Angela Sheehan Is Developing Wearable Tech With Whimsy

As a concept, wearable technology excites many of us, but in practice, it’s been hard to nail down. Up to this point, the most high-tech thing the average person might reasonably wear has been a wrist watch. Devices like Google Glass tried to push the state-of-the-art, but it arguably raised more questions than it answered. It demonstrated in a very public way that developing wearable technology that’s simultaneously visually appealing, useful, and robust enough to handle daily life is exceptionally difficult. If Google couldn’t pull it off, what hope do we lowly hackers have?

But maybe we’ve been going about things the wrong way. Compelling as the end result may seem, the move from wrist watches to head-mounted computers is simply too large of a technical and psychological leap to make. To help develop the skills and techniques necessary to build practical wearable electronics, it might help to take a slightly more fanciful approach.

It seems to be working pretty well for Angela Sheehan, at least. In her talk “Building Whimsical Wearables: Leveling Up Through Playful Prototyping” at the 2019 Hackaday Superconference, she went over some of the things she’s learned while developing her Color Stealing Fairy costume. The product of several years of iterative design, the costume is able to mimic colors seen in the environment through the use of a wireless sensor wand, and features a number of design elements that are critical to any successful wearable project.

Even if a custom RGB Fairy costume isn’t on your short list of projects, there’s information in this talk that will surely be of interest to anyone who’s even contemplated a wearable project. From technical aspects like battery placement to logistical considerations such as making adjustments for multiple wearers, Angela’s make-believe creation has become a testbed for real-world considerations.

Continue reading “Angela Sheehan Is Developing Wearable Tech With Whimsy”

Hackaday Superconference: An Analog Engineer Dives Into RF

Those of us who work with electronics will usually come to the art through a particular avenue that we master while imbibing what we need from those around it. For example, an interest in audio circuitry may branch into DSP and microcontrollers as projects become more complex. Some realms though retain an aura of impossibility, a reputation as a Dark Art, and chief among them for many people is radio frequency (RF). Radio circuitry is often surprisingly simple, yet that simplicity conceals a wealth of complexity because the medium does not behave in the orderly manner of a relatively static analogue voltage or a set of low-frequency logic levels.

Chris Gammell is a familiar face to many Hackaday readers for his mastery of much electronic trickery, so it comes as something of a surprise to find that RF has been one of the gaps in his knowledge. In his talk at the Hackaday Superconference he took us through his journey into RF work, and the result is a must-watch for anyone with a curiosity about radio circuitry who didn’t know where to start.

Continue reading “Hackaday Superconference: An Analog Engineer Dives Into RF”

David Williams Is “FPGA-Curious”

If you hadn’t noticed, we had a bit of an FPGA theme running at this year’s Superconference. Why? Because the open-source FPGA toolchain is ripening, and because many of the problems that hackers (and academics) are tackling these days have become complex enough to warrant using them. A case in point: David Williams is a university professor who just wanted to build a quadruped robotics project. Each leg has a complex set of motors, motor drivers, sensors, and other feedback mechanisms. Centralizing all of this data put real strains on the robot’s network, and with so many devices the microcontrollers were running out of GPIOs. This lead him to become, in his words, “FPGA-curious”.

If you’re looking for a gentle introduction to the state of the art in open-source FPGAs, this is your talk. David covers everything, from a bird’s eye view of hardware description languages, through the entire Yosys-based open-source toolchain, and even through to embedding soft-CPUs into the FPGA fabric. And that’s just the first 18 minutes. (Slides for your enjoyment, and you can watch the talk embedded below the break.)
Continue reading “David Williams Is “FPGA-Curious””

Sara Adkins Is Jamming Out With Machines

Asking machines to make music by themselves is kind of a strange notion. They’re machines, after all. They don’t feel happy or hurt, and as far as we know, they don’t long for the affections of other machines. Humans like to think of music as being a strictly human thing, a passionate undertaking so nuanced and emotion-based that a machine could never begin to understand the feeling that goes into the process of making music, or even the simple enjoyment of it.

The idea of humans and machines having a jam session together is even stranger. But oddly enough, the principles of the jam session may be exactly what machines need to begin to understand musical expression. As Sara Adkins explains in her enlightening 2019 Hackaday Superconference talk, Creating with the Machine, humans and machines have a lot to learn from each other.

To a human musician, a machine’s speed and accuracy are enviable. So is its ability to make instant transitions between notes and chords. Humans are slow to learn these transitions and have to practice going back and forth repeatedly to build muscle memory. If the machine were capable, it would likely envy the human in terms of passionate performance and musical expression.

Continue reading “Sara Adkins Is Jamming Out With Machines”

John McMaster Explains Crypto Ignition Phone Keys And How To Reproduce Them

When you’re a nation state, secure communications are key to protecting your sovereignty and keeping your best laid plans under wraps. For the USA, this requirement led to the development of a series of secure telephony networks over the years. John McMaster found himself interested in investigating the workings of the STU-III secure telephone, and set out to replicate the secure keys used with this system.

An encryption key in a very physical, real sense, the Crypto Igntion Key was used with the STU-III to secure phone calls across many US government operations. The key contains a 64KB EEPROM that holds the cryptographic data.

[John] had a particular affinity for the STU-III for its method of encrypting phone calls. A physical device known as a Crypto Ignition Key had to be inserted into the telephone, and turned with a satisfying clunk to enable encryption. This physical key contains digital encryption keys that, in combination with those in the telephone, are used to encrypt the call. The tactile interface gives very clear feedback to the user about securing the communication channel. Wishing to learn more, John began to research the system further and attempted to source some hardware to tinker with.

As John explains in his Hackaday Superconference talk embeded below, he was able to source a civilian-model STU-III handset but the keys proved difficult to find. As carriers of encryption keys, it’s likely that most were destroyed as per security protocol when reaching their expiry date. However, after laying his hands on a broken key, he was able to create a CAD model and produce a mechanically compatible prototype that would fit in the slot and turn correctly.

Continue reading “John McMaster Explains Crypto Ignition Phone Keys And How To Reproduce Them”

Supercon: The Things You Brought, And A Few You Forgot

Part of the fun of Supercon is that there is so much available in one place. For the price of admission, you’re surrounded by expertise, power, and soldering irons. Digi-Key brought several large parts bins stuffed full of everything from passives to LEDs to chips for people use in hacking away on their badges. But one thing that makes the whole experience really special is the stuff people bring. We don’t just mean the projects you brought to show off, we mean the stuff you bring to enhance your Supercon experience, whether it be tools, bits and bobs, or other fun stuff to play with.

This year was my first Supercon, and you never forget your first. I had a great time, and was overwhelmed by how much awesomeness was going on in one place. I wish Supercon was a simulation I could run again and again so I could listen to every talk, attend every workshop, and spend time talking to everyone about the things they brought and the cool things they’re doing with their time and badges.

Continue reading “Supercon: The Things You Brought, And A Few You Forgot”

A Fantastic Frontier Of FPGA Flexibility Found In The 2019 Supercon Badge

We have just concluded a successful Hackaday Superconference where a highlight for many was digging into this year’s hardware badge. Shaped in the general form of a Game Boy handheld gaming console, the heart of the badge is a large FPGA opening up new and exciting potential for badge hacking.

Beyond our normal tools of compiling custom code or modifying hardware with a soldering iron, we now have the option to change core hardware behavior with Verilog. And people explored this new frontier to great effect, as seen at the badge hacking ceremony. (Video embedded below.)

FPGAs are not new, technically speaking, why are they exciting now? We can thank their recent growth in capability, their rapidly falling cost, and the relatively new availability of open source toolchains. These developments elevated FPGA into one of the most exciting trends in hardware today, so this year’s badge master [Sprite_TM] built an open FPGA playground for several hundred of his closest Supercon friends. Let’s take a look at what people were able to accomplish in just a few days using this unique and powerful hardware.

Continue reading “A Fantastic Frontier Of FPGA Flexibility Found In The 2019 Supercon Badge”