Then one night while working my RSS feeds on Bloglines, I came across a bargain from Dell. They had a 1 GB SanDisk Micro Cruzer U3 for $9 with free shipping. I bought 2!
I jumped on it because of the size and only realized that it was U3 after I had ordered it.
When it arrived, I started playing with the U3 capability. It is very similar to the capability of the Hagiwara but was "closed" (more on that later). Even with this "closed" architecture, it seemed like it was hackable in that all the control information was on the writable side in XML files.
A session with Google turned up loads of information. Here're several sources:
http://newmw.wordpress.com/2006/08/16/create-your-own-u3-applications/But let me just net it out. I used the Shortcut Creator 4U3 from SmithTech above and it worked like a charm.
Actually, once I saw how easy it really was, I've built more just by hand. It seems to me like the U3 folks just make it look complicated.
Now briefly on the "hackable" angle of U3. Obviously there has to be a way to write to the CD-ROM side of the U3 drive. John Smith (and certainly others) has figured this out. Smith has AutoLauncher 4U3 that will let you run whatever you want via the CD-ROM's autorun.inf.
So far, I've found SanDisk's LaunchPad satisfactory.