April 3rd, 2019
[Note: This list was originally compiled by me then posted on /r/forgedinfireshow, where I made significant changes based on comments from other members of the subreddit.]
Regular Forged in Fire viewers are all too familiar with statements like these:
“I’ve never used a welder before.”
“This is the longest blade I’ve ever forged. I’m going to have to make a bigger quench tank.”
“I’ve never used a coal forge in my life.”
The Forged in Fire producers enjoy throwing unusual situations and obscure techniques at their smiths. And learning new techniques during the competition is a sure path to failure. The following list is based on actual mistakes made by contestants:
Practice the following techniques beforehand:
- Canister Damascus welding
- Using a coal forge with a manual air pump
- Forge welding, especially with (1) different metals and (2) a thick piece of cable
Mistakes that have actually happened:
- Give the Liquid Paper time to dry before adding anything else to the canister
- You need -both- the red and the blue epoxy containers
- They supply 5-minute epoxy and 24-hour epoxy—choose wisely
- Some extremely well-made blades have been eliminated because they didn’t meet parameters
- If the judges tell you something should be fixed, don’t convince yourself there’s not enough time to fix it
- Never quench in water unless you have a very specific reason for doing so
- For larger blades, the judges take balance and weight very seriously
- When forge welding, first clean the surfaces that will be welded together
- Be extremely careful bending hardened/quenched steel, and never hammer it
- Pro tip: it’s much easier to drill/drift holes before you quench
- Pro tip: quench a test piece of steel and then break it to see what the metal looks like after quenching.
- A great blade with a bad handle will almost always lose
- Functionality and quality of construction are far, far more important for a handle than how good it looks
- The judges put significant emphasis on how comfortable a handle is and how well it fits their hands
- Do not get fancy with your handle in an effort to impress the judges—this almost always does more harm than good
- Knife handle shapes that don’t prevent the user’s hand from sliding onto the blade -must- include a guard—failing to do so is an automatic disqualification
- Nothing in the handle should have -any- possibility of digging into or cutting the judge’s hand—a bleeding judge significantly increases your chances of being eliminated
- Round or heavily rounded knife/sword handles look nice but fail to perform
- The burn-through method of creating knife handle holes is risky and should be avoided unless you’re hard-pressed for time and have no other option
- The tests apply significant stress to the handle—epoxy alone will not hold a handle together.
- Pro tip: note the judges’ hand size when you shake hands with them at the beginning of the competition, and craft your handle accordingly
Know the following skills:
- How to use a magnet to check for proper heat treat temperature (also, bring a magnet with you)
- How to use a MIG welder
- How to use a spark test to identify an unknown metal
- How to use a belt grinder like the ones on the show, and especially how to change the belt
- How to use a gas forge like the ones on the show, and especially how to adjust the temperature
- How to correct a post-quench warp without breaking the blade (hint: hammering or bending in a vise rarely works)
- How to construct a friction folder knife
Regarding your home forge:
- Before you leave, triple-check your equipment to ensure it’s in perfect working order
- Equipment failures happen—be prepared
- Some of the weapons you have to make are unusually long or wide—you may need a bigger forge and/or quenching tank, so obtain the materials for that beforehand
- Stick to the basics; don’t try to be fancy and impress the judges
- Stick to what you know; this is not the time to be experimenting
- Stay calm—getting rushed affects your decision-making and is the best way to be eliminated
- Many, many contestants have been eliminated because of poor time management
- When things are going badly, it’s often better to just abandon what you’ve done and start over
- No matter how bad you’re doing, there’s always the chance that someone else is doing worse
November 9th, 2018
Things I learned about bitcoin mining today:
- All bitcoin transactions are recorded via a system called Blockchain. The “mining” process you hear about is something you must do in order to add new blockchain entries (blocks) to record the transactions. This cannot be done by the casual user—adding an entry is very, very computationally intensive. So there are dedicated bitcoin miners who do it for you.
- Successful miners are rewarded with a number of bitcoins in addition to any transaction fees they charge. Currently, however, the bitcoin reward is so lucrative that transaction fees are typically less than a dollar.
- About every 4 years the number of bitcoins you get from mining a block is cut in half. Right now it’s 12.5. It’s been at that level for about 2 years and is expected to drop to 6.25 in the 2020-2021 timeframe.
- Eventually the system will get to the point where mining bitcoins won’t provide enough of them to be cost-effective, and the miners will get their profit solely from charging transaction fees.
- The maximum number of bitcoins that will ever exist is about 21 million. Currently about 17.5 million have been mined (~ 85% of the total).
- The difficulty level of the bitcoin mining calculations is adjusted approximately every two weeks to account for changes to the amount of processing power applied to the system. The goal is to make it average 10 minutes per block. So the system adjusts for advances in hardware or increases in the number of computers used, and the problem is just as time-consuming today as it was 5 year ago, and will be the same 5 years from now.
In December 2017, a miner using poorly-written custom mining software had a situation where his software neglected to tell the blockchain system to give him the reward. He mined the block, inserted it into the blockchain, and got nothing in return. At the time, the 12.5 bitcoin he lost was worth about $200,000. These bitcoins are lost forever, as effectively as if they’d been physically destroyed.
- Note: For the technically inclined, the mining computations just require you to generate a hash code that, when interpreted as a number, is less than a specified value. So the hash must have a bunch of leading zeroes. Normally you will have to run the hash algorithm many times before you get a value that meets the criteria. The adjustment that occurs is to simply change the target number.
November 6th, 2018
I’ve recently been uploading videos to YouTube. Usually I’m waiting to send the link, so I upload the video then immediately view it on YouTube to ensure it’s good. Often I find that the video quality has been significantly downgraded, sometimes to the point where it’s unwatchable.
When researching this I found a large number of potential causes and solutions, but the actual answer is quite simple:
- Just wait for 30-60 minutes.
When YouTube first publishes a video it does everything it can to quickly make the video viewable and, as such, does the least amount of processing possible and starts with the format that can be watched on any device. So the initial format is the lowest resolution and bitrate. After publication, however, YouTube continues to perform processing in the background and subsequently adds higher-quality versions of the video. If you wait for a bit and then refresh the page, you’ll get a much better version of the video as the default.
June 13th, 2016
There have been great hopes that a carbon nanotube cable could be used to create a space elevator, providing easy access to orbit. According to recent research, however, that may not be possible for the foreseeable future. Even atomic-level defects in the nanotube will greatly reduce its strength, and current mass manufacturing techniques are quite error-prone.
November 1st, 2015
It’s now possible to set up a closed social network, a la Facebook, for a limited group of users such as a company. Sort of like how some companies have a private internet (called an intranet), they can have a private Facebook (called an enterprise social network). You get the benefits of collaboration, networking, custom business apps, etc. It’s sort of like what Lotus Notes did back in the day.
Enterprise social netowrking is not hypothetical—the linked article discusses how the Royal Bank of Scotland is deploying Facebook at Work for 100,000 employees. And most notably, it’s an opportunity for Facebook to make money selling a product, versus selling advertisements.
October 30th, 2015
My primary hard drive died, and I decided to replace it with an SSD to help speed up my system. When I tried to install Windows 7 on the new drive, however, I kept getting this error message: “Setup was unable to create a new system partition or locate an existing system partition. See the Setup log files for more information.” (<RANT>And just WHERE would these log files BE?!?</RANT>) Most of the “solutions” on the web dealt with correctly configuring the disk partition. I had used the Windows installer to set up the partition, but just to make sure, I booted into Linux and set the boot flag for the partition. Didn’t work. So I used DiskPart from the Windows recovery console. Didn’t work either.
Finally I came across an article that mentioned BIOS settings, and that did the trick. The SATA Mode (that’s what it’s called in my setup program but it varies) was set to IDE and needed to be AHCI. After making that change the install went smoothly. The article also said that you should not use Intel® Smart Response Technology, which is another BIOS option.
October 30th, 2015
Since Windows 10 was released with its free upgrade offer, I’ve been telling people to delay upgrading until after the first major update—which will happen sometime in the next week or so. It’s pretty much a no-brainer to take advantage of the free upgrade, and most of the major issues should be ironed out after this update, so I say “go for it.”
September 22nd, 2015
In a move that is long overdue, Microsoft has added a “printer” to Windows 10 that will generate a PDF file of what you’re printing. It will show up in your printer list, just like the XPS Document Writer has for all those years, but this will be much more useful.
October 10th, 2014
This one is absolutely mind-numbing in the amount of stupidity shown. A man burglarized a house, used the victim’s computer to log in to Facebook, and didn’t log out. The homeowner posted his phone number on the burglar’s Facebook page, in the hopes that someone who knew the burglar would contact him. Instead, the burglar himself texted the homeowner and arranged to meet so he could pick up some clothing he’d left in the house. He actually showed up, so the homeowner called the police and the burglar was arrested.
(via Kim Komando)
October 7th, 2014
Automated combat systems have long held a place in science fiction. Warfare turns into battles between machines, some directly controlled by human beings and some completely autonomous. We’ve all heard about the airplane drones that are seeing significant use in recent conflicts, but here’s something quite different. The US Navy is testing autonomous swarm boats. They’re small, unmanned boats that sense the environment and work together to achieve their objective. That may be to protect a particular ship, attack a target, etc. It’s quite interesting. Note, however, that the Navy doesn’t allow the swarm boats to utilize their weapons unless there is a human being on board. The linked video explains in more detail.
(via Kim Komando)
October 1st, 2014
Microsoft has announced Windows 10. (What happened to Windows 9 you may ask — who knows?) Details are sparse, but they did say that it will run on all devices a la Windows 8, but will configure itself for the device type. So PC users will see a Windows 7 interface while phone users will get a start screen with tiles. Also, there will be a single app store with apps that run on all platforms and devices. Sounds like they learned from Windows 8.
May 29th, 2014
Recently I’ve been hearing about government support for remote kill switches, say in automobiles for law enforcement use, or in cell phones for when they’re stolen. And my first thought is always that some hacker is going to find a way to trigger the switch and cause all kinds of problems.
Apparently the hackers had the same thought. The linked article covers a situation where stolen iCloud credentials were used to lock out iPhones via the “Find My iPhone” anti-theft feature.
(via Kim Komando)