Podcasts about Bluetooth Low Energy

Low-power wireless personal area network technology designed and marketed by the Bluetooth SIG

  • 70PODCASTS
  • 98EPISODES
  • 35mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 17, 2025LATEST
Bluetooth Low Energy

POPULARITY

20172018201920202021202220232024


Best podcasts about Bluetooth Low Energy

Latest podcast episodes about Bluetooth Low Energy

The IoT Podcast
From Engineer to Entrepreneur: Bartek Kling's IoT Journey | The IoT Podcast with needCode's CEO

The IoT Podcast

Play Episode Listen Later Apr 17, 2025 33:04


What does it really take to go from writing code to running a company in the fast-moving world of IoT? What happens when a seasoned embedded engineer decides to build a company from scratch? In this episode of The IoT Podcast Show, host Tom White sits down with Bartek Kling, CEO and founder of NeedCode, a company specialising in embedded software services for connected devices. Bartek shares his journey from being a hands-on embedded engineer in the automotive sector to launching and scaling his own successful tech startup. He opens up about the reality of stepping into a leadership role, the unexpected importance of sales and marketing, the art of building long-term client relationships and how NeedCode has carved out a space in a competitive market by focusing on Bluetooth Low Energy and full-cycle product development. Whether you're building the next big IoT product or just want a behind-the-scenes look at what it takes to lead in this space, this episode delivers real insights, lessons learned, and a forward-looking view of the industry. Chapters... 00:00 Introduction to Bartek Kling and needCode 03:43 Bartek's Journey from Engineer to CEO 09:19 Transitioning from Freelancing to Founding NeedCode 12:24 Challenges of Being a Founder and CEO 14:39 Differentiating NeedCode in the Market 16:36 Plans for Scaling NeedCode 19:09 Capabilities and Offerings of NeedCode 23:35 Common Customer Pain Points 26:44 Building a Talent Network for Growth 30:03 Future Trends in IoT 34:24 Security and Privacy in IoT Devices 37:09 Conclusion and Where to Find NeedCode The episode is live on all major listening platforms now! Listen here: https://linktr.ee/theiotpodcast Connect with our guest… https://www.linkedin.com/in/bartek-kling/ About needCode needCode is a European IoT development company that specialises in creating smart product solutions, embedded software, and AI-powered IoT systems. They help businesses design, secure, and optimise connected products while offering strategic support and staff augmentation to bring innovative ideas to market. Find out more: https://needcode.io/ SUBSCRIBE TO THE IOT PODCAST ON YOUR FAVOURITE LISTENING PLATFORM: https://linktr.ee/theiotpodcast Sign Up for exclusive email updates: https://theiotpodcast.com/get-exclusive-access/ Contact us to become a guest/partner: https://theiotpodcast.com/contact/ Connect with host Tom White: / tom5values

Control Amplified
Exploring wireless advances in industrial process

Control Amplified

Play Episode Listen Later Jan 8, 2025 20:34


In the first Control Amplified podcast of 2025, wireless technology expert Ian Verhappen joins Len Vermillion for a discussion on the past, present and future of wireless technology for industrial operations. Among their topics are the fast advances and usage of wireless in industrial plants, why Wi-Fi advancement enables more efficient operations, the growing influence of Bluetooth Low Energy on the plant floor, and the need for cybersecurity to advance in lock step with these technologies. In addition, they look at the process for adopting new technologies in industry and why software will be the focus of development over the next decade.

Adafruit Industries
EYE on NPI: Nordic nRF54L15 Wireless SoC and Development Kit EYEonNPI

Adafruit Industries

Play Episode Listen Later Nov 14, 2024 14:41


This week's EYE ON NPI is another great step forward in Bluetooth Low Energy development, it's Nordic's new nRF54 series (https://www.digikey.com/en/product-highlight/n/nordic-semi/nrf54l15-multiprotocol-soc) and nRF54L15 Wireless SoC Development Kit (https://www.digikey.com/en/product-highlight/n/nordic-semi/nrf54l15-wireless-soc-development-kit). This is the heir-apparent to the popular nRF52840 (https://www.digikey.com/en/products/detail/nordic-semiconductor-asa/NRF52840-CKAA-R/15929796) series chip which we know and love so much. The nRF54 series comes in L and H variants, for 'low' and 'high' power, but even the L series is a step up, with Cortex M33 running at 128MHz, and up to 1.5MB ReRAM (https://en.wikipedia.org/wiki/Resistive_random-access_memory) / 256KB SRAM. The H series is a whole new ball-game with dual M33 running at 320MHz, 2MB of ReRAM and 1MB of SRAM plus upgraded peripherals. Wow, the nRF series has come such a long way from the baby-steps of the SPI-peripheral nRF8001 (https://www.digikey.com/en/products/detail/nordic-semiconductor-asa/NRF8001-R2Q32-T/4626390) to the early ARM Cortex M0 plus BLE combo chip, the nRF51 (https://www.digikey.com/en/products/detail/nordic-semiconductor-asa/NRF51822-QFAB-R7/4626396). We still use that nRF51 in many of our Bluetooth LE boards like the Feather 32u4 and M0 (https://www.digikey.com/en/products/detail/adafruit-industries-llc/2995/5823444), also as a SPI-peripheral-to-BLE converter. The next big upgrade was the nRF52832 (https://www.digikey.com/en/products/detail/nordic-semiconductor-asa/NRF52832-QFAB-R/6051565) which bumped the processor from an M0 to an M4, but didn't do a huge bump to the Flash or SRAM compared the nRF51. The big leap after that was the nRF52840 which is still an amazing chip: USB peripheral means you can use this chip as the main processor, and it can do all your processing, user interface, sensor reading and wireless communication with only a few passives to support it. There was an nRF5340 released about two years ago (https://www.digikey.com/en/products/detail/nordic-semiconductor-asa/NRF5340-CLAA-R/14323741) but much like Windows releases, we tend to skip every other chip. We happened to check digikey.com/new yesterday and saw the nRF54L (https://www.digikey.com/short/zf8pz0cr) series pop up, which is exciting as it was pre-announced about a year ago (https://www.youtube.com/watch?v=XG8bRNaNHrg) and is now shipping to customers! The nRF54L (https://www.digikey.com/short/zf8pz0cr) comes in three variants, which is not surprising because we've seen earlier chips come in 'lite' versions that cut pricing by having less flash or RAM. All variants have a 128MHz Cortex M33 with a RISC-V co-processor, and a BLE stack. One interesting thing we noted, is that instead of flash memory, which is big and expensive and hard to do with modern fab processes, the nRF54 uses ReRAM (https://en.wikipedia.org/wiki/Resistive_random-access_memory) which is non-volatile and uses memristor technology, which is pretty cool! The nRF54 series supports BLE 6, one new capability is channel sounding (https://en.wikipedia.org/wiki/Channel_sounding) which will improve the ability of phones to locate 'find my' tags that have become such a popular usage for the nRF chipset. Traditionally, the nRF52 chips in these tags use RSSI to measure approximate distance. There's been some improvements on the technology such as Angle-of-Attack that was introduced in BLE 5.1 (https://www.youtube.com/watch?v=EosGQtGioiY) but now with a broad-sprectrum burst it's looking like some of the lessons from UWB (https://blog.adafruit.com/2024/03/15/sera-nx040-ultra-wide-band-and-bluetooth-combo-module-eyeonnpi-digikey-digikey-lairdconnect-adafruit/) are being integrated to the BLE specification to improve item location. The nRF54L series is launching with the L15 variant (https://www.digikey.com/short/rd9fr19f), that's the one with the most memory, so it's a good start: once you have your design settled you can transition to the smallest chip you can get away with. They're coming into stock shortly so sign up at DigiKey to get notified when the package you're looking for arrives. While you wait, you can order up one of the nRF54L15-DK (https://www.digikey.com/short/qvhqv85q) dev kits, which are only $39 and in stock right now for immediate shipment. Order today and you'll get everything you need to start developing the nRF54 (https://www.nordicsemi.com/Products/Development-hardware/nRF54L15-DK) - a built in debugger, power management chip, broken out GPIO, user buttons and LEDs. While you wait for your dev kit to arrive, you can start thinking about the nRF54H series (https://www.nordicsemi.com/Products/nRF54H20) which is the high-end chip with dual M33 running at 320 MHz, 1 MB of SRAM, 2MB of ReRAM , high speed USB and I3C support (https://www.youtube.com/watch?v=hC4zkvdVag4)!

AV SuperFriends
AV SuperFriends: Off the Rails - I love not taking notes

AV SuperFriends

Play Episode Listen Later Oct 16, 2024 74:04 Transcription Available


Recorded October 11, 2024 (Yes, I let AI write all this stuff - cjd) We dive into the world of assistive technologies, AI-generated transcripts, and the quirks of Bluetooth systems. Today's discussion zeroes in on the upcoming digital accessibility deadlines, the challenges of compliance, and the importance of starting somewhere, even when the task seems daunting. We also explore the exciting potential of Bluetooth Low Energy audio systems and how they can revolutionize assistive listening in educational environments. Finally, we discuss the peculiarities of AI transcription services. Are they ready for prime time? Spoiler alert: not quite yet. News article: https://www.edsurge.com/news/2024-07-19-are-schools-and-edtech-companies-ready-for-the-digital-accessibility-deadline   Connect with Mikey Shaffer: https://www.linkedin.com/in/mikeyshaffer/ Bluetooth SIG Auracast: https://www.bluetooth.com/auracast/ Ampetronic Auracast: https://www.ampetronic.com/auracast-broadcast-overview/ Listen Technologies monthly webinar on ADA: https://www.listentech.com/training/ Listen Technologies Auri product line: https://www.listentech.com/auri/   AI-suggested alternate show titles: Bluetooth Bonanza The Accessibility Adventure AI Transcription Terrors Assistive Listening Revolution Digital Deadline Drama The Future is Bluetooth Transcription Trials and Tribulations The Great Accessibility Debate Tech Tangles and Triumphs AV Adventures in Accessibility   Better alternative show titles: The Dante for ALS Talk like someone from Kentucky I love not taking notes A bunch of Furbies hanging out   We stream live every Friday, and you can listen to everything we record over at AVSuperFriends.com   ▀▄▀▄▀ CONTACT LINKS ▀▄▀▄▀ ► Website: https://www.avsuperfriends.com ► Twitter: https://twitter.com/avsuperfriends ► LinkedIn: https://www.linkedin.com/company/avsuperfriends ► YouTube: https://www.youtube.com/@avsuperfriends ► Email: mailbag@avsuperfriends.com ► RSS: https://avsuperfriends.libsyn.com/rss   Individual Twitter links: ► Chris Dechter: @cdechter ► Jamie Rinehart: @avsfjamie ► Marc Cholewczynski: @avdiplomat ► Larry Darling: @lsdarling1 ► Justin Rexing: @justinrexing   Donate to AVSF: https://www.avsuperfriends.com/support

IoT For All Podcast
Using Bluetooth Low Energy for IoT Connectivity | Blecon's Simon Ford | Internet of Things Podcast

IoT For All Podcast

Play Episode Listen Later Aug 20, 2024 17:47


In this episode of the IoT For All Podcast, Simon Ford, CEO of Blecon, joins Ryan Chacon to discuss using Bluetooth Low Energy for IoT connectivity. The conversation covers the advantages and challenges of Bluetooth Low Energy, the role of BLE in edge AI, energy scavenging, and other IoT trends, the pragmatic deployment of IoT solutions, and insights into the future of BLE and how it aligns with enterprise requirements. Simon Ford is the founder and CEO of Blecon, a company enabling low-cost cloud connectivity for engineering diagnostics, product analytics, and sensor data using Bluetooth Low Energy. Simon has over 20 years of industry experience in microelectronics, mobile, and IoT, with a strong focus on providing technology to developers. He founded ARM's embed OS to help launch ARM Cortex-M to market alongside other developer technologies such as CMSIS-DAP, DAPLink, and pyOCD, and was technical lead for the ARMv7/NEON architecture used to launch the smartphone revolution. Blecon enables physical products to communicate with cloud applications using Bluetooth Low Energy. Founded in 2021 and headquartered in the UK, Blecon combines the inherent benefits of BLE with the deployment model of WiFi and the network model of cellular to achieve low-cost and low-power IoT connectivity. With its flexible architecture and ease of integration, Blecon democratizes access to Bluetooth Low Energy IoT connectivity. Discover more about Bluetooth and IoT at https://www.iotforall.com More about Blecon: https://www.blecon.net Connect with Simon: https://www.linkedin.com/in/simonford/ (00:00) Intro (00:10) Simon Ford and Blecon (00:33) What is Bluetooth Low Energy? (03:19) Bluetooth Low Energy use cases (07:37) Challenges of Bluetooth Low Energy (10:33) How does BLE relate to other IoT trends? (13:58) Future developments in Bluetooth and IoT (16:33) Learn more and follow up Subscribe on YouTube: https://bit.ly/2NlcEwm​ Join Our Newsletter: https://www.iotforall.com/iot-newsletter Follow Us on Social: https://linktr.ee/iot4all Check out the IoT For All Media Network: https://www.iotforall.com/podcast-overview

Adafruit Industries
EYE ON NPI - Raytac MDBT50Q-1MV2 Module with Nordic Semiconductor nRF52840

Adafruit Industries

Play Episode Listen Later May 23, 2024 6:33


This week's EYE ON NPI is teamwork makin' the dream work - a collaboration between our favorite module makers Raytac (https://www.digikey.com/en/supplier-centers/raytac) and our favorite Bluetooth Low Energy designers, Nordic Semiconductor (https://www.digikey.com/en/supplier-centers/nordic-semiconductor). Together they've created what we think is the best nRF52840 module, the Raytac MDBT50Q-1MV2 (https://www.digikey.com/short/t8hvw1bt). Historically you've had to pick this up direct from Raytac, but now it's stocked by DigiKey which is excellent news for anyone who wants to integrate the powerful nRF52840 with little fuss. The Nordic Semiconductor nRF52840 (https://www.digikey.com/en/products/detail/nordic-semiconductor-asa/NRF52840-QIAA-R/7725407) is not a new chip, we've been selling the Feather nRF52840 (https://www.digikey.com/en/products/detail/adafruit-industries-llc/4062/9843410) since 2019 and the chip itself was announced in mid 2017 (https://www.nordicsemi.com/Nordic-news/2017/05/Nordic-Semiconductor-introduces-latest-nRF52-Series-SoC). It builds on the popular nRF52832 (https://www.digikey.com/en/products/detail/nordic-semiconductor-asa/NRF52832-QFAB-R/6051565), a chip with an Arm Cortex M4-F / 512K Flash / 64K SRAM, but with a ton more memory: the '840 has 1MB Flash and 256K SRAM. It also comes with native USB device support, which is new to the nRF series but makes product design easier because DFU and computer-interfacing doesn't require a second chip. The only challenge is that the nRF52840 itself is in a funky QFN package with pads underneath, and multiple rows, which requires either very fine traces, 4-layer boards, plugged vias, or a combination, in order to get to the 'inner' traces. Also, you have to get your antenna tuning right - even though the nRF is very forgiving, it's still extra effort! That's why at Adafruit we have been using Raytac's MDBT50Q-1MV2 Module (https://www.digikey.com/short/t8hvw1bt) for years, in our Feather nRF52840 (https://www.digikey.com/en/products/detail/adafruit-industries-llc/4062/9843410), ItsyBitsy nRF52840 (https://www.digikey.com/en/products/detail/adafruit-industries-llc/4481/11497502) and CLUE board (https://www.digikey.com/en/products/detail/adafruit-industries-llc/4500/11594501). We like that it pick-and-places cleanly and easily on 2-layer PCBs with 8/8 rule DRC, comes with certifications, and has a couple different built-in antenna options, all tuned and ready. In particular, if you want a larger and/or external antenna check out the MDBT50Q-U1MV2 (https://www.digikey.com/en/products/detail/raytac/MDBT50Q-U1MV2/13968055) but we like the chip-antenna version the most. Either way, the module footprint is much easier to work with - you still have pads underneath but they're large, and you can easily fit vias in the unused spots. Just make sure you keep ground clearance around the antenna if you're using an on-module version. If you need tips on schematic and layout, just use our open source hardware design files to guide you - or check Nordic's devZone (https://devzone.nordicsemi.com/). If you've wanted to use the Nordic Semiconductor nRF52840 chip (https://www.digikey.com/en/products/detail/nordic-semiconductor-asa/NRF52840-QIAA-R/7725407) for your ultra low-power Bluetooth LE products, but have hesitated due to the effort of integrating the QFN chip, we can't recommend the Raytac MDBT50Q-1MV2 module (https://www.digikey.com/short/t8hvw1bt) enough! And now that it's for sale through DigiKey, you can pick up some at a great price. Order today and you can BLE-ify your next design by tomorrow afternoon.

Adafruit Industries
Deep Dive w/Scott: ESP BLE Pairing & Bonding

Adafruit Industries

Play Episode Listen Later May 19, 2024 131:19


Join Scott as he starts working on ESP BLE pairing and bonding (aka initiating encrypted connections), demonstrates building CircuitPython with asyncio python scripts and answers questions. https://github.com/tannewt/circuitpython/tree/embedded-build https://github.com/tannewt/embedded Thanks to dcd for timecodes: 0:00 Getting Started 1:56 Hello - welcome to Deep Dive w/Scott 3:00 Adafruit Feather nRF25840 bluefruit feather example 3:09 We will talk about Bluetooth Low Energy today 4:47 Join #live-broadcast-chat on Discord at http://adafrui.it/discord 5:15 BLE vs Bluetooth "Classic" (older devices) 6:06 ESP32-S2-DevKitC-1 V1.o S2 SOLO N4R2 (bad example, no BLE support :-) ) 6:16 ESPS3 BLE + WiFi 7:43 LED Glasses nRF52840 8:42 Creating Servers and Dynamic Services - from two weeks ago 10:00 Pull Request to add ability to create services (e.g. HID services ) 10:45 Pairing & Bonding / services / characteristics (create a keyboard) 12:20 esp-matter protocol - hamslabs 13:35 PR: Add ESP BLE GATT server support #9222 13:46 also issue Add ESP BLE GATT server support #5926 14:41 Code review process inner workings 15:29 ESP32-H4 and ESP32-P4 annonuncement on espressif.com (not available yet) - but see ESP-IDF SDK 16:14 also added C2 support to circuitpython ( but it ran out of memory ) maybe only one of WiFi or BLE at a time 17:08 and C6 - no RMT neopixel support, but it does have BLE 19:45 using TinyUSB on devices with SPI but no USB 21:03 BLE_EXT_ADV ( extended advertising feature of BLE 5) 24:39 yesterdays ESP32 issue - better debugging by enabling better debug logging 25:40 pondering interrupt handlers and weak functions 26:27 Review files changed in PR9222 26:35 Trade-off OTA for BLE on new 4MB boards 28:00 adding -u to LDFLAGS to deal with weak symbols 29:18 Pairing and Bonding not supported yet 29:50 then maybe look at building CP with new build systems 31:29 Pairing and Bonding ... 33:35 ESP IDF stores bonding information in NVS partion 34:03 look on github circuitpython/tests/circuitpyton-manual for example code (but no BLE code) 34:14 adafruit/Adafruit_CircuitPython_BLE/examples/ble_hid_central.py ( all commented out) 36:13 adafruit/Adafruit_CircuitPython_BLE/examples/ble_current_time_service.py 36:37 iPhone pairing can deliver time 37:08 github espressif/esp-idf/examples/bluetooth/nimble blecent and bleprph 38:38 bleprph/tutorial bleprph_walkthrough.md 41:35 watch running CP and BLE and updating time 43:38 view example for bleprph/main/main.c code 44:14 CP repo ports/espressif/common-hal/_bleio/PacketBuffer.c 44:26 and ports/espressif/common-hal/_bleio/Connection. ( TODO:Implement this ) 46:58 using copilot to make printf debugging faster! 50:54 also Adapter.c 53:39 refer to online CP docs for _bleio 56:20 git switch ble_bonding 58:03 clangd feature for genertated tags in editor ( mentioned a few weeks ago )o 59:54 S3 WROOM-2 N32R8V 1:01:02 set up window for serial output capture and CP serial REPL 1:06:21 update code.py - start test / paired - decode connections 1:09:20 CP doesn't have audio over BLE 1:17:36 use chatgpt to convert C #defines to switch statement function 1:25:54 save the work in process and switch to embedded-build git repo 1:27;20 fetch and pip install the build tool 1:31:28 review the build code in build_circuitpython.py 1:34:44 build tool uses python asyncio to get parallelism 1:35:38 return to the perfetto.dev chart of the threads to see basic trace information 1:43:02 when you call an async function, it doen't even begin to execute it - it just wraps it so you can run it later1:44:20 discussion of zig build system 1:45:30 rerun the build - this time with some more parallel tasks 2:01:43 TODO: add memoization to the build system in the future 2:04:01 push the code tannewt embedded build and wrap up 2:11:10 have a great weekend Visit the Adafruit shop online - http://www.adafruit.com ----------------------------------------- LIVE CHAT IS HERE! http://adafru.it/discord Subscribe to Adafruit on YouTube: http://adafru.it/subscribe New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ -----------------------------------------

Omni Talk
Live From NGA | SIRL: The Indoor Positioning Solution For Grocers

Omni Talk

Play Episode Listen Later Mar 12, 2024 15:59


In this exclusive interview from the NGA show, Michael Wang, CEO, and Vaughn Roller, Chief Business Officer at SIRL, reveal how their cutting-edge retail technology is transforming the way retailers track shopping journeys and optimize store operations. SIRL's real-time location system leverages low-cost tracking tags and wireless infrastructure to achieve an unprecedented 3-foot accuracy and 1-second latency, effectively creating a "physical search engine" for retail. Discover how SIRL's solution empowers retailers to enhance shopper privacy while tapping into the potential of retail media networks and in-store advertising. Learn about the significant ROI and revenue opportunities generated by this technology, as well as its ability to streamline merchandising optimization and shopper behavior clustering. With its easy deployment and reliance on Bluetooth Low Energy, SIRL is poised to revolutionize the retail landscape. And thank you to the VusionGroup for making our coverage of NGA possible! #SIRL #retailtechnology #indoorpositioning #realtimeloca ionsystem #shoppingjourneytracking #lowcosttrackingtags #wirelessinfrastructure #3footaccuracy #1secondlatency #physicalsearchengine #shopperprivacy #retailmedianetworks #instoreadvertising #improvedstoreoperations #ROI #revenueopportunities #easydeployment #merchandisingoptimization #shopperbehaviorclustering #BluetoothLowEnergy

AppleX4
Descubre CÓMO ENCONTRAR TODO con la Red Buscar de Apple

AppleX4

Play Episode Listen Later Feb 20, 2024 9:51


Soy Rafa, tu anfitrión en este viaje semanal por el fascinante mundo de la tecnología. Cada miércoles, exploramos juntos las últimas innovaciones, trucos y consejos que hacen la vida digital más fácil y comprensible para todos.

Tierra de Hackers
105. RADIOSTOP y Apple BLE

Tierra de Hackers

Play Episode Listen Later Sep 5, 2023 47:55


Delincuentes pro-rusos consiguen detener múltiples trenes en Polonia con un ataque de lo menos sofisticado Fallos de privacidad en el diseño de Bluetooth Low Energy en dispositivos Apple siguen dando la tabarra: o cómo un investigador de seguridad causó pánico entre los asistentes de la DEF CON 31. Notas y referencias en https://www.tierradehackers.com/episodio-105 👁️ YouTube: https://www.youtube.com/tierradehackers 👀 Twitch: https://www.twitch.tv/tierradehackers ➡️ Twitter: https://www.twitter.com/tierradehackers ➡️ LinkedIn: https://www.linkedin.com/company/tierradehackers ➡️ Instagram: https://www.instagram.com/tierradehackers ➡️ Facebook: https://www.facebook.com/tierradehackers ➡️ TikTok: https://www.tiktok.com/@tierradehackers No olvides unirte a nuestra comunidad de Discord: 👾 https://www.tierradehackers.com/discord Si te gusta lo que hacemos, considera apoyarnos en Patreon para que podamos seguir creciendo y crear aun más contenido 🫶 https://www.patreon.com/tierradehackers/ Gracias también a los patrocinadores de este episodio: 👉 Monad (https://www.monad.com) Si quieres venirte a la conferencia organizada por EUROPOL en conjunto con fuerzas y cuerpos de seguridad de España, puedes unirte a la red EDEN en este enlace, y tendrás un descuento en la entrada 👉 https://www.europol.europa.eu/europol-data-protection-experts-network-eden 👉 https://www.europol.europa.eu/publications-events/events/11th-eden-event-whisperers-of-contrast-madrid-spain

Programming Electronics Academy Podcast
EP042 | Mohammad Afaneh | Bluetooth

Programming Electronics Academy Podcast

Play Episode Listen Later Aug 11, 2023 63:12


Join us for a MASTERCLASS in Bluetooth with amazing guest Mohammad Afaneh! Watch this on YouTube: https://youtu.be/jHEfLGRoxb4 Want to learn more? Check out our training program! https://bit.ly/45ncO8R  Check out the article on our website: https://bit.ly/43X8dsU __________ Novel Bits: https://novelbits.io Bluetooth Developer Academy: https://novelbits.io/academy Intro to Bluetooth Low Energy e-book (v1.0, FREE download): https://novelbits.io/introduction-to-bluetooth-low-energy-book/ Intro to Bluetooth Low Energy e-book (v1.0, Kindle, Paperback): https://a.co/d/hzWyHNM Intro to Bluetooth Low Energy e-book (v2.0): https://novelbits.io/intro-bluetooth-low-energy-version-2/ LinkedIn (if people would like to connect with me): https://www.linkedin.com/in/mafaneh/ https://www.youtube.com/playlist?list=PLYj4Cw17Aw7ypuXt7mDFWAyy6P661TD48 https://novelbits.io/academy/

Adafruit Industries
EYE on NPI Nexperia NEH2000BY Energy Harvesting Power Management IC

Adafruit Industries

Play Episode Listen Later Jun 1, 2023 9:24


This week's EYE ON NPI is enjoying the beautiful weather with you, whether sitting in the sun or lounging in the shade - all's good because we've got Nexperia's NEH2000BY Energy Harvesting Power Management IC with embedded solar MPPT capability! (https://www.digikey.com/en/product-highlight/n/nexperia/neh2000by-energy-harvesting-power-management-ic) This tiny, low-cost chip is a one-stop solution for extending the life of your product by making it powered by small solar cells. This chip is perfect for wearables or miniature sensor nodes, maybe with a LoRa radio, WiFi or Bluetooth Low Energy where space and pricing is important. For example, an asset tracker, traffic monitor, activity watch, or agricultural sensor network: stuff that is outside anyways so it'll be designed for outdoor use and have lots of sun exposure. We've covered other MPPT tracking solar harvesting chips (https://blog.adafruit.com/2021/04/23/eye-on-npi-max20361-tiny-single-multi-cell-solar-harvester-maximintegrated/), and the NEH2000BY has some advantages in size, cost and simplicity. Either use it to increase the time between charges, or use it to have your product be fully encased with no need for charging at all, thanks to the power of the SUN (https://solarsystem.nasa.gov/solar-system/sun/galleries/?page=0&per_page=25&order=created_at+desc&search=&href_query_params=category%3Dsolar-system_sun&button_class=big_more_button&tags=sun&condition_1=1%3Ais_in_resource_list&category=51) The Nexperia NEH2000BY energy harvester (https://www.digikey.com/short/hpnfttw3) is designed specifically for use with solar cells because cells collapse under high current draw - which is what batteries want when they are charging up so that they can be ready to go ASAP! When drawing current from a solar cell, at the very beginning the voltage is very high, then is slowly drops down as more is drawn until the input voltage collapses completely. So you have to be very careful when drawing current - too little and you lose out on efficiency, too much and your power goes away completely. There's a 'sweet spot' right in the middle, where you can get the most power output, which is called the Max Power Point. (https://en.wikipedia.org/wiki/Maximum_power_point_tracking) And this point varies with how much sunlight you get - so it isn't something you can pre-program in with a comparator or anything. Instead, the energy harvester has to wiggle the power draw forward and back to find the maximum point. For large-scale solar installations, you'd have a microcontroller do the math for you, and adjust throughout the day - it isn't hard to do MPPT it just takes measurement and computation. But in small and low-current situations, you can't spend all your power budget on a microcontroller to manage your battery charger. First up, almost no extra components are needed: just a stabilization capacitor plus a capacitor for the switched-cap boosting doubler. Note that there's no inductor because it seems to use a switched-cap boosting method for approximately 2x voltage output - so you will need to spec a panel that, when the MPPT voltage is approximately doubled, you'll have about 0.3V above the battery voltage. There's some math in the datasheet to work this out but basically in the end, use a panel with an open-circuit voltage - Voc - that is about 0.7 times the battery voltage. So, e.g. if you're using a Lipoly (https://www.digikey.com/short/h02tmj1q), with a VBat of 4.2V, use a 3V solar panel - which is very common and inexpensive. For NiMH cells, add up the total series voltage before multiplying by 0.7 for the Voc desired. To keep your battery from over-charging, either use a separate battery charger chip that will do the constant-current to voltage-limited charging, or use a low cost over-voltage protection (OVP) chip as recommended in the datasheet. If you'd like to integrate the Nexperia NEH2000BY Energy Harvesting Power Management IC (https://www.digikey.com/short/hpnfttw3) into your next solar-powered product, thank your lucky stars because DigiKey has the NEH2000BY in stock right now at a great price for immediate shipment. With the long summer days ahead, you can order today and be max-power-point'ing before the sun sets tomorrow.

Peggy Smedley Show
Are You Being Tracked with Tags?

Peggy Smedley Show

Play Episode Listen Later Feb 15, 2023 15:57


Peggy Smedley and Scott Schober, president & CEO, Berkeley Varitronics Systems, talk about a new Kickstarter campaign for BlueSleuth-Lite. He says the product focuses in on Bluetooth Low Energy and scans all around looking for devices using it. The technology helps to determine if someone is being tracked or followed using tags.  They also discuss: What he is hoping to accomplish with this Kickstarter campaign. The difference between GPS trackers and tags. What the consumer wants from technology such as this. bvsystems.com  (2/14/23 - 809) IoT, Internet of Things, Peggy Smedley, artificial intelligence, machine learning, big data, digital transformation, cybersecurity, blockchain, 5G, cloud, sustainability, future of work, podcast, Scott Schober, Berkeley Varitronics Systems, Kickstarter, BlueSleuth-Lite This episode is available on all major streaming platforms. If you enjoyed this segment, please consider leaving a review on Apple Podcasts.

Peggy Smedley Show
Are You Being Tracked with Tags?

Peggy Smedley Show

Play Episode Listen Later Feb 15, 2023 15:57


Peggy Smedley and Scott Schober, president & CEO, Berkeley Varitronics Systems, talk about a new Kickstarter campaign for BlueSleuth-Lite. He says the product focuses in on Bluetooth Low Energy and scans all around looking for devices using it. The technology helps to determine if someone is being tracked or followed using tags.  They also discuss: What he is hoping to accomplish with this Kickstarter campaign. The difference between GPS trackers and tags. What the consumer wants from technology such as this. bvsystems.com  (2/14/23 - 809) IoT, Internet of Things, Peggy Smedley, artificial intelligence, machine learning, big data, digital transformation, cybersecurity, blockchain, 5G, cloud, sustainability, future of work, podcast, Scott Schober, Berkeley Varitronics Systems, Kickstarter, BlueSleuth-Lite This episode is available on all major streaming platforms. If you enjoyed this segment, please consider leaving a review on Apple Podcasts.

Adafruit Industries
EYE on NPI: InPlay IN100 NanoBeacon Bluetooth Low Energy Beacon SoC

Adafruit Industries

Play Episode Listen Later Feb 9, 2023 11:46


This week's EYE ON NPI won't have you singin' the blues about Bluetooth stack development. It's InPlay IN100 NanoBeacon™ Bluetooth® Low Energy Beacon SoC (https://www.digikey.com/en/product-highlight/i/inplay/in100-nanobeacon-soc), an ultra-low cost way to make sensor beacons for data collection, with no coding required! These flash-less chips are packed with peripherals that can be configured with a desktop tool and then burned into OTP EEPROM memory. That makes them both reliable and very inexpensive, so they're great for distributed sensors that may end up getting damaged or lost. They're also great for when you want to get something into production super fast and don't want to spend time learning Bluetooth SDKs or wireless stacks. Bluetooth LE is a low-power 2.4GHz protocol that has some nice 'connection-less' capabilities. Unlike WiFi and cellular, BLE has the ability to act like a 'beacon' (https://learn.adafruit.com/introduction-to-bluetooth-low-energy) where data is blipped out for anyone to listen to. (https://learn.adafruit.com/alltheiot-transports/bluetooth-btle) Note that in beacon mode, there's no wireless reception happening - and because there's no need to listen for packets, the beacon can go into very, very low power usage because it just has to wake up, send the beacon out, and go back to deep sleep. Receiving requires a lot more power because you have to be listening at all times. Beacons are what are used in "lost and found" tags, for asset or people tracking, as well as distributing URLs.(https://en.wikipedia.org/wiki/Bluetooth_Low_Energy_beacon) Normally, folks would use a common BLE chipset such as nRF, Dialog, or TI - often these come with a ARM Cortex chip inside that can run a BLE stack. The stack can either be the in-house brand such as the nRF SDK (https://www.nordicsemi.com/Products/Development-software/nrf5-sdk) or a third-party like Zephyr (https://docs.zephyrproject.org/3.1.0/connectivity/bluetooth/api/index.html) but either way you have to write some code and burn it into the chip. You also have to learn how to manage the low power modes and debug your code. For many basic beacon projects, such as measuring a digital, analog, or I2C sensor - the IN100 is pretty amazing: all the low power and SDK stuff is done - you just have to configure each board and burn in the settings. The good news is that you can deploy your beacons or sensor nodes super fast, and because the core is designed to only do this one thing, the chips are really really cheap. Like 40 cents per piece cheap! (https://www.digikey.com/en/products/filter/rf-transceiver-ics/879?s=N4IgTCBcDaIJYDsCMAGFIC6BfIA) Your entire BOM for a beacon product could easily be under $1 including the coin battery. They're available in 10-DFN IN100-D1 (https://www.digikey.com/short/3jmnp8r3) and 18-QFN IN100-Q1 (https://www.digikey.com/short/mtp92d50) depending on how many GPIO you need. Since the trade-off for the ultra-simple design and low BOM cost is OTP memory, we recommend getting the IN100 evaluation kit (https://www.digikey.com/short/0q0jwwqq) which comes with a programming dongle and three beacon boards fitted with the QFN version of the IN100. Then download the cross-platform configuration tool (https://inplay-tech.com/nanobeacon-config-tool) and follow the YouTube video tutorials they've filmed to learn how to configure the beacons for different advertising modes. (https://www.youtube.com/watch?v=dJfQ059KzRg) Don't worry about making mistakes: you can always run from RAM to iterate the design before finally burning it into the OTP! And even if there are errors, the InPlay IN100 NanoBeacon Eval Kits are inexpensive (https://www.digikey.com/short/5z920hrj). Once you're ready to go into production, the individual chips are plentiful and low cost (https://www.digikey.com/short/97773wh3) so you can get into production almost immediately. The InPlay IN100 NanoBeacon Eval Kits (https://www.digikey.com/short/5z920hrj), IN100-D1 (https://www.digikey.com/short/3jmnp8r3) and IN100-Q1 (https://www.digikey.com/short/mtp92d50) are all in stock right now for immediate shipment from Digi-Key - available nowhere else! If you're curious to try this no-code BLE beacon chipset, order today and you can be Bluetooth Beacon'ing by tomorrow afternoon!

IoT For All Podcast
How To Build High Quality Bluetooth Products | SwaraLink Technologies's Sandeep Kamath | Internet of Things Podcast

IoT For All Podcast

Play Episode Listen Later Dec 29, 2022 22:04


That's why SwaraLink Technologies created the Bluetooth Low Energy Developer's Checklist. In this podcast, the CEO and Co-Founder of SwaraLink Technologies, Sandeep Kamath, breaks down BLE and the checklist they've created, including various topics, from optimizing throughput and power consumption to ensuring secure connections and supporting over-the-air firmware updates. These aren't necessarily must-dos, but they're essential considerations to keep in mind as you design, develop, and test your product.Sandeep was initially a self-taught programmer, playing around with QBASIC and Visual C++ in high school, but then shifted his interest from software to hardware while at the university level. He received his Bachelor's and Master's degrees in Electrical Engineering from the University of California, San Diego, focusing on Analog and RF Integrated Circuit Design. His educational background in hardware and RF systems and personal interest in software eventually led him to the world of embedded wireless systems. After graduating, Sandeep spent over a decade in the semiconductor industry, including eight years working for Texas Instruments Wireless Connectivity group. During his career at TI, Sandeep worked in various technical, management, and business roles, all related to TI's Bluetooth Low Energy product line. In 2017 Sandeep took his knowledge of Bluetooth Low Energy from both a technology and market standpoint and founded SwaraLink Technologies to help companies build high-quality products with great user experiences.SwaraLink Technologies is a services and solutions company focused on Bluetooth Low Energy (BLE) systems and software. Their flagship product, the SwaraLink Bluetooth Low Energy Platform, is a cross-platform middleware solution that reduces the cost of developing high-quality products that use Bluetooth Low Energy technology. SwaraLink was founded and incorporated in the State of California in 2017, with headquarters in San Diego. Since its founding, SwaraLink has helped numerous customers with various services, including architecture, development, testing, and debugging complex hardware and software systems that use Bluetooth and Bluetooth Low Energy Technology.

The Six Five with Patrick Moorhead and Daniel Newman
The Six Five On The Road with Qualcomm Sarah McMurray at Snapdragon Summit 2022

The Six Five with Patrick Moorhead and Daniel Newman

Play Episode Listen Later Nov 17, 2022 16:29


The Six Five On The Road at #SnapdragonSummit 2022. Hosts Patrick Moorhead and Daniel Newman sit down with Sarah McMurray, Sr. Manager, Product Marketing for Voice & Music at Qualcomm, for one of many conversations at this year's #SnapdragonSummit. Their discussion covers: The launch of S5 & S3 Gen 2 Sound Platforms Technical improvements with S5/S3 Snapdragon Sound Platform in the commercial market Importance of spatial audio and Bluetooth Low Energy

Adafruit Industries
John Park's CircuitPython Parsec: Bluetooth Naming

Adafruit Industries

Play Episode Listen Later Oct 22, 2022 1:44


#circuitpythonparsec Give your Bluetooth Low Energy object descriptive advertised name in CircuitPython. To learn about CircuitPython: https://circuitpython.org Visit the Adafruit shop online - http://www.adafruit.com ----------------------------------------- LIVE CHAT IS HERE! http://adafru.it/discord Adafruit on Instagram: https://www.instagram.com/adafruit Subscribe to Adafruit on YouTube: http://adafru.it/subscribe New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ -----------------------------------------

The UAV Digest
408 Archer Aviation Maker

The UAV Digest

Play Episode Listen Later Jul 29, 2022 31:32


Archer Aviation planning full transition flights of their Maker aircraft, drone shuts down Ronald Reagan Washington National Airport, protecting sporting events with drones, using lasers for drone communications, RQ-4 Global Hawk end-of-life, alligator attacks drone, a Remote ID device from Aerobits, and the Zephyr UAS flies for 26 days. Archer Aviation Maker eVTOL. UAV News Archer Flight Testing Gains Momentum, On Pace to Achieve Transition Flight By Year End Archer Aviation Inc. announced it is confident it will achieve its goal of flying full transition flights with its Maker aircraft by year-end. Flight tests of the full-scale 12-motor eVTOL demonstrator aircraft with a Tilt Propeller System (TPS) have been successful. Maker successfully completed its first hover test flight in December 2021 and since then the engineering team has focused on the development and testing of the systems needed for a full transition to horizontal flight. Errant drone briefly shuts down D.C. airport Air traffic was shut down at Ronald Reagan Washington National Airport for 45 minutes. There is no information about who was operating the drone, if it was taken down, or if it was retrieved.  The DHS told Congress that TSA has reported nearly 2,000 drone sightings near U.S. airports since 2021. Pilots had to take “65 evasive actions” after drones came too close or disturbed aircraft. World Cup to use drones to help protect stadiums Utah-based Fortem Technologies has reached an agreement with Qatar's interior ministry to provide the interceptor drones at this winter's Fifa World Cup in Qatar. Fortem's “DroneHunters” that shoot nets will be able to bring down small rogue drones. These are autonomous, radar-guided drones. Laser-Controlled Drones Can Evade Signal-Jamming Countermeasures The counter-drone technology that physically attacks rogue drones with a net or a projectile requires that you track the drone's movement. On the other hand, signal jamming doesn't require such precise tracking. But now British company QinetiQ has a way to remotely operate drones without the communication signals that can be jammed. The new system uses lasers or Free-Space Optical Communications (FSO, or FSOC) signals. Air Force's RQ-4 Global Hawk drones headed for retirement in FY27 The US Air Force plans to phase out all remaining RQ-4 Global Hawk reconnaissance drones by fiscal 2027. Northrop Grumman was informed they should expect that the fleet will reach its end of life by that date. In a statement, an Air Force spokeswoman said, “Our ability to win future high-end conflicts requires accelerating investment in connected, survivable platforms and accepting short-term risks by divesting legacy ISR assets that offer limited capability against peer and near-peer threats.” What a snap! Moment alligator leaps out of Brazilian river and devours nosy fisherman's drone in mid-flight A Brazilian man was testing his new drone and had seen some alligators, so he flew back to the spot. The drone hovered over one of the alligators who eyed the drone for a few seconds. The gator then lept out of the water, grabbed the drone, and swam away. Video: Alligator leaps out of Brazilian river and snatches drone in mid flight https://youtu.be/rXeU7_l-PEo The most advanced Remote ID with WI-FI and BLE technology Aerobits has launched an advanced version of the idME PRO device that can broadcast on Wi-Fi and Bluetooth. It provides enhanced identification and tracking for UAS and works with MAVLINK devices. The Wi-Fi can connect to the Pixhawk drone controller via a JST connector. The Bluetooth Low Energy (or BLE) provides surveillance and drone operator identification capability via smartphones or tablets.  US Army conducts high-altitude experiments with Zephyr UAS The U.S. Army wants to implement ultra-long endurance stratospheric UAS capabilities. During a June 2022 test flight,

HDTV and Home Theater Podcast
Podcast #1056: Has Netflix Jumped the Shark and Broadlink's FastCon Smart Home Protocol

HDTV and Home Theater Podcast

Play Episode Listen Later Jun 17, 2022 46:14


This week we try to determine whether Netflix has jumped the shark and what they can do save the company. We also take a look at a new smart home protocol from Broadlink called Fastcon. It's highly reliable and very affordable. We also read your emails and discuss the week's news. News: LG 'Objet' OLED Evo TVs prioritise both style and substance Android TV reaches 10K streaming apps There's a new OLED TV panel manufacturer on the block Cox explores a smart TV strategy Other: doitforme.solutions Sonos Voice Assistant - what is it, how does it work, how does it compare? Apple Inks 10 Year Global Deal for Major League Soccer Has Netflix jumped the shark? - Listener email and discussion Just been thinking about Netflix and wanted to share my thoughts  The old saying from Happy days when the Fonz jumped a shark tank on water skis and Happy Days was never the same. Innovation & Interface No one can say that Netflix was not an innovator in the DVD delivery and then streaming service.  They showed everyone what could be done and pioneered the streaming services.  A wise person in the software business who I work with to create our company's digital platform told me this that our product was visionary and ahead of anything currently on the market.  He then said let's make sure that we keep pushing forward because the competition is coming and this is their starting point.  Netflix in my opinion is no longer the innovator they once were and have fallen behind the crowd.  I believe the lack of integrating into a box or TV streaming OS really hurts them.  This is my main way to find new stuff to watch and the what's next makes decisions easier.  Their interface I believe is one of the worst of the main stream services.  They have gone to allowing algorithms show you movies/shows that it thinks you would want to watch.  I have a soft side I don't always need to see thing blow up in what I watch.  Trying to find the vast majority of their library is difficult.  The other streaming service allow you to see everything they have very easily again in my opinion. Cost of main stream streamers & Business Model Netflix 4k streaming at $19.99 Disney Bundle – No ads 4k streaming - $19.99 Netflix - 1080P only - @ $15.49 HBO Max - 4k streaming @ $14.99 Disney Bundle adds - $13.99 All others are under $10 a month I believe    They raised their prices at the wrong time as inflation was starting to it creep up they raised the prices and in reality or the #1 & 2 highest priced streaming services as the Disney bundle is 3 separate services.  Also, it was kick in the face to be charging $15.49 for 1080P streaming – this is when I said goodbye.  I have kept my Paramount, Discovery, Apple TV+, subscription because their prices is low and upgraded to Peacock without commercials because the per month price is under $10.  I do get the Disney bundle and HBO Max free and if I had to pay for them I would pay from HBO Max & Disney Plus – wait for the $1 deal from hulu to sign back up. Their business model of binging is great for consumers but not the corporations.  Once Netflix jumped the shark with their prices I decided I could just wait till the late summer and re-activate for a month or two to see all their good content and then put the service back on pause.  Disney & HBO have the weekly release that to me makes more invested in their services and they have good content.   Future Does NetFlix go the way of Blackberry, MySpace or can they reinvent themselves?  This is the questions each stockholder is asking right now.  If I were in charge first thing I would do is realize that I'm no longer the only big dog and be honest about my place in the streaming world.  I would integrate with the Box and TV OS's integrated search.  I would redesign my interface.  I would change my $15.49 price to allow for 4K streaming.   I would not buy Roku as that does not help you but spend money.  If your plan is to make it the only way to get Netflix then you really don't know your place in the streaming war.  If you want to buy something look for a content provider with a big catalog if there is one left.  I hope Reid can see beyond his ego and reshape Netflix to be competitive and still deliver great content and reasonable price.  Roku Staffers Swirl in Netflix Acquisition Rumors  Roku stock was up nearly 10% Wednesday morning as internal discussions focus on the possibility of a tie-up with a streaming giant that suddenly needs help with advanced advertising Full article here… Ad supported streaming? - With Roku Netflix would not have to share revenue with other hardware makers.  Broadlink FastCon Smart Home Protocol We have spoken a lot about Matter this year as a way to unify the Smart Home market. Well there is another protocol that has recently been released that has some pretty cool features. We're talking about the Broadlink FastCon Smart Home Protocol. FastCon BLE is a patented communication technology based on Bluetooth Low Energy developed by BroadLink, boasting many advantages over their previous Wi-Fi based smart products. Benefits include: Zero Setup: Power up > Device Appears Batch Installation: Add up to 90 devices in one second Super Mesh Network: Extends signal range up to 500m covering all your house even in commercial buildings. Max 250 devices require only one gateway - saves your cost and time implementing and won't crash your router anymore No Internet Required: The fastest control experience is direct local access Almost all controls especially for lighting are operated locally (except voice control) Bluetooth connection enables you to control devices via App or switch at home No Account Required: Boot up, open the app and add your devices Guaranteed Success Rate: 99.99% device discovery and control rate. Enhanced mesh repeating mechanism guaranteed the delivery of control commands but avoiding duplicated signals Low Cost: Very cost-effective FastCon BLE Chipset, which lowers device cost What devices are on the market? Broadlink has a lot of devices and from what we can tell you can do your entire home with their devices and here is the kicker, their products are inexpensive. They even have an IR remote that allows you to integrate your smart home with your home theater. The best way to get started is with a starter kit that consists of 3 A19 Bluetooth Color Changing Light Bulbs with Music Sync, 1 Wireless Scene Switch and a Hub. While the Hub is not required for local control, it does allow remote access of your home as well as voice control via Alexa or Google Home. All of this for the whopping price of $34.99! There are Smart Touch Wall Light Switches available for $24.99 for the 1 Gang model that requires a hub but not included. The version that comes with a hub is only two dollars more ($26.99). Someone is taking a loss on the hub! There is a model that allows you to control three light lights for $30.99.  There are also two types of wall plugs, and the cheapest one available is $5.99 and is a simple on and off switch. The second version has a dimmable night light that sells for $11.99 You can use the $24.99 Smart Button (includes a hub) to kick off scenes and automations as well as control lights and turn on your home entertainment system. To control your home entertainment system you will need the Mini IR Universal Remote Control which runs $25,99.  They support almost all TVs and entertainment systems on the market today. But with this remote you are not limited to TVs. You can control AC Units, blinds, and pretty much anything that takes an IR command.  This system looks similar to Insteon in the sense that it is proprietary. We didn't find a Thermostat that works with it so keep that in mind. It is also unlikely that Broadlink will support Matter anytime soon. If you go this route you may be on an island. Albeit a nice tropical island.  

@BEERISAC: CPS/ICS Security Podcast Playlist
Welcome to Control Loop: Giving back to the OT community.

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 3, 2022 40:24


Podcast: Control Loop: The OT Cybersecurity PodcastEpisode: Welcome to Control Loop: Giving back to the OT community.Pub date: 2022-06-01Every two weeks, get the latest in OT news in Control Loop News Brief, an interview featuring a thought leader in the OT space sharing current industry trends, and the Control Loop Learning Lab's educational segment. A companion monthly newsletter is available through free subscription and on the CyberWire's website.Headlines include: Russia's hybrid war against Ukraine. Russian threat actors against industrial control systems. Exploits for Bluetooth Low Energy. Hacktivists claim attacks against Russian ground surveillance robots. New wiper loader. Turla threat actor reconnaissance in Estonian and Austrian networks. Robert M. Lee, CEO of Dragos, talks giving back to the OT community and shares insights on Pipedream malware. Learning Lab has Dragos' Mark Urban and Jackson Evans-Davies talking about the fundamentals of OT cybersecurity.Control Loop News Brief.Continuing expectations of escalation in cyberspace.Microsoft President: Cyber Space Has Become the New Domain of Warfare - Infosecurity MagazineCyber Attacks on Ukraine: Not What You Think | PCMag Warning: threat actor targets industrial systems.US warns energy firms of a rapidly advancing hacking threat - E&E NewsPIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments | DragosPipedream Malware: Feds Uncover 'Swiss Army Knife' for Industrial System Hacking | WIREDIndestroyer2 and Ukraine's power grid. Twitter: @ESETresearchIndustroyer2: Industroyer reloaded | WeLiveSecurityRussian hackers tried to bring down Ukraine's power grid to help the invasion | MIT Technology ReviewBluetooth vulnerabilities demonstrated in proof-of-concept.NCC Group uncovers Bluetooth Low Energy (BLE) vulnerability that puts millions of cars, mobile devices and locking systems at riskTesla Hacker Proves a Way of Unlocking Doors, Starting Engine - BloombergCISA and its international partners urge following best practices to prevent threat actors from gaining initial access.Weak Security Controls and Practices Routinely Exploited for Initial Access | CISAHacktivists claim to have compromised Russian-manufactured ground surveillance robots.Did hackers commandeer surveillance robots at a Russian airport?Twitter: @caucasnetPolitically motivated DDoS attack on Port of London Authority website.Twitter: @LondonPortAuthPro-Iran Group ALtahrea Hits Port of London Website by DDoS Attack New loader identified in wiper campaigns.Sandworm uses a new version of ArguePatch to attack targets in Ukraine | WeLiveSecurity Turla reconnaissance detected in Austrian and Estonian networks.Russian hackers perform reconnaissance against Austria, Estonia TURLA's new phishing-based reconnaissance campaign in Eastern Europe SANS ICS Summit is coming to Florida, June 1-9.ICS Security Summit & Training 2022Colonial Pipeline's ransomware attack, one year later.How the Colonial Pipeline attack instilled urgency in cybersecurityOT vulnerabilities as credit risk.Operational Technology Cyberattacks Are a Credit Risk for UtilitiesA Cyber Resilience Pledge. Global CEOs Commit to Collective Action on Cyber Resilience Recent threat intelligence findings from Dragos.Dragos ICS/OT Ransomware Analysis: Q1 2022Control Loop Interview.Robert M. Lee, CEO of Dragos, on giving back to the OT cybersecurity community, the idea behind the Control Loop podcast and newsletter, and his candid thoughts on the Pipedream malware and its creators.Follow Rob on LinkedIn and Twitter.Control Loop Learning Lab.Dragos' Mark Urban and Jackson Evans-Davies on the fundamentals of OT cybersecurity and network architecture.Dragos 2021 ICS Cybersecurity Year in ReviewHow to Build a Roadmap for ICS/OT Cybersecurity: 3 Steps to a Sustainable ProgramManaging External Connections to Your Operational Technology EnvironmentImproving ICS/OT Security Perimeters with Network SegmentationThe podcast and artwork embedded on this page are from CyberWire Inc., which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Control Loop: The OT Cybersecurity Podcast
Welcome to Control Loop: Giving back to the OT community.

Control Loop: The OT Cybersecurity Podcast

Play Episode Listen Later Jun 1, 2022 40:24


Every two weeks, get the latest in OT news in Control Loop News Brief, an interview featuring a thought leader in the OT space sharing current industry trends, and the Control Loop Learning Lab's educational segment. A companion monthly newsletter is available through free subscription and on the CyberWire's website. Headlines include: Russia's hybrid war against Ukraine. Russian threat actors against industrial control systems. Exploits for Bluetooth Low Energy. Hacktivists claim attacks against Russian ground surveillance robots. New wiper loader. Turla threat actor reconnaissance in Estonian and Austrian networks. Robert M. Lee, CEO of Dragos, talks giving back to the OT community and shares insights on Pipedream malware. Learning Lab has Dragos' Mark Urban and Jackson Evans-Davies talking about the fundamentals of OT cybersecurity. Control Loop News Brief. Continuing expectations of escalation in cyberspace. Microsoft President: Cyber Space Has Become the New Domain of Warfare - Infosecurity Magazine Cyber Attacks on Ukraine: Not What You Think | PCMag  Warning: threat actor targets industrial systems. US warns energy firms of a rapidly advancing hacking threat - E&E News PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments | Dragos Pipedream Malware: Feds Uncover 'Swiss Army Knife' for Industrial System Hacking | WIRED Indestroyer2 and Ukraine's power grid.  Twitter: @ESETresearch Industroyer2: Industroyer reloaded | WeLiveSecurity Russian hackers tried to bring down Ukraine's power grid to help the invasion | MIT Technology Review Bluetooth vulnerabilities demonstrated in proof-of-concept. NCC Group uncovers Bluetooth Low Energy (BLE) vulnerability that puts millions of cars, mobile devices and locking systems at risk Tesla Hacker Proves a Way of Unlocking Doors, Starting Engine - Bloomberg CISA and its international partners urge following best practices to prevent threat actors from gaining initial access. Weak Security Controls and Practices Routinely Exploited for Initial Access | CISA Hacktivists claim to have compromised Russian-manufactured ground surveillance robots. Did hackers commandeer surveillance robots at a Russian airport? Twitter: @caucasnet Politically motivated DDoS attack on Port of London Authority website. Twitter: @LondonPortAuth Pro-Iran Group ALtahrea Hits Port of London Website by DDoS Attack  New loader identified in wiper campaigns. Sandworm uses a new version of ArguePatch to attack targets in Ukraine | WeLiveSecurity  Turla reconnaissance detected in Austrian and Estonian networks. Russian hackers perform reconnaissance against Austria, Estonia  TURLA's new phishing-based reconnaissance campaign in Eastern Europe  SANS ICS Summit is coming to Florida, June 1-9. ICS Security Summit & Training 2022 Colonial Pipeline's ransomware attack, one year later. How the Colonial Pipeline attack instilled urgency in cybersecurity OT vulnerabilities as credit risk. Operational Technology Cyberattacks Are a Credit Risk for Utilities A Cyber Resilience Pledge.  Global CEOs Commit to Collective Action on Cyber Resilience  Recent threat intelligence findings from Dragos. Dragos ICS/OT Ransomware Analysis: Q1 2022 Control Loop Interview. Robert M. Lee, CEO of Dragos, on giving back to the OT cybersecurity community, the idea behind the Control Loop podcast and newsletter, and his candid thoughts on the Pipedream malware and its creators. Follow Rob on LinkedIn and Twitter. Control Loop Learning Lab. Dragos' Mark Urban and Jackson Evans-Davies on the fundamentals of OT cybersecurity and network architecture. Dragos 2021 ICS Cybersecurity Year in Review How to Build a Roadmap for ICS/OT Cybersecurity: 3 Steps to a Sustainable Program Managing External Connections to Your Operational Technology Environment Improving ICS/OT Security Perimeters with Network Segmentation

Adafruit Industries
EYE on NPI - nRF5340 Audio Development Kit

Adafruit Industries

Play Episode Listen Later May 20, 2022 16:05


This week's EYE ON NPI is chillin' and listening to some vibin' beats - we're featuring Nordic's jam-packed nRF5340 Audio Development Kit (https://www.digikey.com/en/product-highlight/n/nordic-semi/nrf5340-audio-development-kit) that will get you going fast with Bluetooth Low Energy audio development with a lovely kit that has everything you need to build both basic and advanced BTLE audio demos that exercise all the new capabilities of BT 4.x and 5.x's native audio streaming technology Audio was one of the first killer app's for Bluetooth adoption. Who doesn't remember when ubiquitous 'hands-free' headsets (https://en.wikipedia.org/wiki/Headset_(audio)#Bluetooth_wireless_headsets) started popping up in every business guy's ear. For mobile devices, these headsets turned out be quick to pair, and allowed people to talk, or listen to music, while driving or working without wires. Bluetooth classic audio is still incredibly popular today: not just used in headsets but also in Bluetooth speakers (https://www.digikey.com/en/products/detail/klein-tools-inc/AEPJS2/11570486), hearing aids, wireless mics, home voice agents, and more! When the audio profile was first invented, there were a few, totally reasonable restrictions placed on how it was used. First, it's a point-to-point connection - also called source-sink connection. There's a supplier source of audio - say the MP3 player - and a destination sink like a speaker. Second, the compression codec had to match the processor and battery capabilities of late 90's technology. The first classic codec was called SBC, although recently there are newer codecs that can do a better job with reducing lossyness and, of course, can take advantage of the Moore's-law improvements in memory and processor capabilities. Unfortunately, as one can expect in such a technology space, many of the codecs are patented, licensed, and require per-device fees. Also, unless you know what to look for, it's harder to compare two headsets with different codecs, as another variable that affects audio quality and delay. While many non-audio/non-keyboard devices have thankfully moved from BT classic to BTLE, mostly in order to avoid Apple's MFI program, there's been a bit of a lag in getting audio devices to switch over from classic to LE due to the high inertia of technological laziness. However, in the last few years, a Really Good Reason to move over has been invented: AirPods! (https://www.apple.com/shop/product/MME73AM/A/airpods-3rd-generation) Yep, when Apple came out with their new wireless Bluetooth earbuds, they had to come up with a custom BTLE protocol - because there's two sinks and one source, and even if you created two connections (one for left and one for right) the source would have to work hard to synchronize audio. Sure Apple can put the time and money into that kind of development, but what about everyone else who wanted to make similar products? That's why when BTLE audio came 'free' with multi-point transmission and synchronization and an improved free codec, folks' ears started perking up. With Nordic's new nRF5340 ADK (https://www.digikey.com/short/vm7q7fwz), creating advanced BTLE Audio applications is super fast. The nRF5340 is a dual core ARM processor, which means it's easy to have one core dedicated to codec management and DMA audio streaming, and the other core for interfacing and control. The free software examples (https://developer.nordicsemi.com/nRF_Connect_SDK/doc/latest/nrf/applications/nrf5340_audio/README.html) come with two main demos right now: a synchronous example for making wireless earbuds, and a broadcast example for sending audio to multiple sinks. Note that for these examples you'll often want two ADKs so you can stream audio to both ADKs as a way to mimic earbuds, for example. And, have you heard the good news? Digi-key has a TON of the nRF5340 Audio Development Kit (https://www.digikey.com/short/vm7q7fwz) in stock right now for immediate shipment. Each ADK has all the accessory hardware needed to immediately bootstrap your BTLE example project. (Hint, it's also a great dev board for general nRF5340 development, with SD card, built in debugger, power management, Arduino-esque headers, RGB LEDs, and user interface buttons. Pick up two of these dev kits today and you can be jammin' and boppin' by tomorrow afternoon!

Cyber Security Today
Cyber Security Today, May 18, 2022 - A warning to e-commerce sites, Conti ransomware gang squeezes Costa Rica and more

Cyber Security Today

Play Episode Listen Later May 18, 2022 5:00


This episode reports on credit card web scraping with PHP, Conti ransomware gang threatens overthrow of Costa Rica, a warning to users of Bluetooth Low Energy smart locks patches from Nvidia

InfoSec Overnights - Daily Security News
Apple attack, Conti hits Parker, iPhone vuln, and more.

InfoSec Overnights - Daily Security News

Play Episode Listen Later May 17, 2022 2:40


A daily look at the relevant information security news from overnight.Episode 238 - 17 May 2022Apple attack - https://www.bleepingcomputer.com/news/security/apple-emergency-update-fixes-zero-day-used-to-hack-macs-watches/Conti hits Parker - https://www.infosecurity-magazine.com/news/parker-conti-ransomware/Tesla BLE - https://www.bleepingcomputer.com/news/security/hackers-can-steal-your-tesla-model-3-y-using-new-bluetooth-attack/Card skimming - https://www.zdnet.com/article/fbi-hackers-used-malicious-php-code-to-grab-credit-card-data/iPhone vulv- https://threatpost.com/iphones-attack-turned-off/179641/Hi, I'm Paul Torgersen. It's Tuesday May 17th, 2022, and this is a look at the information security news from overnight. From BleepingComputer.com:Apple has released security updates to address a zero-day vulnerability that threat actors can exploit in attacks targeting Macs and Apple Watches. The flaw is an out-of-bounds write issue in the AppleAVD, the kernel extension for audio and video decoding. Apple says it is likely this has already been exploited in the wild. From Infosecurity-magazine.com:US manufacturer Parker-Hannifin has announced a data breach exposing employees' PII after being the target of a Conti ransomware attack. The company said that an unauthorized third party gained access to its IT systems between 11 and 14 of March this year. On the plus side, if you‘re information was involved, you just got two free years of identity theft monitoring. From BleepingComputer.com:Security researchers at the NCC Group have developed a tool to carry out a Bluetooth Low Energy relay attack that bypasses all existing protections to authenticate on target devices. What target devices, you ask? Teslas. Details in the article. From ZDNet.com:The FBI put out a warning that someone is scraping credit card data from the checkout pages of US businesses' websites. The bad actor is injecting malicious PHP Hypertext Preprocessor code into the business' online checkout page and sending the scraped data to a server that spoofed a legitimate card processing server. They also left a backdoor into the victims system. And last today, from ThreatPost.comBecause of how Apple implements standalone wireless features such as Bluetooth, Near Field Communication and Ultra-wideband technologies, researchers have found that iPhones are vulnerable to malware loading attacks even when the device is turned off. The root cause of the issue is how iPhones implement low power mode for wireless chips. No comment yet from Apple, but there is a link to the research report in the article. That's all for me today. Remember to LIKE and SUBSCRIBE. And as always, until next time, be safe out there.

Learning by Proxy with Vivek Srinivasan
Mesh Networks | Podcast

Learning by Proxy with Vivek Srinivasan

Play Episode Listen Later Jan 14, 2022 9:56


This is the Learning by Proxy podcast for Edition 94. If you do not enjoy reading long-form, get the gist of it in about 10 minutes (or that was the hope). This time in the podcast - Mesh Networks have been around and have been used in WiFi applications for years now. They are being increasingly used with Bluetooth Low Energy devices to ostensibly track missing items. But the work and time that it has taken to build these networks make me think there is a much larger plan in the works here.You can find the whole blog at this link.Music Courtesy Pixabay This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit www.learningbyproxy.com

The IoT Podcast
S2 | E10 | PART 2 | Changing Game for Short Range IoT | Svein-Egil - CTO and Paal Kastnes- Technical Marketing Manager, Nordic Semiconductor

The IoT Podcast

Play Episode Listen Later Dec 16, 2021 36:46


In S2 episode 10 and part two of our two-part special with Nordic Semiconductor, we are joined by Svein-Egil Nielsen - CTO and Paal Kastnes to unwrap the transformations happening in short-range IoT!⌚️

The Digital Supply Chain podcast
Supply Chain Visibility And Sustainability - A Chat With Sony's Erik Lund

The Digital Supply Chain podcast

Play Episode Play 30 sec Highlight Listen Later Nov 22, 2021 28:38 Transcription Available


Supply Chain visibility and sustainability are two of the most important topics in supply chain today. So when I came across Sony Visilion's Head of IoT Tracking Erik Lund I knew I had to get him on the podcast. Fortunately he was delighted to join and we had a great discussion about IoT tracking and the visibility implications of that, and we also talked about the sustainability implications of seeing the data associated with your shipments.As usual, I learned loads, and I hope you do too...Oh, and this is one of the first podcast episodes that I have created chapters for. If you find them useful, do let me know (tom.raftery@sap.com) and I'll make the effort to do it more often!If you have any comments/suggestions or questions for the podcast - feel free to leave me a voice message over on my SpeakPipe page or just send it to me as a direct message on Twitter/LinkedIn. Audio messages will get played (unless you specifically ask me not to).If you want to learn more about how to juggle sustainability and efficiency mandates while recovering from pandemic-induced disruptions, meeting growth targets, and preparing for an uncertain future, check out our Oxford Economics research report here.And don't forget to check out the 2021 MPI research on Industry 4.0 to find out how to increase productivity, revenues, and profitability for your operations. This global study examines the extent to which manufacturers deploy Industry 4.0 in their business and the benefits it brings.And if you liked this show, please don't forget to rate and/or review it. It makes a big difference to help new people discover it. Thanks.And remember, stay healthy, stay safe, stay sane! 

Liga de Electrones
Bluetooth Low Energy ¿Como empezar? Parte 2

Liga de Electrones

Play Episode Listen Later Nov 15, 2021 31:47


Miguel Reyes nos da una catedra sobre que se necesita para empezar a hacer productos un poco mas profesionales que utilicen bluetooth low Energy. Hay funciones de seguridad que protegen tu aplicación pero eso ocasiona que se necesiten mas herramientas para poder diseñar de forma mas sencilla y evitarse problemas. Esperemos que lo disfruten

HDTV and Home Theater Podcast
Podcast #1024: Dune, Seven Alexa Commands You Are Not Using and Why Matter Matters

HDTV and Home Theater Podcast

Play Episode Listen Later Nov 5, 2021 53:53


On today's show we discuss watching Dune from our home theaters, Seven Alexa commands you are probably not using, and why we think Matter really matters. Plus we have two weeks of emails and news. Dune - Our thoughts 7 Alexa commands you're probably not using (but should be) With Alexa and the range of Echo devices, -- including smart displays and smart speakers -- Amazon has built a robust service that can deliver seemingly endless information and control your home. But, are you actually taking full advantage of all it can do? Full article here… Samsung promises Matter support for SmartThings hubs, Galaxy devices, TVs, and fridges The Matter smart home train is picking up steam. Following Google's commitment to the new standard at its developer conference last week and Apple's addition of Matter support in iOS 15 at WWDC, Samsung is now following suit. The company announced a complete adoption of Matter across ​Samsung's Galaxy devices, televisions, Family Hub appliances, and SmartThings hubs at SDC21, its virtual developer conference being held this week. Full article here… Matter is the foundation for connected things. This industry–unifying standard is a promise of reliable, secure connectivity—a seal of approval that devices will work seamlessly together, today and tomorrow. Matter is creating more connections between more objects, simplifying development for manufacturers and increasing compatibility for consumers. This collaborative breakthrough is built on proven technologies and guided by the Connectivity Standards Alliance (formerly Zigbee Alliance), whose members come together from across industries to transform the future of connectivity. Companies from across the industry are contributing market-proven technologies and best practices. Matter is built around a shared belief that smart home devices should be secure, reliable, and seamless to use. By building upon Internet Protocol (IP), Matter will enable communication across smart home devices, mobile app and cloud services, and to define a specific set of IP-based networking technologies for device certification. Foundation for connected things: Simplicity - Easy to purchase and use Interoperability - Devices from multiple brands work natively together Reliability - Consistent and responsive local connectivity Security - Robust and streamlined for developers and users An open-source approach Members of the Alliance have taken an open-source approach to the development and implementation of this new, unified connectivity protocol. We are using best-in-class contributions from market-tested smart home technologies, such as those from Amazon, Apple, Google, the Connectivity Standards Alliance (formerly the Zigbee Alliance), and others. By leveraging these technologies' contributions, we have been able to accelerate the development of the protocol and deliver benefits to manufacturers and consumers faster. IP-Based Matter makes it easier for device manufacturers to build devices that are compatible with smart home and voice services such as Amazon's Alexa, Apple's Siri, Google's Assistant, and others. The first specification release of the Matter protocol will run on Wi-Fi and Thread network layers and will use Bluetooth Low Energy for commissioning.

Liga de Electrones
Bluetooth Low Energy ¿De dónde salió? Parte 1

Liga de Electrones

Play Episode Listen Later Nov 1, 2021 29:59


Bluetooth ha crecido muchísimo en los últimos años. Parecía que cada protocolo de comunicación iba a tener nichos de uso y que las personas tendríamos que tener gateways con múltiples radios para comunicar cosas entre cosas y al internet. Hoy día Bluetooth tiene una proyección muy amplia donde poco a poco se esta comiendo muchos mercados conforme la especificación va creciendo y la capa física va mutando poco a poco. Hablamos con Miguel Reyes ingeniero de aplicaciones enfocado a comunicaciones inalámbricas y que tiene 10 años utilizando bluetooth y soportando grandes clientes que utilizan el bluetooth de maneras estándar, pero también muy locas. En este episodio Miguel nos platica un poco de la historia de bluetooth y Bluetooth Low energy. Y sirve de preámbulo para una serie de episodios relacionados con bluetooth y bluetooth low energy. Esperemos que lo disfruten Bluetooth por años ha ido ganando terreno en cuanto a los protocolos de comunicación más conocidos y utilizados por las personas. El celular sirvió como detonante para que bluetooth se comiera muchas otras aplicaciones y mas de 10 años después sigue creciendo y expandiéndose hasta llegar a localizar físicamente cosas. Miguel Reyes           Twitter          @reyesjr88

TI Connect Podcast
Connect: Introduction to multi-protocol system-in-package (SIP) module

TI Connect Podcast

Play Episode Listen Later Aug 25, 2021 8:32


On this episode of Connect, learn about the new SimpleLink CC2652RSIP wireless system-in-package (SIP) module, a fully certified small form-factor module with integrated DC/DC components, balun and crystal oscillators. The new CC2652RSIP supports Bluetooth Low Energy, Zigbee and Thread wireless protocols to help save time, money & system designs in all applications.

IoT For All Podcast
The Current State of Indoor Positioning with IoT | Navigine's Alexey Panyov and Elvina Sharafutdinova

IoT For All Podcast

Play Episode Listen Later Jul 26, 2021 31:30


In this episode of the IoT For All Podcast, Navigine CEO Alexey Panyov and CMO Elvina Sharafutdinova join us to talk all-things indoor positioning with IoT. Alexey and Elvina share their experience building an indoor positioning solution, some of the use cases they've tackled, and where the technology is going in the near future, and what use cases we can expect that will unlock.Alexey Panyov has a PhD in Physics and Math at Moscow State University and has over 15 scientific articles and more than 10 years of experience in software development. In Lomonosov Moscow State University, Alexey was engaged in various navigation projects in the defense area including the development of navigation systems for aircraft, underwater, underground moving objects, and vehicles.Elvina Sharafutdinova serves as CMO of Navigine and possesses a master's degree in economics. She's the former chairwoman of Unilever millennials board and is highly experienced in sales and project management, as well as the building and managing of sales departments.Interested in connecting with Alexey and Elvina? Reach out to Alexey on Linkedin here or Elvina here.About Navigine: Navigine is a global provider of integrated positioning technologies that enable advanced wayfinding and tracking solutions, with over 500 implementations worldwide.Key Questions and Topics from this Episode:(01:28) Introduction to Alexey Panyov and Elvina Sharafutdinova(02:29) Introduction to Navigine(03:12) Navigine Use Cases(05:08) How do the different kinds of indoor location applications differ?(06:57) What sets Navigine apart from other indoor tracking solutions?(10:56) In terms of marketing and go-to-market strategy, what did Navigine do to set itself apart in the market?(12:23) What's the current state of the indoor tracking/navigation market?(14:55) What technologies are playing the largest role in the indoor positioning space? (20:07) How do you see indoor navigation and positioning playing a role in the healthcare and logistics spaces?(23:53) What advice do you have for companies in the space and companies looking to implement indoor positioning?

Bits: daily tech news bulletin
Ebay wants in on NFTs

Bits: daily tech news bulletin

Play Episode Listen Later May 12, 2021 4:21


Welcome to Bits, your daily tech news bulletin, for Wednesday, May 12, I'm Seamus Byrne.The federal budget happened last night, and over the past week the government pre-announced many aspects that are important to technology and digital culture industries, including the tax offset scheme for videogames and the new AI centre at the CSIRO. Unfortunately the university sector continues to be treated with disdain by the government, with almost 10% of further cuts that will see yet more jobs lost in the sector. And never forget the government's continued negligence on climate change.https://www.innovationaus.com/local-tech-gets-overlooked-by-govt-again/Intel has unveiled its 11th-generation H-Series Core processors for high-end mobile performance overnight. Codenamed Tiger Lake, the new hardware is aimed at people who want to take serious gaming or graphics processing on the go. Alongside the news, NVIDIA also unveiled its mobile edition RTX 30 Series GPUs alongside Intel's announcements, with Dell, HP, Lenovo, Gigabyte, MSI and Razer all having new high-end laptops ready to roll based on the new hardware combination.https://www.anandtech.com/show/16668/intel-launches-11th-generation-core-tiger-lakeh-eight-core-10nm-mobile-processorshttps://blogs.nvidia.com/blog/2021/05/11/geforce-rtx-studio-laptops-3050-ti/To go with your shiny new gaming laptop why not grab a shiny new VR headset? HTC is holding its ViveCon virtual event this week and revealed the new Vive Pro 2 and Vive Focus 3 headsets. The Vive Pro 2 is a big upgrade over the previous generation, with a 120-degree field of view, 120Hz refresh rate and 2448x2448 pixel resolution for each eye. The Focus 3 features similar specs but is a wireless all-in-one VR system that requires no PC and no sensors and is targeted toward business users.https://uploadvr.com/vive-pro-2-vive-focus-3/Good news for smart home technology today, with a leading interconnectivity standard getting a brand overhaul ahead of full rollout to the market. The tech is now called Matter, with a logo that will appear on supporting hardware. Matter is being supported by Apple HomeKit, Amazon Alexa, and Google Assistant standards and can run over Ethernet, Wi-Fi, Bluetooth Low Energy, or Thread networking technologies.Matter is run by an industry alliance, formerly known as Zigbee and now the Connectivity Standards Alliance, that is sponsored by Apple, Google and Amazon, the project is open source and royalty free, and market leaders like Philips are saying they can send software updates to existing products to support Matter.https://www.cnet.com/home/smart-home/amazon-google-apple-back-alliance-to-certify-smart-home-devices-that-work-together/Ebay has announced it will allow the sale of NFTs on its platform, adding yet more legitimacy to selling all manner of digital things as collectible tokens on blockchains. NFTs are typically bought and sold using cryptocurrencies, but that doesn't have to be the case, so eBay may lead to a mainstreaming of the concept. eBay has also recently said it is looking at the possibility of accepting cryptocurrencies as a payment in future.https://www.reuters.com/business/retail-consumer/ebay-taps-into-nft-frenzy-allows-sale-platform-2021-05-11/The little space probe that could, Voyager 1, keeps on delivering fascinating new insights into the great beyond, with a new report in Nature Astronomy looking at how its instruments are now detecting the constant drone of interstellar plasma waves. This is valuable insight into the nature of particles and plasma in the very-nearly-full-vacuum beyond our solar system. Launched in 1977, it is now over 22 billion kms from home and sends data back at a rate of 160-bits-per-second from its 70 kilobytes of memory.https://phys.org/news/2021-05-space-voyager-plasma.htmlIn games news, for those lucky enough to have gotten their hands on a PlayStation 5... See acast.com/privacy for privacy and opt-out information.

The IoT Podcast
29 | IoT, Connected Health and Wearables | Adrie Van Meijeren - Dialog Semiconductor

The IoT Podcast

Play Episode Listen Later Apr 30, 2021 23:24


In episode 29, we plunge into the IoT Connected Health and Wearables universe with Adrie van Meijeren – Product Marketing Manager at Dialog Semiconductor, to examine the technology and applications sculpting the Medical and Healthcare industries!

Python en español
Python en español #11: Tertulia 2020-12-15

Python en español

Play Episode Listen Later Apr 27, 2021 102:06


Más de lo que nunca quisiste aprender sobre JIT, guardas y especialización https://podcast.jcea.es/python/11 En lo que sigue, cuando se habla de CPython, se refiere al intérprete de referencia de Python, que está escrito en lenguaje C: https://www.python.org/downloads/. Participantes: Eduardo Castro, email: info@ecdesign.es. Conectando desde A Guarda. Jesús Cea, email: jcea@jcea.es, twitter: @jcea, https://blog.jcea.es/, https://www.jcea.es/. Conectando desde Madrid. Javier, conectando desde Madrid. Víctor Ramírez, twitter: @virako, programador python y amante de vim, conectando desde Huelva. Miguel Sánchez, email: msanchez@uninet.edu, conectando desde Canarias. Audio editado por Pablo Gómez, twitter: @julebek. La música de la entrada y la salida es "Lightning Bugs", de Jason Shaw. Publicada en https://audionautix.com/ con licencia - Creative Commons Attribution 4.0 International License. [00:52] Aviso de que se está grabando. Temas legales. [01:52] Valor de publicar estos audios y las dificultades para hacerlo. [02:42] Métodos mágicos: __set_name__(). PEP 487: https://www.python.org/dev/peps/pep-0487/. [04:12] Problemas con PIP 20.3.2: https://github.com/pypa/pip/issues/9284. [05:52] ¿Actualizar a la última versión o esperar? Poder "echar atrás" fácil. Acumular cambios pendientes es deuda técnica. [10:42] Google caído https://www.theguardian.com/technology/2020/dec/14/google-suffers-worldwide-outage-with-gmail-youtube-and-other-services-down. [11:02] Generación de wheels en varios sistemas: https://pythonwheels.com/. auditwheel: https://pypi.org/project/auditwheel/. ¿Generación de Wheels en Microsoft Windows? [13:12] Caché local de PIP https://pip.pypa.io/en/stable/. [14:17] Event Sourcing https://dev.to/barryosull/event-sourcing-what-it-is-and-why-its-awesome. Módulo eventsourcing: https://pypi.org/project/eventsourcing/. [14:42] De momento se puede usar el viejo "resolver" de dependencias de PIP. Se puede usar la opción -use-deprecated=legacy-resolver. Esa opción se puede meter también en el fichero de configuración, para no tener que escribirlo en cada invocación. Jesús Cea comete el pecado de meter paquetes Python en el sistema operativo. [17:02] Batallitas de Jesús Cea. Jesús lleva dos años dándole vueltas a esto: bpo35930: "Raising an exception raised in a "future" instance will create reference cycles": https://bugs.python.org/issue35930. Explicación detallada del asunto. Brainstorming. [21:22] Visión a alto nivel del recolector de basuras de Python (cpython) Contador de referencias. Inmediato, pero no recoge ciclos. Si se crean instancias y no se destruyen, se llama a un recolector "pesado" que también recoge ciclos. Esto puede ser problemático al arrancar el programa, antes de que la creación/destrucción de objetos se "estabilice". gc.disable(): https://docs.python.org/3/library/gc.html#gc.disable. Jesús Cea "abusa" de los destructores y de que se ejecuten cuando él quiere. Lo práctico contra lo puro. Jesús ofrece cervezas. gc.collect(): https://docs.python.org/3/library/gc.html#gc.collect. Esto sirve tanto para recoger los ciclos como para comprobar si tu programa tiene ciclos de memoria o no. Futures: https://docs.python.org/3/library/concurrent.futures.html. [35:29] Módulo Manhole https://pypi.org/project/manhole/. Explorar un programa en producción. Tracemalloc: https://docs.python.org/3/library/tracemalloc.html. DTrace: http://dtrace.org/blogs/about/. py-spy: https://pypi.org/project/py-spy/. Pérdidas de memoria: Recordar lo hablado ya en tertulias anteriores. jemalloc: http://jemalloc.net/. MALLOC_PERTURB_: https://debarshiray.wordpress.com/2016/04/09/malloc_perturb_/. zswap: https://en.wikipedia.org/wiki/Zswap. [42:52] Micropython: https://micropython.org/. ESP8266: https://en.wikipedia.org/wiki/ESP8266. ESP32: https://en.wikipedia.org/wiki/ESP32. Bluetooth Low Energy: https://en.wikipedia.org/wiki/Bluetooth_Low_Energy. ¿Qué ventajas aporta usar Micropython? Velocidad de desarrollo y depuración. [52:42] ¿El futuro será mejor? O no. Desperdicio de recursos materiales porque realmente sobran. Python es mucho más lento que C y no digamos ensamblador. [57:17] Cambiar Python por un lenguaje más rápido. Go: https://en.wikipedia.org/wiki/Go_(programming_language). Rust: https://en.wikipedia.org/wiki/Rust_(programming_language). C++: https://en.wikipedia.org/wiki/C%2B%2B. [01:00:20] Python no pinta nada en móviles. Kivy: https://kivy.org/. [01:02:07] Acelerar Python. Subinterpreters: PEP 554: https://www.python.org/dev/peps/pep-0554/. Si los subintérpretes no compartiesen NADA, se podrían lanzar simultaneamente en varios núcleos de la CPU sin competir por un GIL https://en.wikipedia.org/wiki/Global_interpreter_lock único. JIT: https://es.wikipedia.org/wiki/Compilaci%C3%B3n_en_tiempo_de_ejecuci%C3%B3n. PYPY: https://www.pypy.org/. RPython: https://rpython.readthedocs.io/en/latest/. Numba: https://numba.pydata.org/. Cython: https://cython.org/. Python es "potencialmente" muy dinámico, pero en la práctica los programas no lo son. Jesús pone varios ejemplos. Conversación densa entre Jesús y Javier. Guardas para comprobar que la especialización sigue siendo correcta. Por ejemplo, para los diccionarios: PEP 509 Add a private version to dict: https://www.python.org/dev/peps/pep-0509/ "Tipado" más estricto. MYPY: http://mypy-lang.org/. Pydantic: https://pydantic-docs.helpmanual.io/. Comprobación de tipos en tiempo de ejecución. Descubrimiento de tipos en tiempo de ejecución, proporcionando "especialización". psyco: https://en.wikipedia.org/wiki/Psyco. Eduardo Castro entra y simplifica la discusión. Jesús explica qué hace "a+b" internamente. [01:29:22] PyParallel http://pyparallel.org/ Memoria transaccional: https://es.wikipedia.org/wiki/Memoria_transaccional. (nota de Jesús Cea): Los sistemas de persistencia Python descritos en tertulias anteriores pueden considerarse casos de memoria transaccional... si somos flexibles. "Colorear" objetos y que dos hilos no puedan acceder a objetos del mismo color simultaneamente o en transacciones concurrentes. [01:30:42] PYPY https://www.pypy.org/ es tan sofisticado que no lo entiende ni dios. Jesús Cea lo ha intentado y se ha rendido. psyco: https://en.wikipedia.org/wiki/Psyco. CFFI: https://cffi.readthedocs.io/en/latest/. [01:35:22] Compilar CPython a WebAssembly https://en.wikipedia.org/wiki/WebAssembly va más rápido que en C nativo. [01:36:02] Simplemente compilar código python con Cython https://cython.org/ sin declaración de tipos dobla la velocidad de ejecución. ¡CPython lo puede hacer mejor! [01:36:57] Subinterpreters: PEP 554: https://www.python.org/dev/peps/pep-0554/. Poder usar todos los núcleos de la CPU. [01:38:07] Seguimos hablando del asunto. [01:39:07] Un problema es que Python tiene la vocación de funcionar en todas partes, así que hay resistencia para implementar mejoras solo en ciertas plataformas. [01:40:17] Cierre. Dadle una pesada al bug bpo35930: "Raising an exception raised in a "future" instance will create reference cycles": https://bugs.python.org/issue35930. [01:41:13] Final.

Matrix Live
Matrix Live S06E12 - P2P Matrix Bluetooth Low Energy demo!

Matrix Live

Play Episode Listen Later Feb 12, 2021 22:45


Neil & Matthew play with P2P Matrix BLE

Chats with James Podcast
007 - Michael Nitschinger

Chats with James Podcast

Play Episode Listen Later Feb 9, 2021 53:08


James chats with Michael Nitschinger of Couchbase to discuss Coffee Machines, PID control loops, Bluetooth Low Energy, and Databases.

Merge Conflict
233: Bluetooth is Mind-blowing!

Merge Conflict

Play Episode Listen Later Dec 21, 2020 59:52


James has finally discovered the magic of Bluetooth and is on an adventure of building his own app. On top of that he is investigating the wonderful world of IoT and Bluetooth combined! Follow Us Frank: Twitter, Blog, GitHub James: Twitter, Blog, GitHub Merge Conflict: Twitter, Facebook, Website, Chat on Discord Music : Amethyst Seer - Citrine by Adventureface ⭐⭐ Review Us (https://itunes.apple.com/us/podcast/merge-conflict/id1133064277?mt=2&ls=1) ⭐⭐ Machine transcription available on http://mergeconflict.fm

soundbite.fm: a podcast network
Merge Conflict: 233: Bluetooth is Mind-blowing!

soundbite.fm: a podcast network

Play Episode Listen Later Dec 21, 2020 59:52


James has finally discovered the magic of Bluetooth and is on an adventure of building his own app. On top of that he is investigating the wonderful world of IoT and Bluetooth combined! Follow Us Frank: Twitter, Blog, GitHub James: Twitter, Blog, GitHub Merge Conflict: Twitter, Facebook, Website, Chat on Discord Music : Amethyst Seer - Citrine by Adventureface ⭐⭐ Review Us (https://itunes.apple.com/us/podcast/merge-conflict/id1133064277?mt=2&ls=1) ⭐⭐ Machine transcription available on http://mergeconflict.fm

TI Connect Podcast
Connect: Wi-Fi and Bluetooth LE Coexistence

TI Connect Podcast

Play Episode Listen Later Dec 11, 2020 8:32


Learn why Wi-Fi® and Bluetooth® Low Energy coexistence is important for your connected application. www.ti.com/coex

The Build Better Software Podcast
"Don't Say That At Work" with Michael Callaghan

The Build Better Software Podcast

Play Episode Listen Later Oct 27, 2020 42:24


Buy the book here: https://gum.co/dont-say-that/podcast-specialMichael's pluralsight courses here: https://www.pluralsight.com/authors/michael-callaghanRough Transcript (powered by Otter.ai)George Stocker  0:00  Hi, I'm George Stocker, and this is the build better software podcast. Today I have the pleasure of talking with Michael Callahan, lead software engineer at Walt Disney World. And I want to welcome you to the show.Michael Callaghan  0:11  Thank you, George, happy to be here.George Stocker  0:13  So for the those of us who may not know about you, or what you do, tell us a little bit about yourself,Michael Callaghan  0:19  where can I start, I am halfway through my third decade of professional software development. It was way back in the ninth grade in buoy High School. When the data processing teacher, we actually had that class, took pity on me, and allowed me to essentially use her dumb terminals in the classroom after school to teach myself basic. That led to a love for computers and software that never really waned. Even though it was about 10 years after graduation, before I got my very first paid software development gig. And I even got burned out in the late 2000s. Well, mid mid to late 2000s. And didn't work for three years in the industry. And fortunately, that that changed. And I'm now in my 10th year at Disney with Disney Parks experiences and products, where I build what we call cast facing web applications.George Stocker  1:28  So applications for the internal employees that work at Microsoft, or not Microsoft at Disney,Michael Callaghan  1:35  correct. As you may or may not be aware, Disney Parks refers to their employees as cast members, because the entire place if you will, is the metaphor as a as an ongoing show. So even us, we were called backup house cast members, because we're never on stage.George Stocker  1:53  And now you have a book that just came out, which I had the privilege to read. It's called "Don't Say That at Work". Tell us a little bit about that.Michael Callaghan  2:00  What can I tell you about that, as you can probably imagine, if you've done anything for any length of time, you're going to make a lot of mistakes. Hopefully you recover from those mistakes and learn from them. This book is about some of what I consider the more egregious errors that I've made over my career, and some cases, mistakes that somebody else might have made or things that I've observed. And I just decided to put them down in essay form, came up with 20 topics and went ahead and publish the book. So far, it's been well received. George Stocker  2:36  Now, before we dive deeper into your background, I want to dive a little bit into the book. And in the book you talk about not only, you know, mistakes that that you've made, but also things that both software engineers and software leaders should be aware of. And you have a story in it about about one of your bosses, can you go deeper into that storyMichael Callaghan  2:57  I mentioned a few different bosses in the story is which one he is talking about in particular,George Stocker  3:03  it was it was a boss that was not was not altogether truthful.Michael Callaghan  3:09  That was a fun experience, because that was very early in my career. And so I was still naive, wet behind the ears, whatever phrase you want to use. And I never had a college degree, at least not at that point. I was a University of Maryland computer science dropout twice. So when I got my very first software development job in 1995, I felt very fortunate that someone was willing to give me a chance without a degree. That did not turn out too well. And then I got my second job. And that was this particular boss. Not only did he not give me the job that he hired me to do, which was that of a Macintosh developer. And yes, I was a Mac developer before it was cool back when we used Pascal. But not only did he not give me the job that he had hired me to do a few years into the into the job, I want to say bout a year and a half, maybe two years. He asked me to falsify my resume. Because what he would do was send resumes of his employees when he when he would bid on a job. So we were as we were an independent software development shop. And he would go and bid on different development projects, bring them back in house, and then he would manage the project. So this particular client wanted only college graduates to work on their project. And that's their prerogative. I didn't have a degree. And when I pointed that out to him, and he did two things very quickly. One he got annoyed with me for not having a degree even though he knew that and then second, he went ahead and modified my resume to say that I had a computer science degree when he sent it to the client. As you can imagine, I didn't take that very well. But this is my my boss. This is my livelihood, doing what can you do about it. Eventually, I decided that I couldn't in good conscious, keep working for this guy. So I started looking for other jobs. So I went ahead and submitted my resignation and turned over the key to the office and walked out the door, essentially.George Stocker  5:16  But that's not the end of it, is it?Michael Callaghan  5:17  It is not.You have read the book. So right after I resigned, I thought we were on pretty good terms. He sent me an email that said, Hey, would you mind signing this affidavit? I just need something for, for the record saying that, you know, you officially quit and you don't have any company property. And then you're not going to solicit any of our clients or, or employees to try to poach them. I was good with that I looked through it didn't seem to be anything scary in there. So I signed it to the back a day or two later, I was cleaning out my desk, at home, my work from home desk, and I found a couple of CDs that obviously belonged to my employer, my former employer. So I sent off a quick email to him, I said, hey, I've got these CDs. I must have overlooked them. If you want, I can bring them by the office sometime, put them in the mail, whatever you want, set them aside. didn't think anything more about it. That Saturday, I got a priority overnight, FedEx letter from his attorney, accusing me of stealing, not only the CDs, but also source code, and informing me that I was now the subject of both civil and criminal investigations.George Stocker  6:31  And so at that point, how are you? How are you feeling like to get that that letter petrified,Michael Callaghan  6:38  absolutely terrified. And here I am, I've got a wife in a newborn, I think my son was about 18 months old, maybe close to two years. And here I am being told that I'm going to be arrested and thrown in prison. Because I committed perjury by saying that I hadn't kept any company property. But youGeorge Stocker  6:57  did the right thing, and that you engage the lawyer in this kind of entertainment that ever gets in the situation. talk to a lawyer before you do anything. And you talk to a lawyer and a lawyer. I didMichael Callaghan  7:07  talk to a lawyer. But keep in mind, it was Saturday. There was no Google there wasn't really much of an internet in 1997. To speak of. So I there wasn't a lot of research I could do there wasn't, I couldn't go to a website and ask questions or, you know, legal online forums, I had to go to the Yellow Pages for New Hampshire, find a lawyer pretty much at random, and wait until Monday. So I had to wait two whole days, not knowing what was gonna happen. And then Monday morning, I called someone that I had found that offered one hour free consultations and explained to him what happened. He had me come into his office with everything that I had, you know, the letter or the the email the the letter that I had signed, saying that I wasn't going to take anything and meet him in his office that morning. When I got there, he reviewed everything he heard my side of the story said, this seems like overkill. This seems kind of silly. So let me just go ahead and give this guy a call. Maybe we can take care of it right now. I won't even charge you anything. I'll just, I'll just help you take care of it. And when he made the call, my boss flipped out. I don't think he was expecting me to fight back. I assumed he just thought I would roll over and cower, which kind of what I want it to do. But one of the one of the cool things about the call from my attorney said, Let's call him Mr. Smith, said Mr. Smith, you can't go around threatening criminal prosecution to as a private citizen. He said, That's not how this works. He says, in fact, you could be putting yourself in legal Jeopardy by doing that. In this state, he goes, so I would appreciate it. If you don't go around making threats like that to my client. You know, now I'm getting nice and puffed up. That was the wrong thing to say to this guy. He he was not one that could be intimidated. And I could hear through the other end of the phone. He was just screaming at my attorney. Eventually everything calmed down. But when they got off the phone, the the lawyer looked at me and said, Well, I thought we could take care of this pretty easily, but it looks like not. And so I had to hire him officially and give him a $500 retainer. And then he took over negotiations with my former bosses attorney. And the way it all ended up, I ended up driving to this other attorney's office, giving him the two CDs and another affidavit and believe it or not, I was also required to apologize for putting my boss and all in his company through this ordeal, and it cost me $500 so for the privilege of doing that, but in the end, I never served any prison time. So I guess it's all good.George Stocker  9:49  Yeah, no, it was it was a harrowing story to read. And it it reinforced at least for me in my background is Ensuring that when you're interviewing at a company, or when you're working somewhere, you know, if you see small things that look like they're out of place, you see small moral misgivings that that can, you know, that's not just the first time that somebody's done something about, you know, falsifying your resume and sending out to his clients or prospective clients for the company is not probably the first time that they've done something that is ethically questionable. And you need to be on the lookout for that, because it could lead to in fact, what you went through, which is a pretty harrowing experience.Michael Callaghan  10:38  It was definitely a harrowing experience.George Stocker  10:41  Now, on the lighter side of the book, the book has 20 some odd lessons about things not to do at work. And one of the other passages that really stuck with me was, don't say no at work, and you give an example of how things are handled during a Walt Disney experience. Can you go into more detail?Michael Callaghan  11:03  Yes. And let me preface that by just explaining that. I am not a Disney operations cast member. I don't work in the parks. Well, I do sometimes, but not it's not my job. So I haven't been through a lot of this training. But I've seen it in action. And I've always marveled at it. So if, if, if I can let me start with a real quick story that's not in the book. Have you been to Walt Disney World?George Stocker  11:27  I have about some I'm ashamed to say about 20 years ago now, I have only been one. Okay.Michael Callaghan  11:34  So the location that I'll mention probably wasn't won't mean anything to you. In the one of the newer sections of Magic Kingdom is new Fantasyland. And in new Fantasyland is the beasts castle from beating the beast in that castle is in a restaurant called br guest. And on one of the few occasions that I have actually gotten to work in the parks. I was helping out on on a abnormally. Let's see what how the right how to put this to the right way. It was a holiday period with increased Park attendance. How's that? And I was working in VR guest a kind of as a volunteer, helping with keeping parties together and handing out menus. And someone came up to me holding the menu and they said, Hey, can I keep this? Keep it? What do you mean? You know, do you get your food? No, no, I want to keep it for forever as a souvenir. I was taken aback as I never heard that question before. And it wasn't something that I was trained to deal with. And my first thought is, well, of course you can't keep this it's you know, people need these. This is its menu. And so that was mine. incident reaction was? No, of course not the look on this guest face when she handed me the menu and walked away. Something I won't forget anytime soon. And what I learned from that, from the manager in the in the restaurant was we don't tell guests No. What if they make something you know, what if you can't accommodate them? What if it really is an unreasonable request? And she said, Well, first of all, that's not an unreasonable request. People take our menus all the time, we're we're aware of that. You're Second, you need to learn to say no without saying no. Okay. So that leads me to the story that's in the book. And we were in my family and I were in Disney's Hollywood Studios outside of the sci fi dining restaurant, and we had reservations and we had checked in, we're waiting for our table or our car, if you've ever been there, and people would come up to the hostess at the podium outside the restaurant and ask, do you have any tables available? And I never once heard her say the word no. And I watched for quite a while. She would say things like, I'm sorry. We don't have any tables available. But would it be okay, if I helped you find another restaurant nearby? That seemed to be her go to answer. Or, you know, another possibility for another restaurant might be? Could we see you at the bar? Could we can you know? Would you be okay? Or would you be open to take out? Apparently some of the Disney restaurants do that. And I did not know that at the time. So there are all sorts of ways to tell people No, without telling them No. Because when you tell them no, the conversations over, you really can't go any further. But if you say I'm afraid I can't help you in that particular request. Is there another way I can help you? And we can move forward? Or there? We don't have any tables now. But what about an hour from now? Would that work for you? So the goal is always to be trying to help rather than just shutting down saying no. So you can move on with your day.George Stocker  14:36  There are a lot of stories in your book and they and they all seem to have a a personal perspective to it, which provides a lot more of an emotional background. And we won't go into the example here too much. But you you put yourself into this book, you know with with all of the examples That you wrote, like the time that and people should read the book, like the time that you were in a net meeting call and accidentally, after a rather tense conversation accidentally ended the conference for everybody on the call. And it's, it's just like, I can feel your how much of yourself you put into this book. And it shows when you're reading on the pages, and I feel like I was feeling those emotions with you. While you were writing it, how was that process for you?Michael Callaghan  15:28  For the most part, it was just me in a brain dump of what I remembered about the situation. And the particular one that you're referring to now I call it my temper tantrum. That was at HP back in 2005. And the reason I remember that one so well, is because I almost wrote a book at the time about it. And I never got any farther than a bunch of chapter titles. And so I was cleaning out my harddrive one day. And I found this file, looking through it. And I said, I remember this. Oh, yeah. And I had forgotten about that. I'd forgotten about that. Oh, yeah, I remember doing that. So in that one. And I think that's probably one of the more detailed chapters in the book, because I had all that information right in front of me, that I could draw from. Now, if you're asking, how was it emotionally? Looking back on it, it's just kind of funny to me now. Because I remember, right after I hung up on that call, I started getting instant messages from my co workers. Did you just hang up on everybody? And I said, you know, did I? I guess I did because I initiated the call. And it's not like today's zoom calls Weren't you click leave it says, you know, disconnect. Everybody, yes or no? It was just the call has been ended by the by the originator or something of that nature. And it was done.George Stocker  16:45  Now you are the lead software engineer atMichael Callaghan  16:49  Disney Be careful. Let me let me correct you there. I am a lead software engineer. It's a title. It's notGeorge Stocker  16:56  I'm not the lead the lead of anything. The lead the lead, you know, you're one of several correct InMichael Callaghan  17:02  fact, there were four leads on my, on the team that I'm currently on. SoGeorge Stocker  17:06  now as a lead at Disney, what does that entail? What is your day to day look like?Michael Callaghan  17:12  It really depends on the project. So I've done everything from lead the team, which is what you would expect from the title. So I was on a team and I would help with the running the stand ups and work with the the business owners on story grooming and everything you might imagine that a lead would do. And seeing the project through from initial funding, through planning through execution and delivery, through getting sustainment turned over. So I've done that these days with everything going on in the world and with with Disney, it's more of a where do we need something right this second? Can you go help with that? It wasn't long ago that I was writing node scripts to talk to JIRA, the live in Ohio, quote, what do you call JIRA?George Stocker  18:07  I try not, I tryMichael Callaghan  18:08  not to also but at this point in time project management system, right. So we were moving the system from from one machine or one version to another, and they wanted some custom code written to copy a lot of the the issues from one system to the other. They said, well, Mike, do you know node? I do know node. All right. Can you run with this for a few weeks? Sure. Because literally, it's wherever we need you right now. And I think that's a result of COVID. At this point, I'm just happy to have a job.George Stocker  18:40  And how big is your team at Disney?Michael Callaghan  18:43  About a dozen of us total, including some managers,developers, testers, etc. George Stocker  18:50  Okay, and the and this team is the team responsible for internal facing a cast member applications or there's severalMichael Callaghan  18:59  there are several teams. So I want to be careful not to try to you know, dig into the the internal structure workings of the company, because I am not a spokesman for the company. So I'm working on a very small, vertical segment for reservations. And that's about as far as I'll go into, at this point.George Stocker  19:19  Okay. Now, during your career, you've worked at Disney, you've worked at HP. And you and you've talked about a little bit at the top of the show you talked about a few years where you were burnt out. Can you talk about what led up to that, to that burnout Michael Callaghan  19:35  temper tantrum and howGeorge Stocker  19:36  and you recovered for it. It was the temper tantrumMichael Callaghan  19:38  temper tantrum.I think this is in the book that I was given the opportunity to stay on with with hp. They didn't fire me. But they also didn't let me continue on in that project the way I had been because I was I was a de facto leader on that project. And so when I made the decision to do what I did, that led to the lukol The temper tantrum. I kind of knew that if it didn't work, it was going to be bad. But I did it anyway. So when my manager called and she was in California, at the HP headquarters out there, and I was in Southern New Hampshire, so we couldn't have been farther away physically, if we had tried, she gave me the option to stay on with hp for no less than a year in a probationary state, which meant no, no raises no potential promotions or anything like that. So and then they would revisit it in 12 months to see where I had whether I had been a good boyfriend for the year, I did not relish the idea in 2005, of continuing on a project that at this point was five years old and written in Visual Basic six. So I told her, I had another option for her. And that's that I would just give her my two week notice. And she wouldn't have to deal with me anymore. She negotiated an extra two weeks out of me. So I stayed around for another month after that, essentially, helping the the contractors that then hired, understand the software. And then I left. A few months later, I packed up, I moved from Southern New Hampshire to Central New Hampshire. And for the next two and a half to three years, I was a failed real estate investor. And I say failed, because it started out pretty good. And then I started losing money and losing money and losing money.George Stocker  21:29  Was that around the time that the bubble burst on housing?Michael Callaghan  21:32  Yes, right after I made my first few deals, where, where it looked like, Hey, you know, I can make a living doing this. And so I started making a living doing that. And then suddenly, I was no longer making a living doing that. Now, I went from making $50,000 on two deals on a row, to making 15,000 on a deal. That's okay, you know, if you do one of those a month, that's still pretty good, right? And then $7,000 on a deal, and then barely breaking even on a deal. And you'd think that with a software development background, that the pattern would emerge. But it didn't, because I was blinded by my desire to make it work. And so from there, where I should have simply stopped, I lost over the next few years, I think I lost over $200,000. So that was fun.George Stocker  22:20  I'm, I'm trying not to like betray the fact that my mouth is agape. And I'm like, that's, you know, that's that's a lot of money. Michael Callaghan  22:29  Fortunately, I didn't lose it. I mean, it didn't come out of my pocket personally.What had happened was the, the properties were over leveraged. And there were two in general, though, that really were the killer. And I don't know if you want a real estate story that's not in the book, but I consider it one of my biggest failures.George Stocker  22:48  failure is something that helps us learn so sure,Michael Callaghan  22:51  there was a house. And in reality, it was a mobile home was a quote unquote, manufactured home in the town of Jaffrey New Hampshire, right at the base of Mountain monadnock, the tallest mountain in southwest New Hampshire, gorgeous countryside, beautiful mountain views. It was a pristine, open level lot that someone stuck a mobile home in the middle of, but the price was right. It was in good condition. It already had a tenant in it. So I went ahead and bought it and then immediately refinanced it. Because it was undervalued. I took I took the cash, to put it into another property in Concord, New Hampshire, which is the state capitol. So I'll get to that one in a minute. But the tenant I had already talked to, and she wanted to buy the place. But she needed some time to line up her finances. I said, Well, you know what, this is a great opportunity for me. I bought the property from the original owner, who was an out of state landlord, refinanced. It took $80,000 in cash out to fund the no the next investment, immediately put it under contract with the tenant and said, okay, you'll pay rent to me, because you know, you're still a tenant, you'll pay rent to me. Until we go to closing. She said, that's great. I said, I'll tell you what, I'll make it even better. I'll credit you the monthly rent towards the purchase price. Between now and closing. She's wonderful. We're all friends, everybody's happy. Tenants don't always keep their word. I don't know if you're aware of this, but sometimes they stop paying rent. And that is exactly what this one did. And what I later found out is that that was the reason that the house was available in the first place. She hadn't been paying rent to the other guy, either. She gave me one or two months, I guess to string me along and then stop paying. New Hampshire is pretty landlord friendly, not tenant friendly. They're pretty landlord friendly. So I gave her an opportunity to to catch up said hey, do you even still want to buy this place and she finally admitted to me that there was no way she would ever qualify to buy the house. So we agreed that she was just going to go ahead and move out. month went by. I heard nothing jafra was a little bit too far for me to be driving by on a regular basis. So I figured I'd give it another week and then maybe I drive out and see what's going on. Instead, I got a phone call from the town of Jaffrey foot. Well, this can't be good. They said, Mr. Callahan, we just wanted to let you know that we shut the water off to your property on mountain road. May I ask why is it Yeah, the the water guy reading the meter, he said, we noticed that you had used twice the amount of water that you normally do in a month. So he went to the door knocked the only sound nobody answered the door. But the only sound he could hear was water running.George Stocker  25:39  Oh, no.Michael Callaghan  25:41  This was probably January. I don't know where you live. But January in New Hampshire is cold, single digits for weeks at a time. What he or what we eventually discovered was that the tenant had left took all of our stuff moved out, turned off the electricity. Now there's no heat, water pipe leading to the toilet froze and broke. When the temperature went back up, and and the pipe unfroze. Now it's spewing water throughout the entire plot property. By the time I got there, it had all drained out because the floor had collapsed, for the most part with all the water. And there were water stains going up about a foot on the walls. So this thing was a foot underwater at one point. And as I mentioned, it's a manufactured home. It can't handle that the walls were destroyed, the floor was destroyed. There was nothing salvageable about this place. I eventually talked the the lender that had refinanced it into accepting $80,000 for the property when it was originally had been valued around $200,000. And I sold it to a guy who was going to demolish the thing and build his own house on it. So that was $120,000 paper loss. I still had the money from the from the cash out from the refinance. But for some bizarre reason, they didn't ask for that. And I Well, I guess I didn't have it because it was in the next house. So they ended up taking what's called a short sale. So they accepted less for pay off. And then they sent me a 1099 tax statement for the remainder. So I had to pay income taxes on that, on that, quote, unquote, gain,George Stocker  27:18  which is really just the amount that you wouldn't have had.Michael Callaghan  27:20  Right.George Stocker  27:24  Now, the you get back into software development after this this hiatus, you know, what was it like getting back into software development? And what did you do?Michael Callaghan  27:38   I got a call from a friend of mine, guy I went to high school with who knew that I had been a computer nut since ninth grade. He had a company in Maryland. And he needed a software developer, contractor, essentially, he said, Hey, I know, you really, really want to do this real estate thing. He says, but I could use a favor. Would you be open to maybe 1020 hours a week, just consulting and doing a little bit of programming for me, that led to a heart to heart conversation with him. After I agreed I did it for a little while part time, because he said I could do it from New Hampshire, I didn't have to come to Maryland. But then after my next real estate disaster, and there was a funny one after that, that one. He said to me something I'll never forget. He said, I think you might be better off if you stick to your core competencies. And as long as I've known you, your core competency has been software development. And I could use you. So at that point he offered me and I accepted a full time job with this company. And that's how I went back into the industry.George Stocker  28:43  And from there, you eventually found your way. Do you work? Or do you live in Florida now?Michael Callaghan  28:51    I do. So the the Maryland gig led to was a was a number of years, probably good three years, remote work, I flew down to Maryland once or twice a month just to show my face in the office. And that company eventually went out of business. financial problems, right? If you don't sell you don't, you don't bring in revenue, you can't stay in business. That's that led to a couple of minor contracts here and there. And then I got a chance to go to Dell in Texas. The skills I picked up at Dell in Texas, directly led to my current gig at Disney World. So if I hadn't gone to Dell, I probably wouldn't have qualified for my current job and could not be more grateful for the path that that I've been on since then.George Stocker  29:38  And so what were those things that you learned at Dell,Michael Callaghan  29:42  I was hired at Dell, essentially to be an ASP dotnet developer, when and when I say ASP dotnet I mean web forms if you're familiar with that at all. So doing C sharp, server side C sharp web development with heavy web form technology. While we were at Dell, or while I was at Dell, Microsoft came in, did a training, remember what they called it, it was like a developer conference. But it was only for people at Dell. So it was just a small conference room at a local hotel. And I was excited when I heard about it. But then I figured it was only going to be four employees. But they said, No, no, no, no, go ahead and take it. So we can't pay you to go. But you're welcome to go. So I went ahead and went, I met Phil hack, who was with Microsoft at the time.George Stocker  30:31  It was this when they were introducing ASP. NET MVC.Unknown Speaker  30:35   Exactly. Well, it wasn't the very first time because it was MVC version 2. version one didn't impress me much. So we kind of stuck with, with, with web forms. But it was the perfect time, the perfect opportunity, because the product I was on was feeling heavy. And it had a lot of a lot of code that was there, specifically to do the things that MVC two gave you out of the box. So over the next, I think it was there about a year and a half total, I was able to take what I had been introduced to at that developer seminar, and help rewrite that entire project with MVC two, and I think the code size got cut in half. Because of all the boilerplate we were just able to delete, and things like view state. Oh, gosh, I had forgotten. How can you bring that back into my mind?George Stocker  31:34  I will never forget my scars with webforms. Sadly,Unknown Speaker  31:39  yeah, so MVC 2. And that technology led me to when I interviewed with Disney, that was one of the technologies that I had on my resume. And they asked me about it. So I explained that story to them. And it turned out that the people who interviewed me knew a lot of the folks at Microsoft. And so they were, I guess that I dropped the appropriate name. And so I got thatGeorge Stocker  32:04  job. And now at Disney, what sort of technology stack do you use?Michael Callaghan  32:10  I don't think this is a secret. Yeah, I don't think it's a secret. Because if you look at if you go to Disney tech.com you you can find job postings for for all sorts of web development technologies, but it is mostly known on Angular. So I don't think it's a secret, if we're advertising for that. So just about everything I do these days is either node or Angular. I have not I was hired as a dotnet. developer, haven't done dotnet since 2012 2013. Except for one time when I I kind of sneaked in into a project. Not the same story. Yeah, not it wasn't the same as my as my my temper tantrum. But it was very similar circumstance, it was, folks, the dotnet will work perfectly here. Let's just use it. But instead of being sneaky about it, I got the approval up front to do it. Interestingly enough, sorry that that project, went live on Valentine's Day. So February 14 2018, it's now been two and a half years, the dotnet portion of that application has had one problem in production. And it was a configuration typo on my part. Other than that, it's been flawless. They don't reboot it. They don't touch it. It just works. I wish I could say the same for most of our web technologies.George Stocker  33:33  Yeah, I find myself cursing Angular every few months or so as we upgrade. But one of the things I know about Angular is that it really does remind me a lot of web forms. It's the it's the same paradigm. Just this time shifted all the way to the client and wrapped up in a pretty new bow.Michael Callaghan  33:52  interesting you say that because I'm I'm fond of telling people that it reminds me ofGeorge Stocker  33:55  Silverlight. Did you were you able to develop in Silverlight before they killed it?Michael Callaghan  34:01  Yes, I did both WP F and Silverlight.George Stocker  34:03  Yeah, they are now I guess blazer today would be the new would be the new Silverlight.Michael Callaghan  34:11  Yeah, I haven't looked at it.George Stocker  34:13  Yeah. So you as a technology leader, one of your jobs, I assume is to evaluate new technology choices and ensuring that it works for your organization. Now, what are some questions that you ask yourself when you ask your team when someone brings up a new technology choice, like let's say blazer or you know, moving from template driven forms to reactive forms in Angular?Michael Callaghan  34:39  Well,I guess I have to start by correctingyour your original supposition there, and that is that I really don't have a lot of say in what technologies we use. As you can imagine, it's a huge company. So they There are teams whose job it is to is to evaluate those technologies. I was on one of those teams once. And that's kind of where we came where we came up with Angular or the use of Angular and node.George Stocker  35:11  Is it sort of like an architectural Review Board of some sort?Michael Callaghan  35:14  Something like that? Yes. So there's a series of teams that make these decisions, they evaluate these technologies, they come up with reference implementations of these technologies. They set up training to show people how to use these technologies, they approve open source technologies, or maybe, in some cases, do not approve open source technologies. Do you need me to say that again? Did you hear the buzz?George Stocker  35:38  I did, but it's it's okay. Now with how do you interact? You know, in general, what are your What is your advice for interacting with such a committee? Because I've, I've had those, I've interacted with them in the past. But I've also been on small teams, also, where you have a lot more autonomy. How do you, you know, what's your advice for trying to sell them an idea you have?Michael Callaghan  36:01  I think the, the trick, so when this team started, I was actually on it, I had been lent out from my manager to work for a few months on that team. And one of the early decisions we made is that we don't want this architecture team to be considered an ivory tower. We don't want to be up, you know, in our tower on high making commandments. But instead, we wanted it to be collaborative. And although we didn't really get what we were hoping for, I think we had envisioned almost an open source model. If here's our here are GitHub repos. If you have something to add, add, it will will will take pull requests will, will collaborate, will do whatever you need to do, so that it feels like a partnership, not just thou shalt do this. And for the most part, I think that worked, this would have been 2015 2016. So it's been four or five years. And some of that spirit lives on in the team. So they they will collaborate, they will they will send someone to a project to help collaborate on the development in the selection of the technology. And if the technology that the development team needs is not currently in the approved basket, there is a reasonably simple process to get it approved. For example, I had to use ionic once or I didn't have to, I chose to use the Ionic framework for a project that was very time and dollar sensitive. Ionic had not been approved by this team. Fortunately, the project was given to this team. And I was sent to the team to help not only build the project, but also to help sway the technology choice. And so after a little bit of demonstration, and some proofs of concept, I was able to show Hey, we really do need to use ionic for this project to get it done quickly, ahead of schedule and under budget, because in this particular case, there were a bunch of old Windows CE II handheld devices that were going to stop working by the end of the year, because of they were no longer receiving security updates, and would not be able to handle the new Wi Fi certificates. So they were going to die if we didn't do something. So we were able to use the technology we needed to and because of that ionic got approved for use in the company.George Stocker  38:27  Yeah, and for people who may not know what ionic is, is a hybrid mobile application framework. It uses. It sits while the old version of version one x set on top of Cordova and was effectively a UI framework and a a one time for producing mobile applications that could work on both Android and iOS based devices. Now, what were your constraints where ionic made the most sense where it was at those constraints? Was it the UI framework and just the speed of development with JavaScriptMichael Callaghan  39:01  a little of both. So I've told this story publicly before, so I'm pretty sure I'm authorized to continue sharing it. It was for Disney's magical Express. And they have handheld devices, where when you come here on vacation, you can sign up for Disney's magical Express, it's a shuttle from the airport, to the resort, and they take care of your luggage as well. So you get luggage tags sent to you a few weeks before your arrival. And you put your put these tags on your luggage and they've got barcodes on them. At the airport, they wanted to use ruggedized Android devices to scan these barcodes. After resorts. When you get to Walt Disney World property they were using iPhones. So there was an argument early on about well, are we going to do it for Android. We're going to do it for iPhone. And so I raised my hand I said, Well, why don't we just do it for both? Well, we don't have that kind of time Rajat. Well, no, no, we'll use ionic and then we'll just deploy it to either to both of them. Because I only can do that. So they asked me to do a proof of concept. And the hardest part about the perfect concept was the fact that they had a hardware vendor chosen for the barcode reader, they weren't going to use the camera because the camera is too slow. So they had hardware barcode reader, and I fired off an email to their support folks. And I asked them if they supported ionic. And the reply I got back was something to the effect of Never heard of it. But if you can handle Cordova we have a plugin. So okay, downloaded their plugin, fired up a new ionic project, deployed it to my iPhone, and that afternoon was scanning barcodes of Kleenex boxes, soda bottles, everything that that I could find in the conference room. So they said cool use ionic.George Stocker  40:44  They that's the when I was dealing with I was doing Bluetooth Low Energy, BLE. And the hardest part, just like for you The hardest part was the device interaction for the hardest part for us was, you know, tapping into the Bluetooth on the device. And there were Cordova plugins for it. And then ionic, you want to wrap those into Angular wrappers. And that allowed us to use these Cordova plugins inside of the application. But that was in fact, the hardest part was anything dealing with the device, if you had nothing, if you didn't have to deal with the device at all, any of the device hardware, it probably the easiest thing out there. But still, it's even easier using ionic than it is to try to do the same thing with Android that you would do with iOS. Now in the time we have left, you know, where can people learn more about you? And where can peopleMichael Callaghan  41:41  grab your book, the place to learn more about me is probably my blog website, which is walking river.com. My books are all available at Amazon. You can simply search for Michael de Callahan. Or you can go to walking river gumroad.com. anything, any title that's not Amazon exclusive will be available at gumroad.George Stocker  42:05  Wonderful. Now, the book is don't say that at work. And it's lessons from Michael Callahan. And my guest today has been Michael Callahan. Mike, thanks for joining me.Michael Callaghan  42:16  It was a pleasure, sir. I appreciate you having me.George Stocker  42:18  All right, folks. That'll do it for this week. We'll see you next time on the build better software podcast. Thanks

TI Connect Podcast
Connect: Wireless connectivity in medical designs

TI Connect Podcast

Play Episode Listen Later Oct 1, 2020 12:15


Join our experts as they explore the various medical designs where wireless connectivity is being implemented today. From in-hospital medical equipment and patient monitors to virtual home healthcare applications, TI offers a portfolio of Wi-Fi, Bluetooth Low Energy and Sub-1 GHz devices to help you connect your healthcare equipment.

BSD Now
363: Traditional Unix toolchains

BSD Now

Play Episode Listen Later Aug 13, 2020 34:45


FreeBSD Q2 Quarterly Status report of 2020, Traditional Unix Toolchains, BastilleBSD 0.7 released, Finding meltdown on DragonflyBSD, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/) Headlines FreeBSD Quarterly Report (https://www.freebsd.org/news/status/report-2020-04-2020-06.html) This report will be covering FreeBSD related projects between April and June, and covers a diverse set of topics ranging from kernel updates over userland and ports, as well to third-party work. Some highlights picked with the roll of a d100 include, but are not limited to, the ability to forcibly unmounting UFS when the underlying media becomes inaccessible, added preliminary support for Bluetooth Low Energy, a introduction to the FreeBSD Office Hours, and a repository of software collections called potluck to be installed with the pot utility, as well as many many more things. As a little treat, readers can also get a rare report from the quarterly team. Finally, on behalf of the quarterly team, I would like to extend my deepest appreciation and thank you to salvadore@, who decided to take down his shingle. His contributions not just the quarterly reports themselves, but also the surrounding tooling to many-fold ease the work, are immeasurable. Traditional Unix Toolchains (https://bsdimp.blogspot.com/2020/07/traditional-unix-toolchains.html?m=1) Older Unix systems tend to be fairly uniform in how they handle the so-called 'toolchain' for creating binaries. This blog will give a quick overview of the toolchain pipeline for Unix systems that follow the V7 tradition (which evolved along with Unix, a topic for a separate blog maybe). Unix is a pipeline based system, either physically or logically. One program takes input, process the data and produces output. The input and output have some interface they obey, usually text-based. The Unix toolchain is no different. News Roundup Bastille Day 2020 : v0.7 released (https://github.com/BastilleBSD/bastille/releases/tag/0.7.20200714) This release matures the project from 0.6.x -> 0.7.x. Continued testing and bug fixes are proving Bastille capable for a range of use-cases. New (experimental) features are examples of innovation from community contribution and feedback. Thank you. Beastie Bits Finding meltdown on DragonFly (https://www.dragonflydigest.com/2020/07/28/24787.html) NetBSD Server Outage (https://mobile.twitter.com/netbsd/status/1286898183923277829) *** Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Vincent - Gnome 3 question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/363/feedback/vincent%20-%20gnome3.md) Malcolm - ZFS question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/363/feedback/malcolm%20-%20zfs.md) Hassan - Video question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/363/feedback/hassan%20-%20video.md) For those that watch on youtube, don’t forget to subscribe to our new YouTube Channel if you want updates when we post them on YT (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/363/feedback/new-bsdnow-youtube-channel.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) ***

Fraunhofer-Podcast: Forschung erleben – Zukunft hören
Corona-Warn-App: Die Technologie dahinter

Fraunhofer-Podcast: Forschung erleben – Zukunft hören

Play Episode Listen Later Jul 17, 2020 13:44


Die Corona-Warn-App ist seit Mitte Juni zum Download verfügbar. Sie soll Nutzer besonders schnell informieren, wenn sie sich für einen bestimmten Zeitraum in der Nähe einer Corona-infizierten Person aufgehalten haben. Das Fraunhofer-Institut für Integrierte Schaltungen IIS steht den App-Entwicklern SAP und Telekom beratend zur Seite. Vor allem bei Fragen zur Bluetooth-Low-Energy-Technologie, die der App zu Grunde liegt, unterstützt Fraunhofer als kompetenter Partner. Steffen Meyer ist bei den Gesprächen mit den App-Entwicklern regelmäßig mit dabei. In diesem Podcast gibt er Einblicke und Einschätzungen zur Corona-Warn-App und erklärt die Funktionsweise von Bluetooth-Low-Energy. (Veröffentlicht Juni 2020)

Labs Talk
The Corona-Warn-App with Thomas Klingbeil, SAP

Labs Talk

Play Episode Listen Later Jun 10, 2020 41:03


Along with several partners, SAP has been developing the “Corona-Warn-App” – Germany's official mobile solution for contact tracing. The app is meant to help limit the spread of COVID-19 by anonymously tracking who users come into contact with and alerting them when one of these users has tested positive. Collaborators like Deutsche Telekom have focused on a scalable backend service for these applications, while SAP's role is to develop the iOS and Android applications.The first open source documents were available on May 13, 2020 and the first code drop followed soon after. At the time we conducted this interview, the Corona-Warn-App is purportedly a few days to being released publicly. We're fortunate to be in touch with Thomas Klingbeil, Senior Developer at SAP and part of the application's project team. Together with Thomas, we explore features of the app and their rationale (such as Bluetooth Low Energy and how it can be used for contact tracing) as well as spotlight topics, particularly the privacy-preserving nature of the overall Corona-Warn-App system. LinksOfficial Corona-Warn-App WebsiteCorona-Warn-App Open Source Code Repository at GitHubEnglish FAQs for the Corona-Warn-AppApple - Information on Privacy-Preserving Contact TracingGoogle - Information about Exposure NotificationsExposure Notification Bluetooth Specification (PDF)Exposure Notification Cryptography Specification (PDF)Corona-Warn-App Solution ArchitectureRisk Score Calculation[GERMAN] Code Review 1[GERMAN ] Code Review 2Related NewsSAP CTO Juergen Mueller - The Technical Foundation of the Corona-Warn-App [GERMAN] SAP News Interview with Eyk Kny and Thomas Klingbeil[GERMAN] Corona-Warn-App FAQ at tagesschau.de[VIDEO] DW Business Top Stories - Germany's Virus-Tracing App (19.05.2020)[VIDEO] DW Business Top Stories - France's Stop COVID-19 App (01.06.2020)National Cyber Security Centre UK - The security behind the NHS contact tracing app

Ratgeber
«Smart» den Garten bewässern, was bedeutet das?

Ratgeber

Play Episode Listen Later May 26, 2020 4:23


«Smarte» Bewässerungssysteme sollen selbständig entscheiden können, wann die Pflanzen Wasser brauchen oder nicht. Das Konzept steht aber noch am Anfang. Es ist der Traum vieler Hobbygärtnerinnen: Der Garten bewässert sich selber, auch während den Ferien, und die Pflanzen erhalten nie zuviel und nie zu wenig Wasser. Automatische Bewässerungssysteme gibt es bereits – sie funktionieren über eine Zeitschaltuhr, die das Wasser für die Pflanzen zu festgelegten Zeiten an- und abstellt. Das bedeutet jedoch: Die Systeme wässern auch beim stärksten Regen, wenn die Uhr das so befiehlt. Systeme für den klugen Garten Wirklich «smart» werden die Geräte, wenn ein Computer anhand verschiedener Informationen beurteilt, ob und wieviel wässern er jetzt soll. Informationen können ein Online-Wetterbericht oder Sensoren sein, die die Bodenfeuchtigkeit messen. Solche Bewässerungssysteme sind Teil des «Smart Garden», der analog zur «Smart City» oder dem «Smart Car» auch den Garten vernetzen und mit Sensoren versehen will. Doch der «Smart Garden» steht noch am Anfang. Derzeit gibt es nur wenige Systeme, unter anderem: * «Gardena Smart System», 300-900 Franken je nach Konfiguration, batteriebetrieben * «Eve Aqua», rund 100 Franken, kommuniziert jedoch nur mit Apple-Geräten, batteriebetrieben * «CloudRain», rund 250-350 Franken, solarbetrieben Bei allen Angeboten müssen Schläuche und Ähnliches noch dazugekauft werden. Gardena verwendet eigenes Protokoll Der Hersteller Gardena ist zwar einer der bekanntesten Anbieter von «Smart Garden»-Komplettsystemen. Doch deren Systeme verwenden ein eigenes, proprietäres Protokoll namens Lemonbeat. Über dieses Protokoll kommunizieren die vernetzten Geräte miteinander. Dass Gardena auf Lemonbeat setzt, heisst auch, dass sich der Hersteller nicht an herkömmlichen, mittlerweile etablierten Standards für das «Internet der Dinge» wie etwa Bluetooth Low Energy oder ZigBee orientiert. Möchte man also das System von Gardena in sein bestehendes vernetztes Haus nahtlos zu integrieren, ist es nötig zu prüfen, inwiefern das möglich ist.

Our Place
Tipology!

Our Place

Play Episode Listen Later May 9, 2020 72:45


Episode 572: Tipology! – 9 May 2020 This week, we talk about getting the right tips for ear buds, and Bluetooth Low Energy and we also discuss and set up the Mee Connect Hub Dual Bluetooth connection device for sharing…Read more Tipology! ›

Podcast de CreadoresDigitales
Un cuarto de los smartphones en el mundo no podrá usar la tecnología de Apple y Google para detener la pandemia.

Podcast de CreadoresDigitales

Play Episode Listen Later May 8, 2020 14:49


[Arstechnica] Ya en el podcast anterior hablamos de cómo Apple y Google unirán sus fuerzas para liberar una aplicación que te ayude a saber si estuviste en contacto con alguien que se infectó con el coronavirus. Ya les habíamos adelantado que la aplicación descansará en la tecnología Bluetooth de baja energía o Bluetooth Low Energy. El principio de operación es muy sencillo, si tu teléfono detecta, a través de BLE, que estuviste muy cerca de un usuario que ha sido diagnosticado con coronavirus, te lo hará saber y te pedirá que guardes confinamiento voluntario. El que dos competidores se unieran para generar esta aplicación habla de lo importante de la misma y de lo que se puede lograr si ajustamos unas tuercas, sin embargo, casi un tercio de los propietarios de smartphones del mundo cuentan con un equipo básico o antiguo que no cuenta con la tecnología BLE, lo que los excluye de esta aplicación. ¿Cuáles son los equipos que no tienen BLE? Pues los de funciones básicas que no son smartphones y los smartphones que tengan una antigüedad mayor a 5 años. En total son casi 2mil millones de usuarios que no podrán usar este servicio. Para que se den una idea, los especialistas han calculado que, en Reino Unido, 80% de los adultos poseen un smartphone, sin embargo, de ese 80% un tercio posee un smartphone no compatible u obsoleto. Si lo comparamos con países en vías de desarrollo como la India, los números crecen dramáticamente hasta alcanzar un 60 o 70% de su población como incapaz de aprovechar esta tecnología. Otro punto a considerar es que esa población que tiene los móviles básicos o más viejos son, o bien los pobres o los adultos mayores. Que curiosamente son los segmentos poblacionales más vulnerables ante la enfermedad. De nueva cuenta se pone en evidencia la existencia de las brechas digitales que a veces se nos olvidan que existen.

The Digital Ramble Show
SONOS | New Speakers Revealed | Sonos Arc | Dolby Atmos

The Digital Ramble Show

Play Episode Listen Later May 6, 2020 52:35


Sonos tend to release new products twice a year and when they do they come and speak to The Digital Ramble! JJ and Kris welcome Brian Yackel and Cullen Harwood onto the show to get the latest from Sonos and to reveal the new speakers added to their already impressive lineup. Brian and Cullen announce three new products! Sonos ARC, the new Dolby Atmos soundbar, the new Sonos FIVE, their premium speaker and the new Sonos SUB (Gen 3), an update on their classic subwoofer. Sonos ARC - supports Dolby Atmos, HDMI eARC, built in voice control, 114cm wide, Playbar replacement. Sonos FIVE - now with white grille option, new processor and improved wifi performance and features NFC and BLE for easier set up. Sonos SUB - update of the previous generation SUB with the same iconic styling, new processor and improved wifi performance and features Bluetooth Low Energy and NFC for easier set up. Sonos is the ultimate wireless home sound system https://www.sonos.com/ Catch up with all The Digital Ramble videos and podcasts at our website: www.DigitalRambleShow.com Thank you to all of the Patreons that support the show. If you would like to support us, contribute here: https://www.patreon.com/thedigitalramble Your hosts: https://www.digitaldelight.com/ https://www.customised.uk.com/ The Digital Ramble Socials: Facebook: https://www.facebook.com/thedigitalramble/ YouTube: https://www.youtube.com/channel/UCaHFtt445x0JTr-un_WYbAA/videos?view_as=subscriber Instagram: https://www.instagram.com/digital_ramble --- Send in a voice message: https://anchor.fm/thedigitalramble/message Support this podcast: https://anchor.fm/thedigitalramble/support

Chaosradio
CR259 Bluetooth

Chaosradio

Play Episode Listen Later May 3, 2020 105:34


Als Bluetooth in den späten 1980er Jahren spezifiziert wurde, konnte man noch nicht damit rechnen, dass es sich zum De-Facto-Standard für Nahbereichskommunikation entwickeln würde. Jedes Jahr gelangen tausende neue Geräte mit Bluetooth-Chip in den Handel. Mittlerweile hat jedes Telefon Bluetooth eingebaut. Ein Mitglied dieser Protokollfamilie, Bluetooth Low Energy, soll jetzt auch verwendet werden, um die Kontakte von Personen untereinander zu tracen um damit die Ausbreitung der Corona-Pandemie nachzuvollziehen und einzudämmen. Über die theoretischen und technischen Grundlagen und die aktuellen praktischen Anwendungen von Bluetooth spricht Marcus Richter mit seinen Gästen Jiska und Jan im Chaosradio 259.

What's Next|科技早知道
#18 又追踪疫情又要保护隐私,硅谷如何解决这个两难问题

What's Next|科技早知道

Play Episode Listen Later Apr 30, 2020 21:53


主播丨丁教 嘉宾丨杜晨 后期丨Luke 随着复工复产被提上日程,各国都在积极开发 “密切接触者” 的追踪应用。硅谷也不例外。 苹果和谷歌在 4 月 28 日提前发布了他们联合开发 API(应用程序编程接口),这是一种接触者追踪技术(Contact Tracing)。 该技术通过 “去中心化” 的设计原则,在最大程度保障用户隐私的情况下来追踪疫情感染者的密切接触人群。但是这样的技术在欧洲和美国是否得到政府支持,各国会针对该项技术有什么改动要求,而使用者又是否愿意接受? 今天我们就来聊聊这一技术的本身。 本期主播 丁教,声动活泼联合创始人 本期嘉宾 杜晨,科技媒体PingWest品玩/硅星人主笔,驻硅谷的记者 提到的问题: 苹果和谷歌联合开发的 API 技术原理 使用这种 API 的政府或机构是否有更改部分设计的权限 英国和法国拒绝使用 “去中心化” 的追踪技术 在疫情严重国家和地区,推进使用这项技术有什么难点 疫情结束后,将如何处理用户数据 名词解释: API: Application Programming Interface,应用程序编程接口。是一些预先定义的函数,或指软件系统不同组成部分衔接的约定。 目的是提供应用程序与开发人员基于某软件或硬件得以访问一组例程的能力,而又无需访问原码,或理解内部工作机制的细节。 苹果官网给出的关于此API的通告: Exposure Notification iOS Framework Documentation(API)Preliminary — Subject to Modification and Extension (https://covid19-static.cdn-apple.com/applications/covid19/current/static/contact-tracing/pdf/ExposureNotification-FrameworkDocumentationv1.2.pdf) Mesh Network:也称为“多跳网络”,Mesh网络也称为“多跳网络”,它是一个动态的可以不断扩展的网络架构,并能有效地在无线设备之间传输。在传统的无线局域网中,用户如果要进行相互通讯的话,那么首先会访问一个固定的接入点(AP),这种访问的方式被称为单跳网络。而在多跳网络中,任何无线设备节点都可以同时作为AP和路由器。这样的好处是:如果最近的节点由于流量大而拥塞的话,那么数据可以重新选择一个小流量路径进行传输。数据包根据网络的情况,从一个节点依次传送到多个节点,最终到达目的地。这样的访问方式就是多跳访问。 Gdpr:《通用数据保护条例》(General Data Protection Regulation (https://gdpr-info.eu/),简称GDPR)为欧洲联盟的条例,前身是欧盟在1995年制定的《计算机数据保护法》。 DP3T:The Decentralised Privacy-Preserving Proximity Tracing (https://github.com/DP-3T/) (DP-3T) 分散式隐私保护邻近跟踪(DP-3T)项目是使用移动设备上的Bluetooth Low Energy(低功耗蓝牙)功能,追踪COVID-19的临近接触的开放协议,可确保个人数据和计算完全保留在个人电话中。 Beacon (https://beacon.schneidercorp.com/):基于C (https://en.wikipedia.org/wiki/C_%28programming_language%29)/C++ (https://en.wikipedia.org/wiki/C%2B%2B)/Java (https://en.wikipedia.org/wiki/Java_(programming_language)) 语言开发, 助力用户对服务器运行资源及其系统中关键 Tuxedo (http://en.wikipedia.org/wiki/Tuxedo_(software))/WebLogic (https://en.wikipedia.org/wiki/Oracle_WebLogic_Server) 应用服务运行资源进行监控和数据分析。具有实时监控、历史数据分析以及多样的即时报警(声音、手机短信、电子邮件等方式)功能。是企业进行 Tuxedo (http://en.wikipedia.org/wiki/Tuxedo_(software))/WebLogic (https://en.wikipedia.org/wiki/Oracle_WebLogic_Server)等应用服务器监控的最佳平台和工具。 BGM Counting the Days-Cody High If I Only -Pär Hagström、So Vea 关于我们 网站:guiguzaozhidao.fireside.fm 邮件:ting@sheng.fm 公众号 / 微博 / LinkedIn:声动活泼 声小音微信:shengfm1 (https://files.fireside.fm/file/fireside-uploads/images/4/4931937e-0184-4c61-a658-6b03c254754d/2ELw5say.jpg) Special Guest: 杜晨.

Craig Peterson's Tech Talk
Welcome! Monitoring, Supply Chain, Conspiracy Theories, Hacks, China and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson's Tech Talk

Play Episode Listen Later Apr 24, 2020 89:53


Welcome!   We have a lot of technology in the news this week.  I will give you my take on the monitoring that the government is doing and why.  We will discuss contact tracing and how Big Tech is trying to come up with a solution.  What is this 5G conspiracy that is being bantered about and why is Amazon having delivery issues.  Linksys and Zoom are having problems and I will tell you what you need to do. And we will wrap up with China and US and what can be done about intellectual property theft and spying.  So sit back and listen in.  For more tech tips, news, and updates visit - CraigPeterson.com --- Automated Machine Generated Transcript: Hello, everybody Craig Peterson here on WGAN and, of course, also heard every Wednesday morning at about 730 with Matt, as we discuss the latest issues of the day. And in fact, that's what we do here every weekend as well. So I do want to welcome you guys who some of you might be new. Some of you have been listening for a while now. I'm trying to remember when was my first time at this station. I've been on the air now for more than 20 years, 25 years, something like that long time. And I always have enjoyed it. And I enjoyed talking with you guys, too. We've had about six or eight calls. I think this week, and we've been setting aside time for people who are having problems with the computers, whether it's kind of work at home situation, maybe it's a small business, just help Send them out helping them understand what's up. So shout out to all you guys. I think the winner this week was Linda, and we spent Wow, an hour and a half, two hours with her trying to help with a few things. She had some questions about emails, and you've been having some problems for about two years now. And so we spent some time going over that with her. Elahh, one of our texts, also one of my daughters, was gracious enough to spend the time with her. And I know Linda appreciated it. And it can get frustrating. I understand that too, is funny because Elahh was saying that, you know, from time to time to Linda was getting a little hot under the collar, but that's understandable. I do that too with computers because they just can get so frustrating. So hey, I get it. I understand. And we also had an email go out this week, and you should have received that. Offering if you wanted help, and you could schedule free calls. You could get any information you wanted to get my earballs and eyeballs if necessary to look at your screen, depending on what's going on. So that's a little bit of what I've been up to this week. We also finished up I did not do any webinars this week. I'm planning on doing some Facebook Lives next week. Maybe some webinars as well depend on how it all goes. And on training, right, we're getting into the basics again, helping you guys out with completely free stuff. I'm going to be redoing my webinars and kind of explaining all of the stuff you need to know, not you know, we're not getting geeky on this. I'm not trying to turn you into a computer expert. But understand modems what they are your routers, your Wi-Fi, your firewalls, your Windows computers with the updates, what's an upgrade How about the patches going through VPN And the major risks of VPN, and when you need to use them when the appropriate time is to use them. And I'm also thinking about maybe putting together a little series for businesses that are starting up, trying to be optimistic here, right? We're starting up again, and we're getting back into the swing of things. And that means there are some things you have to worry about the machines where they shut down properly, how to get them back up and running, do you need to go in and update some of the software, maybe replace some of the just antivirus with real advanced malware protection and all that sort of stuff? So I might be doing that as well. I'm kind of thinking that, and I was talking with my team this last week about trying to do that to be optimistic and help businesses get back going again because I think we're going to have some serious problems. I think that well, frankly, I know that some people have lost their jobs or a friend of mine was saying that a friend of his I just found out that he's not going to be rehired when the business reopens because he had been laid off. And of course, this whole payroll protection plan, frankly, is a scam. It's just crazy. What the Federal Government did, they would be better off giving every family in this country a check for $60,000. Of course, that would not Greece or pockets, would it? And that would help a lot. A lot. Instead, they're spending about $60,000 per family, the spending that money on banks who are already liquid, they can go to the capital markets. You've heard about the public companies that have gotten some of this money. How about the major universities that have multiple 10s of billions of dollars in endowments that got it? And yeah, I'm a little bitter about this because I didn't get any of the money. I applied. I got nothing, nothing. I got an email a couple of weeks after I applied it saying, Well, you know, we need this. We need that. Well, wait a minute, I was supposed to get this, this instant $10,000 loan to help me stay on my feet. So this friend of mine, they got laid off, right? Then even on the PPP, you're given two months' worth of payroll, and you have to keep these people on the payroll for about four months. Well, how can you do that if the government's not letting you make money? If it's not letting you bring people into your restaurant or send people technicians out, whatever it is that you do cut hair, right? You can't you, but you know this already, right? Because this is happening to you. Look at the stats in Maine, and they say okay, well, we helped all of these, you know, these 10s of thousands of companies. Well, maybe they did, but I can tell you from people I know and my personal experience that it hasn't hit any of the pockets of the real small businesses. I haven't even gotten that. The so-called 1200 dollar stimulus check from the Federal Government. It's insane. How many weeks that we've been locked down now? It's what about six weeks? It is not good. It is not fair. It's going to be hard to come back. My friend was saying that his friend found out they're not hiring him back, which is going to be the case for many people. What happened? His friend hanged himself. Yeah, think about that. Think about all of these other consequences. It's the typical thing with the government, right? You've got people highly focused on this pandemic, and what should we do? They are extremely highly focused because last October, there was this major meeting, where they've been getting together and talking about global warming and what we need to do to save the universe. 1000 years from now. And of course, we know just how good these models are that they use for global warming. And I've never really talked about it here. I've talked about it on my other radio shows in the past, I've had the guy who founded the Weather Channel weather.com on, and it's just absolutely crazy how bad those numbers are. But we can't even get the models, right when it comes to a virus that's right in front of us, where we have some real numbers. Okay, well, maybe the numbers coming out of China weren't that wasn't that good. Perhaps those numbers were fake. Maybe, you know, we can't trust them. That's fine. Well, how about Italy? How about all of Europe, the numbers are coming out of there. How about our numbers we're still not getting it right. Remember the initial model talking about millions dead in the United States, a couple of hundred thousand dead over in the UK. We're not even getting get close to that. We're not also going to be close to the UK number that was predicted. And then it's revised down, and it's revised down and as revised down as writes down so we've got these people who are focused on what they learned last year, about pandemics and what the response should be based on this, all of this quote-unquote science. And they, of course, you know, we haven't had pandemics like this to deal with, so in reality, it's a theory, and they have the models which are in reality theory. And all of those models said Oh, no, we're going to have a lot of people that unless we go ahead and quarantine people, we need this social distancing is what they've been calling it. And so a lot of states that Okay, everybody has a social distance you have to get out you have to Oh, my goodness. And you look at the exact opposite look at Sweden and what's happened over there and was Sweden did none of this stuff, they didn't quarantine, they didn't shut down their businesses. People were still sitting in cafes, sipping their coffee, having a pleasant afternoon, and that that springtime sunshine outside, doing everything they wanted to. And it's about the size of Michigan and Sweden has had fewer deaths than my lot fewer deaths than Michigan. And you know, in Michigan, what they did with all of their lockdowns over there. It's it is nuts. These models are, at best, a guesstimate. And there they were saying okay, well we need to do is kind of get rid of that peak because our hospitals aren't going to handle it. Have you noticed how hospitals now are looking to, and some have already not only declared bankruptcy but closed their doors because they are not full. They're not full of Coronavirus cases. They shut down all the elective so-called optional surgeries and other things, right. We haven't gone to see the doctors. How many people's lives were saved the numbers the stats look like this was one of the worst I don't know the flu just a regular flu year even not particularly bad, but that's not what all of these projections said that's not what this just tickle model said. Right? Right. I remember playing the game of life well is you don't play it but writing some of that code, seen it on the computer way back when back in the 70s, it would have been and mid-70s. I was just so impressed with it, and it shows how a cell will replicate you know and replicate and how it will expand. That's about the only I've seen that's correct. So we can't get our models right for COVID-19. We still don't have them, right. We're again revising them. Now they're saying that we could have another resurgence this fall maybe even worse than what we had this year. At the same time, some of these same people are saying, Hey, we're all going to die. Because what was it five years ago or ten years ago, by then we were by 2010. We're supposed to be underwater in Florida, right? You just can't trust it. People are dying. People are losing their jobs. And so we're looking at it saying, what can we do to help businesses get back? Anyways, stick around. That's enough, belly aching for me. We'll be right back here on WGAN. Of course, I'm Craig Peterson. We'll be getting into the tech stories of the week. So stick around. Hey, welcome back, everybody. Craig Peterson here on WGAN and online at Craig Peterson dot com. We are talking today about some of the latest technology as we do every Saturday and Wednesday morning. On Wednesday morning, it's at 738, and on Saturdays, we're on from one end till three. Well, we're going to talk right now about this news surveillance program that's out there. And the whole idea behind this is to map the spread of the Coronavirus. At least that's the rumor, right? A great article you'll find@medium.com about this, but Coronavirus is being used to drive brand new surveillance programs around the world. So let's talk about a few different countries what they're doing. And I've gotten a little bit of a concern we'll talk about later in the show today, about maybe something like that. Patriot act, as we had after 911, that gives the government all kinds of new powers and they may go unchecked, which is a concern for me, particularly looking at the statistics as we know them so far, which is that this isn't just a horrific, horrific thing. It's terrible. It's awful when anybody dies, but it happens every year with the flu too. So we'll see where it all comes out. But we were just talking about the last segment. The whole thing about the models is just ridiculous. Well, in Argentina, their Ministry of Health has built a mandatory app for anyone entering the country, and you have to keep it installed for 14 days, and that requires users to give access to their GPS position. Now, it's not clear if Argentina is keeping track actively of the people with that location data about apparently the province of Santa Fe is Forcing those who have violated the quarantine to download an app that tracks precisely where we are. We're talking about Argentina here, as well as many other countries is that they are putting one of those trackers on you as though you'd been convicted of a crime which bugs me, frankly, Australia. Yeah, and everything down there is trying to kill you, including the Coronavirus. Now those ordered into quarantine could have government surveillance devices installed in their homes or be forced to wear electronic surveillance devices, and that's a new law that went into place in the state of Western Australia. But the Australian government has opted not to use cell phone-based tracking Austria. The Australian telecom con gave two days' worth of anonymized location data to the government to analyze movement in the country. And this is something that I've been saying that governments are doing worldwide. They're asking the cell phone companies that you know, the providers to give them location data, and anything that's anonymized pretty much can be D anonymized. And think about that, think about how easy that is. So if the government has your home address, and they see that person 1750, it is of that place every night, well guess what they can guess who you are, and then they know where you travel, etc., etc. So anonymized location data is ridiculous rain. They've got electronic braces that connect to a mobile app. And this is something similar to what Hong Kong has done. Belgium, they've been hit the worst in Europe when it comes to per capita cases and deaths. But three telecoms over in Belgium are giving data to a private company, and they're analyzing the information and trying to detect Widespread trends of movement in the country. Now they're using drones to make an announcement. But they can also be using the devices to capture surveillance footage. That's according to the top VPN digital rights tracker, Brazil. Let's get into the socialist countries here. Local governments across Brazil are tracking locations from citizens' smartphones. And one city receives alone is tracking 700,000 people's location through their devices. And that's one of Brazil's smaller metropolitan areas. And quote here from one of the Brazilian firms that are doing some of this stuff, we have visibility of specific behaviors that couldn't be captured by other technologies. For example, if an individual leaves their house, we can detect that in a matter of seconds. And then, of course, that ends up in the government's hands China, another socialist country. They're using practically every surveillance system in their toolbox. Publicly located cameras there you go running facial recognition searches, citizens are location tracking through their phones. Drones are being used to give directions from the government. Can you imagine that having a drone over your shoulder yelling at you? We've seen that over in China where they chase you back to your house. The Government in China is socialist, also tracking individuals more than 200 cities through a smartphone app that grades are health and assigns them a classification of green, yellow or red this according to New York Times socialist newspaper, the app sends that data to the police. It works as a hall pass for entry into certain public places, and that has been proposed here in the United States. As well that you can have a little Hall Pass, to let you board planes and go to work, etc. and China, of course, is putting pressure on private companies in the country to hand over data to China. Dubai, I don't know they're, they're a monarchy kind of a, you know, I don't know it's not quite socialist. It's undoubtedly addicted, dictatorial. They're using cameras. And by the way, one of the significant ways they make money in Dubai is these amazingly high fines for speeders. Still, this case, they repurpose the cameras from catching speeding motorists to analyze driver's license plates and determine if they are deemed, essential workers. Ecuador is tracking cellphones. Germany, which is starting to open its businesses, in fact, this week, they started opening while their telecom company they're big firm over there called telecom is providing location data from its customers to the Robert Kok Institute. And that's the organization coordinating their national action against Coronavirus. Now Germany did something right upfront. That was wonderful. I think they went immediately to the private sector and Germany said hey, listen, guys, we're going to need tests so come up with some tests figure out how we can do this how we can do testing quickly. Whereas here in the US where we don't have the private companies right up front getting involved in at CDC said we're the only ones that can do this. We are at let us do it. We're, we have a monopoly on testing. And we don't like those tests because they have 40% negative rates and you know, false positives, false negatives and, and you have to have everything come through us, right, which is a very socialist thing. And, you know, we don't live in a truly capitalist country anymore. We're at best, it's crony capitalism, but in Germany, they did the right thing. They got companies involved right away to figure this out to analyze the data. They weren't relying on a non-reviewed report out of the United Kingdom, to base all of their analysis and projections on. So they're also expected to launch a Bluetooth based app like those that are used in Singapore and Indonesia right now. They've also got a smartwatch app over in Germany, Hong Kong, those quarantines have to wear special electronic wristbands that track the locations are handed out the airport and must be paired with the individual's phone. And then, once they arrive home, they're given one minute to walk around their apartment to calibrate the wristband and the company app to space where they are confined. India oh my gosh, talking about a country that could have problems. They have expanded their programs to track citizens through both digital and analog means They using location data. They're using closed-circuit television footage to track citizens in the southern Indian state of Kerala. According to Reuters, some western states, are stamping the hands of those arriving in airports, with a removable ink stamp detailing the date until which the person must quarantine. They're also taking passenger information, primarily airlines and railroads. Now, the touch base authentication, like fingerprint scanners, are risky, because they require people to touch a surface. They're getting a real boost in facial recognition over in India. So stick around, we'll come back. We're going to go through a few more countries what they're doing, and then we'll talk more about what's going on here. Yeah, Craig Peterson has some concerns. You are listening to WGAN. I will be right back, so stick around. Hey, welcome back everybody Craig Peterson here on WGAN, and I had on some good old Herb Alpert, remember him? The Taste of Honey was the one playing during the break. How is that for fun? Man, I haven't listened to Herb Alpert in a lot of years since Well, the 70s, right? I Remember the album's cover and that this particular one was somewhat controversial. Look at the Beatles, all almost all of their stuff was initially done in mono, and then they remastered it into stereo. Some of the purists are pretty upset about that. So we're kind of going through what different countries in the world have been doing when it comes to this Coronavirus. And, you know, we'll talk about the US as well, but there is a trend. I hope you notice seen Indonesia, they've got an app that tracks interactions with nearby Bluetooth. Okay? And it has it is by the way in Indonesia, it's an often and it does help you if you want to notify people who might have been exposed so they can get tested Iran. In contrast, they haven't had as many deaths, because they've just been shooting people in the streets. Well, that is according to a classmate of one of my sons who is living in Jordan, right now. The smartphone app developed by the Iranian government scooped up millions of users' location data, alongside a short questionnaire that claimed to detect the likelihood of infection. And notice about the app was also sent to 10s of millions of Iranians with the director to take the questionnaire before going in for Coronavirus test. At least 3.5 million people, according to Iran, are using this app. Israel government. They are Using data from their telecom providers here telecom, track the location of their citizens. And those people, by the way, who braved quarantine in Israel are facing up to six months of imprisonment. So there you go. They're also using this data they're getting from the telephone companies to track people and potentially quarantine them. In Northern Italy, Vodafone, you might have heard of these guys, this is an English telecom provider. Vodafone also has a presence in Italy. They are providing the Italian government with heat maps, which means general details as to the number of mobile phone users locations. They started over in Lombardi, Italy, of course, that was a bit of a hotspot, and officials do Chairman 40% of the people in Italy are moving around far too much. According to The New York Times, Kenya, they've got aerial surveillance of the border to detect illegal crossings. Norway, the Norwegian Institute of Public Health and Norwegian tech companies, simultaneously built a voluntary app that tracks GPS Bluetooth data to be stored for 30 days. In Pakistan, through location surveillance and mass texts, the Government of Pakistan is tracking confirmed cases Coronavirus. Sending alerts to people found to potentially come in contact with them in the past 14 days is not a bad idea. Poland has an app called home quarantine, which is requiring Polish citizens who are quarantine to check in immediately and intermittently check-in by sending a picture of themselves at home with 20 minutes or within 20 minutes or face to find. So all of this is from the medium you'll find a lot more data. Tell them just kind of rushing through it. Russia has more than 100,000 cameras are in Moscow. And the Russian government is using facial recognition and phone-based tracking to monitor people under quarantine. Local governments in Russia are also kind of doing their own thing. Singapore, very, very socialist authoritarian, really government there. They released an app called trace together pings nearby smartphones through Bluetooth to determine who's come within six and a half feet of each other for more than 30 minutes. That's according to the LA Times, and they record the data they stored for three weeks supposedly and don't record the user's location. South Africa, again, telecom companies, South Korea, they've had an interesting response. You've probably heard about them what they've been doing there. In South Korea, the confirmed cases of Coronavirus are being tracked in using a bunch of different data, collected through data mining. They're taking credit card purchases, smartphone location tracking, closed-circuit TV footage, analyzed by facial recognition. So the Korean government can then reconstruct where a person's been that was diagnosed, and they have just incredible granularity. Like using the person's location data to check the closed-circuit TV footage, see if they were in a mask, etc. Switzerland and they're colossal telecom companies. Swisscom is alerting the federal government when more than 20 phones are located within 100 square meter area. One of my sons has a girlfriend over in Sweden, and they are not doing anything over there. The numbers are fascinating. So we'll see what ends up happening there. Taiwan's government is denying that it's adopting surveillance technology to track citizens' movements, but that is what's happening. Thailand. If you're arriving there from a high-risk area, you're going to get a SIM card for your phone that lets the government track you for two weeks. In Turkey, they are monitoring locations of patients using cellular data and sending messages to them if they should quarantine. The UK is allegedly talking with telecom companies to track citizens' location data. National health servers or services partnered with planets here to track the spread of the virus in the good old United States. Yes, indeed. The mobile advertising industry is the one that's doing the tracking here. They've been supplying data to local state and federal organizations about the location of individuals. And that's according to The Wall Street Journal. Because it's advertising data, they want to know, very, very fine-grained data. So for instance, if you go to Gold's Gym, they somebody who has what Planet Fitness gym can say, hey, I want to send an ad to anyone that went to this Gold's Gym. That's a half a mile down the street from me. And the advertising companies have that data. And so you might have noticed, it's some of its kind of scary. You go into a hospital of a sudden you start getting ads for hospitals, medicine, and even lawyers for malpractice suits. So they have very fine-grain data, and apparently, it is granular enough to let them know whether people are staying at home. If parks are still in use, Foursquare, which has one of the most comprehensive repositories of personal location data, is in talks with a bunch of different government agencies. Most data comes from these apps and bottom line, you've permitted those apps to log your location. So you download that free game that you love to play. It may be tracking your data and sending it up. Now, remember, it doesn't have to use GPS; it only has to do is know the Wi-Fi network in use. Remember, when Google and these other companies have been driving around taking pictures of everything, they are recording the SSIDs and MAC addresses of the Wi-Fi systems all over the country. That way, they can tell where you are based solely on the Wi-Fi connection. So they're taking all that data and then they are reselling it. And the whole goal here is to have a portal that could be used to track citizen movement in up to 500 us citizens cities, Google and Apple have also come up with a new standard for tracking. And this is tracking using Bluetooth again, some troubling state and local policies West Virginia. People who test positive but refused to quarantine are getting ankle bracelets. Yes indeed. Many of the software privacy and privacy guarding mechanisms are unknown about all of these things. There are a bunch of things pred poll predictive policing. All of this is coming in New Jersey, Connecticut using aerial drones with temperature sensors and apparatus to detect people who might have the virus, so it's getting scary. Stick around. We'll be right back. I am Craig Peterson on WGAN with a little Coronavirus information, things we are doing, and what is coming. Hey, welcome back, you're listening to Craig Peterson here on WGAN, every Saturday from one till three. Also, I am on Wednesday mornings with Matt during drive time for those of us that are still driving to work. where we talk about the latest in technology for the week. Then we do some more follow-ups here on the weekend as well. I had mentioned earlier, we're planning on doing something to help businesses get back into the business, and we are going to be focusing in on some of the technologies for that. So keep an ear out. Make sure you sign up for my email list so you can get all of this. You can get stuff like Linda and Joanne and Ted and Danny and many others who listen to me here on Saturdays, and you can get all of the stuff that they get to help stay safe online and to keep up to date on What is happening in that great big world outside? We covered what other countries are doing for surveillance, there was a definite pattern to the socialist countries, demanding people self-isolate, quarantine fines, prison time, right? You notice that, didn't you? Now I want to talk a little bit more about the US because we kind of ended the last segment talking about that. But where I'm getting concerned is what our government will do? The reason I went through all of these other countries is so that we have an idea of what they're doing because, like the UK, okay, they're certainly more socialist than we are. They're not dictatorial at all, but they are doing a lot more with the tracking than we appear to be. Doing. And of course, we have some rights recognized in our Constitution that is going to be difficult for the government to take away, but they have taken them away in emergencies before. Look at what happened during our World Wars, and even what happened in the wars in the 60s in regards to the demonstrations and things. It's not as though nothing could happen here. And there is a great article in TechCrunch this week by Heather Fetterman. And you'll find it up on my website at Craig Peterson dot com, where she's wondering about this potential, what she's calling the Patriot Act for COVID-19. We had this massive knee jerk. What was it about two weeks after the tower Twin Towers came down in New York City after that terrorist attack. About two weeks later, we all of a sudden had this Patriot Act, which gave the government all of these sweeping powers, And they were monitoring all of our calls, which in contact with emails, even locations, etc. Very, very scary stuff. So what's going to happen now because Heather Fetterman is a privacy lawyer, and is the VP of privacy and policy at big ID is a New York-based company that's trying to use AI to help businesses be better privacy stewards for their customer. And now you think of your customers. I think of the data that you have, first of all, do you need it? All right, that's one of the things I talked about and all the training I do. And secondarily, how much of it sensitive, should you be throwing it away? Deleting it because you don't need it. And you certainly don't need the liability or what should you be doing so that's part of what they do. She also has headed up privacy over at Macy's and American Express, and with the code At 19 infections climbing here in the US kind of leveling in some spots, we're saying nationwide, we may be on a bit of a downturn. The officials are starting to panic. And you heard it this week. They're saying, Oh, my, what is going to happen coming up this fall? Are we going to have a massive COVID-19 resurgence in the middle of the flu season? Is this going to double the number of deaths that we would get in a regular flu season? And so they are trying to figure out these government regulators and lobbyists frankly, and of course all of the bureaucrats and, and Congress and everybody, so they're trying to figure out how do we track the people. Now, remember, when we give up a little bit of privacy for some suppose it security trying to think of a time when we got it back. Certainly, we have gotten it back in some cases. After World War Two, of course, you no longer had to have those ration cards. So things got better. Certainly. World War One, for instance, introduced the income tax, and it was guaranteed only to be 3% maximum ever. And the income tax would only be on the richest Americans it would not affect the rest of us. And that was something put in place because of World War One, and they needed funding. But in case you haven't noticed, income tax has not gone away. So will this whole monitoring that they're doing for COVID-19? Will it go away once this epidemic has died down because it is going to die down at some point in time, but frankly, it's going to be with us forever. Whether it was engineered Somewhere whether it was in the wild from a bat and when direct to humans or pigs, and then humans or however it got to us, it's here now, and it's never going away. So is that going to give the government justification to continue to track us all? And when we have limited testing development ability then, of course, it's going to improve. Even if they had 2 billion test kits available, If I test negative today, and I'm exposed this afternoon, are you going to test me again tomorrow? I might have it tomorrow, and I didn't have it today. So even then, testing is not going to solve the problem. So we've talked before about this whole joint effort between Google and Apple, and the idea here is to come up with some standardized software that can monitor the spread of infections by keeping track of infected people. Keeping track of the people they have been close to and how long they've been close to them. And the idea is you download the mobile app from a public health website. And the Public Health website will notify you if you have had prolonged exposure to someone that came down with COVID-19. That will frankly, this would be handy with the flu, for instance, right? There we would cut back the number of flu-related deaths dramatically, absolutely dramatically. And this system is designed to use low Bluetooth Low Energy transmissions rather than GPS. But again, It's just a standard, and it is not a piece of software. And someone could implement using the standard and track your GPS and record as well. Okay. So this is, frankly, if they do this the way they're promoting it, I don't have a huge problem with this as long as it's voluntary. Now, apparently, in Indonesia, it has been voluntary, but only about a third of people have done it. So how are they going to enforce all of this stuff? And these community mobility report, they're showing trends over time by geography, where they're taking data from the phones of people who have Android or who are even with iOS using Google software, and have not turned off the location history setting. And they've got this great little map so they can track all of the people. The CDC is tracking all So the movements of American citizens based on location data from the mobile advertising companies, we mentioned a little bit earlier. So it's great that the government's trying to stop the spread of infections. But ultimately, you can't stop them all. And there has to be a line. Where is it? So the Patriot Act wasn't two weeks. It was six weeks after 911 that gave the government powers that had never had before to spy on American citizens. Yeah, you know, was it constitutional, certainly not in times of peace. I think that argument could be made pretty effectively. But in this case, it was effectively a war. So it may have made sense at the time, but the government's still vacuuming up millions of records of phone calls and text messages to today. Look at that huge data center. The National Security Agency built over in Utah, the point of the mountain. So if companies like Google and Facebook are willing to share data with a government, there needs to be a clear and defined period in which they can share this data, there has to be a clear and defined period in which they can retain the data as well. So civil liberties, of course, are fundamental here. And my gosh, following September 11, of course, the New York Police Department conducted illegal surveillance on some local Muslim populations. Remember what happened during World War Two with the Japanese American internment camps? The FBI is surveillance of African Americans who oppose segregation, the whole civil rights movement. They've got something called the fair information practice principles. These state that personal data should not be used for any purpose beyond the specified object of the data processing activity. So we've got to be careful. The government has proven itself to keep this too much data, keep it for too long, and also not securing it properly. Word gets out, and it gets into the hands of people within the government that probably shouldn't have access to it. It gets into the hands of the bad guys. And if the government starts collecting this are going to see yet another uptick tick in cybercrime. It has already happened. But imagine all of this location data in personal data and how valuable it would be to the hackers. You know, I don't hold hope that our Congress it has learned from the past. I don't Look at what Clearview AI did. We talked about them a month or two ago, where they were scraping information off of websites. They were getting the facial pictures that we had posted, not realizing that a company like Clearview would grab them and use them to identify us and sell the information to the highest bidder. So it's not right. It is not good, but it's very concerning. And you might want to read this. It's on techcrunch.com. Heather Fetterman is the author of the article. And she's been looking at privacy for a very, very long time and thank goodness for that. And you'll find it on my website at Craig Peterson comm make sure you sign up so you can get all of my weekly email summaries of this week in the news, including everything from today. Stick around, and we'll be right back to the top of the hour here on WGAN. Okay, okay, okay. Hi everybody. Craig Peters on here on WGAN. Of course, I'm heard every Saturday from one until 3 pm, Wednesday mornings on with Matt, Wednesday at about 730 is they go over, of course, all of the latest news, keeping you up to date, on your day, what's happening where you should go, where you shouldn't go, what you should do. And in this kind of this day and age, it's maybe you shouldn't go anywhere, right. I was just reading an article during the break about the SARS epidemic. It was written by a guy who was over in Hong Kong at the time and talking about almost the same thing. When SARS broke out, this was slightly after the reunification of China and Hong Kong. The British signed it over the rights one nation to what was it two economies or something like that again, remember, they also, of course, had British common law and stuff. They were doing the same thing back then. The Chinese were presenting doctors who dared talk about a potential pandemic who talked about this respiratory illness that people had. So I guess some things just don't change very much over time. And that's one of them. But he talked about what it was like going out on the roads, not seeing anything, and now he's living in Los Angeles. And he said he was right there in Sunset Boulevard. He stood right in the middle of the intersection through two sets of green lights and didn't see a single car. Then this part I thought was fascinating. At the end of the article, he talked about how the kind of ban was lifted, because people South Korean team they're in Hong Kong, of course, the government stepped in. All these draconian measures kind of like what the socialist government did in Taiwan and throughout China, after this latest COVID virus, hit The you know, so the muon virus is spreading. They're jailing doctors who dare talk about it. They're putting their head in their sand, pretending it's not happening. And then, all of a sudden, they cracked down on everybody and everything. But in the end, he said in Hong Kong, at least for SARS, what ended up happening was all of these people all of a sudden had a desk kind of a Why am I putting on this face mask this morning, and slowly but surely without a government order. People started going out, started walking around, and he said one day, he was sitting there eating noodles in a restaurant, and all of these people were walking by and just really having a normal life. And they thought, wow, this is kind of cool. Wait a minute when did this normal life happen? And I think that might be kind of what happens here, although the governors are slowly starting to open up states and now you know, moving from what Stage one to two to three, that this is going to be fascinating, absolutely fascinating. What would have been the best way to respond? Of course, there'll be a million opinions that will be expressed here over time about the best way to respond. Maybe we could have warned people to try not to spread this saying if you have this respiratory problem or you're obese or whatever that there are major causes of death associated with getting the virus. Who is it that we should recommend quarantine for? I know that some people I think I mentioned on the show before are being advised that in till about 18 months have passed, you should not be going outside. Now I have an aunt who's a transplant patient. She's been advised to stay out of everything for about 18 months because this could nail her. And we know about kidney problems with this virus and liver problems even people getting legs amputated, right? There's a professional sports athlete who had his leg amputated after this and damage of course to the lungs, etc., etc. So would that have been a better response just warning everybody to be careful here the precautions you should take. Then the segment of the population that needs to be quarantined not everybody. We're already hearing about the side effect deaths, if you will, the people committing suicide, getting hooked on drugs, it'll be just in terrible places for a very, very long time. So it's very, very concerning to me. Hey, and I want to give you all quick notice here puts you on notice we are going to be doing Some getting back to business training, where we're talking about security, what you need to do and what you should do, what are the first things you should do when your business reopened? We're going to help you with backups The best way to get the backups done, how to verify them, I'm going to walk you through all of that. And we're going to have all of these free webinars coming up, make sure you are on my email list. And to do that, just go to Craig Peterson dot com you can go to Craig Peterson dot com slash subscribe is probably the best place. And you will once you're there, be able to subscribe to my emails and start getting like moving along. So let a little bit of advice there on that side. I thought that article was interesting. So, of course, I shared it with you. And we'll see what happens here. I think we should we're at the point now where we should start getting back to normal. We should have enough data already here in the us that we can trust that tells us Who the most vulnerable populations are. We know nursing homes are vulnerable that people in nursing homes aren't just necessarily older, which is one of the problems associated with death from this virus. Still, they are also many of them are infirmed one way or the other. So we know we got to protect them. Imagine spending a few trillion dollars, hunches, protecting those people, maybe helping them out with some other health issues. And I'm sure going forward many of these convalescent homes nursing homes are going to be more careful with the transmission of disease. While we won't, we won't go down that road. Alright, so let's talk about some conspiracies here. One of the big conspiracies about Coronavirus that people spouting is that these new 5g networks that are growing dramatically across the whole United States and around the world are causing Coronavirus and are where it started. Now, we somehow always get all of these theories, conspiracy theories right. Whenever anything starts happening, well, you know its causation and correlation are not the same things. In other words, if Coronavirus started when 5g networks got turned up that correlation. But that does not mean that 5g is causing this problem. It is a massive conspiracy out there. It's spreading more and more. Even USA Today had an article about it this week, talking about how people are just claiming the man 5g is exacerbating at the very least The spread of Coronavirus. Hence, I think the opposite is true. 5g is allowing people to be entertained, to do research, pick up new hobbies to learn while they're at home. So that's a very, very big deal here. The actor John Cusack spread this social media, right? Isn't that a problem what he tweeted to 1.6 million followers 5g will be proven to be very, very bad for people's health. He deleted the tweet later where he said five G's making people sick, and we're going to regret it. He put another one up, calling people who disagreed with him just dumb and effing sheep. Yeah, who are the sheep here? So there are all kinds of these people out there. There's rapper Wiz Khalifa I have heard of him. Isn't that weird? Singer Keri Hilson at sea judge on Britain's Got Talent, Amanda Holden. I know her because I've watched that show before. And all of these people attended various art schools. So we've got Yeah, one in Pittsburgh, I've got another one in Atlanta and another one over in London. So be very, very careful. There's no evidence that there's any tied to this. I've talked about it before. There are different types of radiation, and when you mentioned, 5g or LTE and radiation, and people just totally freaked out because they think of radiation, like what they use at the dentist's office or in the hospital. That radiation is dangerous, and it is called ionizing radiation. Where ionizes cells, and that's a problem. The type of radiation we're talking about with LTE with 5g With Wi-Fi is non-ionizing radiation. So keep that in mind, and the American Cancer Society says that the frequency of the radio waves that are given off by a cell phone, quote simply does not have sufficient energy to damage all our DNA or cause heating in the body tissues. It has been proven again and again. The Federal Communications Commission ruled months ago that we have nothing to worry about, not that we can necessarily trust it comes from the government. But you know me as an advanced class, Amateur Radio license holder. I've studied this back into the 70s, just trying to figure out what was going on. Am I more dangerous because we're talking about a cell phone or smartphone that gives out milliwatts' worth of power? And as a ham, I was routinely transmitting 50 watts of power relatively near my head, and in some cases, I was 100 watts or even 1500 watts worth of power very close by. So what is it? Okay, so this is not a fact I just wanted to kind of warn you guys. Yeah, 5g is spreading. It's spreading very fast. It's rolling out quickly with the Sprint T-Mobile merger. And T-Mobile has a nationwide 5g right now, that's a cool one there to low enough frequency that looks like T-Mobile may win the whole 5g argument outside of the big cities, because of the lower frequency bands that T-Mobile has access to. It's even worth using in your house. Anyways, of course, you're listening to Craig Peterson on WGAN. Stick around. We'll be right back. Hi guys, Craig Peterson here. Welcome back. I hope I put that whole 5g Coronavirus myth to bed. Remember, 5g is not going to be harmful. Now some characteristics are a little bit different than what you might expect. With 5g there are going to be transmitters all over the place, particularly in big cities, there'll be one on basically every corner would be on buildings everywhere. Most of the 5g networks using higher frequencies that cannot pierce buildings very well and cannot penetrate even glass. So I know from that standpoint, there will be more radiation, and it will be closer to you. But ultimately, I don't think there's any real risk involved in that. So there you go. I'm thinking back to a speaking engagement for an annual meeting for a bank, and a lady came up to me afterward and said, so what do you think about cell phones causing cancer? And I explained to her what I had just described to you guys here, only last segment, and she said, Well, my sister died of brain cancer. And she got it when she started using her cell phone all the time for work. And, you know, so what do you think of that? And I said, Well, I'm just so terrible thing. That's all I said. But again, correlation versus causation. Did she already have that brain cancer before she started using that cell phone for work? And if you are concerned about it, and you know, some people are very, very worried about The thing to do is always use a headset of some sort. If you're concerned about any kind of electromagnetic radiation, you should probably use a wired headset, which is getting harder and harder to find. And then you hold the cell phone away from you when you're using it because the power drops off very quickly of that signal. It's for those math majors, it drops off as the inverse of the distance squared, in other words, drops off, really, really fast. So if you just hold it a few feet from your body, you have cut down the amount of radiofrequency transmission or radiation, you've cut it down by many factors many multitudes, frankly, as it drops off, but anyway, so that's the way to do it. Some people use Bluetooth nowadays, and you see people walk around all the time with this little apple, ear pod things. And those are using Bluetooth that is much lower power than what your phone is putting out. So there you go some tips if that's what you want to do. This next one, I thought it was funny. And I talked this week on a couple of different times different radio stations about this, and Amazon is actively trying to get people to buy fewer items on its website. Now have you noticed that typically, you go around from website to website, and you see just all kinds of advertisements for things from Amazon, mainly if you've looked at something recently? Well, this week, Amazon lifted its ban that prevented third-party sellers from shipping non-essential items to its warehouses. Before that, they were only accepting household staples, basic stuff, toilet paper, right metal supplies, any other high demand products, but it's also been raining in its tactics used to encourage people to buy stuff, and they have dropped some of their advertising. And remember, they've got this Prime Day deals extravaganza that they have every year where they say, Hey, listen, we're going to save you, and you can save like 3040 50% on some things. That is delayed indefinitely. Now, the traditional Mother's Day Father's Day deals have been canceled for this year. They also remove the recommendation boxes. Have you noticed that if you look at an item, it will show you other related products people bought, and they've removed that as well? And a quote from an unnamed Amazon employee talking to the New York Post. We typically want to sell as much as we can, but our entire network is Full right now with hand sanitizers and toilet paper that we can't serve other demand. The demand we see for essential products has remained high. That's according to Jeff Bezos. But unlike a predictable holiday surge, this spike occurred with little warning, creating significant challenges for our suppliers and Disney Disney network and delivery network. We also have some of these people who are working in the warehouses getting sick with it, and at least one worker has died. So how's that Amazon canceled Father's Day, Mother's Day, and their Prime day for all of us Prime people. A couple of weeks ago, I had a webinar where I discussed Wi-Fi wireless networks. And I told you guys Hey, listen, and I've got this deal. That we put together and we based the deal on some, I think, frankly amazing, some amazing stuff. That is business class, Wi-Fi router-firewall, you know, low-end business class stuff. And, and, man, a lot of you guys bought that. And I thought that was great. And we're getting those set up now. But we've got another warning out if you are a Linksys user if you have a Linksys broadband router, these wireless routers that they've been sending for years. They're saying that they've locked user accounts on their smart Wi-Fi cloud service. It's asking users to reset their passwords. Hackers were using these hijacked accounts and changing router settings to redirect users to malware sites. Now if you're taking if you attended my DNS training Where I told you what the best free DNS services are out there, you came to realize I'm sure pretty quickly that one of the best things you can do is put one of these DNS services, like the open DNS, put them into your router. So what ends up happening is when your web browser program on your computer asked to go somewhere on the internet, it's going to ask a known-good DNS service. I think that's a wonderful thing. And Firefox added in a new service just recently that uses a CloudFlare DNS service to help prevent some of the hijackings that can happen. So apparently, what's happening right now with some of these Linksys routers that are tied into their smart Wi-Fi cloud service is they're changing the DNS settings on your Linksys Wi-Fi router. And they're changing it so that when your machine says, For instance, I want to go to Bank of America, instead of giving Bank of America's real internet address, it gives the internet address of a hacker-controlled website. That is a very, very big deal. So what's going to happen is people are going to be ripped off right, left, and center because instead of going to the real website, they are going to be going to malware sites. And sometimes, it redirects them to the malware site, which tries to install malware and then immediately redirects you to the real site. Now, we've known about this type of attack for a very long time because people just have not been changing the default administrative usernames and passwords on the routers. So either someone breaks in via the internet, or in some cases, they are compromising a home computer and then using that home computer to compromise the router and therefore compromise Do the other business computers and compromise the home router, etc., Right? So that's been around for a long time. This particular problem is only impacting the Smart Wi-Fi account. It is a cloud-based system that if you only have these Linksys devices connect to Linksys routers and other equipment over the Internet to manage the router settings, which has always been a bit of a problem, okay? And I'm on Linksys as website right now, and they're saying, Hey, we're experiencing longer than usual wait times while Yeah, I bet they are. If you have Linksys smart Wi-Fi, if you're using it, make sure you go and change your usernames and passwords right away because it's turning out to be a problem. So we're going to talk about zoom some more when we get back you're listening to Craig Peterson on WGAN and online. Craig Peterson dot com. Hey, welcome back, everybody Craig Peterson here, in case you missed the last segment, if you are using Linksys, you're going to want to go back and listen to it. It's a very, very big deal. Very important. Because of the hack that has just happened with their Smart Wi-Fi service. It's a pretty bad one. Also, we talked about COVID-19 in the show the Patriot Act, 5g rumors, we've got this 5g rumor about how it is accelerating the spread of Coronavirus and the surveillance programs around the world. Now you can listen to all of those on tune in the app. And right there you just search for Craig Peterson you'll see me we post all of these online. So check that out if you missed it. And next week, don't miss any of the show, because I'm on Saturdays from 123 pm. I'd love to hear from you as well. Just send an email to me at Craig Peterson dot com. It is a very, very big deal. Just do that, and we will be reaching out right away. I had promised to get to this ongoing zoom issue. You know I don't like zoom. We after we found out about zooms significant security vulnerabilities. Months ago, we banned it in our company and all of our client's companies out there, and in light of this Coronavirus pandemic, everybody is turned to these apps now FaceTime pretty good, pretty safe. It's encryption, zoom. Not it's pretty good, not safe at all. Currently, hanging out with friends is one thing. But doing work on zoom is entirely different. Because what we found out now is that Zoom is very insecure. You probably heard me last week. I think it was I talked about the thousands of zoom meetings that were found on-line by hackers. Well, this week, we've got yet another zoom story. Researchers found on Monday, according to refinery 29 le Bell's article, that hackers began selling over a half a million zoom accounts for less than one cent per account. And according to findings from the cybersecurity firm Sibyl, which is investigating some of these hacking activities, Sibyl found that more than half a million zoom accounts on hacker forums and the dark web put up for these low prices. Bleeping Computer, which is something that I follow as well and if you are into cybersecurity and understanding some of the computer stuff. I think you'll appreciate it. Bleeping computer has also been reporting on this, some of these accounts are cheap. Cymbal was able to purchase 530,000 Zoom accounts for two-tenths of a cent each. Two-tenths of a cent each, so five for a penny. Now, why are they being hacked so suddenly? Well, it turns out that Zoom has yet another major security problem again, this is what happens when businesses just jump in headfirst without really understanding the implications of what they're doing. And we have seen this over and over again. These hacks are not a traditional hack. In this hack, the hackers used something known as credential stuffing to hack the Zoom accounts. It is something I've warned about, again, and again, and again. I have some features that hopefully we're going to get them running soon here on WGAN, and some of these other radio stations out there. But these credential stuffing attacks take data from the dark web hacks that have happened on other websites where you've got people's usernames, email addresses, or passwords. And then they're compiled into lists that are sold to hackers. There are some huge lists out there that contain millions. I think there's one that had 2 billion usernames and passwords in it. They're being used right now to scam people into sending money from to the hackers. Okay. But then this case what's happening is they are stuffing them into zoom hence credential stuffing, checking to see if zoom will allow them to log in. And of course, Zoom doesn't have the proper security to stop these credential stuffing attacks. Don't use Zoom. Stop using it drives me nuts. So the suspected reason, by the way, that these accounts have been doled out by hackers. It's coming back to this whole Zoom bombing notion where people want to drop in on zoom meetings. Now, Zoom bombing is typically used for trolling and abuse. But if you can go and you can get one of these databases of usernames, email addresses, and passwords. And let's say you want to spy on your competition, and you can now drop in on your competitions' zoom meetings. What do you think is going to happen? If one political party wants to spy on another political party, just look up that person's email address, and you're in. So hackers have been using zoom bombing and virtual synagogue chats during Passover, shouting racial racist slurs at women and people of color berating people attending Alcoholics Anonymous meetings. We've got a high school teacher reporting that her classroom call was accessed by an end on an identified individual who was yelling profanities, putting up swastika tattoos. A woman of color told BuzzFeed that unwelcome parties entered her regular meetings with other women of color and what seemed like 100 people yelling racist slurs at the same time. Cybersecurity experts are suggesting that passwords be changed on all Zoom accounts, that's what I've been saying. Right? Change your password. Don't use your normal Zoom meeting, set up a random Zoom meeting number. It's there now stepping in to help prevent these attacks. The FBI in Boston had to step in and offer tips on how to keep online meetings secure, which is absolutely freaking amazing. So a bit careful and don't use Zoom. A lot of people have switched over to WebEx, which is something I've been using and selling for years now, WebEx teams not only gives you meetings, it gives you all of these different workspaces and things. I like it and recommend it. They are offering their free WebEx meetings for 90 days but had to stop it for a bit because too many people were signing up. WebEx had to open up a whole other data center to be able to handle All of this demand. So it's essential, we need to understand that if you want to have a small meeting with family, friends, even small business and you guys are smart enough to be using iPhones, not Android. Just go ahead and use FaceTime. It's quite good. You'll like FaceTime now. They have meetings for up to 30 people. You can also use a few other apps. You know, some people like WhatsApp, I am not fond of that. Silent Circle has some excellent stuff. They've got a silent phone, and these guys know what they're doing. If you're on Android, the first tip is to get rid of it. Don't use Android if you have anything you're data, and you are concerned about losing. Because Android is not as a secure platform in the least, it's crazy people. Remember, you cannot Get the updates, even with our friends over at Samsung with their Galaxy phones, they only provide updates for a couple of years. So if you are stuck in the Android space, and I get it right, I am not the biggest Apple fan in the world. But their software, their systems are secure. They are not in the business of selling your information. Google Android is in the business of selling your information. Okay. Hey, and when we get back, we're going to talk about iPhones. We're going to talk about what would be the actual cost of an iPhone if it was made in the United States because that may be happening soon. Stick around. We'll be back with more. I'm Craig Peterson, and you're listening to me on WGAN make sure you get my newsletter, Craig Peterson dot com slash subscribe. Hey, welcome back everybody Craig Peterson here on WGAN. And of course, online at Craig Peterson dot com slash subscribe. Well, we have made it through most of the show today we've been talking about Linksys and significant security problems you have to take care of right away if you're using link system vices. We spoke about Zoom and why you don't want to use Zoom ever again, and I gave you some alternatives. What Amazon is doing with canceling Father's Day, Mother's Day, they've changed right now anyways, for the time being, their entire business model COVID-19 of course, we talked about that about some rumors floating around about the spread of COVID-19 because of 5g. We also talked about what countries are doing around the world to help battle this. What is the US doing with surveillance right now on the COVID-19 front? Where it's all taking us? You'll find all of that by going to Craig Peterson dot com right there on the homepage. You can scroll down and listen to any of the segments that you might have missed. You can also get it right on the TuneIn app, where you might even be listening to me right now. Live as the show is aired Saturdays Of course 123 and looking at the clock, that means we are almost done for the day today. I can't believe how fast it went today. I am delighted to be able to help you guys out we've had hundreds of people who have attended my webinars over the last few weeks. I didn't do any this previous week. I am strongly suspected. I'm going to be doing some this coming week. So keep an ear to the ground on this next week. Okay. Let's Get into that Oh, and to do that, the only way you can have a new to the ground on this is if you are on my email list, Craig Peterson dot com slash subscribe. How's that for easy? So how much would an iPhone cost if we make it in America? You know, some of these iPhones go upwards of over $1,000 depending on what they are. And I want you to think about that for just a minute. Not so much in the context strictly of an iPhone. But what did a first computer cost you? How about a laptop? Because frankly, these devices have almost the same functionality as a functional laptop does or a good computer does. They do. And you could not get this type of computing power just a few years ago. I found a couple of my beloved iPhone pods only a few weeks ago in a drawer as I was doing some cleaning, right, aren't we all right spring cleaning time. And I just was shocked and amazed because these things were huge, I think one was 80 gigabytes. And I think the other might have been 120 gigabytes. And that's huge for the day. Huge. I used to listen to them on airplanes. It was just such a relief because all that was on there was my music. And there was nothing else to tempt me. I didn't even put games on them. Now there's a lot of hacks available for the iPod, you can put on some cool players, but that iPod interface, it could

united states america tv american new york amazon live health new york city australia europe english google israel ai uk china apple internet man los angeles coronavirus americans british germany new york times zoom russia michigan chinese government italy australian russian dna local new jersey italian ministry united kingdom national iphone brazil south africa utah congress african americans bank indian turkey argentina fbi world war ii stage iran hong kong sweden pittsburgh wall street journal thailand muslims whatsapp beatles android connecticut singapore maine switzerland id dubai mac greece taste mother's day indonesia poland kenya hacks ios taiwan norway prime korean gps south korea offering jeff bezos windows cdc drones belgium austria brazilian galaxy father's day public health pakistan passover constitution cybersecurity conspiracy theories researchers west virginia wifi 5g hackers moscow ecuador samsung polish supply chains sim iranians buzzfeed norwegian big tech monitoring patriot ipods facetime bluetooth reuters passwords la times federal government santa fe new york post western australia american express south koreans ppp sars tunein forcing vpn t mobile techcrunch vodafone tencent lombardi publicly american cancer society tech talk japanese americans dns alcoholics anonymous john cusack prime day kerala widespread twin towers contact tracing deleting patriot act sunset boulevard world war one planet fitness foursquare world wars weather channel national security agency hall pass lte federal communications commission webex clearview herb alpert clearview ai new york police department right right amateur radio bleeping google android britain's got talent swisscom linksys disney disney amanda holden cymbal gold's gym norwegian institute sprint t mobile bluetooth low energy craig peters bleeping computer silent circle craig peterson cloudflare dns ssids after world war two wgan
Stacktrace
79: “When Rambo goes wild”

Stacktrace

Play Episode Listen Later Apr 15, 2020 57:58


John and Rambo speculate about why HomePod is now running tvOS, talk about SwiftUI view architecture and previews, and go on a deep-dive into Bluetooth Low Energy and how Rambo ported AirBuddy to the Raspberry Pi. Download MP3 Hosts: Gui on Twitter: @_inside John on Twitter: @johnsundell Links John’s Swift tips A guide to the SwiftUI layout system Synalyze It! Pro Reverse engineering the Nintendo 64 DRM HomePod runs tvOS Apple and Google’s COVID-19 contact tracing effort Little America Final Fantasy VII Remake Sketch Formatter for Mac TextMate BBEdit Reveal Sherlock Visual Studio Code GitX Zeplin Subscribe: 🟣 Apple Podcasts 🟠 Overcast 🟢 Spotify

Paul's Security Weekly TV
SweynTooth, OWASP, CRXcavator, DevSecOps - ASW #96

Paul's Security Weekly TV

Play Episode Listen Later Feb 20, 2020 33:14


SweynTooth: Unleashing Mayhem over Bluetooth Low Energy, OWASP SAMM version 2, Understanding Trusted Execution Environments and Arm TrustZone, Security Researchers Partner With Chrome To Take Down Browser Extension Fraud Network Affecting Millions of Users with a revisit to CRXcavator and a look at one of its components, RetireJS, It's the Boot for TLS 1.0 and TLS 1.1 and it's only been about six to nine years since major protocol attacks were demonstrated. How does your organization manage tech debt?, What Is DevSecOps and How to Enable It on Your SDLC? Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode96

Application Security Weekly (Video)
SweynTooth, OWASP, CRXcavator, DevSecOps - ASW #96

Application Security Weekly (Video)

Play Episode Listen Later Feb 19, 2020 33:14


SweynTooth: Unleashing Mayhem over Bluetooth Low Energy, OWASP SAMM version 2, Understanding Trusted Execution Environments and Arm TrustZone, Security Researchers Partner With Chrome To Take Down Browser Extension Fraud Network Affecting Millions of Users with a revisit to CRXcavator and a look at one of its components, RetireJS, It's the Boot for TLS 1.0 and TLS 1.1 and it's only been about six to nine years since major protocol attacks were demonstrated. How does your organization manage tech debt?, What Is DevSecOps and How to Enable It on Your SDLC? Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode96

Application Security Weekly (Audio)
Over the Edge - ASW #96

Application Security Weekly (Audio)

Play Episode Listen Later Feb 18, 2020 72:39


This week, we welcome Doug DePerry, Director of Defense at Datadog, to discuss Lessons Learned From The DevSecOps Trenches! In the Application Security News, SweynTooth: Unleashing Mayhem over Bluetooth Low Energy, RetireJS, What Is DevSecOps and How to Enable It on Your SDLC? and more!   Show Notes: https://wiki.securityweekly.com/ASWEpisode96 Visit https://www.securityweekly.com/asw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly
Over the Edge - ASW #96

Paul's Security Weekly

Play Episode Listen Later Feb 18, 2020 72:39


This week, we welcome Doug DePerry, Director of Defense at Datadog, to discuss Lessons Learned From The DevSecOps Trenches! In the Application Security News, SweynTooth: Unleashing Mayhem over Bluetooth Low Energy, RetireJS, What Is DevSecOps and How to Enable It on Your SDLC? and more!   Show Notes: https://wiki.securityweekly.com/ASWEpisode96 Visit https://www.securityweekly.com/asw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Change Wave
Catalina: Kevin Hunter

Change Wave

Play Episode Listen Later Feb 18, 2020 23:13


Kevin Hunter is a pioneering product visionary with 20+ years of entrepreneurial leadership in global strategy, business development and product leadership.   As Catalina’s Chief Product Officer, Kevin leads innovation and is responsible for driving global product strategy from concept to commercialization to solve customer challenges and transform the in-store experience for buyers. Kevin’s team also builds strategic partnerships that add dimension and scale to Catalina’s personalization capabilities and fortify its buyer intelligence data. Kevin also serves on the Board of Directors for Nielsen Catalina Solutions.   Adept at sensing early market and consumer trends, Kevin is part of an experienced team of thought leaders playing a critical role in Catalina’s omni transformation through strategic investments in technology, advanced analytics and data science.   His broad, global experience spans IoT, sensor fusion, mobile, digital, marketing, and advertising products in growth and established markets. Before joining Catalina in 2017 as VP of Digital and Consumer Products, Kevin served as President, Head of Americas, Corporate Development and Product Strategy for retail IOT analytics company, Walkbase; and President of inMarket, an ad network focused on location and mobile-based inventory.   Previously, Kevin held a variety of senior roles with Qualcomm, including head of strategy and product for the Retail Solutions division focused on commercializing products, solutions, and technologies in mobile payments, location, and proximity marketing for retailers, brands and venues. He also led Qualcomm Labs, where he was responsible for global market development and product management governance for contextual awareness, location, proximity, beacons, Bluetooth Low Energy, LTE-Direct and Retail IoT initiatives.   Later, Kevin co-founded and served as Chief Operating Officer of Gimbal, a mobile engagement and location intelligence solution technology firm carved out of Qualcomm. Kevin is the co-inventor of 28 US granted patents with over 15 more pending. He received an Emmy Engineering Award for Sprint TV, a groundbreaking mobile television product which he led.

TechCrunch Startups – Spoken Edition
Nodle crowdsources IoT connectivity

TechCrunch Startups – Spoken Edition

Play Episode Listen Later Dec 11, 2019 4:56


Nodle, which is competing in the TechCrunch Disrupt Berlin Startup Battlefield this week, is based on a simple premise: What if you could crowdsource the connectivity of smart sensors by offloading it to smartphones? For most sensors, built-in cell connectivity is simply not a realistic option, given how much power it would take. A few years of battery life is quite realistic for a sensor that uses Bluetooth Low Energy.

The History of Computing
The History Of Android

The History of Computing

Play Episode Listen Later Aug 22, 2019 18:02


Welcome to the History of Computing Podcast, where we explore the history of information technology. Because by understanding the past, we're able to be prepared for the innovations of the future! Today we're going to look at the emergence of Google's Android operating system. Before we look at Android, let's look at what led to it. Frank Canova who built a device he showed off as “Angler” at COMDEX in 1992. This would be released as the Simon Personal Communicator by BellSouth and manufactured as the IBM Simon by Mitsubishi. The Palm, Newton, Symbian, and Pocket PC, or Windows CE would come out shortly thereafter and rise in popularity over the next few years. CDMA would slowly come down in cost over the next decade. Now let's jump to 2003. At the time, you had Microsoft Windows CE, the Palm Treo was maturing and supported dual-band GSM, Handspring merged into the Palm hardware division, Symbian could be licensed but I never met a phone of theirs I liked. Like the Nokia phones looked about the same as many printer menu screens. One other device that is more relevant because of the humans behind it was the T-Mobile sidekick, which actually had a cool flippy motion to open the keyboard! Keep that Sidekick in mind for a moment. Oh and let's not forget a fantastic name. The mobile operating systems were limited. Each was proprietary. Most were menu driven and reminded us more of an iPod, released in 2001. I was a consultant at the time and remember thinking it was insane that people would pay hundreds of dollars for a phone. At the time, flip phones were all the rage. A cottage industry of applications sprung up, like Notify, that made use of app frameworks on these devices to connect my customers to their Exchange accounts so their calendars could sync wirelessly. The browsing experience wasn't great. The messaging experience wasn't great. The phones were big and clunky. And while you could write apps for the Symbian in Qt Creator or Flash Lite or Python for S60, few bothered. That's when Andy Rubin left Danger, the company the cofounded that made the Sidekick and joined up with Rich Miner, Nick Sears, and Chris White in 2003 to found a little company called Android Inc. They wanted to make better mobile devices than were currently on the market. They founded Android Inc and set out to write an operating system based on Linux that could rival anything on the market. Rubin was no noob when cofounding Danger. He had been a robotics engineer in the 80s, a manufacturing engineer at Apple for a few years and then got on his first mobility engineering gig when he bounced to General Magic to work on Magic Cap, a spinoff from Apple FROM 92 TO 95. He then helped build WebTV from 95-99. Many in business academia have noted that Android existed before Google and that's why it's as successful as it is today. But Google bought Android in 2005, years before the actual release of Android. Apple had long been rumor milling a phone, which would mean a mobile operating system as well. Android was sprinting towards a release that was somewhat Blackberry-like, focused on competing with similar devices on the market at the time, like the Blackberries that were all the rage. Obama and Hillary Clinton was all about theirs. As a consultant, I was stoked to become a Blackberry Enterprise Server reseller and used that to deploy all the things. The first iPhone was released in 2007. I think we sometimes think that along came the iPhone and Blackberries started to disappear. It took years. But the fall was fast. While the iPhone was also impactful, the Android-based devices were probably more-so. That release of the iPhone kicked Andy Rubin in the keister and he pivoted over from the Blackberry-styled keyboard to a touch screen, which changed… everything. Suddenly this weird innovation wasn't yet another frivolous expensive Apple extravagance. The logo helped grow the popularity as well, I think. Internally at Google Dan Morrill started creating what were known as Dandroids. But the bugdroid as it's known was designed by Irina Blok on the Android launch team. It was eventually licensed under Creative Commons, which resulted in lots of different variations of the logo; a sharp contrast to the control Apple puts around the usage of their own logo. The first version of the shipping Android code came along in 2008 and the first phone that really shipped with it wasn't until the HTC Dream in 2009. This device had a keyboard you could press but also had a touch screen, although we hadn't gotten a virtual keyboard yet. It shipped with an ARM11, 192MB of RAM, and 256MB of storage. But you could expand it up to 16 gigs with a microSD card. Oh, and it had a trackball. It bad 802.11b and g, Bluetooth, and shipped with Android 1.0. But it could be upgraded up to 1.6, Donut. The hacker in me just… couldn't help but mod the thing much as I couldn't help but jailbreak the iPhone back before I got too lazy not to. Of course, the Dev Phone 1 shipped soon after that didn't require you to hack it, something Apple waited until 2019 to copy. The screen was smaller than that of an iPhone. The keyboard felt kinda' junky. The app catalog was lacking. It didn't really work well in an office setting. But it was open source. It was a solid operating system and it showed promise as to the future of not-Apple in a post-Blackberry world. Note: Any time a politician uses a technology it's about 5 minutes past being dead tech. Of Blackberry, iOS, and Android, Android was last in devices sold using those platforms in 2009, although the G1 as the Dream was also known as, took 9% market share quickly. But then came Eclair. Unlike sophomore efforts from bands, there's something about a 2.0 release of software. By the end of 2010 there were more Androids than iOS devices. 2011 showed the peak year of Blackberry sales, with over 50 million being sold, but those were the lagerts spinning out of the buying tornado and buying the pivot the R&D for the fruitless next few Blackberry releases. Blackberry marketshare would zero out in just 6 short years. iPhone continued a nice climb over the past 8 years. But Android sales are now in the billions per year. Ultimately the blackberry, to quote Time a “failure to keep up with Apple and Google was a consequence of errors in its strategy and vision.” If you had to net-net that, touch vs menus was a substantial part of that. By 2017 the Android and iOS marketshare was a combined 99.6%. In 2013, now Google CEO, Sundar Pichai took on Android when Andy Rubin was embroiled in sexual harassment charges and now acts as CEO of Playground Global, an incubator for hardware startups. The open source nature of Android and it being ready to fit into a device from manufacturers like HTC led to advancements that inspired and were inspired by the iPhone leading us to the state we're in today. Let's look at the released per year and per innovation: * 1.0, API 1, 2008: Include early Google apps like Gmail, Maps, Calendar, of course a web browser, a media player, and YouTube * 1.1 came in February the next year and was code named Petit Four * 1.5 Cupcake, 2009: Gave us on an-screen keyboard and third-party widgets then apps on the Android Market, now known as the Google Play Store. Thus came the HTC Dream. Open source everything. * 1.6 Donut, 2009: Customizeable screen sizes and resolution, CDMA support. And the short-lived Dell Streak! Because of this resolution we got the joy of learning all about the tablet. Oh, and Universal Search and more emphasis on battery usage! * 2.0 Eclair, 2009: The advent of the Motorola Droid, turn by turn navigation, real time traffic, live wallpapers, speech to text. But the pinch to zoom from iOS sparked a war with Apple.We also got the ability to limit accounts. Oh, new camera modes that would have impressed even George Eastman, and Bluetooth 2.1 support. * 2.2 Froyo, four months later in 2010 came Froyo, with under-the-hood tuning, voice actions, Flash support, something Apple has never had. And here came the HTC Incredible S as well as one of the most mobile devices ever built: The Samsung Galaxy S2. This was also the first hotspot option and we got 3G and better LCDs. That whole tethering, it took a year for iPhone to copy that. * 2.3 Gingerbread: With 2010 came Gingerbread. The green from the robot came into the Gingerbread with the black and green motif moving front and center. More sensors, NFC, a new download manager, copy and paste got better, * 3.0 Honeycomb, 2011. The most important thing was when Matias Duarte showed up and reinvented the Android UI. The holographic design traded out the green and blue and gave you more screen space. This kicked off a permanet overhaul and brought a card-UI for recent apps. Enter the Galaxy S9 and the Huawei Mate 2. * 4.0 Ice Cream Sandwich, later in 2011 - Duarte's designs started really taking hold. For starters, let's get rid of buttons. THat's important and has been a critical change for other devices as well. We Reunited tablets and phones with a single vision. On screen buttons, brought the card-like appearance into app switching. Smarter swiping, added swiping to dismiss, which changed everything for how we handle email and texts with gestures. You can thank this design for Tinder. * 4.1 to 4.3 Jelly Bean, 2012: Added some sweet sweet fine tuning to the foundational elements from Ice Cream Sandwich. Google Now that was supposed to give us predictive intelligence, interactive notifications, expanded voice search, advanced search, sill with the card-based everything now for results. We also got multiuser support for tablets. And the Android Quick Settings pane. We also got widgets on the lock screen - but those are a privacy nightmare and didn't last for long. Automatic widget resizing, wireless display projection support, restrict profiles on multiple user accounts, making it a great parent device. Enter the Nexus 10. AND TWO FINGER DOWN SWIPES. * 4.4 KitKat, in 2013 ended the era of a dark screen, lighter screens and neutral highlights moved in. I mean, Matrix was way before that after all. OK, Google showed up. Furthering the competition with Apple and Siri. Hands-free activation. A panel on the home screen, and a stand-alone launcher. AND EMOJIS ON THE KEYBOARD. Increased NFC security. * 5. Lollipop came in 2014 bringing 64 bit, Bluetooth Low Energy, flatter interface, But more importantly, we got annual releases like iOS. * 6: Marshmallow, 2015 gave us doze mode, sticking it to iPhone by even more battery saving features. App security and prompts to grant apps access to resources like the camera and phone were . The Nexus 5x and 6P ports brought fingerprint scanners and USB-C. * 7: Nougat in 2016 gave us quick app switching, a different lock screen and home screen wallpaper, split-screen multitasking, and gender/race-centric emojis. * 8: Oreo in 2017 gave us floating video windows, which got kinda' cool once app makers started adding support in their apps for it. We also got a new file browser, which came to iOS in 2019. And more battery enhancements with prettied up battery menus. Oh, and notification dots on app icons, borrowed from Apple. * 9: Pie in 2018 brought notch support, navigations that were similar to those from the iPhone X adopting to a soon-to-be bezel-free world. And of course, the battery continues to improve. This brings us into the world of the Pixel 3. * 10, Likely some timed in 2019 While the initial release of Android shipped with the Linux 2.1 kernel, that has been updated as appropriate over the years with, 3 in Ice Cream Sandwich, and version 4 in Nougat. Every release of android tends to have an increment in the Linux kernel. Now, Android is open source. So how does Google make money? Let's start with what Google does best. Advertising. Google makes a few cents every time you click on an ad in an advertisement in messages or web pages or any other little spot they've managed to drop an ad in there. Then there's the Google Play Store. Apple makes 70% more revenue from apps than Android, despite the fact that Android apps have twice the number of installs. The old adage is if you don't pay for a product, you are the product. I don't tend to think Google goes overboard with all that, though. And Google is probably keeping Caterpillar in business just to buy big enough equipment to move their gold bars from one building to the next on campus. Any time someone's making money, lots of other people wanna taste. Like Oracle, who owns a lot of open source components used in Android. And the competition between iOS and Android makes both products better for consumers! Now look out for Android Auto, Android Things, Android TV, Chrome OS, the Google Assistant and others - given that other types of vendors can make use of Google's open source offerings to cut R&D costs and get to market faster! But more importantly, Android has contributed substantially to the rise of ubiquitious computing despite how much money you have. I like to think the long-term impact of such a democratization of Mobility and the Internet will make the world a little less idiocracy and a little more wikipedia. Thank you so very much for tuning into another episode of the History of Computing Podcast. We're lucky to have you. Have a great day!

The CyberWire
Telco data breach. Firmware supply chain problems. Hacking BLE. Census security. Continuity of operations. Decryptor for GandCrab, NSPM 13. Bulgaria’s tax hack.

The CyberWire

Play Episode Listen Later Jul 17, 2019 20:32


Sprint warns of data breach. Eclypsium announces discovery of server firmware supply chain problems. Bluetooth Low Energy may be less secure than thought. Congress hears about US census cybersecurity. Ransomware and continuity of operations. The FBI offers help decrypting GandCrab-affected files. Venafi on why financial services are especially affected by certificate issues. Congress asks to see NSPM 13. And an arrest is made in Bulgaria’s tax agency hack. Ben Yelin from UMD CHHS on the DOJ being required to make public attempts to break encryption in Facebook Messenger. Tamika Smith speaks with Alex Guirakhoo from Digital Shadows about scammers registering fake domains to try to capitalize on Facebook’s Libra cryptocurrency plans. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_17.html  Support our show

WHOOP Podcast
John Capodilupo, WHOOP Chief Technology Officer, talks 3.0 tech, the membership experience, and a pair of recent sleep studies validating WHOOP data.

WHOOP Podcast

Play Episode Listen Later Jul 16, 2019 44:10


CTO John Capodilupo discusses WHOOP technology and signal accuracy (5:24), how to wear your Strap to get the best data (8:44), constantly improving algorithms (15:12), 3.0 troubleshooting tips (17:21), using Bluetooth Low Energy (17:48), app and firmware updates (22:48), what to do if the lights won't turn on (24:13), membership services (27:53), a Cornell Alzheimer's study (34:09) and an Arizona insomnia study (37:31) that each used WHOOP, and the idea that everyone should have 24/7 access to their physiological data (41:17).Support the show (http://whoop.com)

Mister Beacon
Inside Bluetooth 5.1 – Direction Finding and More

Mister Beacon

Play Episode Listen Later Jun 3, 2019 48:04


Think back to the days when we thought of Bluetooth as the connection between our wireless headphones, keyboards, and the audio systems in our cars. Today we know it as so much more. Bluetooth Low Energy brought to life a new array of connected device applications. Now we are just starting to see the huge potential Bluetooth has in location services. This week we hear from Ken Kolderup, VP of Marketing for the Bluetooth Special Interest Group, the standards organization responsible for specification, qualification, and promotion of Bluetooth technology. We discuss the newest Bluetooth feature, Direction Finding, and how it is transforming our expectations of what location services Bluetooth can provide. We are moving from simple proximity detection to real time sub meter positioning. This new standard is enhancing the level of accuracy that can be achieved. For example, in manufacturing, we can go from knowing that a pallet is ‘present’ in a building, to knowing which pallet is which and exactly where it is in a crowded warehouse. Listen in to learn the difference between the two different methods of direction finding: Angle of Arrival (AoA) and Angle of Departure (AoD), as well as Ken’s insights on how this new feature will influence different industries. See acast.com/privacy for privacy and opt-out information.

Craig Peterson's Tech Talk
Cyberbullying, Security summer free courses, First American Hack, Google Bluetooth titan hijacking and more Today on TTWCP Radio Show

Craig Peterson's Tech Talk

Play Episode Listen Later May 31, 2019 28:04


I am planning a Security Summer for my listeners.  I will have some free courses.  I will also introduce you to some of the software that I use for my clients and how you can use it too.  So watch out for announcements on those. Is our society changing? What part is social media playing? Listen in today for more on this. What can Open Source do for you? Why Open Source may change your life. More on this today. Are we really ready for Autonomous Cars? or Is the technology expected to perform faster than it is actually ready?  Interesting questions we will be discussing today. What is going on with Google?  G-Suite and Titan are both having issues. Microsoft has another problem and it is a big one. More on this. Do you have a Mortgage?  You need to hear this! For more tech tips, news, and updates visit - CraigPeterson.com --- Transcript:  Below is a rush transcript of this segment; it might contain errors. Airing date: 06/01/2019 Cyberbullying, Security summer free courses, First American Hack, Google Bluetooth titan hijacking ---- Hello, everybody, Craig Peterson here. We have ignition and boy do we have a show for today and then some. You know a little bit about cyberbullying, I am sure. Well, I'm going to tell you about something that I experienced this weekend, something that your kids may be experiencing in a much more critical way. You know, we mentioned last week about the suicides and tied into this Netflix show. Well, we'll get into this a little bit more. For those of you who are wondering how software is getting developed, nowadays and what you might want to do for your business for software development. We'll talk a little bit about GitHub and this whole open source revolution and how It has come into the mainstream, now. We have some security warnings from our friends at Google. A massive hack. I don't think I saw this anywhere. Frankly, we'll talk about what Krebs on security had to say about this. Tesla. Got to throw this in because what's a week without talking about Elon Musk. Consumer Reports is calling the automatic lane change feature on Tesla's navigate on autopilot, far less competent than a human driver. So, it kind of makes you wonder, should we be messing with this? Is this the right thing to do? Frankly, I think it's an excellent question. Well, I commented last weekend in one of the articles up on the website, and as you know, I post articles every week. It's usually just a real quick synopsis of like the first couple of sentences from the article, and then I'll give you a link to it. However, this last week, really, for the first time in a couple of years, we sat down and wrote some articles. We had mentioned something because again, I select the pieces that I am going to cover.  I go through what the strategy is with my team and talk about the salient and essential points, and then they go off and write the article. So, this particular one was about anonymous, and it's still up on the website. And we take those articles, and we tweet them, we put them up on the social media sites as well.  Well, the guy that we had mentioned in the web article claimed to be part of the hacking group Anonymous. He spent time in prison because of some of his activities, and he was a little miffed with me. So I got a little bit of a whiff of him not being pleased about me and what I said in that article. I thought that it was rather interesting because this is the first real hater I've had in quite a while, frankly.  Well, I've got to tell you, this feeling I had in my gut was, you know, people describe this, this feeling of butterflies and things and here, I was wondering, what did I do? What did I do to hurt this guy's feelings? Or, what, right.  I can only describe it as a Wow thing. Well, in reading a little bit further into what he had said was that the that he remembers, I think it was in his warrant, it mentioned the FBI infragard program. And I'm an infragard member. He probably looked me up, and I'm easy to find after seeing the article, which was perhaps triggered by a Google search or maybe a Twitter search or something. And that made me feel a little bit better. But man, brought back all the feelings of the first time there was an attack on my systems.  And that was again, you might remember in the early 90s. And I had these questions running through my mind, what should I do? How do I do it? How do I respond? What? What's going on? I remember when I discovered the hack, who do I call, right? What do I do? And what's going to happen, Right? In my case, it's what's going to happen to everything that I have built, right? Here I am sitting there with a company that I had founded years before, and remember it's the early 90s and I was still a relatively young guy. But I'd been working on this company for over a decade by that point in time. And that feeling I had could only be described as horrendous. It was quite something, and it reminded me of this by having this guy from anonymous, you know, going after me kind of the cyberbullying thing, right? Hey, they're not sitting there trying to wait around for any logic or reasoning or anything else. It is a type what you feel without thinking reaction. Think about people that you've had to deal with probably yourself before. So what do you do? Well, that made me do a little bit of re-evaluation, you guys know, if you listen to the show, for a long time that I do a lot of training, I offer a lot of free training for people on cybersecurity. And just thinking back again, made me remember helped me and let me just put it that in perspective. Remember, that feeling I had in my gut when my first hack attack occurred.  When I realized someone had violated my trust, someone had broken in. Someone was potentially going to take my entire business away from me. How helpless I felt, and I had no idea what to do. Questions like: What should I do?, How can I do it?,  Who do I call?, What's going to happen to my business?, What's going to happen with my clients?. Of course, that was almost 30 years ago now. But this brought all those feelings back. So here's what I'm going to do for everybody out there. Because I know I'm not alone. Some of you are maybe 30-40 years behind me on this journey. I admit I was a pioneer out there. I got arrows in my back, right? I was out there on the Internet early, getting people online, when it was first legal to do so. I was one of the very first people. You weren't, Okay, I understand. You were running a business, and maybe you were not even born yet, okay. But I am committing now to build what I'm calling a security summer. And the idea is that throughout the summer, and I'm probably not going to be able to start this until late June, early July. But throughout the summer, I'm going to offer a course. So you know you know what to do, and you'll know how to protect yourself, right? Because you have to start at the beginning, before the bad guys get in, how to detect it, once they are in what to do about it, the forensic analysis that you're going to have to do after the fact, to clean this thing up, right? I don't want you to have that feeling in your gut that I had before. Thirty years ago, when my first hack happened. I've had a couple of times since and not nearly as dramatic, okay. Because I had dealt with it before and I knew what to do. I had moved into a position where I was pretty much at the forefront at the time in security. But then I went on to run my business. But I don't want you to have that feeling your gut. Right? What do you do? I am sure some of you have had it before. I know you've come into the office in the morning, the computers aren't working. And your first reaction is there in your gut.  Your first thought is -- Oh my gosh, what do I do now? Then that turns into anger. It's anger towards your vendors. Right? Well, I have Norton. I bought that Sonic wall. How did this happen? I should be all set, right. And so now you get on the phone, and you start yelling at vendors, you start yelling at your people who are supposed to be taking care of the IT side. I don't want you to feel that way. We're going to have some free pieces of training this summer. If you're interested, send me an email, and let me know what security subject you're particularly interested in having me cover. That I can make sure we have some free training for you on that during the summer. I want to make it a summer of security. It's our security summer. Brought to you by Craig Peterson, my team and I am getting to work on it, as we speak. My wife is going to put her heart and soul into this effort.  I think I know what you need, and I think I know what you want, but it is essential to hear from you so that I can give you what you feel you need. So, email me at Craigpeterson.com Craig Peterson. com. We're also going to be talking about it on this radio show on these podcasts and on YouTube side, etc., etc. I got my first real hater this week in a long time. And it brought back memories and made me more determined to help you guys out. So, What was one of the first things I did.  I shut down my website and made sure everything was patched up, right? Because I didn't want him to try and hack into my site. After all, anonymous is a hacktivist group, and that's what they do. So, that's what I'm going to do for you guys. We're going to have a security summer this year. Okay, so let's get into a couple more of these articles before I run out of time. This one, I thought it was just totally appropriate. I got a couple of articles that are appropriate for this week, and you'll see those up on my website, and one or two of these articles were written up with my team.  My wife does a lot of this stuff too. So, kudos to her. You will find these up on craigpeterson.com, This is from an article that initially appeared in Pro Publica, and I found it on Ars Technica myself.  It is a fascinating article and written by a couple of people here, Renee Dudley and Jeff Cow. It's talking about the some of these companies here in the US that you can hire to help you out of ransomware, tight spot. Think about some of these we have read about, lately, The city of Atlanta, Georgia,  Newark, New Jersey, the Port of San Diego, Hollywood Presbyterian Medical Center in LA. Atlanta, online water service requests and billing systems were down for over a month. Colorado Department of Transportation, they called in the National Guard, all because of cyber attacks. Apparently what has happened here is that the companies and in these cases, government institutions and hospitals, went to professionals and said, hey, what should we do now? The response from the FBI from the government, in general, is don't pay ransoms. Well, guess what happened here? The FBI said that the criminal actors were out of the reach of US law enforcement. But they were not apparently and out of the reach of this American company called Proven Data Recovery out of Elmsford, New York. It appears that these guys regularly made ransom payments to Sam Sam ransomware hackers over more than a year, according to Jonathan Storfer, who is a former employee who dealt with these ransom payments. Now, Bitcoin transactions are somewhat anonymous and difficult to track. But I know in talking with some secret service agents that they have tracked people through public records and got convictions because of being able to track down some of these Bitcoin coin payments. Pro Publica was able to trace four of these payments, and this article goes on and on. Another US company, Florida based company, Monster Cloud also professes to use their data recovery method, but turns out they were paying ransoms sometimes without informing law enforcement or the victims, this is bad. Again, from Pro Publica, both of these companies charge their victim's substantial fees on top of the ransom amount, and they offer other services such as sealing breaches to protect against future attacks. Well, that's what I do for a living, Right? I don't try and do the recovery and no do I pay any ransom. There are many pieces of free recovery software out there that work in most cases. But, sometimes if you don't have a good backup, you're just out of luck. So, keep that in mind. Going to one of these companies, if you have ransomware on your computer is not going to solve the problem of ransomware. Because, some of these account companies, at least two of them in this case, according to Pro Publica, are making deals with the ransomware criminals, which is, in my opinion, not right. So, we talked a couple of weeks ago about our friends over at Equifax and how they took a huge hit here. It cost them over a billion dollars, probably I would guess close to one and a half billion, but I don't know for sure. They haven't disclosed all of the numbers. This week, they did reveal that they had to do a bit of a write off of about a little more than half a billion dollars. But there's another one out there, and It is crazy. It is the one, I mentioned, from Krebs on security, concerning the website for First American Financial Corp, a Fortune 500 real estate, title insurance giant.  I mean giant, billions of dollars in annual revenue. First, America Corp leaked hundreds of millions of documents related to mortgages going back to 2003. Krebs on security found this leak, and they went ahead, and they fixed it.  Isn't that nice of them, after the horses got out of the barn. So, these are digitized records that included bank account numbers, bank statements, mortgage statements, tax records, social security numbers, wire transaction receipts, driver's license images, were all available without authentication to anyone with a web browser. I find that incredibly unbelievable that a company that employs 18,000 people, you'd think they'd have some security people on staff. And they brought in more than 5.7 billion. There you go. That's the number from Krebs article. Now Krebs found out a bit about it because of a real estate developer, out in Washington state, who said he'd had little luck getting a response from them. It just goes on and on, just like last week with what happened with Intel. And the reports of their colossal security problem. And they, it sounds like, literally tried to buy off the people who reported this massive bug in the Intel chips. It's just amazing. So it goes on and on the earliest document number available on the site wasn't document number 75. The dates and documents get closer to real-time each forward increment in the record number. I have the article up on my website, we've got a link to it if you want to see it.  It's it is just stunning. So, who knows what happened has happened here, again, we have an example of a company that did not keep track of the security problems. And what do you want to bet they did not keep track of data x filtration, and what the criminals stole? Big deal. Big problem. Now Google's got a couple of warnings out this week too. Is this getting old to anybody? I hope you're learning from this, and I hope you can apply it in your own life and your businesses. Take time to learn from these things. But, Google exposed that their G Suite, which is the Google suite where you as a business, you can pay for Google Docs, Google Sheets, etc. If you're a business and you're trying to use it, they want you to pay for it. That's what the city of Atlanta found out when they got hacked. All of their email accounts were down, and they couldn't do spreadsheets, they couldn't do anything. So, they all signed up for Gsuite accounts. Google promptly shut them down two weeks ago for doing that, because they're supposed to pay. Then Google worked out a deal with them. However, it turns out they were storing plain text passwords on its servers for the last 14 years. It is a very, very big deal. So Google is saying that they have fixed the issue and that they've seen no other improper access or misuse of the affected passwords. They've got reasons why they did it. No, everybody makes mistakes in security, okay. I'm giving you that. But these two cases are for companies that should know better, they have big enough department, and they are going to lawsuits. And like Equifax, it's probably going to cost our friends over at First American Financial Corp over a billion dollars. It is something that they can maybe afford to pay a billion dollars in fines and fees. But how about you as a small business. So we've talked about two-factor authentication many times on my show. And we always set up two-factor authentication when it comes to our clients to keep their data safe. You know, some of them have to have to fall under the rules that are in place for federal military contractors, federal contractors, HIPAA records, etc., etc. So you have to have the right kind of two-factor authentication in place, you have to have the correct type of training, the right kind of databases, etc. And the people are getting ripped off right, left and center, these companies that are selling some of these things, they don't care. They are just trying to sell you something another point product and other point security, that is not going to help you out. Can you tell I am getting a little pissed today? Excuse, My French. But here's what's happening. Google has something they call Titan, and we've talked about it on the show before. It is a security key.  It was leading edge, and I'm glad they did it. They've been using it internally for all of their logons. So, it's something you have along with something, you know. Now, you know. I have been promoting Yubikeys. I don't have an investment in any of these companies. We do use them when we are trying to get a company secured. The idea behind the Yubikey and Titan security keys is that it's a little USB fob, you plug it into your computer, you type in your password, you're off and running. Okay? Well, Google's warning that for the Bluetooth Low Energy version of the Titan security keys it sells for two-factor authentication are vulnerable to hijacking by nearby attackers. Google says if you have them, contact them. And they'll give you a free replacement device that fixes the vulnerability. It has to do with Bluetooth pairing protocols, and that means that anybody within 30 feet can carry out an attack, against you. These are $50, which is about the same cost as a Yubikey. I, personally, would go with the Yubikey. But there now you know about the Google Titan. There is nothing particularly wrong with it, except that it's one version is susceptible to hack. If you check the back of your Titan key, if you pull it out right now, it's probably on your key ring, it's a nice, small thing looks like your USB thumb drive, almost. If it starts with a T1 or T2, it is susceptible to attack and eligible for a free replacement. We're not going to have time to get into the rest of these things. So let's get into cyberbullying. I think this is an important one. And I want to talk about internet mobs because that's kind of what happened this week to me. And because I was reported on some security stuff, right, and they, they use almost anything they can against you. And recently we've seen real problems with cyberbullying against kids. According to a survey and a completed study,  It reported online bullying affected 43% of kids. One in four has said that happened more than once. 70% of students reported seeing frequent bullying online. Over 80% of teens use a cell phone regularly. I think these numbers are probably higher than what this study showed, in 2014, I bet you they come close to 100%. Now, most of the teens ignore it. You know I talked about that terrible Netflix show "13 Reasons Why" where a teenage girl committed suicide and left behind 13 cassette tapes explaining her 13 reasons for killing herself. It has led to a 30% increase in teen suicides in the 30 days after that show came out. So there, there's been a correlation drawn on that it did not, by the way, affect adults, it was mainly the 10 to 18-year-olds that it touched. But, we have kids that are thinking about suicide and committing suicide because of cyberbullying. There have been well-publicized criminal cases about this. Now, how about an internet mob? How about if one of these groups decides to come after you, and the group is just the cheerleaders at school? There's a great story that CNN shared this week about a young lady, named Dominique Mora. She's from Southern California and went to school in St. Paul, Minnesota. She is 23 years old and was attending on a softball scholarship. So she thought it would be great to take a job at Chipotle to help make ends meet. Well, she was working at the store, and a group of teenagers came in ordered food, went to pay for it, and their debit card didn't work. That group of teenagers ran out of the restaurant with the food. They stole it, right. The manager gave them a little coaching and told them here's what they should do. What happened next was another day a group of teenagers came in, and she recognized two of them as being part of the group who had ordered food with the bad debit card before running off with the food. They never paid for it. They called the police and explained that these two teenagers were there and they did not want to serve them. We want them evicted from our store.  Here is this young woman, 23 years old, and she asked them to pay first. They pulled up a cell phone, and she didn't realize they were videotaping her and started accusing her of racism because she was a white person caught in the act of doing something labeled racist. Which obviously, there's no racism involved in this at all, they had stolen food from this store, and it was on video, there's surveillance video, it had these two guys on it, according to what CNN is reporting. They dumped this video of her as a racist "B" online. The video of her November confrontation was watched at least 7 million times retweeted at least 30,000 times within two days, and media covered it. Chipotle fired her after it went viral. Now here she is, having done nothing wrong, the police not responding in a reasonable amount of time. It sounds like they never really did respond. It is a case of confirmation bias, these black guys were calling her a racist and the video they presented made it look like she may have been. It is now being used to paint her falsely as a racist. She lost her job and now is worried about what will happen, what she could or should do, and what she should not do.  Those are the same questions I opened the show with today that went through my mind 30 years ago and ran through my mind again this week. Very, very, big deal.  I think w have got to spend some time with our kids talking about this.  Helping them understand the whole act of bullying, what cyberbullying is. That they should report it to the authorities at school, report it to your teacher, report it to the principal, I guess the vice principal is the one who's usually dealing with these types of things. The most common places where it's happening, and this is from stopbullying.gov, they have a lot of great information. Social media like Facebook, Instagram, Snapchat, Twitter, SMS, you know, your text messages, instant messaging, which includes email provider, app services, social media, and of course, email at self. We've got to be careful because the content that we share online, you can get these internet mobs, this mob mentality where everyone jumps on board and starts attacking people. It can drive not just our teens, but almost anyone to suicide, and we don't want that to happen. Sit and talk with them. You know, I was severely bullied as a kid as well. But you know, I could leave it alone. It was happening on the way to school, at school, on the way back from school. At least there were brackets or definitions surrounding it. But nowadays, there aren't. All right, I want to send you to my website Craigpeterson.com, because you will find more information about all of these topics today. A very, interesting one on hackers. About anonymity that was once critical and how that's now changing. I might try and get into that next week. A little bit more here on the show. Also, the Consumer Reports thing about Tesla. Don't count on their autopilot people. Be very careful. The automatic lane change feature is reported to be far less competent than a human driver. So, don't use it. Be concerned about cyberbullying. I'm working here this summer. I'm going to make this a security summer. I'm going to be doing some free courses. We're going to help you guys out with lots of free information. I give these little webinars. They're not I'm not trying to upsell you or anything else. I'm trying to inform you so make sure you attend. Let me know if you're interested and what topics you think I should cover. So if you are interested,  email me. me@craigpeterson.com That is P-E-T-E-R-S-O-N Peterson with an O. Until next week, everybody. Take care. Have a great week. Bye-bye ---  Related articles: Our New Society: Social Media Results In Judgement By Mobs Open Source Is Changing The Way We Approach Everything Autonomous Cars — Are they ready for Prime Time? Why Are We Still Trusting Google? Running Windows? Be Sure You Patch! You Need Two-Factor Authentication Even If Google Screwed It Up Got a Mortgage? Your Information Might Be Included In Massive Hack ---  More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

WHOOP Podcast
Introducing WHOOP Strap 3.0 featuring WHOOP Live

WHOOP Podcast

Play Episode Listen Later May 22, 2019 25:16


WHOOP Strap 3.0 ft. WHOOP Live is now available! Will Ahmed and Robert Moeller discuss everything that's new with the 3.0 (2:12), including 5-day battery life (3:47), the ProKnit band (5:05), Bluetooth Low Energy compatibility (8:01), the Strain Coach (9:21), WHOOP Snap+ (14:20), heart rate broadcasting (17:48), how WHOOP Live features are enabled (19:12), what the 3.0 costs (20:24) and how current members can upgrade (20:57).Support the show (http://whoop.com)

WIRED Security: News, Advice, and More
Google Recalls Titan Security Key Over a Bluetooth Flaw

WIRED Security: News, Advice, and More

Play Episode Listen Later May 20, 2019 3:51


As part of its expanded anti-phishing and account security measures, Google offers extensive support for physical authentication tokens. In a surprising setback, though, the company announced today that it has discovered a vulnerability in the Bluetooth version of its own Titan Security Key—which pairs to devices through the wireless Bluetooth Low Energy protocol, rather than through NFC or physical insertion into a port.

Vector with Rene Ritchie
Natural Disasters: Phone, App, and Tech Tips to Help You Survive

Vector with Rene Ritchie

Play Episode Listen Later Apr 25, 2019 7:36


It used to be that some kinds of natural disasters were seasonal. Snow melting in the spring. Hurricane’s picking up in the summer. Some of that hasn’t changed. Some has. The point being, you’re better off preparing in advance, when everything is calm and safe and you have plenty of time. Don’t put it off because things can get chaotic fast. Do them asap. SPONSOR: Molekule Go to molekule.com and enter VECTOR at checkout to save $75. LINKS: How to back up your iPhone or iPad | iMore How to restore your apps and settings to a new Android phone | Android Central The Best Unlimited Online Backup and Cloud Storage Services Notes App: The Ultimate Guide | iMore Google Keep: Everything you need to know | Android Central Getting started with OneNote 2016 | Windows Central iCloud Photo Library: The ultimate guide | iMore Google Photos: Everything you need to know! | Android Central How to back up your photos on Windows 10 | Windows Central FIBARO HomeKit Flood Sensor, Water & Temperature Sensor for HomeKit only - - Amazon.com Eve Room - Indoor Air Quality Monitor for tracking VOC, temperature & humidity; display, no bridge necessary, Bluetooth Low Energy (new, Apple HomeKit) - - Amazon.com Amazon.com: Kaito KA210 Pocket AM/FM NOAA Weather Radio, Black: Electronics Amazon.com: Midland - ER210, Emergency Compact Crank Weather AM/FM Radio - Multiple Power Sources, SOS Emergency Flashlight, NOAA Weather Scan + Alert, & Smartphone/Tablet Charger (Red/Black): Home Audio & Theater Amazon.com: Yaesu FT-60R Dual Band Handheld 5W VHF / UHF Amateur Radio Transceiver: Cell Phones & Accessories Amazon Best Sellers: Best Travel Games Best Portable Battery Packs for iPhone in 2019 | iMore Best Solar Chargers for your iPhone | iMore Best iPhone XS Car Chargers in 2019 | iMore How to use Find My Friends on iPhone and iPad | iMore How to share your location in Google Maps | Android Central AMBER Alerts on your iPhone: What they are and how to manage them | iMore Emergency alerts and Android: What you need to know | Android Central How to trigger Emergency SOS on your iPhone (and shut it off) | iMore How to call for help with the Apple Watch using the SOS feature | iMore MORE: Gear: https://kit.com/reneritchie Podcast: http://applepodcasts.com/vector Twitter: https://twitter.com/reneritchie Instagram: https://instagram.com/reneritchie Mobile Nations Affiliate Link Policy SUBSCRIBE: Apple Podcasts Overcast Pocket Casts Castro RSS YouTube  

Mister Beacon
Connecting IoT Devices with Bluetooth & Blockchain

Mister Beacon

Play Episode Listen Later Feb 15, 2019 39:49


This week on Mr. Beacon, we talk to Micha Benoliel, CEO of Nodle, a connectivity provider for the Internet of Things. Nodle has an impressive 4.3 million active nodes, and 78 million IoT devices connected to date. Nodle has built and continues to grow a network, based on Bluetooth Low Energy, that connects devices and collects their data. They have a unique approach of leveraging smartphone infrastructure to create availability for the network, crowdsourcing connectivity as Micha puts it. In this episode, we talk about the evolution of the Bluetooth and Wi-Fi standards, as well as dive into how blockchain can enable this network and data to scale while offering protection and privacy to its contributors. See acast.com/privacy for privacy and opt-out information.

IoT For All Podcast
How Bluetooth Low Energy (BLE) Is Made for IoT | Mohammad Afaneh, Founder of Novel Bits | #AskIoT E010

IoT For All Podcast

Play Episode Listen Later Feb 13, 2019 31:08


On this episode of the #AskIoT series, we sit down with Mohammad Afaneh, the Founder of Novel Bits, to discuss Bluetooth Low Energy (BLE), how it fits into the IoT connectivity landscape, and how it compares to Bluetooth 5 and Bluetooth mesh. We also discuss common use cases for BLE, the best way to decide between different wireless technologies for an IoT solution, and how we think 5G will impact the connectivity landscape within the Internet of Things. For those of you who are unfamiliar, Novel Bits is the leading resource for those who want to learn about BLE and develop real-life BLE applications. Mohammad was kind enough to share a discount code (IFAPODCAST30) exclusively with the IoT For All audience to Novel Bits' Introduction to Bluetooth Low Energy and Bluetooth 5 & Bluetooth Low Energy: A Developer's Guide eBooks (below) If you want to connect directly with Mohammad, you can check him out on [Twitter][1] or [LinkedIn][2] Have a question you want to hear answered on a future episode of the #AskIoT series? Tweet to us at @iotforall or use the hashtag #AskIoT and we will do our best to feature it in an upcoming episode! Links mentioned: Novel Bits Intro to Bluetooth Low Energy Book (Use code: IFAPODCAST30 for discount) Bluetooth 5 & Bluetooth Low Energy: A Developer’s Guide - Book (Use code: IFAPODCAST30 for discount) Follow Us: Our Website Twitter Facebook Medium

Merge Conflict
125: Getting Fancy With Bluetooth Low Energy

Merge Conflict

Play Episode Listen Later Nov 26, 2018 49:58


Bluetooth is everywhere! What is Bluetooth Low Energy? Why does it matter for mobile devices and IoT devices and what can you do with it? We cover all of this and so much more! A true summary of this episode of Merge Conflict can only be best described by our fellow listener David: "So what I took from new podcast is that Frank is the Seattle's human version of the google street car driving (skateboarding) around capturing wifi (bluetooth) data." Follow Us Frank: Twitter, Blog, GitHub James: Twitter, Blog, GitHub Merge Conflict: Twitter, Facebook, Website Music : Amethyst Seer - Citrine by Adventureface ⭐⭐ Review Us (https://itunes.apple.com/us/podcast/merge-conflict/id1133064277?mt=2&ls=1) ⭐⭐ SUPPORT US ON PATREON: patreon.com/mergeconflictfm

soundbite.fm: a podcast network
Merge Conflict: 125: Getting Fancy With Bluetooth Low Energy

soundbite.fm: a podcast network

Play Episode Listen Later Nov 26, 2018 49:58


Bluetooth is everywhere! What is Bluetooth Low Energy? Why does it matter for mobile devices and IoT devices and what can you do with it? We cover all of this and so much more! A true summary of this episode of Merge Conflict can only be best described by our fellow listener David: "So what I took from new podcast is that Frank is the Seattle's human version of the google street car driving (skateboarding) around capturing wifi (bluetooth) data." Follow Us Frank: Twitter, Blog, GitHub James: Twitter, Blog, GitHub Merge Conflict: Twitter, Facebook, Website Music : Amethyst Seer - Citrine by Adventureface ⭐⭐ Review Us (https://itunes.apple.com/us/podcast/merge-conflict/id1133064277?mt=2&ls=1) ⭐⭐ SUPPORT US ON PATREON: patreon.com/mergeconflictfm

Mister Beacon
LTE Beacons

Mister Beacon

Play Episode Listen Later Aug 30, 2018 26:02


On the August 24th, Estimote launched a first for the IoT industry, an LTE beacon. It leverages cellular LTE, GPS, and Bluetooth Low Energy connectivity. This small device, fully programmable using JavaScript, was built on the idea of enabling asset tracking in both indoor and outdoor environments. Jakub Krzych, Estimote’s CEO, gives us a first look at this revolutionary product, how it works with the Estimote cloud, and their vision of empowering developers to “use the physical world as their canvas”. See acast.com/privacy for privacy and opt-out information.

Applelianos
One more thing #75 Domótica: instalación y experiencia "Tiras Led de Philips hue"

Applelianos

Play Episode Listen Later Jul 30, 2018 19:06


Hoy os cuento mi experiencia en la instalación y uso de la famosa tira led de Philips Hue, os cuento a detalle como lo configure, que tipo de apps utilice y como funciona con el HomePod de Apple con este accesorio para la domótica de casa.    // Notas del Show y Enlaces    • Philips Hue White and Color Ambiance - Lightstrip Plus, tira LED de 2 metros con enchufe, iluminación inteligente, compatible con Apple HomeKit y Google Home   • Philips Hue White and Color Ambiance - Lightstrip Plus, extensión tira LED de 1 metro, iluminación inteligente, compatible con Apple HomeKit y Google Home   • Eve Energy - Interruptor y contador eléctrico inalámbrico con tecnología Apple HomeKit, Bluetooth Low Energy, blanco     • Apple Philips Hue • ‎Elgato Eve         // Síguenos en Twitter• Applelianos • Grupo Telegram Applelianos Podcast   Si queréis recibir notificación en tiempo real de nuestros directos tenéis que descargar esta app. Si has disfrutado de este episodio, no olvides darnos una reseña en iTunes

Applelianos
One more thing #75 Domótica: instalación y experiencia “Tiras Led de Philips hue”

Applelianos

Play Episode Listen Later Jul 30, 2018 19:06


Hoy os cuento mi experiencia en la instalación y uso de la famosa tira led de Philips Hue, os cuento a detalle como lo configure, que tipo de apps utilice y como funciona con el HomePod de Apple con este accesorio para la domótica de casa.    // Notas del Show y Enlaces    • Philips Hue White and Color Ambiance - Lightstrip Plus, tira LED de 2 metros con enchufe, iluminación inteligente, compatible con Apple HomeKit y Google Home   • Philips Hue White and Color Ambiance - Lightstrip Plus, extensión tira LED de 1 metro, iluminación inteligente, compatible con Apple HomeKit y Google Home   • Eve Energy - Interruptor y contador eléctrico inalámbrico con tecnología Apple HomeKit, Bluetooth Low Energy, blanco     • Apple Philips Hue • ?Elgato Eve         // Síguenos en Twitter • Applelianos • Grupo Telegram Applelianos Podcast   Si queréis recibir notificación en tiempo real de nuestros directos tenéis que descargar esta app. Si has disfrutado de este episodio, no olvides darnos una reseña en iTunes

Embedded
232: Blob Is a Good Word

Embedded

Play Episode Listen Later Feb 1, 2018 70:40


We spoke with Jackson Keating (@jacksonakeating) about Bluetooth Low Energy, going over GATTs layouts and the general BLE usage. While Jackson prefers the Bluetooth spec as the best reading explanation, Elecia liked the Adafruit BLE introduction. She wrote about some of her initial experiences with different chips and Chris Svec wrote about BLE roles. We all agreed that the examples and tutorials from your chip vendor is a good place to get experience. A random UUID generator is uuidgen on Mac or online on uuidgenerator.net. Elecia mentioned 108: Nebarious, an Embedded episode where we talked about how BLE lacks security. Jackson suggested looking at the Core Bluetooth API for IOS development as well as the Nordic and LightBlue apps for debugging.

The Frontside Podcast
091: RxJS with Ben Lesh and Tracy Lee

The Frontside Podcast

Play Episode Listen Later Dec 13, 2017 49:49


Tracy Lee: @ladyleet | ladyleet.com Ben Lesh: @benlesh | medium.com/@benlesh Show Notes: 00:50 - What is This Dot? 03:26 - The RxJS 5.5.4 Release and Characterizing RxJS 05:14 - Observable 07:06 - Operators 09:52 - Learning RxJS 11:10 - Making RxJS Functional Programming Friendly 12:52 - Lettable Operators 15:14 - Pipeline Operators 21:33 - The Concept of Mappable 23:58 - Struggles While Learning RxJS 33:09 - Documentation 36:52 - Surprising Uses of Observables 40:27 - Weird Uses of RxJS 45:25 - Announcements: WHATWG to Include Observables and RxJS 6 Resources: this.media RxJS RX Workshop Ben Lesh: Hot vs Cold Observables learnrxjs.io RxMarbles Jewelbots Transcript: CHARLES: Hello everybody and welcome to The Frontside Podcast, Episode 91. My name is Charles Lowell, a developer here at The Frontside and your podcast host-in-training. Joining me today on the podcast is Elrick Ryan. Hello, Elrick. ELRICK: Hey, what's up? CHARLES: Not much. How are you doing? ELRICK: I'm great. Very excited to have these two folks on the podcast today. I feel like I know them… CHARLES: [Laughs] ELRICK: Very well, from Twitter. CHARLES: I feel like I know them well from Twitter, too. ELRICK: [Laughs] CHARLES: But I also feel like this is a fantastic company that is doing a lot of great stuff. ELRICK: Yup. CHARLES: Also not in Twitter. It should be pointed out. We have with us Tracy Lee and Ben Lesh from This Dot company. TRACY: Hey. CHARLES: So first of all, why don't we start, for those who don't know, what exactly is This Dot? What is it that you all do and what are you hoping to accomplish? TRACY: This Dot was created about a year ago. And it was founded by myself and Taras who work on it full-time. And we have amazing people like Ben, who's also one of our co-founders, and really amazing mentors. A lot of our friends, when they refer to what we actually do, they like to call it celebrity consulting. [Laughter] TRACY: Which I think is hilarious. But it's basically core contributors of different frameworks and libraries who work with us and lend their time to mentor and consult with different companies. So, I think the beautiful part about what we're trying to do is bring together the web. And we sort of do that as well not only through consulting and trying to help people succeed, but also through This Dot Media where it's basically a big playground of JavaScripting all the things. Ben and I do Modern Web podcast together. We do RX Workshop which is RxJS training together. And Ben also has a full-time job at Google. CHARLES: What do they got you doing over there at Google? BEN: Well, I work on a project called Alkali which is an internal platform as a service built on top of Angular. That's my day job. CHARLES: So, you've been actually involved in all the major front-end frameworks, right, at some point? BEN: Yeah, yes. I got my start with Angular 1 or AngularJS now, when I was working as a web developer in Pittsburgh, Pennsylvania at a company called Aesynt which was formerly McKesson Automation. And then I was noticed by Netflix who was starting to do some Angular 1 work and they hired me to come help them. And then they decided to do Ember which is fine. And I worked on a large Ember app there. Then I worked on a couple of large React apps at Netflix. And now I'm at Google building Angular apps. CHARLES: Alright. BEN: Which is Angular 5 now, I believe. CHARLES: So, you've come the full circle. BEN: Yeah. Yeah, definitely. CHARLES: [Chuckles] I have to imagine Angular's changed a lot since you were working on it the first time. BEN: Yeah. It was completely rewritten. TRACY: I feel like Angular's the new Ember. CHARLES: Angular is the new Ember? TRACY: [Laughs] BEN: You think? TRACY: Angular is the new Ember and Vue is the new AngularJS, is basically. [Laughs] CHARLES: Okay. [Laughter] CHARLES: What's the new React then? BEN: Preact would be the React. CHARLES: Preact? Okay, or is Glimmer… BEN: [Laughs] I'm just… CHARLES: Is Glimmer the new React? BEN: Oh, sure. [Laughs] CHARLES: It's important to keep these things straight in your head. BEN: Yeah, yeah. CHARLES: Saves on confusion. TRACY: Which came first? [Chuckles] BEN: Too late. I'm already confused. CHARLES: So now, before the show you were saying that you had just, literally just released RxJS, was it 5.5.4? BEN: That's right. That's right. The patch release, yeah. CHARLES: Okay. Am I also correct in understanding that RxJS has kind of come to very front and center position in Angular? Like they've built large portions of framework around it? BEN: Yeah, it's the only dependency for Angular. It is being used in a lot of official space for Angular. For example, Angular Material's Data Table uses observables which are coming from RxJS. They've got reactive forms. The router makes use of Observable. So, the integration started kind of small which HTTPClient being written around Observable. And it's grown from there as people seem to be grabbing on and enjoying more the React programming side of things. So, it's definitely the one framework that's really embraced reactive programming outside of say, Cycle.js or something like that. CHARLES: Mmhmm. So, just to give a general background, how would you characterize RxJS? BEN: It's a library built around Observable. And Observable is a push-based primitive that gives you sets of events, really. CHARLES: Mmhmm. BEN: So, that's like Lodash for events would be a good way to put it. You can take anything that you can get pushed at you, which is pretty much value type you can imagine, and wrap it in an observable and have it pushed out of the observable. And from there, you have a set of things that you can combine. And you can concatenate them, you can filter them, you can transform them, you can combine them with other sets, and so on. So, you've got this ability to query and manipulate in a declarative way, events. CHARLES: Now, Observable is also… So, when Jay was on the podcast we were talking about Redux observable. But there was outside of the context of RxJS, it was just observables were this standalone entity. But I understand that they actually came from the RxJS project. That was the progenitor of observables even though there's talk of maybe making them part of the JavaScript spec. BEN: Yeah, that's right. That's right. So, RxJS as it stands is a reference implementation for what could land in JavaScript or what could even land in the DOM as far as an observable type. Observable itself is very primitive but RxJS has a lot of operators and optimizations and things written around Observable. That's the entire purpose of the library. CHARLES: Mmhmm. So, what kind of value-adds does it provide on top of Observable? If Observable was the primitive, what are the combinators, so to speak? BEN: Oh, right. So, similar to what Lodash would add on top of say, an iterable or arrays, you would have the same sorts of things and more inside of RxJS. So, you've got zip which you would maybe have seen in Lodash or different means of combines. Of course, map and ‘merge map' which is like a flattening sort of operation. You can concatenate them together. But you also have these time-based things. You can do debouncing or throttling of events as they're coming over in observable and you create a new observable of that. So, the value-add is the ability to compose these primitive actions. You can take on an observable and make a new observable. We call it operators. And you can use those operators to build pretty much anything you can imagine as far as an app would go. CHARLES: So, do you find that most of the time all of the operators are contained right there inside RxJS? Or if you're going to be doing reactive programming, one of your tasks is going to be defining your own operators? BEN: No, pretty much everything you'd need will be defined within RxJS. There's 60 operators or so. CHARLES: Whoa, that's a lot. BEN: It's unlikely that someone's going to come up with one. And in fact, I would say the majority of those, probably 75% of those, you can create from the other 25%. So, some of the much more primitive operators could be used… TRACY: Which is sort of what Ben did in this last release, RxJS 5…. I don't know remember when you introduced the lettable operators but you… BEN: Yeah, 5.5. TRACY: Implemented [inaudible] operators. BEN: Yeah, so a good portion of them I started implementing in terms of other operators. CHARLES: Right. So, what was that? I didn't quite catch that, Tracy. You said that, what was the operator that was introduced? TRACY: So, in one of the latest releases of RxJS, one of the more significant releases where pipeable operators were introduced, what Ben did was he went ahead and implemented a lot of operators that were currently in the library in terms of other operators, which was able to give way to reduce the size of the library from, I think it was what, 30KB bundled, gzipped, and minified, to about 30KB, which was about 60 to 70% of the operators. Right, Ben? BEN: Yeah. So, the size reduction was in part that there's a lot of factors that went into the size reduction. It would be kind of hard to pin it down to a specific operator. But I know that some of the operators like the individual operators themselves, by reimplementing reduce which is the same as doing as scan and then take last, implementing it in terms of that is going to reduce the size of it probably 90% of that one particular file. So, there's a variety of things like that that have already started and that we're going to continue to do. We didn't do it with every operator that we could have. Some operators are very, very common and consequently we want them to be as optimized as possible. For example, map. You can implement map in terms of ‘merge map' but it would be very slow to do so. It might be smaller but it would be slower. We don't want that. So, there are certain areas we're always going to try to keep fairly a hot path to optimize them as much as possible. But in other spots like reduce which is less common and isn't usually considered to be a performance bottleneck, we can cut some corners. Or ‘to array' or other things like that. CHARLES: Mmhmm. TRACY: And I think another really interesting thing is a lot of people when learning RxJS, they… it's funny because we just gave an RX Workshop course this past weekend and the people that were there just were like, “Oh, we've heard of RxJS. We think it's a cool new thing. We have no plans to implement it in real life but let's just play around with it and let me learn it.” I think as people are starting to learn RxJS, one of the things that gets them really overwhelmed is this whole idea that they're having to learn a completely new language on top of JavaScript or what operators to use. And one of our friends, Brian Troncone who is on the Learning Team, the RxJS Learning Team, he pulled up the top 15 operators that were most commonly searched on his site. And some of them were ‘switch map', ‘merge map', ‘fork join', merge, et cetera. So, you can sort of tell that even though the library has quite a few… it's funny because Ben, I think the last RX Workshop you were using pairs and you had never used it before. BEN: Yeah. TRACY: So, it's always amusing for me how many people can be on the core team but have never implemented RxJS… CHARLES: [Laughs] TRACY: A certain way. BEN: Right. Right, right, right. CHARLES: You had said one of the recent releases was about making it more friendly for functional programming. Is that a subject that we can explore? Because using observables is already pretty FP-like. BEN: What it was before is we had dot chaining. So, you would do ‘dot map' and then call a method and then you get an observable back. And then you'd say ‘dot merge' and then you'd call a method on that, and so on and so forth. Now what you have is kind of a Ramda JS style pipe function that just takes a comma-separated list of other functions that are going to act upon the observable. So, it reads pretty much the same with a little more ceremony around it I guess. But the upside is that you can develop your operators as just higher-order functions. CHARLES: Right. And you don't have to do any monkey-patching of prototypes. BEN: Exactly, exactly. CHARLES: Because actually, okay, I see. This is actually pretty exciting, I think. Because we actually ran into this problem when we were using Redux Observable where we wanted to use some operators that were used by some library but we had to basically make a pull request upstream, or fork the upstream library to include the operators so that we could use them in our application. It was really weird. BEN: Yeah. CHARLES: The reason was because it was extending the observable prototype. BEN: Yeah. And there's so many… and that's one way to add that, is you extend the observable prototype and then you override lift so you return the same type of observable everywhere. And there are so many things that lettable operators solved for us. For example… CHARLES: So, lettable operators. So, that's the word that Tracy used and you just used it. What are lettable operators? BEN: Well, I've been trying to say pipeable and get that going instead of lettable. But basically there's an operator on RxJS that's been there forever called let. And let is an operator and what you do is you give it a function. And the function gives you the source observable and you're expected to return a new observable. And the idea is that you can then write a function elsewhere that you can then compose in as though it were an operator, anywhere you want, along with your other dot-chained operators. And the realization I had a few months ago was, “Well, why don't we just make all operators like this?” And then we can use functional programming to compose them with like a reduce or whatever. And that's exactly what the lettable operators are. And that's why I started calling them lettable operators. And I kind of regret it now, because so many people are saying it and it confuses new people. Because what in the world does lettable even mean? CHARLES: Right. [Laughs] BEN: So, they are pipeable operators or functional operators. But the point is that you have a higher-order function that returns a function of a specific shape. And that function shape is, it's a function that receives an observable and returns an observable, and that's it. So, basically it's a function that transforms an observable into a new observable. That's all an operator. That's all an operator's ever been. It's just this is in a different flavor. CHARLES: Now, I'm curious. Why does it do an observable into an observable and not a stream item into an observable? Because when you're actually chaining these things together, like with a map or with a ‘flat map' or all these things, you're actually getting an individual item and then returning an observable. Well, I guess in this case of a map you're getting an item and returning an item. But like… BEN: Right, but that's not what the entire operation is. So, you've got an operation you're performing whenever you say, if you're to just even dot-chain it, you'd say ‘observable dot map'. And when you say ‘dot map', it returns a new observable. And then you say ‘dot filter' and it returns another new observable. CHARLES: Oh, gotcha, gotcha, gotcha. Okay, yeah, yeah, yeah. Yeah, yeah. BEN: So, this function just embodies that step. CHARLES: I see, I see. And isn't there some special… I feel like there's some proposal for some special JavaScript syntax to make this type of chaining? BEN: Yeah, yeah, the pipeline operator. CHARLES: Okay. BEN: I don't know. I think that's still at stage one. I don't know that it's got a lot of headway. My sources and friends that are in the TC39 seem to think that it doesn't have a lot of headway. But I really think it's important. Because if you look at… the problem is we're using a language where the most common use case is you have to build it, get the size as small as possible because you need to send it over the wire to the browser. And understandably, browsers don't want to implement every possible method they could on say, Array, right? CHARLES: Mmhmm, right. BEN: There's a proposal in for ‘flat map'. They could add zip to Array. They could add all sorts of interesting things to Array just by itself. And that's why Lodash exists, right? CHARLES: Right. BEN: Is because not everything is on Array. And then so, the onus is then put on the community to come up with these solutions and the community has to build libraries that have these constraints in size. And what stinks about that is then you have say, an older version of Lodash where you'd be like, “Okay, well it has 36 different functions in it and I'm only using 3 of them. And I have to ship them all to the browser.” CHARLES: Mmhmm. BEN: And that's not what you want. So, then we have these other solutions around tree-shaking and this and that. And the real thing is what you want is you want to be able to compose things left to right and you want to be able to have these functions that you can use on a particular type in an ad hoc way. And there's been two proposals to try to address this. One was the ‘function bind' operator, CHARLES: Mmhmm. BEN: Which is colon colon. And what that did is it said, “You can use this function as a method, as though it were a method on an object. And we'll make sure that the ‘this' inside that function comes from the instance that's on the left-hand side of colon colon.” CHARLES: Right. BEN: That had a bunch of other problems. Like there's some real debate I guess on how they would tie that down to a specific type. So, that kind of fell dead in the water even though it had made some traction. And then the pipeline operator is different. And then what it says is, “Okay, whatever is on the…” And what it looks like is a pipe and a greater than right next to each other. And whatever's on the left-hand side of that operand gets passed as the first argument to the function on the right-hand side of that operand. CHARLES: Mmhmm. BEN: And so, what that means is for the pipeable operators, instead of having to use a pipe method on observable, you can just say, “instance of observable, pipeline operator and an operator, and then pipeline operator, and then the Rx operator, and then pipeline operator and the Rx operator, and so on.” And it would just be built-in. And the reason I think that JavaScript really needs it is that means that libraries like Lodash can be written in terms of simple functions and shipped piece-meal to the browser exactly as you need them. And people would just use the pipeline operator to use them, instead of having to wrap something in a big object so you can dot-chain things together or come up with your own functional pipe thing like RxJS had to. CHARLES: Right. Because it seems it happens again and again, right? Lodash, RxJS, jQuery. You just see this pattern of chaining, which is, you know… BEN: Yeah, yeah. People want chaining. People want left to right composition. CHARLES: Mmhmm. BEN: And it's problematic in a world where you want to shake off as much unused garbage as possible. And the only way to get dot chaining is by augmenting a prototype. There's all sorts of weird problems that can come with that. And so, the functional programming approach is one method. But then people look at it and they say, “Ooh, yuck. I've got to wrap things in a function named pipe. Wouldn't it be nicer if there was just some syntax to do this?” And yeah, it would be nicer. But I have less control over that. CHARLES: Right. But the other alternative is to have right to left function composition. BEN: Right, yeah. CHARLES: But there's not any special syntax for that, either. BEN: Not very readable. CHARLES: Yeah. BEN: So, you just wrap everything. And the innermost call is the first one and then you wrap it in another function and you wrap that in another function, and so on. Yeah, that's not [inaudible]. But I will say that the pipe function itself is pretty simple. It's basically a function that takes a rest of arguments that are all functions. CHARLES: Mmhmm. BEN: And so, you have this array of functions and you just reduce over it and call them. Well, you return a function. So, it's a higher function. You return a function that takes an argument then you reduce over the functions that came in as arguments and you call each one of them with whatever result was from the previous. CHARLES: Right. Like Tracy mentioned in the pre-show, I'm an aspiring student of functional programming. So, would this be kind of like a monoid here where you're mashing all these functions together? Is your empty value? I'm just going to throw it out there. I don't know if it's true or not, but that's my conjecture. BEN: Yes. Technically, it's a monoid because it wouldn't work unless it was a monoid. Because monoids, I believe the category theory I think for monoid is that monoids can be concatenated because they definitely have an end. CHARLES: Right. BEN: So, you would not be able to reduce over all those functions and build something with that, like that, unless it was a monoid. So yeah, the fact that there's reduction involved is a cue that it's a monoid. CHARLES: Woohoo! Alright. [Laughter] CHARLES: Have you found yourself wanting to apply some of these more “rigorous” formalisms that you find out there in the development of RxJS or is that just really a secondary concern? BEN: It's a secondary concern. It's not something that I like. It's something I think about from time to time, when really, debating any kind of heavy issue, sometimes it's helpful. But when it comes to teaching anybody anything, honestly the Haskell-isms and category theory names, all they do is just confuse people. And if you tell somebody something is a functor, they're like, “What?” And if you just say it's mappable, they're like, “Oh, okay. I can map that.” CHARLES: [Laughs] Right, right. BEN: And then the purists would be like, “But they're not the same thing.” And I would be like, “But the world doesn't care. I'm sorry.” CHARLES: Yeah, yeah. I'm kind of experiencing this debate myself. I'm not quite sure which side I fall on, because on the one hand it is arbitrary. Functor is a weird name. But I wish the concept of mappable existed. It does, but I feel like it would be handy if people… because there's literally five things that are super handy, right? Like mappable, if we could have a name for monoid. But it's like, really, you just need to think in terms of these five constructs for 99% of the stuff that you do. And so, I always wonder, where does that line lie? And how… mappable, is that really more accessible than functor? Or is that only because I was exposed to the concept of mapping for 10 years before I ever heard the F word. BEN: Yes, and yes. I mean, that's… CHARLES: [Laughs] BEN: Things that are more accessible are usually more accessible because of some pre-given knowledge, right? What works in JavaScript probably isn't going to work in Haskell or Scala or something, right? CHARLES: Mmhmm. BEN: If someone's a Java developer, certain idioms might not make sense to them that come from the JavaScript world. CHARLES: Right. But if I was learning like a student, I would think mappable, I'd be thinking like, I would literally be thinking like Google Maps or something like that. I don't know. BEN: Right, right. I mean, look at C#. C#, a mapping function is always going to be called select, right, because that's C#. That's their idiom for the same thing. CHARLES: Select? BEN: Yeah. CHARLES: Really? BEN: Yeah, select. So, they'll… CHARLES: Which in Ruby is like find. BEN: Yeah. there's select and then, what's the other one, ‘select many' or something like that. [Chuckles] BEN: So, that's C#. CHARLES: Oh, like it's select from SQL. Okay. BEN: Yeah, I think that's kind of where it came from because people had link and then they had link to SQL and then they're like, well I want to do this with regular code, with just using some more… less nuanced expressions. So, I want to be able to do method calls and chain those together. And so, you end up with select functions. And I think that that exists even in Rx.NET, although I haven't used Rx.NET. CHARLES: Hmm, okay. ELRICK: So, I know you do a lot of training with Rx. What are some of the concepts that people struggle with initially? TRACY: I think when we're teaching RX Workshop, a lot of the people sort of… I'll even see senior level people struggle with explaining it, is the difference between observables and observers and then wrapping their head around the idea that, “Hey, observables are just functions in JavaScript.” So, they're always thinking observables are going to do something for you. Actually, it's not just in Angular but also in React, but whenever someone's having issues with their Rx applications, it's usually something that they're like nesting observables or they're not subscribing to something or they've sort of hot-messed themselves into a tangle. And I'm sure you've debugged a bunch of this stuff before. The first thing I always ask people is, “Have you subscribed?” Or maybe they're using an Angular… they're using pipes async but they're also calling ‘dot subscribe' on their observable. BEN: Yeah. So, like in Angular they'll do both. Yeah. There's that. I think that, yeah, that relates to the problem of people not understanding that observables are really just functions. I keep saying that over and over again and people really don't seem to take it to heart for whatever reason. [Chuckles] BEN: But you get an observable and when you're chaining all those operators together, you're making another observable or whatever, observables don't do anything until you subscribe to them. They do nothing. CHARLES: Shouldn't they be called like subscribable? BEN: Yes. [Chuckles] BEN: They probably should. But we do hand them an observer. So, you are observing something. But the point being is that they don't do anything at all until you subscribe to them. And in that regard, they're like functions, where functions don't do anything unless you call them. So, what ends up happening with an observable is you subscribe to it. You give it an observer, three callbacks which are then coerced into an observer. And it takes that observer and it hands it to the body of this observable definition and literally has an observer inside of there. And then you basically execute that function synchronously and do things, whatever those things are, to set up some sort of observation. Maybe you spin up a WebSocket and tie into some events on it and call next on the observer to get values out of your observable. The point being that if you subscribe to an observable twice, it's the same thing as calling a function twice. And for some reason, people have a hard time with that. They think, if I subscribe to the observable twice, I've only called the function once. CHARLES: I experienced this confusion. And I remember the first time that that… like, I was playing with observables and the first time I actually discovered that, that it was actually calling my… now what do you call the function that you pass to the constructor that actually does, that calls next or that gets passed the observer? TRACY: [Inaudible] BEN: I like to call it an initialization function or something. But the official name from the TC39 proposal is subscriber function. CHARLES: Subscriber function. So, like… BEN: Yeah. CHARLES: I definitely remember it was one of those [makes explosion sound] mind-blowing moments when I realized when I call my subscribe method, the entire observable got run from the very beginning. But my intuition was that this is an object. It's got some shared state, like it's this quasar that I'm now observing and I'm seeing the flashes of light coming off of it. But it's still the same object. You think of it as having yeah, not as a function. Okay. No one ever described it to me as just a function. But I think I can see it now. ELRICK: Yeah, me neither. CHARLES: But yeah, you think of it in the same way that most people think of objects, as like, “I have this object. I have a reference to it.” Let observable equal new observable. It's a single thing. It's a single identity. And so, that's the thing that I'm observing. It's not that I'm invoking this observable to observe things. And I think that's, yeah, that's a subtle nuance there. I wish I had taken y'all's course, I guess is what I'm saying. ELRICK: Yeah. BEN: Yeah. Well, I've done a few talks on it. CHARLES: [Laughs] BEN: I always try to tell people, “It's just a function. It's just a function.” I think what happens to a lot of people too is there's the fact that it's an object. But I think what it is, is people's familiarity with promises does this. Because promises are always multicast. They are always “hot”. And the reason for this is because they're eager. So, by the time you have a promise, whatever is producing value to the promise has already started. And that means that they're inherently a multicast. CHARLES: Right. BEN: So, people are used to that behavior of, I can ‘then' off of this promise and it always means one thing. And it's like, yeah, because the one thing has nothing to do with the promise. It wasn't [Chuckles] CHARLES: Right. BEN: This promise is just an interface for you to view something that happened in the past, where an observable is more low-level than that and more simple than that. It just states, “I'm a function that you call. I'm going to be able to do anything a function can do. And by the way, you're giving me an observer and I'm going to do some stuff with that too and notify you via this observer that you handed me.” Because of that you could take an observable and close over something that had already started. Say you had a WebSocket that was already running. You could create a new observable and just like any function, close over that, externally create a WebSocket. And then everyone that subscribes to that observable is tying an observer to that same WebSocket. Then you're multicast. Then you're “hot”. ELRICK: [Inaudible] CHARLES: Right. So, I was going to say that's the distinction that Jay was talking about. He was talking about we're going to just talk about… he said at the very beginning, “We're just going to talk about hot observable.” ELRICK: Yup. CHARLES: But even a hot observable is still theoretically evaluating every single time you subscribe. You're getting a new observable. You're evaluating that observable afresh each time. It just so happens that in the lexical scope of that observable subscriber function, there is this WebSocket? BEN: Yeah. So, it's the same thing. Imagine you wrote a function that when you called it created a new WebSocket and then… say, you wrote a new function that you gave an observer object to, right? An observer object has next, error, and complete. And in that function, when you called it, it created a new WebSocket and then it tied the ‘on message' and ‘on close' and whatever to your observer's next method and your observer's error message and so on. When you call that function, you would expect a new WebSocket to be created every single time. Now, let's just say alternately you create a WebSocket and then you write a new function that that function closes over that WebSocket. So, you reference the WebSocket that you externally created inside of your function. When you call that function, it's not going to create a new WebSocket every time. It's just closing over it, right? So, even though they both are basically doing the same thing, now the latter one of those two things is basically a hot observable and the former is a cold observable. Because one is multicast which is, “I'm sharing this one WebSocket with everybody,” and the other one is unicast which is, “I am going to create a new WebSocket for each person that calls me.” And that's the [inaudible] people have a hard time with. CHARLES: Right. But really, it's just a matter of scope. BEN: Yeah. The thing people have a hard time with, with observables, is not realizing that they're actually just functions. CHARLES: Yeah. I just think that maybe… see, when I hear things like multicast and unicast, that makes me think of shared state, whereas when you say it's just a matter of scope, well then I'm thinking more in terms of it being just a function. It just happens that this WebSocket was already [scoped]. BEN: Well, shared state is a matter of scope, right? CHARLES: Yes, it is. It is. Oh, sorry. Shared state associated with some object identity, right? BEN: Right. CHARLES: But again, again, it's just preconceptions, really. It's just me thinking that I've had to manage lists of listeners and have multicast observers and single-cast observers and having to manage those lists and call notify on all of them. And that's really not what's happening at all. BEN: Yeah. Well, I guess the real point is observables can have shared state or they could not have shared state. I think the most common version and the most composable version of them, they do not have any shared state. It's just one of those things where just like a function can have shared state or it could be pure, right? There's nothing wrong with either one of those two uses of a function. And there's nothing wrong with either one of those two uses of Observable. So, honest to god, that is the biggest stumbling block I think that I see people have. That and if I had to characterize it I would say fear and loathing over the number of operators. People are like… CHARLES: [Chuckles] BEN: And they really think because everyone's used to dealing with these frameworks where there's an idiomatic way to do everything, they think there's going to be an RxJS idiomatic way to do things. And that's just patently false. That's like saying there's an idiomatic way to use functions. There's not. Use it however it works. The end. It's not… CHARLES: Mmhmm, mmhmm. BEN: You don't have to use every operator in a specific way. You can use it however works for you and it's fine. ELRICK: I see that you guys are doing some fantastic work with your documentation. Was that part of RxJS 2.0 docs? TRACY: I was trying to inspire people to take on the docs initiative because I think when I was starting to learn RxJS I would get really frustrated with the docs. BEN: Yeah. TRACY: I think the docs are greatly documented but at the same time if you're not a senior developer who understands Rx already, then it's not really helpful. Because it provides more of a reference point that the guys can go back and look at, or girls. So anyways, after many attempts of trying to get somebody to lead the project I just decided to lead the project myself. [Laughter] TRACY: And try to get… the community is interesting because I think because the docs can be sometimes confusing… Brian Troncone created LearnRxJS.io. There's these other visualization projects like RxMarbles, RxViz, et cetera. And we just needed to stick everybody together. So, it's been a project that I think has been going on for the past two months or so. We have… it's just an Angular app so it's probably one of the most easiest projects to contribute to. I remember the first time I tried to contribute to the Ember docs. It literally took me an hour to sit there with a learning team, Ember Learning Team member and… actually, maybe it was two hours, just to figure out how the heck… like all the things I had to download to get my environment set up so that I could actually even contribute to the darn documentation. But with the Rx, the current RxJS docs right now is just an Angular app. You can pull it down. It's really easy. We even have people who are just working on accessibility, which is super cool, right? So, it's a very friendly place for beginners. BEN: I'm super pleased with all the people that have been working on that. Brian and everybody, especially on the accessibility front. Jen Luker [inaudible] came in and voluntarily… she's like the stopgap for all accessibility to make sure everything is accessible before we release. So, that's pretty exciting. TRACY: Yeah. ELRICK: Mmhmm. TRACY: So funny because when me and Jen started talking, she was talking about something and then I was like, “Oh my god, I'm so excited about the docs.” She's like, “I'm so excited, too! But I don't really know why I'm excited. But you're excited, so I'm excited. Why are you excited?” [Laughter] TRACY: I was like, “I don't know. But I'm excited, too!” [Chuckles] TRACY: And then all of a sudden we have accessibility. [Laughs] ELRICK: Mmhmm. Yeah, I saw some amazing screenshots. Has the new docs, have they been pushed up to the URL yet? TRACY: Nah, they are about to. We were… we want to do one more accessibility run-through before we publish it. And then we're going to document. We want to document the top 15 most viewed operators. But we should probably see that in the next two weeks or so, that the new docs will be… I mean, it'll say “Beta, beta, beta” all over everything. But actually also, some of our friends, [Dmitri] from [Valas] Software, he is working on the translation portion to make it really easy for people to translate the docs. CHARLES: Ah. TRACY: So, a lot of that came from the inspiration from the Vue.js docs. we're taking the versioning examples that Ember has done with their docs as inspiration to make sure that our versioning is really great. So, it's great that we can lend upon all the other amazing ideas in the industry. ELRICK: Oh, yeah. CHARLES: Yeah, it's fantastic. I can't wait to see them. ELRICK: Yeah, me neither. The screenshots look amazing. I was like, “Wow. These are some fabulous documentation that's going to be coming out.” I can't wait. TRACY: Yeah. Thank you. CHARLES: Setting the bar. ELRICK: Really high. [Laughter] CHARLES: Actually, I'm curious. Because observables are so low-level, is there some use of them that… what's the use of them that you found most surprising? Or, “Whoa, this was a crazy hack.” BEN: The weirdest use of observables, there's been quite a few odd ones. One of the ones that I did one time that is maybe in RxJS's wheelhouse, it was just that RxJS already existed. So, I didn't want to pull in another transducer library, was using RxJS as a transducer. Basically… in Netflix we had a situation where we had these huge, huge arrays of very large objects. And if you try to take something like that and then map it and then filter it and then map it and then filter it, we're using Array map and filter, what ends up happening is you create all sorts of intermediary arrays in-memory. And then garbage collection has to come through and clean that up. And that locks your thread. And over time, we were experiencing slowness with this app. And it would just build up until eventually it ground to a halt. And I used RxJS because it was an available tool there to wrap these arrays in an observable and then perform operations on them step-by-step, the same map, filter, and so on. But when you do that, it doesn't create intermediary arrays because it passes each value along step to step instead of producing an entire array and then doing another step and producing an entire array, and so on. So… CHARLES: So, will you just… BEN: It saved garbage collection and it increased the performance of the app. But that's just in an extreme case. I would never do that with just regular arrays. If anything, it was because it was huge, huge arrays of very large objects. CHARLES: So, you would create an observable our of the array and then just feed each element into the observable one at a time? BEN: Well, no. If you say ‘observable from' and you give it an array, that's basically what it does. CHARLES: Okay. BEN: It loops over the array and nexts those values out of the array synchronously. CHARLES: I see, I see. BEN: So, it's like having a for loop and then inside of that for loop saying, “Apply the map. Apply the filter,” whatever, to each value as they're going through. But when you look at it, if you had array map, filter, reduce, it's literally just taking the first step and saying ‘observable from' and wrapping that array and then the rest of it's still the same. CHARLES: Right. Yeah. No, that's really cool. BEN: That was a weirder use of it. I've heard tell of other things where people used observables to do audio synchronization, which is pretty interesting. Because you have to be very precise with audio synchronization. So, hooking into some of the Web Audio APIs and that sort of thing. That's pretty interesting. The WebSocket multiplexing is something I did at Netflix that's a little bit avant-garde for observable use because you essentially have an observable that is your WebSocket. And then you create another observable that closes over that observable and sends messages over the WebSocket for what you're subscribed to and not subscribed to. And it enables you to very easily retry connections and these sorts of things. I did a whole talk on that. That one's pretty weird. CHARLES: Yeah. Man, I [inaudible] to see that. BEN: But in the general use case, you click a button, you make an AJAX request, and then you get that back and maybe you make another AJAX request. Or like drag and drop and these sorts of things where you're coordinating multiple events together, is the general use case. The non-weird use case for RxJS. Tracy does weird stuff with RxJS though. [Laughter] CHARLES: Yeah, what's some weird uses of RxJS? TRACY: I think my favorite thing to do right now is to figure out how many different IoT-related things I can make work with RxJS. So, how many random things can I connect to an application using that? BEN: Tracy's projects are the best. They're so good. [Laughter] TRACY: Well, Ben and I created an application where you can take pictures of things using the Google Image API and it'll spit back a set of puns for you. So, you take a picture of a banana, it'll give you banana puns. Or you can talk to it using the speech recognition API. My latest thing is I really want to figure out how to… I haven't figured out if Bluetooth Low Energy is actually enabled on Google Home Minis. But I want to get my Google Home Mini to say ‘booty'. [Inaudible] [Laughter] CHARLES: RxJS to the rescue. [Laughter] BEN: Oh, there was, you remember Ng-Cruise. We did Ng-Cruise and on there, Alex Castillo brought… TRACY: Oh, that was so cool. BEN: All sorts of interesting… you could read your brain waves. Or there was another one that was, what is it, the Microsoft, that band put around your wrist that would sense what direction your arm was in and whether or not your hand was flexed. And people… TRACY: Yeah, so you could flip through things. BEN: Yeah. And people were using reactive programming with that to do things like grab a ball on the screen. Or you could concentrate on an image and see if it went blurry or not. ELRICK: Well, for like, Minority Report. BEN: Oh, yeah, yeah. Literally, watching a machine read your mind with observables. That was pretty cool. That's got to be the weirdest. TRACY: Yeah, or we had somebody play the piano while they were wearing one of the brainwave… it's called the OpenBCI project is what it is. And what you can do is you can actually get the instructions to 3D print out your own headset and then buy the technology that allows you to read brain waves. And so with that, it's like… I mean, it was really awesome to watch her play the piano and just see how her brain waves were going super crazy. But there's also these really cool… I don't know if you guys have heard of Jewelbots, but they're these programmable friendship bracelets that are just little Arduino devices that light up. I have two of them. I haven't even opened them. CHARLES: [Laughs] TRACY: I've been waiting to play with them with you. I don't know what we're going to do, but I just want to send you lights. Flashing lights. [Laughter] TRACY: Morse code ask you questions about RxJS while you're working. [Laughter] CHARLES: Yeah. Critical bug. Toot-toot-toot-too-too-too-too-toot-toot. [Laughter] CHARLES: RxJS Justice League. TRACY: That would actually be really fun. [Laughter] TRACY: That would be really fun. I actually really want to do that. But… CHARLES: I'm sure the next time we talk, you will have. TRACY: [Laughs] Yes. Yes, yes, yes, I know. I know. we'll do it soon. We just need to find some time while we're not going crazy with conferences and stuff like that. CHARLES: So, before we head out, is there any upcoming events, talks, releases, anything that we ought to be, we or the listeners, ought to be aware of? TRACY: Yeah, so one of the things is that Ben and I this weekend actually just recorded the latest version of RX Workshop. So, if you want to learn all about the latest, latest, newest new, you can go ahead and take that course. We go through a lot of different things like multiplex WebSockets, building an application. Everywhere from the fundamentals to the more real world implementations of RxJS. BEN: Yeah. Even in the fundamentals area, we've had friends of ours that are definitely seasoned Rx veterans come to the workshop. And most of them ask the most questions while talking about the fundamentals. Because I tend to dig into, either deep into the internals or into the why's and how's thing. Why and how things work. Even when it comes to how to subscribe to an observable. Deep detailed information about what happens if you don't provide an error handler and certain cases and how that's going to change in upcoming versions, and why that's changing in upcoming versions, and what the TC39's thoughts are on that, and so on and so forth. So, I try to get into some deeper stuff and we have a lot of fun. And we tend to be a little goofier at the workshops from time to time than we were in this podcast. Tracy and I get silly when we're together. TRACY: It's very true. [Laughter] TRACY: But I think also, soon I think there are people that are going to be championing an Observable proposal on what [inaudible]. So, aside from the TC39 Observable proposal that's currently still at stage one, I don't know Ben if you want to talk a little bit about that. BEN: Oh, yeah. So, I've been involved in conversations with folks from Netflix and Google as well, Chrome team and TC39 members, about getting the WHATWG, the ‘what wig', they're a standards body similar to W3C, to include observables as part of the DOM. The post has not been made yet. But the post is going to be made soon as long as everybody's okay with it. And what it boils down to is the idea of using observables as part of event targets. An event target is the API we're all familiar with for ‘add event listener', ‘remove event listener'. So, pretty much anywhere you'd see those methods, there might also someday be an on method that would return an observable of events. So, it's really, really interesting thing because it would bring at least the primitives of reactive programming to the browser. And at the very least it would provide maybe a nicer API for people to subscribe to events coming from different DOM elements. Because ‘add event listener' and ‘remove event listener' are a little unergonomic at times, right? CHARLES: Yeah. They're the worst. BEN: Yeah. CHARLES: That's a very polite way of putting it. BEN: [Chuckles] So, that's one thing that's coming down the pipe. Other things, RxJS 6 is in the works. We recently tied off 5.5 in a stable branch. And master is now our alpha that we're working on. So, there's going to be a lot of refactoring and changes there, trying to make the library smaller and smaller. And trying to eliminate some of the footprints that maybe people had in previous versions. So, moving things around so people aren't importing stuff that were meant to be implementation details, reducing the size of the library, trying to eliminate some bloat, that sort of thing. I'm pretty excited about that. But that's going to be in alpha ongoing for a while. And then hopefully we'll be able to move into beta mid first quarter next year. And then when that'll be out of beta, who knows? It all depends on how well people like the beta and the alpha, right? CHARLES: Alright. Well, so if folks do want to follow up with y'all either in regards to the course or to upcoming releases or any of the other great stuff that's coming along, how would they get in touch with y'all? TRACY: You can find me on Twitter @ladyleet. But Ben is @BenLesh. RX Workshop is RXWorkshop.com. I think in January we're going to be doing state of JavaScript under This Dot Media again. So, that's where all the core contributors of different frameworks and libraries come together. So, we'll definitely be giving a state of RxJS at that time. And next year also Contributor Days will be happening. So, if you go to ContributorDays.com you can see the previous RxJS Contributor Days and figure out how to get involved. So, we're always open and happy and willing to teach everybody. And again, if you want to get involved it doesn't matter whether you have little experience or lots of experience. We are always willing to show you how you can play. BEN: Yeah. You can always find us on Twitter. And don't forget that if you don't find Tracy or I on Twitter, you can always message Jay Phelps on Twitter. That's important. @_JayPhelps. Really. TRACY: Yeah. [Laughter] BEN: You'll find us. CHARLES: [Chuckles] Look for Jay in the show notes. [Laughter] CHARLES: Alright. Well, thank you so much for all the stuff that y'all do, code and otherwise. And thank you so much Ben, thank you so much Tracy, for coming on the show. BEN: Thank you. CHARLES: Bye Elrick and bye everybody. If you want to reach out to us, you can always get in touch with us at @TheFrontside or send us an email at contact@frontside.io. Alright everybody, we'll see you next week.

Embedded
62: Costs a Penny to Go to the Bathroom (Repeat)

Embedded

Play Episode Listen Later Oct 19, 2017 65:55


Josh Bleecher Snyder (@offbymany) joined us to talk about PayPal's Beacon, being acquired, the Go programming language, BTLE, computer vision, and working at a large company after founding small ones. Bluetooth Low Energy: A Developer's Handbook by Robin Heydon TI CC2540 BTLE module Learning OpenCV: Computer Vision by Gary Bradski and Adrian Kaehler Gatt is a Go package for building Bluetooth Low Energy peripherals (video description by Josh from GopherCon 2014) Card.io Machine learning's Theano Eigen Library for matrix math

Mister Beacon
Bluetooth Mesh – Szymon Slupik

Mister Beacon

Play Episode Listen Later Oct 4, 2017 29:46


Bluetooth Mesh is perhaps the biggest thing to happen to IoT since Bluetooth Low Energy sparked the revolution of beacon technology, wearables and thousands of other connected products. Szymon Slupik, CTO of Silvair and Chair of the Bluetooth Mesh Working Group at Bluetooth SIG explains what the release of this new standard means, what mesh is, why it was necessary and the applications that it enables. See acast.com/privacy for privacy and opt-out information.

All Angular Podcasts by Devchat.tv
AiA 149: Angular, Web Bluetooth, and IoT with Uri Shaked

All Angular Podcasts by Devchat.tv

Play Episode Listen Later Jul 25, 2017 41:52


AiA 149: Angular, Web Bluetooth, and IoT with Uri Shaked In this episode, Shai Reznik, Ward Bell, Lukas Ruebbelke, and Charles Max Wood talk to Uri Shaked about using Angular with Web Bluetooth and IoT. [00:02:27] – Introduction to Uri Shaked Uri is an Angular GDE from Israel. His Angular Story episode is here. [00:03:21] – Introduction to Hardware with Angular Angular allows you to build web applications that scale quickly. For hardware devices, you need some kind of interface. Instead of a button, you have a mobile app or web application. This is one place where Angular comes into play. Building control panels, etc. You can do this with pure JavaScript or native mobile apps as well. [00:05:20] – Does it run on the IoT device? or on the web? It can do both. You can run Angular on a webserver on a Raspberry Pi or you can use Web Bluetooth to connect to the IoT device. [00:06:45] – What are the advantages of using web technologies? There's no hardware setup. And using Angular Material or Ionic, the UI looks right without spending a ton of time. RxJS allows you to gather sensor data from accelerometers, heart rate monitors, etc. connected via bluetooth. [00:09:20] – The physical web An IoT device that broadcasts its own URL. You can then interface with the device simply by scanning for and browsing to the device. One example is walking into a room, scanning, and then controlling the lights without installing an app. [00:10:34] – Security Security is optional on Bluetooth Low Energy. Bluetooth devices used to pair using pin codes and they got set to 0000 or 1234 by default. So now BLE devices don't require it. Some devices add security on top of bluetooth or use the pairing mechanism. Security is an ongoing concern with IoT in general. The devices that Uri has played with don't implement security. Uri actually had an audience member hack into the smart bulb he was using during a demo. [00:15:08] – How do you manage your connection to the device through Angular? Uri uses async/await to manage the promises based functions that allow you to connect to the device. He wraps all of this in a service. The bluetooth terminology used for the functions that manage the device are also called services. Don't get them confused. [00:16:48] – What's the most useful thing you can do with this? Connecting to an EEG headset that measures brainwaves. Uri wants to allow headset owners to perform EEG experiments in the browser. Otherwise, they have to set up a bluetooth dongle and install python and some libraries to make it work. He'd like to make it simple enough to browse to a webpage and click "Connect." He'd like to show the user pictures and then guess which one you're looking at. [00:19:58] – What is the most useless thing you've build with this? Uri 3D-printed a robot and installed an accelerometer into it and connected it to a WebGL based system to show the orientation of the robot. [00:22:32] – How do you get started? You need a browser and a bluetooth device. A smart lightbulb or a robot. You can use your smartphone to simulate a bluetooth device. Uri wrote an Android app that simulates a smart light bulb. Then you can connect the app to your computer's browser and control the smart bulb app from your computer. [00:25:00] – Ward has a proposal for Uri Connect lights in your t-shirt to an arduino device and control it from your phone.  Web Bluetooth is much simpler than native APIs for Android or iOS. [00:29:45] – Commercial applications Physical web applications and connecting to remote tools and sensors. Smart counters for your electric meter. Jen Looper's blog post on web bluetooth and beacons. The Louvre uses beacons. [00:33:00] – The physical web Uri ran a beacon that broadcast his personal site. He took his trash out and one of his neighbors kept getting a notification about his website on his phone. Picks Lukas Ruebbelke Antifragile Chef's Table on Netflix Shai Reznik 59 Seconds Volunteering - Ari Lerner teaching prisoners to code Ward Bell The "other" Uri Shaked Smart Coffee Machine YouTube video on telling if someone is lying Uri Shaked Ward's yet-to-be-made shirt AngularUP Conference WebAssembly Charles Max Wood Data Skeptic podcast Links @urishaked urish.org

Adventures in Angular
AiA 149: Angular, Web Bluetooth, and IoT with Uri Shaked

Adventures in Angular

Play Episode Listen Later Jul 25, 2017 41:52


AiA 149: Angular, Web Bluetooth, and IoT with Uri Shaked In this episode, Shai Reznik, Ward Bell, Lukas Ruebbelke, and Charles Max Wood talk to Uri Shaked about using Angular with Web Bluetooth and IoT. [00:02:27] – Introduction to Uri Shaked Uri is an Angular GDE from Israel. His Angular Story episode is here. [00:03:21] – Introduction to Hardware with Angular Angular allows you to build web applications that scale quickly. For hardware devices, you need some kind of interface. Instead of a button, you have a mobile app or web application. This is one place where Angular comes into play. Building control panels, etc. You can do this with pure JavaScript or native mobile apps as well. [00:05:20] – Does it run on the IoT device? or on the web? It can do both. You can run Angular on a webserver on a Raspberry Pi or you can use Web Bluetooth to connect to the IoT device. [00:06:45] – What are the advantages of using web technologies? There's no hardware setup. And using Angular Material or Ionic, the UI looks right without spending a ton of time. RxJS allows you to gather sensor data from accelerometers, heart rate monitors, etc. connected via bluetooth. [00:09:20] – The physical web An IoT device that broadcasts its own URL. You can then interface with the device simply by scanning for and browsing to the device. One example is walking into a room, scanning, and then controlling the lights without installing an app. [00:10:34] – Security Security is optional on Bluetooth Low Energy. Bluetooth devices used to pair using pin codes and they got set to 0000 or 1234 by default. So now BLE devices don't require it. Some devices add security on top of bluetooth or use the pairing mechanism. Security is an ongoing concern with IoT in general. The devices that Uri has played with don't implement security. Uri actually had an audience member hack into the smart bulb he was using during a demo. [00:15:08] – How do you manage your connection to the device through Angular? Uri uses async/await to manage the promises based functions that allow you to connect to the device. He wraps all of this in a service. The bluetooth terminology used for the functions that manage the device are also called services. Don't get them confused. [00:16:48] – What's the most useful thing you can do with this? Connecting to an EEG headset that measures brainwaves. Uri wants to allow headset owners to perform EEG experiments in the browser. Otherwise, they have to set up a bluetooth dongle and install python and some libraries to make it work. He'd like to make it simple enough to browse to a webpage and click "Connect." He'd like to show the user pictures and then guess which one you're looking at. [00:19:58] – What is the most useless thing you've build with this? Uri 3D-printed a robot and installed an accelerometer into it and connected it to a WebGL based system to show the orientation of the robot. [00:22:32] – How do you get started? You need a browser and a bluetooth device. A smart lightbulb or a robot. You can use your smartphone to simulate a bluetooth device. Uri wrote an Android app that simulates a smart light bulb. Then you can connect the app to your computer's browser and control the smart bulb app from your computer. [00:25:00] – Ward has a proposal for Uri Connect lights in your t-shirt to an arduino device and control it from your phone.  Web Bluetooth is much simpler than native APIs for Android or iOS. [00:29:45] – Commercial applications Physical web applications and connecting to remote tools and sensors. Smart counters for your electric meter. Jen Looper's blog post on web bluetooth and beacons. The Louvre uses beacons. [00:33:00] – The physical web Uri ran a beacon that broadcast his personal site. He took his trash out and one of his neighbors kept getting a notification about his website on his phone. Picks Lukas Ruebbelke Antifragile Chef's Table on Netflix Shai Reznik 59 Seconds Volunteering - Ari Lerner teaching prisoners to code Ward Bell The "other" Uri Shaked Smart Coffee Machine YouTube video on telling if someone is lying Uri Shaked Ward's yet-to-be-made shirt AngularUP Conference WebAssembly Charles Max Wood Data Skeptic podcast Links @urishaked urish.org

Devchat.tv Master Feed
AiA 149: Angular, Web Bluetooth, and IoT with Uri Shaked

Devchat.tv Master Feed

Play Episode Listen Later Jul 25, 2017 41:52


AiA 149: Angular, Web Bluetooth, and IoT with Uri Shaked In this episode, Shai Reznik, Ward Bell, Lukas Ruebbelke, and Charles Max Wood talk to Uri Shaked about using Angular with Web Bluetooth and IoT. [00:02:27] – Introduction to Uri Shaked Uri is an Angular GDE from Israel. His Angular Story episode is here. [00:03:21] – Introduction to Hardware with Angular Angular allows you to build web applications that scale quickly. For hardware devices, you need some kind of interface. Instead of a button, you have a mobile app or web application. This is one place where Angular comes into play. Building control panels, etc. You can do this with pure JavaScript or native mobile apps as well. [00:05:20] – Does it run on the IoT device? or on the web? It can do both. You can run Angular on a webserver on a Raspberry Pi or you can use Web Bluetooth to connect to the IoT device. [00:06:45] – What are the advantages of using web technologies? There's no hardware setup. And using Angular Material or Ionic, the UI looks right without spending a ton of time. RxJS allows you to gather sensor data from accelerometers, heart rate monitors, etc. connected via bluetooth. [00:09:20] – The physical web An IoT device that broadcasts its own URL. You can then interface with the device simply by scanning for and browsing to the device. One example is walking into a room, scanning, and then controlling the lights without installing an app. [00:10:34] – Security Security is optional on Bluetooth Low Energy. Bluetooth devices used to pair using pin codes and they got set to 0000 or 1234 by default. So now BLE devices don't require it. Some devices add security on top of bluetooth or use the pairing mechanism. Security is an ongoing concern with IoT in general. The devices that Uri has played with don't implement security. Uri actually had an audience member hack into the smart bulb he was using during a demo. [00:15:08] – How do you manage your connection to the device through Angular? Uri uses async/await to manage the promises based functions that allow you to connect to the device. He wraps all of this in a service. The bluetooth terminology used for the functions that manage the device are also called services. Don't get them confused. [00:16:48] – What's the most useful thing you can do with this? Connecting to an EEG headset that measures brainwaves. Uri wants to allow headset owners to perform EEG experiments in the browser. Otherwise, they have to set up a bluetooth dongle and install python and some libraries to make it work. He'd like to make it simple enough to browse to a webpage and click "Connect." He'd like to show the user pictures and then guess which one you're looking at. [00:19:58] – What is the most useless thing you've build with this? Uri 3D-printed a robot and installed an accelerometer into it and connected it to a WebGL based system to show the orientation of the robot. [00:22:32] – How do you get started? You need a browser and a bluetooth device. A smart lightbulb or a robot. You can use your smartphone to simulate a bluetooth device. Uri wrote an Android app that simulates a smart light bulb. Then you can connect the app to your computer's browser and control the smart bulb app from your computer. [00:25:00] – Ward has a proposal for Uri Connect lights in your t-shirt to an arduino device and control it from your phone.  Web Bluetooth is much simpler than native APIs for Android or iOS. [00:29:45] – Commercial applications Physical web applications and connecting to remote tools and sensors. Smart counters for your electric meter. Jen Looper's blog post on web bluetooth and beacons. The Louvre uses beacons. [00:33:00] – The physical web Uri ran a beacon that broadcast his personal site. He took his trash out and one of his neighbors kept getting a notification about his website on his phone. Picks Lukas Ruebbelke Antifragile Chef's Table on Netflix Shai Reznik 59 Seconds Volunteering - Ari Lerner teaching prisoners to code Ward Bell The "other" Uri Shaked Smart Coffee Machine YouTube video on telling if someone is lying Uri Shaked Ward's yet-to-be-made shirt AngularUP Conference WebAssembly Charles Max Wood Data Skeptic podcast Links @urishaked urish.org

Runtime
41: Bluetooth Basics

Runtime

Play Episode Listen Later May 4, 2017 23:04


This week we talk about how to get started with Bluetooth Low Energy with an Arduino and Core Bluetooth on iOS. Get in touch with us in the Spec Slack or on Twitter at @runtimefm. Links Arduino Core Bluetooth documentation Arduino 101 on Amazon ButtonLED sample code Hello Bluetooth blog post GATT Service

Search Talk Live Search Engine Marketing & SEO Podcast
Hyperlocal Marketing with Bluetooth Low-Energy Beacons with Casey Markee of MediaWyse

Search Talk Live Search Engine Marketing & SEO Podcast

Play Episode Listen Later Feb 28, 2017 60:07


Mobile use has skyrocketed—and with it, the growth of “micro-moments”. These real-time, intent-rich moments happen when buying decisions are made based on preferences shaped by retailers. Influencing consumer behavior in a glance has never been more important, and has never been easier thanks to the continual reshaping of retail marketing by beacons.

Search Talk Live Search Engine Marketing & SEO Podcast
Hyperlocal Marketing with Bluetooth Low-Energy Beacons with Casey Markee of MediaWyse

Search Talk Live Search Engine Marketing & SEO Podcast

Play Episode Listen Later Feb 28, 2017 60:07


Mobile use has skyrocketed—and with it, the growth of “micro-moments”. These real-time, intent-rich moments happen when buying decisions are made based on preferences shaped by retailers. Influencing consumer behavior in a glance has never been more important, and has never been easier thanks to the continual reshaping of retail marketing by beacons.

Paul's Security Weekly (Video-Only)
Security Weekly #474 - Tech Segment: Bluetooth Scanning Using The PwnPad 4 & Blue Hydra

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Jul 23, 2016 20:40


While many are focused on securing the network, it could be the devices within your location, not even on the network, that cause security issues. In this segment we talk about a new, open-source, Bluetooth hacking tool from Pwnie Express called "Blue Hydra". It has the unique capability to scan for Bluetooth and Bluetooth Low Energy all at the same time. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode474#Tech_Segment:_Bluetooth_Scanning_Using_The_PwnPad_4_.26_Blue_Hydra

Paul's Security Weekly TV
Security Weekly #474 - Tech Segment: Bluetooth Scanning Using The PwnPad 4 & Blue Hydra

Paul's Security Weekly TV

Play Episode Listen Later Jul 22, 2016 20:40


While many are focused on securing the network, it could be the devices within your location, not even on the network, that cause security issues. In this segment we talk about a new, open-source, Bluetooth hacking tool from Pwnie Express called "Blue Hydra". It has the unique capability to scan for Bluetooth and Bluetooth Low Energy all at the same time.   Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode474#Tech_Segment:_Bluetooth_Scanning_Using_The_PwnPad_4_.26_Blue_Hydra

Devchat.tv Master Feed
160 iPS IoT with Evan Stone

Devchat.tv Master Feed

Play Episode Listen Later Jul 7, 2016 58:15


01:45 - Evan Stone Introduction Twitter GitHub Blog Cloud City 02:38 - IoT (Internet of Things); iOS & IoT iBeacon 06:48 - Panelist IoT Device Experiences Andrew & Caleb: Wired In Layne: Nest Thermostat Amazon Echo Rachio Smart WiFi Sprinkler Controller Caleb: RFduino Chuck: Ring Wi-Fi Enabled Video Doorbell 14:00 - Near Field Communication Core Bluetooth Core Location Bluetooth Low Energy 17:06 - Getting Started: Devices The Bean LightBlue Bean+ Arduino BLE Shield The Particle Photon    iBeacons Estimote Beacons Gimbal Pop Up Labs 21:35 - Starting Projects Tile iPhreaks Episode #127: iBeacons with Azam Sharp Samsonite Track&Go™ Suitcase 24:19 - Devices Connected to the Internet iPhreaks Show Episode #158: Internet of Things (IoT) with Olivier Bloch (from Microsoft Build Conference 2016) 28:19 - Threshold of Devices A.I. (Artificial Intelligence) Apple HomeKit 33:05 - Security Security in the Internet of Things TechCrunch - Why IoT Security Is So Critical 38:57 - Core Bluetooth Work Processes Texas Instruments Sensor Tags   Picks PMKVObserver (Andrew) Electric Imp (Andrew) iPhreaks Episode #030: Building Hardware for iPhones with Joel  (Andrew) iPhreaks Episode #043: Core Location & iBeacons with Josh Johnson (Andrew) iPhreaks Episode #059: Device-Connected Apps with Carl Brown (Andrew) iPhreaks Episode #127: iBeacons with Azam Sharp (Andrew) iPhreaks Episode #107: Andrew Talks Arduino (Andrew) Yoav Schwartz: Practical CoreBluetooth for Peripherals (Andrew) BTLE Central Peripheral Transfer (Jaim) We put a chip in it! (Jaim) @internetofshit (Jaim) PaintCode (Caleb) Handy BLE (Caleb) Rachio Smart WiFi Sprinkler Controller (Layne) Motion Stills (Layne) Procrastinate on Purpose by Rory Vaden (Chuck) Mophie Battery Cases (Chuck) Adafruit Learning System (Evan) BeaconsInSpace (Evan) Adam Savage's Maker Faire 2016 Talk (Evan)

The iPhreaks Show
160 iPS IoT with Evan Stone

The iPhreaks Show

Play Episode Listen Later Jul 7, 2016 58:15


01:45 - Evan Stone Introduction Twitter GitHub Blog Cloud City 02:38 - IoT (Internet of Things); iOS & IoT iBeacon 06:48 - Panelist IoT Device Experiences Andrew & Caleb: Wired In Layne: Nest Thermostat Amazon Echo Rachio Smart WiFi Sprinkler Controller Caleb: RFduino Chuck: Ring Wi-Fi Enabled Video Doorbell 14:00 - Near Field Communication Core Bluetooth Core Location Bluetooth Low Energy 17:06 - Getting Started: Devices The Bean LightBlue Bean+ Arduino BLE Shield The Particle Photon    iBeacons Estimote Beacons Gimbal Pop Up Labs 21:35 - Starting Projects Tile iPhreaks Episode #127: iBeacons with Azam Sharp Samsonite Track&Go™ Suitcase 24:19 - Devices Connected to the Internet iPhreaks Show Episode #158: Internet of Things (IoT) with Olivier Bloch (from Microsoft Build Conference 2016) 28:19 - Threshold of Devices A.I. (Artificial Intelligence) Apple HomeKit 33:05 - Security Security in the Internet of Things TechCrunch - Why IoT Security Is So Critical 38:57 - Core Bluetooth Work Processes Texas Instruments Sensor Tags   Picks PMKVObserver (Andrew) Electric Imp (Andrew) iPhreaks Episode #030: Building Hardware for iPhones with Joel  (Andrew) iPhreaks Episode #043: Core Location & iBeacons with Josh Johnson (Andrew) iPhreaks Episode #059: Device-Connected Apps with Carl Brown (Andrew) iPhreaks Episode #127: iBeacons with Azam Sharp (Andrew) iPhreaks Episode #107: Andrew Talks Arduino (Andrew) Yoav Schwartz: Practical CoreBluetooth for Peripherals (Andrew) BTLE Central Peripheral Transfer (Jaim) We put a chip in it! (Jaim) @internetofshit (Jaim) PaintCode (Caleb) Handy BLE (Caleb) Rachio Smart WiFi Sprinkler Controller (Layne) Motion Stills (Layne) Procrastinate on Purpose by Rory Vaden (Chuck) Mophie Battery Cases (Chuck) Adafruit Learning System (Evan) BeaconsInSpace (Evan) Adam Savage's Maker Faire 2016 Talk (Evan)

Collin's Lab
Collin's Lab - Bluetooth Low Energy

Collin's Lab

Play Episode Listen Later Mar 10, 2016 4:58


Get to know Bluetooth Low Energy - the next generation of Bluetooth. While BLE doesn't fully replace Classic Bluetooth quite yet, it excels at periodic, low bandwidth applications. Join Collin and learn a variety of different ways you can use it to add wireless communication to your project. ----------------------------------------- Visit the Adafruit shop online - http://www.adafruit.com Subscribe to Adafruit on YouTube: http://adafru.it/subscribe Join our weekly Show & Tell on G+ Hangouts On Air: http://adafru.it/showtell Watch our latest project videos: http://adafru.it/latest New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ Music by bartlebeats: http://soundcloud.com/bartlebeats -----------------------------------------

music bluetooth adafruit bluetooth low energy g hangouts on air adafruit learning system
Chariot Developer News
DevNews #101 – Return of the tin foil hat brigade

Chariot Developer News

Play Episode Listen Later Oct 10, 2015 25:29


It’s the long-awaited return of DevNews! Today, Jeff Labonski and I talk all things tech in our first ever live-streaming YouTube show. Upcoming Events November 10th – Don Coleman’s Bluetooth Low Energy workshop. Walk away with your own Arduino hardware. Chariot is sponsoring Clojure Conj, to be held on Nov 16-18 at the Sheraton Dock ... Read More The post DevNews #101 – Return of the tin foil hat brigade appeared first on Chariot Solutions.

The Money Pit Top Products Podcast

The Zuli smartplug communicates with your smartphone using Bluetooth Low Energy, giving you unmatched control, monitoring and automation at an affordable price.  Taylor Umphreys, founder and CEO, explains. Learn more about your ad choices. Visit megaphone.fm/adchoices

Embedded
62: Costs a Penny to Go to the Bathroom

Embedded

Play Episode Listen Later Aug 6, 2014 65:55


Josh Bleecher Snyder (@offbymany) joined us to talk about PayPal's Beacon, being acquired, the Go programming language, BTLE, computer vision, and working at a large company after founding small ones. Bluetooth Low Energy: A Developer's Handbook by Robin Heydon TI CC2540 BTLE module Learning OpenCV: Computer Vision by Gary Bradski and Adrian Kaehler Gatt is a Go package for building Bluetooth Low Energy peripherals (video description by Josh from GopherCon 2014) Card.io Machine learning's Theano Eigen Library for matrix math

Bytemarks Café
Bytemarks Cafe: Bluetooth Low Energy

Bytemarks Café

Play Episode Listen Later Jul 3, 2014 59:04


Joining us today is Dean Levitt from Mad Mimi to tell us what's new with contact management. Then we have Darrell Kim from Pacific New Media to tell us about his upcoming class on Wordpress. Finally, we'll talk to our friends from Cultur app and Happy Hour Pal about Bluetooth Low Energy and proximity services.

Techsistens
Techsistens #13

Techsistens

Play Episode Listen Later Dec 9, 2013 50:53


Internet of things, NFC, Bluetooth Low Energy, åbne data - buzzwordsne driver ned af væggene i denne udgave af Techsistens #13. Kathrine Emme Thielke åbner sit digitalskab og vi roser bag ryggen. Samt fortæller det trivia, som du har behov for at vide om juletræer.

Accidental Tech Podcast
21: The Transitive Property of Nerdiness

Accidental Tech Podcast

Play Episode Listen Later Jul 12, 2013 93:56


iWatch follow-up. Alex Eckermann on Bluetooth Low Energy and iWatch. Eric Welander's thoughts on Siri for iWatch. iWatch as a means of identity. How regular people use iOS devices, as witnessed by John. Multitasking-switcher implications in iOS 7. iCloud's priority within Apple. Dropbox Datastore API, including its JavaScript API. Does the Datastore API obviate the need for a web service? Nerd-targeted products. Sponsored by: Transporter: Private cloud storage. Use coupon code atp for 10% off. Audible: The leading provider of downloadable audiobooks.

La Nube de BLU Radio
Bluetooth Low Energy, la herramienta que le ayudaría a más de un despistado

La Nube de BLU Radio

Play Episode Listen Later Mar 2, 2013 4:12


En Barcelona la compañía de Buchheim, Stick-N-Find Technologies, con sede en Davie, Florida, quiere darle a la gente una forma de encontrar cosas, ya... See omnystudio.com/listener for privacy information.