×
Input Devices

Reverse Engineering the Oculus Rift DK2's Positional Tracking Tech 26

An anonymous reader writes The Oculus Rift DK2 VR headset hides under its IR-transparent shell an array of IR LEDs which are picked up by the positional tracker. The data is used to understand where the user's head is in 3D space so that the game engine can update the view accordingly, a critical function for reducing sim sickness and increasing immersion. Unsurprisingly, some endeavoring folks wanted to uncover the magic behind Oculus' tech and began reverse engineering the system. Along the way, they discovered some curious info including a firmware bug which, when fixed, revealed the true view of the positional tracker.
Government

The $1,200 DIY Gunsmithing Machine 651

An anonymous reader writes: You may recall Cody Wilson as the man behind the world's first 3D-printed gun. He built a company behind the ideals of DIY gun-making, and now he's come back with another device: the "Ghost Gunner," a CNC mill designed to create the lower receiver of an AR-15 rifle. "That simple chunk of metal has become the epicenter of a gun control firestorm. A lower receiver is the body of the gun that connects its stock, barrel, magazine and other parts. As such, it's also the rifle's most regulated element. Mill your own lower receiver at home, however, and you can order the rest of the parts from online gun shops, creating a semi-automatic weapon with no serial number, obtained with no background check, no waiting period or other regulatory hurdles. Some gun control advocates call it a "ghost gun." Selling that untraceable gun body is illegal, but no law prevents you from making one." Wilson's goal is still to render government gun regulation useless, even as debate rages on banning this kind of manufacturing.
Hardware Hacking

Arducorder, Next Open Source Science Tricorder-like Device, Nears Completion 56

upontheturtlesback writes: The Arducorder Mini, an Arduino-compatible pocket-sized handheld sensing tool and the next in line of open source science tricorder-like devices designed by Dr. Peter Jansen, is nearing completion. Where the previous models have included about a dozen sensors spanning atmospheric, electromagnetic, and spatial readings, an exciting video of the new prototype shows this model includes sensors for spectroscopy, low-resolution thermal imaging, and radiation sensing. The development is open with the project build logs and most recent source schematics, board layouts, and firmware available on github. This project is an entry in the Hack a Day Prize for a trip to space.
Build

Video Joey Hudy: From High School Kid to Celebrity Maker to Intel Intern (Video) 32

Timothy Lord met Joey Hudy at an Intel Dev Forum. Joey is possibly the youngest intern Intel has ever hired, but he's made a big splash in the 'Maker world', so having him around is probably worth it for the PR value alone. Joey is obviously pretty bright -- he's been called one of the 10 smartest kids in the world -- but let's face it: he's had a lot of luck to help him along. Not many high school kids get invited to White House science fairs and demonstrate their air cannons to the president. (Alternate Video Link)
Microsoft

Marines Put Microsoft Kinect To Work For 3D Mapping 37

colinneagle points out this article about how the Marines are using a Microsoft Kinect to build maps. A military contractor has come up with something that has the U.S. Marine Corps interested. The Augmented Reality Sand Table is currently being developed by the Army Research Laboratory and was on display at the Modern Day Marine Expo that recently took place on Marine Corps Base Quantico in Virginia. The set-up is simple: a table-sized sandbox is rigged with a Microsoft Kinect video game motion sensor and an off-the-shelf projector. Using existing software, the sensor detects features in the sand and projects a realistic topographical map that corresponds to the layout, which can change in real time as observers move the sand around in the box. The setup can also project maps from Google Earth or other mapping and GPS systems, enabling units to visualize the exact terrain they'll be covering for exercises or operations. Eventually, they hope to add visual cues to help troops shape the sandbox to match the topography of a specified map. Eventually, the designers of the sandbox hope to involve remote bases or even international partners in conducting joint training and operations exercises. Future possibilities include large-scale models that could project over a gymnasium floor for a battalion briefing, and a smartphone version that could use a pocket-sized projector to turn any patch of dirt into an operational 3-D map.
Classic Games (Games)

From the Maker of Arduboy: Tetris On a Bracelet 15

timothy writes: Kevin Bates showed off his tiny ("credit card sized") homebrewed game-playing rig at OSCON this summer. Not content with merely wallet sized, he's now squeezed enough display — three of them, lacking a curved display to wrap around the wrist — input sensors, and processing power (Atmega 328p) to play Tetris on a tiny, multi-segmented bracelet (video). Sure, there's been Tetris on watches before, but from large-budget companies, not — at least not that I've ever seen — from hackers. Bates' post gives some more technical details, too.
United States

NSF Awards $10 Million To Protect America's Processors 48

aarondubrow writes "The National Science Foundation and the Semiconductor Research Corporation announced nine research awards to 10 universities totaling nearly $4 million under a joint program focused on secure, trustworthy, assured and resilient semiconductors and systems. The awards support the development of new strategies, methods and tools at the circuit, architecture and system levels, to decrease the likelihood of unintended behavior or access; increase resistance and resilience to tampering; and improve the ability to provide authentication throughout the supply chain and in the field. "The processes and tools used to design and manufacture semiconductors ensure that the resulting product does what it is supposed to do. However, a key question that must also be addressed is whether the product does anything else, such as behaving in ways that are unintended or malicious," said Keith Marzullo, division director of NSF's Computer and Network Systems Division.
Biotech

CPU's Heat Output to Amplify DNA Could Make Drastically Cheaper Tests 27

MTorrice (2611475) writes "Researchers have harnessed that heat from a computer CPU to run the polymerase chain reaction (PCR) to amplify DNA in a blood sample. The team developed software that cycles the temperature of the CPU to drive PCR's three distinct steps.The method allowed them to detect miniscule amounts of DNA from a pathogenic parasite that causes Chagas disease. They hope their technique will lead to low-cost diagnostic tests in developing countries." (Always good to put waste heat to a practical purpose.)
Hardware Hacking

Update: Raspberry Pi-Compatible Development Board Cancelled 165

An anonymous reader writes "Anyone who might have been interested in the miniature Raspberry Pi compatible board mentioned here a month ago should know the board has been cancelled due to problems sourcing the Broadcom SoC. Given the less than welcoming response from the rpi community to the board's release, there is speculation as to why Hardkernel is having trouble buying the chip.
AT&T

Ask Slashdot: What To Do About Repeated Internet Overbilling? 355

An anonymous reader writes "AT&T has been overbilling my account based on overcounting DSL internet usage (they charge in 50 gigabyte units after the first 150). I have been using a Buffalo NFinity Airstation as a managed switch to count all traffic. As you may know, this device runs firmware based on dd-wrt and has hidden telnet functionality, so I am able to load a script to count traffic directly onto the device. I have an auto-scraper that collects the data and saves it on my computer's hard disk every two minutes while the computer is running. While it is not running, the 2 minute counters accumulate in RAM on the device. Power problems are not normally an issue here; and even when they are I can tell it has happened. The upshot of all this is I can measure the exact amount of download bandwidth and a guaranteed overestimate of upload bandwidth in bytes reliably. I have tested this by transferring known amounts of data and can account for every byte counted, including ethernet frame headers. AT&T's billing reporting reports usage by day only, lags two days, and uses some time basis other than midnight. It is also reading in my testing a fairly consistent 14% higher whenever the basis doesn't disturb the test by using too much bandwidth too close to midnight.

AT&T has already refused to attempt to fix the billing meter, and asserts they have tested it and found it correct. Yet they refuse to provide a realtime readout of the counter that would make independent testing trivial. I've been through the agencies (CPUC, FCC, and Weights & Measures) and can't find one that is interested, AT&T will not provide any means for reasonable independent testing of the meter. It is my understanding that if there is a meter and its calibration cannot be checked, there is a violation of the law, yet I can't find an agency that can even accept such a claim (I'm not getting "your claim is meritless", but "we don't handle that"). If indeed they are not overbilling, my claim of no way to verify the meter still stands. My options are running thin here. So that my account can be identified by someone who recognizes the case: 7a6c74964fafd56c61e06abf6c820845cbcd4fc0 (bit commitment).
Science

How the Ancient Egyptians (Should Have) Built the Pyramids 202

KentuckyFC writes The Great Pyramid of Giza in Egypt is constructed from 2.4 million limestone blocks, most about 2.5 tonnes but some weighing in at up to 80 tonnes, mostly sourced from local limestone quarries. That raises a famous question. How did the ancient Egyptians move these huge blocks into place? There is no shortage of theories but now a team of physicists has come up with another that is remarkably simple--convert the square cross section of the blocks into dodecadrons making them easy to roll. The team has tested the idea on a 30 kg scaled block the shape of a square prism. They modified the square cross-section by strapping three wooden rods to each long face, creating a dodecahedral profile. Finally, they attached a rope to the top of the block and measured the force necessary to set it rolling. The team say a full-sized block could be modified with poles the size of ships masts and that a work crew of around 50 men could move a block with a mass of 2.5 tonnes at the speed of 0.5 metres per second. The result suggests that this kind of block modification is a serious contender for the method the Egyptians actually used to construct the pyramids, say the researchers.
Hardware Hacking

Microsoft Research Brings Kinect-Style Depth Perception to Ordinary Cameras 31

mrspoonsi (2955715) writes "Microsoft has been working on ways to make any regular 2D camera capture depth, meaning it could do some of the same things a Kinect does. As you can see in the video below the team managed to pull this off and we might see this tech all around in the near future. What's really impressive is that this works with many types of cameras. The research team used a smartphone as well as a regular webcam and both managed to achieve some impressive results, the cameras have to be slightly modified but that's only to permit more IR light to hit the sensor." The video is impressive, but note that so are several of the other projects that Microsoft has created for this year's SIGGRAPH, in particular one that makes first-person sports-cam footage more watchable.
Books

Interviews: Ask Tim O'Reilly About a Life Steeped In Technology 39

Today's interview guest is literally a household name: If you look at the shelves in nearly any programmer's house, developer shop or hackerspace, you'll probably see a stretch of books from O'Reilly Media (or O'Reilly & Associates, depending on how old the books are). Tim O'Reilly started out publishing a few technical manuals in the late '70s, branching from there into well-received technical reference and instructional books, notably ones covering open source languages and operating systems (how many people learned to install and run a new OS from Matt Walsh's Running Linux?), but neither Tim O'Reilly nor the company has gotten stuck in one place for long. As a publisher, he was early to make electronic editions available, in step with the increasing capabilities of electronic readers. Make Magazine (later spun off as part of Maker Media, which also produces Maker Faires around the world) started as an O'Reilly project; the company's conferences like OSCON, Fluent, and this year's Solid are just as much a manifestation of O'Reilly's proclivity for spreading knowledge as the books are, and those are only part of the picture, being joined with seminars, video presentations, and more. Tim O'Reilly is often hailed as a futurist and an activist (he was an early proponent of 3-D printing and hardware hacking, and a loud voice for patent reform) and he's got his eye on trends from global (how the Internet functions) to more personal -- like ways that physical goods can be produced, customized, and networked. So please go ahead and ask O'Reilly about what it's been like to be a publisher of paper books in an ever-more electronic world, as well as a visionary in the world of DIY and fabrication, or anything else on your mind. As usual, ask as many questions as you'd like, but please, one per post.
Transportation

Fooling a Mercedes Into Autonomous Driving With a Soda Can 163

New submitter Petrut Malaescu writes: Last year Mercedes introduced an intelligent Lane Assist system to its S-class, which is cataloged as a Level 1 "Function-specific Automation" system. In other words, hands and feet must always be on the controls. But a clever driver discovered that all it takes to keep the car in Lane Assist mode is a soda can taped to the steering wheel. It's enough to trigger the steering wheel sensor that's supposed to detect the driver's hands. Obviously, it's not a good idea to try this on a busy highway.
Hardware Hacking

Grad Student Rigs Cheap Alternative To $1,000 Air Purifiers In Smoggy China 182

An anonymous reader writes "University of Virginia grad student Thomas Talhelm was living in Beijing on a Fulbright Scholarship during the winter of 2012-13, when air pollution was so bad scientists likened it to a nuclear winter. Those who could afford it were resorting to an expensive solution: air filters costing up to $1,000. Talhem built his own on the cheap, getting comparable particulate count results, and has started a company that both markets the product to middle class Chinese and shows others how to DIY."
Hardware Hacking

Raspberry Pi-Compatible Development Board Released 47

kodiaktau writes: Hardkernel has released a new Raspberry Pi-compatible development board based on the Samsung Exynos SoC. The board is smaller than a typical Pi, keeping basic HDMI, USB and CSI interfaces. It also has a 26-pin expansion board with more GPIO available, though it lacks an Ethernet jack. Initial prices as estimated around $30. The article makes the interesting point that this and other devices are marketed as "Raspberry Pi-compatible." The Raspberry Pi Foundation may run into name retention issues (similar to the ones Arduino had) as related hardware piggybacks on its success.
Security

Ask Slashdot: Open Hardware/Software-Based Security Token? 113

Qbertino (265505) writes I've been musing about a security setup to allow my coworkers/users access to files from the outside. I want security to be a little safer than pure key- or password-based SSH access, and some super-expensive RSA Token setup is out of question. I've been wondering whether there are any feasible and working FOSS and open hardware-based security token generator projects out there. It'd be best with ready-made server-side scripts/daemons. Perhaps something Arduino or Raspberry Pi based? Has anybody tried something like this? What are your experiences? What do you use? How would you attempt an open hardware FOSS solution to this problem?
Classic Games (Games)

Raspberry Pi Gameboy 60

An anonymous reader writes: An enterprising hacker took on a project to rebuild a broken Gameboy using emulation software, a Raspberry Pi, and a few other easily-obtainable parts. The result: success! The hacker has posted a detailed walkthrough explaining all of the challenges and how they were solved. "Using a Dremel, I cut out a most of the battery compartment as well as some posts that on the case for the LCD that would no longer be needed. Doing so, the Pi sits flush with the back of the DMG case. ... The screen was the first challenge. The screen runs off 12V out of the box which wouldn't work with the USB battery pack. The USB battery pack is rated at 5V, 1000mAH so the goal was go modify the screen to allow it to run at 5V. ... I finally got it to work by removing the power converter chip as well as soldering a jumper between the + power in and the resister on the top right."
Hardware Hacking

SRI/Cambridge Opens CHERI Secure Processor Design 59

An anonymous reader writes with some exciting news from the world of processor design: Robert Watson at Cambridge (author of Capsicum) has written a blog post on SRI/Cambridge's recent open sourcing of the hardware and software for the DARPA-sponsored CHERI processor — including laser cutting directions for an FPGA-based tablet! Described in their paper The CHERI Capability Model: Reducing Risk in an age of RISC, CHERI is a 64-bit RISC processor able to boot and run FreeBSD and open-source applications, but has a Clang/LLVM-managed fine-grained, capability-based memory protection model within each UNIX process. Drawing on ideas from Capsicum, they also support fine-grained in-process sandboxing using capabilities. The conference talk was presented on a CHERI tablet running CheriBSD, with a video of the talk by student Jonathan Woodruff (slides).

Although based on the 64-bit MIPS ISA, the authors suggest that it would also be usable with other RISC ISAs such as RISC-V and ARMv8. The paper compares the approach with several other research approaches and Intel's forthcoming Memory Protection eXtensions (MPX) with favorable performance and stronger protection properties.
The processor "source code" (written in Bluespec Verilog) is available under a variant of the Apache license (modified for application to hardware). Update: 07/16 20:53 GMT by U L : If you have any questions about the project, regular Slashdot contributor TheRaven64 is one of the authors of the paper, and is answering questions.

Slashdot Top Deals