- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
Category Archives: Uncategorized
Racing games are a great way to test drive that Ferrari you can’t quite afford yet, and the quality of simulations has greatly improved in the last 30 or so years. While there are all manner of high-quality steering wheels to connect to your PC or home console, many gamers still choose to play using a typical controller, using the thumbstick for steering. What if there was something in between?
What we have here is a tiny steering wheel you can print for an Xbox One controller, that mounts to the controller frame and turns rotational motion into vaguely linear …read more
After the Norman invasion of England, William the Conqueror ordered a great reckoning of all the lands and assets owned. Tax assessors went out into the country, counted sheep and chickens, and compiled everything into one great tome. This was the Domesday Book, an accounting of everything owned in England nearly 1000 years ago. It is a vital source for historians and economists, and one of the most important texts of the Middle Ages.
In the early 1980s, the BBC set upon a new Domesday Project. Over one million people took part in compiling writings on history, geography, and social …read more
While the weather alternated between mist and monsoon for most of it, the thirteenth annual Vintage Computer Festival East was still a huge success. People came from all over the country, and indeed the world, to show off computers and equipment that was easily older than many of those in attendance. From 1980’s robots to recreations of the very first machines to ever carry the name “computer” as we understand it today, there were a dizzying array of fascinating exhibits to see for those who made the pilgrimage to the InfoAge Science Center in Wall, New Jersey. The people who …read more
It’s nearly summer, and that means we’re right at the start of conference season, at least for the tech and netsec crowd. Conferences, if you’re not aware, are a conspiracy for the hotel-industrial complex and a terrible way to spend thousands of dollars on a crappy hotel room and twenty-five dollar hamburgers.
[Andrew Quitmeyer] is working on an experimental academic conference that might just put an end to the horrors of conference season. He’s creating his own conference called Dinacon, and it’s going to be cheaper to attend, even though it’s on a tropical island in the Pacific.
For this …read more
Hackers, Designers, and Engineers flooded into Dom Omladine on Saturday for what can only be described as an epic celebration of hardware culture. This is the second time Hackaday has organized a huge conference in Belgrade, and lightning really did strike twice.
A Gathering of New Friends and Old
We got things started off with a meetup the night before the conference. The first Hackaday Belgrade was held in 2016 and we didn’t reserve a bar on Friday night — we ended up taking over one just through sheer numbers. This year we called ahead for a large outdoor space, …read more
Greetings from beautiful Belgrade! With the Hackaday crew arriving over the last couple of days, preparations are in full swing, and the excitement is building for Hackaday Belgrade 2018 on Saturday. Here’s all the news you need to know.
If you haven’t gotten tickets yet, you can’t say we didn’t warn you! We’ve sold out. But don’t despair: there’s a waitlist, so get your name in now if you still want to get in.
- The final conference schedule has just been released and it’s super.
- We’re having a meetup Friday night at 20:00 at the Bajloni Bar and Beyond, join
Analog-to-digital converters, or ADCs, are somewhat monolithic devices for most users, a black box that you ask nicely for the value on its input, and receive a number in return. For most readers, they will be built into whatever microcontroller is their platform of choice, and their resolution will be immutable, set by whatever circuitry is included upon the die. There are a few tricks that can be employed to get a bit more from a stock ADC though, and [Neris] has taken a look at a couple of them.
The first circuit doubles the resolution of an ADC, in …read more
Computers are great at a lot of things. However, general-purpose computers can benefit from help on certain tasks, which is why your video card and sound card both have their own specialized hardware to offload the CPU. If Accelize has its way, some of your hardware acceleration will be done in the cloud. Yes, we know. The cloud is the buzzword of the week and we are tired of hearing about it, too. However, this service is a particularly interesting way to add FPGA power to just about any network-connected CPU.
Currently, there are only four accelerators available, including a …read more
[Reiner Schmidt] was tired of renting an expensive 5-axis CNC head for projects, so he decided to build his own. It’s still a work in progress, but he’s made remarkable progress so far. The project is called Bridge Boy, and it is designed to use a cheap DC rotary mill to cut soft materials like plastic, wood and the like. Most of it is 3D printed, and he has released the Autodesk 360 plans that would allow you to start building your own. His initial version uses an Arduino with stepper drivers, and is designed to fit onto the end …read more
Deep Neural Networks can be pretty good at identifying images — almost as good as they are at attracting Silicon Valley venture capital. But they can also be fairly brittle, and a slew of research projects over the last few years have been working on making the networks’ image classification less likely to be deliberately fooled.
One particular line of attack involves adding particularly-crafted noise to an image that flips some bits in the deep dark heart of the network, and makes it see something else where no human would notice the difference. We got tipped with a YouTube video …read more