Building a Portable Solar-Powered Spot Welder: Nearly Practical!

Last time, we covered storing and charging a 3000 Farad supercapacitor to build a solar-powered, portable spot welder. Since then, I’ve made some improvements to the charging circuit and gotten it running. To recap, the charger uses a DC-DC buck converter to convert a range of DC voltages down to 2.6 V. It can supply a maximum of 5 A though, and the supercapacitor will draw more than that if allowed to.

After some failed attempts, I had solved that by passing the buck converter output through a salvaged power MOSFET. A spare NodeMCU module provided pulse width modulated output …read more

Continue reading Building a Portable Solar-Powered Spot Welder: Nearly Practical!

Building a Portable Solar Powered Spot Welder: Charging Supercapacitors

Before Lunar New Year, I had ordered two 3000 F, 2.7 V supercapacitors from China for about $4 each. I don’t actually remember why, but they arrived (unexpectedly) just before the holiday.

Supercapacitors (often called ultracapacitors) fill a niche somewhere between rechargeable lithium cells and ordinary capacitors. Ordinary capacitors have a low energy density, but a high power density: they can store and release energy very quickly. Lithium cells store a lot of energy, but charge and discharge at a comparatively low rate. By weight, supercapacitors store on the order of ten times less energy than lithium cells, and can …read more

Continue reading Building a Portable Solar Powered Spot Welder: Charging Supercapacitors

Finding Your Motorbike Using Wi-Fi

An urban planner once told me that every car requires at least four times as much space as they actually occupy. Each needs a spot on the roads, and three available parking spaces: one at home, one at work, and one to shop. Motorcycles are much smaller, but they still spend most of their time parked.

Motorcycles are the primary means of transport in Southeast Asia, and learning to safely drive one is an essential part of adapting to life here. Assuming it’s not pouring rain and you’re not flooded past your ankles, it’s actually quite a pleasant experience… until …read more

Continue reading Finding Your Motorbike Using Wi-Fi

Lunar New Year is Coming, Shipping Times May Vary

With one holiday period coming to a close, another looms on the horizon: Lunar New Year. That means three things in my mind: nice weather, a beautiful holiday with great food, and that I had better get all my orders for electronic parts for the next few months out immediately. In fact, I should have done it last month but I’m a bit closer to the source than many of you are.

In any case, Lunar New Year affects our ability to order neat gadgets at a time of year when some of us have received a little money to …read more

Continue reading Lunar New Year is Coming, Shipping Times May Vary

Hunting Rogue Access Points with the ESP8266

Cantennas outperform every consumer-grade Wi-Fi antenna I’ve had the bad luck of purchasing. Cantenna is a mashup of ‘can’ and ‘antenna’ creating the nickname for a directional waveguide antenna built from re-purposed steel cans. For anyone who has yet to build one, it makes an excellent afternoon project. Here are some build instructions and technical details. I went beyond that, and ended up catching a rogue WiFi access point in the process.

When I needed to extend the range of some ESP8266-based sensors, cantennas were right at the top of my list of things to try. It was easy enough …read more

Continue reading Hunting Rogue Access Points with the ESP8266

Using Gmail with OAUTH2 in Linux and on an ESP8266

One of the tasks I dread is configuring a web server to send email correctly via Gmail. The simplest way of sending emails is SMTP, and there are a number of scripts out there that provide a simple method to send mail that way with a minimum of configuration. There’s even PHP mail(), although it’s less than reliable.

Out of the box, Gmail requires OAUTH2 for authentication and to share user data, which has the major advantage of not requiring that you store your username and password in the application that requires access to your account. While they have …read more

Continue reading Using Gmail with OAUTH2 in Linux and on an ESP8266

Statistics and Hacking: A Stout Little Distribution

Previously, we discussed how to apply the most basic hypothesis test: the z-test. It requires a relatively large sample size, and might be appreciated less by hackers searching for truth on a tight budget of time and money.

As an alternative, we briefly mentioned the t-test. The basic procedure still applies: form hypotheses, sample data, check your assumptions, and perform the test. This time though, we’ll run the test with real data from IoT sensors, and programmatically rather than by hand.

The most important difference between the z-test and the t-test is that the t-test uses a different probability distribution. …read more

Continue reading Statistics and Hacking: A Stout Little Distribution

Statistics and Hacking: An Introduction to Hypothesis Testing

In the early 20th century, Guinness breweries in Dublin had a policy of hiring the best graduates from Oxford and Cambridge to improve their industrial processes. At the time, it was considered a trade secret that they were using statistical methods to improve their process and product.

One problem they were having was that the z-test (a commonly used test at the time) required large sample sizes, and sufficient data was often unavailable. By studying the properties of small sample sizes, William Sealy Gosset developed a statistical test that required fewer samples to produce a reasonable result. As the …read more

Continue reading Statistics and Hacking: An Introduction to Hypothesis Testing

Statistics and Hacking: An Introduction to Hypothesis Testing

In the early 20th century, Guinness breweries in Dublin had a policy of hiring the best graduates from Oxford and Cambridge to improve their industrial processes. At the time, it was considered a trade secret that they were using statistical methods to improve their process and product.

One problem they were having was that the z-test (a commonly used test at the time) required large sample sizes, and sufficient data was often unavailable. By studying the properties of small sample sizes, William Sealy Gosset developed a statistical test that required fewer samples to produce a reasonable result. As the …read more

Continue reading Statistics and Hacking: An Introduction to Hypothesis Testing

Hackers vs. Mold: Building a Humidistat Fan

Having a mold problem in your home is terrible, especially if you have an allergy to it. It can be toxic, aggravate asthma, and damage your possessions. But let’s be honest, before you even get to those listed issues, having mold where you live feels disgusting.

You can clean it with the regular use of unpleasant chemicals like bleach, although only with limited effectiveness. So I was not particularly happy to discover mold growing on the kitchen wall, and decided to do science at it. Happily, I managed to fix my mold problems with a little bit of hacker ingenuity. …read more

Continue reading Hackers vs. Mold: Building a Humidistat Fan