August 1, 2012 By: Jimmy McGee
At this years Google I/O 2012, Google released the ADK 2012. XDA Elite Recognized Developer and XDA Developer TV Producer AdamOutler has one. In a past video, AdamOutler showed you the Accessory Development Kit and Arduino, showing some neat tricks that you can accomplish with these tools. With this second version, AdamOutler shows off some more cool developments with the Google Accessory Development Kit.
In this video AdamOutler unboxes his new Google ADK device. He then talks about all the pieces, parts, sensors, and design. The Accessory Development Kit 2012 features an independent main processing board, an alarm clock shield containing 64 RGB LEDs, a Type 2 read/write NFC tag that launches the ADK app, and a spattering of sensors including a colorimeter, thermometer, barometer, hygrometer, accelerometer, magnetometer, twelve capacitive buttons, and a capacitive slider.
Recently Google announced its new tablet and Google I/O 2012. Milliseconds after it was announced XDA Elite Recognized Developer AdamOutler had his ordered. When he received it, he did what you would expect from our resident mobile deconstructionist.
In this episode of Unboxing the XDA Way, Adam unboxes the Nexus 7 all the way down to the circuit board and talks about the build while doing so. Adam covers both the good and the bad design characteristics. Finally, like any XDA Forum Member would do, he unlocks the device and installs ClockworkMod recovery. This is a must watch video!
Recently Portal Administrator Will Verduzco showed us how to root and install Ice Cream Sandwich on the dual-core Meizu MX. Meizu recently sent us their new quad-core version—the similarly named Meizu MX M032—and it sports the same Exynos 4412 chip found in the Samsung Galaxy S III. This time, we gave the device to our resident mobile deconstructionist.
In this episode of Unboxing the XDA Way, XDA Elite Recognized Developer AdamOutler unboxes the Meizu MX all the way down to the circuit board and makes it beg for mercy. Adam runs into a End User License Agreement talking about rooting the device, which he promptly ignores. Adam finds that the exploits that we used last time to gain root have been patched. In the vein of his video on rooting, Adam continues and finds a UART exploit to root the Meizu MX.
Here on XDA, we try and squeeze out every ounce of goodness from our device. Sometimes that requires that we have full access to the device. While we can respect device makers who protect the system kernel from inexperienced users, we here at XDA are not inexperienced users. We give our selves root access because we don’t see why we should be shut off from a section of our phone—a phone that we own. That would be like the municipal government putting up a fence in the part of your yard that has underground sewer lines. It’s my yard; I should be able to access every part of it.
Device manufactures that prevent root access would be similar to Microsoft not allowing you to have an Administrator account on your Windows PC. It’s like Ubuntu blocking you from having a root account on your PC. It’s like Apple only allowing you to install approved apps from their app store on your iPhone—What? Oh right, they do that.
Many people call the Samsung Galaxy Nexus phone the ideal phone. When XDA management had an extra Galaxy Nexus phone laying around, they couldn’t think of anything better to do with it than send it to our resident mobile deconstructionist.
In this episode of Unboxing the XDA Way, XDA Elite Recognized Developer AdamOutler unboxes his new Galaxy Nexus all the way down to the circuit board. He shows off his favorite tool of destruction and discusses the hardware’s points of interest. Adam talks a bit about CASUAL and plans for hacking an UnBrickable Mod from the device when it is powered off.
In this week’s XDA Unboxing, XDA Elite Recognized Developer AdamOutler takes a look at the Motorola Droid RAZR. This week’s video deviates a bit from his usual unboxings by talking about hardware design and why user-serviceable design is important.
In the video, Adam also urges other manufacturers to not follow Motorola’s lead in order to avoid creating devices that are disposable, cannot be modified, and cannot be serviced. Thankfully for Droid RAZR owners, Adam is running a beta test of the CASUAL (Cross-platform ADB Scripting, Unified Android Loader) framework on the RAZR.
So pause what you’re doing and check out the video below! This video, and the rest of our XDA TV clips can be found on our YouTube channel.
March 29, 2012 By: Will Verduzco
By now, we’ve all become familiar with the term XDA Unboxing. Thanks to fantastic work from XDA Recognized Developer AdamOutler, we have been made privy to deepest internals of various modern devices.
After an unfortunate affair involving your standard, everyday washing machine and the lovely HTC Titan, XDA Member Advocate Admin egzthunder1 found himself with a water damaged device. Turning pain into pleasure, egzthunder1 then created a guide on how to dismantle the device.
Well, due to an unfortunate incident between my Titan and a washing machine, I decided to take it apart to try and clean it (and to remove a constantly on vibrating motor). Since there is no guide for this device anywhere (quick google search yielded nothing), I decided to create one myself. So, if you are ready to roll, lets take this sucker apart…
While certainly not for the faint of heart, the guide walks users through the steps of opening the device and reaching its core components. Additionally, the guide highlights many of the dangers and pitfalls faced in the process, such as watching out for small and easy-to-tear ribbon cables. Tools for the job are a Torx T6 screwdriver and a pair of tweezers. However, a heat gun and case opening tool are also required if you intend on separating the screen from the plastic frame.
If you’re looking to dismantle your devices or simply have a morbid curiosity regarding the internals of a modern flagship device, you’ll find what you need in the original thread.
Open source hardware and software is the holy grail for developers—a virtual white canvas for those looking to create custom firmware. Join us today for another XDA TV session, in which XDA Recognized Developer AdamOutler unboxes the Auraslate Lifepad 1026 the XDA way.
Disassembling the 10″ tablet to its naked internals, Adam shows us how the Lifepad 1026 ticks. He also gives us a few tips about setting up a UART port on the tablet, and then goes on to show us the kind of debugging one can accomplish with such access. So stop what you’re doing, and go watch the video now!
While taking apart the software of our mobile devices is nothing new on our forums, taking apart their hardware is. Join us for another XDA TV session, in which XDA Recognized Developer AdamOutler unboxes the Nook Tablet the XDA way.
Undressing the tablet all the way to its bare internals, Adam gives us an inside glimpse at how the device really works. After taking the Nook apart, Adam also gives us a quick look at setting up UART on the tablet and tells us what it means for developers to have access to the full processor data sheets.
Adam then goes on to talk a bit about the importance of encorperation of open information practices by hardware manufacturers, and how lack thereof causes problems for developers. Click on for the XDA-style unboxing! READ ON »
In this video, AdamOutler unboxes an AT&T Samsung Galaxy S II all the way down the the motherboard. He then shows the process of locating hardware modifications required to correct an issue on the board which prevent firmware flashing in the event of a damaged bootloader. Click on for the (real) unboxing! READ ON »
In this video XDA Recognized Developer AdamOutler unboxes his new Asus Transformer that he won as a result of XDA’s Favorite Tablet of 2011 contest. But Adam doesn’t stop at the unboxing, he goes all the way down to the motherboard to show you what’s really inside the Transformer. Click on for the revealing unboxing! READ ON »