Tag Archives: art

Quick Fix — a vending machine for likes and followers

Post Syndicated from Liz Upton original https://www.raspberrypi.org/blog/quick-fix-a-vending-machine-for-likes-and-followers/

Sometimes we come across a project that just scores a perfect 10 on all fronts. This is one of them: an art installation using Raspberry Pi that has something interesting to say, does it elegantly, and is implemented beautifully (nothing presses our buttons like a make that’s got a professionally glossy finish like this).

Quick Fix is a vending machine (and art installation) that sells social media likes and followers. Drop in a coin, enter your social media account name, and an army of fake accounts will like or follow you. I’ll leave the social commentary to you. Here’s a video from the maker, Dries Depoorter:

Quick Fix – the vending machine selling likes and followers

Quick Fix in an interactive installation by Dries Depoorter. The artwork makes it possible to buy followers or likes in just a few seconds. For a few euros you already have 200 of likes on Instagram. “Quick Fix “is easy to use. Choose your product, pay and fill in your social media username.

There’s a Raspberry Pi 3B+ in there, along with an Arduino, powering a coin acceptor and some I2C LCD screens. Then there’s a stainless steel heavy-duty keyboard, which we’re lusting after (a spot of Googling unearthed this, which appears to be the same thing, if you’re in the market for a panel-mounted beast of a keyboard).

This piece was commissioned by Pixelache, a cultural association from Helsinki, whose work looks absolutely fascinating if you’ve got a few minutes to browse. Thanks to them and to Dries Depoorter — I have a feeling this won’t be the last of his projects we’re going to feature here.

The post Quick Fix — a vending machine for likes and followers appeared first on Raspberry Pi.

Make art with LEDs | HackSpace magazine #16

Post Syndicated from Alex Bate original https://www.raspberrypi.org/blog/make-art-with-leds-hackspace-16/

Create something beautiful with silicon, electricity, your endless imagination, and HackSpace magazine issue 16 — out today!

HackSpace magazine 16

LEDs are awesome

Basically, LEDs are components that convert electrical power into light. Connect them to a power source (with some form of current limiter) in the right orientation, and they’ll glow.

Each LED has a single colour. Fortunately, manufacturers can pack three LEDs (red, green, and blue) into a single component, and varying the power to each LED-within-an-LED produces a wide range of hues. However, by itself, this type of colourful LED is a little tricky to control: each requires three inputs, so a simple 10×10 matrix would require 300 inputs. But there’s a particular trick electronics manufacturers have that make RGB LEDs easy to use: making the LEDs addressable!

An RGB LED

Look: you can clearly see the red, green, and blue elements of this RGB LED

Addressable LEDs

Addressable LEDs have microcontrollers built into them. These aren’t powerful, programmable microcontrollers, they’re just able to handle a simple communications protocol. There are quite a few different types of addressable LEDs, but two are most popular with makers: WS2812 (often called NeoPixels) and APA102 (often called DotStars). Both are widely available from maker stores and direct-from-China websites. NeoPixels use a single data line, while DotStars use a signal and a clock line. Both, however, are chainable. This means that you connect one (for NeoPixels) or two (for DotStars) pins of your microcontroller to the Data In connectors on the first LED, then the output of this LED to the input of the next, and so on.

Exactly how many LEDs you can chain together depends on a few different things, including the power of the microcontroller and the intended refresh rate. Often, though, the limiting factor for most hobbyists is the amount of electricity you need.

Which type to use

The big difference between NeoPixels and DotStars comes down to the speed of them. LEDs are made dimmer by turning them off and on very quickly. The proportion of the time they’re off, the dimmer they are. This is known as pulse-width modulation (PWM). The speed at which this blinking on and off can have implications for some makes, such as when the LEDs are moving quickly.

NeoPixels

  • Cheap
  • Slowish refresh rate
  • Slowish PWM rate

DotStars

  • More expensive
  • Faster refresh rate
  • Fast PWM rate
NeoPixels moving in the dark

As a NeoPixel is moved through a long-exposure photograph, you can see it blink on and off. DotStars – which have a faster PWM rate – avoid this.

Safety first!

HackSpace magazine’s LED feature is just a whistle-stop guide to the basics of powering LEDs — it’s not a comprehensive guide to all things power-related. Once you go above a few amperes, you need to think about what you’re doing with power. Once you start to approach double figures, you need to make sure you know what you’re doing and, if you find yourself shopping for an industrial power supply, then you really need to make sure you know how to use it safely.

Read more

Read the rest of the exclusive 14-page LED special in HackSpace magazine issue 16, out today. Buy your copy now from the Raspberry Pi Press store, major newsagents in the UK, or Barnes & Noble, Fry’s, or Micro Center in the US. Or, download your free PDF copy from the HackSpace magazine website.

HackSpace magazine 16 Front Cover

We’re also shipping to stores in Australia, Hong Kong, Canada, Singapore, Belgium, and Brazil, so be sure to ask your local newsagent whether they’ll be getting HackSpace magazine.

Subscribe now

Subscribe to HackSpace on a monthly, quarterly, or twelve-month basis to save money against newsstand prices.

Twelve-month print subscribers get a free Adafruit Circuit Playground Express, loaded with inputs and sensors and ready for your next project. Tempted?

The post Make art with LEDs | HackSpace magazine #16 appeared first on Raspberry Pi.

Play multiple sounds simultaneously with a Raspberry Pi

Post Syndicated from Alex Bate original https://www.raspberrypi.org/blog/multiple-sounds-simultaneously-raspberry-pi/

Playing sound through a Raspberry Pi is a simple enough process. But what if you want to play multiple sounds through multiple speakers at the same time? Lucky for us, Devon Bray figured out how to do it.

Play multiple audio files simultaneously with Raspberry Pi

Artist’s Website: http://www.saradittrich.com/ Blog Post: http://www.esologic.com/multi-audio/ Ever wanted to have multiple different sound files playing on different output devices attached to a host computer? Say you’re writing a DJing application where you want one mix for headphones and one for the speakers.

Multiple audio files through multiple speakers

While working with artist Sara Dittrich on her These Blobs installation for Provincetown Art Association and Museum, Devon was faced with the challenge of playing “8 different mono sound files on 8 different loudspeakers”. Not an easy task, and one that most online tutorials simply do not cover.

These Blobs - Sarah Dittrich

These Blobs by Sara Dittrich

Turning to the sounddevice Python library for help, Devon got to work designing the hardware and code for the project.

The job was to create some kind of box that could play eight different audio files at the same time on eight different unpowered speakers. New audio files had to be able to be loaded via a USB thumb drive, enabling the user to easily switch files without having to use any sort of UI. Everything also had to be under five inches tall and super easy to power on and off.

Devon’s build uses a 12v 10 amp power supply controlled via a DC/DC converter. This supply powers the Raspberry Pi 3B+ and four $15 audio amplifiers, which in turn control simple non-powered speakers designed for use in laptops. As the sound is only required in mono, the four amplifiers can provide two audio tracks each, each track using a channel usually reserved for left or right audio output.

A full breakdown of the project can be seen in the video above, with more information available on Devon’s website, including the link to the GitHub repo.

And you can see the final project in action too! Watch a video of Sara Dittrich’s installation below, and find more of her work on her website.

These Blobs

Poem written and recorded by Daniel Sofaer, speakers, conduit, clay, spray paint, electrical components; 4′ x 4′ x 5′ ft.

 

The post Play multiple sounds simultaneously with a Raspberry Pi appeared first on Raspberry Pi.

Adding the Pi to Picasso with wireless digital graffiti

Post Syndicated from Alex Bate original https://www.raspberrypi.org/blog/wiimote-graffiti-raspberry-pi/

It looks like the Nintendo Wii Remote (Wiimote) has become a staple in many maker toolkits! Case in point: with the help of a Raspberry Pi and the cwiid Python library, David Pride turned the popular piece of tech into a giant digital graffiti spraycan.

Raspberry Pi-powered Nintento Wiimote digital art

Using the Wiimote with a Raspberry Pi

While it’s no longer being updated and supported, the cwiid library is still a handy resource for creators who want to integrate the Wiimote with their Raspberry Pi.

Raspberry Pi-powered Nintento Wiimote digital art

Over the years, makers have used the Wiimote to control robots, musical instruments, and skateboards; the accessibility of the library plus the low cost and availability of the remote make using this tool a piece of cake…or pie, in this instance.

Digital graffiti

Using aWiimote, a Wii Sensor Bar, and a large display, David Pride hacked his way to digital artistry wonderment and enabled attendees of the Open University Knowledge Makers event to try their hand at wireless drawing. It’s kinda awesome.

OK, it’s all kinds of awesome. We really like it.

Digital graffiti ingredients

To construct David’s digital graffiti setup, you’ll need:

  • A Raspberry Pi
  • A Nintendo Wii Remote and a Wii Sensor Bar
  • A power supply and DC/DC power converter
  • A large display, e.g. a TV or projector screen
  • A 30mm × 30mm mirror and this 3D-printed holder

Putting it all together

David provides the step-by-step instructions for setting up the Wiimote and Raspberry Pi on his website, including a link to the GitHub repository with the complete project code. The gist of the build process is as follows:

Raspberry Pi-powered Nintento Wiimote digital art

After installing the cwiid library on the Raspberry Pi, David connected the Pi to the Wiimote via Bluetooth. And after some digging into the onboard libraries of the remote itself, he was able to access the infrared technology that lets the remote talk to the Sensor Bar.

Raspberry Pi-powered Nintento Wiimote digital art

The 3D-printed holder with which David augmented the Wiimote lets the user hold the remote upright like a spray can, while the integrated mirror reflects the IR rays so the Sensor Bar can detect them.

Raspberry Pi-powered Nintento Wiimote digital art

The Sensor Bar perceives the movement of the Wiimote, and this data is used to turn the user’s physical actions into works of art on screen. Neat!

If you’ve used the Nintendo Wiimote for your Raspberry Pi projects, let us know. And, speaking of the Wii, has anyone hacked their Balance Board with a Pi?

On a completely unrelated note…

How cool is this?!

The post Adding the Pi to Picasso with wireless digital graffiti appeared first on Raspberry Pi.

Елхата у Иванови, времето, животът

Post Syndicated from nellyo original https://nellyo.wordpress.com/2018/12/01/%D0%B5%D0%BB%D1%85%D0%B0%D1%82%D0%B0-%D1%83-%D0%B8%D0%B2%D0%B0%D0%BD%D0%BE%D0%B2%D0%B8-%D0%B2%D1%80%D0%B5%D0%BC%D0%B5%D1%82%D0%BE-%D0%B6%D0%B8%D0%B2%D0%BE%D1%82%D1%8A%D1%82/

IMG_2969-0

На 25 ноември в галерия Структура беше открит   Пети фестивал-лаборатория NEDRAma International, като тази година темата на фестивала е  Медии и свобода на избора.

Фестивалът започна с Елхата у Иванови,  съвместна творческа акция на театър “Реплика”, режисьора Javor Gardev / Явор Гърдев и визуалния артист   Teodora Simova. Според анонса “тази творческа акция използва за своя основа едноименния драматургичен опус на А. Введенски — кратък протоабсурдистки текст, писан в края на 30-те години на XX век”, преводът е на Георги Рупчев и е публикуван преди време в Ах, Мария.  Введенски заедно с Хармс е представител на ОБЭРИУ (Объединение Реального Искусства), пред нас е обэриутска драматургия.

Сюжетът: става дума за престъпление и наказание, за Явор Гърдев това е  углавно действо.  Зрителите са оградени с характерните за местопрестъпление полицейски ленти – това е местопрестъпление: в навечерието на Рождество, докато родителите са на театър, бавачката убива едно от децата с брадва,  след което е арестувана и осъдена на смърт.  Нейният годеник с приятели идва от гората с коледна елха,   родителите също се връщат –  и всички умират.

Елхата у Иванови не е разказ за Иванови, такива герои няма. Децата в пиесата са от 1 до 82 години, действието се развива в един ден, но има време за цял съдебен процес, а на финала става ясно, че за времето на действието дървосекачът Фьодор е научил латински и започва да го преподава в училище.

Времето, смъртта и Бог са централни теми за Введенски. Двамата с  Хармс работят върху спектакъл  Моя мама вся в часах, Елхата у Иванови също е в часах, а по-късно в поезията си (Кругом возможно Бог) Введенски казва  :

Вбегает мёртвый господин

и молча удаляет время.

И пак там – за съперничеството на смъртта и времето:

Мне всё чаще и чаще
кажется странным,что время еще движется,что оно еще дышит.
Неужели время сильнее смерти.

Елхата у Иванови е за Рождество, но Рождеството в пиесата е крайно условно, а рождествената песничка е особена:

 …молитесь колесу,
оно круглее всех!

Отново след Квартет Явор Гърдев включва медията в разказа – за изграждане на цялата пред-Рождественска условност. Паралелно с актьорската игра  на голям екран изображения рамкират или позиционират действието. Изображенията се сменят бързо,   разказите са паралелни, дори брадвите в разказите са паралелни – за момиченцето и за елхичката – човек едва смогва  да следи  посланията, трябва време да разбереш какво виждаш,   а разказите се застигат и допълват,  не е забравен и Джон Ленън –

God is a concept
By which we measure
Our pain
I’ll say it again
God is a concept
By which we measure
Our pain
Барбара Крюгер  (Your body is a battleground) дава голямата рамка на диалозите, а  в светлинния  надпис, под който завършва акцията –  
Too late to die young
отново присъстват времето и смъртта.
Введенски  пише в началото на последната девета картина:  защо да се огорчаваме, че са убили някого, като всички умират:
Петя Перов. Така ми се иска да умра. Просто страст. Умирам. Умирам. А така, умрях.
Нина Серова. И аз. Ах елхичке, елхичке. Ах елхичке, елхичке. Ах елхичке. Е, това е всичко. Умрях.
Пузирьов-баща. И те също умряха. Разправят, че дърварят Фьодор се изучил и станал учител по латински език. Какво става с мене. Как ми  прескочи сърцето. Нищо не виждам. Умирам.
Пузирьова-майка. Какви ги приказваш. Ето виждаш ли, човек простонароден, а постигна своето. Боже, колко тъжна ни излезе елхата. (Пада и умира).
Ако трябва да бъдем точни  – и въпреки авторовото твърдение в текста – умират всички без Варя Петрова – което може да се установи само при внимателен прочит на пиесата. Пишем и това на сметката на абсурдите.
Елхата у Иванови е създадена в края на 30-те години, в мрачно време – и затова критиците виждат в текста и реквием за руската цивилизация.
Текстът за пръв път е игран през 1987 г. в Москва.

malevich
Малевич, Лесоруб.
1913

Beautiful and inspiring plinky-plonky conductivity

Post Syndicated from Alex Bate original https://www.raspberrypi.org/blog/bare-conductive-installation-hwan-yun/

Recently shared by Bare Conductive, Hwan Yun‘s interactive installation, Intuition, uses a Raspberry Pi and Bare Conductive tech to transport you to the calm wonder of Icelandic nature.

Intuition (2017)

Interactive sound installation electric paint on paper Listhús Gallery

Incorporation Bare Conductive

Bare Conductive’s water-based Electric Paint allows users to incorporate safe conductivity into their projects. With the use of a Raspberry Pi 3 and the brand’s Touch Board and Pi Cap, this conductivity can be upgraded to take distance, as well as touch, into consideration.

bare conductive Hwan Yun Raspberry Pi

Intuition

For his installation, Hwan created several patterns on paper using Electric Paint, with six patterns connected to the Touch Board and a further six to the Pi Cap.

This irregularity allows users to experiment, further exploring the sounds of nature that inspired the installation.

bare conductive Hwan Yun Raspberry Pi

The sounds themselves are less actual recordings and more a tribute to the way in which Hwan believes the picturesque beauty of the island communicates within itself.

Getting done with #interactive #soundinstallation for #contemporaryart #exhibition. Using #bareconductive

7 Likes, 1 Comments – HWANYUN (@_hwanyun_) on Instagram: “Getting done with #interactive #soundinstallation for #contemporaryart #exhibition. Using…”

Follow Hwan

If you’d like to see more installations from Hwan Yun, including behind-the-scenes posts from the creation of Intuition, be sure to follow him on Instagram. You can also learn more about his past and future projects on his website.

Bare Conductive

Bare Conductive products are available through many of our Approved Resellers, as well as the Bare Conductive website. As mentioned, their Conductive paint is not only water-based but also non-toxic, making it an ideal addition to any maker cupboard. For more inspiration when using Bare Conductive products, check out their Make page.

Low-tech cardboard robot buggy

And for more Bare Conductive products and Raspberry Pi makery, check out this low-tech Raspberry Pi robot by Clément Didier, previously covered on our blog.

The post Beautiful and inspiring plinky-plonky conductivity appeared first on Raspberry Pi.

Echoing the Newcastle of yesteryear with Pi-powered whistles

Post Syndicated from Alex Bate original https://www.raspberrypi.org/blog/steve-messam-whistle/

Artist Steve Messam is celebrating the North of England’s historic role in railway innovation with 16 Raspberry Pi–controlled steam engine whistles around the city of Newcastle.

Steve Messam Raspberry Pi Whistle The Great Exhibition of the North

The Great Exhibition of the North

The Great Exhibition of the North is a summer-long celebration of the pioneering spirit of the North of England. Running over 80 days, the event will feature live performances, exhibitions, artworks, and displays of innovation from 22 June – 9 September 2018.

As part of the celebration, artist Steve Messam is introducing his Whistle project in Newcastle in honour of the North’s part in the innovation of the railway. “Listen out for the evocative sound of steam engine whistles once again echoing across the city of Newcastle,” states the project page of The Great Exhibition of the North. “The sound installation is designed to recall the role of the North in engineering and the invention of the railway, sparking memories and forging links between past and present.”

Whistle

Steve first developed the idea for Whistle as a pitch to the Loch Lomond and The Trossachs National Park back in 2014. He originally wanted to install a line of whistles along the 22-mile course of the old railway line between Callander and Glen Dochart, with whistles sounding off in one-second intervals, recreating the sound of the old line.

Below is a very nice roundup of the initial 2-mile test run, including the original whistle designs.

Steve Messam | Loch Lomond and The Trossachs National Park

The Artistic Reflections publication will be available from June 2017 For more information, or to order a copy, please contact: [email protected] Designed by Marco Scerri, edited by Susan Christie and supported by Creative Scotland Steve Messam Loch Lomond & The Trossachs National Park 186,340 hectares Project website: www.mistandmountains.wordpress.com Loch Lomond & The Trossachs National Park was designated in 2002 and covers 720 square miles of outstanding landscape adjacent to the central belt of Scotland.

Fast forward to 2018 and The Great Exhibition of the North, where Steve is surrounding the city of Newcastle with 16 newly casted brass whistles. The new installation follows the old city wall of Newcastle, with each whistle sounding at exactly 1pm on every day of the exhibition.

Steve Messam Raspberry Pi Whistle The Great Exhibition of the North

Original plans for the whistle

The William Lane Foundry cast the 16 whistles to match a design by William Armstrong based on measurements of an original whistle held by the North East Locomotive Preservation Group.

Steve Messam Raspberry Pi Whistle The Great Exhibition of the North

Whistle casting at the William Lane Foundry

Each whistle is equipped with a Raspberry Pi that controls the release of compressed air through the brass to replicate the sound of a steam whistle.

Steve Messam on Twitter

Another roof, another day of testing #whistle for #getnorth2018 https://t.co/j5Yszx1Crl

Each unit is powered by solar panels and registers the time from the National Physical Laboratory’s atomic clock in London to ensure accurate timings. As a fallback in case of WiFi issues, the whistles are also linked to the clock set on the Raspberry Pi itself.

Steve Messam on Twitter

The more I think about it the more I really like that ‘Whistle’ only really exists for about 20 seconds each day.

For more information on Whistle, check out this wonderful article by the Teesdale Mercury. You can also find out more about Steve Messam projects, such as his paper bridge that can support the weight of a Land Rover, on his website or by following his Twitter account.

Steve Messam Raspberry Pi Whistle The Great Exhibition of the North

A Whistle-stop tour of Newcastle

And if you’re in Newcastle while The Great Exhibition of the North is running and you spot one of the 16 whistles, be sure to tag us in your pics and videos on social media so we can see it in action.

The post Echoing the Newcastle of yesteryear with Pi-powered whistles appeared first on Raspberry Pi.

AWS Online Tech Talks – June 2018

Post Syndicated from Devin Watson original https://aws.amazon.com/blogs/aws/aws-online-tech-talks-june-2018/

AWS Online Tech Talks – June 2018

Join us this month to learn about AWS services and solutions. New this month, we have a fireside chat with the GM of Amazon WorkSpaces and our 2nd episode of the “How to re:Invent” series. We’ll also cover best practices, deep dives, use cases and more! Join us and register today!

Note – All sessions are free and in Pacific Time.

Tech talks featured this month:

 

Analytics & Big Data

June 18, 2018 | 11:00 AM – 11:45 AM PTGet Started with Real-Time Streaming Data in Under 5 Minutes – Learn how to use Amazon Kinesis to capture, store, and analyze streaming data in real-time including IoT device data, VPC flow logs, and clickstream data.
June 20, 2018 | 11:00 AM – 11:45 AM PT – Insights For Everyone – Deploying Data across your Organization – Learn how to deploy data at scale using AWS Analytics and QuickSight’s new reader role and usage based pricing.

 

AWS re:Invent
June 13, 2018 | 05:00 PM – 05:30 PM PTEpisode 2: AWS re:Invent Breakout Content Secret Sauce – Hear from one of our own AWS content experts as we dive deep into the re:Invent content strategy and how we maintain a high bar.
Compute

June 25, 2018 | 01:00 PM – 01:45 PM PTAccelerating Containerized Workloads with Amazon EC2 Spot Instances – Learn how to efficiently deploy containerized workloads and easily manage clusters at any scale at a fraction of the cost with Spot Instances.

June 26, 2018 | 01:00 PM – 01:45 PM PTEnsuring Your Windows Server Workloads Are Well-Architected – Get the benefits, best practices and tools on running your Microsoft Workloads on AWS leveraging a well-architected approach.

 

Containers
June 25, 2018 | 09:00 AM – 09:45 AM PTRunning Kubernetes on AWS – Learn about the basics of running Kubernetes on AWS including how setup masters, networking, security, and add auto-scaling to your cluster.

 

Databases

June 18, 2018 | 01:00 PM – 01:45 PM PTOracle to Amazon Aurora Migration, Step by Step – Learn how to migrate your Oracle database to Amazon Aurora.
DevOps

June 20, 2018 | 09:00 AM – 09:45 AM PTSet Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tools – Learn how to set up a CI/CD pipeline for deploying containers using the AWS Developer Tools.

 

Enterprise & Hybrid
June 18, 2018 | 09:00 AM – 09:45 AM PTDe-risking Enterprise Migration with AWS Managed Services – Learn how enterprise customers are de-risking cloud adoption with AWS Managed Services.

June 19, 2018 | 11:00 AM – 11:45 AM PTLaunch AWS Faster using Automated Landing Zones – Learn how the AWS Landing Zone can automate the set up of best practice baselines when setting up new

 

AWS Environments

June 21, 2018 | 11:00 AM – 11:45 AM PTLeading Your Team Through a Cloud Transformation – Learn how you can help lead your organization through a cloud transformation.

June 21, 2018 | 01:00 PM – 01:45 PM PTEnabling New Retail Customer Experiences with Big Data – Learn how AWS can help retailers realize actual value from their big data and deliver on differentiated retail customer experiences.

June 28, 2018 | 01:00 PM – 01:45 PM PTFireside Chat: End User Collaboration on AWS – Learn how End User Compute services can help you deliver access to desktops and applications anywhere, anytime, using any device.
IoT

June 27, 2018 | 11:00 AM – 11:45 AM PTAWS IoT in the Connected Home – Learn how to use AWS IoT to build innovative Connected Home products.

 

Machine Learning

June 19, 2018 | 09:00 AM – 09:45 AM PTIntegrating Amazon SageMaker into your Enterprise – Learn how to integrate Amazon SageMaker and other AWS Services within an Enterprise environment.

June 21, 2018 | 09:00 AM – 09:45 AM PTBuilding Text Analytics Applications on AWS using Amazon Comprehend – Learn how you can unlock the value of your unstructured data with NLP-based text analytics.

 

Management Tools

June 20, 2018 | 01:00 PM – 01:45 PM PTOptimizing Application Performance and Costs with Auto Scaling – Learn how selecting the right scaling option can help optimize application performance and costs.

 

Mobile
June 25, 2018 | 11:00 AM – 11:45 AM PTDrive User Engagement with Amazon Pinpoint – Learn how Amazon Pinpoint simplifies and streamlines effective user engagement.

 

Security, Identity & Compliance

June 26, 2018 | 09:00 AM – 09:45 AM PTUnderstanding AWS Secrets Manager – Learn how AWS Secrets Manager helps you rotate and manage access to secrets centrally.
June 28, 2018 | 09:00 AM – 09:45 AM PTUsing Amazon Inspector to Discover Potential Security Issues – See how Amazon Inspector can be used to discover security issues of your instances.

 

Serverless

June 19, 2018 | 01:00 PM – 01:45 PM PTProductionize Serverless Application Building and Deployments with AWS SAM – Learn expert tips and techniques for building and deploying serverless applications at scale with AWS SAM.

 

Storage

June 26, 2018 | 11:00 AM – 11:45 AM PTDeep Dive: Hybrid Cloud Storage with AWS Storage Gateway – Learn how you can reduce your on-premises infrastructure by using the AWS Storage Gateway to connecting your applications to the scalable and reliable AWS storage services.
June 27, 2018 | 01:00 PM – 01:45 PM PTChanging the Game: Extending Compute Capabilities to the Edge – Discover how to change the game for IIoT and edge analytics applications with AWS Snowball Edge plus enhanced Compute instances.
June 28, 2018 | 11:00 AM – 11:45 AM PTBig Data and Analytics Workloads on Amazon EFS – Get best practices and deployment advice for running big data and analytics workloads on Amazon EFS.

[$] Advanced computing with IPython

Post Syndicated from jake original https://lwn.net/Articles/756192/rss

If you use Python, there’s a good chance you have heard of IPython, which provides an enhanced read-eval-print
loop (REPL) for Python. But there is more to IPython than just a more
convenient REPL. Today’s IPython comes with integrated libraries that turn
it into an assistant for several advanced computing tasks. We will look at
two of those tasks, using multiple languages and distributed computing, in
this article.

Build your own weather station with our new guide!

Post Syndicated from Richard Hayler original https://www.raspberrypi.org/blog/build-your-own-weather-station/

One of the most common enquiries I receive at Pi Towers is “How can I get my hands on a Raspberry Pi Oracle Weather Station?” Now the answer is: “Why not build your own version using our guide?”

Build Your Own weather station kit assembled

Tadaaaa! The BYO weather station fully assembled.

Our Oracle Weather Station

In 2016 we sent out nearly 1000 Raspberry Pi Oracle Weather Station kits to schools from around the world who had applied to be part of our weather station programme. In the original kit was a special HAT that allows the Pi to collect weather data with a set of sensors.

The original Raspberry Pi Oracle Weather Station HAT – Build Your Own Raspberry Pi weather station

The original Raspberry Pi Oracle Weather Station HAT

We designed the HAT to enable students to create their own weather stations and mount them at their schools. As part of the programme, we also provide an ever-growing range of supporting resources. We’ve seen Oracle Weather Stations in great locations with a huge differences in climate, and they’ve even recorded the effects of a solar eclipse.

Our new BYO weather station guide

We only had a single batch of HATs made, and unfortunately we’ve given nearly* all the Weather Station kits away. Not only are the kits really popular, we also receive lots of questions about how to add extra sensors or how to take more precise measurements of a particular weather phenomenon. So today, to satisfy your demand for a hackable weather station, we’re launching our Build your own weather station guide!

Build Your Own Raspberry Pi weather station

Fun with meteorological experiments!

Our guide suggests the use of many of the sensors from the Oracle Weather Station kit, so can build a station that’s as close as possible to the original. As you know, the Raspberry Pi is incredibly versatile, and we’ve made it easy to hack the design in case you want to use different sensors.

Many other tutorials for Pi-powered weather stations don’t explain how the various sensors work or how to store your data. Ours goes into more detail. It shows you how to put together a breadboard prototype, it describes how to write Python code to take readings in different ways, and it guides you through recording these readings in a database.

Build Your Own Raspberry Pi weather station on a breadboard

There’s also a section on how to make your station weatherproof. And in case you want to move past the breadboard stage, we also help you with that. The guide shows you how to solder together all the components, similar to the original Oracle Weather Station HAT.

Who should try this build

We think this is a great project to tackle at home, at a STEM club, Scout group, or CoderDojo, and we’re sure that many of you will be chomping at the bit to get started. Before you do, please note that we’ve designed the build to be as straight-forward as possible, but it’s still fairly advanced both in terms of electronics and programming. You should read through the whole guide before purchasing any components.

Build Your Own Raspberry Pi weather station – components

The sensors and components we’re suggesting balance cost, accuracy, and easy of use. Depending on what you want to use your station for, you may wish to use different components. Similarly, the final soldered design in the guide may not be the most elegant, but we think it is achievable for someone with modest soldering experience and basic equipment.

You can build a functioning weather station without soldering with our guide, but the build will be more durable if you do solder it. If you’ve never tried soldering before, that’s OK: we have a Getting started with soldering resource plus video tutorial that will walk you through how it works step by step.

Prototyping HAT for Raspberry Pi weather station sensors

For those of you who are more experienced makers, there are plenty of different ways to put the final build together. We always like to hear about alternative builds, so please post your designs in the Weather Station forum.

Our plans for the guide

Our next step is publishing supplementary guides for adding extra functionality to your weather station. We’d love to hear which enhancements you would most like to see! Our current ideas under development include adding a webcam, making a tweeting weather station, adding a light/UV meter, and incorporating a lightning sensor. Let us know which of these is your favourite, or suggest your own amazing ideas in the comments!

*We do have a very small number of kits reserved for interesting projects or locations: a particularly cool experiment, a novel idea for how the Oracle Weather Station could be used, or places with specific weather phenomena. If have such a project in mind, please send a brief outline to [email protected], and we’ll consider how we might be able to help you.

The post Build your own weather station with our new guide! appeared first on Raspberry Pi.

Flight Sim Company Threatens Reddit Mods Over “Libelous” DRM Posts

Post Syndicated from Andy original https://torrentfreak.com/flight-sim-company-threatens-reddit-mods-over-libellous-drm-posts-180604/

Earlier this year, in an effort to deal with piracy of their products, flight simulator company FlightSimLabs took drastic action by installing malware on customers’ machines.

The story began when a Reddit user reported something unusual in his download of FlightSimLabs’ A320X module. A file – test.exe – was being flagged up as a ‘Chrome Password Dump’ tool, something which rang alarm bells among flight sim fans.

As additional information was made available, the story became even more sensational. After first dodging the issue with carefully worded statements, FlightSimLabs admitted that it had installed a password dumper onto ALL users’ machines – whether they were pirates or not – in an effort to catch a particular software cracker and launch legal action.

It was an incredible story that no doubt did damage to FlightSimLabs’ reputation. But the now the company is at the center of a new storm, again centered around anti-piracy measures and again focused on Reddit.

Just before the weekend, Reddit user /u/walkday reported finding something unusual in his A320X module, the same module that caused the earlier controversy.

“The latest installer of FSLabs’ A320X puts two cmdhost.exe files under ‘system32\’ and ‘SysWOW64\’ of my Windows directory. Despite the name, they don’t open a command-line window,” he reported.

“They’re a part of the authentication because, if you remove them, the A320X won’t get loaded. Does someone here know more about cmdhost.exe? Why does FSLabs give them such a deceptive name and put them in the system folders? I hate them for polluting my system folder unless, of course, it is a dll used by different applications.”

Needless to say, the news that FSLabs were putting files into system folders named to make them look like system files was not well received.

“Hiding something named to resemble Window’s “Console Window Host” process in system folders is a huge red flag,” one user wrote.

“It’s a malware tactic used to deceive users into thinking the executable is a part of the OS, thus being trusted and not deleted. Really dodgy tactic, don’t trust it and don’t trust them,” opined another.

With a disenchanted Reddit userbase simmering away in the background, FSLabs took to Facebook with a statement to quieten down the masses.

“Over the past few hours we have become aware of rumors circulating on social media about the cmdhost file installed by the A320-X and wanted to clear up any confusion or misunderstanding,” the company wrote.

“cmdhost is part of our eSellerate infrastructure – which communicates between the eSellerate server and our product activation interface. It was designed to reduce the number of product activation issues people were having after the FSX release – which have since been resolved.”

The company noted that the file had been checked by all major anti-virus companies and everything had come back clean, which does indeed appear to be the case. Nevertheless, the critical Reddit thread remained, bemoaning the actions of a company which probably should have known better than to irritate fans after February’s debacle. In response, however, FSLabs did just that once again.

In private messages to the moderators of the /r/flightsim sub-Reddit, FSLabs’ Marketing and PR Manager Simon Kelsey suggested that the mods should do something about the thread in question or face possible legal action.

“Just a gentle reminder of Reddit’s obligations as a publisher in order to ensure that any libelous content is taken down as soon as you become aware of it,” Kelsey wrote.

Noting that FSLabs welcomes “robust fair comment and opinion”, Kelsey gave the following advice.

“The ‘cmdhost.exe’ file in question is an entirely above board part of our anti-piracy protection and has been submitted to numerous anti-virus providers in order to verify that it poses no threat. Therefore, ANY suggestion that current or future products pose any threat to users is absolutely false and libelous,” he wrote, adding:

“As we have already outlined in the past, ANY suggestion that any user’s data was compromised during the events of February is entirely false and therefore libelous.”

Noting that FSLabs would “hate for lawyers to have to get involved in this”, Kelsey advised the /r/flightsim mods to ensure that no such claims were allowed to remain on the sub-Reddit.

But after not receiving the response he would’ve liked, Kelsey wrote once again to the mods. He noted that “a number of unsubstantiated and highly defamatory comments” remained online and warned that if something wasn’t done to clean them up, he would have “no option” than to pass the matter to FSLabs’ legal team.

Like the first message, this second effort also failed to have the desired effect. In fact, the moderators’ response was to post an open letter to Kelsey and FSLabs instead.

“We sincerely disagree that you ‘welcome robust fair comment and opinion’, demonstrated by the censorship on your forums and the attempted censorship on our subreddit,” the mods wrote.

“While what you do on your forum is certainly your prerogative, your rules do not extend to Reddit nor the r/flightsim subreddit. Removing content you disagree with is simply not within our purview.”

The letter, which is worth reading in full, refutes Kelsey’s claims and also suggests that critics of FSLabs may have been subjected to Reddit vote manipulation and coordinated efforts to discredit them.

What will happen next is unclear but the matter has now been placed in the hands of Reddit’s administrators who have agreed to deal with Kelsey and FSLabs’ personally.

It’s a little early to say for sure but it seems unlikely that this will end in a net positive for FSLabs, no matter what decision Reddit’s admins take.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Storing Encrypted Credentials In Git

Post Syndicated from Bozho original https://techblog.bozho.net/storing-encrypted-credentials-in-git/

We all know that we should not commit any passwords or keys to the repo with our code (no matter if public or private). Yet, thousands of production passwords can be found on GitHub (and probably thousands more in internal company repositories). Some have tried to fix that by removing the passwords (once they learned it’s not a good idea to store them publicly), but passwords have remained in the git history.

Knowing what not to do is the first and very important step. But how do we store production credentials. Database credentials, system secrets (e.g. for HMACs), access keys for 3rd party services like payment providers or social networks. There doesn’t seem to be an agreed upon solution.

I’ve previously argued with the 12-factor app recommendation to use environment variables – if you have a few that might be okay, but when the number of variables grow (as in any real application), it becomes impractical. And you can set environment variables via a bash script, but you’d have to store it somewhere. And in fact, even separate environment variables should be stored somewhere.

This somewhere could be a local directory (risky), a shared storage, e.g. FTP or S3 bucket with limited access, or a separate git repository. I think I prefer the git repository as it allows versioning (Note: S3 also does, but is provider-specific). So you can store all your environment-specific properties files with all their credentials and environment-specific configurations in a git repo with limited access (only Ops people). And that’s not bad, as long as it’s not the same repo as the source code.

Such a repo would look like this:

project
└─── production
|   |   application.properites
|   |   keystore.jks
└─── staging
|   |   application.properites
|   |   keystore.jks
└─── on-premise-client1
|   |   application.properites
|   |   keystore.jks
└─── on-premise-client2
|   |   application.properites
|   |   keystore.jks

Since many companies are using GitHub or BitBucket for their repositories, storing production credentials on a public provider may still be risky. That’s why it’s a good idea to encrypt the files in the repository. A good way to do it is via git-crypt. It is “transparent” encryption because it supports diff and encryption and decryption on the fly. Once you set it up, you continue working with the repo as if it’s not encrypted. There’s even a fork that works on Windows.

You simply run git-crypt init (after you’ve put the git-crypt binary on your OS Path), which generates a key. Then you specify your .gitattributes, e.g. like that:

secretfile filter=git-crypt diff=git-crypt
*.key filter=git-crypt diff=git-crypt
*.properties filter=git-crypt diff=git-crypt
*.jks filter=git-crypt diff=git-crypt

And you’re done. Well, almost. If this is a fresh repo, everything is good. If it is an existing repo, you’d have to clean up your history which contains the unencrypted files. Following these steps will get you there, with one addition – before calling git commit, you should call git-crypt status -f so that the existing files are actually encrypted.

You’re almost done. We should somehow share and backup the keys. For the sharing part, it’s not a big issue to have a team of 2-3 Ops people share the same key, but you could also use the GPG option of git-crypt (as documented in the README). What’s left is to backup your secret key (that’s generated in the .git/git-crypt directory). You can store it (password-protected) in some other storage, be it a company shared folder, Dropbox/Google Drive, or even your email. Just make sure your computer is not the only place where it’s present and that it’s protected. I don’t think key rotation is necessary, but you can devise some rotation procedure.

git-crypt authors claim to shine when it comes to encrypting just a few files in an otherwise public repo. And recommend looking at git-remote-gcrypt. But as often there are non-sensitive parts of environment-specific configurations, you may not want to encrypt everything. And I think it’s perfectly fine to use git-crypt even in a separate repo scenario. And even though encryption is an okay approach to protect credentials in your source code repo, it’s still not necessarily a good idea to have the environment configurations in the same repo. Especially given that different people/teams manage these credentials. Even in small companies, maybe not all members have production access.

The outstanding questions in this case is – how do you sync the properties with code changes. Sometimes the code adds new properties that should be reflected in the environment configurations. There are two scenarios here – first, properties that could vary across environments, but can have default values (e.g. scheduled job periods), and second, properties that require explicit configuration (e.g. database credentials). The former can have the default values bundled in the code repo and therefore in the release artifact, allowing external files to override them. The latter should be announced to the people who do the deployment so that they can set the proper values.

The whole process of having versioned environment-speific configurations is actually quite simple and logical, even with the encryption added to the picture. And I think it’s a good security practice we should try to follow.

The post Storing Encrypted Credentials In Git appeared first on Bozho's tech blog.

ISP Questions Impartiality of Judges in Copyright Troll Cases

Post Syndicated from Andy original https://torrentfreak.com/isp-questions-impartiality-of-judges-in-copyright-troll-cases-180602/

Following in the footsteps of similar operations around the world, two years ago the copyright trolling movement landed on Swedish shores.

The pattern was a familiar one, with trolls harvesting IP addresses from BitTorrent swarms and tracing them back to Internet service providers. Then, after presenting evidence to a judge, the trolls obtained orders that compelled ISPs to hand over their customers’ details. From there, the trolls demanded cash payments to make supposed lawsuits disappear.

It’s a controversial business model that rarely receives outside praise. Many ISPs have tried to slow down the flood but most eventually grow tired of battling to protect their customers. The same cannot be said of Swedish ISP Bahnhof.

The ISP, which is also a strong defender of privacy, has become known for fighting back against copyright trolls. Indeed, to thwart them at the very first step, the company deletes IP address logs after just 24 hours, which prevents its customers from being targeted.

Bahnhof says that the copyright business appeared “dirty and corrupt” right from the get go, so it now operates Utpressningskollen.se, a web portal where the ISP publishes data on Swedish legal cases in which copyright owners demand customer data from ISPs through the Patent and Market Courts.

Over the past two years, Bahnhof says it has documented 76 cases of which six are still ongoing, 11 have been waived and a majority 59 have been decided in favor of mainly movie companies. Bahnhof says that when it discovered that 59 out of the 76 cases benefited one party, it felt a need to investigate.

In a detailed report compiled by Bahnhof Communicator Carolina Lindahl and sent to TF, the ISP reveals that it examined the individual decision-makers in the cases before the Courts and found five judges with “questionable impartiality.”

“One of the judges, we can call them Judge 1, has closed 12 of the cases, of which two have been waived and the other 10 have benefitted the copyright owner, mostly movie companies,” Lindahl notes.

“Judge 1 apparently has written several articles in the magazine NIR – Nordiskt Immateriellt Rättsskydd (Nordic Intellectual Property Protection) – which is mainly supported by Svenska Föreningen för Upphovsrätt, the Swedish Association for Copyright (SFU).

“SFU is a member-financed group centered around copyright that publishes articles, hands out scholarships, arranges symposiums, etc. On their website they have a public calendar where Judge 1 appears regularly.”

Bahnhof says that the financiers of the SFU are Sveriges Television AB (Sweden’s national public TV broadcaster), Filmproducenternas Rättsförening (a legally-oriented association for filmproducers), BMG Chrysalis Scandinavia (a media giant) and Fackförbundet för Film och Mediabranschen (a union for the movie and media industry).

“This means that Judge 1 is involved in a copyright association sponsored by the film and media industry, while also judging in copyright cases with the film industry as one of the parties,” the ISP says.

Bahnhof’s also has criticism for Judge 2, who participated as an event speaker for the Swedish Association for Copyright, and Judge 3 who has written for the SFU-supported magazine NIR. According to Lindahl, Judge 4 worked for a bureau that is partly owned by a board member of SFU, who also defended media companies in a “high-profile” Swedish piracy case.

That leaves Judge 5, who handled 10 of the copyright troll cases documented by Bahnhof, waiving one and deciding the remaining nine in favor of a movie company plaintiff.

“Judge 5 has been questioned before and even been accused of bias while judging a high-profile piracy case almost ten years ago. The accusations of bias were motivated by the judge’s membership of SFU and the Swedish Association for Intellectual Property Rights (SFIR), an association with several important individuals of the Swedish copyright community as members, who all defend, represent, or sympathize with the media industry,” Lindahl says.

Bahnhof hasn’t named any of the judges nor has it provided additional details on the “high-profile” case. However, anyone who remembers the infamous trial of ‘The Pirate Bay Four’ a decade ago might recall complaints from the defense (1,2,3) that several judges involved in the case were members of pro-copyright groups.

While there were plenty of calls to consider them biased, in May 2010 the Supreme Court ruled otherwise, a fact Bahnhof recognizes.

“Judge 5 was never sentenced for bias by the court, but regardless of the court’s decision this is still a judge who shares values and has personal connections with [the media industry], and as if that weren’t enough, the judge has induced an additional financial aspect by participating in events paid for by said party,” Lindahl writes.

“The judge has parties and interest holders in their personal network, a private engagement in the subject and a financial connection to one party – textbook characteristics of bias which would make anyone suspicious.”

The decision-makers of the Patent and Market Court and their relations.

The ISP notes that all five judges have connections to the media industry in the cases they judge, which isn’t a great starting point for returning “objective and impartial” results. In its summary, however, the ISP is scathing of the overall system, one in which court cases “almost looked rigged” and appear to be decided in favor of the movie company even before reaching court.

In general, however, Bahnhof says that the processes show a lack of individual attention, such as the court blindly accepting questionable IP address evidence supplied by infamous anti-piracy outfit MaverickEye.

“The court never bothers to control the media company’s only evidence (lists generated by MaverickMonitor, which has proven to be an unreliable software), the court documents contain several typos of varying severity, and the same standard texts are reused in several different cases,” the ISP says.

“The court documents show a lack of care and control, something that can easily be taken advantage of by individuals with shady motives. The findings and discoveries of this investigation are strengthened by the pure numbers mentioned in the beginning which clearly show how one party almost always wins.

“If this is caused by bias, cheating, partiality, bribes, political agenda, conspiracy or pure coincidence we can’t say for sure, but the fact that this process has mainly generated money for the film industry, while citizens have been robbed of their personal integrity and legal certainty, indicates what forces lie behind this machinery,” Bahnhof’s Lindahl concludes.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.