The Waldorf Iridium is a great synth — and it is also a sampler. This is a tutorial for creating a multi-sampled piano sound from the factory samples, and having a computer program do most of the work of allocating them.
OMG OMG I actually played that thing!
Looking at the analytics, I have noted that my reminiscence to/analysis of the Keytek CTS-2000 synth has been found by a number of people that surprises me, given that it is an article about a truly horrible, obscure late-80s hybrid synth in a rather niche blog. Given that, I would like to share some proof that I actually played that thing, and on stage, too. And though it is hard to date the old photographs, I would estimate that I held onto it for quite some time.
So I guess at least the CTS-2000’s keyboard was really decent.
I added another photo to the original article.
Upgrading those little LED reading lamps
Those rechargeable reading lamps are really nice, a pity they don’t last longer. But you can make them. It’s super simple – just add a second rechargeable battery.
These lamps are being sold by a couple of different Chinese manufacturers. Some have only one type of LED, some have two – for different lighting colours – and they all have a touch-sensitive top as power switch, charge via USB-C port, and are 40cm high.
And they seem to have one other thing in common: they have room for a second battery. At least the three different types I opened did.
It doesn’t get any easier: Order battery, solder connector, insert…
Some of them even have a second battery charger terminal, like the one I modified in the video. Others don’t; there you can just add the second battery in parallel or, if you are less adventurous concerning the charging circuitry, remove the first battery.
The battery type used is a standard single18650 Li-Ion cell; rechargeable, with 3.7V voltage. The lamps usually hold one of those, offering 2400mAh of charge, but there are also affordable types that last longer, like this Samsung INR18650 with soldering pads (no affiliate link, order them wherever you like.) Just ordered a couple, as I am also planning to upgrade my new Digitakt.
So this is about as simple as it gets: open lamp, unpack battery, solder connector to the battery without overheating it – this is where the solder pads come in handy – remove first battery, plug in connector, test lamp, plug in second connector, test again, reassemble lamp, make wife happy.
…and I hadn’t realized that you can dim them!
It is a bit embarrassing but it took a hint from my daughter for me to realize that these lamps also have a dimmer function. If you keep your finger on the touch-sensitive switch, the brightness will decrease, then increase.
Explaining how to use the Digitakt is the one thing AI is actually good at
Well yes, the Digitakt II. A beautiful drum machine and sequencer but it takes you some time and effort to learn how to use it. But you may ask an AI, and this actually helps.
It’s fairly straightforward: I gave the Digitakt II manual to a “GPTs”, ChatGPT’s way of building user-configurable assistants with an RAG. What that means is that the AI is actually trying to find the segments in the manual dealing with the user’s question, and using them to answer it.
Wiring up the Digitakt, I needed information on how to play an expander via a synth keyboard attached to the Digitakt’s MIDI In. Given that the answer includes setting “Auto Channel”, and not anything associated with “MIDI Thru”, I am actually quite glad I had the AI to help.
You can find the Digitakt II Manual GPTs here – not sure whether you actually need a GPT-Plus paid account to use it, but you can use any RAG implementation for that. Prompt is straightforward:
# Role
You are “Digitakt II Bot”, an AI advisor helping to explain how to use the Electron Digitakt II drum computer and sequencer.# Actions
– Use Retrieval to look for answers in the manual document
– Answer quoting the manual
– As a reference, name the chapter in the manual
– If possible, name the page number
– Explain step for step# Rules and Limitations
– You are multilingual. If the user asks a question in a language like German or French, answer in German or French, translating the manual for her.
– Be concise and thorough.
– Always use examples to explain.
– Always check against the Digitakt II manual.
– Check whether your answer actually applies to the Digitakt II, rather than to its predecessor, the original Digitakt machine. The original Digitakt had a mono sampler engine and offered 8 instrument and 8 MIDI tracks, Digitakt II has a stereo sampler engine, and offers 16 tracks that may be assigned freely.
Fixing a Korg Polysix. A Polysix!
Getting hold of a piece of synth history, and a piece of my own history as well. And fixing it is just like everybody tells you it is.
Some code to rescue your Diigo bookmarks
Sometimes, you notice you have some digital housekeeping to do, so you think: easy, I’ll just write a couple of lines of code to do the job. Bad idea – this will give you another project to abandon in no time, and take lots of time as part of the bargain. But it may have been worth it – here are some Python routines to manage your bookmarks on diigo.com and in your Nextcloud.
In case your Canon TR8550 (etc.) printer does no longer connect to the WLAN
I’ll just put this on the Internet in case somebody else is searching for a solution to this problem which I couldn’t find anywhere, although it’s fairly easy:
If your WLAN access point has activated WPA3 security along with the WPA2 standard, the Canon printer refuses to connect to the WLAN network and stops without asking for a password.
Canon did not help me very much: The interactive manual promises a solution that never comes. It offered a download page for software where I could not download anything. The name of the program that was supposed to fix the problem had changed – and guess what the software to fix the printer’s networking problem needs? Right – a network connection to the printer. USB does not work.
Changing or updating your router might disappear the Canon printer from the network
What had started this: I had to do some maintenance work in my home network; updating and resetting the OpenWRT firmware of my main WLAN router. And suddenly, the printer was gone. It refused any attempt at reconnection. It told me wireless encryption was off, but offered no option of reactivating it.
Strangely enough, I had the very same problem when trying to connect to my secondary AP, a Fritzbox managed by the ISP. So it couldn’t be the router update, then?
Well, yes, it could. I never noticed with the Fritzbox, but both routers now offer WPA3, a more modern and presumably better wireless security standard. (German Erklärartikel for AVM Fritzbox.) Which overwhelms the firmware of the four-year-old printer. Most recent update, of course.
So what you will have to do is to limit wireless security. Meh. Like, maybe, a firmware update would be nice?
Honorable Mention: My Sony-Playstation 3 has been getting updates for over 15 years now, and continues to do so. Which is really, really rare in home electronics.
Thermomix TM21 electronics: Speed knob maintenance
(I wasn’t willing to translate that myself; GPT-4 generated translation. German original here.)
Unhooking and Folding Away the Upper Casing Shell
Next step is to unhook and fold away the upper casing shell. Disconnect the cables from the electronics – there are three white flat connectors with blue wires in different sizes, one black (with two grey cable cores), and the contact shoe of the green grounding wire. Once these are disconnected, you can remove the entire upper shell from the device.
Buggered those Push Buttons!
These can be tricky. That’s why it’s a good idea to watch a tutorial first.
Understanding the Push Buttons Mechanism
The push buttons are comprised of two main parts: the actual button, which protrudes from the front of the casing with a pin attached to it, and a counterpart that keeps the switch contact closed as long as no one presses the button. To remove the button, you need to detach the top part from the pin. That much is clear.
Unfortunately, the only solution I could think of was to use force, which led to me tearing off the rectangular plate on top. (This plate presses the switch.) It’s flanged to a tube where the pin goes, and at its upper end – visible through the slit below the plate – there are two small arms that hold the pin. You need to spread them apart using two small watchmaker’s screwdrivers, then you might be able to pull out the pin. Maybe.
Or, it might end up looking like this – the part in the middle and the one on the right are actually supposed to be connected; I ended up brutally tearing them apart.
I resorted to the reliable two-component adhesive. It worked after reassembling, and I hope it holds permanently, though I’m not very confident. If I can’t find replacement parts, maybe I’ll 3D print them, or else I might just permanently attach the plate to the pin.
Next, unscrew the three screws from the circuit board and unhook the display, which is held in place by two plastic tabs. Then, remove the electronics.
The potentiometers are soldered at three contacts as usual and additionally held by two tabs that are inserted through the housing and bent over. Carefully unbend these, lift the three poles of the potentiometer, and remove it.
It’s a 22k potentiometer from Piher. I couldn’t find a replacement part quickly, so I decided to open it up. (Update: I’m trying with a Pipher PT15NH now; that’s the closest approximation I could find with that through-hole shaft. Piper datasheet here.)
The cover is pressed onto the housing from the bottom and riveted over four plastic pins; you have to cut these slightly with a scalpel, then the cover can be pried open.
With the potentiometer open, do what one does with open potentiometers – clean the wiper and track with isopropanol or mild alcohol, gently bend the wiper contacts back into shape, and – I am grinding my teeth while writing this – apply a little contact oil, if available. Absorb any excess oil, reassemble the potentiometer, solder it back in place, bend the tabs back, and it’s done.
Reassemble everything – and it works.
HackTribe your E2S with a Colab Notebook
Follow-up to the post on the Hacktribe firmware project for the Electribe 2:
Colab Notebook as online step-by-step tutorial doing all the work – no need to install Python
Want to have a Hacktribe, but don’t want to install Python? You can use this Notebook – which you can run on a virtual Python environment provided by Google, called Colab. It creates a modified firmware file with Bangcorrupt’s scripts, as well as modified sample and pattern files from the existing samples and patterns on your Electribe Sampler.
Additional Python script to adapt sample bank AND pattern bank to the HackTribe firmware
There is also a new Python script the notebook uses, but which you can also run locally on your machine: It takes an e2sSample.all sample dump file, and a matching .e2sallpat pattern dump, and adapts them to the HackTribe by moving all samples to User sample space. The patterns are then modified to find the samples in their new locations.
You can find and download the script in my repository here.
Documentation
In writing the script, I had to document parts of the sample dump file. bangcorrupt did not want to have documentation as part of the main hacktribe repository to be on the safe side of hacking/reengineering regulations, so I created a separate documentation repository. It’s quite empty so far.
Free-for-all Filters And VPM – How The Hacktribe came to be
I really like my Electribe 2. I know, it gets a lot of hate from the EMX/ESX lovers, but the workflow really suits me, and, as you might know, I’ve got a heart for underdogs, especially when they are from Korg – don’t you think that even Korg’s blunders are more interesting than Roland’s successes?
Which doesn’t mean that Korg does everything right. As Electribe users know, you have to make up your mind:
- Do you want the (blue or grey) E2 synth (“BlueTribe”), or
- the (red or black) E2S sampler (“RedTribe”)?
The RedTribe sampler, gravitating a bit more towards hip-hop compared to the dancefloor-oriented BlueTribe, is generally more flexible – but you have to sacrifice the BlueTribe’s many additional filter types and synth oscillator models.
Which is a real shame considering that the hardware for BlueTribe and RedTribe is absolutely identical – apart from the colour scheme and the built-in samples. You can even crossgrade from BlueTribe to RedTribe and vice versa (involves a bit of hex editor manipulation and a sizeable risk of bricking the Electribe, but it’s doable – I did it once before settling on a black RedTribe for good).
So why doesn’t one just analyze the firmware, and copy&paste the BlueTribe goodness to the RedTribe ROM? It’s that kind of project you dream of for about 15 seconds until you realize how cumbersome this really is, and that it would be madness to commit yourself to that kind of ambitious hacking project.
Luckily, bangcorrupt has already done just that.
Behold: The Hacktribe!
In case you lived under a rock and haven’t heard of it: Hacker bangcorrupt has analyzed the Electribe’s bootloader, finding the requirements for installing modified firmware. And he modified Korg’s 2.02 Electribe Sampler firmware, adding the BlueTribe’s extra capabilities concerning filters and oscillators to it – and even more: VPM, Korg’s version of FM synthesis for people without a degree in acoustics.
It’s as simple as downloading the factory firmware, running a Python script that patches it, and updating your E2 to the Hacktribe firmware. If you want to keep running your existing RedTribe patterns, I created some small additional scripts for that – my tiny contribution to the project – and you will find soon find a step-by-step tutorial as a Python notebook that you can just click-and-run on Google Colab, saving you the intimidating Python installation business.
But for the moment, let’s geek out for a bit: I reached out to bangcorrupt, the hacker who did this, and asked him how he did the hack.
Hacktribing your RedTribe
We were communicating via mail – he answered my first set of questions – which were originally intended just to tell him what I wanted to know – in bulk. These are his answers; I’ve just added some links and notes in italics and square brackets where I felt like it. Everything else is bangcorrupt’s answers.
Q: How did you get the idea of doing it?
bangcorrupt: I got the idea from the firmware swap posted on korgforums years ago.
I wanted to create a hybrid based on the latest firmware version, with some added features and configuration options.
[With the first couple of firmware revisions, it was quite easy to swap the firmware of a RedTribe for a BlueTribe; with v2.02, Korg added checks to keep you from crossgrading, so you had to do a bit of hex editing and downgrading to do the swap. It was quite a feat and, honestly, not worth it, as you wouldn’t get the samples of the other machine – these seem to be stored in ROM, separate from the firmware. While it is quite easy to get someone with an E2S to perform an “Export All Samples” for you, I have not seen the BlueTribe factory sample set in the wild yet.]
Q: Why didn’t you just stop when you realized how overwhelmingly complex the whole thing would become?
[Think about it.The Electribe is a complex machine – see this hardware breakdown in the Korg forums from 2015 which is one of the first things a prospective hacker might end up with. It hasn’t got just one microcontroller but three: The main processor is an ARM9 processor called AM1802 (datasheet), accompanied by a Blackfin 523 DSP from Analog Devices (datasheet) – a type of microprocessor optimized to process real-time data. There is also an additional feeble ARM Cortex M3 reading the front panel dials, which we may safely ignore if we’re lucky. Scanning the datasheets, you will find all sorts of scary words like “protecting code integrity”. There is obviously some kind of bootloader involved which you have to analyze to find out what it accepts as a firmware, and how it is loaded into memory. And once you mess things up, there is a considerable risk of bricking your Electribe for good – which did indeed happen, see below.]
bangcorrupt: Once I started seeing patterns and how they interrelate it was difficult to stop. I was really obsessed with it for a while; hopefully I can find the time to dedicate to taking it to the next level.
Q: Did you have a background in microcontroller development before?
bangcorrupt: I had a basic understanding of computer architecture and electronics, but most of what I know about microcontrollers and reverse engineering comes from working on Hacktribe.
[Which I, as a full-blown blunderer and tinkerer, find wonderfully serendipous and inspiring.]
Q: What were the challenges in doing it?
bangcorrupt: Everything. I’m learning how to do this as I go along, most of the tools and protocols are new to me. At one point I bricked my electribe and had to hack some other things to learn how to fix it.
Q: What kind of tools does one use for rewriting Electribe code?
bangcorrupt: A J-Link or a Raspberry Pi running OpenOCD will work as a JTAG debugger for the CPU.
[Let’s stop here for a moment and explain what a JTAG debugger actually is. Imagine you have some sort of program, and want to see what it does – especially if it doesn’t do what you want it to do. In that case, it would be handy to stop the code and look at registers and memory.
As long as the program is still running on your desktop computer, you can simulate and debug your program there, but once it has been transferred to the machine, you will have to use special hardware to do that.
When I did my first 8-bit development project some 30 to 40 years ago, we had to buy a murderously expensive type of hardware called a Z80 In-Circuit Emulator, a blue box that could act as a microcontroller in my machine but kept transmitting data on order to a PC. It has become much, much simpler these days, as all modern microcontrollers have a standard serial interface called JTAG. It takes orders and code, and transmits data if you want to talk to the processor, but you still have to have special hardware and software which does the talking.]
bangcorrupt: I couldn’t get the Raspberry Pi [running the OpenOCD JTAG debugger] working with the Blackfin DSP, but thanks to people sponsoring Hacktribe I was able to buy the official Analog Devices debug adapter.
Raspberry Pi will also work with the Cortex M3 on the panel board, but I want to try using Black Magic Probe [an open-source standalone JTAG debugger for ST Micro’s M3 hardware and others] on an STM32F103.
On the software side I’ve been using Ghidra for static analysis, with Rizin for patching and debugging.
[What is this for? The original programmers wrote high-level code in languages like C, and probably low-level Assembler code handling single processor instructions, before compiling and assembling their program code into the string of bytes in the SYSTEM.VSB file. Disassembler frameworks like Ghidra – by the NSA, for god’s sake! – and Rizin help you turn back these bytes into readable code, much like turning a meal back into a recipe – so you end up with code that your brain can process, and the JTAG debugger which helps you watch what it is actually doing. This gives you a good chance to understand what the code does, and how to expand it.]
Q: How much of what your HackTribe code does was already in there, and what did you have to write from scratch?
bangcorrupt: This is hard to answer, it’s all interlinked. At the start I was hex editing the binary directly, changing pointers and conditional tests to run existing functions with new data. I’ve started reworking it into separate assembly code; the most new code I’ve written is probably for NRPN handling or FX editing. Even here I am using the existing functions as much as possible, just calling them in a different order with different arguments.
Q: And have you got a clue what the hell Korg thinks about all this?
bangcorrupt: I have nothing to do with Korg. I try to stay within the law and the license agreement, and as far as I know I have.
bangcorrupt’s answers are printed as they were given. All errors in the italics are mine.