Thursday, May 31

Microsoft killing off the Groove Music apps for iOS and Android

Microsoft is retiring its Groove Music apps for iOS and Android on December 1.

The cross-platform music apps lost a lot of their purpose when Microsoft closed its Groove music store and subscription service last year. They still retained some value, however, as they could play music stored and synchronized on OneDrive. That will end on the retirement date, with Microsoft saying that not only will the application cease to be available to install but also that existing installations will stop working.

When it shut down its store, Microsoft suggested that users turn to Spotify as an alternative. This time around, the company is pointing users at Google Play Music and iTunes Match. The OneDrive app itself also has some limited music playback capabilities of its own. Overall, however, the net effect of this change is that there's now little point in using OneDrive for music storage, as the best playback application for OneDrive-stored music is being discontinued.

Read 1 remaining paragraphs | Comments

More A-10s to get new wings, as Air Force officially launches ATTACK

A fossil fuel plant that releases no carbon dioxide? Testing has begun in Texas

Modular Robotics Made Easier With ROS

Sprint chair: We will build a great network with or without T-Mobile merger

Help us improve our science coverage

Xiaomi clones the iPhone X for $420, adds in-display fingerprint reader

Xiaomi has fired up its photocopier and created a shameless iPhone X rip-off called the Xiaomi Mi 8. It has Xiaomi versions of the iPhone X's trademark notch, Face ID, and Animoji, along with basically the same rear camera layout and back design. There's even a cheaper version called the Mi 8 "SE," and some of the press images are even remakes of the iPhone X press images. Classy.

Xiaomi is actually applying some unique Xiaomi goodness to this shameful, shameful design, though. First, the phone starts at $420, and second, if you opt for the high-end model you can get one with an in-screen fingerprint reader and a questionably feasible transparent back.

Read 8 remaining paragraphs | Comments

Own a piece of the huge retro gaming collection being auctioned off today

Bodnar's Auction House

In this day and age, all but the rarest of rare classic video games are relatively easy to find with a simple eBay search. Still, the massive classic gaming collection being auctioned off in suburban New Jersey today deserves attention for the sheer volume of retro gaming pieces being sold off in one place.

The gargantuan collection, encompassing tens of thousands of items, has been gathered together over decades of work by 45-year-old Bill Loguidice, an author specializing in books about classic games. While there are thousands of boxed and unboxed games—ranging from common to one of a kind—the highlight of the collection is the hundreds of pieces of video game hardware and accessories covering pretty much every major console and gaming computer released since the Fairchild Channel F.

Read 4 remaining paragraphs | Comments

Trump wants a total ban on German luxury car imports

Reverse-Emulating NES: Nintendception!

This is a stellar hack, folks. [Tom7] pulled off both full-motion video and running a Super Nintendo game on a regular old Nintendo with one very cute trick. And he gives his presentation of how he did it on the Nintendo itself — Nintendo Power(point)! The “whats” and the “hows” are explained over the course of two videos, also embedded below.

In the first, he shows it all off and gives you the overview. It’s as simple as this: Nintendo systems store 8×8 pixel blocks of graphics for games on their ROM cartridges, and the running program pulls these up and displays them. If you’re not constrained to have these blocks stored in ROM, say if you replaced the cartridge with a Raspberry Pi, you could send your own graphics to be displayed.

He demos a video of a familiar red-haired English soul-pop singer by doing just that — every time through the display loop, the “constant” image block is recalculated by the Raspberry Pi to make a video. And then he ups the ante, emulating an SNES on the Pi, playing a game that could never have been played on an NES in emulation, and sending the graphics block by block back to the Nintendo. Sweet!

The second video talks about how he pulled this off in detail. We especially liked his approach to an epic hack: spend at least a day trying to prove that it’s impossible, and when you’ve eliminated all of the serious show-stoppers, you know that there’s a good chance that it’ll work. Then, get to work. We also learned that there were capacitors that looked identical to resistors used in mid-80s Japan.

These are long videos, and the first one ends with some wild speculation about how a similar human-brain augmentation could take a similar approach, replacing our “memories” with computed data on the fly. (Wait, what?!? But a cool idea, nonetheless.) There’s also another theme running through the first video about humor, but frankly we didn’t get the joke. Or maybe we just don’t know what’s funny. Comments?

None of that matters. A SNES game was played in an NES by pushing modified graphics from a “ROM” cartridge in real-time. And that’s awesome!

If you want more Nintendo-in-Nintendo goodness, check out this NES ROM that’s also a zip file that contains its own source code. If you compile the source, you get the zip file, which if you unzip gives you the source to compile. Right?

Thanks to everyone who sent this in to the tip line! [darkspr1te], [Erik S], [Reversnes], [Tim Trzepacz], [KAN], [Jorhlok], and [Qes]. (Did I forget anyone?!?)

Telegram CEO: Apple has “prevented” app updates globally since April

Dark matter halos may leave twinkling wake in galaxies

Internet of Smells: Giving a Machine the Job of Sniffing Out Spoiled Food

Autopilot blamed for more crashes, Tesla insurance rates skyrocket

These Students Made A Walking TARS Robot From Interstellar

It actually walks, and looks pretty darned good too!

Read more on MAKE

The post These Students Made A Walking TARS Robot From Interstellar appeared first on Make: DIY Projects and Ideas for Makers.

Roblox Introduces Education Initiative to Inspire a New Generation of Game Designers

Today, Roblox launched Roblox Education, an initiative to teach kids how to code by helping them program their own Jurassic Park-inspired video game.

Read more on MAKE

The post Roblox Introduces Education Initiative to Inspire a New Generation of Game Designers appeared first on Make: DIY Projects and Ideas for Makers.

NASCAR’s high-tech world: Leave any preconceptions behind for this deep-dive

T-shirt maker sinks rival with dubious trademark of 150-year-old nautical icon

Accurate Coffee Billing Through Reverse Engineering

If you’ve ever worked in a stingy office, you’ve become familiar with the communal coffee maker that runs on some variant of the honor system. There’s bits of paper, a coin jar shabbily sealed with sticky tape, and the routine note every six months telling people off for not paying for their daily brew. It all gets a bit much. Thankfully, if you work with [Fabian], it’s no longer a problem (PDF link).

The project forms the basis for [Fabian]’s thesis, in which a DeLonghi coffee maker is reverse engineered. This is undertaken with the explicit goal of properly metering the amount of consumables (coffee beans) used per beverage, to more fairly charge users depending on their brew of choice. This involves breaking down and understanding the coffee maker’s internal communications, as well as implementing a system to record and handle billing. For reasons of simplicity, [Fabian] decided that this should be handled using his colleague’s existing computer accounts. Easy!

It’s a highly academic approach to what we’re sure was a very stimulating project with lots of delicious aromas. Coffee’s a popular topic among hackers, that’s for sure – check out this roaster to take your game to the next level.

 

Serial Connection Over Audio: Arduino Can Listen To UART

We’ve all been there: after assessing a problem and thinking about a solution, we immediately rush to pursue the first that comes to mind, only to later find that there was a vastly simpler alternative. Thankfully, developing an obscure solution, though sometimes frustrating at the time, does tend to make a good Hackaday post. This time it was [David Wehr] and AudioSerial: a simple way of outputting raw serial data over the audio port of an Android phone. Though [David] could have easily used USB OTG for this project, many microcontrollers don’t have the USB-to-TTL capabilities of his Arduino – so this wasn’t entirely in vain.

At first, it seemed like a simple task: any respectable phone’s DAC should have a sample rate of at least 44.1kHz. [David] used Oboe, a high performance C++ library for Android audio apps, to create the required waveform. The 8-bit data chunks he sent can only make up 256 unique messages, so he pre-generated them. However, the DAC tried to be clever and do some interpolation with the signal – great for audio, not so much for digital waveforms. You can see the warped signal in blue compared to what it should be in orange. To fix this, an op-amp comparator was used to clean up the signal, as well as boosting it to the required voltage.

Prefer your Arduino connections wireless? Check out this smartphone-controlled periodic table of elements, or this wireless robotic hand.

Wednesday, May 30

Supercapacitors In A Servo: The “Forever” Flashlight

Senators probe driverless car testing amid lax Trump oversight

Process takes CO₂ from the air, converts it to carbon nanotubes

Trump hits campaign trail to endorse key foe of net neutrality rules

Life returned to crater of Cretaceous asteroid in the blink of an eye

VCF East: The Mail Order App Store

Today we take the concept of a centralized software repository for granted. Whether it’s apt or the App Store, pretty much every device we use today has a way to pull applications in without the user manually having to search for them on the wilds of the Internet. Not only is this more convenient for the end user, but at least in theory, more secure since you won’t be pulling binaries off of some random website.

But centralized software distribution doesn’t just benefit the user, it can help developers as well. As platforms like Steam have shown, once you lower the bar to the point that all you need to get your software on the marketplace is a good idea, smaller developers get a chance to shine. You don’t need to find a publisher or pay out of pocket to have a bunch of discs pressed, just put your game or program out there and see what happens. Markus “Notch” Persson saw his hobby project Minecraft turn into one of the biggest entertainment franchises in decades, but one has to wonder if it would have ever gotten released commercially if he first had to convince a publisher that somebody would want to play a game about digging holes.

In the days before digital distribution was practical, things were even worse. If you wanted to sell your game or program, it needed to be advertised somewhere, needed to be put on physical media, and it needed to get shipped out to the customer. All this took capital that would easily be beyond many independent developers, to say nothing of single individuals.

But at the recent Vintage Computer Festival East, [Allan Bushman] showed off relics from a little known chapter of early home computing: the Atari Program Exchange (APX). In a wholly unique approach to software distribution at the time, individuals were given a platform by which their software would be advertised and sold to owners of 8-bit machines such as the Atari 400/800 and later XL series computers. In the early days, when the line between computer user and computer programmer was especially blurry, the APX let anyone with the skill turn their ideas into profit.

The Fine Print

Of course, Atari’s goals with the program weren’t completely altruistic. At the time, the Atari badly needed more software. So badly that they were willing to take on the role of publisher themselves to help ease the burden of getting new software out for the platform. Developer Chris Crawford, who’s war simulation Eastern Front (1941) ended up selling over 60,000 copies through APX, recalls the origins of the program:

The guy who cooked up the idea, Dale Yocum, was trying to explain to the management that there are a lot people out there that like to write programs and if we can publish these programs for them, it’s a win-win. He put together a business plan for it and said ‘Look, we only need a little bit of money and this thing can be self-sufficient and it might make some money.’ They grudgingly agreed to let him do it because the Atari platform desperately needed a larger software base, a void not being filled by the other publishers of the day.

Costs of the program were reduced by using very utilitarian packaging for the software, and having the developers themselves write the manuals. All Atari had to do was run off the copies and mail them out. Even the split was heavily in Atari’s favor: the developers only received 10% of the sale price for each unit sold.

So not only did APX help fill a gap in Atari’s software library, it brought in plenty of money for them as well. Consider that Eastern Front (1941) is listed at $29.95 in the APX catalog, which totals to nearly $1.8 million (approximately $4.5 million, today) dollars in sales for that single game alone.

The APX Archive

While [Allan] did bring along an Atari 800XL to demonstrate some of the software distributed via APX, the real draw of his table was a selection of mint condition APX boxes, tapes, manuals, and catalogs. The sparse box art and utilitarian manuals were a stark reminder of the program’s frugality. Some of the manuals had all the frivolity of a high school book report; something which was immediately noticeable at VCF East, where there was no shortage of contemporary software to compare against.

[Allan] has made it his mission to scan the boxes and manuals for all of the APX software he can find, including the APX catalogs themselves, and make the information publicly available on the AtariWiki. So even if you can’t see his impressive collection in person, the data about this fascinating experiment in software distribution won’t be lost to time.

History Repeats

Perhaps the most interesting aspect of this look at APX was hearing about its parallels with modern software marketplaces. Some of the programs released via APX were hyper specialized, such as an application for keeping track of a newspaper route and one that was used to calibrate color TVs. These programs would likely never have seen the light of day, at least commercially, if a marketplace such as APX didn’t exist.

But as APX became more popular, Atari had to start tightening up their standards. In the early days, the bar was fairly low for acceptance into the program, but towards the end more and more software had to get rejected. While there’s no hard numbers on how many programs got the boot, Director of APX Fred Thorlin did admit in an interview that some of the early titles would never have been accepted if they were submitted later on in the program.

So the next time you look at all the low effort copycat games and applications vying for your download on the Google Play store of Apple App Store, just remember: Atari tried to warn us.

Google’s Project Fi gets new phones from LG and Motorola

For light data users in the US, Google's cellular service, Project Fi, can be one of the best deals in mobile. It's $20 per month for unlimited calls and texts, plus $1 per 100MB of data you use (that works out to $10 per GB), with a "bill protection cap" (basically an unlimited plan) of $80. Coverage from Sprint, T-Mobile, and US-Cellular is all rolled into one super-carrier, multiple data SIMs are free, and you can text and leave voicemails from a PC.

The hard part is getting a compatible phone that works with Fi's multi-carrier setup. Previously, there was only Google's lineup of Pixel and Nexus phones, along with the Moto X4. Today, Google is announcing three new Fi-compatible phones: The Moto G6, LG G7 ThinQ, and the LG V35 ThinQ.

Read 7 remaining paragraphs | Comments

What is Fallout 76? Bethesda’s pre-E3 tease has few answers

Another Fallout game needs your help. I'll mark it on your map.

Since yesterday morning, Bethesda has been drawing over 100,000 Twitch viewers to a static "Please Stand By" screen with a Fallout Pip-Boy in the foreground. Today, those patient fans were rewarded with a rather cryptic, gameplay-free trailer for Fallout 76, the next game from Bethesda Game Studios.

Opening with a cover of John Denver's "Take Me Home, Country Roads," the teaser slowly leads us through the interior of Vault 76, which we know from past games was built in the Virginia area. According to the in-game lore, Vault 76 is one of Vault-Tec's "control vaults," designed to be one of the first to open up to the outside world 20 years after the 2077 apocalypse. Judging by the dates in the trailer, that opening might have been delayed—there's a Pip-Boy in a few shots that displays a date of "27 Oct 2102," five years behind "schedule."

Still, the teaser appears to show the someone gearing up for a red-letter day. The vault—which appears pristine and functional—is littered with the remains of a huge party, and the character appears to have set his or her alarm in order to get up early for "Reclamation Day," which we assume is when the doors open and the vault's inhabitants emerge to take back a world cleansed of Commies and rich with oil.

Read 3 remaining paragraphs | Comments

Friday Hack Chat: Logic Noise

If you like your synthesizers glitchy, squawky, or simply quick-and-dirty, you won’t want to miss this week’s Hack Chat with Hackaday’s own [Elliot Williams], because he’ll be brain-dumping everything he knows about making music with 4000-series CMOS logic chips. Break out your breadboards!

Coaxing sound out of chips intended for digital mathematical operations might sound odd, but there’s a tradition of doing so that dates back to the late 1970s. While the scene is dominated by hackers and artists, would you believe that there was even a commercial synthesizer (the EDP Wasp) based on these techniques?

Even more surprisingly, people are still coming up with novel circuits even in the last few years! Making synths out of logic chips is cheaper, more accessible, and more surprising than building yourself a modular synth, but we’ll be the first to admit that maybe it’s a gateway drug.

If you want to get a jump on the discussion, [Elliot]’s Logic Noise series ran twelve installments and covers a lot of the basics. (Start here, with square-wave oscillators and then skip around if you want.) He also just gave a talk at Hackaday Belgrade, and although it was mostly about the live demos, you can check out the slides here — scroll to the very end for a good bibliography.

Ever wondered:

  • How to get triangle and sawtooth waveforms out of digital logic?
  • Whether a shift register can handle all of your compositional desires?
  • Just exactly what an XOR sounds like?

Don’t miss this week’s hack chat!

You are, of course, encouraged to add your own questions to the discussion. You can do that by leaving a comment on the Hack Chat Event Page and we’ll put that in the queue for the Hack Chat discussion.join-hack-chat

Our Hack Chats are live community events on the Hackaday.io Hack Chat group messaging. This week is just like any other, and we’ll be gathering ’round our video terminals at noon, Pacific, on Friday, June 1st.  Here’s a clock counting down the time until the Hack Chat starts.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io.

You don’t have to wait until Friday; join whenever you want and you can see what the community is talking about.

Half of Windows 10 PCs already updated to the April 2018 update

Cloud-based quantum computer takes on deuteron and wins

New low-end Nokia smartphones arrive, with Android Go model coming to the US

HMD announced a new slate of Nokia phones Tuesday. To go along with the previously announced Nokia 6.1 (review coming soon!), we have the Nokia 5.1, Nokia 3.1, and Nokia 2.1. The highest-end phone here starts at $220, and the price goes down from there.

Every Nokia phone is worth paying attention to, because they are all part of Google's Android One program. This means they run stock Android and get monthly security updates. Nokia promises two years of major OS updates and three years of security updates for everything. It's really hard to find good, cheap smartphones, and with this lineup (depending on distribution), HMD seems to have the market locked up.

Before we dive in, here's a big spec table:

Read 13 remaining paragraphs | Comments

Laser-Powered Flying Machine Weighs Milligrams

We’ve become used to seeing some beautiful hand-made creations at the smaller end of the flying machine scale, tiny aircraft both fixed and rotary wing. An aircraft that weighs a few grams is entirely possible to build, such have been the incredible advances in component availability.

But how much smaller can a working aircraft be made? Given a suitable team and budget, how about into the milligrams? [Dr. Sawyer Fuller] and his team at the University of Washington have made an ornithopter which may be the lightest aircraft yet made, using a piezoelectric drive to flap flexible wings. That in itself isn’t entirely new, but whereas previous efforts had relied on a tether wire supplying electricity, the latest creation flies autonomously with its power supplied by laser to an on-board miniature solar cell that protrudes above the craft on its wires.

Frustratingly Dr. Fuller’s page on the machine is lighter on detail than we’d like, probably because they are saving the juicy stuff for a big reveal at a conference presentation. It is however an extremely interesting development from a technical perspective, as well as opening up an entirely new front in the applications for flying machines. Whatever happens, we’ll keep you posted.

You can see the craft in the video below the break, and if you’re interested lies with more conventional tiny machines take a look at the creator of a 2.9g Mustang model.

360 Live VR Teleportation Uses Drones, Neural Networks, and Perseverance

Decades of aerial photos reveal how an ancient desert city got its water

Slice Your Way to Victory in Your Next Cosplay Contest with this Zer0 Sword

Casey Gartung constructed the sword that Zer0 uses in Borderlands 2 for her cosplay, and it looks absolutely incredible!

Read more on MAKE

The post Slice Your Way to Victory in Your Next Cosplay Contest with this Zer0 Sword appeared first on Make: DIY Projects and Ideas for Makers.

Cheap Stuff To Hack: A Router With An SDR For $13

The history of consumer electronics is littered with devices that are relatively uninteresting at first, but become spectacular platforms for hardware exploitation once a few select people figure out how everything ticks. The Linksys WRT54G was just a router until someone figured out how to put a complete Linux system on them. Those RTL-SDR dongles were just for capturing over the air TV until someone realized they were actually a software-defined radio. The CueCat was just dot-com boom marketing garbage until… well, we picked up a lot of CueCats regardless.

Now there’s a new device sitting on the shelves at Walmart just waiting for some Linux hackers to have a go. It’s the Tzumi MagicTV, a device that allows you to watch over-the-air television on your phone. What’s inside? It’s a WiFi router, an RTL-SDR, and a battery pack in one tiny package. The best part? It costs $13, and apparently Walmart is just blowing them out.

Right now, there aren’t too many details on what’s going on inside the Tzumi MagicTV box, however, the discussion over on the RTLSDR subreddit has revealed enough to give us a good idea of what’s going on. The router inside the MagicTV is a TP-Link TL-WR703N, the exact same WiFi router that took the WRT54G’s place as the king of hackable routers a few years ago. The SDR chip is the same as the Astrometa DVB-T2, one of the common TV tuners on-a-stick. Other than that, there are TX and RX pins on the board, SSH is open, no one knows the password, but as of this writing, a few people are putting John the Ripper to work trying to break into this box.

What is the end goal of cracking this Linux box wide open? Well, it’s a WiFi router and an SDR, so if you want to make your own Flightaware ADS-B logger, that could be on the table. Of course, you could actually use it for its intended purpose and pull down over-the-air TV to your local network, but that seems so pedestrian after getting root on a $13 box from Walmart.

Thanks [Adam] for the tip!

We Happy Few hands-on: A solid, LSD-spiked Bioshock homage finally emerges

Autonomous Spaceplane Travels to 10 km, Lands Safely 200 km Away

Space balloons, where one sends instrument packages to the edge of space on a weather balloon, are a low-cost way to scratch the space itch. But once you’ve logged the pressure and temperature and tracked your balloon, what’s the next challenge? How about releasing an autonomous glider and having it return itself to Earth safely?

That’s what [IzzyBrand] and his cohorts did, and we have to say we’re mightily impressed. The glider itself looks like nothing to write home about: in true Flite Test fashion, it’s just a flying wing made with foam core and Coroplast reinforced with duct tape. A pair of servo-controlled elevons lies on the trailing edge of the wings, while inside the fuselage are a Raspberry Pi and a Pixhawk flight controller along with a GPS receiver. Cameras point fore and aft, a pair of 5200 mAh batteries provide the juice, and handwarmers stuffed into the avionics bay prevent freezing.

After a long series of test releases from a quadcopter, flight day finally came. Winds aloft prevented a full 30-kilometer release, so the glider was set free at 10 kilometers. The glider then proceeded to a pre-programmed landing zone over 80 kilometers from the release point. At one point the winds were literally pushing the glider backward, but the little plane prevailed and eventually spiraled down to a perfect landing.

We’ve been covering space balloons for a while, but take a moment to consider the accomplishment presented here. On a shoestring budget, a team of amateurs hit a target the size of two soccer fields with an autonomous aircraft from a range of almost 200 kilometers. That’s why we’re impressed, and we can’t wait to see what they can do after a release from the edge of space.

HP Omen 15 laptop gets Nvidia Max-Q graphics, sleeker design with slim bezels

HP

HP made a comeback with its refreshed Omen gaming laptop line last year, and now the company is updating the model with the most ubiquitous size ahead of E3. The HP Omen 15 notebook will have a slightly new look going forward, along with support for the latest Intel processors and Nvidia's GTX 1070 with Max-Q graphics card.

We only got to see a few pre-production units of the new Omen 15, and the design changes are subtle. It still sports a matte black plastic chassis with glowing red accents and the Omen logo predominantly displayed in the middle of the lid. However, now it has an aluminum keyboard area, giving it a more luxurious feel, and much smaller bezels surrounding the 15-inch display.

Read 9 remaining paragraphs | Comments

Tuesday, May 29

Tiny $25 Spectrometer Aims to Identify Materials with Ease

Amazon is willing to expand crackdown on sale of pirate TV boxes

Spanning The Tree : Dr Radia Perlman & Untangling Networks

As computer networks get bigger, it becomes increasingly hard to keep track of the flow of data over this network. How do you route data, making sure that the data is spread to all parts of the network? You use an algorithm called the spanning tree protocol — just one of the contributions to computer science of a remarkable engineer, Dr. Radia Perlman. But before she created this fundamental Internet protocol, she also worked on LOGO, the first programming language for children, creating a dialect for toddlers.

Born in 1952, Perlman was a prodigy who excelled in math and science, and in her own words, “Every time there was a new subject or a quiz I would be very excited at the opportunity to solve all sorts of puzzles”. She graduated from MIT in 1973 and got her Masters degree in 1976.

While she was working on her Master’s degree, she worked with Seymour Papert at the MIT Artificial Intelligence Lab, which was working on LOGO, the first programming language for children. In the simplest version of this language, kids could learn the fundamentals of programming by writing programs that controlled the motion of an on-screen or motorized turtle. Perlman created Turtles Own Recursive Turtle Interpreter System (TORTIS), a simplified version of LOGO that could be used by pre-school children. This was controlled by buttons that allowed the toddler to experiment with a Logo turtle with a less intimidating interface than existing systems. “Most important of all,” the abstract for her paper describing the project says, “it should teach that learning is fun.”

Spanning Tree

After getting her masters and leaving MIT, Perlman joined BBN, a defense contractor, then moved to Digital Equipment Corporation (DEC) in 1980. At DEC, she was tasked with looking into ways to deal with the increasing complexity of the local area networks (LANs) that the company was creating. Specifically, how do you stop data from getting trapped in a loop?

Imagine a small network of two computers connected to a router. When one device sends out a data packet, the switch (a router that includes the ability to switch data between multiple ports) passes it onto the other device. But LANs are seldom that simple, and with more computers being connected to the nascent Internet, it was getting harder to figure out how to effectively and efficiently route data between multiple switches. To create networks that could survive the loss of a connection, a switch would be connected to multiple other switches. That way, if one connection failed, you had a backup. You also have multiple possible ways to route data, which creates the possibility of loops. A loop is where one switch passes a packet of data to another, which then sends it back to the first. The first switch then resends it to the second, and so on. That can create a broadcast storm, where the links between switches become filled with these echoing packets.

So how do you avoid this? Perlman’s solution was deceptively simple. She created the Spanning Tree Protocol (STP), which allows each switch in the network to figure out its place in the scheme of things. This innovative standard was codified in the IEEE standard 802.1D, last revised in 2004.

Each switch is assigned a number by the network designer, called the Bridge ID (BID) which indicates its prominence in the network. The switch with the lowest BID is designated as the root bridge. If you think of it as the root system of a tree, the root bridge is the base of the trunk, the point where the root system begins. Below this, each switch is a branch of the root system, branching off and reaching the devices at the root tips.

It’s more complex than a tree root, though: there are multiple links between root branches, and sometimes these links get cut. To negotiate this, each of the switches periodically sends out special data packets called Bridge Protocol Data Units (BPDUs) that contain the BID and another number called the path cost for each connection it has available. This number is calculated from the bandwidth that the connection offers: the lower the path cost, the higher the bandwidth the connection offers. As each switch receives the BPDU from its neighbors, it uses the path cost to decide which connection to use: the lower the cost, the more favorable the connection is. It then sends out its own BPDUs to neighbors, which use this information to calculate which connections to use. This then propagates through the network until every switch knows its place, and which routes are most efficient to use.

If a connection fails, the switch sends out a specially flagged BPDU that contained the details of the remaining connections, which the other switches use to recalculate. In effect, the network would route around the damage and just keep working.

It is such a simple solution that it now appears obvious, but Dr Perlman struggled to get her fellow engineers to accept it, because it was so simple. Many engineers struggled to accept that the answer to the problem could be that simple. “My designs were so deceptively simple that it was easy for people to assume I just had easy problems,” she told the Atlantic, “whereas others, who made super-complicated designs (that were technically unsound and never worked) and were able to talk about them in ways that nobody understood, were considered geniuses.”

The beauty of the STP is that none of the routers need to know the details of the entire network to work: all it needs to know is its own BID and the route cost of the connection to its immediate neighbors. The inverted tree of the network is automatically created by each of the switches using the information it has to decide how to route data. It’s perhaps best described by a poem that Perlman herself wrote in the patent application for the standard and the academic paper describing the protocol (PDF link):

Algorhyme

I think that I shall never see
a graph more lovely than a tree.

A tree whose crucial property
is loop-free connectivity.

A tree that must be sure to span
so packet can reach every LAN.

First, the root must be selected.
By ID, it is elected.

Least-cost paths from root are traced.
In the tree, these paths are placed.

A mesh is made by folks like me,
then bridges find a spanning tree.

Although the original STP has since been replaced by enhanced and updated versions such as the Rapid Spanning Tree Protocol (RTSP), the fundamental idea of a self-organizing, adaptive network remains one of the underpinnings of networking and the Internet. Many of these replacement protocols have been created with the input of Perlman, who continues to work on networking standards such as and TRansparent Interconnection of Lots of Links (TRILL). Although the networks of the Internet are now far more complex than those she first thought about in the 1970’s, the survival of these networks owes much to her innovative, and we would say creative, thinking.

Injury lawyers push ads to patients’ phones when they go to geofenced ERs

Building a Cubbyhole Cabinet from Trash

Turn some jugs and cans from the trash into a small parts shop organizer.

Read more on MAKE

The post Building a Cubbyhole Cabinet from Trash appeared first on Make: DIY Projects and Ideas for Makers.

Are autonomous trucks going to save the industry or destroy it?

Badge Bling And More At LayerOne 2018

The security conference LayerOne 2018 took place this past weekend in Pasadena, California. A schedule conflict meant most of our crew was at Hackaday Belgrade but I went to LayerOne to check it out as a first-time attendee. It was a weekend full of deciphering an enigmatic badge, hands-on learning about physical security, admiring impressive demos, and building a crappy robot.

Hello Conference Badge

Immediately upon checking in to the conference, attendees were handed a populated circuit board, a battery, then herded onward so other people can get checked in. This is sheer luxury compared to tales of years past, when attendees were given a blank PCB and a bag of parts. “What does the badge do?” is part of the fun here and served as an excellent icebreaker for us to talk to each other and compare notes. Several previous LayerOne badges were documented on Hackaday.io, but not this one. (Yet?)

The ESP32-WROOM-32 on top tells us it is a networked device. There were only four LEDs on the board, but there is a speaker & microphone module telling us the badge is an aural showcase and not a visual one. There are five controls for human fingers. Three were fairly straightforward: power switch plus “BOOT” and “RESET” buttons. They were accompanied by a button labelled “DO NOT PRESS” (yeah, right) and a button labelled with our first hint: “MR MEESEKS

Since this is a security conference, some attendees decided a mystery networked device with audio recording capabilities is not something they wanted to wear around their neck. Their badge hack to create a 100% secure IoT device is to not install the battery at all: a 18650 cell that proudly wore its eyebrow-raising name “UltraFire”.

Most of us who chose to install our battery were rewarded with illuminated LEDs. Some were then followed by an audio clip of “I’m Mr. Meeseeks, Look at me!” This announcement would randomly punctuate conference proceedings for the entire weekend.

Those who wanted to dive into the badge headed straight to the Hardware Hacking Village, but there were many other parts to the conference. The largest room was dedicated to security talks given throughout the weekend as well as the Saturday night dinner and game night. One room ran the conference capture-the-flag competition. There was a room dedicated to IoT devices, and a “chill-out” room with games where people could take a break from all of the above. Sadly, I could only be in one place at a time so I chose to check out the lock-picking village.

Lock-Picking Village

LayerOne’s Lock-Picking Village invites people to play with physical security devices. Not all of us would learn to defeat them, but we all learn enough to know how far to (not) trust them. Half of this year’s room was dedicated to physical locks. A pin tumbler lock fundamentals class presented twice a day gave complete beginners enough to start using basic tools on training locks laid out on tables. Then we could look at the display of high security / esoteric locks to see how their designers have tried to make lock-picking difficult.

The other half of Lock-Picking Village was dedicated to tamper-evident seals. These simple devices are not intended to prevent access since it’s easy to cut them apart. Their purpose is to show evidence such tampering has occurred. LayerOne attendees are challenged to defeat their purpose: open them up without leaving evidence of tampering. A wide range of such seals were on hand for people to choose the level of difficulty they wished to tackle, starting with what was basically a fancy zip-tie and onward to increasingly clever contraptions.

The Lock-Picking Village was far more beginner-friendly than expected. The whole room was tremendously fun and educational even for someone who only worked up to a 4-pin lock and left significant evidence of tampering when I opened up my tamper-evident seal.

Hardware Hacking Village

Back in the hardware hacking village, the word on the badge is that it connects to a WiFi AP at the event and, through it, Amazon’s Alexa. The “I’m Mr. Meeseeks, Look at me!” audio notifies the device is online and ready. Sadly something couldn’t gracefully scale to the entire conference, so badges were getting knocked offline. Their effort to reconnect explains the frequent and random notifications throughout the weekend.

The event organizers foresaw that there would be people who would miss the experience of soldering their own board or miss the presence of blinking LEDs. So an add-on kit was offered for sale to build a blinking LayerOne logo. Made of tiny surface mount parts, it was a challenge that people took on with varying degrees of success. Some staffers were on hand to offer much-appreciated guidance.

HHV also hosted a few other events including panel discussions, the demo party, and Hebocon: the crappy robot competition. As a first-time attendee I came unprepared and didn’t think I could participate until I noticed the build-up to Hebocon. People were pulling parts out of bins and hot-gluing them together into simple contraptions. Most of the competitors were built within the hour before competition began so, with 40 minutes to go, I decided to hack one together. With zero time for testing and polish, it was a robot that would intimidate its enemies with the fearsome Tindie blinking badge… before driving itself off the arena.

By the end of the weekend many conferences badges sported the official blinking add-on. But since you can never have too many LEDs, I modified my Tindie badge to tap into the conference badge power rail and sit alongside the illuminated LayerOne logo.

In addition to the Github repository, the organizers promised more information to come for those who wish to continue working on their badge. It’s a great device with audio peripheral and battery power management already on board, plus ESP32 pins brought out to through-hole solder points all around the perimeter. LayerOne 2018 badge is a great foundation for further hacking and I look forward to the promised future release of documentation. Until then, the badge will have to speak for itself.

“What is your favorite color?”

“My favorite color is seafoam.”