• About Me Card

Max Hemingway

~ Musings as I work through life, career and everything.

Max Hemingway

Tag Archives: IoT

Looking at upcycling a mobile phone

10 Monday May 2021

Posted by Max Hemingway in Innovation, IoT

≈ 1 Comment

Tags

IoT

Across the modern developed world, there are draws of old mobile devices in peoples houses and offices that are no longer used or in fashion. In some cases they are very old devices and in others the pull of the latest model has drawn the user to the new version or the software has stopped working on the older version.

By 2024 Statsia states there will be around 17.72 billion mobile devices operating in the world. That’s a lot of devices!

I will hazard a guess here and say there will also be a very high figure around the amount that will be still sat in desk draws.

Before I get onto upcycling I need to cover two areas – Recycling and Keeping up with the Neighbours

Recycling

With the many recycling programs that vendors are putting in place the number of mobiles left outside of these programs is high. Mainly due to age of the mobile and damage to the device which makes it not worth anything for a person to send their phones in (main damage being to the screen). Yes I have a couple of these from family members that I need to get recycled.

“Smartphones are made up of around 30 elements, including copper, gold and silver for wiring and lithium and cobalt in the battery” Source :https://www.independent.co.uk/news/science/mobile-phones-elements-periodic-table-endangered-chemicals-st-andrews-a8739921.html

http://www.indepenent.co.uk

There should be a bigger push to get these devices recycled to help reduce the impact on the earth and increase our sustainability. The main rewards for recycling a phone are for those that are mainly intact and hold some resale value. Once a phone has been dropped and damaged, to some its a thing that no longer holds value and therefore ends in the draw or hopefully not the bin.

There are some things that need to happen for users to help adopt this strategy:

  • Greater publicity around the value of the old phones
  • Guaranteed security of the destruction of data on the phone
  • Giving the user something back for recycling

Keeping up with the Neighbours

With new phones/models being produced each year how often do you hear things like:

  • “Oh the latest XYZ phone is out – I must get that!”
  • “Well I have a bit of damage on this phone so Ill get a new one as its coming out”
  • “We will no longer support that operating system version past dd/mm/yyyy”
  • “The cost of repair is quite high, its more economical to get a new one”
  • “Ohhh Shiny!!!”
  • “<Insert your own here>”
  • etc.etc.

Upcycling

Having had an android based phone for a number of years, I have been keeping an eye on what Samsung have been proposing since 2017 – Galaxy upcycling. However I haven’t heard much until recently with Samsung announcing the use of old mobiles being used with SmartThings Labs.

Reusing my old mobile devices as part of my home automation system to provide a number of screens and control points around the house appeals to me as I’m sure it would for lots of other people.

Rather than phasing out devices with operating systems that no longer work, having an option to reuse the device with a different operating system (changed) so it can operate as part of a home automation system would have massive appeal to the market and help drive the sustainability agenda. Okay, reduce the functionality of the phone to help secure it, but lets keep these devices useful with some code.

Okay so my screen may have a crack in it, but a screen protector over that and put into a cradle on the wall suits me fine.

So whats next? Dig out my old device, put some power in it and see what I can do with Home Automation.

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • Pinterest

Like this:

Like Loading...

Smart Home – How many Hubs?

07 Tuesday Nov 2017

Posted by Max Hemingway in Connected Home, Digital, IoT, Security

≈ 2 Comments

Tags

Connected Home, Digital, IoT, Security

Planning a Connected HomeWith the typical home now being enticed into the world of the “Smart Home”, IoT (Internet of Things) and Connected Everything the number of hubs being offered with each service is growing.

So what is a hub? A hub is a device or service running on a device/computer that acts as a connection point for devices to connect to the internet.

Lets assume that you have 4 devices that need connecting to the internet so that you can control them via a personal assistant (Alexa, Siri, Google, etc) or an app on your mobile phone. For this example think of the devices as light bulbs.

The devices (light bulbs) connect using a wireless protocol to a hub. This will be a protocol that has been chosen by the vendor and is not able to be changed, such as:

  • 6LowPan
  • ZigBee
  • Z-Wave
  • Wi-Fi
  • Bluetooth

See “IoT Device Security Considerations and Security Layers – Network Communication”

The hub will then be connected to your home router either by a wired connection or another wireless protocol (Wireless Protocol 2). This will typically be set to the same level that your home WiFi is set to (i.e. WPA2).

The hub will then send its data to which every internet service is providing the service and allow connection to your controlling devices.

Connected Home Hub Diagram

Typical device and hub design

As the number of services grows that you can consume, the number of hubs required will also grow.

Connected Home Multiple Hub Diagram.jpg

Multiple Hubs in the Home

There is currently not much drive for integration of the hubs or a central generic hub to bring these devices together and a home may have between 1 to 5 hubs as the smart home grows.

The services that we consume is currently down to personal choice, however there are developments that will force a level of connectivity onto home owners.  The first will be the Smart Meters, although this is sometime off as the target is 2020 for installations of Smart Meters.

One of the latest developments is the insurance market, looking at the use of IoT to help bring down insurance premiums.

We may not think too much about hubs as they may be hidden within another device, such as the latest Alexa with inbuilt Philips Hue Hub, however they are there.

The hub is here to stay, but how many do we really need within a connected home.

Further Reading:

  • A-Z of Digital – I is for IoT

Blog Series on:  IoT Device Security Considerations and Security Layers. 

  • Power Source
  • Chipset
  • Storage/Data
  • Sensor/Instrument
  • Operating System
  • Application
  • Device/Application API’s
  • User Interface
  • Access Control & Authentication
  • Encryption
  • Network Communication

 

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • Pinterest

Like this:

Like Loading...

A-Z of Digital – I is for IoT

25 Tuesday Jul 2017

Posted by Max Hemingway in Digital, IoT

≈ 2 Comments

Tags

Digital, IoT

ThingsFollowing on from my blog post outlining an A-Z of Digital, here is “I is for IoT”.

IoT (Internet of Things) is where physical things are connected by the internet using embedded sensors, software, networks and electronics. This allows the items to be managed, controlled and reported on.

There are lots of news stories of IoT devices being developed to enhance our lives. Some of these are user controlled and some with a central control such as the ability to turn on a washing machine when renewable energy is available. Some supermarkets already use a similar service to reduce power bills by allowing remote control of power to refridgerators.

There are many reports estimating the number of IoT devices likely to be connected in the future, these are between 20 and 50 Billion devices by the year 2020.

With all the developments in IoT, the main concern is that of security and the ability to stop a hack or a control takeover of the IoT devices.

Hybrid IoT networks will help with protection for businesses providing a perimeter for protecting IoT devices and data, but end users will need additional security to help protect themselves.

A number of IoT Standards have been drafted such as:

  • IOT Security Compliance Framework
  • Connected Consumer Products
  • Vulnerability Disclosure

however there are a number of groups introducing a set of standards and frameworks across the industry for IoT.

Choosing to follow best practices is a good thing. Choosing which best practice to follow can be a harder choice to make.

Until such time as a couple or even one set of standards, a hybrid Best Practice may present a good approach, picking the synergies between the best practices and standards, then bringing in the other ones needed.

These latest best practice standards do state that they are generic and up to the indivudal to adopt.

Further reading:

Blog Series on:  IoT Device Security Considerations and Security Layers. 

  • Power Source
  • Chipset
  • Storage/Data
  • Sensor/Instrument
  • Operating System
  • Application
  • Device/Application API’s
  • User Interface
  • Access Control & Authentication
  • Encryption
  • Network Communication
  • Security/Security API’s

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • Pinterest

Like this:

Like Loading...

A to Z of Digital

19 Monday Jun 2017

Posted by Max Hemingway in Automation, Cobotics, Digital, Innovation, IoT, Machine Learning, Open Source, Programming, Robotics, Security, Social Media, Tools, Wearable Tech

≈ 26 Comments

Tags

Automation, Blockchain, Cobot, Digital, IoT, Machine Learning

ABCBeing Digital, Journey to Digital, Digital, 21st Century Humans, are phrases that are common place in many conversations around business and technology. But what does it mean to be “Digital”.  This is a wide subject to cover in a single blog post, so here is an A-Z of Digital to help.

I will break these down in further blog posts going into each subject in more detail.

A – Automation

The manual tasks of today should be the automated tasks of tomorrow, achieved using tools that interface with systems using API’s and commands that join them together to carry out tasks. From turning your heating on using an application to automatically carrying out a set of repetitive tasks to allow other more complex tasks to be undertaken.

B- Blockchain

A blockchain is a distributed database that is used to maintain a continuously growing list of records, called blocks. Each block contains a timestamp and a link to a previous block. A blockchain is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks. By design, blockchains are inherently resistant to modification of the data. (Wikipedia).

C – Cobots

Cobots are Robots that are adapted and programmed to work and interact with humans in various tasks and levels of activity. Imagine you’re working buddy is a cobot that can perform tasks hand in hand with you, take over if you need to do something else, increase its speed of completing the tasks, then sense your return and slow to the speed your working at.

D – Digital

“Digital” is an umbrella word that covers many different topics. There are many definitions available, but for me this is about how we unlock the capabilities available today and use them to better our lives and society. From a business view this is about growth and transforming through processes and technology. Being Digital is not necessarily about having the latest gadgets, but more around how you are using them and what you do.

E – Evolution

Evolution covers the advancements and new technologies that are being discovered and created every day.  There are lots of new ideas and products coming out of sites such as crowdfunding and crowdsourcing sites, some work however some do fail. These sites are worth tracking to see what developments are coming around the corner.

F – Fitness Trackers

Fitness trackers are probably one of the most common wearable that is available today and have been around for a number of years.  Trackers have developed to include a wide range of functionality including heart rate, blood pressure, location, altitude making the data useful to the health and medical industries to understand how we lead our lives.

G – Geolocation

Geolocation ties into a lot of the items in this list and provides a basis for providing location and tracking capabilities for devices and applications. It is also used to locate and pinpoint where users are. Some services cannot be consumed these days without agreeing to having this information shared with a site. The most common type of application in wide use is a Sat Nav.

H – Hybrid

Hybrid is used as a term to describe a mix of public and private services, such as a Hybrid Cloud where services can be mixed between traditional on premise/data centre services and cloud services, providing some control or orchestration layer across both to allow users to consume based on policy or requirements.

I – IoT

IoT (Internet of Things) is where physical things are connected by the internet using embedded sensors, software, networks and electronics. This allows the items to be managed, controlled and reported on. There are many reports estimating the number of IoT devices likely to be connected in the future, these are between 20 and 50 Billion devices by the year 2020.

J – Jacking

Jacking is a term used when you plug into something. Body Jacking is a growing area where the body is being used from generating power through movement to implanting chips to interact with the environment such as open a door or unlock a computer. This also covers Bioables which collect data on your body such as glucose levels using sensors that penetrate into the under the skin.

K – Knowledge

Understanding what is going on in your streams, market places and industries is a big task. Lots of information coming in on a daily basis – drinking from the fire hose, not able to consume it all. Creating your Personal Knowledge Management System will help navigate the sea of information and pick out what is key to your situation and what can be dropped.

L – Legal

With the increasing about of things interacting with our daily lives, the area of Legal and Security play a big part. There are a number of important questions to ask – Where is your data being stored and who actually owns it. Is your data secure and have you implemented all the right controls? What does Legistlation such as GDPR mean to you?

M – Machine Learning

Machine Learning (ML) allows a computer to learn and act without being explicitly programmed with that knowledge. An example of Machine Learning Algorithm is a web search engine that brings up a number of results based on your search criteria and shows which could be most relevant to what you are looking for.

N –  Networks

Networks and connectivity form the backbone of the systems in use today. Using a number of different types of network from Cellular (3G, 4G) to traditional networking and futures of 5G and Neural Networks speeding up how we create, consume and process data.

O – Organisation

Infrastructure as Code looks at making hardware being able to controlled at a code level, allowing Microservices and the ability to consume capability quickly. The next stage is the Organisation as Code. A great example of an Organsation as Code is Uber, building services and the supporting organisation in the cloud that allows it to be consumed anywhere and the drivers to login and become part of that organistation for the period that they are employed.

P – Programming

Everyone should learn to code. Learning to code (Programme) in a language like Scratch, Python, Java, C, etc. The ability to code will allow someone to understand how they can automate a task using tools and API’s.

Q – Quantum Computing

A computer which makes use of the quantum states of subatomic particles to store information (Dictionary). Quantum Computers are being developed with the ability to compute data at an exponential rate allowing for quick computing of complex data.

R – Robots

The vision of Robots has been around in early Science Fiction and are very much a reality today. From an automated manufacturing plant to a robot to help you shop and carry out tasks. The field of robotics is advancing bring in Artificial Intelligence and Machine Learning to boost their capabilities and means to learn, self-think and complete tasks.

S – Social

Being social is not just around how you use the tools and what you tweet, but also what you don’t say and being Social Media savvy on your communications. There is a large number of social tools available with some well-known such as Twitter, Facebook and Linked in to those not so. It is also about how you organise your life with these tools and use them for productivity and security.

T – Twenty First Century Digital

The term 21st Century Digital applies to the current century and how you are using Digital to better your organisation and yourself. The LEF (Leading Edge Forum) has information that covers these two topics as the 21st Century Organisation and 21st Century Human.

U – Usability

The usability and user experience of devices is key.  Understandoing and being able to interact with devices is important. If a someone can’t use the application or device they may start looking for an alternative that they can use.

V – Visionables

Visionables moves the wearables market to technologies that help enhance our experiences through what we see. This covers things like Smart Glasses, Virtual Reality, Augmented Reality and Mixed Reality.

W – Wearables

The field of wearables is expanding with more ways to attach sensors and record data about our daily lives. This typically covers anything that you can wear or attach to your body and in the main interfaces with a mobile to be the central data point, although many devices operate separately and can transmit data themselves.

X – Xperience

Xperience covers how we use these technologies and advancements to shape our lives and the effects that they have on them. How we have moved from the days of the first computer to today’s wearable and interactive society.

Y – Yottabyte

Yottabyte is a term used to define an amount of storage.  The prefix yotta indicates multiplication by the eighth power of 1000 or 1024 (Wikipedia). The amount of storage used today is seeing huge daily growth with systems currently using petabytes of data. The trends will increase the amount of storage needed to hold data.

Z – Zabeta

Zabeta is a noun meaning Tarrif or Tax. As we move to a more automated society there is a view point that automation and robots should be Taxed.

This is my current A to Z and some of the entries may be different in your version. Do you agree with the list? Whats in your “A to Z of Digital”?

 

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • Pinterest

Like this:

Like Loading...

Do It Yourself – AI Assistants

26 Friday May 2017

Posted by Max Hemingway in IoT, Programming, Raspberry Pi, Tools

≈ Leave a comment

Tags

IoT, Open Source, Programming, RaspberryPI, Tools

CyborgThe options available to consume voice activated assistants are increasing with recent releases within the market.

The availability of pre-built off the shelf Assistants is growing and so is the ability to build your own using the open sourced versions.

Google recently gave away AIY (Do It Yourself Artificial Intelligence) a maker kit, with Voice Hat and components to work with a Raspberry PI on the front of the Raspberry PI Magazine issue 57 – (MagPI) inline with the release of the https://aiyprojects.withgoogle.com/

The demand for this kit was very high and as a result unfortunately there are none left and not much information at the moment of the kit becoming available for sale. There is a waiting list available and it will probably be released depending upon demand.

This aside whilst we await the release of the sale kit for AIY, you can still take advantage of the AIY capabilities and a Raspberry Pi 3 in a similar way to installing Amazon Alexa onto the PI.

  • Google AIY Build
  • Raspberry Pi 3
  • Generic Aux Speaker
  • USB Microphone

You could go one better by running both Alexa and Google AIY on the same Raspberry PI, using a build from xtools called AssistantPi.

AssistantPi is basically a tweak of AlexaPi. It includes the Google Assistant SDK and uses AlexaPi’s hotword recognition to activate either Assistant or Alexa. The installer provides an easy way to get everything set up in just under an hour.

https://www.hackster.io/xtools/assistantpi-74b772

A great project to try out and learn from, giving you the power of both Alexa and Google.

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • Pinterest

Like this:

Like Loading...

Voice Assistants and The Letterbox Problem

16 Sunday Apr 2017

Posted by Max Hemingway in Digital, IoT, Productivity, Security, Tools

≈ Leave a comment

Tags

Digital, IoT, Security, Voice

microphone-338481_960_720There are lots of voice activated tools and services now available from software on your PC and in your car to physical hardware you can place around your home. These devices are becoming everyday occurrences, “Alexa, whats the weather”, “Siri, recipe for  Chocolate Cake” (too many to list).

The two main ways to control them is via a button press then speaking such as my car to get it into a listening state, or they are always in a listening state awaiting a set of specific interaction commands, such as the applications name. There is at least a turn of listening mode.

However with all these devices and software, there is a distinct lack of security around voice recognition and lack of interaction security. For instance a recent incident where a TV show caused a number of Dolls Houses to be purchased.

We are busy connecting these devices to all sorts of home automation to make it easier to do things, but how many stop to think of what I term as: “The Letterbox Problem”. This is where you have automated your home to a level that includes things like your lights, powered items and your house alarm. As you walk into your house you can say voice commands to turn on lights, put the kettle on and turn off the alarm. The Letterbox Problem happens when someone has the ability to literally shout through your letterbox and activate or deactivate items in your house. To a would be thief, turning lights on and off will check to see if anyone is at home first before going for the alarm.

There is a security challenge here is to ensure that a level of voice recognition and security controls are in place. Voice recognition by itself is not good enough as I’m sure you’ve heard an impressionist mimic a celebrity on a TV or Radio show.

I would like to see a form of two factor authentication on a voice system so it can be sure its me before it carries out the task. Voice may be one of these, but something else like a token code or app on the phone may be a solution.

There a number of basic steps you can take at the moment to help protect yourself such as:

  • Think about the systems you are connecting the voice device to. Can it compromise your security if anyone else uses it.
  • Use the mute button on devices or turn of listening mode when not in use.
  • Keep the devices updated with the latest patches and firmware.
  • Use good password security practices on any sensitive systems you use (ie Bank Accounts, Paypal etc).
  • Use strong passwords on any associated accounts to the voice assistants, (ie Amazon, Google, Apple etc).
  • If your system allows it, clear out its cache and old activities on regular basis so they can’t be replayed against you.
  • Don’t have a system listening when the TV or Radio is on, especially when your out of the room. You may end up with a new dolls house.

 

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • Pinterest

Like this:

Like Loading...

How secure is your home in the digital age?

06 Friday Jan 2017

Posted by Max Hemingway in Digital, IoT, Security

≈ Leave a comment

Tags

Digital, IoT, Security

censorship-610101_640Reports from CES 2017 is seeing some great advancements in consumer tech coming out in the journey to digital. Coupled with some recent reports from around the web I have been thinking about the question “How secure is my home in the digital age?”

There are several ways into your home in the digital age. These could be grouped as several main areas:

  • Physical
  • Electricity/Power
  • Comms ( Landline & Fibre/Broadband/Wifi)
  • Mobile
  • Media (Things you bring into your home)

The below is some food for thought on some recent highlights in the news.

Physical

Physical security is a thing we normally take for granted these days. Good front and back doors with locks. Fences, gates, spiked bushes as well as house alarms make us feel fairly secure in our castles (homes).

There are some considerations though to physical security though as these days you can purchase a lock picking kit off amazon for £10.00. These are mainly for the purposes of learning and taking part in a growing hobby of lock picking for fun (There are national competitions for this) and I am certainly not suggesting any type of activity that is against the law.

Makes you stop and think though! I have taken the steps of upgrading my locks to anti-bump, anti-pick and anti-snapping ones just to be safe.

Most dwellings now have alarms. Some smarter than others as alarms can now be connected through wifi and connected to voice services such as Alexa.

https://www.cnet.com/uk/news/scouting-out-a-security-system-that-talks-to-amazons-alexa/

I’m in two minds about this level of connectivity – “Alexa, disable the house alarm” shouted through the letterbox could be a valid command on some systems.

Electricity/Power

Electricity is the lifeblood of the Digital Age. Without power to devices they are not really going to work.

Batteries and Energy Harvesting aside the main focus area for homes is the smart meter. This is usually placed inline before the electricity cable enters the home.

This is probably the most difficult for a home user to secure against a hacker coming in and from recent press probably the most worrying at the moment.

Hackers can attack smart meters and cause significant damage

http://www.theregister.co.uk/2017/01/04/smart_metres_ccc/

There is still someway to go to ensuring protection from this type of hack in the future.

Comms

Connectivity into the home is common place with routers and a level of firewalls in place. With the rise of connected devices, consumers may need to think about increasing their security and firewalls to cope with the increasing number of devices wanting connectivity back to the web.

LG are going to be putting wifi into every appliance it releases in 2017

http://arstechnica.co.uk/gadgets/2017/01/lg-wi-fi-in-everything/

Its essential to ensure any wifi used is secured and encrypted and router settings are changed from defaults where possible.

Mobile

I could have grouped this into the comms grouping, however the mobile is becoming more a personal control hub for our environments.

Android malware can manipulate your router

http://www.zdnet.com/article/this-android-infecting-trojan-malware-uses-your-phone-to-attack-your-router/

Good practices and checking the validity of apps can help against downloading malware. Also a good security app on the device will help.

Media

In this grouping I am classing anything that you bring into your home outside of the internet and connect it to a device. There are still a lot of USB sticks used and other media so anti-virus and malware checking is essential.

With these things in mind, the consumer has a lot of things to consider as they allow their home to become more connected. Following good security practices needs to become second nature and perhaps more communication to the person on the street on security when an item is purchased.

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • Pinterest

Like this:

Like Loading...

IoT Best Practice Guidelines – Many more out there…

13 Tuesday Dec 2016

Posted by Max Hemingway in IoT, Security

≈ 2 Comments

Tags

IoT, Security

ThingsThe IOT Security Foundation has released three best practice guidelines on:

  • IOT Security Compliance Framework
  • Connected Consumer Products
  • Vulnerability Disclosure

I am currently reading through these with interest, especially the paper on Vulnerability Disclosure. Something that some companies do well and and some not so. I can see companies legal departments advising on this one, however it is an important topic for the industry to address.

These best practices provide one lense to look through on the issue of IoT Security as the industry still has a journey to complete with providing as set of universal standards due to the number of Groups and Communities publishing best practices, guidelines and standards. Some are specific to products and services and some are generic.

I have previously listed a number of IoT Groups in a previous blog post on IoT Standards

Links below from that blog post to some of the Groups/Communities

  • Architectural Framework for the IOT
  • IoT Consortium
  • IoT Global Standards Initiative
  • IoT Open Standards
  • IoT Trust Framework
  • IoT Security Foundation
  • Industrial Internet Consortium
  • Joint Coordination Activity on IoT
  • NIST (National Institute of Standards and Technology)
  • Open Interconnect Consortium
  • Open Management Group Industrial IoT
  • World Forum 2015 Standards

I had not listed the IoT Security Foundation on that original list so have added above. There are probably groups and comitties not listed here. Please comment below if you know of any others.

Choosing to follow best practices is a good thing. Choosing which best practice to follow can be a harder choice to make.

Until such time as a couple or even one set of standards, a hybrid Best Practice may present a good approach, picking the synergies between the best practices and standards, then bringing in the other ones needed.

These latest best practice standards do state that they are generic and up to the indivudal to adopt.

 

 

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • Pinterest

Like this:

Like Loading...

Tiny computing – VoCore2

06 Sunday Nov 2016

Posted by Max Hemingway in Development, IoT, Open Source, Programming

≈ Leave a comment

Tags

Development, IoT, Open Source, Programming

split1.pngSearching round on the crowdfunding sites for things that are coming, I found the VoCore2 on iniegogo.

https://www.indiegogo.com/projects/vocore2-4-coin-sized-linux-computer-with-wifi#/

VoCore has already had an v1 early release and is now heading for a v2 release in January 2017. The cost of this board is $4, although as you start to add the additional boards the cost can go up to around $50.

VoCore2 is a open source linux computer and a full functional wireless router but its size is smaller than a coin. It can perform as a VPN gateway to secure your network, an airplay station to play loseless music, a private cloud to store your photo, video and code. Benefit for its small size and low power consume, it can be easily mounted in wall, help you boost wireless signal in every room or setup house based mesh network.

What I do like about this design is that its small and compact and can be used for a lot of different purposes:

  • VPN Router
  • IoT/Appliance Control
  • Music Player/Streaming
  • Wifi

Its ability to be added to an existing ethernet socket and add heaps of functionality to the socket and its open source makes this device interesting for me, as well as its ability to then act as a wifi extender from that socket.

I would like to look at what could be done with it to provide additional IoT Security to a device plugged in/connected to a network utilising this board. So looks like another board on the wish list to have a go on.

Pin Outs for the board:

vocore

Source/Pics: https://www.indiegogo.com/projects/vocore2-4-coin-sized-linux-computer-with-wifi#/

 

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • Pinterest

Like this:

Like Loading...

Raspberry Pi and New Starter Kit

14 Wednesday Sep 2016

Posted by Max Hemingway in Development, IoT, Programming, Raspberry Pi

≈ Leave a comment

Tags

Development, IoT, Programming, RaspberryPI

PIRaspberry Pi has reached a staggering 10 Million Pi devices.

It’s a long way from the reports back in May 2012 that 20,000 units had been shipped.

Moving from their bare bone boards and then buying a starter kit from 3rd parties to get you going on a Pi Adventure. Raspberry Pi are now producing  their own Starter Kit which includes the following:

  • A Raspberry Pi 3 Model B
  • An 8GB NOOBS SD card
  • An official case
  • An official 2.5A multi-region power supply
  • An official 1m HDMI cable
  • An optical mouse and a keyboard with high-quality scissor-switch action
  • A copy of Adventures in Raspberry Pi Foundation Edition

For me the best project that I have undertaken yet is the Amazon Alexa on the Pi3. However there are some others that I want to get round to such as

Jarvis Home Automation

https://hackaday.io/project/1214-project-jarvis-ai-home-automation-assistant

Multi Room Music Player

http://www.instructables.com/id/Raspberry-Pi-Multi-Room-Music-Player/

Gamer Coffee Table

http://www.instructables.com/id/Coffee-Table-Pi/

If your stuck for project ideas with your Pi, here is a link to 682 projects from Hackerday

https://hackaday.io/projects/tag/raspberry%20pi

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • Pinterest

Like this:

Like Loading...
← Older posts

Technology Couch Podcast

Technology Couch Podcast

Topical discussions with different guests on Technology

Chat and views on latest Technology trends, news and what is currently hot in the industry

Max Hemingway

  • Listen on Apple Podcasts
  • Podcast RSS Feed

RSS Feed

RSS Feed RSS - Posts

Currently Reading

@HemingwayReads

Other Publications I contribute to

https://sparrowhawkbushcraft.com/

Recent Posts

  • My Virtual Selfie – Avatars and Identity Security
  • Air Launching Satellites into Space – UK First
  • Our Acceptance of Modern Technologies
  • Pen based Productivity Tools – The Chronodex 2023
  • Top 10 Tech Podcasts for 2023

Categories

  • 21st Century Human
  • 3D Printing
  • Applications
  • Architecture
  • Arduino
  • Automation
  • BCS
  • Big Data
  • Certification
  • Cloud
  • Cobotics
  • Connected Home
  • Data
  • Data Fellowship
  • Data Science
  • Development
  • DevOps/OpsDev
  • Digital
  • DigitalFit
  • Drone
  • Enterprise Architecture
  • F-TAG
  • Governance
  • Health
  • Innovation
  • IoT
  • Machine Learning
  • Micro:Bit
  • Mindset
  • Mobiles
  • Networks
  • Open Source
  • Podcasts
  • Productivity
  • Programming
  • Quantum
  • Raspberry Pi
  • Robotics
  • Scouting
  • Scouts
  • Security
  • Smart Home
  • Social Media
  • Space
  • STEM
  • Tools
  • Uncategorized
  • Wearable Tech
  • Windows
  • xR

Archives

Reading Shelf

Archives

Recent Posts

  • My Virtual Selfie – Avatars and Identity Security
  • Air Launching Satellites into Space – UK First
  • Our Acceptance of Modern Technologies
  • Pen based Productivity Tools – The Chronodex 2023
  • Top 10 Tech Podcasts for 2023

Top Posts & Pages

  • Data Fellowship - BCS Level 4 Certificate in Data Analysis Tools
  • A formula for Innovation
  • Have you tried R yet?
  • Personal Knowledge Management System
  • The Nature and Cycle of CPD
  • Data Fellowship - BCS Level 4 Diploma in Data Analysis Concepts
  • My Virtual Selfie - Avatars and Identity Security

Category Cloud

21st Century Human Architecture Automation Big Data Cloud Cobotics Data Data Science Development DevOps/OpsDev Digital DigitalFit Enterprise Architecture Governance Innovation IoT Machine Learning Mindset Open Source Podcasts Productivity Programming Raspberry Pi Robotics Security Social Media STEM Tools Uncategorized Wearable Tech

Tags

# 3D Printing 21st Century Human Applications Architecture Automation BCS Big Data Blockchain Certification Cloud Cobot Cobotics Coding Communication Connected Home Continuous Delivery CPD Data Data Fellowship Data Science Delivery Development DevOps Digital DigitalFit Digital Human Docker Drone Email Encryption Enterprise Architecture Framework GTD Hashtag Infographic Information Theory Innovation IoT Journal Knowledge learning Machine Learning Micro:Bit MicroLearning Mindset Mixed Reality Networks Open Source OpsDev PKMS Podcasts Productivity Programming Proving It R RaspberryPI Robot Robotics Scouts Security Smart Home Social Media Standards Statistical Inference STEM Technology Couch Podcast Thinking Tools Training Visualisation Voice Wearable Tech Windows xR

License

Creative Commons Licence
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Blog at WordPress.com.

  • Follow Following
    • Max Hemingway
    • Join 71 other followers
    • Already have a WordPress.com account? Log in now.
    • Max Hemingway
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d bloggers like this: