiring 128 mW per bit to control; pretty power-light for its day and age. Aside from alphanumeric combinations the display also supported “color plates” which we found quite fascinating. The fully decked model would only cost you $1,206 US dollars per unit in today’s money or five rolls of toilet paper at latest street price. And that’s just one digit.

If you dig through the documents linked here, and watch her video you can get an idea of how this display works. There are six solenoids attached to rods at the rear of the device. A lamp shines through a lens onto the back of a plate assembly. Each plate is a strategically perforated grid. When the solenoids activate the selected plates tilt interfering with a stationary grid. This causes the light to be blocked in some regions only.

It seems clear why this never took off. Aligning these seems like a production nightmare compared to things like flip displays and Nixie tubes. Still, the characters have quite a lot of charm to them. We wouldn’t mind seeing a 3D printable/laser cut version of this display type. Get working!

Continue reading “BINA-VIEW: A Fascinating Mechanical Interference Display”

Magnets Turn Flexible PCB Into Electric Grasshopper

Just because something doesn’t seem to have an apparent purpose, that doesn’t mean we shouldn’t try making it anyway. As flexible PCBs become cheaper and easier to order from low-scale fab houses, we’re seeing hobbyists experiment with new uses for them such as [Carl Bugeja]’s jumping circuit.

The circuit is based a coil printed on the flexible PCB itself acting as an electromagnet, but unlike other designs which use the same trick, in this one the coil is made to be the static side of an actuator. Attached to the circuit with folding arms is a stack of two permanent magnets, which work as the moving part. Since the magnets make up most of the mass of the circuit, as they’re pushed down and sprung back up, it causes the whole thing to leap around just under one centimeter off the table like a little electric grasshopper.

This is far from [Carl]’s first appearance here on Hackaday, and he’s been clearly busy exploring new uses for flexible PCBs with their properties as electromagnets, from making POV displays with them to small robots that move around through vibration. We’re excited to see what else he can come up with, and you can see this one in action after the break.

Continue reading “Magnets Turn Flexible PCB Into Electric Grasshopper”

Dissecting China-Sourced Vintage HP 1970s ICs: Genuine Or Not?

While repairing a real-time clock module for a 1970s HP computer that had been damaged by its leaky internal battery, [CuriousMarc] began to suspect that maybe the replacement clock chips which he had sourced from a seller in China were the reason why the module still wasn’t working after the repairs. This led him down the only obvious path: to decap and inspect both the failed original Ti chip and the replacement chip.

The IC in question is the Texas Instruments AC5948N (along with the AC5954N on other boards), which originally saw use in LED watches in the 1970s. HP used this IC in its RTC module, despite it never having been sold publicly. This makes it even more remarkable that a Chinese seller had the parts in stock. As some comments on the YouTube video mention, back then there wasn’t as much secrecy around designs, and it’s possible someone walked out of the factory with one of the masks for this chip.

Whether true or not, as the video (also included after the break) shows, both the original 1970s chip and the China-sourced one look identical. Are they original stock, or later produced from masks that made their way to Asia? We’ll probably never know for sure, but it does provide an exciting opportunity for folk who try to repair vintage equipment.

Continue reading “Dissecting China-Sourced Vintage HP 1970s ICs: Genuine Or Not?”

The Hacker Hotel 2020 Badge

The art of the electronic conference badge has evolved over the last decade or more, such that for an individual example to be of note it now has to include some exceptional features. Perhaps a function that might previously have been considered impossible in a badge, or maybe an unusually beautiful design, an entertaining and compelling functionality, or it simply pushes the capabilities of an otherwise limited device in an unusually ingenious way. The badge from the recent Hacker Hotel 2020 comes from the same badge team that created the software platform derived from the SHA 2017 badge, and it ticks many of these boxes by combining a genuine work of art with a set of delightfully intricate puzzles at enough levels to interest all participants in the event.

Continue reading “The Hacker Hotel 2020 Badge”