Let’s be honest, Ruth Grace Wong can’t teach you how to be a manufacturing engineer in the span of a twenty minute talk. But no-one can. This is about picking up the skills for a new career without following the traditional education path, and that takes some serious time. But Grace pulled it off, and her talk at the 2019 Hackaday Superconference shares what she learned about reinventing your career path without completely disrupting your life to do so.
Ruth got on this crazy ride when she realized that being a maker made her happy and she wanted to do a lot more of it. See wanted to be “making stuff at scale” which is the definition of manufacturing. She took the hacker approach, by leveraging her personal projects to pull back the veil of the manufacturing world. She did a few crowd funding campaigns that exposed her to the difficulties of producing more than one of something. And along the way used revenue from those projects to get training and to seek mentorships.
We’ve all seen the IoT device security trainwrecks: those gadgets that fail so spectacularly that the comment section lights up with calls of “were they even thinking about the most basic security?” No, they probably weren’t. Are you?
Hackaday Contributor and all around good guy Kerry Scharfglass thinks about basic security for a living, and his talk is pitched at the newcomer to device security. (Embedded below.) Of course “security” isn’t a one-size-fits-all proposition; you need to think about what threats you’re worried about, which you can ignore, and defend against what matters. But if you’ve never worked through such an exercise, you’re in for a treat here. You need to think like a maker, think like a breaker, and surprisingly, think like an accountant in defining what constitutes acceptable risks. Continue reading “Kerry Scharfglass Secures Your IoT Things”→
This year was the second SMD challenge at Supercon, so it stands to reason we probably learned a few things from last year. If you aren’t familiar with the challenge, you are served some pretty conventional tools and have to solder a board with LEDs getting progressively smaller until you get to 0201 components. Those are challenging even with proper tools, but a surprising number of people have managed to build them even using the clunky, large irons we provide.
During the first challenge, we did find one problem though. The LEDs are all marked for polarity. However, since we don’t provide super high power magnification, it was often difficult to determine the polarity, especially on the smaller parts. Last year, [xBeau] produced some quick LED testers to help overcome this problem. This year we refined them a bit.
Asking machines to make music by themselves is kind of a strange notion. They’re machines, after all. They don’t feel happy or hurt, and as far as we know, they don’t long for the affections of other machines. Humans like to think of music as being a strictly human thing, a passionate undertaking so nuanced and emotion-based that a machine could never begin to understand the feeling that goes into the process of making music, or even the simple enjoyment of it.
The idea of humans and machines having a jam session together is even stranger. But oddly enough, the principles of the jam session may be exactly what machines need to begin to understand musical expression. As Sara Adkins explains in her enlightening 2019 Hackaday Superconference talk, Creating with the Machine, humans and machines have a lot to learn from each other.
To a human musician, a machine’s speed and accuracy are enviable. So is its ability to make instant transitions between notes and chords. Humans are slow to learn these transitions and have to practice going back and forth repeatedly to build muscle memory. If the machine were capable, it would likely envy the human in terms of passionate performance and musical expression.
When you’re a nation state, secure communications are key to protecting your sovereignty and keeping your best laid plans under wraps. For the USA, this requirement led to the development of a series of secure telephony networks over the years. John McMaster found himself interested in investigating the workings of the STU-III secure telephone, and set out to replicate the secure keys used with this system.
[John] had a particular affinity for the STU-III for its method of encrypting phone calls. A physical device known as a Crypto Ignition Key had to be inserted into the telephone, and turned with a satisfying clunk to enable encryption. This physical key contains digital encryption keys that, in combination with those in the telephone, are used to encrypt the call. The tactile interface gives very clear feedback to the user about securing the communication channel. Wishing to learn more, John began to research the system further and attempted to source some hardware to tinker with.
As John explains in his Hackaday Superconference talk embeded below, he was able to source a civilian-model STU-III handset but the keys proved difficult to find. As carriers of encryption keys, it’s likely that most were destroyed as per security protocol when reaching their expiry date. However, after laying his hands on a broken key, he was able to create a CAD model and produce a mechanically compatible prototype that would fit in the slot and turn correctly.
Part of the fun of Supercon is that there is so much available in one place. For the price of admission, you’re surrounded by expertise, power, and soldering irons. Digi-Key brought several large parts bins stuffed full of everything from passives to LEDs to chips for people use in hacking away on their badges. But one thing that makes the whole experience really special is the stuff people bring. We don’t just mean the projects you brought to show off, we mean the stuff you bring to enhance your Supercon experience, whether it be tools, bits and bobs, or other fun stuff to play with.
This year was my first Supercon, and you never forget your first. I had a great time, and was overwhelmed by how much awesomeness was going on in one place. I wish Supercon was a simulation I could run again and again so I could listen to every talk, attend every workshop, and spend time talking to everyone about the things they brought and the cool things they’re doing with their time and badges.
First-time visitors to Disneyworld often naively think they’re going to “do” the park in three days: one day for the Magic Kingdom, one day for Epcot, and one day for everything else. It’s easy to spot such people, collapsed on a bench or dragging exhausted kids around while trying to make their way to the next must-see attraction. Supercon is something like that — a Disney-esque theme park for hackers that will exhaust you if you don’t have a plan, and if you don’t set reasonable expectations. Which is why I was glad that I set only one real goal for my first Supercon: take the SMD Soldering Challenge.
Now, while I’m pretty handy with a soldering iron, I was under no illusion that I would be at all competitive. All my soldering experience has been with through-hole components, and while I also used to doing some production soldering on fine-pitch connectors, the whole surface-mount thing is new to me. I entered mainly because I wanted to see what was possible coming in raw. At best I’d learn what my limits are, and at worst I’d fail spectacularly and provide grist for a “Fail of the Supercon” post. It’s a win either way.