Building the Best Autonomous Brain

When I’m bumper-to-bumper in a sea of exhaust fumes and distracted drivers, it seems like autonomous driving can’t get here fast enough. Nor can the potential rewards that come along with fully autonomous vehicles, like far fewer accidents and mobility for people who struggle to get around on their own. To do my part, I’m focusing on how building the best autonomous brain for a car will get us there faster.

5 Things to Know About Autonomous Vehicles

Every day, we’re getting closer to the technology needed to power self-driving cars. But in-vehicle compute needs are complex, and autonomous driving algorithms are changing rapidly. So, the question is: What is the best long-term path to fast, safe decision-making? It all begins with the right compute for the right task. Here are five things you should know about the complex compute for autonomous driving.

 

It Takes More Than Deep Learning

Artificial intelligence is just one part of the story. And beyond that, AI is more than just deep learning. Yes, deep learning is key in teaching a car how to drive, especially when it comes to computer vision. But there will be several other types of AI at work in the fully autonomous vehicle, from traditional machine learning to memory- and logic-based AI. The fully autonomous vehicle will need a wide range of computing to support three intertwined stages of self-driving: sense, fuse and decide. Each stage requires different types of compute. In the first stage, the vehicle collects data from dozens of sensors to visualize its surroundings. During the second stage, data is correlated and fused to create a model of the environment. Finally, the vehicle must decide how to proceed. System designers need a flexible architecture to support all three stages, with an optimized combination of power efficiency and performance.

With a flexible, scalable architecture of CPUs, Intel Arria 10 FPGAs and other accelerators, our Intel GO automotive solutions portfolio leads the industry with a diverse range of computing elements that support all three stages of driving. But autonomous driving is much more than just in-vehicle compute; that’s why we offer a full car-to-cloud solution including 5G connectivity, data center technologies and software development tools to accelerate autonomous driving.
Smart AI consists of sensing, fusing and deciding.

 

No Fixed Architecture Can Keep Pace

Before system designers can achieve level four and five driving automation, they must determine how to best use different compute elements within the system to support each type of workload.

No fixed architecture can keep pace with the speed of innovation in AI and system design. Automakers and suppliers will need to be ready to change system designs down the road. Whether it’s to incorporate new algorithms or completely rethink compute to accommodate new workloads, system designers will need a flexible, scalable architecture. Simply put, they need interoperable and even programmable compute elements that don’t require them to start from the ground up every time they want to incorporate a new feature. With a flexible architecture of CPUs, FPGAs and other accelerators, future-ready solutions offer a diverse range of computing elements that can accommodate designs that may change long after hardware and vehicle design decisions have been made.

 

Driving the Future

Now is a time of tremendous opportunity as we continue to research and respond to the transformational changes before us. From powering Stanford University’s robotic car to serving as a premier board member of the University of Michigan Mobility Transformation Center’s Mcity, Intel is working alongside world-renowned research teams to understand the way people interact with connected cars. Intel has built autonomous vehicle labs in Arizona, California, Germany and Oregon. Here, we’re working hand in hand with our ecosystem partners to optimize customized solutions, road-test autonomous vehicles, and work toward common platforms that will speed broad industry innovation for the promising road ahead.

Learn more about the road to autonomous driving at intel.com/automotive. To stay informed about Intel IoT developments, subscribe to our RSS feed for email notifications of blog updates, or visit intel.com/IoTLinkedInFacebook and Twitter.

The post Building the Best Autonomous Brain appeared first on IoT@Intel.


Source: Network News

Facebook Offers $1 Million for New Security Defenses

The social media giant has increased the size of its Internet Defense Prize program in order to spur more research into ways to defend users against the more prevalent and common methods of attack.
Source: Vulnerabilitys & Threats

Landmine-clearing Pi-powered C-Turtle

In an effort to create a robot that can teach itself to navigate different terrains, scientists at Arizona State University have built C-Turtle, a Raspberry Pi-powered autonomous cardboard robot with turtle flippers. This is excellent news for people who live in areas with landmines: C-Turtle is a great alternative to current landmine-clearing robots, since it is much cheaper, and much easier to assemble.

C-Turtle ASU

Photo by Charlie Leight/ASU Now

Why turtle flippers?

As any user of Python will tell you*, turtles are amazing. Moreover, as the evolutionary biologist of the C-Turtle team, Andrew Jansen, will tell you, considering their bulk** turtles move very well on land with the help of their flippers. Consequently, the team tried out prototypes with cardboard flippers imitating the shape of turtle flippers. Then they compared their performance to that of prototypes with rectangular or oval ‘flippers’. And 157 million years of evolution*** won out: the robots with turtle flippers were best at moving forward.

C-Turtle ASU

Field testing with Assistant Professor Heni Ben Amor, one of the C-Turtle team’s leaders (Photo by Charlie Leight/ASU Now)

If it walks like a C-Turtle…

But the scientists didn’t just slap turtle flippers on their robot and then tell it to move like a turtle! Instead, they implemented machine learning algorithms on the Pi Zero that serves as C-Turtle’s brain, and then simply let the robot do its thing. Left to its own devices, it used the reward and punishment mechanisms of its algorithms to learn the most optimal way of propelling itself forward. And lo and behold, C-Turtle taught itself to move just like a live turtle does!

Robotic C-Turtle

This is “Robotic C-Turtle” by ASU Now on Vimeo, the home for high quality videos and the people who love them.

Landmine clearance with C-Turtle

Robots currently used to clear landmines are very expensive, since they are built to withstand multiple mine explosions. Conversely, the total cost of C-Turtle comes to about $70 (~£50) – that’s cheap enough to make it disposable. It is also more easily assembled, it doesn’t need to be remotely controlled, and it can learn to navigate new terrains. All this makes it perfect for clearing minefields.

BBC Click on Twitter

Meet C-Turtle, the landmine detecting robot. VIDEO https://t.co/Kjc6WxRC8I

C-Turtles in space?****

The researchers hope that robots similar to C-Turtle can used for space exploration. They found that the C-Turtle prototypes that had performed very well in the sandpits in their lab didn’t really do as well when they were released in actual desert conditions. By analogy, robots optimized for simulated planetary conditions might not actually perform well on-site. The ASU scientists imagine that C-Turtle materials and a laser cutter for the cardboard body could be carried on board a Mars mission. Then Martian C-Turtle design could be optimized after landing, and the robot could teach itself how best to navigate real Martian terrain.

There are already Raspberry Pis in space – imagine if they actually made it to Mars! Dave would never recover

Congrats to Assistant Professors Heni Ben Amor and Daniel Aukes, and to the rest of the C-Turtle team, on their achievement! We at Pi Towers are proud that our little computer is part of this amazing project.

C-Turtle ASU

Photo by Charlie Leight/ASU Now

* Check out our Turtley amazing resource to find out why!

** At a length of 7ft, leatherback sea turtles can weigh 1,500lb!

*** That’s right: turtles survived the extinction of the dinosaurs!

**** Is anyone else thinking of Great A’Tuin right now? Anyone? Just me? Oh well.

The post Landmine-clearing Pi-powered C-Turtle appeared first on Raspberry Pi.


Source: RaspberryPi – IOT Anonimo

Source: Privacy Online


Source: Zologic

WTB: Kansas Data Breach Exposes More Than 5 Million Social Security Numbers

The intelligence in this week’s iteration discuss the following threats: Adware, Banking Trojans, Breaches, Internet of Things, NukeBot, SambaCry, Stantinko and TrickBot. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.

Trending Threats

Kansas Data Breach Exposes More Than 5 Million Social Security Numbers (July 21, 2017)
After a Public Records request by the Kansas News Service, the full extent of a breach on a database operated by the Kansas Department of Commerce was revealed on the 19th July. More than 5.5 million social security numbers of Americans across 10 states were exposed. The data was kept to help members of the public find jobs. The largest amount of social security numbers stolen were citizens of Alabama, with approximately 1.3 million peoples details stolen. Kansas has agreed to pay for up to one year of credit monitoring, in 9 of the 10 affected states in response to the breach.
Recommendation: Personal information such as social security and credit card numbers should be protected with the utmost care, and only used with vendors that you trust to keep your information in compliance with the relevant standards. Regular monitoring of financial accounts in addition to identity protection and fraud prevention services can assist in identifying potential theft of data.
Tags: Breach, Kansas

Stantinko: A massive adware campaign operating covertly since 2012 (July 20, 2017)
ESET researchers have conducted investigations into a large adware campaign that has been operating secretly since 2017. The adware, called “Stantinko” has mainly targeted Russia and Ukraine. The initial infection vector was via executables disguised as torrents. It then installs malicious Chrome browser extensions that carry out ad injection and click fraud. It also tried to brute-force into WordPress and Joomla admin panels in order to compromise and sell them. It also is able to avoid detection by antivirus and reverse engineering by having encrypted code that resides on disk or the Windows registry. A benign looking executable loads and decrypts the code. It is able to maintain persistence on the victim’s system by installing two Windows services, which have the ability to reinstall the other, if one is deleted.
Recommendation: Malware authors are always innovating new methods of communicating back to the control servers. Always practice Defense in Depth (don’t rely on single security mechanisms – security measures should be layered, redundant, and failsafe). All software/torrents should be carefully researched prior to installing on a personal or work machine. Additionally, all software, especially free versions, should only be downloaded from trusted vendors.
Tags: Stantinko, Adware, C2

$30 million below Parity: Ethereum wallet bug fingered in mass heist (July 20, 2017)
A vulnerability in Parity Ethereum client allowed hackers to steal funds from multi-sig wallets. Over $30 Million of Ethereum was moved into one address. As a preventative measure to protect other vulnerable multi-sig wallets, White Hat hackers have used the same vulnerability to exfiltrate all other multi-sig wallets into a secure wallet. The vulnerability has been fixed and now the money is being returned to their owners from the White Hat wallet.
Recommendation: If you have a multi-sig wallet with Parity, check where your funds have gone. If they have been exfiltrated to the White Hat group, then you should be soon getting a new multi-sig wallet with the vulnerability removed. One of the best ways to secure your cryptocurrency against theft is by using hardware wallets. Hardware wallets are a type of cryptocurrency wallet that stores the owner’s private keys on a hardware device that is secure from hacking attempts. Cold storage wallets could also be used to assist in cryptocurrency security. Cold wallets are placed on clean air-gapped computers and therefore protect all private keys from online threats. It is more tedious to use but increases the security.
Tags: Ethereum, Theft, Parity

The NukeBot banking Trojan: from rough drafts to real threats (July 19, 2017)
In Spring of 2017, the actor Gosya leaked the source code to the “NukeBot” banking Trojan. This was believed to be done in response to him being banned off forums for being a suspected scammer. The Trojan’s main function was to make web injections into specific web pages to steal user data. Kaspersky researchers set up an imitation infected bot in order to collect web injections from Command and Control servers. They concluded that the main targets were French and United States banks.
Recommendation: Bank accounts and credit card numbers should be protected with the utmost care, and only used with vendors that you trust to keep your information in compliance with the relevant standards. Regular monitoring of financial accounts in addition to identity protection and fraud prevention services can assist in identifying potential theft of data.
Tags: NukeBot, TinyNuke, Gosya, Trojan

With a boost from Necurs, Trickbot expands its targeting to numerous U.S. financial institutions (July 19, 2017)
The Necurs botnet is well known for malware spam campaigns. One of the malwares that targets the financial sector is the “Trickbot” Trojan. Trickbot performs man-in-the-browser (MitB) attacks against customers of financial institutions. Tickbot traditionally only targeted financial institutions outside of the United States. On July 17th, Flashpoint researchers have observed them targeting various institutions both inside and outside the United States in a new wave of attacks. Emails are being sent which have an attachment with obfuscated JavaScript that downloads the Trickbot trojan.
Recommendation: Always be on high alert while reading email, in particular when it has attachments, attempts to redirect to a URL, comes with an urgent label, or uses poor grammar. Use anti-spam and anti-virus protection, and avoid opening email from untrusted or unverified senders.
Tags: Trickbot, Necurs, Trojan, Banking

Devil’s Ivy: Flaw in Widely Used Third-party Code Impacts Millions (July 18, 2017)
A stack overflow vulnerability has been discovered in gSOAP, a simple object access protocol web services toolkit developed by Genivia, which can lead to remote code execution. Researchers at Senrio discovered the vulnerability after analyzing an M3004 Axis Communications security camera. The vulnerability has been dubbed as “Devil’s Ivy”. When the vulnerability was exploited on the security camera, the researchers were able to access the video feed, and deny the owner access to that feed. The vulnerability affects any device that uses gSOAP to support their web services. Genivia claims that gSOAP has been downloaded over 1 million times.
Recommendation: Genivia has released a patch which fixes the vulnerability. It is recommended that users keep all services updated. If the device is IoT, it is recommended that it is placed behind a firewall or network address translation and placed within a Virtual Local Area Network (VLAN).
Tags: gSOAP, RCE, Buffer Overflow, IOT

Hacker steals $7.4 million in ethereum during CoinDash ICO launch (July 18, 2017)
On Monday 17th July, a hacker managed to steal approximately $7.4 million in Ethereum during CoinDash’s Initial Coin Offering (ICO). CoinDash had posted the wallet address on their website in order for investors to send Ethereum to. But a hacker managed to compromise the website, and post their own wallet address instead. The hacker managed to gain millions of dollars worth of Ethereum before CoinDash stopped the token sale. CoinDash has promised that investors who gave money to the wrong address will still be given tokens reflecting their pledges.
Recommendation: Providing the funding wallet address in a single place is not very secure. Also, any important content on a web site that can be modified should be cryptographically signed.
Tags: Ethereum, ICO, Web Server

Linux Users Urged to Update as a New Threat Exploits SambaCry (July 18, 2017)
The open source re-implementation of the SMB/CIFS networking protocol for Windows, “Samba,” is continuing to be exploited by threat actors, according to Trend Micro researchers. Additionally, the company issued a security advisory stating that Samba versions from 3.5.0 onwards are vulnerable to remote code execution. The vulnerability is being exploited by threat actors to distribute a modified version of the “SambaCry” malware.
Recommendation: The Samba vulnerability abused by actors in this story has already been patched in May 2016. The patch should be applied as soon as possible if it has not been already.
Tags: Linux, SambaCry

Two Iranians Charged in U.S. Over Hacking Defense Materials (July 18, 2017)
On Monday 17th July, two Iranians were indicted with hacking a defense contractor and theft of software that was being used to design bullets and warheads from a Vermont based company Arrow Tech Associates. The two Iranians indicted were Mohammed Saeed Ajily and Mohammed Reza Rezakhah. A third man involved in the case was Nima Golestaneh, who was arrested in Turkey in 2013 and extradited to the United States.
Recommendation: Company owners must take every step necessary to secure their data. Always practice Defense in Depth (don’t rely on single security mechanisms – security measures should be layered, redundant, and failsafe).
Tags: Breach, Arrow Tech, Iran

751 Domains Hijacked to Redirect Traffic to Exploit Kits (July 17, 2017)
On Friday 7th July, the French domain registrar Gandi lost control of 751 domains after a technical partner was breached, and name servers modified. Gandi detailed in a report that the attacker was able to obtain a password for the backend of one of Gandi’s technical partners. Traffic to these domains was redirected to servers hosting Neutrino and RIG exploit kits.
Recommendation: It is important that your company and employees use different passwords for the different accounts that are being used. Your company should implement security policies on accounts that store any sensitive information. Multi-factor authentication, and frequent password changes can help protect trade secrets and other forms of sensitive data.
Tags: Domain, Neutrino, RIG

Cisco WebEx Browser Extension Remote Code Execution Vulnerability (July 17, 2017)
A critical vulnerability in Cisco’s WebEx extensions for Chrome and Firefox would allow an attacker to remotely execute malicious code. If an attacker sets up a webpage with malicious Javascript, the attacker is able to embed an iframe with a specific URL that loads the WebEx extension. Then the Javascript can pass a JSON message to the native app to roll back the sanitization component to an older version. With this, another JSON message can be sent to the app in order to execute arbitrary code. Over 20 million people use the extension on Chrome and over 700,000 use it on Firefox.
Recommendation: This vulnerability affects Cisco WebEx extensions for Google Chrome and Mozilla Firefox on Windows. Cisco has released an update which addresses the vulnerability. Users should ensure that their extensions are updated to the latest version.
Tags: RCE, Chrome, Firefox, WebEX

Observed Threats

This section includes the top threats observed from the Anomali Community user base as well as sensors deployed by Anomali Labs. A ThreatStream account is required to view this section. Click here to request a trial.

RIG exploit kit Tool Tip
The RIG exploit kit is a framework used to exploit client side vulnerabilities in web browsers. The RIG exploit kit takes advantage of vulnerabilities in Internet Explorer, Adobe flash, Java and Microsoft Silverlight. The RIG exploit kit was first observed in early 2014. The RIG exploit kit’s objective is to upload malicious code to the target system. The RIG exploit kit is known to distribute ransomware, spambots and backdoors. Victims are redirected to the RIG exploit kit with a landing page coming from malvertising or compromised sites.
Tags: RIG, exploitkit


Source: Honeypot Tech

Using AI to Break Detection Models

Pitting machine learning bots against one another is the new spy vs. spy battle in cybersecurity today.
Source: Cyber Monitoring

Tijuana Rick’s 1969 Wurlitzer Jukebox revitalisation

After Tijuana Rick’s father-in-law came by a working 1969 Wurlitzer 3100 jukebox earlier this year, he and Tijuana Rick quickly realised they lacked the original 45s to play on it. When they introduced a Raspberry Pi 3 into the mix, this was no longer an issue.

1969 Wurlitzer 3100

Restored and retrofitted Jukebox with Arduino and Raspberry Pi

Tijuana Rick

Yes, I shall be referring to Rick as Tijuana Rick throughout this blog post. Be honest, wouldn’t you if you were writing about someone whose moniker is Tijuana Rick?

Wurlitzer

The Wurlitzer jukebox has to be one of the classic icons of Americana. It evokes images of leather-booth-lined diners filled with rock ‘n’ roll music and teddy-haired bad boys eyeing Cherry Cola-sipping Nancys and Sandys across the checkered tile floor.

Raspberry Pi Wurlitzer

image courtesy of Ariadna Bach

With its brightly lit exterior and visible record-changing mechanism, the Wurlitzer is more than just your average pub jukebox. I should know: I have an average pub jukebox in my house, and although there’s some wonderfully nostalgic joy in pressing its buttons to play my favourite track, it’s not a Wurlitzer.

Raspberry Pi Wurlitzer

Americana – exactly what it says on the tin jukebox

The Wurlitzer company was founded in 1853 by a German immigrant called – you guessed it – Rudolf Wurlitzer, and at first it imported stringed instruments for the U.S. military. When the company moved from Ohio to New York, it expanded its production range to electric pianos, organs, and jukeboxes.

And thus ends today’s history lesson.

Tijuana Rick and the Wurlitzer

Since he had prior experience in repurposing physical switches for digital ends, Tijuana Rick felt confident that he could modify the newly acquired jukebox to play MP3s while still using the standard, iconic track selection process.

Raspberry Pi Wurlitzer

In order to do this, however, he had to venture into brand-new territory: mould making. Since many of the Wurlitzer’s original buttons were in disrepair, Tijuana Rick decided to try his hand at making moulds to create a set of replacements. Using an original button, he made silicone moulds, and then produced perfect button clones in exactly the right shade of red.

Raspberry Pi Wurlitzer

Then he turned to the computing side of the project. While he set up an Arduino Mega to control the buttons, Tijuana Rick decided to use a Raspberry Pi to handle the audio playback. After an extensive online search for code inspiration, he finally found this script by Thomas Sprinkmeier and used it as the foundation for the project’s software.

More images and video of the build can be found on Tijuana Rick’s website.

Fixer-uppers

We see a lot of tech upgrades and restorations using Raspberry Pis, from old cameras such as this Mansfield Holiday Zoom, and toys like this beloved Teddy Ruxpin, to… well… dinosaurs. If a piece of retro tech has any room at all for a Pi or a Pi Zero, someone in the maker community is bound to give it a 21st century overhaul.

What have been your favourite Pi retrofit projects so far? Have you seen a build that’s inspired you to restore or recreate something from your past? Got any planned projects or successful hacks? Make sure to share them in the comments below!

The post Tijuana Rick’s 1969 Wurlitzer Jukebox revitalisation appeared first on Raspberry Pi.


Source: RaspberryPi – IOT Anonimo

Source: Privacy Online


Source: Zologic

IoT Sleepbuddy, the robotic babysitter

You’re watching the new episode of Game of Thrones, and suddenly you hear your children, up and about after their bedtime! Now you’ll probably miss a crucial moment of the show because you have to put them to bed again. Or you’re out to dinner with friends and longing for the sight of your sleeping small humans. What do you do? Text the babysitter to check on them? Well, luckily for you these issues could soon be things of the past, thanks to Bert Vuylsteke and his Pi-powered Sleepbuddy. This IoT-controlled social robot could fulfil all your remote babysitting needs!

IoT Sleepbuddy – babyphone – Design concept

This is the actual concept of my robot and in what context it can be used.

A social robot?

A social robot fulfils a role normally played by a person, and interacts with humans via human language, gestures, and facial expressions. This is what Bert says about the role of the Sleepbuddy:

[For children, it] is a friend or safeguard from nightmares, but it is so much more for the babysitters or parents. The babysitters or parents connect their smartphone/tablet/PC to the Sleepbuddy. This will give them access to control all his emotions, gestures, microphone, speaker and camera. In the eye is a hidden camera to see the kids sleeping. The speaker and microphone allow communication with the kids through WiFi.

The roots of the Sleepbuddy

As a student at Ghent University, Bert had to build a social robot using OPSORO, the university’s open-source robotics platform. The developers of this platform create social robots for research purposes. They are also making all software, as well as hardware design plans, available on GitHub. In addition, you will soon be able to purchase their robot kits via a Kickstarter. OPSORO robots are designed around the Raspberry Pi, and controlled via a web interface. The interface allows you to customise your robot’s behaviour, using visual or text-based programming languages.

Sleepbuddy Bert Vuylsteke components

The Sleepbuddy’s components

Building the Sleepbuddy

Bert has provided a detailed Instructable describing the process of putting the Sleepbuddy together, complete with video walk-throughs. However, the making techniques he has used include thermoforming, laser cutting, and 3D printing. If you want to recreate this build, you may need to contact your local makerspace to find out whether they have the necessary equipment.

Sleepbuddy Bert Vuylsteke assembly

Assembling the Sleepbuddy

Finally, Bert added an especially cute touch to this project by covering the Sleepbuddy in blackboard paint. Therefore, kids can draw on the robot to really make it their own!

So many robots!

At Pi Towers we are partial to all kinds of robots, be they ones that test medical devices, play chess or Connect 4, or fight other robots. If they twerk, or are cute, tiny, or shoddy, we maybe even like them a tiny bit more.

Do you share our love of robots? Would you like to make your own? Then check out our resource for building a simple robot buggy. Maybe it will kick-start your career as the general of a robot army. A robot army that does good, of course! Let us know your benevolent robot overlord plans in the comments.

The post IoT Sleepbuddy, the robotic babysitter appeared first on Raspberry Pi.


Source: RaspberryPi – IOT Anonimo

Source: Privacy Online


Source: Zologic

Google Pi Intercom with the AIY Projects kit

When we released the Google AIY Projects kit with Issue 57 of The MagPi in May, we could hardly wait to see what you in the community would build with it. Being able to add voice interaction to your Raspberry Pi projects opens up a world of possibilities for exciting digital making.

One such project is maker Martin Mander‘s Google Pi Intercom. We love this build for its retro feel and modern functionality, a combination of characteristics shared by many of Martin’s creations.

1986 Google Pi Intercom

This is a 1986 Radio Shack Intercom that I’ve converted into a Google Home style device using a Raspberry Pi and the Google AIY (Artificial Intelligence Yourself) kit that came free with the MagPi magazine (issue 57). It uses the Google Assistant to answer questions and perform actions, using IFTTT to integrate with smart home accessories and other web services.

Inter-com again?

If you’ve paid any attention at all to the world of Raspberry Pi in the last few months, you’ve probably seen the Google AIY Projects kit that came free with The MagPi #57. It includes a practical cardboard housing, but of course makers everywhere have been upgrading their kits, for example by creating a laser-cut wooden box. Martin, however, has taken things to the next level: he’s installed his AIY kit in a wall-mounted intercom from 1986.

Google Pi intercom Martin Mander

The components of the Google Pi Intercom

It’s all (inter)coming together

Martin already had not one, but three vintage intercoms at home. So when he snatched up an AIY Projects kit, there was no doubt in his mind about how he was going to use it:

The moment I scooped the Google AIY kit, I knew that one of these old units would be a perfect match for it – after all, both were essentially based on a button, microphone, and loudspeaker, just with different technology in between.

Preparing the intercom housing

First, Martin gutted the intercom and ground away some of the excess plastic inside. This was necessary because integrating all the components was going to be a tight fit. To overhaul its look, he then gave the housing a good scrub and a new paint job. For a splash of colour, Martin affixed a strip of paper in the palette of the Google logo.

Google Pi intercom Martin Mander

BUBBLES!

Building the Google Pi Intercom

The intercom’s speaker wasn’t going to provide good enough sound quality. Moreover, Martin quickly realised that the one included in the AIY kit was too big for this make. He hunted down a small speaker online, and set about wiring everything up.

Google Pi intercom Martin Mander

Assembling the electronics

Martin wanted the build to resemble the original intercom as closely as possible. Consequently, he was keen to use its tilting bar to activate the device’s voice command function. Luckily, it was easy to mount the AIY kit’s button behind the bar.

Google Pi intercom Martin Mander

Using the intercom’s tilting bar switch

Finally it was only a matter of using some hot glue and a few screws and bolts to secure all the components inside the housing. Once he’d done that, Martin just had to set up the software of the Google Assistant, and presto! He had a voice-controlled smart device for home automation.

A pretty snazzy-looking build, isn’t it? If you’d like to learn more about Martin’s Google Pi Intercom, head over to the Instructables page for a complete rundown.

Google Pi intercom Martin Mander

Awaiting your command

The AIY Projects Kit

Didn’t manage to snap up an AIY Projects kit? Find out how to get your hands on one over at The MagPi.

Or do you have an AIY kit at home? Lucky you! You can follow our shiny new learning resource to get started with using it. There are also lots of handy articles about the kit in The MagPi #57 – download the PDF version here. If you’re stuck, or looking for inspiration, check out our AIY Projects subforum. Ask your questions, and help others by answering theirs.

What have you built with your AIY Projects kit? Be sure to share your voice-controlled project with us in the comments.

 

The post Google Pi Intercom with the AIY Projects kit appeared first on Raspberry Pi.


Source: RaspberryPi – IOT Anonimo

Source: Privacy Online


Source: Zologic

TekThing 134 – Dell XPS 27 All-in-One, Illumy Smart Sleep Mask, Encrypt Dropbox & Google Drive, Best USB 3.0 Hub

Dell XPS 27 All-In-One, Encrypt Your Dropbox Data, Illumy Smart Sleep Mask vs. Jet Lag, Best USB 3 Hub, & Board Games!
——
1:50 DELL XPS 27 7760 All In One
Can Dell’s latest XPS 27 7760 all-in-one deliver real desktop performance? Watch our video to find out!
http://www.dell.com/en-us/shop/productdetails/xps-27-7760-aio

Hack Across The Planet!
Here’s the link for HackAcrossThePlanet.com!
https://www.hackacrosstheplanet.com

9:53 Sound Oasis Illumy Smart Sleep Mask
Can this “smart” sleep mask make jet lag less painful? Can it put you to sleep at night? Is this really NASA technology? Our Illumy Smart Sleep Mask review is in the video!
https://www.soundoasis.com/products/light-therapy/illumy-the-smart-sleep-mask/

18:35 Encrypt Cloud Storage
Matt’s wants something more secure than, Dropbox, actual encrypted cloud storage. Cool! We’ve got some easy options: BoxCryptor works with OneDrive, Google Drive or Dropbox. ODrive will encrypt and link all your cloud accounts together. Sookasa is $10 a month, HIPAA compliant, supports OneDrive, Google Drive, Dropbox, and offers a ton of features. Shannon’s favorite? Move your data to a zero-knowledge provider like SpiderOak!
https://www.dropbox.com/privacy https://www.boxcryptor.com/en/dropbox/ https://www.odrive.com/ https://www.sookasa.com/ https://www.sookasa.com/resources/encrypt-dropbox-folder/ https://spideroak.com/personal/spideroak-one

24:44 Best USB 3.0 Hub?
Rick E wrote ask@tekthing.com, “Do you have any suggestions for an inexpensive USB 3 Hub? I need 4 ports minimum, ac powered. Also are there any issues I should know about with USB hubs?” Our favorite USB 3 hub comes from Anker, and we talk USB 3 issues, gamepad latency, and connecting all your gear in the video!
https://www.amazon.com/Anker-PowerIQ-Charging-Macbook-Surface/dp/B00VDVCQ84/

26:56 Two Routes, Slow Internet
Mark wrote, “Just a follow-on comment to your piece on network trace/speed analysis ideas for determining bottlenecks… One possible (non-obvious) cause of network slowdowns is that you have 2 different (and not equal) routes from your PC to the net.” Learn what this does in the video!

28:41 Do Something Analog
Like get your game on! Jack writes, “Thanks for introducing me to CamelCamelCamel.com. Of course every time you mention it, I think of the game Camel Up. I highly recommend picking up this game so you can do something analog with the family and friends.” The Kickstarter Shannon mentioned is Action News, and Robot Turtles is “The Game For Little Programmers.”
https://www.amazon.com/gp/product/B00ICF0OZQ?ref_=sr_1_1&qid=1499461804&sr=8-1&keywords=Camel%20up&pldnSite=1
https://www.kickstarter.com/projects/contender/action-news-the-game-of-television-news?ref=email
http://www.robotturtles.com/
——
Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the show for you every week!
https://www.patreon.com/tekthing
——
EMAIL US!
ask@tekthing.com
——
Amazon Associates: http://amzn.to/2gm9Egf
Subscribe: https://www.youtube.com/c/tekthing
——
Website: http://www.tekthing.com
RSS: http://feeds.feedburner.com/tekthing
THANKS!
HakShop: https://hakshop.myshopify.com/
——
SOCIAL IT UP!
Twitter: https://twitter.com/tekthing
Facebook: https://www.facebook.com/TekThing
Reddit: https://www.reddit.com/r/tekthingers
——

Source: Security news


Source: Zologic

Using DevOps to Move Faster than Attackers

Black Hat USA talk will discuss the practicalities of adjusting appsec tooling and practices in the age of DevOps.
Source: Vulnerabilitys & Threats