ESP32-S2 Hack Chat with Adafruit on Hackaday

AdafruitESP32HackChatPosterV1_1-01

Join us on Wednesday, May 6 at noon Pacific for the ESP32-S2 Hack Chat with Limor “Ladyada” Fried and Scott Shawcroft!

When Espressif released the ESP8266 microcontroller back in 2014, nobody could have predicted how successful the chip was to become. While it was aimed squarely at the nascent IoT market and found its way into hundreds of consumer devices like smart light bulbs, hackers latched onto the chip and the development boards it begat with gusto, thanks to its powerful microcontroller, WiFi, and lots of GPIO.

The ESP8266 was not without its problems, though, and security was always one of them. The ESP32, released in 2016, addressed some of these concerns. The new chip added another CPU core, a co-processor, Bluetooth support, more GPIO, Ethernet, CAN, more and better ADCs, a pair of DACs, and a host of other features that made it the darling of the hacker world.

Now, after being announced in September of 2019, the ESP32-S2 is finally making it into hobbyist’s hands. On the face of it, the S2 seems less capable, with a single core and neither Bluetooth nor Ethernet. But with a much faster CPU, scads more GPIO, more ADCs, a RISC-V co-processor, native USB, and the promise of very low current draw, it could be that the ESP32-S2 proves to be even more popular with hobbyists as it becomes established.

To talk us through the new chip’s potential, Limor “Ladyada” Fried and Scott Shawcroft, both of Adafruit Industries, will join us on the Hack Chat. Come along and learn everything you need to know about the ESP32-S2, and how to put it to work for you.

join-hack-chatOur Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, May 6 at 12:00 PM Pacific time. If time zones have got you down, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about.

via ESP32-S2 Hack Chat with Adafruit — Hackaday

Quote

Retrofitting a Charmhigh CHM-T36VA Machine with OpenPnP

OpenPnP is a great open source framework for building a DIY SMT Pick&Place machine. But it does not stop there: It is possible to use OpenPnP with a commercial pick & place machine, for example the Charmhigh CHM-T36VA. This Chinese machine comes with its own controller software which works but is not that great. The good news is that it is possible to hack and retrofit the machine so it can run the much more powerful OpenPnP.

via Retrofitting a Charmhigh CHM-T36VA Machine with OpenPnP — MCU on Eclipse

Quote

Debugging Electronics: To Know Why It Didn’t Work, First Find What It Is Actually Doing

Congratulations, you have just finished assembling your electronics project. After checking for obvious problems you apply power and… it didn’t do what you wanted. They almost never work on the first try, and thus we step into the world of electronics debugging with Daniel Samarin as our guide at Hackaday Superconference 2019. The newly published talk video embedded below.

Beginners venturing just beyond blinking LEDs and premade kits would benefit the most from information here, but there are tidbits useful for more experienced veterans as well. The emphasis is on understanding what is actually happening inside the circuit, which explains the title of the talk: Debugging Electronics: You Can’t Handle the Ground Truth! So we can compare observed behavior against designed intent. Without an accurate understanding, any attempted fix is doomed to failure.

To be come really good at this, you need to embrace the tools that are often found on a well stocked electronics bench. Daniel dives into the tricks of the trade that transcend printf and blinking LED to form a plan to approach any debugging task.

via Debugging Electronics: To Know Why It Didn’t Work, First Find What It Is Actually Doing — Hackaday

 

Quote

Altium to KiCad converter

BeagleBone-Black-Altium-KiCad-e1586729430477

Around these parts we tend to be exponents of the KiCad lifestyle; what better way to design a PCBA than with free and open source tools that run anywhere? But there are still capabilities in commercial EDA packages that haven’t found their way into KiCad yet, so it may not always be the best tool for the job. Altium Designer is a popular non-libre option, but at up to tens of thousands of USD per seat it’s not always a good fit for users and businesses without a serious need.

It’s hard to find an exciting photo of a dialog box

What do you do as a KiCad user who encounters a design in Altium you’d like to work with? Well as of April 3rd 2020, [Thomas Pointhuber] has merged the beginnings of a native Altium importer into KiCad which looks to be slated for the 6.0 release. As [Thomas] himself points out in the patch submission, this is hardly the first time a 3rd party Altium importer has been published. His new work is a translation of the Perl plugin altium2kicad by [thesourcerer8]. And back in January another user left a comment with links to four other (non-KiCad) tools to handle Altium files.

If you’d like to try out this nifty new feature for yourself, CNX has a great walkthrough starting at building KiCad from source. As for documents to test against the classic BeagleBone Black sources seen above can be found at on GitHub. Head past the break to check out the very boring, but very exciting video of the importer at work, courtesy of [Thomas] himself. We can’t wait to give this a shot!

via Altium has its 2kicad Moment — Hackaday

Quote

Hackaday: PCB Bring-Up Hack Chat

Join us on Wednesday, April 15 at noon Pacific for the PCB Bring-Up Hack Chat with Mihir Shah and Liam Cadigan!

The printed circuit design process is pretty unique among manufacturing processes. Chances are pretty good that except for possibly a breadboard prototype, the circuit that sits before you after coming back from assembly has only ever existed in EDA software or perhaps a circuit simulator. Sure, it’s supposed to work, but will it?

You can — and should — do some power-off testing of new boards, but at some point you’re going to have to flip the switch and see what happens. The PCB bring-up process needs to be approached carefully, lest debugging any problems that crop up become more difficult than need be. Mihir and Liam from inspectAR will discuss the bring-up process in depth, offering tips and tricks to make things go as smoothly as possible, as well as demonstrating how the inspectAR platform can fit into that process, especially with teams that are distributed across remote sites. If your board releases the Magic Smoke, you’ll want to know if it’s your design or an assembly issue, and an organized bring-up plan can be a big help.

Note: Liam will be doing a simulcast web demo of inspectAR via Zoom. ​

via PCB Bring-Up Hack Chat — Hackaday

Quote

Three years of HardwareX: Where are they now?

After three years of online publications, HardwareX may have solidified itself as an academic journal for open-source hardware. We originally wrote about HardwareX back in 2016. At the time, HardwareX hadn’t even published its first issue and only begun soliciting manuscripts. Now after three years of publishing, six issues as of October 2019 (with the seventh scheduled for April 2020), and an impact factor of 4.33, it’s fair to say that Elsevier’s push into open-access publications is on a path to success.

To give you a bit of background, HardwareX aims to promote the reproducibility of scientific work by giving researchers an avenue to publish all the hardware and software hacks that often get buried in traditional manuscripts. The format of HardwareX articles is a bit different than most academic journals. HardwareX articles look more like project pages similar to Hackaday.io. (Maybe we inspired them a bit? Who knows.)

It’s a bold attempt on Elsevier’s part because although open-access is held as an ideal scenario for scientific work, such efforts often come under quite a bit of scrutiny in the academic community. Don’t ask us. We can’t relate.

Either way, we genuinely wish Elsevier all the best and will keep our eyes on HardwareX. Maybe some of our readers should consider publishing their projects in HardwareX.

via Three years of HardwareX: Where are they now? — Hackaday

Quote

Introducing The Hackaday Calendar Of Virtual Events

For many of us, the social distancing procedures being used to help control the spread of COVID-19 have been a challenge. We can’t go to our hackerspaces, major events have been postponed or canceled entirely, and even getting parts has become difficult due to the immense pressure currently being placed on retailers and delivery services.…

via Introducing The Hackaday Calendar Of Virtual Events — Hackaday

Quote

Hackaday: Side-Channel Attacks Hack Chat with Samy Kamkar

Join us on Wednesday, March 25 at noon Pacific for the Side-Channel Attacks Hack Chat with Samy Kamkar!

In the world of computer security, the good news is that a lot of vendors are finally taking security seriously now, with the result that direct attacks are harder to pull off. The bad news is that in a lot of cases, they’re still leaving the side-door wide open. Side-channel attacks come in all sorts of flavors, but they all have something in common: they leak information about the state of a system through an unexpected vector. From monitoring the sounds that the keyboard makes as you type to watching the minute vibrations of a potato chip bag in response to a nearby conversation, side-channel attacks take advantage of these leaks to exfiltrate information.

Side-channel exploits can be the bread and butter of black hat hackers, but understanding them can be useful to those of us who are more interested in protecting systems, or perhaps to inform our reverse engineering efforts. Samy Kamkar knows quite a bit more than a thing or two about side-channel attacks, so much so that he gave a great talk at the 2019 Hackaday Superconference on just that topic. He’ll be dropping by the Hack Chat to “extend and enhance” that talk, and to answer your questions about side-channel exploits, and discuss the reverse engineering potential they offer. Join us and learn more about this fascinating world, where the complexity of systems leads to unintended consequences that could come back to bite you, or perhaps even help you.

join-hack-chatOur Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, March 25 at 12:00 PM Pacific time. If time zones have got you down, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about

via Side-Channel Attacks Hack Chat with Samy Kamkar — Hackaday

Quote

Three Tales of Making It in Electronics Design and Manufacturing

Having found success in different areas, it’s a pleasure to hear from Erika Earl, Paul Beech, and Spencer Owen during a panel discussion at the 2019 Hackaday Superconference. Led by Tindie’s Jasmine Brackett, the panel covers some of the background needed to develop a product and get it into the hands of your customers.

Erika’s origin story begins with an interest in electronics during her teenage years that led to work in recording studios. It seems nobody on staff there was interested in repairing anything. Every company needs a hacker to make sure everything continues to work and she decided to take on the role.

From there Erika found her way into the world of manufacturing and has never looked back. You may remember hearing some of her experiences in her 2016 Hackaday Supercon talk on turning your manufacturing mistakes in a learning experience. During this panel she recounts one particularly painful experience when over-torque on a six-layer PCB damaged traces and led to extensive manual rework; always include a torque-spec!

via Three Tales of Making It in Electronics Design and Manufacturing — Hackaday

Quote