GPS Disciplined Oscillators

[Martin Lorton] acquired a GPS-disciplined oscillator. He wasn’t quite sure what to do with it, so he did a little research and experimentation. If you have about two hours to spare, you can watch his videos where he shares his results (see below).

The unit he mainly looks at is a Symmetricom TrueTime XL-DC, and even on eBay it ran over $500. However, [Martin] also looks at a smaller unit that is much more affordable.

Continue reading “GPS Disciplined Oscillators”

Hackaday guide to Lathes

Preparing For A Lathe: How To Move 3000 Pounds Of Iron

You say to yourself, “Self, I want, nay, need a lathe”. Being a good little trooper, you then did all your research, having chosen Import or American, Imperial or Metric, and all your feed options and such. You then pulled the trigger and the machine is en route to your shop. Now what?

Continue reading “Preparing For A Lathe: How To Move 3000 Pounds Of Iron”

Flash Your Libre Firmware With A Libre Programmer

Whether or not you personally agree with all the ideals of the Free Software Foundation (FSF), you’ve got to give them credit: they don’t mess around. They started by laying the groundwork for a free and open source operating system, then once that dream was realized, started pushing the idea of replacing proprietary BIOS firmware with an open alternative such as Libreboot. But apparently, even that’s not enough, as there’s still more freedom to be had. We’re playing 4D Libre Chess now, folks.

To flash your libre boot firmware on your libre OS running computer without any proprietary funny business, you’re going to need a libre chip programmer. Luckily, the FSF has just awarded the Zerocat Chipflasher their “Respects Your Freedom” certification, meaning every element of the product is released under a free license for your hacking enjoyment. According to the FSF, this is a major milestone towards their goal of providing users a truly free and open source computer, from the browser all the way down to the BIOS.

Of course, you don’t need to be Richard Stallman to appreciate a fully open chip programmer. With the software, wiring diagrams, and PCB files available on the Chipflasher’s website, the project is an excellent educational reference. Is also means that with a clone the Chipflasher’s Git repository, you’re well on the way to spinning up your own build of the device.

Given the roughly $350 USD price tag on the first generation Zerocat Chipflasher, it seems fairly likely we’ll be seeing some DIY builds of this device before too long. Not that we want to deprive Zerocat commercial success for this very neat piece of gear, but for many it’s a mighty steep price; even if you do get all the Freedoms.

It may use a device of slightly more nebulous morality than the Zerocat Chipflasher, but our own [Bryan Cockfield] documented the saga of getting Libreboot installed on a Thinkpad X200 if you’d like to know more about the high stakes world of BIOS replacement. Whatever it takes to get that Intel Management Engine off your penguin-powered box.

An Oscilloscope For The Nuclear Age

Here at Hackaday, we’re suckers for vintage instruments. More than one of our staffers has a bench adorned with devices spanning many decades, and there’s nothing more we like reading about that excursions into the more interesting or unusual examples. So when a Tweet comes our way talking about a very special oscilloscope, of course we have to take a look! The Tektronix 519 from 1962 has a 1GHz bandwidth, and [Timothy Koeth] has two of them in his collection. His description may be a year or two old, but this is the kind of device for which the up-to-the-minute doesn’t matter.

A modern 1GHz oscilloscope is hardly cheap, but is substantially a higher-speed version of the run-of-the-mill ‘scope you probably have on your bench. Its 1962 equivalent comes from a time when GHz broadband amplifiers for an oscilloscope input were the stuff of science fiction. The 519 takes the novel approach of eschewing amplification or signal conditioning and taking the input directly to the CRT deflection plates. It thus has a highly unusual 125Ω input impedance, and its feed passes through a coiled coaxial delay line to give the trigger circuits time to do their job before going into the CRT and then emerging from it for termination. It thus has a fixed deflection in volts per centimeter rather than millivolts, and each instrument has the calibration of its CRT embossed upon its bezel.

The 519 would not have been a cheap instrument in 1962, and it is no accident that there are reports of many of them coming back to Tek for service with radioactive contamination from their use in Government projects. We can’t help wondering whether the Russian equivalent super-high-speed ‘scope used the same approach, though we suspect we’ll never know.

If vintage Tek is your thing, have a look at their PCB manufacture from the 1960s.

Thanks [Luke Weston] for the tip.

Hacking A Cheap Laser Rangefinder

When a new piece of technology comes out, the price is generally so high that it keeps away everyone but the die hard early adopters. But with time the prices inch down enough that more people are willing to buy, which then drives the prices down even more, until eventually the economies of scale really kick in and the thing is so cheap that it’s almost an impulse buy. Linux SBCs, Blu-ray lasers, 3D printers; you name it and the hacker community has probably benefited from the fact that it’s not just the hacker community that’s interested anymore.

Which is exactly what’s started to happen with laser rangefinders. Once almost exclusively a military technology, you can now pick a basic “laser tape measure” for less than $40 USD from the normal overseas suppliers. Unfortunately, as [iliasam] found, they aren’t particularly well suited other tasks. For one there’s no official way of getting the data out of the thing, but the other problem is that the sample rate is less than one per second. Believing the hardware itself was promising enough, he set out to reverse engineer and replace the firmware running on one of these cheap laser rangefinders (Google Translate from Russian).

His blog post is an absolute wealth of information on how these devices operate, and a must read for anyone interested in reverse engineering. But the short version is that he figured out a way to reprogram the STM32F100C8T6 microcontroller used in the device, and develop his own firmware that addresses the usability concerns of this otherwise very promising gadget.

With some minor hoop jumping, the laser tape measure PCB can be hooked up to an ST-Link programmer, and the firmware provided by [iliasam] can be used to enable an easy to use serial interface. Perfect for pairing with an Arduino or Raspberry Pi to get fast and accurate range data without breaking the bank.

It probably won’t surprise you to see this isn’t the first time [iliasam] has gotten down and dirty with a laser rangefinder. This extremely impressive build from last year allowed for incredibly accurate 3D scans of his room, and before that he created his own rangefinder from scratch.

Continue reading “Hacking A Cheap Laser Rangefinder”

Online Logic Simulator Is Textual — No, Graphical

We have a bit of a love/hate relationship with tools in the web browser. For education or just a quick experiment, we love having circuit analysis and FPGA tools at our fingertips with no installation required. However, we get nervous about storing code or schematics we might like to keep private “in the cloud.” However, looking at [Lode Vandevenne’s] LogicEmu, we think it is squarely in the educational camp.

You can think of this as sort of Falstad for logic circuits (although don’t forget Falstad does logic, too). The interface is sort of graphical, and sort of text-based, too. When you open the site, you’ll see a welcome document. But it isn’t just a document, it has embedded logic circuits in it that work.

Continue reading “Online Logic Simulator Is Textual — No, Graphical”

Card Reader Lockout Keeps Unauthorized Tool Users At Bay

It’s a problem common to every hackerspace, university machine shop, or even the home shops of parents with serious control issues: how do you make sure that only trained personnel are running the machines? There are all kinds of ways to tackle the problem, but why not throw a little tech at it with something like this magnetic card-reader machine lockout?

[OnyxEpoch] does not reveal which of the above categories he falls into, if any, but we’ll go out on a limb and guess that it’s a hackerspace because it would work really well in such an environment. Built into a sturdy steel enclosure, the guts are pretty simple — an Arduino Uno with shields for USB, an SD card, and a data logger, along with an LCD display and various buttons and switches. The heart of the thing is a USB magnetic card reader, mounted to the front of the enclosure.

To unlock the machine, a user swipes his or her card, and if an administrator has previously added them to the list, a relay powers the tool up. There’s a key switch for local override, of course, and an administrative mode for programming at the point of use. Tool use is logged by date, time, and user, which should make it easy to identify mess-makers and other scofflaws.

We find it impressively complete, but imagine having a session timeout in the middle of a machine operation would be annoying at the least, and potentially dangerous at worst. Maybe the solution is a very visible alert as the timeout approaches — a cherry top would do the trick!

There’s more reading if you’re one seeking good ideas for hackerspace. We’ve covered the basics of hackerspace safety before, as well as insurance for hackerspaces.

Continue reading “Card Reader Lockout Keeps Unauthorized Tool Users At Bay”