The document discusses a home automation system built using a Raspberry Pi device. Key components of the system include an Amazon Echo for voice control, a Raspberry Pi connected to an 8-channel relay to control higher voltages, and various home devices like outlets and speakers. The system uses a "fomo" script to allow the Raspberry Pi to be detected as a smart home device and be remotely controlled. Fingerprint biometrics could provide additional security for sensitive device control via the Raspberry Pi system. Instructions are also provided on setting up a basic Raspberry Pi computer system using common accessories.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7
This whitepaper details research conducted by Rapid7, which reveals that around 40-50 million network-enabled devices are at risk due to vulnerabilities found in the Universal Plug and Play (UPnP) protocol. UPnP enables devices such as routers, printers, network-attached storage (NAS), media players and smart TVs to communicate with each other. The paper investigates how three groups of security flaws relating to the UPnP protocol are exposing millions of users to attacks that could lead to a remote compromise of the vulnerable device.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7
This whitepaper details research conducted by Rapid7, which reveals that around 40-50 million network-enabled devices are at risk due to vulnerabilities found in the Universal Plug and Play (UPnP) protocol. UPnP enables devices such as routers, printers, network-attached storage (NAS), media players and smart TVs to communicate with each other. The paper investigates how three groups of security flaws relating to the UPnP protocol are exposing millions of users to attacks that could lead to a remote compromise of the vulnerable device.
Raspberry Pi - Unlocking New Ideas for Your LibraryBrian Pichman
Join Brian Pichman as he uncovers the world of microcomputing; which are low cost, small computers (ranging from the size of a credit card to a stack of credit cards). Brian will cover Raspberry Pi's and how they can be used in your library; from attendance counters, event displays, library programming and more.
Ijaems apr-2016-17 Raspberry PI Based Artificial Vision Assisting System for ...INFOGAIN PUBLICATION
The main aim of this paper is to implement a system that will help blind person. This system is used by a RASPBERRY PI circuit to provide for the identification of the objects, the first level localization. It also incorporates additional components to provide more refined location and orientation information. The input process is to capture every object around 10m and it is convert into the output processing in voice command which is adopted in Bluetooth headset which is used by blind people using RASPBERRY PI component.
A futuristic approach for towerless mobile networks wheezy piIJLT EMAS
It is an attempt to develop the mobile networks to
have a wireless voice call happening without the help of the
towers. Our main aim is to remove the towers in the
communication process. The towers have been hazardous to
Living Organism. This project mainly consists of Raspberry pi
and Wi-Fi router. We used two raspberry pi kits of version 3
with Wi-Fi inbuilt on it which can access till the distance of 30
meters,which is used to develop a voice call application to
transfer the voice through the Wi-Fi communication. It would be
possible to expand this communication by the use of WIMAX
which would be able to communicate in the range of kilometers.
For live transmission of audio and video, we have used VOIP
(voice over internet protocol) with the help of gstreamer and gstlaunch
libraries, IEEE standard 802.11 for wireless network,
LCD screen for GUI interface ,programmed in Python language
as it is recommended by Raspberry pi foundation and is freely
available for LINUX, Windows operating system. A hardware
implementation is developed and the results were analyzed for
performance.
In the last few years the advancement technologies were improved in many ways using internet of things. It gives efficient and accurate results. Now we proposed a novel technique, which is used to operate any electrical component or components in home, office or any other place and control all these components like electrical bulbs, fans, refrigerators, etc. Through privacy based and customized way using electronic mail (e-mail). The experimental results conducted on Home Automation using Raspberry Pi.
IOT: Home Automation using Android ApplicationNikhil Jadav
Mobile devices are ideal in providing a user interface, they are portable and their wide range of capabilities. They can communicate with the Home automation network through an internet gateway, and also it can also directly, as these devices usually implement low power communication protocols, such as Wi-Fi.
complete Lab manual as Per AKTU syllabus that file contains Internet of Things they contains following topic
1. Familiarization with concept of IoT,
Arduino/Raspberry Pi and perform necessary
software installation.
Will be able to understand IoT,
Arduino/Raspberry Pi, and also able to
install software setup of Arduino/
Respberry Pi
2
To interface motor using relay with
Arduino/Raspberry Pi and write a program to
turn ON/OFF motor.
Able to use relay to control motor and
other mechanical devices
3
To interface sensors* with Arduino/Raspberry Pi
and write a program to displaysensors data on
the computer screen.
Able to retrieve data from sensors and to
display it on computer screen
4 To interface OLED with Arduino/Raspberry Pi
and write a program to display sensor data on it.
Able to retrieve data from sensors and to
display it on OLED
5
To interface sensor with Arduino/Raspberry Pi
and write a program to turn ON/OFF Relay when
sensor data is detected.
Able to control relay with help of
microcontroller and sensors
6
To interface sensor with Arduino/Raspberry Pi
and write a program to turn ON/OFF Solenoid
valve when sensor data is detected.
Able to control Solenoid valve with help of
microcontroller and sensors
7
To interface sensor with Arduino/Raspberry Pi
and write a program to turn ON/OFF Linear
Actuator when sensor data is detected.
Able to control linear actuator with help
of microcontroller and sensors
8
To interface sensor with Arduino/Raspberry Pi
and write a program to turn ON/OFF Starter
Motor when sensor data is detected.
Able to control Starter Motor with help of
microcontroller and sensors
9
To interface Bluetooth with Arduino/Raspberry
Pi and write a program to send sensor data to
smart phone using Bluetooth.
Able to communicate sensor data from
microcontroller to smart phone
10
To interface Bluetooth with Arduino/Raspberry
Pi and write a program to turn Actuators*
ON/OFF when message is received from smart
phone using Bluetooth.
Able to control actuators using mobile
phone through Bluetoth
11 Write a program on Arduino/Raspberry Pi to
upload Sensor data to thingspeak cloud.
Raspberry Pi - Unlocking New Ideas for Your LibraryBrian Pichman
Join Brian Pichman as he uncovers the world of microcomputing; which are low cost, small computers (ranging from the size of a credit card to a stack of credit cards). Brian will cover Raspberry Pi's and how they can be used in your library; from attendance counters, event displays, library programming and more.
Ijaems apr-2016-17 Raspberry PI Based Artificial Vision Assisting System for ...INFOGAIN PUBLICATION
The main aim of this paper is to implement a system that will help blind person. This system is used by a RASPBERRY PI circuit to provide for the identification of the objects, the first level localization. It also incorporates additional components to provide more refined location and orientation information. The input process is to capture every object around 10m and it is convert into the output processing in voice command which is adopted in Bluetooth headset which is used by blind people using RASPBERRY PI component.
A futuristic approach for towerless mobile networks wheezy piIJLT EMAS
It is an attempt to develop the mobile networks to
have a wireless voice call happening without the help of the
towers. Our main aim is to remove the towers in the
communication process. The towers have been hazardous to
Living Organism. This project mainly consists of Raspberry pi
and Wi-Fi router. We used two raspberry pi kits of version 3
with Wi-Fi inbuilt on it which can access till the distance of 30
meters,which is used to develop a voice call application to
transfer the voice through the Wi-Fi communication. It would be
possible to expand this communication by the use of WIMAX
which would be able to communicate in the range of kilometers.
For live transmission of audio and video, we have used VOIP
(voice over internet protocol) with the help of gstreamer and gstlaunch
libraries, IEEE standard 802.11 for wireless network,
LCD screen for GUI interface ,programmed in Python language
as it is recommended by Raspberry pi foundation and is freely
available for LINUX, Windows operating system. A hardware
implementation is developed and the results were analyzed for
performance.
In the last few years the advancement technologies were improved in many ways using internet of things. It gives efficient and accurate results. Now we proposed a novel technique, which is used to operate any electrical component or components in home, office or any other place and control all these components like electrical bulbs, fans, refrigerators, etc. Through privacy based and customized way using electronic mail (e-mail). The experimental results conducted on Home Automation using Raspberry Pi.
IOT: Home Automation using Android ApplicationNikhil Jadav
Mobile devices are ideal in providing a user interface, they are portable and their wide range of capabilities. They can communicate with the Home automation network through an internet gateway, and also it can also directly, as these devices usually implement low power communication protocols, such as Wi-Fi.
complete Lab manual as Per AKTU syllabus that file contains Internet of Things they contains following topic
1. Familiarization with concept of IoT,
Arduino/Raspberry Pi and perform necessary
software installation.
Will be able to understand IoT,
Arduino/Raspberry Pi, and also able to
install software setup of Arduino/
Respberry Pi
2
To interface motor using relay with
Arduino/Raspberry Pi and write a program to
turn ON/OFF motor.
Able to use relay to control motor and
other mechanical devices
3
To interface sensors* with Arduino/Raspberry Pi
and write a program to displaysensors data on
the computer screen.
Able to retrieve data from sensors and to
display it on computer screen
4 To interface OLED with Arduino/Raspberry Pi
and write a program to display sensor data on it.
Able to retrieve data from sensors and to
display it on OLED
5
To interface sensor with Arduino/Raspberry Pi
and write a program to turn ON/OFF Relay when
sensor data is detected.
Able to control relay with help of
microcontroller and sensors
6
To interface sensor with Arduino/Raspberry Pi
and write a program to turn ON/OFF Solenoid
valve when sensor data is detected.
Able to control Solenoid valve with help of
microcontroller and sensors
7
To interface sensor with Arduino/Raspberry Pi
and write a program to turn ON/OFF Linear
Actuator when sensor data is detected.
Able to control linear actuator with help
of microcontroller and sensors
8
To interface sensor with Arduino/Raspberry Pi
and write a program to turn ON/OFF Starter
Motor when sensor data is detected.
Able to control Starter Motor with help of
microcontroller and sensors
9
To interface Bluetooth with Arduino/Raspberry
Pi and write a program to send sensor data to
smart phone using Bluetooth.
Able to communicate sensor data from
microcontroller to smart phone
10
To interface Bluetooth with Arduino/Raspberry
Pi and write a program to turn Actuators*
ON/OFF when message is received from smart
phone using Bluetooth.
Able to control actuators using mobile
phone through Bluetoth
11 Write a program on Arduino/Raspberry Pi to
upload Sensor data to thingspeak cloud.
Brian Ghilliotti: University of Phoenix: Special Topics in Communication: How...Brian Ghilliotti
Brian Ghilliotti: University of Phoenix: Special Topics in Communication: How Miscommunications In Race, Ethnicity, Religion, and Gender Shaped History
Brian Ghilliotti: University of Phoenix: Special Topics in Communication: Exa...Brian Ghilliotti
Brian Ghilliotti: University of Phoenix: Special Topics in Communication: Examples of How Miscommunications Involving Diversity, Technology, and Ethics Shaped History
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
2. Brian Ghilliotti
Electronic Commerce
Final Exam
5/8/2019
Question 1: There are several investing applications I have discovered that
utilize the Raspberry Pi system. The best example includes a home automation system
(1). In the video referenced in the end notes, the designer has built a home automation
system that is controlled by the Amazon Echo voice recognition system, which seems
connected to an eight channel relay system and a Raspberry Pi device with a USB
connection. It can be controlled by a wireless combined mouse / keyboard device.
There is a Raspberry Pi touch screen device that is connected to a driver, which
are in turn connected to the Raspberry Pi device via a serial ribbon cable connection to
a connector called a MicroSD Card slot (2). The Raspberry Pi is also connected to the
eight channel relay system via thin cabling to a connection device along its top called a
40 pin Extended GPIO.
The eight channel relay helps the Raspberry Pi regulate higher voltages coming
in from home power sources. Connected to the eight channel relay is a four gang
electrical box with two point power outlet electrical devices. Also connected to the
relay is a speaker, via an aux cable. The referenced video describes the camera
connection as one based on using a remote control device hooked to the camera in a
normally closed position, even though it is a device that is in a normally open.
Instead of a battery that powers this normally open remote control device, an
electrical current is sent to the remote control via the relay that it is connected to on the
eight channel relay. This provides the power to the on button in the forced normally
closed system, which triggers the signal to the camera that turns it on. This must be a
time circuit, as it only lasts until power is supplied to the camera connected remote
control.
Raspberry Pi is a device that enables people with varying levels of software and
electronic skills experience to integrate their devices according to their skill level. This
particular home automation system designer used Github to find a script that enables a
Raspberry Pi to be seen as a Wemo device. Wemo devices are electronic home
devices that can be controlled remotely. These include plugs, remote sensors,
switches, or cameras (3). Called “fomo”, the designer use this script since there was no
need for specialized apps, access to specialized operating systems, or complex
scripting knowledge needed to make this device be seen. All that is needed was a wi-fi
connection. The designer modified the “fomo” script in such a way so that commands
to activate a certain device were channeled into one relay, which in turn would be
delegated to the appropriate device.
The designer then described the Alexa system, which is controlled by a mobile
phone app. The app is designed to associate certain devices to specified relays, which
in turn can be “grouped”. By “grouping”, settings can be applied for the app that will
provide power control to certain devices or combinations of devices, which is set
through the user’s mobile phone. When using this system, the user must use the
specific voice name for the device group they turned on, or Alexa will not be able to
understand what the user wants.
3. The concept of controlling devices via a Raspberry Pi to relay system can be
applied to many devices (not just home control devices), wether you want to use a
voice recognition system such as Alexa or not. One expansion of this idea would be
setting up a system that applies biometric security access to these systems. If we use
a configuration where sensitive devices such as data base servers with sensitive
business information or PII, important production or environmental control devices, or
computer systems where they want as little chance for unauthorized access as
possible (most “hacking” is internal), a biometric control system, relying on finger print
readers, could be an answer.
The following video shows us that it is a relatively easy thing to connect a finger
print reader to a USB on a Raspbery Pi device (4).
https://www.youtube.com/watch?time_continue=88&v=SFiqFIMucpg
It is likely that one can program the Raspberry Pi device to see if the channel
connected to the finger print reader is “opened” first, through authorized activation,
before access is granted to all other channels with sensitive devices attached to them.
Research indicates that Alexa voice recognition systems are now integrating finger
print biometric access controls (5).
As an alternative, we use a two layer bio-metric system. One layer could involve
a Raspberry PI connected finger print controlled system, while the second layer
involves a biometric sound wave recognition test from the same user to gain access to
the Alexa control system, also linked to the relay. With a two layer biometric control
system, users could control some of the sensitive devices, while those who have
access to the more sensitive devices must pass the voice recognition test.
Question 2: How to hook up a computer system to a Raspbery PI (6) (see end
note for Youtube link):
Remove Raspberry Pi device from packaging ($35.00)
Remove 16 GB Class 10 micro SD card ($21.00)
Obtain 2 Amp mobile charger for Raspberry Pi ($9.00)
https://www.alliedelec.com/product/raspberry-pi/t5875dv/70812912/?
gclid=EAIaIQobChMInuaL9veM4gIVgh-
GCh2ulACDEAQYAyABEgIqHfD_BwE&gclsrc=aw.ds
Obtain card reader ($7.00)
https://www.walmart.com/ip/USB-card-reader-USB-3-0-Adapter-SD-Micro-SD-Card-
Reader-for-Windows-Mac-Linux-and-Certain-Android/969779658?
athcpid=969779658&athpgid=athenaItemPage&athcgid=null&athznid=PWVAV&athieid
=v0&athstid=CS020&athguid=ad823501-448-16a998eadc1c3e&athena=true
USB Mouse ($7.00)
4. USB Keyboard ($9.00)
HDMI Monitor ($55.00)
https://dependablestore.com/products/asus-vs228h-p-215-full-hd-1920x1080-hdmi-
dvi-vga-back-lit-led-monitor?
cid=1757391576&aid=77193426868&eid=&tid=pla-293946777986&ul=9003365&mt=&
n=g&d=c&dm=&dt&sn&adid=341665905506&k=&p=&pc=&ap=1o3&gclid=EAIaIQobCh
MIlbSztPmM4gIVx0SGCh1ZSAy-EAkYAyABEgJRK_D_BwE
Official Raspberry Pi Universal Power Supply – EU/US/UK/AUS – 2.5A ($9.90)
https://sixfab.com/product/official-raspberry-pi-universal-power-supply/?
utm_medium=ppc&utm_campaign=Shopping+USA&utm_term=&utm_source=adwords
&hsa_src=s&hsa_net=adwords&hsa_kw=&hsa_tgt=pla-293946777986&hsa_ad=32018
5161328&hsa_grp=63517664149&hsa_mt=&hsa_acc=6308888758&hsa_ver=3&hsa_ca
m=1661806251&gclid=EAIaIQobChMI6sXexPqM4gIVxJCfCh0nsQ-
dEAQYASABEgKeI_D_BwE
Place heat sinks that are included on the metal slabs found on the Raspberry, matching
sizes with like sized plates.
Place Raspberry Pi inside plastic casing so that all inputs are exposed.
Go to website for Raspberry Pi and download the Raspbian OS, unzip it (Pick stretch
with desktop).
Download Windows 32 Disk Imager through appropriate website.
Download SD Memory Card Formatter through appropriate website.
Insert memory card through card reader.
Locate downloaded OS file, write on SD card with Windows 32 Disk Imager.
Insert SD Card into Raspberry Pi memory card slot on bottom of plastic case.
Connect HDMI monitor to appropriate multi pin connector on plastic case’s side.
Connect mouse and key board to USB connector group (4 in all) on side of plastic
casing.
Plug in mini power source to micro power supply connecter to left side of HDMI
connector. Look for flashing lights inside plastic casing next to micro power supply
connector.
5. Question 3: List of Software needed:
A: Getting started (see above for implementation points)
- Raspbian OS
- Windows 32 Disk Imager
- SD Memory Card Formatter
- Raspbian OS comes with Libre Office 5, which is a freeware version of the Microsoft
Office suite of software products
- Also apparently comes with Internet connection capability and browser (See 7:20 of
link in endnote 6), wireless capability.
B: Advanced
- you want security (7)
o download putty from internet, unzip it
o find your Raspberry Pi IP using ping tool, enter this IP into Putty
o name the device associated with IP address
o configure the device in BIOS
o @5:15 discusses use of putty gen to create public and private keys, public key on
Raspberry PI, public key on PC.
-LAMP (8) is a suite of internet tools that provide programming languages, database
programs, and software that can manipulate protocols supporting website
development [Linux {Operating System}, Apache {Open source web server software},
Mysql {Open source open relational database program}, Personal Home Page {Open
source scripting program}]
- Wireshark is an open source but tracker and analyzer that is useful for
troubleshooting and security purposes.
- There are numerous options available for engineering type students who need an
open-source graphing and design program:
https://itsfoss.com/cad-software-linux/
Question 4: I do not entirely agree with the statement that people in the United States
want the fastest and most expensive forms of technology. Contrary to what the
mainstream media in America wants you to believe (partially the consequence of
political manipulation), most people in this country , say 85%, are struggling. I think
Raspberry Pi would be widely welcomed in the United States, and I am pretty sure the
major tech giants in this country is well aware of this. Therefore, they will use whatever
combination of economic incentives and pressures, as well as legal incentives and
pressures, to stop wide scale marketing of this product. What really disturbs these tech
giants is that Raspberry Pi has the potential to debase their monopolistic hold on the
6. information technology markets by sparking an interest in this field across all social
groups in this country.
You will have different perspectives leading to new computer engineering discoveries,
which has the effect of creating new products and ideas that these tech giants will
have to compete with. Monopolists do not want competition. Competition destroys
these institutions faster than corruption will destroy a communist government.
I see an even bigger market in the third world, which generally does not have a network
system as well developed as it is in developed nations. We may see a speed up in
technical learning from third world sources as a result of Raspberry Pi, which in the end
means more competition and the ultimate destruction of the tech giants.
Here is a case in point:
“Nigerian student’s mobile app helps lose children find their way home”
https://face2faceafrica.com/article/nigerian-students-mobile-app-helps-lost-children-
find-their-way-home
From their website, the mission of Raspbery Pi is:
“Our Foundation’s goal is to advance the education of adults and children, particularly
in the field of computers, computer science and related subjects”. Raspberry Pi was an
effort to miniaturize and reduce the costs of these technologies to help spur the need
for IT technicians, which will undoubtedly occur when this technology hits third world
markets.
(See: https://www.raspberrypi.org/help/what-%20is-a-raspberry-pi/)
Has this Nigerian student already been exposed to Raspberry Pi technology?
7. End Notes
(1) Make "Alexa" Control ANYTHING! [Mike and Lauren]. Retrieved from: https://
www.youtube.com/watch?time_continue=221&v=rikUkvyDRGg. Published
July 24, 2017. Last viewed: May 8, 2019.
(2) Aqib, Muhammad. “What is a Raspberry Pi?” https://electronicshobbyists.com/
tutorial-1-what-is-raspberry-pi-getting-started-with-raspberry-pi-3/ Undated.
Last viewed: May 8, 2019.
(3) Wikipedia contributors. (2018, March 26). Belkin Wemo. In Wikipedia, The Free
Encyclopedia. Retrieved May 8, 2019, from:
https://en.wikipedia.org/w/index.php?title=Belkin_Wemo&oldid=832551513
(4) Raspberry Pi connect Fingerprint Reader PART1 Demo [Arduino Raspberry Android
Raspberry Pi IoT] Retrieved from:https://www.youtube.com/watch?
v=fsC0oOZCRxk Published January 2, 2018. Last viewed: Last viewed: May 8,
2019.
(5) Liao, Shannon. “This smart lock gives you five ways to unlock your door.” The
Verge. theverge.com January 8, 2019.https://www.theverge.com/
2019/1/8/18174787/lockly-secure-pro-smart-lock-alexa-google-random-
number-price-specs-features Last viewed: May 8, 2019.
(6) How to make a desktop computer using Raspberry Pi [TechnoReview85] Retrieved
from: https://www.youtube.com/watch?v=Vu7FMCM50wU Published October
28, 2017. Last viewed: May 8, 2019.
(7) How to Secure a Raspberry Pi with SSH keys [Expetview2912] Retrieved from:
https://www.youtube.com/watch?v=a4TEY6eR4DM Published March 5, 2015.
Last viewed: May 8, 2019.
(8) MicroNugget: What is LAMP? [CBT Nuggets] Retrieved from:
https://www.youtube.com/watch?v=cxVixM5eOZY Published: July 9, 2012.
Last Viewed: May 8, 2012