Designing an Arduino-powered split-flap display

If you’d like a split-flap display with numbers and letters, options tend to be quite expensive. This though was no problem for hacker “scottbez1” who reports that after “only” two-plus years of work, he has produced a split-flap assembly that plugs into an Arduino Uno as a sort of external shield.

The device employs inexpensive stepper motors to click through letters, numbers, and even some punctuation, using cutout PVC ID display stock to show the characters. Cleverly, the PCB he designed for it can function as a motor driver or be split in two to function as a sensor board.

I’ve always loved these electro-mechanical displays, but you can’t buy them for a reasonable price, so I figured I’d try making them myself (plus it’s more fun that way!). Ultimately I wanted to design a split-flap display that can be built at home in small/single quantities and can be customized and put together by an intermediate hobbyist for not too much money.

The design I settled on uses PVC ID badge cards for the flaps, store-bought vinyl stickers for the letters, and is driven by a cheap 28BYJ-48 stepper motor. The enclosure and moving parts are all made from laser-cut MDF, which can be easily ordered online. To control them, I designed a driver board that can be hand-soldered and plugs into an Arduino like a shield.

The entire build story can be found here and more details including Arduino code are available on GitHub. If you’d just like to see and hear it flapping away, check out the video below!

Arduino Blog

Future Thinking: Cyrating on Cyber Threats

In 2017, the Internet Society unveiled the 2017 Global Internet Report: Paths to Our Digital Future. The interactive report identifies the drivers affecting tomorrow’s Internet and their impact on Media & Society, Digital Divides, and Personal Rights & Freedoms. In February 2018, we interviewed two stakeholders – Cyrating, a cybersecurity ratings agency, and Niel Harper, Senior Manager, Next Generation Leaders at the Internet Society – to hear their different perspectives on the forces shaping the Internet’s future.

Cyrating is the first cybersecurity ratings agency anchored in Europe, and helps forward-thinking organizations maximize their cybersecurity performance and investments. It identifies potential for improvement, benchmarks it against industry best practices, and provides standardized cybersecurity metrics. We spoke to François Gratiolet, one of Cyrating’s founders, about the future of a secure and trusted Internet.

(You can read Niel Harper’s interview here).

The Internet Society: Experts predict an increase of frequency and impact of cyberattacks. What form are they likely to take in the next three to five years?

François Gratiolet: We believe cyberattacks will intensify in the next three to five years; targeting both Internet users and the Internet’s underlying infrastructure. User attacks will move from phishing to social media, with users increasingly being exposed through their mobile devices. While the use of IDs such as digital certificates and biometry might reinforce security in some regards, it will simultaneously introduce new targets for cyberattacks. And as the adoption of blockchain technology and cryptocurrencies will become a new norm, we also expect more cyberattacks on virtual currencies’ platforms. Because physical and digital worlds become increasingly entwined, IoT and utility infrastructure will similarly become more attractive targets for cyberattacks. Attacks on national telecommunications infrastructure, for example, can endanger economies in developed and developing countries alike.

In parallel, organisations’ boards, consumers and citizens are also becoming increasingly aware of the potential danger and risk of data breaches, botnets, denial of service attacks, and malware. Similarly, organisations’ obligation to keep stakeholders informed about breaches is also becoming more concrete as a result of codifications like the General Data Protection Regulation (GDPR) and the European NIS directive, which comes into effect in May 2018. GDPR harmonizes data protection in Europe, and imposes new duties for organisations offering goods or services to the EU. The obligation to notify stakeholders (investors, customers, partners and insurers) of data breaches compels organisations to be ever more responsible and transparent in terms of cybersecurity and to demand strict cybersecurity safeguards from their chain of suppliers.

What needs to be done to address cyber threats, put users in control of their data, and increase accountability for data handlers?

Organisations need to understand their enemies’ tactics and techniques and should be better prepared for dealing with cyber threats. At the same time, they need to understand their own information systems better, including how to monitor them continuously. This requires organisations to appropriately train all employees on dealing with cyber threats: from senior executives to IT operations. For that, organisations will need to work as a team and to share threat intelligence information. As data handlers and organisations will become hyper accountable with new regulations, they will need to ensure security by design of all digital products, including data breach notifications and remediation, suppliers’ security, etc. It will also be important for them to learn to demonstrate the effectiveness of the controls in place to protect their organisation, its systems, and the data it has to deal with.

Where users are concerned, there is a significant need to improve users’ own understanding and control of their data. Education and raising awareness is critical to ensure that users can handle their data securely. The tipping point will be to enforce the rules, especially new European regulations.

We believe security rating services like those offered by Cyrating will help organisations to improve their cybersecurity effectiveness and that of their suppliers or partners, introducing more transparency and trust to their overall business ecosystem, and contributing to enhanced resiliency overall. Such rating systems must be based on specific criteria and cybersecurity best practices, and must respect widely shared standards. These practices are crucial for the benefit of our economy, our society, and the safety of all.

How do you see insurance policies and companies evolving to cater for cybersecurity risks in the future?

The overall cyber insurance market will continue to grow at a great pace, with organisations realizing that, regardless of their current security processes, security can never be 100% guaranteed. All organisations therefore have to mitigate potential financial damage that is bound to arise from cybersecurity incidents. To fully equip themselves in the face of a cybersecurity tsunami, organisations will recognize and include cyber insurance as a key component of their risk management strategy. We predict that cyber insurance will, in the future, be a prerequisite in business relationships. With such growing adoption, reinsurance companies will have to prevent the “black swan” risk.

Cyber insurance does not remove the need for businesses to manage their risk from cyberattacks, however. A challenge is to effectively remediate cyber risks for a large volume of digital assets. A cultural shift towards the adoption of more cyber hygiene measures is arguably needed. This is why we advocate for a return to the fundamentals of cybersecurity with the enforcement of standards such as the establishment of SPF (Sender Policy Framework), which is designed to limit email usurpation, or the DNSSEC (Domain Name System Security Extensions) protocol to protect Internet domain names.

What are your fears for the future of the Internet?

We fear that security issues of the Internet will not be tackled in a consistent, technical, legal, and political way. Security Internet protocols such as DNSSEC or encryption will need to be fully embraced so that the lnternet users will have more confidence in the online activities that are increasingly becoming a part of our lives at work, home, and school. Cooperation and information sharing among end user organizations, providers and countries will be key to fight against cybercrime. We also fear pervasive and mass surveillance from large and dominant corporations as well as the end of the net neutrality. It will endanger the Internet as we know it, along with our digital economies.

What are your hopes for the future of the Internet?

We hope that cybersecurity will no longer be ignored in digital products and services design, but will become central to everything that an organization does, and be embedded in all processes and business operations. Thus, we hope that all the players in the value chain (e.g. operating systems and hardware makers, ISPs, registrars, SaaS providers) will offer top cybersecurity and that end-users’ organizations will buy and rely on them.

What do you think the future of the Internet looks like? Explore the 2017 Global Internet Report: Paths to Our Digital Future to see how the Internet might transform cybersecurity across the globe, then choose a path to help shape tomorrow.

The views and opinions expressed in this article are those of the interviewee and do not necessarily reflect the official position of the Internet Society.
Photo: Founders François Gratiolet, Christophe Ternat, and Charles d’Aumale, courtesy of Cyrating

The post Future Thinking: Cyrating on Cyber Threats appeared first on Internet Society.

Internet Society

What is the autonomous driving toolchain?

The autonomous driving toolchain is a toolbox for developers. It is one of three equally-weighted technology fields of autonomous driving.

Autonomous Driving Toolchain Source: Bosch

Autonomous driving developers use the toolchain to develop, test, and validate software-based functionalities, such as distinguishing a pedestrian from a plastic bag, predicting the future movements of objects, or recognizing potential hindrances before pulling out into the road. The toolchain is necessary for rendering autonomous driving applications usable and safe in everyday life.

If you look at the development, test, and validation tools needed to cover the entire autonomous driving chain, you’ll see the landscape is highly fragmented. There are hundreds of specialized open source and closed source tools available today. However, only few of these developer tools interact with each other in an efficient manner.

Individual parts of the autonomous driving toolchain Source: Bosch

The OpenADx initiative is actively addressing this challenge. Bosch and Microsoft have initiated OpenADx together with many further players in this space in 2017. OpenADx aims to bring transparency and better integration capabilities into this highly heterogeneous tool space. It focuses on interfaces between tools and creates an industry-wide reference architecture. A seamlessly integrated set of tools from different vendors enables developers from various companies to structure the development process of autonomous driving applications to be more swift and efficient.

Two men inspecting a small prototype of a autonomous vehicle. Source: Bosch Software Innovations

Lars Geyer-Blaumeiser (on the right), Open Source Expert for OpenADx at Bosch Software Innovations talking to a hackathon participant.

The post Industry 4.0: 10 use cases for software in connected manufacturing appeared first on Bosch ConnectedWorld Blog.

Bosch ConnectedWorld Blog

Strange vocal interactions with ‘you, me and all these machines’

Moscow-based artist ::vtol:: is back again with an interesting interactive exhibit entitled “you, me and all these machines.” His latest work, a collaboration with Lovozero, allows two participants to produce otherworldly vocals together.

One participant wears the device, which points a directional microphone under the control of the other participant at her mouth using a servo motor. An array of LEDs signal the vocalist in a manner agreed upon before the performance.

The head-mounted system is controlled by an Arduino Uno, and is meant to display the subtle interaction between two participating artists, as they must work together to produce the desired output.

“You, me and all these machines” is a performance for voice and electronic devices. The vocalist puts on his or her head a specially designed wearable interface tool to interact with the voice and display a visual score. Technically, the device consists of several elements: a narrowly directional microphone driven by a motor; an LED strip that shows the vocalist score; remote control with a joystick used by the second participant to control the interface.

Shifting the microphone against the mouth makes it possible to achieve interesting sound effects, and makes it easier to manipulate the vocalist’s voice. The LED line consisting of 10 diodes is a very primitive, but effective and convenient way of interacting with the vocalist, and the way of interpreting the values is predetermined before each performance. During the performance, a sound canvas is formed, thereby changing the dynamics, consisting of a set of looped fragments created within voice and interface processing elements, without using other methods to generate sounds.

Check out “you, me and all these machines” in the video below!

Arduino Blog

Arduino-compatible NB-IoT Sensor Shield

Avnet Silica unveils an NB-IoT sensor shield that is notable for its Arduino compatibility since it has an Arduino UNO R3 connector. Arduino compatibility allows developers to leverage a huge ecosystem of compatible boards, thereby offering ultimate flexibility.

Possible applications of the board include gas detectors, environmental sensors, and machinery alarm system in the industrial or agricultural sectors; public utility applications such as water/ gas metering, smart parking systems, and street lighting; as well as consumer applications such as asset tracking.

The NB-IoT Sensor Shield is based on the Quectel BG96 low power module supporting Cat M1, Cat NB1 and EGPRS fallback. GNSS is supported.

The new board enables developers to choose the microcontroller board that best fits their application, like STM32 Nucleo boards, and combine them with sensors and other peripheral boards as needed.

It also supports all major operating systems including Android, Linux and Windows. Pmod connectors allow an extended compatibility with additional boards. And mbed OS support allows quick development.

More information:

The post Arduino-compatible NB-IoT Sensor Shield appeared first on Internet Of Things | IoT India.

Internet Of Things | IoT India