POPULARITY
Edgecore OAP10 is the first purpose-built access point designed to bring Plume's extensive software benefits to even more spaces, "Plume is a Wi-Fi software services company. We focus on delivering our services to the end home through our CSP channel. We work with about 400 plus internet service provider CSPs globally" “As areas become increasingly denser and device-rich, especially in apartment buildings, signal interference can kneecap WiFi performance. Tony Liebel, Product Suite Manager at Plume, discusses how Plume's cloud-based WiFi platform with active client steering and bandwidth selection outperforms traditional network solutions that fight blindly for bandwidth by approaching the building holistically.” In this episode, Doug and Plume's Principal Product Principal manager Tony Liebel talk about the benefits of a whole-of-building WiFi approach for multi-resident buildings, Plume's new outdoor access point and how the company works with multiple partner types to better the experience for everyone. Tony is a veteran of the residential technology space and shares his expertise on how residents, property owners and CSPs can provide greater value and receive the best return out of investments in their WiFi amenities. Plume takes its proactive algorithm for managing a home's worth of devices and applies it across a whole building, ensuring that each unit does not interfere with the other, equipping residents with their own SSID and providing property managers with features such as a dedicated IoT network for smart locks, water-leak detectors, and many other connected devices. Doug and Tony discuss the new Edgecore OAP101, the first purpose-built access point designed to bring Plume's extensive software benefits to even more spaces. It opens up a wide set of opportunities for residences, multi-family properties, and small businesses to cover their property with a seamless WiFi experience. “Plume is a Wi-Fi software services company. We focus on delivering our services to the end home through our CSP channel. We work with about 400 plus internet service provider CSPs globally. And we have several product lines that fit all of the needs of the CSP from something called HomePass, which is what is delivered to the end resident, WorkPass, which is for small and medium-sized businesses, and then my part of the business that I run called Uprise, which is all things multi-resident and multi-family in the MDU world.” Edgecore OAP10 The OAP101 is an enterprise-grade, dual-band Wi-Fi 6 outdoor access point, designed to withstand harsh weather conditions in outdoor and industrial environments with IP68-rated, rust-resistant housing. The OAP101 features 2×2:2 uplink and downlink MU-MIMO that can each transmit data to multiple clients simultaneously and together have a combined data rate of up to almost 3Gbps. The OAP101's integration with Bluetooth Low Energy (BLE) enables value-added applications such as iBeacon and Matter applications. The OAP101 can be operated in a standalone mode or managed by Edgecore ecCLOUD, ecCLOUD-VPC, or EWS/VEWS Series controllers. Visit www.plume.com Edgecore OAP10 https://youtu.be/XvS3U1BTUjI
This week on the Mr. Beacon podcast, Simon Ford, founder of Blecon and IoT expert, discusses how Bluetooth Low Energy (BLE) is revolutionizing industries like healthcare, logistics, and asset tracking. With over 17 years at ARM, Simon shares insights on building scalable IoT solutions and Blecon's role in transforming BLE for business applications. Tune in to explore the future of IoT connectivity, real-time asset tracking, and the challenges of integrating BLE into modern infrastructure.Simon's Favorite Songs:“All I Need” by Jacob Collier: https://www.youtube.com/watch?v=ue6g7SPSyAM“Many of Horror” by Biffy Clyro: https://www.youtube.com/watch?v=Oyl_ICA853s“Mass Destruction” by Faithless: https://www.youtube.com/watch?v=8Wft2olm_VU Hosted on Acast. See acast.com/privacy for more information.
If you're ready to start building out IoT networks and you want access to the largest one around Amazon is ready for you. Amazon Sidewalk is now open for developers to start testing. Sidewalk is Amazon's IoT-focused solution for edge devices that utilizes both Bluetooth Low Energy (BLE) and 900 MHz wireless networks to provide coverage. Sidewalk is generated from Amazon's Ring cameras and Echo speakers and has 90% coverage across the US according to reports. Tom, what's Amazon hoping to accomplish with this rollout? This and more on this week's Rundown. Time Stamps: 0:00 | Welcome to the Rundown 1:05 | Quantum Announces Myriad Storage 3:55 | Cisco Picks up Lightspin for Cloud Security 6:50 | VAST Data Partners with HPE for GreenLake 10:16 | WD Breach Locks Out Users 13:35 | SIOS Adds Multitarget Replication with LifeKeeper 16:51 | Amazon Opens Sidewalk to Developers 25:31 | vFunction Launches Continuous Modernization Manager 28:17 | The Weeks Ahead 30:16 | Thanks for Watching Follow our hosts on Social MediaTom Hollingsworth: https://www.twitter.com/NetworkingNerdStephen Foskett: https://www.twitter.com/SFoskett Follow Gestalt ITWebsite: https://www.GestaltIT.com/Twitter: https://www.twitter.com/GestaltITLinkedIn: https://www.linkedin.com/company/1789 Tags: #Rundown, @QuantumCorp, #MyriadStorage, @Cisco, @LightspinTech, #CloudSecurity, @VAST_Data, @HPE, #GreenLake, @WesternDigital, #DataBreach, @SIOSTech, #LifeKeeper, @AWSCloud, #EdgeComputing
On this episode of Embedded Insiders, Daniel Knobloch, vice president of the Car Connectivity Consortium (CCC) talks the development and standardization of the CCC Digital Key, which utilizes near field communication (NFC), Ultra-Wideband (UWB) and Bluetooth Low Energy (BLE) to enable keyless vehicle access.Then, on the next installment of Dev Talk with Rich and Vin, the two discuss compute processing in vehicles. Specifically, the pros and cons of choosing a centralized or decentralized system and how weight, cost, efficiency, and security differ between the two.But first, we're hearing from Brandon and Rich who, ahead of their trip to Nuremberg for embedded world 2023, are discussing the difference between free and open-source, and what considerations you should make before using either or both.For more information about the CCC Digital Key, visit: https://carconnectivity.org/digital-key/
La CSA ha presentado una nueva característica para los dispositivos Zigbee que los dota de conectividad Bluetooth Low Energy (BLE). Pretenden con esto mejorar el proceso de integración en la red y configuración de nuestros nuevos cacharros domóticos. Muy interesante.
That's why SwaraLink Technologies created the Bluetooth Low Energy Developer's Checklist. In this podcast, the CEO and Co-Founder of SwaraLink Technologies, Sandeep Kamath, breaks down BLE and the checklist they've created, including various topics, from optimizing throughput and power consumption to ensuring secure connections and supporting over-the-air firmware updates. These aren't necessarily must-dos, but they're essential considerations to keep in mind as you design, develop, and test your product.Sandeep was initially a self-taught programmer, playing around with QBASIC and Visual C++ in high school, but then shifted his interest from software to hardware while at the university level. He received his Bachelor's and Master's degrees in Electrical Engineering from the University of California, San Diego, focusing on Analog and RF Integrated Circuit Design. His educational background in hardware and RF systems and personal interest in software eventually led him to the world of embedded wireless systems. After graduating, Sandeep spent over a decade in the semiconductor industry, including eight years working for Texas Instruments Wireless Connectivity group. During his career at TI, Sandeep worked in various technical, management, and business roles, all related to TI's Bluetooth Low Energy product line. In 2017 Sandeep took his knowledge of Bluetooth Low Energy from both a technology and market standpoint and founded SwaraLink Technologies to help companies build high-quality products with great user experiences.SwaraLink Technologies is a services and solutions company focused on Bluetooth Low Energy (BLE) systems and software. Their flagship product, the SwaraLink Bluetooth Low Energy Platform, is a cross-platform middleware solution that reduces the cost of developing high-quality products that use Bluetooth Low Energy technology. SwaraLink was founded and incorporated in the State of California in 2017, with headquarters in San Diego. Since its founding, SwaraLink has helped numerous customers with various services, including architecture, development, testing, and debugging complex hardware and software systems that use Bluetooth and Bluetooth Low Energy Technology.
Podcast: Control Loop: The OT Cybersecurity PodcastEpisode: Welcome to Control Loop: Giving back to the OT community.Pub date: 2022-06-01Every two weeks, get the latest in OT news in Control Loop News Brief, an interview featuring a thought leader in the OT space sharing current industry trends, and the Control Loop Learning Lab's educational segment. A companion monthly newsletter is available through free subscription and on the CyberWire's website.Headlines include: Russia's hybrid war against Ukraine. Russian threat actors against industrial control systems. Exploits for Bluetooth Low Energy. Hacktivists claim attacks against Russian ground surveillance robots. New wiper loader. Turla threat actor reconnaissance in Estonian and Austrian networks. Robert M. Lee, CEO of Dragos, talks giving back to the OT community and shares insights on Pipedream malware. Learning Lab has Dragos' Mark Urban and Jackson Evans-Davies talking about the fundamentals of OT cybersecurity.Control Loop News Brief.Continuing expectations of escalation in cyberspace.Microsoft President: Cyber Space Has Become the New Domain of Warfare - Infosecurity MagazineCyber Attacks on Ukraine: Not What You Think | PCMag Warning: threat actor targets industrial systems.US warns energy firms of a rapidly advancing hacking threat - E&E NewsPIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments | DragosPipedream Malware: Feds Uncover 'Swiss Army Knife' for Industrial System Hacking | WIREDIndestroyer2 and Ukraine's power grid. Twitter: @ESETresearchIndustroyer2: Industroyer reloaded | WeLiveSecurityRussian hackers tried to bring down Ukraine's power grid to help the invasion | MIT Technology ReviewBluetooth vulnerabilities demonstrated in proof-of-concept.NCC Group uncovers Bluetooth Low Energy (BLE) vulnerability that puts millions of cars, mobile devices and locking systems at riskTesla Hacker Proves a Way of Unlocking Doors, Starting Engine - BloombergCISA and its international partners urge following best practices to prevent threat actors from gaining initial access.Weak Security Controls and Practices Routinely Exploited for Initial Access | CISAHacktivists claim to have compromised Russian-manufactured ground surveillance robots.Did hackers commandeer surveillance robots at a Russian airport?Twitter: @caucasnetPolitically motivated DDoS attack on Port of London Authority website.Twitter: @LondonPortAuthPro-Iran Group ALtahrea Hits Port of London Website by DDoS Attack New loader identified in wiper campaigns.Sandworm uses a new version of ArguePatch to attack targets in Ukraine | WeLiveSecurity Turla reconnaissance detected in Austrian and Estonian networks.Russian hackers perform reconnaissance against Austria, Estonia TURLA's new phishing-based reconnaissance campaign in Eastern Europe SANS ICS Summit is coming to Florida, June 1-9.ICS Security Summit & Training 2022Colonial Pipeline's ransomware attack, one year later.How the Colonial Pipeline attack instilled urgency in cybersecurityOT vulnerabilities as credit risk.Operational Technology Cyberattacks Are a Credit Risk for UtilitiesA Cyber Resilience Pledge. Global CEOs Commit to Collective Action on Cyber Resilience Recent threat intelligence findings from Dragos.Dragos ICS/OT Ransomware Analysis: Q1 2022Control Loop Interview.Robert M. Lee, CEO of Dragos, on giving back to the OT cybersecurity community, the idea behind the Control Loop podcast and newsletter, and his candid thoughts on the Pipedream malware and its creators.Follow Rob on LinkedIn and Twitter.Control Loop Learning Lab.Dragos' Mark Urban and Jackson Evans-Davies on the fundamentals of OT cybersecurity and network architecture.Dragos 2021 ICS Cybersecurity Year in ReviewHow to Build a Roadmap for ICS/OT Cybersecurity: 3 Steps to a Sustainable ProgramManaging External Connections to Your Operational Technology EnvironmentImproving ICS/OT Security Perimeters with Network SegmentationThe podcast and artwork embedded on this page are from CyberWire Inc., which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Every two weeks, get the latest in OT news in Control Loop News Brief, an interview featuring a thought leader in the OT space sharing current industry trends, and the Control Loop Learning Lab's educational segment. A companion monthly newsletter is available through free subscription and on the CyberWire's website. Headlines include: Russia's hybrid war against Ukraine. Russian threat actors against industrial control systems. Exploits for Bluetooth Low Energy. Hacktivists claim attacks against Russian ground surveillance robots. New wiper loader. Turla threat actor reconnaissance in Estonian and Austrian networks. Robert M. Lee, CEO of Dragos, talks giving back to the OT community and shares insights on Pipedream malware. Learning Lab has Dragos' Mark Urban and Jackson Evans-Davies talking about the fundamentals of OT cybersecurity. Control Loop News Brief. Continuing expectations of escalation in cyberspace. Microsoft President: Cyber Space Has Become the New Domain of Warfare - Infosecurity Magazine Cyber Attacks on Ukraine: Not What You Think | PCMag Warning: threat actor targets industrial systems. US warns energy firms of a rapidly advancing hacking threat - E&E News PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments | Dragos Pipedream Malware: Feds Uncover 'Swiss Army Knife' for Industrial System Hacking | WIRED Indestroyer2 and Ukraine's power grid. Twitter: @ESETresearch Industroyer2: Industroyer reloaded | WeLiveSecurity Russian hackers tried to bring down Ukraine's power grid to help the invasion | MIT Technology Review Bluetooth vulnerabilities demonstrated in proof-of-concept. NCC Group uncovers Bluetooth Low Energy (BLE) vulnerability that puts millions of cars, mobile devices and locking systems at risk Tesla Hacker Proves a Way of Unlocking Doors, Starting Engine - Bloomberg CISA and its international partners urge following best practices to prevent threat actors from gaining initial access. Weak Security Controls and Practices Routinely Exploited for Initial Access | CISA Hacktivists claim to have compromised Russian-manufactured ground surveillance robots. Did hackers commandeer surveillance robots at a Russian airport? Twitter: @caucasnet Politically motivated DDoS attack on Port of London Authority website. Twitter: @LondonPortAuth Pro-Iran Group ALtahrea Hits Port of London Website by DDoS Attack New loader identified in wiper campaigns. Sandworm uses a new version of ArguePatch to attack targets in Ukraine | WeLiveSecurity Turla reconnaissance detected in Austrian and Estonian networks. Russian hackers perform reconnaissance against Austria, Estonia TURLA's new phishing-based reconnaissance campaign in Eastern Europe SANS ICS Summit is coming to Florida, June 1-9. ICS Security Summit & Training 2022 Colonial Pipeline's ransomware attack, one year later. How the Colonial Pipeline attack instilled urgency in cybersecurity OT vulnerabilities as credit risk. Operational Technology Cyberattacks Are a Credit Risk for Utilities A Cyber Resilience Pledge. Global CEOs Commit to Collective Action on Cyber Resilience Recent threat intelligence findings from Dragos. Dragos ICS/OT Ransomware Analysis: Q1 2022 Control Loop Interview. Robert M. Lee, CEO of Dragos, on giving back to the OT cybersecurity community, the idea behind the Control Loop podcast and newsletter, and his candid thoughts on the Pipedream malware and its creators. Follow Rob on LinkedIn and Twitter. Control Loop Learning Lab. Dragos' Mark Urban and Jackson Evans-Davies on the fundamentals of OT cybersecurity and network architecture. Dragos 2021 ICS Cybersecurity Year in Review How to Build a Roadmap for ICS/OT Cybersecurity: 3 Steps to a Sustainable Program Managing External Connections to Your Operational Technology Environment Improving ICS/OT Security Perimeters with Network Segmentation
The Hable One is a braille keyboard that can be paired with any smartphone using Bluetooth Low Energy (BLE). It is purposely designed for a smartphone and therefore enjoys a more compact design, sized similar to an iPhone 6. The Hable One enables people to always be in control while using their smartphones in any situation. Hable One is designed to assist your smartphone or tablet with a simple and intuitive interface. Contact your loved ones using your Hable One as a wireless keyboard or use it as a remote to control every function in your smartphone. Thanks to the physical buttons and exclusive vibrations, you will be able to control it even having your smartphone inside of your pocket. Hable One website: https://www.iamhable.com/ Presenter Contact Info Email: louvins@gmail.com
The Hable One is a braille keyboard that can be paired with any smartphone using Bluetooth Low Energy (BLE). It is purposely designed for a smartphone and therefore enjoys a more compact design, sized similar to an iPhone 6. The Hable One enables people to always be in control while using their smartphones in any situation. Hable One is designed to assist your smartphone or tablet with a simple and intuitive interface. Contact your loved ones using your Hable One as a wireless keyboard or use it as a remote to control every function in your smartphone. Thanks to the physical buttons and exclusive vibrations, you will be able to control it even having your smartphone inside of your pocket. Hable One website: https://www.iamhable.com/ Presenter Contact Info Email: louvins@gmail.com
An assessment of the Russian cyber threat. NATO's Article 5 in cyberspace. Conti's ransomware attack against Costa Rica spreads, in scope and effect. Bluetooth vulnerabilities demonstrated in proof-of-concept. CISA and its international partners urge following best practices to prevent threat actors from gaining initial access. Joe Carrigan looks at updates to the FIDO alliance. Rick Howard and Ben Rothke discuss author Andrew Stewart's book "A Vulnerable System: The History of Information Security in the Computer Age". And,the doctor was in, but wow, was he also way out of line. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/95 Selected reading. Russia Planned a Major Military Overhaul. Ukraine Shows the Result. (New York Times) The Cyberwar Against Pro-Ukrainian Countries is Real. Here's What to Do (CSO Online) Collective cyber defence and attack: NATO's Article 5 after the Ukraine conflict (European Leadership Network) Cyber attack on Costa Rica grows as more agencies hit, president says (Reuters) Ransomware gang threatens to ‘overthrow' new Costa Rica government, raises demand to $20 million (The Record by Recorded Future) Hacker Shows Off a Way to Unlock Tesla Models, Start Cars (Bloomberg) NCC Group uncovers Bluetooth Low Energy (BLE) vulnerability that puts millions of cars, mobile devices and locking systems at risk (NCC Group) Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks (NCC Group Research) Technical Advisory – Kwikset/Weiser BLE Proximity Authentication in Kevo Smart Locks Vulnerable to Relay Attacks (NCC Group Research) Technical Advisory – BLE Proximity Authentication Vulnerable to Relay Attacks (NCC Group Research) Alert (AA22-137A) Weak Security Controls and Practices Routinely Exploited for Initial Access (CISA) Hacker and Ransomware Designer Charged for Use and Sale of Ransomware, and Profit Sharing Arrangements with Cybercriminals (U.S. Attorney's Office for the Eastern District of New York) US prosecutors allege Venezuelan doctor is ransomware mastermind (ZDNet) 'Multi-tasking doctor' was mastermind behind 'Thanos' ransomware builder, DOJ says (The Record by Recorded Future) U.S. Charges Venezuelan Doctor for Using and Selling Thanos Ransomware (The Hacker News)
Happy 10th birthday Raspberry Pi! The tiny computer has come a long way in just ten short years. It all started when Raspberry Pi Foundation founders Eben Upton and Rob Mullins set out to create an affordable, easy-to-use computer that students could use to learn coding. And they succeeded - Raspberry Pi has become one of the most popular computers in the world, with millions of units sold.The Raspberry Pi HardwareThe first devices were not intended to be the massive platform they are today, Instead, the plan was simply to make a few thousand devices to encourage children to learn to code. Raspberry Pi devices were first sold in 2012, and the response was overwhelming. Not only did students love them, but makers and hobbyists snapped them up as well. It quickly became clear that there was a much larger market for the tiny computers than originally anticipated.The Raspberry Pi Foundation has always been focused on education, and they continue to work with schools and organizations around the world to promote coding and computer science education. In addition to their educational initiatives, they have also developed several tools and resources that have made it easier for makers of all levels to create amazing projects.Over the years, Raspberry Pi has undergone several iterations, each one more powerful than the last. The original Model B was followed by the Model B+, the Raspberry Pi Zero, the Raspberry Pi A+ and A series, the Raspberry Pi Compute Module, and the Raspberry Pi Model B+. Beyond that, there have been a whole lot more.The Raspberry Pi 4 is just one example of how much Raspberry Pi has changed over the years. The original Model B had just 256MB of RAM and a 700MHz single-core processor. The latest Raspberry Pi 4 has a quad-core processor clocked at up to 1.5 GHz, as well as 8 GB of RAM. It also features improved networking with dual-band 802.11ac Wi-Fi and Bluetooth Low Energy (BLE) on board.In addition to hardware changes, the Raspberry Pi Foundation has also made several changes to the operating system over the years. The original Raspberry Pi devices ran on a modified version of Debian Linux, but the Raspberry Pi Foundation later developed their own operating system, Raspbian. Raspbian is based on Debian and is optimized for the Raspberry Pi hardware. Since then, the platform has transferred to Raspberry Pi OS, another Linux-based operating system.The Raspberry Pi communityAs amazing as all of the changes to Raspberry Pi have been, perhaps the most impressive thing about the tiny computer is the community that has grown up around it. There are now millions of Raspberry Pi devices in use all over the world, and there are countless projects and applications for them.From small projects like retro gaming consoles and media centers to large-scale deployments like industrial control systems and weather stations, Raspberry Pi is being used for everything. The possibilities are truly endless, and the Raspberry Pi community continues to come up with new and innovative ways to use the tiny computers.As Raspberry Pi celebrates its tenth birthday, it's clear that the best is yet to come. Thank you for being a part of this incredible journey, and we can't wait to see what the next ten years have in store for Raspberry Pi.
Do you ever feel like you're carrying around a bag of bricks when you have to bring your house keys, car keys, and wallet with you everywhere you go? What about all of the passwords that you're required to remember? And worst of all, they're constantly changing because your company wants you to change it every 45 days. And they're getting longer! How in the world are we supposed to keep track of all of these things? Everykey is here to help eliminate as many of these issues as possible.What is Everykey?Everykey is a Bluetooth device that replaces all of those items! Using military-grade security, it unlocks your phone, laptop, tablet, house door, car door, and other access-controlled devices when you are nearby, then locks them back down when you walk away. The system also generates secure passwords for your website accounts, then automatically logs you in when you visit a website. If you lose your Everykey, don't worry! You can remotely freeze it so no one else can use it.The Everykey team was started by a group of graduates from Case Western Reserve University. They were inspired to create the product after they saw how much time and hassle people go through every day just to keep track of their keys and passwords. Everykey is their solution to this problem!How does Everykey work?Everykey uses Bluetooth Low Energy (BLE) technology to communicate with the devices that you've authorized it to unlock. When you're in range of a compatible device, it will automatically unlock. When you walk away, Everykey will automatically lock it again. It also uses 128-bit AES encryption to keep your passwords safe and secure.To get started with your device, all you need to do is download the app and create an account. Then, just pair your Everykey with your devices and start using it! It's that simple.How does Everykey compare to its competitors?Everykey is the only Bluetooth device that can unlock your house, car, and other access-controlled devices. It also has the added security of password generation and website login automation. Other competitors include key fobs, RFID tags, and passwords stored on phones or computers.Key fobs are small plastic devices that you carry with you to unlock your car or house door. They're often used in place of a traditional key and are available from a variety of brands such as Yale, Kwikset, and Schlage. However, they can be easily lost or stolen, and some models require you to remove them from your keyring in order to use them.RFID tags are similar to key fobs but don't have any physical form. They can be attached to your keyring, placed in a wallet, or worn around your neck on a lanyard. RFID tags use radio waves to unlock devices and are available from brands such as Mastercard, Visa, and American Express. However, they can be easily scanned by anyone who is close enough, and some models require you to have the tag within inches of the device in order to unlock it.Passwords stored on phones or computers are vulnerable to hacking and theft. If someone gets access to your phone or computer, they can see all of your passwords without having to crack any encryption codes. Everykey eliminates this vulnerability by using military-grade security that is impossible for hackers to penetrate.Who is Everykey for?Everykey is for those of us who have trouble remembering passwords. With its 2 factor authentication, you can eliminate the need to remember your passwords. Instead, you can simply use the key. It is also for those whose passwords change all the time. When your password changes for work, or your email, you're still protected and your workflow doesn't have to change. But, Everykey is also for those who carry too many keys. The device is designed to be able to help secure your home, car, and more, with partnerships with other security products.SummaryEverykey is available now on the company's website. To learn more about the company or the key, or to purchase your own, head over to the company's website.Interview by Todd Cochrane of Geek News Central and Christopher Jordan of The Talking Sound.Sponsored by: Get $5 to protect your credit card information online with Privacy. Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more. The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.
Do you ever feel like you're carrying around a bag of bricks when you have to bring your house keys, car keys, and wallet with you everywhere you go? What about all of the passwords that you're required to remember? And worst of all, they're constantly changing because your company wants you to change it every 45 days. And they're getting longer! How in the world are we supposed to keep track of all of these things? Everykey is here to help eliminate as many of these issues as possible.What is Everykey?Everykey is a Bluetooth device that replaces all of those items! Using military-grade security, it unlocks your phone, laptop, tablet, house door, car door, and other access-controlled devices when you are nearby, then locks them back down when you walk away. The system also generates secure passwords for your website accounts, then automatically logs you in when you visit a website. If you lose your Everykey, don't worry! You can remotely freeze it so no one else can use it.The Everykey team was started by a group of graduates from Case Western Reserve University. They were inspired to create the product after they saw how much time and hassle people go through every day just to keep track of their keys and passwords. Everykey is their solution to this problem!How does Everykey work?Everykey uses Bluetooth Low Energy (BLE) technology to communicate with the devices that you've authorized it to unlock. When you're in range of a compatible device, it will automatically unlock. When you walk away, Everykey will automatically lock it again. It also uses 128-bit AES encryption to keep your passwords safe and secure.To get started with your device, all you need to do is download the app and create an account. Then, just pair your Everykey with your devices and start using it! It's that simple.How does Everykey compare to its competitors?Everykey is the only Bluetooth device that can unlock your house, car, and other access-controlled devices. It also has the added security of password generation and website login automation. Other competitors include key fobs, RFID tags, and passwords stored on phones or computers.Key fobs are small plastic devices that you carry with you to unlock your car or house door. They're often used in place of a traditional key and are available from a variety of brands such as Yale, Kwikset, and Schlage. However, they can be easily lost or stolen, and some models require you to remove them from your keyring in order to use them.RFID tags are similar to key fobs but don't have any physical form. They can be attached to your keyring, placed in a wallet, or worn around your neck on a lanyard. RFID tags use radio waves to unlock devices and are available from brands such as Mastercard, Visa, and American Express. However, they can be easily scanned by anyone who is close enough, and some models require you to have the tag within inches of the device in order to unlock it.Passwords stored on phones or computers are vulnerable to hacking and theft. If someone gets access to your phone or computer, they can see all of your passwords without having to crack any encryption codes. Everykey eliminates this vulnerability by using military-grade security that is impossible for hackers to penetrate.Who is Everykey for?Everykey is for those of us who have trouble remembering passwords. With its 2 factor authentication, you can eliminate the need to remember your passwords. Instead, you can simply use the key. It is also for those whose passwords change all the time. When your password changes for work, or your email, you're still protected and your workflow doesn't have to change. But, Everykey is also for those who carry too many keys. The device is designed to be able to help secure your home, car, and more, with partnerships with other security products.SummaryEverykey is available now on the company's website. To learn more about the company or the key, or to purchase your own, head over to the company's website.Interview by Todd Cochrane of Geek News Central and Christopher Jordan of The Talking Sound.Sponsored by: Get $5 to protect your credit card information online with Privacy. Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more. The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.
Thanks to FASTag, we now do not have to carry cash or cards to pay for tolls on highways. It is the first and the most successful example of in-car payment service in India. The next step now is to enable in-car payments for many other services such as fuel, parking, maintenance, insurance, etc. Before we get to its advantages and disadvantages, let's understand how the in-car payment system works. The easiest and most common way to enable an in-car payment system is through Radio Frequency Identification (RFID) tags. For the uninitiated, RFID tag is a short-range wireless system that uses radio waves to communicate. These tags store a range of information, read by a specific device called reader. The beauty of RFID tag is it does not require power or internet connectivity to work, and can send data over-the-air. The other method to implement an in-car payment system is through an embedded Bluetooth Low Energy (BLE) module. These modules are expensive and require an operating unit to work. But they can transmit data at a higher range, which, in turn, lowers the chances of payment failure. Unlike the integrated systems such as RFID tags, this embedded system requires power to work. Another way to implement an in-car payment system is through Application Programming Interfaces (APIs). It is an advanced and most secure way among the available methods to enable in-car payments, but is expensive and complicated because of hardware and software compatibility issues. It requires both power and internet connectivity to work. Coming on to the challenges with in-car payment systems, security is one and foremost because your personal and financial information may be compromised due to cyber attack irrespective of systems used -- integrated such as RFID tags or embedded such as BLE module/APIs -- to enable the payments. Connectivity is another challenge, especially in embedded systems, because there still is a wide geographical area in the country where the internet has not reached as yet. Watch video
Do you like to push your body to the limits? Do you strive for excellence in your sport? If so, then CORE by greenTEG AG is the health tech for you! The CORE Body Temperature Sensor is a wearable device that uses Swiss-made sensor technology to monitor and deliver real-time, accurate core body temperature data. This data can help athletes, coaches, and sports scientists improve their performance by monitoring core body temperature in real-time and adapting their training strategies accordingly.Who is greenTEG AG?greenTEG AG has been operating since 2007 as an early-stage start-up company based in Zürich, Switzerland. CORE Body Temperature Sensor is one of the flagship products that they have developed over time through collaboration with elite athletes who push themselves to new levels every day. It has helped these athletes learn how their bodies react during training sessions and races by providing them with valuable insight into their core body temperature. The system can also help athletes and coaches optimize their heat training, heat acclimation, and cooling strategies to improve performance on the court or field. CORE has been used by UCI World Teams, Continental Teams, professional football clubs in Europe, and more.How does CORE work?The CORE Body Temperature Monitoring System is a wearable device that consists of two key elements: the CORE Sensor worn on your torso with an adhesive backing and the CORE Monitor which receives data from multiple sensors wirelessly via Bluetooth Low Energy (BLE). Both components are small in size so you won't even know they're there while you train! You will receive immediate feedback on screen as well as short-term and long-term averages.The CORE Sensor is able to measure core body temperature by detecting the heat flux at a nanoscale. This sensor has been developed over time with input from some of the world's top athletes who have used it during their training sessions and races. The data that CORE collects can help you understand how your body reacts during different types of physical activity, whether it be intense training or an actual race. You can use this information to adapt your training strategies accordingly and improve your performance!What makes CORE different?There are other devices on the market that claim to monitor core body temperature, but what makes CORE so special is its Swiss-made sensor technology. This technology is extremely accurate and reliable as it measures heat flux at a nanoscale, in real-time. It is also the first commercially available system that can measure core body temperature accurately. The sensors are tiny so you won't even know they're there while running or playing sports!The CORE Body Temperature Monitoring System has been tested by elite athletes who have pushed themselves to new levels every day using the system during their training sessions and races with great success! Athletes such as cyclist Tony Martin of Team Katusha Alpecin use it on a daily basis when preparing for his next race. It will help him monitor his core body temperature in real-time and ensure that he is performing at his best!SummaryIf you are an elite athlete looking for a device to help you monitor your core body temperature, CORE is the perfect solution. Get CORE today and start monitoring your core body temperature like a pro at the company's website!Interview by Todd Cochrane of Geek News Central.Sponsored by: Get $5 to protect your credit card information online with Privacy. Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more. The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.
Do you like to push your body to the limits? Do you strive for excellence in your sport? If so, then CORE by greenTEG AG is the health tech for you! The CORE Body Temperature Sensor is a wearable device that uses Swiss-made sensor technology to monitor and deliver real-time, accurate core body temperature data. This data can help athletes, coaches, and sports scientists improve their performance by monitoring core body temperature in real-time and adapting their training strategies accordingly.Who is greenTEG AG?greenTEG AG has been operating since 2007 as an early-stage start-up company based in Zürich, Switzerland. CORE Body Temperature Sensor is one of the flagship products that they have developed over time through collaboration with elite athletes who push themselves to new levels every day. It has helped these athletes learn how their bodies react during training sessions and races by providing them with valuable insight into their core body temperature. The system can also help athletes and coaches optimize their heat training, heat acclimation, and cooling strategies to improve performance on the court or field. CORE has been used by UCI World Teams, Continental Teams, professional football clubs in Europe, and more.How does CORE work?The CORE Body Temperature Monitoring System is a wearable device that consists of two key elements: the CORE Sensor worn on your torso with an adhesive backing and the CORE Monitor which receives data from multiple sensors wirelessly via Bluetooth Low Energy (BLE). Both components are small in size so you won't even know they're there while you train! You will receive immediate feedback on screen as well as short-term and long-term averages.The CORE Sensor is able to measure core body temperature by detecting the heat flux at a nanoscale. This sensor has been developed over time with input from some of the world's top athletes who have used it during their training sessions and races. The data that CORE collects can help you understand how your body reacts during different types of physical activity, whether it be intense training or an actual race. You can use this information to adapt your training strategies accordingly and improve your performance!What makes CORE different?There are other devices on the market that claim to monitor core body temperature, but what makes CORE so special is its Swiss-made sensor technology. This technology is extremely accurate and reliable as it measures heat flux at a nanoscale, in real-time. It is also the first commercially available system that can measure core body temperature accurately. The sensors are tiny so you won't even know they're there while running or playing sports!The CORE Body Temperature Monitoring System has been tested by elite athletes who have pushed themselves to new levels every day using the system during their training sessions and races with great success! Athletes such as cyclist Tony Martin of Team Katusha Alpecin use it on a daily basis when preparing for his next race. It will help him monitor his core body temperature in real-time and ensure that he is performing at his best!SummaryIf you are an elite athlete looking for a device to help you monitor your core body temperature, CORE is the perfect solution. Get CORE today and start monitoring your core body temperature like a pro at the company's website!Interview by Todd Cochrane of Geek News Central.Sponsored by: Get $5 to protect your credit card information online with Privacy. Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more. The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.
Join Scott as he continues bluetooth low energy (BLE) GATT client code on the ESP32-S3. Chat on the Adafruit Discord at https://adafru.it/discord. Deep Dive happens every week. Normally Fridays at 2pm Pacific. Next week is on Friday. All notes are available on GitHub with links into the videos. Thanks to @askpatrickw and @dcd for making and maintaining the notes. https://github.com/adafruit/deep-dive-notes/ 0:00 Cat cam in main window 1:00 hello 3:50 introduction and housekeeping 4:40 introduce Vin and Spook 6:55 linkedin and restream streams as well 7:20 https://github.com/adafruit/deep-dive-notes 8:29 did you ever cover how the compiler works in CP on one of these deep dives? 10:40 Did you see that Zephyr now has support for RP2040? 11:03 Linker was for the actual linking of the CP core (and just general knowledge). The compiler for more how the internal Python compiler works 12:02 Smokey Brights / https://www.smokeybrights.com/ 12:50 https://docs.micropython.org/en/latest/develop/compiler.html 13:40 # 5881Thank you for an example how to use DeviceInfoService for connections 15:55 continue CP 2022 discussion 18:22 Axel - 19:00 crashes that happen after several days are very hard to debug 19:13 Does Adafruit have any plans to support a 5 GHz wifi chip? Espressif c6 20:25 kattni's #circuitpython2022 22:30 https://blog.adafruit.com/2022/02/01/the-circuitpython-community-a-round-up-and-a-look-forward-to-2022/ 28:15 “it takes a village” 32:45 thank you Kattni for reminding us that CircuitPython requires its community 33:05 PlatformIO? 33:40 How does the CP2022 resolve? Are you going to publish a manifesto or something? 37:06 Does anyone know about a driver for Windows to make a Bluetooth COM-Port to the adafruit_ble.services.nordic UARTService accessible 37:50 Kattni will be my first guest on Paul Cutler's CP podcast, too, which will give a chance for people to hear her March 1st - 39:35 BlueTooth - review last week / broadcast and observer roles 43:28 next step - initiating the connection 45:04 BatteryService 46:45 Declarative form of python used 47:22 BLE - GAP advertising 47:39 GATT - use to build this library upon 48:35 github BLE example uart examples (client ) 50:55 Can you point me to a CP joystick hid example that uses analog inputs for pi pico? 57:00 what makes up a service 59:30 where is serial_number? 1:00:20 Bluetooth.com specifications and more BLE service api and espressif/common-hal/bleio/Connetion.c 1:09:10 Nimble callbacks *_cb / FreeRTOS 1:12:35 Discover by UUID will be faster 1:13:05 Discover all characteristics 1:15:35 nRF 52840 with BLE 1:16:09 esp s3 board - client board 1:17:14 nimble screen - demo 1:18:35 and example code - Unhandled connection event 12 1:19:20 uart.read(4) is not reading - how does it work… 1:20:00 NUX Nordic Uart Service 1:21:08 passing up the lower level services 1:22:20 StreamIn and StreamOut 1:24:35 Characteristics_buffer - native 1:28:00 This is a deep dive ( notify vs indicate ) 1:28:41 two ways to write ( write and write without response ) 1:30:30 then there is the security stuff 1:32:10 how do we go about building circuitpython uf2 files for missing boards? https://learn.adafruit.com/building-circuitpython and https://learn.adafruit.com/how-to-add-a-new-board-to-circuitpython 1:37:35 “there's no software engineering problem that can't be solved with another layer of abstraction.” - ( in the right place ) 1:39:02 implementation for nRF version 1:39:48 *GATTS - server, and *GATTC client 1:40:39 adding event handler in constructor, need to add to espressif version also 1:42:28 need an event handler system 1:42:40 this is all BLE workflow stuff you're working on now right, not just "standard BLE" support for S3? 1:45:10 HVX is short for “Handle Value Notification or Indication” 1:47:30 CP joystick hid example that uses analog inputs for pi pico? https://learn.adafruit.com/customizing-usb-devices-in-circuitpython/hid-devices and https://learn.adafruit.com/getting-started-with-raspberry-pi-pico-circuitpython/potentiometer-and-pwm-led and of course - reach out on discord https://adafru.it/discord 1:50:15 again - take the the nRF code, and change it for the espressif version 1:52:40 we need two callbacks here for espressif and review ble_gap.h 1:56:12 could be more complicated due to non-consecutive buffers 1:57:22 Has there been any discussion of doing BLE Mesh support 1:59:06 Need to figure out how to split apart the om buffer os_mbuf 2:01:44 "Apache Mynewt offers the world's first fully open-source Bluetooth Low Energy (BLE) or Bluetooth Smart stack fully compliant with Bluetooth 5 specifications with support for Bluetooth Mesh. It is called NimBLE." https://mynewt.apache.org/latest/network/index.html# 2:02:00 Check out the git repos 2:03:03 circuit-python dev channel 2:03:59 Next week on Friday 2:04:19 Pet the cat 2:05:02 have a great weekend
Ladyada shows off CircuitPython serial connection including the REPL over Bluetooth Low Energy (BLE). This is one of the key components of using CircuitPython over BLE. Check it out at https://code.circuitpython.org #ble #bluetooth #WebBluetooth Visit the Adafruit shop online - http://www.adafruit.com ----------------------------------------- LIVE CHAT IS HERE! http://adafru.it/discord Adafruit on Instagram: https://www.instagram.com/adafruit Subscribe to Adafruit on YouTube: http://adafru.it/subscribe New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ -----------------------------------------
Today I'll answer questions and discuss the work to get a BLE workflow going in CircuitPython. I’m sponsored by Adafruit to work on CircuitPython. Support them, and by extension me, by purchasing hardware from https://adafruit.com Chat with me and lot of others on the Adafruit Discord at https://adafru.it/discord. Deep Dive happens every week. Normally Fridays at 2pm Pacific but occasionally shifted to Thursday at 2pm. Typically goes for two hours or more. Questions are welcome. Next week will be on Friday and will be the 1 year anniversary! 0:00 Getting started after technical difficulties 4:04 hello and thanks to 009 for the gpu clue 7:04 q: just started my first BLE project that i showed on S&T. i'm confused what the BLE components i need to setup some kind of "clear/reset connections and repair from scratch" button to make my board useable across devices without having to manually disconnect before reconnecting 9:19 core modules ble erase_bonding… 9:59 working on a digital thermometer for an old bmw that would obviously show the engine's temp. I want to use an stm32. 15:04 BLE - Bluetooth Low Energy 17:51 Circuit Playground Bluefruit - Bluetooth Low Energy 20:14 what applications would you recommend BLE for? 25:49 Bonding 29:45 I know you can SEND data with the Micro:bit BLE, but can you program it from mobile through BLE?? 30:14 Serial/UART over BLE is not "super standard" as opposed to Serial on Bluetooth. There is a circuit python LIB that does the Nordic way. But you cannot change the UUID for another copy of serial. 30:49 BLE workflow - discovery 35:59 for devices that allow multiple devices to connect (like a mouse that toggles between machines) do you need a separate BLE chip for each device? 37:04 Is this workflow tied to BLE or is it standard for regular (older) bluetooth as well? 37:24 The number of pairs, bonds, or connected? 40:19 I want to make a BLE keyboard that I can quickly switch between my phone, desktop, laptop, and RPi. So, what's the most bonds possible? 42:14 what security things should be we aware of when working w/ BLE? 46:24 Desktop / “where scott is at”... 46:54 Packet buffer fixes #4535 48:34 Don't the packets have sequence numbers? 49:21 Fix central pairing #4522 51:45 Proof of concept code for CP future behavior 52:28 I noticed a 7.0.0 tag has appeared in the CPY repo. wonder what that will bring 54:09 So it is not going to be in the "kernel" but in "library"? Or it is a mockup in "userland"? 54:39 Adafruit_CircuitPython_BLE_Creation / Creation IDs on github 58:04 instance id? ( NO ) 1:02:48 Creator IDs, how are you allocating them? So 0x1234_xxxx could be registered by one person/organisation? 1:03:56 Examples ( advertisement / scan? ) 1:05:04 File Transfer 1:06:54 The BLE SIG is in Kirkland, WA if you want to chat with them. I might have some contacts. 1:07:09 There is/was that file transfer solution over the REPL for micropython. Can you reuse that? 1:07:55 Do you envision the BLE file transfer protocol requiring the storage to be mounted writable from boot.py on the CircuitPython device? 1:09:54 ampy == That was the recommendation for micropython… ( “No - don’t like it”) 1:10:14 This might be old information... but at one point iOS didn't support serial over bluetooth. (Ham radio control apps used this). Has that changed ? 1:11:04 What is BLE range on CPB/Micro:bit (estimate) 1:12:29 Does BLE keyboard use scan codes or ASCII? ( Same as USB ) 1:13:46 BLE file transfer library 1:14:34 BLE number set 1:17:34 I'm going to need a way for my keyboard to know whether the device it's talking to is in Dvorak or US mode. 1:20:09 Flow Control 1:21:49 demo 1:23:09 In "Bluefruit Connect" you have packet based protocol, over serial with function like picking a color or sending image... you could expand that. 1:24:53 Is the bug that it's starting to corrupt the file system, but not finishing the job? Or that it's corrupting the filesystem at all? 1:25:19 Maybe that "Bluefruit Connect" and protocol and serial was there for old way to connect serial co-pro to old stuff, before nRF52 support. 1:25:55 - Demo …( using tio on arch linux ) 1:28:59 - Ryzen 16-core - speedier than a raspberry pi 4 1:31:39 - simulating the file system in a dictionary 1:33:32 book recommendations for ble ? 1:35:01 Blinka "server side" thing, to control a PiZero? Is that possible or we hit a limitation of BLE on the Blinka side? ( To have the BLE workflow for a Pi. ) 1:35:36 https://www.amazon.com/Make-Bluetooth-Projects-Raspberry-Smartphones/dp/1457187094 for Sander Vesik's question. 1:38:41 Any news about the "convergence" with BLE on micropython? /Both MP and CP were developing separately at the same time. / Low level, so blinka can build on top... to make it CP like. 1:45:34 outline for OHS 1:48:23 Soooo at 15 minutes is it a shallow dive ? 1:48:49 plan for next weeks - don’t block Trevor 1:50:12 wrap up
Zwift is a massively multiplayer online cycling and running physical training program that enables users to interact, train and compete in a virtual world. The company responsible for Zwift, Zwift Inc., was cofounded by Jon Mayfield, Eric Min, Scott Barger and Alarik Myrin in California, United States, in 2014. Now that you are ready to get started with Zwift, there are a couple basic things you need to start running. Some of this might be a bit overwhelming, but don't worry, we are here to help! First—you'll need a treadmill. This is what you'll need to run on while you're connected to Zwift. In some cases, it will also give us the info we need to make you move in-game and let you run with Zwifters all around the world. Second—you'll need a footpod, connected shoe, or treadmill sensor. We’ll help you figure out what works best with Zwift. If you have a treadmill that transmits directly to Zwift via Bluetooth Low Energy (BLE)—sometimes called a smart treadmill—you won’t need a footpod, connect shoe, or treadmill sensor. For a list of smart treadmills that we support, check out this article. Third—but definitely not least, you will need a Device to run Zwift on. We support a ton of different devices. To sum it all up, here is a simplified list of what you need: A treadmill The Zwift RunPod is one of the easiest ways to get up and running on Zwift. For information on how to set up your runpod, check out this article. A footpod, smart shoe, or treadmill sensor A Device to run Zwift on. If you are looking to move beyond a basic setup, think about adding a Heart Rate Monitors to boost your Zwift experience. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/chrisabraham/message Support this podcast: https://anchor.fm/chrisabraham/support
Connor Rigby of Nerves fame joins our motley crew to talk about the new Blue Heron library that brings Bluetooth Low-Energy/BLE to Nerves. He goes deep, he goes wide. We learn a lot. And beyond that we cover the Spawnfest darling we know as Bakeware that creates single static binaries from Elixir projects and some Flutter. We almost fall into car talk but mostly steer clear. This is a wild one! Sponsors Audible.com Groxio.io | Career Rocket Fuel For Curious Coders CacheFly Panel Alex Koutmos Josh Adams Bruce Tate Lars Wikman Guest Connor Rigby Links https://github.com/spawnfest/bakeware https://github.com/okeuday/erlang_py http://erlport.org/ is neat generally https://github.com/billosys/ErlPort.jl This gentleman is working on BLE stuff in flutter to build a companion app for the pinetime watch Picks Alex Koutmos: Web Bluetooth API SCCA Sports Car Club of America Josh Adams: https://github.com/reanimate/reanimate Bruce: Julia team interviews for Groxio http://grox.io/language/julia/course Connor Rigby: https://github.com/smartrent/blue_heron Follow us on Twitter: @elixir_mix
Connor Rigby of Nerves fame joins our motley crew to talk about the new Blue Heron library that brings Bluetooth Low-Energy/BLE to Nerves. He goes deep, he goes wide. We learn a lot. And beyond that we cover the Spawnfest darling we know as Bakeware that creates single static binaries from Elixir projects and some Flutter. We almost fall into car talk but mostly steer clear. This is a wild one! Sponsors Audible.com Groxio.io | Career Rocket Fuel For Curious Coders CacheFly Panel Alex Koutmos Josh Adams Bruce Tate Lars Wikman Guest Connor Rigby Links https://github.com/spawnfest/bakeware https://github.com/okeuday/erlang_py http://erlport.org/ is neat generally https://github.com/billosys/ErlPort.jl This gentleman is working on BLE stuff in flutter to build a companion app for the pinetime watch Picks Alex Koutmos: Web Bluetooth API SCCA Sports Car Club of America Josh Adams: https://github.com/reanimate/reanimate Bruce: Julia team interviews for Groxio http://grox.io/language/julia/course Connor Rigby: https://github.com/smartrent/blue_heron Follow us on Twitter: @elixir_mix
Amazon will launch a new location-tracking mesh network system later this year Amazon is preparing to launch an ambitious networking and location system later this year under the name Amazon Sidewalk. Sidewalk will link smart home devices and other Amazon products using Bluetooth Low Energy (BLE), connecting beyond the range of a standard Wi-Fi network. Meant to be operated at the scale of a neighborhood, Sidewalk would turn devices like smart floodlights and home assistants into network bridges, passing along security updates and commands from a central Wi-Fi hub. In addition to transmitting software, the signals allow Sidewalk to triangulate a device's approximate location based on its contacts with other Sidewalk-enabled devices. The system will be built into the Echo, and Tile has also joined the project as the first third-party platform to support the system. Amazon plans to add Ring cameras to the network later, notifying device owners directly when Sidewalk is available to use. A full list of Sidewalk-compatible devices is available on the project landing page. More info here... Hearing Loss and Hi Res Audio A good friend of ours sent us a link to a Youtube video called “Hearing Loss at Age”. This video tries to explain the physical degradation of hearing as we age. The video was produced by Hans Beekhuyzen a Dutch Hifi expert and member of the Audio Engineering Society. The video is a little technical but essentially says that as we age we can not hear the upper octave of the ten octaves between 20 Hertz to 20kHz. That tenth octave starts at 16.7kHz. He says not worry because we still hear 90% of the sound spectrum. So why do we need Hi Res files? We'll get to that. He mentions Nyquist in this video to discuss sampling. This is where the video gets quite technical. He has another video that goes into much more detail about this subject (The truth about Nyquist and why 192 kHz does make sense). What is Nyquist? It is named after electronic engineer Harry Nyquist. Nyquist's theorem states that a periodic signal must be sampled at more than twice the highest frequency component of the signal. In practice, because of the finite time available, a sample rate somewhat higher than this is necessary. Since we want to sample sound up to 20Khz, for those of us lucky enough to hear sound at that frequency, the sample rate should be no lower than 40Khz. Just for completeness, sampling is a representation of sound recorded in, or converted into, digital form. In digital audio, the sound wave of the audio signal is encoded as numerical samples in a continuous sequence. For example, in CD audio, samples are taken 44100 times per second each with 16 bit sample depth. We'll cover sample depth in a bit If a CD is sampled at 44.1Khz. That means it can recreate frequencies up to 22.05Khz, far above what people can hear! So we're all good right? Again why do I need Hi Res Files? Sampling Errors One of the issues with sampling is that it's not perfect and there are errors. This is where the video lost me because I am not an electrical engineer. We'll try to sum it up here. There is an error that is induced because of the sampling rate and that error can show up in the audio spectrum that you can hear. Filtering can reduce this but that too affects the sound as well. The solution is that you can sample at a higher frequency. Hi res files are sampled at 192Khz. That means technically it is capable of capturing frequencies up to 96Khz which is way above what any human can hear. However, there is a benefit in that the errors that are created fall outside what the human can hear. Thus leaving you with a more pure recording of the original signal. There is a price to be paid for this, the file size is much bigger. Bit Depth The other element to this discussion is bit depth. The bits store the amplitude of the sound wave. CDs use 16 bits which equate to 65536 possible values. Hi res files use 24 bits or 1,6777,216 possible values. If you think visually, consider a 16 bit color monitor vs a 24 bit color monitor. The 24 bit monitor will be able to display much finer color gradations and be less blocky. The audio version is that the sound will have finer detail. And it will be at ALL frequencies, more importantly, the ones us old people can actually hear. This to us is the best argument that can be made for Hi res files that we can see… or hear. At least mathematically. Does it Matter? Only you can be the judge of that. It really depends on the style of music you listen to. Is there subtlety in the frequencies that you can hear or is it just loud? Do you want to pay the higher price for hi res audio? Do you have enough storage for the files? Can your equipment play the music? Are you listening on good equipment, especially speakers? By the way, good equipment doesn't have to cost an arm and a leg. But it will cost more than a few hundred dollars. What environment are you listening in? To some there is no other way to enjoy music. To others it doesn't even matter. To us, it's in the middle. Sometimes it doesn't matter but on Friday night with a good bourbon it can be magical.
Listen as our Cisco Champions converse with Cisco’s Darryl Sladden about Cisco DNA Spaces as it expands the range of sensors beyond Wi-Fi and Bluetooth Low Energy (BLE) devices. Learn how you can deploy sensors, tags and beacons at scale to drive business outcomes across the enterprise. https://www.cisco.com/c/en/us/solutions/enterprise-networks/dna-spaces/index.html?dtid=opdcsnc001469 Cisco Champion hosts Shai Silberman (https://twitter.com/shaidom), San Jose State University, Director of Network Services Denise Donohoe (https://twitter.com/LadyNetwkr), Cisco, Systems Architect Guests Darryl Sladden (https://twitter.com/darrylsj), Cisco, Wireless Product Line Manager Moderator Amilee San Juan (https://twitter.com/amileesan1), Cisco, Technical Influencer Marketing and Cisco Champions Program
Listen as our Cisco Champions converse with Cisco’s Darryl Sladden about Cisco DNA Spaces as it expands the range of sensors beyond Wi-Fi and Bluetooth Low Energy (BLE) devices. Learn how you can deploy sensors, tags and beacons at scale to drive business outcomes across the enterprise. https://www.cisco.com/c/en/us/solutions/enterprise-networks/dna-spaces/index.html?dtid=opdcsnc001469 Cisco Champion hosts Shai Silberman (https://twitter.com/shaidom), San Jose State University, Director of Network Services Denise Donohoe (https://twitter.com/LadyNetwkr), Cisco, Systems Architect Guests Darryl Sladden (https://twitter.com/darrylsj), Cisco, Wireless Product Line Manager Moderator Amilee San Juan (https://twitter.com/amileesan1), Cisco, Technical Influencer Marketing and Cisco Champions Program
Nodle launched a contact tracing app, Coalition that enables community-driven contact tracing through a privacy-by-design approach. The app utilizes secure Bluetooth Low Energy (BLE) and cryptography to protect a user’s identity by generating random anonymous IDs. Coalition’s Whisper Tracing, an open and privacy-first protocol, randomizes a user’s device identity and does not share identifiable information with the cloud. No personal data is ever asked for, collected, or shared. View Coalition’s Whisper Tracing research paper, reviewed by Nodle peers and cryptographers from MIT, Stanford, USC, and Oxford University.ANDROIDThe app uses a phone’s Bluetooth connection to note the other phones nearby. If a user nearby is later infected and had self-reported their status to the Coalition app, then anyone who passed that person or spent time with them will get a notification that they have been exposed.ANDROIDAppleThe Nodle Cash app, dubbed The Citizen Network, is a community of smartphones that act as secure nodes — or hotspots — to seamlessly connect and locate physical assets, lost pets or stolen items, and provide valuable data insights for the Internet of Things. With close to 50 Billion devices, Nodle offers industrial companies, consumer electronic manufacturers, and Smart Cities an eco-friendly software infrastructure solution.Nodle Cash app users are able to earn cryptocurrency through everyday activities such as walking, exploring their surroundings, and traveling along their regular commute. Smartphones running the Nodle Cash app will be able to pick up signals from any IoT connected devices. These signals also called beacons, are tiny bits of valuable information transmitted to their owners in exchange for Nodle Cash. The more valuable the beacon, the more cryptocurrency rewarded to the user. This is seamless for the smartphone user who earns Nodle Cash.MICHA'S BACKGROUNDAt age 8, Micha taught himself how to code on a flight simulator in Basic on a Zenith PC that his father was using for accounting purposes. Subsequently, he wrote his first games on a Texas Instrument TI 99 4A, ATARI 512ST, and Amiga 500. Micha has been a pioneer in VoIP and launched several telecommunications services in the past decade. He enabled Skype to start SkypeIn and SkypeOut, the innovation that scaled up its monetization and other premium Skype services. In 2011, Micha co-founded Open Garden to build a new generation of mobile network leveraging the smartphone infrastructure. Open Garden is the creator of FireChat, the first off-the-grid messaging app, leveraging peer-to-peer mesh networking. ----more----INSTAGRAMOFFICIAL WEBSITE YOUTUBESPOTIFYIn a quiet North Carolina town 22 miles south of Raleigh, as a young 9-year-old girl, Paige King Johnson spent her summers under the crepe myrtles imitating the styles of Loretta, Patsy, Waylon, and Merle. Having a grandpa as her biggest fan also meant receiving the gift of her first guitar – a baby Taylor - and enrolling in lessons. After her grandpa passed, the bright-eyed dreamer carried on his memory by taking her newfound discovery to local fairs, festivals, and any other stage she was allowed to stand on. As she grew older, Johnson added “opening act” to her resume, supporting chart-topping artists like Scotty McCreery, Neal McCoy, Luke Pell, and James Otto. And with high school graduation came the realization that this was more than a hobby. The Angier native traded in horse pastures and back roads for the bright lights of Music City in 2015. Upon starting school at Belmont University for Music Business, Johnson honed in on the magic that had heavily influenced her as a child: the art of storytelling through songwriting.“I started finding my own voice through writing, becoming more confident, and owning the fact that my personal feelings and experiences were worth talking about, singing about, and putting on paper,” Johnson reflects.
Nilay Patel talks with The Verge's Adi Robertson, Casey Newton, and Nicole Wetsman about Apple and Google announcing a system for tracking the spread of the new coronavirus, allowing users to share data through Bluetooth Low Energy (BLE) transmissions and approved apps from health organizations. Links: Apple and Google are building a coronavirus tracking system into iOS and Android What is contact tracing? Why Bluetooth apps are bad at discovering new cases of COVID-19 Learn more about your ad choices. Visit megaphone.fm/adchoices
On this episode of the #AskIoT series, we sit down with Mohammad Afaneh, the Founder of Novel Bits, to discuss Bluetooth Low Energy (BLE), how it fits into the IoT connectivity landscape, and how it compares to Bluetooth 5 and Bluetooth mesh. We also discuss common use cases for BLE, the best way to decide between different wireless technologies for an IoT solution, and how we think 5G will impact the connectivity landscape within the Internet of Things. For those of you who are unfamiliar, Novel Bits is the leading resource for those who want to learn about BLE and develop real-life BLE applications. Mohammad was kind enough to share a discount code (IFAPODCAST30) exclusively with the IoT For All audience to Novel Bits' Introduction to Bluetooth Low Energy and Bluetooth 5 & Bluetooth Low Energy: A Developer's Guide eBooks (below) If you want to connect directly with Mohammad, you can check him out on [Twitter][1] or [LinkedIn][2] Have a question you want to hear answered on a future episode of the #AskIoT series? Tweet to us at @iotforall or use the hashtag #AskIoT and we will do our best to feature it in an upcoming episode! Links mentioned: Novel Bits Intro to Bluetooth Low Energy Book (Use code: IFAPODCAST30 for discount) Bluetooth 5 & Bluetooth Low Energy: A Developer’s Guide - Book (Use code: IFAPODCAST30 for discount) Follow Us: Our Website Twitter Facebook Medium
Radical Server Unit Vienna im Metalab; Matrix decentralised communication; Matrix client Riot; Gitter chat and networking platform; GitLab; ownCloud; Nextcloud; Collabora Online Development Edition; ONLYOFFICE Document Server; Nextcloud ONLYOFFICE integration app; WebRTC mit Nextcloud und Spreed.ME; STUN und TURN; Docker Meetup Vienna; Play with Docker; LXC Linux Containers; Monit; Zabbix; netdata; Google Wifi; Ubiquiti UniFi; Puck.js; Web Bluetooth API; Bluetooth Low Energy (BLE); Web MIDI API; Computerphile; Numberphile; Google Open Source; Zopfli; Perceptual JPEG encoder Guetzli; The Changelog Podcast "Open Source at Google"; The Data Center Mural Project; Zeitsprung Podcast "ZS78: Eine kurze Geschichte der Sommerzeit"; Thimbleweed Park; SimCity BuildIt; Township; Hill Climb Racing; Mini Metro; Alto's Adventure; Volltext-Suche; Postgres trigram indices; Postgres fulltext search; Solr; Elasticsearch; SearchEx; Sphinx; Panoptikum - Suche nach "it keller"; Sass; IT infrastructure automation; Ansible; Puppet; Chef; Burned Your Tweet; Make Trump Tweets Eight Again Gäste: Stefan und Ulrich
In this episode of the Ham Radio 360 Workbench, George and Jeremy continue the conversation on communicating with Microcontrollers and Single Board Computers. They deep dive on wireless ways of communicating from direct RF links to WiFi. Autodesk Eagle has moved to a subscription based license - http://www.autodesk.com/products/eagle/overview News on Autdesk Eagle Subscription Terms - http://forums.autodesk.com/t5/eagle-forum/a-path-forward-for-the-make-license-a-step-up-for-standard/m-p/6823182#U6823182 West Mountain Radio Powergate - http://www.westmountainradio.com/product_info.php?products_id=pg40s Low Loss Powergate - http://ki0bk.no-ip.com/~pwrgate/LLPG/Site/LLPG.html KF7IJZ’s Test of the rev 1 DC Power Board - https://www.youtube.com/watch?v=fgGJoE9QDCQ Point to Point RFM69: https://www.sparkfun.com/products/12823 Ax.25 for RFM69/Arduino: https://github.com/kicksat/ax25 Adafruit RFM69 Devices: https://www.adafruit.com/?q=rfm69& SparkFun RFM69 Devices: https://www.sparkfun.com/search/results?term=rfm69 802.15.4 / Zigbee / DigiMesh XBee: http://www.zigbee.org DigiMesh XBee Products: https://www.sparkfun.com/search/results?term=xbee https://www.digikey.com/products/en/rf-if-and-rfid/rf-transceiver-modules/872?k=xbee&k=&pkeyword=xbee&pv1989=0&FV=fff40036%2Cfff803ec%2Cffe00368%2Cfffc025a&mnonly=0&newproducts=0&ColumnSort=0&page=1&quantity=0&ptm=0&fid=0&pageSize=25 LoRa - https://www.lora-alliance.org LoRa Ham - https://github.com/travisgoodspeed/loraham Adafruit LoRa devices: https://www.adafruit.com/?q=lora& Argent Data Systems: https://www.argentdata.com/catalog/ Bluetooth Low Energy (BLE) https://www.adafruit.com/?q=ble& https://www.sparkfun.com/search/results?term=ble WiFi Particle Photon: https://www.particle.io/products/hardware/photon-wifi-dev-kit Adafruit Photon: https://www.adafruit.com/?q=photon& Arduino MKR1000: https://www.arduino.cc/en/Main/ArduinoMKR1000 Adafruit WiFi Micros: https://www.adafruit.com/?q=wifi& Sparkfun WiFi Micros: https://www.sparkfun.com/search/results?term=wifi Celluar/GSM Particle Electron: https://www.particle.io/products/hardware/electron-cellular-dev-kit https://www.adafruit.com/products/3234 Adafruit FONA GSM Boards: https://www.adafruit.com/products/3234?q=gsm& Sparkfun GSM Option: https://www.sparkfun.com/search/results?term=GS If This Then That (IFTTT): https://ifttt.com
We learn how Visual Light Communication (VLC) can be combined with Bluetooth Low Energy (BLE) and integrate with the Internet of Things (IoT) to enable new disruptive functionality. Greg Carter, Acuity Brands General Manager for IoT explains this and why the largest provider of lighting systems in the USA is so well positioned to drive adoption of these technologies. See acast.com/privacy for privacy and opt-out information.
What is a beacon? What does Bluetooth Low Energy (BLE) have to do with beacons? What can you do with a beacon from Facebook? Today Sandro answers these questions and shares his thoughts on this newish technology. You can request your beacon from Facebook at http://placetips.fb.com/beacons
The iPhreaks are going to the Microsoft Build Conference! Come see the panel in San Francisco from March 29th - April 1st! 01:47 - Heiko Behrens Introduction Twitter GitHub Blog 02:25 - Daniel Rodríguez Troitiño GitHub 02:46 - Pebble vs The Apple Watch @pebbledev 07:06 - The Pebble Development Experience Where To? 10:49 - Accelerometer Functions 11:48 - JavaScript; JavaScriptCore Pebble.js 17:42 - Device Capabilities Apple Notification Center Service (ANCS) Notifier App 21:02 - Bluetooth 22:24 - Notifications 30:59 - The Developer Experience (Cont’d) 31:45 - Running/Sports Apps Runkeeper Bluetooth Low Energy (BLE) 33:46 - Apps and Screens/Watchfaces UITableView UIkit 39:56 - Getting Started with Building an App for Pebble developer.pebble.com 41:59 - Shipping an App that Allows Users to Download Other Apps 47:36 - Waterproof? Picks Ono (Andrew) Mike Ash: Friday Q&A 2016-03-04: Swift Asserts (Andrew) Smart Go (Andrew) 2016 Minnesota State High School All Hockey Hair Team (Jaim) The Best Podcast Rap Video (Chuck) PaintCode (Heiko) Jetbrains: The unicorn Silicon Valley doesn't like to talk about (Heiko) How to Move to Germany if Donald Trump is Elected President (Heiko) Greg Wilson: What We Actually Know About Software Development, and Why We Believe It’s True (Daniel) Ruby Rogues Episode #184: What We Actually Know About Software Development and Why We Believe It's True with Greg Wilson and Andreas Stefik (Chuck)
The iPhreaks are going to the Microsoft Build Conference! Come see the panel in San Francisco from March 29th - April 1st! 01:47 - Heiko Behrens Introduction Twitter GitHub Blog 02:25 - Daniel Rodríguez Troitiño GitHub 02:46 - Pebble vs The Apple Watch @pebbledev 07:06 - The Pebble Development Experience Where To? 10:49 - Accelerometer Functions 11:48 - JavaScript; JavaScriptCore Pebble.js 17:42 - Device Capabilities Apple Notification Center Service (ANCS) Notifier App 21:02 - Bluetooth 22:24 - Notifications 30:59 - The Developer Experience (Cont’d) 31:45 - Running/Sports Apps Runkeeper Bluetooth Low Energy (BLE) 33:46 - Apps and Screens/Watchfaces UITableView UIkit 39:56 - Getting Started with Building an App for Pebble developer.pebble.com 41:59 - Shipping an App that Allows Users to Download Other Apps 47:36 - Waterproof? Picks Ono (Andrew) Mike Ash: Friday Q&A 2016-03-04: Swift Asserts (Andrew) Smart Go (Andrew) 2016 Minnesota State High School All Hockey Hair Team (Jaim) The Best Podcast Rap Video (Chuck) PaintCode (Heiko) Jetbrains: The unicorn Silicon Valley doesn't like to talk about (Heiko) How to Move to Germany if Donald Trump is Elected President (Heiko) Greg Wilson: What We Actually Know About Software Development, and Why We Believe It’s True (Daniel) Ruby Rogues Episode #184: What We Actually Know About Software Development and Why We Believe It's True with Greg Wilson and Andreas Stefik (Chuck)