Preface |
|
xvii | |
|
Part 1 Adventures in Manufacturing |
|
|
1 | (114) |
|
|
7 | (36) |
|
The Ultimate Electronic Component Flea Market |
|
|
8 | (6) |
|
The Next Technological Revolution |
|
|
14 | (2) |
|
Touring Factories with Chumby |
|
|
16 | (26) |
|
|
17 | (1) |
|
|
18 | (2) |
|
|
20 | (3) |
|
Building Technology Without Using It |
|
|
23 | (1) |
|
|
24 | (2) |
|
The Need for Craftspeople |
|
|
26 | (3) |
|
Automation for Electronics Assembly |
|
|
29 | (2) |
|
Precision, Injection Molding, and Patience |
|
|
31 | (3) |
|
|
34 | (8) |
|
|
42 | (1) |
|
2 Inside three very different factories |
|
|
43 | (30) |
|
|
44 | (13) |
|
Starting with a Sheet of Copper |
|
|
46 | (3) |
|
Applying the PCB Pattern to the Copper |
|
|
49 | (2) |
|
|
51 | (2) |
|
Applying Soldermask and Silkscreen |
|
|
53 | (1) |
|
Testing and Finishing the Boards |
|
|
54 | (3) |
|
Where USB Memory Sticks Are Born |
|
|
57 | (7) |
|
The Beginning of a USB Stick |
|
|
57 | (2) |
|
Hand-Placing Chips on a PCB |
|
|
59 | (2) |
|
Bonding the Chips to the PCB |
|
|
61 | (1) |
|
A Close Look at the USB Stick Boards |
|
|
61 | (3) |
|
|
64 | (9) |
|
A Fully Automated Process |
|
|
67 | (1) |
|
|
68 | (2) |
|
The Irony of Scarcity and Demand |
|
|
70 | (3) |
|
|
73 | (42) |
|
How to Make a Bill of Materials |
|
|
74 | (10) |
|
A Simple BOM for a Bicycle Safety Light |
|
|
74 | (2) |
|
|
76 | (1) |
|
Tolerance, Composition, and Voltage Specification |
|
|
76 | (1) |
|
Electronic Component Form Factor |
|
|
77 | (1) |
|
|
78 | (1) |
|
The Bicycle Safety Light BOM Revisited |
|
|
79 | (3) |
|
Planning for and Coping with Change |
|
|
82 | (2) |
|
Process Optimization: Design for Manufacturing |
|
|
84 | (16) |
|
|
85 | (1) |
|
|
86 | (2) |
|
Following DFM Helps Your Bottom Line |
|
|
88 | (3) |
|
The Product Behind Your Product |
|
|
91 | (6) |
|
|
97 | (3) |
|
Finding Balance in Industrial Design |
|
|
100 | (7) |
|
The chumby One's Trim and Finish |
|
|
101 | (3) |
|
The Arduino Uno's Silkscreen Art |
|
|
104 | (1) |
|
|
105 | (2) |
|
Picking (and Maintaining) a Partner |
|
|
107 | (6) |
|
Tips for Forming a Relationship with a Factory |
|
|
107 | (1) |
|
|
108 | (3) |
|
|
111 | (2) |
|
|
113 | (2) |
|
Part 2 Thinking Differently: Intellectual Property in China |
|
|
115 | (60) |
|
|
119 | (24) |
|
I Broke My Phone's Screen, and It Was Awesome |
|
|
120 | (1) |
|
Shanzhai as Entrepreneurs |
|
|
121 | (5) |
|
|
122 | (1) |
|
|
123 | (1) |
|
Community-Enforced IP Rules |
|
|
124 | (2) |
|
|
126 | (15) |
|
|
128 | (3) |
|
|
131 | (3) |
|
From Gongkai to Open Source |
|
|
134 | (1) |
|
Engineers Have Rights, Too |
|
|
135 | (6) |
|
|
141 | (2) |
|
|
143 | (32) |
|
Well-Executed Counterfeit Chips |
|
|
143 | (6) |
|
Counterfeit Chips in US Military Hardware |
|
|
149 | (7) |
|
Types of Counterfeit Parts |
|
|
150 | (3) |
|
Fakes and US Military Designs |
|
|
153 | (1) |
|
|
154 | (2) |
|
|
156 | (12) |
|
|
157 | (1) |
|
|
158 | (1) |
|
Were the MicroSD Cards Authentic? |
|
|
159 | (1) |
|
Further Forensic Investigation |
|
|
160 | (2) |
|
|
162 | (4) |
|
|
166 | (2) |
|
|
168 | (6) |
|
|
168 | (2) |
|
|
170 | (2) |
|
|
172 | (2) |
|
|
174 | (1) |
|
Part 3 What Open Hardware Means to Me |
|
|
175 | (100) |
|
|
181 | (34) |
|
A Hacker-Friendly Platform |
|
|
182 | (2) |
|
|
184 | (5) |
|
|
186 | (1) |
|
|
187 | (2) |
|
The End of Chumby, New Adventures |
|
|
189 | (16) |
|
Why the Best Days of Open Hardware Are Yet to Come |
|
|
205 | (9) |
|
Where We Came From: Open to Closed |
|
|
206 | (2) |
|
Where We Are: "Sit and Wait" vs. "Innovate" |
|
|
208 | (2) |
|
Where We're Going: Heirloom Laptops |
|
|
210 | (1) |
|
An Opportunity for Open Hardware |
|
|
211 | (3) |
|
|
214 | (1) |
|
7 Novena: Building my Own Laptop |
|
|
215 | (36) |
|
Not a Laptop for the Faint of Heart |
|
|
217 | (2) |
|
Designing the Early Novena |
|
|
219 | (8) |
|
|
219 | (5) |
|
|
224 | (3) |
|
The Heirloom Laptop's Custom Wood Composite |
|
|
227 | (5) |
|
|
228 | (1) |
|
The Mechanical Engineering Details |
|
|
229 | (3) |
|
Changes to the Finished Product |
|
|
232 | (15) |
|
Case Construction and Injection-Molding Problems |
|
|
233 | (4) |
|
Changes to the Front Bezel |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (3) |
|
A Breakout Board for Beginners |
|
|
241 | (1) |
|
The Desktop Novena's Power Pass-Through Board |
|
|
242 | (1) |
|
Custom Battery Pack Problems |
|
|
243 | (1) |
|
|
244 | (2) |
|
|
246 | (1) |
|
|
247 | (2) |
|
|
249 | (2) |
|
8 Chibitronics: Creating Circuit Stickers |
|
|
251 | (24) |
|
|
257 | (7) |
|
|
259 | (1) |
|
|
260 | (1) |
|
Performing a Process Capability Test |
|
|
261 | (3) |
|
|
264 | (2) |
|
Why On-Time Delivery Is Important |
|
|
266 | (1) |
|
|
266 | (8) |
|
Not All Simple Requests Are Simple for Everyone |
|
|
267 | (1) |
|
|
268 | (1) |
|
If a Component Can Be Placed Incorrectly, It Will Be |
|
|
268 | (2) |
|
Some Concepts Don't Translate into Chinese Well |
|
|
270 | (1) |
|
Eliminate Single Points of Failure |
|
|
271 | (1) |
|
Some Last-Minute Changes Are Worth It |
|
|
271 | (1) |
|
Chinese New Year Impacts the Supply Chain |
|
|
272 | (1) |
|
Shipping Is Expensive and Difficult |
|
|
273 | (1) |
|
You're Not Out of the Woods Until You Ship |
|
|
274 | (1) |
|
|
274 | (1) |
|
Part 4 A Hacker's Perspective |
|
|
275 | (108) |
|
|
279 | (46) |
|
|
281 | (8) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
Erasing the Security Bits |
|
|
285 | (2) |
|
Protecting the Other Data |
|
|
287 | (2) |
|
|
289 | (9) |
|
|
290 | (3) |
|
Reverse Engineering the Card's Microcontroller |
|
|
293 | (5) |
|
Potential Security Issues |
|
|
298 | (1) |
|
|
298 | (1) |
|
Hacking HDCP-Secured Links to Allow Custom Overlays |
|
|
298 | (8) |
|
|
300 | (2) |
|
|
302 | (4) |
|
|
306 | (18) |
|
|
306 | (5) |
|
Reverse Engineering the Boot Structure |
|
|
311 | (4) |
|
|
315 | (2) |
|
|
317 | (4) |
|
|
321 | (1) |
|
|
321 | (2) |
|
|
323 | (1) |
|
|
324 | (1) |
|
10 Biology and Bioinformatics |
|
|
325 | (32) |
|
Comparing H1N1 to a Computer Virus |
|
|
327 | (8) |
|
|
328 | (2) |
|
Organisms Have Unique Access Ports |
|
|
330 | (1) |
|
|
331 | (2) |
|
|
333 | (2) |
|
|
335 | (1) |
|
Reverse Engineering Superbugs |
|
|
335 | (9) |
|
|
336 | (2) |
|
Reversing Tools for Biology |
|
|
338 | (2) |
|
Answering Biological Questions with UNIX Shell Scripts |
|
|
340 | (2) |
|
More Questions Than Answers |
|
|
342 | (2) |
|
Mythbusting Personalized Genomics |
|
|
344 | (2) |
|
Myth: Having Your Genome Read Is Like Hex-Dumping the ROM of Your Computer |
|
|
344 | (1) |
|
Myth: We Know Which Mutations Predict Disease |
|
|
345 | (1) |
|
Myth: The Reference Genome Is an Accurate Reference |
|
|
345 | (1) |
|
|
346 | (8) |
|
|
347 | (3) |
|
Determining Where to Cut a Gene |
|
|
350 | (1) |
|
Implications for Engineering Humans |
|
|
351 | (1) |
|
Hacking Evolution with Gene Drive |
|
|
352 | (2) |
|
|
354 | (3) |
|
|
357 | (26) |
|
Andrew "bunnie" Huang: Hardware Hacker (CSDN) |
|
|
357 | (15) |
|
About Open Hardware and the Maker Movement |
|
|
358 | (9) |
|
|
367 | (5) |
|
The Blueprint Talks to Andrew Huang |
|
|
372 | (11) |
Epilogue |
|
383 | (1) |
Index |
|
384 | |