I wanted pure alliteration for the title, but four in a row was pretty good. More importantly, I got excited about this new revision in functional temporary tattoos which used silver nanoparticles and liquid metal. I was surprised that readers were not nearly as enthused as me and one commenter said that it was just a sticker. I mean, it is a sticker in the same way that an antenna is just a piece of metal.
Good technology does not have to be flashy, and sometimes the best technology is the stuff you do not realize is working. Vodafone in the UK is testing cell antennas that go under manhole covers rather than elevated antennas. They can be more frequently placed without being seen, and any piping system with manhole covers already has tubes under it.
This one caught my eye because the finished product looks a retro-future hacker toy. The PCB for the keyboard is minimal and only uses IMT devices so it is easy to hack and the parts are inexpensive. In that regard, it is suitable for a beginner, and all the labels make it a hacker-friendly project.
Modukey's third module was programmed. This has been a slow process and probably full of errors since every single key has to be programmed eight times. The first four times are for when the button is pressed, and the last four times are for when the button is released.
To help with the accuracy, the pictoral keymap was converted to spreadsheets and all the commands were spelled out so that the commands could easily replace the existing code with the new keystrokes. This allowed me to copy over all the code and compare it to similar code and mistake could jump out because it would look dissimilar and ensure that when a macro was used to make the changes, it would have fewer mistakes.
The rest of the summary posts have been arranged by date.
First time here?
Completed projects from year 1
Completed projects from year 2
Completed projects from year 3
Completed projects from year 4
Completed projects from year 5
Disclaimer for http://24hourengineer.blogspot.com and 24HourEngineer.com
This disclaimer must be intact and whole. This disclaimer must be included if a project is distributed.
All information on this blog, or linked by this blog, is not to be taken as advice or solicitation. Anyone attempting to replicate, in whole or in part, is responsible for the outcome and procedure. Any loss of functionality, money, property or similar, is the responsibility of those involved in the replication.
All digital communication regarding the email address 24hourengineer@gmail.com becomes the intellectual property of Brian McEvoy. Any information contained within these messages may be distributed or retained at the discretion of Brian McEvoy. Any email sent to this address, or any email account owned by Brian McEvoy, cannot be used to claim property or assets.
Comments to the blog may be utilized or erased at the discretion of the owner. No one posting may claim property or assets based on their post.
This blog, including pictures and text, is copyright to Brian McEvoy.
Tech Tattoos Trace Two Dimensions
Good technology does not have to be flashy, and sometimes the best technology is the stuff you do not realize is working. Vodafone in the UK is testing cell antennas that go under manhole covers rather than elevated antennas. They can be more frequently placed without being seen, and any piping system with manhole covers already has tubes under it.
Manhole Covers Hide Antennas
This one caught my eye because the finished product looks a retro-future hacker toy. The PCB for the keyboard is minimal and only uses IMT devices so it is easy to hack and the parts are inexpensive. In that regard, it is suitable for a beginner, and all the labels make it a hacker-friendly project.
Portable Pi Teensy Thumboard
Modukey's third module was programmed. This has been a slow process and probably full of errors since every single key has to be programmed eight times. The first four times are for when the button is pressed, and the last four times are for when the button is released.
Some of the code being updated
To help with the accuracy, the pictoral keymap was converted to spreadsheets and all the commands were spelled out so that the commands could easily replace the existing code with the new keystrokes. This allowed me to copy over all the code and compare it to similar code and mistake could jump out because it would look dissimilar and ensure that when a macro was used to make the changes, it would have fewer mistakes.
ModuKey spreadsheet of the keymaps
The rest of the summary posts have been arranged by date.
First time here?
Completed projects from year 1
Completed projects from year 2
Completed projects from year 3
Completed projects from year 4
Completed projects from year 5
Disclaimer for http://24hourengineer.blogspot.com and 24HourEngineer.com
This disclaimer must be intact and whole. This disclaimer must be included if a project is distributed.
All information on this blog, or linked by this blog, is not to be taken as advice or solicitation. Anyone attempting to replicate, in whole or in part, is responsible for the outcome and procedure. Any loss of functionality, money, property or similar, is the responsibility of those involved in the replication.
All digital communication regarding the email address 24hourengineer@gmail.com becomes the intellectual property of Brian McEvoy. Any information contained within these messages may be distributed or retained at the discretion of Brian McEvoy. Any email sent to this address, or any email account owned by Brian McEvoy, cannot be used to claim property or assets.
Comments to the blog may be utilized or erased at the discretion of the owner. No one posting may claim property or assets based on their post.
This blog, including pictures and text, is copyright to Brian McEvoy.
I love hacks....there seems to be a way to find a different way to do anything these days!
ReplyDeleteReally good hacks, Its very informative article, Thanks
ReplyDelete