Rickroll The Masses With A Coin Cell Throwie

If there is one educational institution that features on these pages more than any other, it may be Cornell University. Every year we receive a pile of tips showing us the engineering term projects from [Bruce Land]’s students, and among them are some amazing pieces of work. Outside the walls of those technical departments though, we suspect that cool hacks may have been thin on the ground. English Literature majors for example contain among their ranks some astoundingly clever people, but they are not known for their handiness with a soldering iron or a lathe.

We’re happy to note then that someone at Cornell who is handy with a soldering iron has been spreading the love. In the form of coin cell powered throwies that intermittently Rickroll the inhabitants of the institution’s halls of residence. We have few technical details, but they seem to be a simple affair of a small microcontroller dead-bug soldered to a coin cell and a piezoelectric speaker. If we were embarking on such a project we’d reach for an ATtiny of some description, but similar work could be done with a PIC or any number of other families.

The Cornell Daily Sun write-up is more a work of investigative journalism detailing the perplexed residents searching for the devices than it is one of technical reference. We’re pleased to note that the university authorities have a relaxed attitude to the prank, and that no action will be taken against the perpetrator should they be found.

Thus we’d like to take a moment to reach out to the Cornell prankster, and draw their attention to our Coin Cell Challenge competition. There is still time to enter, and a Rickrolling throwie would definitely qualify. This isn’t the first tiny Rickrolling prank we’ve shown you on these pages.

Thanks [Simon Yorkston] for the tip.

Joule Thief Steals In Favor Of Christmas

A lot of things tend to get stretched during the holiday season, like shopping budgets and waistbands and patience. This year, [Chris] is stretching the limits of both the mini breadboard and the humble 1.5 V LR44 coin cell with his joule thief-driven LED mini Christmas tree.

With the push of a micro momentary, the joule thief circuit squeezes enough power from an LR44 to boot an MSP430 microcontroller, which needs 1.8 V – 3.6 V. After boot, the micro takes control of the joule thief circuit and milks it whenever the voltage falls below 3.2 V. This tree may be small in stature, but it’s feature-rich. A push of the same momentary button cycles through four different light shows, ending with a medley of all four. Be dazzled after the break.

The code for this tiny tree, which features an awesome ASCII breadboard layout and schematic, is up on GitHub. [Chris] has it listed among a few other manageable bare-metal ‘430 projects that would be great for beginners at pure C. If that sounds like you, why not give yourself the gift of learning a new language?

We’ve seen some spirited ways of lighting LEDs, but doing it with candle power takes the fruitcake.

Continue reading “Joule Thief Steals In Favor Of Christmas”

There Are 10 Kinds Of Computers In The World

There’s an old joke that there are 10 kinds of people in the world. Those who know binary, those who don’t, and those who didn’t see a base three joke coming. Perhaps [Dmitry Sokolov] heard that joke because he’s built a ternary (base 3) computer. He claims it is the first one to be built in the last 50 years. You can see a video about the device below. There’s also a video of the device with a nixie tube output.

You may not think of it often, but bit is a contraction of binary digit, so a ternary computer doesn’t have those. It has trits. The CPU operates on 3 trit words and uses nothing but multiplexers as building blocks. Instructions use 5 trits, some of which are a two-trit opcode and a 3 trit address of one of the 13 registers. The allure of using ternary, by the way, is that you can represent more numbers in fewer bits — um, trits, rather.

Continue reading “There Are 10 Kinds Of Computers In The World”

Small Jet Engine Model From Students Who Think Big

We love to highlight great engineering student projects at Hackaday. We also love environment-sensing microcontrollers, 3D printing, and jet engines. The X-Plorer 1 by JetX Engineering checks all the boxes.

This engineering student exercise took its members through the development process of a jet engine. Starting from a set of requirements to meet, they designed their engine and analyzed it in software before embarking on physical model assembly. An engine monitoring system was developed in parallel and integrated into the model. These embedded sensors gave performance feedback, and armed with data the team iterated though ideas to improve their design. It’s a shame the X-Plorer 1 model had to stop short of actual combustion. The realities of 3D printed plastic meant airflow for the model came from external compressed air and not from burning fuel.

Also worth noting are the people behind this project. JetX Engineering describe themselves as an University of Glasgow student club for jet engine enthusiasts, but they act less like a casual gathering of friends and more like an aerospace engineering firm. The ability of this group to organize and execute on this project, including finding sponsors to fund it, are skills difficult to teach in a classroom and even more difficult to test with an exam.

After X-Plorer 1, the group has launched two new project teams X-Plorer 2 and Kronos. They are also working to expand to other universities with the ambition of launching competitions between student teams. That would be exciting and we wish them success.

Continue reading “Small Jet Engine Model From Students Who Think Big”

An Mbed In Your Browser

If you have dabbled in the world of ARM microcontrollers, you might be familiar with the Mbed platform, a software abstraction layer for a range of ARM-based small dev boards. If you don’t have an Mbed board but fancy giving it a go, you might imagine that you’d be out of luck, but [Jan Jongboom] could have an answer to your problem in the form of an Mbed simulation in your browser.

We’re not high-end ARM microcontroller developers here at Hackaday so beyond observing that it brings the Mbed abstraction layer binaries to the browser through the magic of Emscripten it’s best to point the curious at its GitHub repository. But we can see its attraction as a means to take a look at Mbed, and given that [Jan] describes himself as “a developer and evangelist currently working on the Internet of Things for ARM“, it’s safe to say this one comes as they say, from the horse’s mouth.

The Mbed board that is probably most famous is the education-focused micro:bit, but there are plenty of others on the market. Back in 2015 we published a getting started guide, if you are new to the Mbed.

Via Hacker News.

A Robot Arm For Virtual Beer Pong

Leave it to engineering students to redefine partying. [Hyun], [Justin], and [Daniel] have done exactly that for their final project by building a virtually-controlled robotic arm that plays beer pong.

There are two main parts to this build: a sleeve worn by the user, and the robotic arm itself. The sleeve has IMUs at the elbow and wrist and a PIC32 that calculates their respective angles. The sleeve sends angle data to a second PIC32 where it is translated it into PWM signals and sent to the arm.

There’s a pressure sensor wired sleeve-side that’s worn between forefinger and thumb and functions as a release mechanism. You don’t actually have to fling your forearm forward to get the robot to throw, but you can if you want to. The arm itself is built from three micro servos and mounted for stability. The spoon was a compromise. They tried for a while to mimic fingers, but didn’t have enough time to implement grasping and releasing on top of everything else.

Initially, the team wanted wireless communication between the sleeve and the arm. They got it to work with a pair of XBees, but found that RF was only good for short periods of use. Communication is much smoother over UART, which you can see in the video below.

You don’t have to have a machine shop or even a 3-D printer to build a robot arm. Here’s another bot made from scrap wood whose sole purpose is to dunk tea bags.

Continue reading “A Robot Arm For Virtual Beer Pong”

Mount Sopris

Design A Microcontroller With Security In Mind

There are many parts to building a secure networked device, and the entire industry is still learning how to do it right. Resources are especially constrained for low-cost microcontroller devices. Would it be easier to build more secure devices if microcontrollers had security hardware built-in? That is the investigation of Project Sopris by Microsoft Research.

The researchers customized the MediaTek MT7687, a chip roughly comparable to the hacker darling ESP32. The most significant addition was a security subsystem. It performs tasks notoriously difficult to do correctly in software, such as random number generation and security key storage. It forms the core of what they called the “hardware-based secure root of trust.”

Doing these tasks in a security-specific module solves many problems. If a key is not stored in memory, a memory dump can’t compromise what isn’t there. Performing encryption/decryption in task-specific hardware makes it more difficult to execute successful side-channel attacks against them. Keeping things small keeps the cost down and also eases verifying correctness of the code.

But the security module can also be viewed from a less-favorable perspective. Its description resembles a scaled-down version of the Trusted Platform Module. As a self-contained module running its own code, it resembles the Intel Management Engine, which is currently under close scrutiny.

Will we welcome Project Sopris as a time-saving toolkit for building secure networked devices? Or will we become suspicious of hidden vulnerabilities? The researchers could open-source their work to ease these concerns, but value of their work will ultimately depend on the fast-moving field of networked device security.

Do you know of other efforts to add hardware-assisted security to microcontrollers? Comment below or let us know via the tip line!

[via Wired]

Image of Mount Sopris, namesake of the project, by [Hogs555] (CC-BY 4.0)