Most time-lapse videos of 3D prints show a steadily growing print with a crazy blur of machine movement everywhere else. This is because an image is captured at a regular time interval, regardless of what’s physically going on with the machine. But what if images were captured at consistent machine positions instead? [FormerLurker]’s Octolapse plugin for OctoPrint came out of beta recently and does exactly that, and the results are striking. Because OctoPrint knows where a 3D printer’s print head is at all times, it’s possible for a plugin to use this information to create time-lapse videos where the print head position is consistent instead of a crazy blur, or even have the print head absent from the shot altogether.
[FormerLurker] had originally created stabilized time lapses by hand editing G-code, which had great results but was inefficient and time-consuming. This plugin is the result of his work at automating and enhancing the process, and is also his first serious open source programming project. We’ve covered upgrading a 3D printer with OctoPrint before, and the plugins functionality of OctoPrint means features can be added independently from the core system, which itself largely remains a one-woman effort by creator and maintainer [Gina Häußge].
Often, software hackers are the activists that push software giants towards updating vulnerable applications. In todays example, [Eric Butler] is pushing Facebook, Twitter, Flickr, and more all at the same time. By creating a user script-kiddie friendly extension for Firefox, he has allowed just about anyone to sniff unsecured connections on public Wi-Fi access points and log into these unprotected accounts.
Right now the extension is available for Windows and Mac, with a Linux port coming soon. Temporarily, the best way for a user to avoid getting taken advantage of would be to not use these social networking sites on a public connection, or to implement a secure proxy for these connections that would keep your data safe. Hopefully these websites will have a quick rebuttal that allows for security without workarounds. With all of the bad press they are recieving, they certainly have incentive to.
Are there any software or security buffs out there? We would love to see someone port this to an iPhone or Android app that could check and log open Wi-Fi points. We’ll leave the foot work to the experts out there, but do be sure to give us a heads up if anyone manages to make it happen, okay?
Okay, we lied, we totally want one of these too. The CMT 380X Blackbird is one wicked hybrid car!
Looking like it just rolled off the set of the next Batman film, the Blackbird is the brainchild of Electronic Arts Chief Creative Director [Richard Hilleman]. Starting from a kit car base — the Factory Five Racing GTM chassis — [Hilleman] created a unique 230 horsepower drive train combining a 30 kilowatt diesel turbine and 24 KWh lithium polymer battery pack.
As a purely plug-in electric car, the Blackbird has a range of 85 miles. In hybrid mode, range is extended to 500 miles. The car can accelerate from 0 to 60 in about 7 seconds. Come decelerating, the car makes use of regenerative braking.
It’s strictly a one-off for the time being, but several companies have approached [Hilleman] about possibly commercializing the design. A couple more choice pics follow the break…
Another group of developers has stepped up to the plate in the never-ending attempt to integrate online streaming video with MythTV. The new plugin is called MythNetVision and aims to bring streaming and downloading video functionality both easily and legally. That means without violating the terms of service of the providing website.
We’ve seen so many attempts that fell short it’s easy to be skeptical about the chances of this plugin actually working. Plugins like MythStream and MythVodka worked only temporarily before breaking and never seemed to provide a reliable option. Many people have tried adding Boxee, Hulu Desktop, or XBMC integration by launching these separate packages via the MythTV UI but that’s far from a clean solution.
It looks like MythNetVision is taking a slightly different approach. Although not yet available, the designers have built the plugin in two parts. The frontend is a fully skinnable user interface that parses RSS feeds to provide the hooks needed to browse, search, and view video. Depending on the content, a browser may be spawned to play the video, it may be played within MythTV’s normal player, or a separate download thread can be launch with video following after the appropriate buffer level is reached. The RSS feeds come either directly from the provider, such as the Revision3 feeds, or a scraper can be written to provide custom RSS feeds from sites that don’t have them.
We’ve seen a glimpse of the progress and we’re optimistic that we’ll see a reliable plugin. Early adoption and user script contribution are the best way to help ensure this so keep an eye out for the public release of this package.
[Kris Lamb], X-Force operations manager, is blaming the problem on a lack of a unified process for disclosing vulnerabilities. He also claims that the long-held practice of publishing example code of vulnerabilities should be frowned upon.