Streaming data from the ST Micro SensorTile to Azure

Kevin Saye

Recently, I had an opportunity to dive into ST Micros’ ultra small Sensor Tile — 13 mm by 13 mm.  If you have not had an opportunity to work with them, you can get one here:

As you can see below, comparing the Sensor Tile (top right) to the NodeMCU or Pi Zero, tells you the size we are talking about.


One of my customers wanted to track movement using 2 sensors, to compare and contrast and calculate differences between the two.

These little sensors really perform, and as such we had to perform edge summarization.  Each sensor produced over 100 movements per second — clearly creating, at scale, a bandwidth (and cost) concern.

To address this need, and working with ST Micro, I have connected 2 SensorTiles (via Bluetooth LE) to a third, which is connected to a Raspberry Pi Zero (via Serial).  The PI takes the serial…

View original post 365 more words

Windows 10 IoT Core

Andy's TedNet

They said it is an exciting time for developers.

I picked up a Raspberry Pi 3 and a Starter Pack for Windows 10 IoT Core for Raspberry Pi 3. Time to brush up my programming skills.

For those wondering what is IoT, it stands for Internet of Things.

I share more when I start working on it. For now I just want to show you the stuffs.

View original post

What’s Next in Computing?


What’s Next in Computing?

The computing industry progresses in two mostly independent cycles: financial and product cycles. There has been a lot of handwringing lately about where we are in the financial cycle. Financial markets get a lot of attention. They tend to fluctuate unpredictably and sometimes wildly. The product cycle by comparison gets relatively little attention, even though it is what actually drives the computing industry forward. We can try to understand and predict the product cycle by studying the past and extrapolating into the future.

New computing eras have occurred every 10–15 years

Tech product cycles are mutually reinforcing interactions between platforms and applications. New platforms enable new applications, which in turn make the new platforms more valuable, creating a positive feedback loop. Smaller, offshoot tech cycles happen all the time, but every once in a while — historically, about every…

View original post 2,300 more words

Cellphone Forensics: A Discussion on the Means of iPhone Data Extraction

SalvationDATA Blog

In the former issues of Technical Insights, data recovery experts from the Key Laboratory of Sichuan Province(Subsidiary of SalvationDATA) explained their researches on extraction of cellphone audio files, the recovery of SQLite database files, the writing of forensic scripts for cellphone apps, and the mining of data through defensive cellphone apps etc. The focus of this issue is the various means of data extraction from iPhones (either jail-broken or not) that can give access to all types of data, including texts, images, audios and videos.

With the continuous development of mobile communication technology, cellphones has become an indispensable tool for interpersonal communication and almost everyone carries one or more cellphones. A great deal of information recorded by cellphone apps, chats and locations for example, would probably become the key for investigators to crack cases. Cellphone data extraction, therefore, bares great importance.

To provide support for data extraction from Android…

View original post 669 more words

WannaCry Ransomware Infected Files Can be Recovered?

SalvationDATA Blog

What’s WannaCry Ransomware Attack?

You must have heard either from the news or friends that over hundreds of thousand of computers were hit globally by the ransomware cyberattack called “WannaCry”, which the group behind the attached claimed was via a vulnerability stolen from the United States National Security Agency. And China is among the worst hit countries.

The WannaCry ransomware, as its name suggests, is a kind of virus that hold files on one’s computer hostage until the user pays the amount asked for decrypting files encrypted by hackers. While we’re shocked about how hackers can carry out an attack of such a large scale, we’re also pondering how it is possible.

It takes advantage of the vulnerability in older Microsoft Windows operating systems as some users are reluctant to install the latest security update, which leaves computers vulnerable for any attack.

How Can You Get Your Files Back?


View original post 339 more words

Check Patch Status of ‘WannaCrypt’ / ‘WannaCry’ using PowerShell

Kloud Blog

A short but sweet blog today, mindful that today most Australians will be coming back to work after the ‘WannaCrypt’ attack that was reported in the media on Friday.

I would like to just point out the work of Kieran Walsh – he’s done the ‘hard yards’ of extracting all of the Knowledge Base (KB) article numbers that you need to be searching for, to determine your patching status of Microsoft Security Bulletin MS17-010  (  Microsoft’s detailed blog about the ‘WannaCrypt ransomware’ can be found here:

If you don’t have an Enterprise patch deployment tool such as SCCM or WSUS (there are many many others), Kieran’s script executes a simple ‘Get-Hotfix’ PowerShell command remotely against a Windows Server or workstation, and uses all the computer objects in Active Directory as a reference.  I personally haven’t run this yet, so please test this first against a test AD if you have one.  The ‘Get-Hotfix’ command…

View original post 404 more words

Renault-Nissan resumes work in nearly all plants after ransomware attack

Renault-Nissan said on Monday that output had returned to normal at nearly all its plants, after a global cyber attack caused widespread disruption including stoppages at several of the auto alliance’s sites. Renault and its Japanese partner are the only major car manufacturers so far to have reported production problems resulting from Friday’s WannaCry ransomware […]

via Renault-Nissan resumes work in nearly all plants after ransomware attack — News