War Monument Hacking

war-monument-hacking

[Timo] tipped us off about a War Monument that has been… upgraded. The story starts when a monument was erected in Cherkassy, Ukraine to commemorate the ultimate sacrifice that was made by Russian soldiers during World War II. The huge statue and expansive plaza were capped off by an eternal flame. Unfortunately, when the Soviet Block broke up, the natural gas that had been provided by the government became a luxury so the flame was extinguished.

The eternal flame sat unlit, a sad commentary to the remembrance of the dead. But how to fix this issue? As cell phone companies came into the area, a need for cell phone towers arose. At some point a solution was reached; a cell phone tower was built in the bowl of the eternal flame and then wrapped with an LED marquee. The marquee now displays the image of a flame in perpetuity.

We’re not quite sure what to think about this. After some adjustment, the substitution of LEDs for flames will probably become accepted. The monument is now providing a useful purpose for the living, and once again shows a flame. We think that having something there showing that the memory is still alive is much better than the message an unkempt derelict sends.

MIT Rethinking Popup Books

[youtube=http://www.youtube.com/watch?v=AI-6wMlaVTc]

We know the folks at MIT are the cutting edge scientists of tomorrow right? We’re always impressed by the stuff coming out of their labs. Well, almost always.  This rethinking of pop-up books does not let us down. We’ve seen some pretty complicated pop-up books. Some that made us really wonder how they pulled it off. But all of those were simply paper and card stock. At MIT, they’re wondering how we can improve the interactive experience now that the electronic components are so cheap and easily available. Even if you don’t have kids, or have no interest in pop-up books, consider this some inspiration for things like packaging and art. This looks fantastic and we know we would enjoy it. Then again, a few flashing LEDs always pique our interest.

[via Gizmodo]

Shift Powered Pumpkins

4021144025_362a11d544_b

[Garret] and a couple of friends totally stole our idea wanted to light up their pumpkins a bit differently this year. They used some ShiftBrites and all the corresponding shift hardware (who knew there was so much shift out there) to bring their carved orange minions to life. Yes, this could be done a lot less modulated by using a regular LED and perhaps a PIC. Maybe it’s not the most technically challenging, but hey its in the spirit of Halloween – one of our favorite holidays. Speaking of which, doesn’t that fence look familiar? Check out a video after the break. Seriously, Mutton Chops? Continue reading “Shift Powered Pumpkins”

Build Your Own Wristwatch

surface-mount-wristwatch

[rgbphil] has done a great job detailing how he built his Microdot wristwatch.This project is a lot more approachable than the pong watch we saw last month. If you’ve made a few printed circuit boards, but haven’t yet tried working with surface mount component, this is a great way to give it a try.

The parts count is pretty low, a few switches, resistors, capacitors, LEDs, a watch crystal, and a PIC 16F88 microcontroller.[rgbphil] is using a charlieplex so that a separate shift register is not needed to drive all of the LEDs. He goes into detail about the process of laying out the circuit. Some of the problems he encounters include how to manage all of the charlieplex connections in a simple way, how to program the chip once it’s on the board, and how to layout the controls for the device.

The display looks great in the video we’ve embedded after the break. We’re going to add these components to our next parts order and make this project part of the plan for getting us through the long cold winter ahead.

Continue reading “Build Your Own Wristwatch”

72 LED Persistence Of Vision Globe

HaD-pov-globe

[Ben] told us about his POV globe yesterday. We took a look and saw just one photo and the code with no real explanation of his project. He certainly set to work over night and now we see all the goodies we look for in a great build log. He even threw the Hackaday logo up for our enjoyment. His build is well executed and he found some creative ways around the common problems in these projects. We take a closer look after the break. Continue reading “72 LED Persistence Of Vision Globe”

Multi-touch LCD From LEDs

[youtube http://www.youtube.com/watch?v=BiJsBaBAUL4%5D

[Thomas] promised nearly a year ago he would give the community code and schematics of how he made his LED Multi-touch panel, but we would have to wait for his next version first. Well its finally here, bigger and better then we could ever have imagined. His new version is organized as a 48 by 32 matrix of 1536 LEDs, but he’s gone further by placing it behind a stripped LCD to make a multi-touch display. It doesn’t seem nearly as fast or accurate as the original, but potentially could be more portable than ones we’ve seen before. And yes, this time around he included how his LED matrix is made.

POV Fan EEPROM Hack

pov_fan_eeprom_hacking

Hacking with Gum got their hands on one of the persistence of vision display fans that Cenzic was giving away at Blackhat this year. It’s not the biggest fan-based POV display we’ve seen but it’s still a fun device to tinker with. They hacked into the EEPROM on the device in order to change the message the fan displayed.

This is very similar to the other EEPROM reading/writing we’ve seen recently. Hacking with Gum read the data off of the EEPROM and then disassembled it to discover how the message data is stored on the chip. This was made easier by noting the messages displayed when the fan is running. The first byte of data shows the number of words in the message, then each chunk of word data is preceded by one byte that represents the number of letters in that work. Data length was calculated based on the number of pixels in each display character. Once he knew the data-storage scheme, it was just a matter of formatting his own messages in the same way and overwriting the chip.

This is a great write-up if you’re looking for a primer on reverse engineering an unknown hardware system. If you had fun trying out our barcode challenges perhaps deciphering EEPROM data from a simple device should be your next quest.

[Thanks James]