It all started off innocently enough. [mretro] was curious about what was inside a sealed metal box, took a hacksaw to it and posted photographs up on the Interwebs. Over one hundred forum pages and several years later, the thread called (at least in Google Translate) “dissecting room” continues to amaze.
If you like die shots, decaps, or teardowns of oddball Russian parts, this is like drinking from a firehose. You can of course translate the website, but it’s more fun to open it up in Russian and have a guess at what everything is before peeking. (Hint: don’t look at the part numbers. NE555 is apparently “NE555” in Russian.)
From a brief survey, a lot of these seem to be radio parts, and a lot of it is retro or obsolete. Forum user [lalka] seems to have opened up one of every possible Russian oscillator circuit. The website loads unfortunately slowly, at least where we are, but bear in mind that it’s got a lot of images. And if your fingers tire of clicking, note that the URL ends with the forum page number. It’d be a snap to web-scrape the whole darn thing overnight.
Who can resist the insane deals on bizarre hardware that pop up on auction websites? Not [Dane Kouttron], for sure. He stumbled on Armor X7 ruggedized tablets, and had to buy a few. They’d be just perfect for datalogging in remote and/or hostile locations, if only they had better batteries and were outfitted with a GSM data modem… So [Dane] hauled out his screwdrivers and took stuff apart. What follows is a very detailed writeup of the battery management system (BMS), and a complete teardown of this interesting tablet almost as an afterthought.
First, [Dane] tried to just put a bunch more batteries into the thing, but the battery-management chip wouldn’t recognize them. For some inexplicable reason, [Dane] had the programmer for the BMS on-hand, as well as a Windows XP machine to run the antiquated software on. With the BMS firmware updated (and the manufacturer’s name changed to Dan-ger 300!) everything was good again.
Now you may not happen to have a bunch of surplus X7 ruggedized tablets lying around. Neither do we. But we can totally imagine needing to overhaul a battery system, and so it’s nice to have a peek behind the scenes in the BMS. File that away in your memory banks for when you need it. And if you need even more power, check out this writeup of reverse-engineering a Leaf battery pack. Power to the people!
A mass participation sporting event such as a road race presents a significant problem for its record keepers. It would be impossible to have ten thousand timekeepers hovering over stopwatches at the finish line, so how do they record each runner’s time? The answer lies in an RFID chip attached to the inside of the bib each runner wears, which is read as the runner crosses the line to ensure that their time is recorded among the hundreds of other participants.
Stripping away the foam covering of the RFID assembly revealed a foil antenna for the 860-960MHz UHF band with the tiny RFID chip at its centre. The antenna is interesting, it’s a rather simple wideband dipole folded over with what looks like a matching stub arrangement and an arrow device incorporated into the fold that is probably for aesthetic rather than practical purposes. He identified the chip as an Impinj Monza 4, whose data sheet contains reference designs for antennas we’d expect to deliver a better performance.
After some trial-by-fire epoxy removal the tiny chip was revealed and photographed. It’s a device of three parts, the power scavenging and analog radio section, the non-volatile memory that carries the payload, and a finite-state logic machine to do the work. This isn’t a proper processor, instead it contains only the logic required to do the one task of returning the payload.
He finishes off with a comparison photograph of the chip — which is about the size of a grain of salt — atop a 1980s 8051-series microcontroller to show both its tiny size and the density advancements achieved over those intervening decades.
Since RFID devices are becoming a ubiquitous part of everyday life it is interesting to learn more about them through teardowns like this one. The chip here is a bit different to those you’ll find in more mundane applications in that it uses a much higher frequency, we’d be interested to know the RF field strength required at the finish line to activate it. It would also be interesting to know how the system handles collisions, with many runners passing the reader at once there must be a lot of RFID chatter on the airwaves.
We know what you’re thinking. There’s no way an 8 watt USB-powered soldering iron could be worth the $5 it commands on eBay. That’s what [BigClive] thought too, so he bought one, put the iron through a test and teardown, and changed his mind. Can he convince you too?
Right up front, [BigClive] finds that the iron is probably not suitable for some jobs. Aside its obvious unsuitability for connections that take a lot of heat, there’s the problem of leakage current when used with a wall-wart USB power supply. The business end of the iron ends up getting enough AC leak through the capacitors of the power supply to potentially damage MOSFETs and the like. Then again, if you’re handy to an AC outlet, wouldn’t you just use a Hakko? Seems like the iron is best powered by a USB battery pack, and [BigClive] was able to solder some surprisingly beefy connections that way. The teardown and analysis reveal a circuit that looks like it came right out of a [Forrest M. Mims III] book. We won’t spoil the surprise for you – just watch the video below.
While not truly cordless like this USB-rechargeable iron, we’d say that for the price, this is a pretty capable iron for certain use cases. Has anyone else tried one of these? Chime in on the comments and let us know what you think.
Fictiv runs a 3D printing shop. They have a nice interface and an easy to understand pricing scheme. As community service, or just for fun, they decided to tear-down two robot vacuums and critique their construction while taking really nice pictures.
The first to go is the iRobot 650 model. For anyone who’s ever taken apart an iRobot product, you’ll be happy to know that it’s the same thousand-screws-and-bits-of-plastic ordeal that it always was. However, rather than continue their plague of the worst wire routing imaginable, they’ve switched to a hybrid of awfulness and a clever card edge system to connect the bits and pieces.
The other bot is the Neato XV-11. It has way fewer screws and plastic parts, and they even tear down the laser rangefinder module that’s captured many a hacker’s attention. The wire routing inside the Neato is very well done and nicely terminated in hard-to-confuse JST connectors. Every key failure point on the Neato, aside from the rangefinder, can be replaced without disassembling the whole robot. Interestingly, the wheels on both appear to be nearly identical.
In the end they rate the Neato a better robot, but the iRobot better engineered. Though this prize was given mostly for the cleverness of the card edge connectors.
In his write-up of this teardown, he describes how he used Wireshark to see who the camera was talking to over the Interwebs, and how he was able to get root access to the device itself (spoilers: the root password was 1234546). He did this by using the serial interface of the Ralink RT3050 that is the brains of the camera to get in, which provided a nice console when he asked politely. A bit of poking around found the password file, which was all too easily decrypted with John the ripper.
This is basic stuff, but if you’ve never opened up an embedded Linux device and gotten root on it, you absolutely should. And now you’ve got a nicely written lesson in how to do it. Go poke around inside the things you own!
If you are even remotely interested in electronics, chances are the number ‘555’ is immediately recognizable. It is, after all, one of the most popular IC’s ever built, with billions of units sold to date. Designed way back in 1970 by Hans Camenzind, it is still widely available and frequently used for various applications. [Ken Shirriff] does a teardown and analysis of a 555 and gives us a look at the internal structure of this oldie.
A metal can package allowed him to just chop off the top and get access to the die, which was way safer and easier than to etch out the black epoxy of a DIP package. He starts by giving us a quick run down on how the chip works, showing us the two comparators, the output flip-flop and the capacitor discharge circuitry that make up most of the chip. He then puts the die under a metallurgical microscope, and starts identifying the various sections of the chip. Combining pictures of individual elements with cross-sectional diagrams, he identifies the construction of the transistors and resistors, the use of a current mirror to replace bulky resistors, and the differential pair that makes up the comparators.
He wraps it up by providing an interactive map of the die and the schematic, where you can click on various parts and the corresponding component is highlighted along with an explanation of what it does. There’s some interesting trivia about how a redesigned, improved version – the ZSCT1555 – couldn’t survive the popularity and success of the 555. He wraps it up with a useful list of notes and references. While de-capping blog posts are interesting on their own, [Ken] does a great job by giving us a detailed look at the internals.