Military Surplus Repurposed for High Energy Physics

Performing high-energy physics experiments can get very expensive, a fact that attracts debate on public funding for scientific research. But the reality is that scientists often work very hard to stretch their funding as far as they can. This is why we need informative and entertaining stories like Gizmodo’s How Physicists Recycled WWII Ships and Artillery to Unlock the Mysteries of the Universe.

The military have specific demands on components for their equipment. Hackers are well aware MIL-SPEC parts typically command higher prices. That quality is useful beyond their military service, which lead to how CERN obtained large quantities …read more

Continue reading Military Surplus Repurposed for High Energy Physics

Small Jet Engine Model From Students Who Think Big

We love to highlight great engineering student projects at Hackaday. We also love environment-sensing microcontrollers, 3D printing, and jet engines. The X-Plorer 1 by JetX Engineering checks all the boxes.

This engineering student exercise took its members through the development process of a jet engine. Starting from a set of requirements to meet, they designed their engine and analyzed it in software before embarking on physical model assembly. An engine monitoring system was developed in parallel and integrated into the model. These embedded sensors gave performance feedback, and armed with data the team iterated though ideas to improve their design. …read more

Continue reading Small Jet Engine Model From Students Who Think Big

Design a Microcontroller With Security In Mind

There are many parts to building a secure networked device, and the entire industry is still learning how to do it right. Resources are especially constrained for low-cost microcontroller devices. Would it be easier to build more secure devices if microcontrollers had security hardware built-in? That is the investigation of Project Sopris by Microsoft Research.

The researchers customized the MediaTek MT7687, a chip roughly comparable to the hacker darling ESP32. The most significant addition was a security subsystem. It performs tasks notoriously difficult to do correctly in software, such as random number generation and security key storage. It forms the …read more

Continue reading Design a Microcontroller With Security In Mind

ADSL Robustness Verified By Running Over Wet String

A core part of the hacker mentality is the desire to test limits: trying out ideas to see if something interesting, informative, and/or entertaining comes out of it. Some employees of Andrews & Arnold (a UK network provider) applied this mentality towards connecting their ADSL test equipment to some unlikely materials. The verdict of experiment: yes, ADSL works over wet string.

ADSL itself is something of an ingenious hack, carrying data over decades-old telephone wires designed only for voice. ADSL accomplished this in part through robust error correction measures keeping the bytes flowing through lines that were not originally designed …read more

Continue reading ADSL Robustness Verified By Running Over Wet String