Subscribe: Hack a Day
http://www.wssd.hackaday.com/rss.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
hackaday  motor  paper programs  programs  read  reverse engineer  robot arm  robot  selbe  stepper motor  stepper  tec battery  time  write 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Hack a Day

Hackaday



Fresh hacks every day



Last Build Date: Tue, 23 Jan 2018 06:12:43 +0000

 



Stepper Motor Robot Arm Has Smooth MovesSmooth stepper motor robot armstevenduf

Tue, 23 Jan 2018 06:00:27 +0000

[Tobias Kuhn] had watched a YouTube video about a robot arm which used servo motors, and wanted to try making one himself. But he found it hard to get slow or smooth movements out of the servos. Even removing the microcontroller and trying to work with the servo’s driver-IC and potentiometer from an Arduino Nano didn’t get him satisfaction.

Then he found the very affordable 28BYJ-48 stepper motor. After some experimenting, he came up with a smooth moving robot arm with four steppers controlled from an Arduino Mega and A4988 stepper motor drivers. Rather than write a bunch of stepper  …read more


Media Files:
http://1.gravatar.com/avatar/d2e4e7801ebccfd02a95327153fc7976?s=96&d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96




Running Programs On Paperpaper-programs-featuredlewinday

Tue, 23 Jan 2018 03:00:55 +0000

It’s a simple fact that most programs created for the personal computer involve the same methods of interaction, almost regardless of purpose. Word processors, graphics utilities, even games – the vast majority of interaction is performed through a keyboard and mouse. However, sometimes it can be fun to experiment with alternative technologies for users to interact with code – Paper Programs is an exciting way to do just that.

Paper Programs is a combination of a variety of existing technologies to create a way of interacting with code which is highly tangible. The setup consists of a projector, and a …read more


Media Files:
http://2.gravatar.com/avatar/bd5c88e8a4514eaa4ed39fe55eeeca3d?s=96&d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96




Tiny Programming Langauge in 25 Lines of Codeastwd5gnr1

Tue, 23 Jan 2018 00:00:14 +0000

There are certain kinds of programs that fascinate certain kinds of software hackers. Maybe you are into number crunching, chess programs, operating systems, or artificial intelligence. However, on any significant machine, most of the time those activities will require some sort of language. Sure, we all have some processor we can write hex code for in our head, but you really want at least an assembler if not something sturdier. Writing languages can be addictive, but jumping right into a big system like gcc and trying to make changes is daunting for anyone. If you want a gentle introduction, check …read more


Media Files:
http://2.gravatar.com/avatar/873254e5b4d82165d02a6c077328d23c?s=96&d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96




Reverse Engineering the TEC-06 Battery Testerprotowd5gnr1

Mon, 22 Jan 2018 21:00:36 +0000

[Syonyk] read that you could solder a few wires to a TEC-06 battery capacity tester, connect it to a TTL serial adapter, and it would interface with some Windows software via a serial port. You can buy it already enabled for serial, but since he had the non-connected version, he was interested in trying it. Not only did it work, but he took the time to reverse engineer the protocol and made a detailed write up about his findings and how he attacked the problem.

Around here, we never need an excuse to reverse engineer anything. But [Synonyk] mentions that …read more


Media Files:
http://2.gravatar.com/avatar/873254e5b4d82165d02a6c077328d23c?s=96&d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96




Shah Selbe: Science in the World’s Wildest Placesshah-selbe-hackaday-superconference_2_featuredMike Szczys

Mon, 22 Jan 2018 19:31:18 +0000

When we think of building research hardware, lab coats and pristine workbenches come to mind. Shah Selbe used to do something kind of like that when he was engineering satellite propulsion systems. But after putting twelve of them into space, he ditched the office gig and took his gear to some of the wildest places on earth. He’s an explorer and fellow with the National Geographic Society, and at the Hackaday Superconference he shared his experiences building research hardware that gathers data in incredibly remote places.

Shah makes a really good point about two very different trends in our world …read more


Media Files:
http://hackadaycom.files.wordpress.com/2018/01/fieldkit.png?w=400




Teardown: What’s Inside a Christmas Laser Projector?xmaslaser_feattomnardi

Mon, 22 Jan 2018 18:01:17 +0000

In the world of big-box retail, December 26th is a very special day. The Christmas music playing on the overhead speakers switches back to the family friendly Top 40, the store’s decorations get tossed in the compactor, and everything that’s even remotely related to the holiday is put on steep clearance. No more money to be made on the most commercialized of all holidays, so back to business as usual.

It’s in this narrow corridor of time, between the Great Holiday Unloading and the new spring products coming in, that you can find some fantastic deals on Christmas decorations. Not …read more


Media Files:
http://hackadaycom.files.wordpress.com/2018/01/xmaslaser_sal4.jpg?w=800




Seek and Exploit Security Vulnerabilities in an Infusion Pumpinfusion-pump-featuredsvengregori

Mon, 22 Jan 2018 17:00:00 +0000

Infusion pumps and other medical devices are not your typical everyday, off-the-shelf embedded system. Best case scenario, you will rarely, if ever, come across one in your life. So for wide-spread exploitation, chances are that they simply seem too exotic for anyone to bother exploring their weaknesses. Yet their impact on a person’s well-being makes potential security holes tremendously more severe in case someone decides to bother one day after all.

[Scott Gayou] is one of those someones, and he didn’t shy away from spending hundreds of hours of his free time inspecting the Smiths Medical Medfusion 4000 infusion pump …read more


Media Files:
http://0.gravatar.com/avatar/f612e2419aa4197a96d33a037f1b5741?s=96&d=https%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96