First blog post

This is your very first post. Click the Edit link to modify or delete it, or start a new post. If you like, use this post to tell readers why you started this blog and what you plan to do with it.



c lang

​when they are executed. These values are called command line arguments and many times they are important for your program especially when you want to control your program from outside instead of hard coding those values inside the code. The command line arguments are handled using main() function arguments where argc refers to the number of arguments passed, and argv[] is a pointer array which points to each argument passed to the program. Following is a simple example which checks if there is any argument supplied from the command line and take action accordingly: 

CSS Animation

  1. <!DOCTYPE html>
  2. <html>
  3. <head>
  4. <style>
  5. #myDIV {
  6. width: 300px;
  7. height: 200px;
  8. background: pink;
  9. -webkit-animation: mymove 6s infinite; /* Chrome, Safari, Opera */
  10. animation: mymove 6s infinite;
  11. }
  12. /* Chrome, Safari, Opera */
  13. @-webkit-keyframes mymove {
  14. from {background-color: yellow;}
  15. to {background-color: blue;}
  16. }
  17. /* Standard syntax */
  18. @keyframes mymove {
  19. from {background-color: yellow;}
  20. to {background-color: blue;}
  21. }
  22. </style>
  23. </head>
  24. <body>
  25. <p>Gradually change the background-color from red, to blue:<p>
  26. id="myDIV">
  27. <p>The background-position property is <em>animatable</em> in CSS.</p>
  28. <p><strong>Note:</strong> CSS Animations do not work in Internet Explorer 9 and earlier versions.</p>
  29. </body>
  30. </html>


Gradually change the background-color from red, to blue:

The background-position property isanimatable in CSS.

Note: CSS Animations do not work in Internet Explorer 9 and earlier versions.

By Ahalawat

Hackcyber hart

Buy a ticket to the 2017 Hackaday Superconference
View this email in your browser

Early Bird Tickets on sale now!

Hackaday is thrilled to announce Superconference 2017 is happening on November 11th and 12th at the Supplyframe DesignLab, in the heart of Pasadena, CA. Secure your spot to this groundbreaking event dedicated to hardware creation. Today we release 96 early bird tickets for the low price of $128 for a limited time. Early bird tickets will only last one week or until it sells out, so don’t wait.

Call for proposals are now open. If you’re interested in giving a technical talk or hosting a workshop at the Hackaday Superconference, please apply! As a speaker or workshop leader, you get a complimentary ticket to the conference and a chance to attend speakers-only gatherings. Apply today!


Haven G a l a x y . c o m 

Home Automation: Evolution of a Term Read article now »

By ahalawat
A lot of the projects we see here at Hackaday are amazing feats of engineering or fantastic hacks that come from a truly deep understanding of the system at hand. We learn a lot from them, but when a hack is obviously awesome, that doesn’t come as a surprise.
That just makes it more delightful when we learn something new from an unexpected source. For instance, we learned a ton about UV fluorescence from this article on UV photography — the good stuff is in the white paper. Think you know a lot about sundials? Reading through the comments on this cheeky sundial watch build and following links brought us to the fantastically named “equation of time”.
Finally, in the process of a nice bit of investigative reverse engineering, Hackaday reader [RoGeorge] made a quick loop antenna by looping the ground wire to the tip of his scope probe. We measured ours, and it seems to resonate at around 450 MHz, so it’ll probably be very effective for picking up any radio frequency in the VHF-UHF at close range. That’s a very handy trick that’s been literally sitting in front of our face.
Point is, we celebrate the blockbuster hacks and breaking news all the time — see the list down below, they’re all winners — but sometimes it’s the little things. There are also hidden gems all over the place. Thanks, Hackaday community!
Conferences, Conferences
Most of the Hackaday crew is away at DEF CON this weekend, and we’ll be pushing out our coverage just around the time you’re reading this newsletter. But we’re also knee-deep in planning and preparations for our own Superconference in November, and the call for proposed talks is open.
Last year’s Supercon was, well, super, so you’ll want to be there this year if you can. Just in case you needed any more convincing, we just posted a video interview with [Samy Kamkar] last year that [Mike] made after [Samy]’s talk. Don’t settle for video this year, ask your own questions in person — get your tickets or your talk proposals in now!
Hack Chat: Crowd Supply
This week in the Hack Chat, we’ve got [Josh Lifton], CEO of Crowd Supply. They’re a crowdfunding platform that’s more focused on getting things built than on just raising money — they require a working prototype of a gizmo before they’ll list it. [Josh] is an expert in getting small projects marketed, funded, and shipped. If you’re interested in selling your DIY hardware project to the world, come join the talk!

Avoiding The Engineer-Saviour Trap Read article now »

By Ahalawat
Last weekend was DEF CON, which means the Hackaday crew who were there are catching up on sleep at night, and busy writing up their notes by day.
[Mark Williams] and [Rob Stanley] showed us how to hack a gaming mouse that has a ridiculously overpowered processor inside, and [Michael Ossman] demonstrated some great tricks for detecting spread-spectrum signals in the ether that surrounds us. [Haoqi Shan] pulled off a very simple relay attack against an NFC payment card that you could probably recreate with stuff you’ve already got at home. And then on Sunday, Mike held a big brunch and everyone brought along their hacks.
But not all hacky-hacking goes down at DEF CON. Last week, Broadpwn exposed a vulnerability in most modern cellphones that targets the WiFi chipset. Security updates should have already been rolled out for most phones, so there shouldn’t be much damage, and it’s nice to see how these exploits work from the inside out.
If you’d like to get your hardware-hack on, start out with this great video on logic analyzers and then open up a device and have a peek. Something old, like a Game Boy, is ideal.
Vintage Computer Festival West
And speaking of old hardware, this weekend is the Vintage Computer Festival West. It’s held at the Computer History Museum in Mountain View, CA, which houses a phenomenal collection of old iron.
Hack Chat
This week we have [Jonathan Hirschman] in the Hack Chat. He founded PCB:NG, a turnkey electronics manufacturing startup. If you’re interested in anything that’s involved in getting medium-sized batches of electronics designed and built, swing on by with your questions.



Hack Your Memory Read article now »

By Ahalawat
This week, we’ve got conferences big and small on the brain. Whether it’s the informal eclipse-viewing get-together or the massive mega-con that was DEF CON or will be Hackaday’s own Superconference 2017, getting hackers together is in the air over here.
DEF CON is now two weeks in the past, and the last (and juiciest?) hardware stories are still being told. First up is [Mike]’s great roundup of all the hardware badges of DEF CON. Brian casts his discriminating eye over the design of the Queercon badge, certainly one of the blinkiest of the con. And because we’re hardware makers and not just writers, [Brian] even had a war story to tell about the production of his badge, namely how he built a pogo-pin programming rig and got a few hundred badges loaded and off to the con. The comments on that one are a great source of inspiration for other pogo-pin tricks.
And then last weekend was the Vintage Computer Festival West. We sent [Joshua Vasquez] to smell the musty old bits, and take photos of retro bytes. Check out his full report.
And then there’s the eclipse. Hackaday crew in the US are still gearing up in anticipation. This week, we featured a hack on how to best shoot photos of the eclipse with a phone. What do you do with those photos? Send them in to Google, which is making a movie out of everyone’s images for science.
Finally, two hacks that were just too cool to not mention. The first is trivial: an excavator powered by syringes and stepper motors that demonstrates both ingenuity and simple hydraulic principles. The second is potentially a life-saver: a field-expedient device to save mothers at risk of bleeding to death from a pregnancy. Both hacks involve minimal parts, but rather get the job done through clever thinking and attention to the nuances. Kudos.
UK Unconference Announced
Monday morning, we announced an Unconference in London, and by Monday afternoon we were booked up. Right now, we have more people on the waiting list than we have seats at all! As Roy Schneider says in Jaws when they first get a glimpse of the monster, “we’re gonna need a bigger boat.” We’re working on getting more space, and we might even have a surprise up our sleeves. Stay tuned!
Superconference CFP
While seats at the London Unconference are as scarce as hen’s teeth, and require a transatlantic flight for those of you in the USA anyway, you can get into the Superconference in November for mere money. But there’s also a back door: presenting! The Call for Proposals ends on Monday the 14th, so you’ve got the weekend to whip up a good abstract for your talk. Speakers get access to speaker events, and since we record and publish the talks, you’ve got a chance at your fifteen minutes of Hackaday fame. If you’ve got something to say, now’s the time to say it!
Hack Chat
And wrapping up the conference theme, are you one of the types who goes to a conference only to miss half of the talks because you got obsessed with the crypto challenge? Ever wondered what it takes to make a puzzle that’s both solvable in a weekend and hard enough that it’ll keep hundreds or thousands of brilliant minds occupied? Join us for the Hack Chat where a member of DEF CON’s Crypto and Privacy village will attempt to answer your most puzzling questions.

Hack a city 


Conventional Current Vs. Electron Current Read article now »


By Ahalawat

We’ve always held that the last minute is the sweetest minute. Although every minute you spend on a project contains exactly sixty seconds, most other minutes pass by unheralded. A week before the deadline, you may have been happy to spend a minute or two mindlessly surfing the web, but the last minute is all about focus, purpose, and getting it done. The last minute is transcendental. Relish it.

Hackaday Prize

It’s close to the last minute for the 2017 Hackaday Prize Wheels, Wings, and Walkers as well as the Best Product categories, which close on Monday July 24th. If you’ve got a robot in the closet, document it up right now and you’ve got a chance at $1,000.


DEF CON is next week, and we’ve been featuring the best in indie badges that folks are dreaming up, pouring immense quantities of sweat and tears into producing, and bringing along with them to amaze and astound. This is Badgelife, and it’s the perfect manifestation of the hacker spirit.

And if you don’t know how this fits in with the “last minute” theme, you probably haven’t taken on a project like this before.

Check out the beautiful Sympetrum, a recreation of the Drummer’s Badge from The Diamond Age. In addition to being eye-candy, there’s a deep back story, and they all interact over IR. Not bad for a relatively small BOM cost!

On the opposite end of the spectrum, there’s the over-the-top quadcopter-as-badge that [b1un7] is putting together. The artwork is nothing short of fantastic, and if these things fly (tee-hee), it’ll be a great hack.

Finally, [Garrett] came out with an ESP8266-based badge that takes advantage of the WiFi chip’s extra functionality.. Besides blinking, this badge functions as an AP scanner, packet monitor, and deauth-packet detector. It’s a hacker badge that’s a useful hacker tool.

Hack Chat

[AnnMarie Thomas] is in the Hack Chat this week, and she is going to tell us a thing or two about making electronics for education. If you’ve ever wanted to share the joy of hacking with others, you’ve probably thought about making a small bot, a kit, or even just an educational toy. [AnnMarie] is an expert in the intersection of technology, education, and converting ideas into products. Join us in the discussion!

C #

We programmers are a demanding bunch, always looking for ways to improve the performance, efficiency, and portability of our programs. We also demand much from the tools we use, especially when it comes to programming languages. There are many programming languages, but only a few are great. A great programming language must be powerful, yet flexible. Its syntax must be terse, yet clear. It must facilitate the creation of correct code while not getting in our way. It must support state-of-the-art features, but not trendy dead ends. Finally, a great programming language must have one more, almost intangible quality: It must feel right when we use it. C# is such a language.Created by Microsoft to support its .NET Framework, C# builds on a rich programming heritage. Its chief architect was long-time programming guru Anders Hejlsberg. C# is directly descended from two of the world’s most successful computer languages: C and C++. From C, it derives its syntax, many of its keywords, and most of its operators. It builds upon and improves the object model defined by C++. C# is also closely related to another very successful language: Java.Sharing a common ancestry, but differing in many important ways, C# and Java are more like cousins. Both support distributed programming and both use intermediate code to achieve safety and portability, but the details differ. They both also provide a significant amount of runtime error checking, security, and managed execution, but again, the details differ. However, unlike Java, C# also gives you access to pointers—a feature supported by C++. Thus, C# combines the raw power of C++ with the type safety of Java. Furthermore, the trade-offs between power and safety are carefully balanced and are nearly transparent.Throughout the history of computing, programming languages have evolved to accommodate changes in the computing environment, advances in computer language theory, and new ways of thinking about and approaching the job of programming. C# is no exception. In the ongoing process of refinement, adaptation, and innovation, C# has demonstrated its ability to respond rapidly to the changing needs of the programmer. This fact is testified to by the many new features added to C# since its initial 1.0 release in 2000. Consider the following.The first major revision of C# was version 2.0. It added several features that made it easier for programmers to write more resilient, reliable, and nimble code. Without question, the most important 2.0 addition was generics. Through the use of generics, it became possible to create type-safe, reusable code in C#. Thus, the addition of generics fundamentally expanded the power and scope of the language.The second major revision was version 3.0. It is not an exaggeration to say that 3.0 added features that redefined the very core of C#, raising the bar in computer language development in the process. Of its many innovative features, two stand out: LINQ and lambda expressions. LINQ, which stands for Language Integrated Query, enables you to create database-style queries by using elements of the C# language. Lambda expressions implement a functional-style syntax that uses the => lambda operator, and lambda expressions are frequently used in LINQ expressions.

By Ahalawat.