A friend of mine has been a software developer for most of the last five decades, and has worked with everything from 1960s ...
Regular Hackaday readers will no doubt be familiar with the work of Matthew Alt, AKA [wrongbaud]. His deep-dive blog posts ...
Cryptography is a funny thing. Supposedly, if you do the right kind of maths to a message, you can send it off to somebody ...
What hardware hacker doesn’t have a soft spot for transparent cases? While they may have fallen out of mainstream favor, they have an undeniable appeal to anyone with an interest in electronic or ...
While it might not be comprehensive, [Bret.dk] recently posted a retrospective titled “Every Single Board Computer I Tested in 2025.” The post covers 15 boards from 8 different ...
It’s hard to deny that label printers have become more accessible than ever, but an annoying aspect of many of these cheap units is that their only user interface is a proprietary smartphone ...
As pointed out by Tom’s Hardware, it’s been 26 years since the introduction of the gigahertz desktop CPU. AMD beat Intel to ...
The rapidly-improving speed and versatility of digital computers has mostly driven analogue computers out of use in modern ...
There’s a well-known movie trope in which a hacker takes control of the traffic lights in a city, causing general mayhem or ...
A long winter has a way of making a lot of us northerners a little bit squirrly. In [Build N Pulsejets]’s case, squirly ...
The various Raspberry Pi camera modules have become the default digital camera hacker’s tool, and have appeared in a huge number of designs over the past decade. They’re versatile and ...
With the RAM and storage crisis hitting personal computing very hard – along with new software increasingly suffering the effects of metastasizing ‘AI’ – more people than ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results