Catch up on the past week of hacks with Hackaday Editors Elliot Williams and Mike Szczys. “AI on the Edge” is the buzzword of choice lately, with hardware offerings from BeagleBone and Google to satiate your thirst. We take on spotty data from Tesla, driving around on four bouncy-houses, reverse engineering a keytar, unearthing a gem of a dinosaur computer, and MIPI DSI display hacking. There are tips for getting better at commenting code, and making your computer do your algebra homework.
Links for all discussed on the show are found below. As always, join in the comments as we’ll be watching those as we work on next week’s episode!
Direct download (60.6 MB)
Places to follow Hackaday podcasts:
Continue reading “Hackaday Podcast Ep9 – On the Edge of AI, Comment Your Code, Big Big Wheels, and Makers of Munich”
We can’t think of where you’d buy a new, cheap, MIDI keytar that’s just a keyboard and a handle with some pitch and mod wheels or ribbon controllers. This is a format that died in the 90s or thereabouts. Yes, the Rock Band controller exists, but my point stands. In fact, the closest you can get to a cheap, simple MIDI keytar is the Alesis Vortex Wireless 2 Keytar, but the buttons on the handle don’t make any sense. [marcan] of Wii and Kinect hacking fame took note. (YouTube, embedded below.)
Reverse engineering is a research project, and all research projects begin with looking at the docs. When it comes to consumer electronics, the best resource is the documents a company is required to submit to the FCC (shout out to FCC.io), which gave [marcan] the user manual, and photos of the guts of the keytar. The ‘system update download’ files are living on the Alesis servers, and that’s really all you need to reverse engineer a keytar.
The first step is extracting the actual device firmware from whatever software package appears on the desktop when you download the software update. This is a simple job for 7zip, and after looking at a binary dump of the firmware, [marcan] discovered this was for an STM chip. With the datasheet of the chip, [marcan] got the entry point for the firmware, some values, and the real hardware hacking began. All of this was done with IDA.
This is a five-hour hacking session of cross-referencing the MIDI spec and a microcontroller built thirty years after this spec was developed. It’s an amazing bit of work just to find the bit of code than handled the buttons on the keytar grip, and it gets even better when the patched firmware is uploaded. If you want to ‘learn hacking’, as so many submitters on our tip line want to do, this is what you need to watch. Thanks [hmn] for the tip.
Continue reading “Live Hacking And A MIDI Keytar”
On a dreary night in November, [Smecher] collected the instruments of electronic life around him to infuse a musical spark into FrankenKorg — a resurrected keytar.
This hack is a “re-braining” of a RK-100 Korg Keytar, replacing the original circuits with an ATMega32 — the original functionality and appearance are preserved allowing any restored version of the original boards to be seamlessly re-integrated. In light of that, the original boards were ditched after a brief investigation, and a haphazard building process on a protoboard began. Three LS138 3-8 demuxers that accompany the ATMega handle scanning the keys since there weren’t enough pins on the ATMega alone for all the Korg’s features. Check out [Smecher]’s breakdown of his process in the video after the break!
Continue reading “FrankenKorg: The Modern Remote Keyboard”
We’ve seen our share of stepper motors making music, but [Tanner Tech’s] key-tar takes it to a whole new level. Incorporating an acoustic drum to accentuate the stepper motor sounds and a preamp to feed a guitar amplifier, the key-tar is a fully playable instrument.
Moving the stepper via an Arduino at different speeds creates different notes. The user interface is an old PC keyboard. Apparently, [Tanner] recycled most of the parts in his model. The stepper came from an old printer and the keyboard was a dumpster rescue.
Continue reading “Key-tar Lets You Jam at the Hackerspace”
[CNLohr] is kinda famous round these parts; due to some very impressive and successful hacks. However, for his 20k subscriber video, he had a bit to say about failure.
Of course glass circuit boards are cool. Linux Minecraft things are also cool. Hacks on the ESP8266 that are impressive enough people thought they were an April Fool’s joke are, admittedly, very cool. (Though, we have to confess, posting on April 1 may have added to the confusion.) For a guy who puts out so many successes you’d think he’d talk about the next ones planned; hyping up his growing subscriber base in order to reel in those sweet sweet Internet dollars.
Instead he shows us a spectacular failure. We do mean spectacular. It’s got beautiful intricate copper on glass key pads. He came up with clever ways to do the lighting. The circuit is nicely soldered and the acrylic case looks like a glowing crystal. It just never went anywhere and never worked. He got lots of people involved and completely failed to deliver.
However, in the end it was the failure that taught him what he needed to know. He’s since perfected the techniques and skills he lacked when he started this project a time ago. We’ve all had experiences like this, and enjoyed hearing about his. What failure taught you the most?
Continue reading “Fail More: The Story of [CNLohr]’s Clear Keytar”
Do any of you stay awake at night agonizing over how the keytar could get even cooler? The 80s are over, so we know none of us do. Yet here we are, [James Cochrane] has gone out and turned a HP ScanJet Keytar for no apparent reason other than he thought it’d be cool. Don’t bring the 80’s back [James], the world is still recovering from the last time.
Kidding aside (except for the part of not bringing the 80s back), the keytar build is simple, but pretty cool. [James] took an Arduino, a MIDI interface, and a stepper motor driver and integrated it into some of the scanner’s original features. The travel that used to run the optics back and forth now produce the sound; the case of the scanner provides the resonance. He uses a sensor to detect when he’s at the end of the scanner’s travel and it instantly reverses to avoid collision.
A off-the-shelf MIDI keyboard acts as the input for the instrument. As you can hear in the video after the break; it’s not the worst sounding instrument in this age of digital music. As a bonus, he has an additional tutorial on making any stepper motor a MIDI device at the end of the video.
If you don’t have an HP ScanJet lying around, but you are up to your ears in surplus Commodore 64s, we’ve got another build you should check out.
What do you do when you want to rock out on your keytar without the constraints of cables and wires? You make your own wireless keytar of course! In order to get the job done, [kr1st0f] built a logic translator circuit. This allows him to transmit MIDI signals directly from a MIDI keyboard to a remote system using XBEE.
[kr1st0f] started with a MIDI keyboard that had the old style MIDI interface with a 5 pin DIN connector. Many new keyboards only have a USB interface, and that would have complicated things. The main circuit uses an optoisolator and a logic converter to get the job done. The MIDI signals are converted from the standard 5V logic to 3.3V in order to work with the XBEE.
The XBEE itself also needed to be configured in order for this circuit to work properly. MIDI signals operate at a rate of 31,250 bits per second. The XBEE, on the other hand, works by default at 9,600 bps. [kr1st0f] first had to reconfigure the XBEE to run at the MIDI bit rate. He did this by connecting to the XBEE over a Serial interface and using a series of AT commands. He also had to configure proper ID numbers into the XBEE modules. When all is said and done, his new transmitter circuit can transmit the MIDI signals wirelessly to a receiver circuit which is hooked up to a computer.