ePanorama.net
All about electronics and circuit design
Fifer optics power meter is an important tool for debugging fiber optics networks. I have earlier tested a cheap commercial fiber optic power meter a at Fiber optics power meter posting. Hardware hackers ares famous for building their own test equipment. The basic operation of optical power meter is quite simple: take a suitable detector, →
https://techcrunch.com/2017/09/14/nigel-stanford-automatica/ What happens when a mad scientist’s musicbots rebel against their own precision? You get “Automatica”, the latest video from Nigel Stanford →
https://www.space.com/38160-when-how-watch-cassini-saturn-dive.html Today (Sept. 15), NASA’s Cassini spacecraftwill dive into Saturn’s atmosphere and disintegrate. You can watch the action live right here on Space.com The $3.26 billion Cassini-Huygens mission — a joint effort of NASA, the European Space Agency and the Italian Space Agency — launched toward Saturn in 1997 and arrived at the system in 2004. “We’ll be →
https://interestingengineering.com/video/elon-musk-just-shared-this-explosive-spacex-blooper-reel-and-its-incredible “Lool, that’s not an ‘explosion,’ it’s just a rapid unscheduled disassembly.” Elon Musk just released the blooper reel to end all blooper reels. →
http://www.visualcapitalist.com/comparing-bitcoin-ethereum-cryptos/ Unless you’ve been hiding under a rock, you’re probably aware that we’re in the middle of a cryptocurrency explosion. In one year, the value of all currencies increased a staggering 1,466% – and newer coins like Ethereum have even joined Bitcoin in gaining some mainstream acceptance. A major problem still exists for the layman: it’s →
https://hackaday.com/2017/09/14/bluetooth-vulnerability-affects-all-major-os/ Turn off your Bluetooth! I checked that mine was turned off after reading this: Security researchers from Armis Labs recently published a whitepaper unveiling eight critical 0-day Bluetooth-related vulnerabilities, affecting Linux, Windows, Android and iOS operating systems. These vulnerabilities alone or combined can lead to privileged code execution on a target device. The only requirement is: →
As the popularity of IoT devices grow, it’s only natural that security holes in some of the systems will become apparent. IoT Devices May Be Susceptible to Replay Attacks with a Raspberry Pi and RTL-SDR Dongle andAttack Some Wireless Devices With A Raspberry Pi And An RTL-SDR articles tell that an easy way to make a →
http://www.edn.com/electronics-blogs/5g-waves/4458807/Five-technologies-for-building-5G?utm_content=buffer90279&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer 5G is widely considered a mobile technology that won’t be available until perhaps 2020 or 2021, and even then, not widely. Cisco predicts that by 2021, a 5G connection will generate 4.7 times more traffic than the average 4G connection. 5G will be a quantum leap from today’s LTE-Advanced networks. →
https://techcrunch.com/2017/09/12/apple-announces-the-iphone-8-and-iphone-8-plus/?ncid=rss&utm_source=tcfbpage&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=FaceBook&sr_share=facebook Apple just unveiled the iPhone 8 and iPhone 8 Plus at its press event. →
https://hackaday.com/2017/09/11/these-twenty-assistive-technologies-projects-won-1000-in-the-hackaday-prize/ This page introduces the winners of the Assistive Technologies projects. Take a look at many interesting open hardware projects. →