Join artbyphysicistkitty tomorrow for the start of a weekly virtual class:
Introduction to Quantum Computing
I’m starting a virtual class on Hackaday’s Zoom channel every Sunday:
- 20:30 CET
- 14:30 US EDT
- 11:30 US PDT
We will discuss a new topic for 30 mins every week. The topic will be based on my comics of the week.
As I’ve been teaching our employees at Microsoft, I’ve built up a series of systematic materials from basic concepts to algorithms to hardware systems, and a tutorial on Q# (Q-sharp) – a domain-specific programming language used for expressing quantum algorithms. Typically we took a few months to go through all the basic concepts. Every class was followed by a few Q# exercises. But it is do-able for a 2-hour workshop, such as the one at Hackaday Supercon.
On November 15, 2019, I gave a workshop on a hands-on introduction to Quantum Computing at Supercon. Here are the slides for everyone. It might felt like a lot to people who encountered the concepts for the first time. But if they go back to the slides now, they’ll be able to recall and digest at their own pace. The workshop was also on high demand. We didn’t have enough space for more people. So anyone who missed it can take a look at the slides which hopefully can give them directions to study further.
Please feel free to post any questions and discussions in this project page. And any mistakes to correct in the slides. I’ll try to answer them here. Enjoy!
Join us on Wednesday, March 25 at noon Pacific for the Side-Channel Attacks Hack Chat with Samy Kamkar!
In the world of computer security, the good news is that a lot of vendors are finally taking security seriously now, with the result that direct attacks are harder to pull off. The bad news is that in a lot of cases, they’re still leaving the side-door wide open. Side-channel attacks come in all sorts of flavors, but they all have something in common: they leak information about the state of a system through an unexpected vector. From monitoring the sounds that the keyboard makes as you type to watching the minute vibrations of a potato chip bag in response to a nearby conversation, side-channel attacks take advantage of these leaks to exfiltrate information.
Side-channel exploits can be the bread and butter of black hat hackers, but understanding them can be useful to those of us who are more interested in protecting systems, or perhaps to inform our reverse engineering efforts. Samy Kamkar knows quite a bit more than a thing or two about side-channel attacks, so much so that he gave a great talk at the 2019 Hackaday Superconference on just that topic. He’ll be dropping by the Hack Chat to “extend and enhance” that talk, and to answer your questions about side-channel exploits, and discuss the reverse engineering potential they offer. Join us and learn more about this fascinating world, where the complexity of systems leads to unintended consequences that could come back to bite you, or perhaps even help you.
Our Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, March 25 at 12:00 PM Pacific time. If time zones have got you down, we have a handy time zone converter.
Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about
via Side-Channel Attacks Hack Chat with Samy Kamkar — Hackaday
From the Hackaday newsletter:
It’s a time of great stress and uncertainty. We are grateful for all of you who have contributed to the global effort so far. Let’s stick together so we stay healthy and hang out in the real life on the other side of all of this.
With that in mind, we’ve started a calendar of events and classes. If you’d like to teach a class, host a show and tell, or help to organize our climate change summit, respond directly to this email and we’ll help you get set up.
Upcoming: Show and tell, dance party, DIY Strandbeest Q&A, Quantum computing classes. If you have something set up on your own channel you’d like us to add, let us know!
Many of you want to help: with 3D printers at home and manufacturing expertise, this community is in a position to help out those on the front lines.
There are so many Covid-related projects around the web it’s difficult to know where best to put your efforts. We’ve started a doc (right now, today!) that aims to list all the slack channels, Discords, Hackaday.io projects in the world to help you connect.
So many of the really important jobs are the ones that can’t be done remotely, we salute you medical staff, sanitation workers, delivery folks, and all the many others keeping our world running.
With love, ~Hackaday
Having found success in different areas, it’s a pleasure to hear from Erika Earl, Paul Beech, and Spencer Owen during a panel discussion at the 2019 Hackaday Superconference. Led by Tindie’s Jasmine Brackett, the panel covers some of the background needed to develop a product and get it into the hands of your customers.
Erika’s origin story begins with an interest in electronics during her teenage years that led to work in recording studios. It seems nobody on staff there was interested in repairing anything. Every company needs a hacker to make sure everything continues to work and she decided to take on the role.
From there Erika found her way into the world of manufacturing and has never looked back. You may remember hearing some of her experiences in her 2016 Hackaday Supercon talk on turning your manufacturing mistakes in a learning experience. During this panel she recounts one particularly painful experience when over-torque on a six-layer PCB damaged traces and led to extensive manual rework; always include a torque-spec!
via Three Tales of Making It in Electronics Design and Manufacturing — Hackaday
The idea of InspectAR is to use augmented reality to help work with and debug electronics. It’s a powerful suite of tools that enable the live overlay of graphics on a video feed of a circuit board, enabling the user to quickly and effectively trace signals, identify components, and get an idea of what’s what. Usable with a smartphone or a webcam, the aim is to improve collaboration and communication between engineers by giving everyone a tool that can easily show them what’s going on, without requiring everyone involved to run a fully-fledged and expensive electronics design package.
The Supercon talk served to demonstrate some of the capabilities of InspectAR with an Arduino Uno. With a few clicks, different pins and signals can be highlighted on the board as Mihir twirls it between his fingers. Using ground as an example, Mihir first highlights the entire signal. This looks a little messy, with the large ground plane making it difficult to see exactly what’s going on. Using an example of needing a point to attach to for an oscilloscope probe, [Mihir] instead switches to pad-only mode, clearly revealing places where the user can find the signal on bare pads on the PCB. This kind of attention to detail shows the strong usability ethos behind the development of InspectAR, and we can already imagine finding it invaluable when working with unfamiliar boards. There’s also the possibility to highlight different components and display metadata — which should make finding assembly errors a cinch. It could also be useful for quickly bringing up datasheets on relevant chips where necessary.
via Debugging PCBs with Augmented Reality — Hackaday
Some people like to do things the hard way. Maybe they drive a manual transmission, or they bust out the wire wrap tool instead of a soldering iron, or they code in assembly to stay close to the machine. Doing things the hard way certainly has its merits, and we are not here to argue about that. Scott Shawcroft — project lead for CircuitPython — on the other hand, makes a great case for doing things the easy way in his talk at the 2019 Hackaday Superconference.
In fact, he proved how easy it is right off the bat. There he stood at the podium, presenting in front of a room full of people, poised at an unfamiliar laptop with only the stock text editor. Yet with a single keystroke and a file save operation, Scott was able make the LEDs on his Adafruit Edge Badge — one of the other pieces of hackable hardware in the Supercon swag bag — go from off to battery-draining bright.
via Scott Shawcroft Is Programming Game Boys With CircuitPython — Hackaday