Patching Into An Optical Mouse With A PIC

[MikyMouse] cracked open a couple different optical mice (or is it mouses?) in order to play with the data communications coming off of the chips inside. Once he figured out the protocol, it wasn’t too hard to grab the data for use in his own projects. The chip that controls the mouse is one of two he looked at, either an ADNS2051 or an ADNS2610. They run at 5V and use serial communications via SDIO and SCK pins. The clip after the break shows the test apparatus displaying coordinates of the mouse on an LCD screen. This seems like an easy and inexpensive way to get position data from your project. The only tricky part is going to be deciding when and how to to zero out the location.

Not interested in this type of mouse hack? Can we spark your curiosity with this mouse auto-fire project?

Continue reading “Patching Into An Optical Mouse With A PIC”

Is Your Camera Lying?

It is easy to rely on the ratings marked on different tools, whether it is a power supply, scale, or speedometer. However calibration is essential for any part that is relied upon either professionally or for a hobby. [Jeremy] wanted to see if his Lomography camera shutter really was only open for 1/100ths of a second when set to that. In order to test his rig, he set up an LED on one side of the shutter, and a high speed phototransistor to gauge the time spent open, using an oscilloscope to measure the time the reference point was pulled low. In his case, when the camera was set to 1/100, the shutter was actually open for closer to 1/150th of a second (the mean was 1/148ths of a second, with a standard deviation of 417 uSecs). This difference can make a large difference in picture brightness.

Be sure to check his blog for more pictures of the setup, as well as some useful part references and circuit diagrams.

Drill-based Kinect Camera

[Brett Graham] and [David Cox] are taking the Kinect out into the world thanks to this handheld hack they call the Drill of Depth. Apparently, the Kinect wants 12V at 1A which is quite easy to provide with a rechargeable power tool like this Ryobi drill. The setup features a 4.3″ touchscreen display, connected to the Gumstix Overo Air that is running Linux. They claim that there’s a “legitimate scientific reason” for building the device but they’re not sharing it yet.

So what would you use this for? We wonder if it would be possible to roll a GPS into the mix, then use post processing from the captured data to recreate the environment in a virtual setting? Imagine if a weekend spent walking around campus and processing the results let you model your University and make it an add-on level for your favorite game. Or perhaps this could be paired with a regular camera to generate high-quality 3D skinning data for Google Earth. That’s what we came up with, what do you think?

Making Punch Card Programming A Snap

About thirty years ago [H. P. Friedrichs] pulled off a hack that greatly improved the process of programming with punch cards. At the time, his school had just two IBM 029 keypunch machines. One of them is shown in the upper right and it uses a keyboard to choose which parts of each card should be punched out. This was time-consuming, and one misplaced keystroke could ruin the card that you were working on. Since you had to sit at the machine and type in your source code these machines were almost always in use.

But wait, the school acquired a dozen of the TRS-80 computers seen in the lower left. They were meant to be used when teaching BASIC, but [HPF] hatched a plan to put them to task for punch card generation. He built his own interface hardware that connected to the expansion port of the new hardware. Using his custom interface a student could create a virtual card deck that could be rearranged and revised to correct mistakes in the source code. The hardware then allows the virtual deck to be dumped in to the punching machine. This broke the bottleneck caused by students sitting at the punch card terminal.

We think that [HPF] sent in this project after seeing the antiquated hardware from that 1970’s calculator. These hacks of yore are a blast to revisit so don’t be afraid to tip us off if you know of a juicy one.

Classic Game Emulation On The Dockstar

[Hunter Davis] is playing games like Contra, Monkey Island, and Quake 3 by running them on a Seagate Dockstar. We were shocked after seeing how well these run in the video after the break. [Hunter], who used the ZipIt for game emulation in the past, added a couple of hardware peripherals to get everything running. For sound he picked up an inexpensive USB sound card which was no problem to get up and running. Next he picked up a USB to DVI adapter and fired up the Linux USB DisplayLink driver. With the peripherals running he loaded up Fluxbox and the rest was history. Not bad for a small network storage adapter. Continue reading “Classic Game Emulation On The Dockstar”

Building A Security Access Panel

It turns out that hacking together a security keypad is remarkably simple if you know what you’re doing. [Don] needed to add a keypad with an RFID reader on it. He had previously built a USB RFID reader and thought he could integrate those concepts into the new unit.

He once again started with a serial to USB converter and removed the voltage converter IC for later use since he doesn’t need TTL levels for this project. The keypad is a USB product and it turns out there’s a hub inside. With plenty of space inside for the serial converter PCB and a blank spot at the top where he mounted the RFID reader, he adding a few passive components to wire it up and connect it to the hub. The only connection is the original USB cord but the PC will detect both the keypad and the converter.

Adding A Serial Port Through An RJ45 Connector

[Mike Lu] likes to add serial ports to his routers to use for debugging but he didn’t want to drill holes in his new RT-N12. After a bit of head-scratching he thought about repurposing the four unused wires on one of the RJ45 Ethernet connectors. This would allow him to interface with the necessary signals and still have the option of using that port for a network connection. The first step was to build the circuit to output the correct serial levels and connect it to the unused pins on the jack. Next, to separate serial and Ethernet on the outside of the router he build a short adapter cable.

This is an elegant solution if you’re looking for zero case modifications. But if you don’t mind a few inconspicuous holes we love the serial port used on this Dockstar.