Direkt zum Hauptbereich

Posts

How To Set Up A Rock Pi S - Part 2: The Network

After the successful initial set up of my Rock Pi S, I started going on with my project self made smart home assistant. Therefor, it is necessary to configure the network interface. SSH Does Not Mean Network Is Fine Though we already are able to connect to the Rock Pi S via SSH, we probably cannot yet ping servers outside our local network. A ping to google.com, for example, will result in no answer: Destination Host Unreachable The reason is, that there is no standard gateway set in the network configuration, which causes, that only local network hosts inside the same subnet can be reached. The gateway is like the door of your flat. If You don't know, where it is, You cannot even leave your flat and see the rest of the street. To find out your standard gateway, there are different approaches between Windows and Linux. Maybe You need to investigate this for your client operating system. On Windows, You open a command line and type: ipconfig The output loo...

How To Set Up A Rock Pi S - Part 1: Basics

Update / Warning: Until now, I was not able to get this project working. So if You are looking for a working solution, this is none. Maybe You do not need to read the following part of this project, because they were written, before I figured out, that this will not work. As it turned out, the Rock Pi S cannot run Snips.ai any more (after a Kernel update to get the sound working).  (Original Article Starts Here) With the progress of my smart home assistant project , I finally found an adequate hardware with the possibility to connect up to eight microphones: the Rock Pi S from Radxa . What sounded like a promising small device turned out to be a little bit tricky. Inspired by an interesting  article of the german IT publisher heise.de , I decided to order a Rock Pi S for my project. So I took the version with 512 MB RAM, Bluetooth and WiFi (ordered at the at this time point only available store n Germany, maker-store.de ). After delivery and unboxing of the de...

Smart Home with Snips AI

Smart Home voice assistants (also known as "smart home", "connected home") are still very much on vogue. But, regarding to Gartner's hype cycle  for emerging technologies, it's already on the falling edge of the curve and on the road to its plateau of productivity. Which means: the hype is almost over and the technology will get mature in approximately less than five years. Controlling devices at home with the voice is no future any more. It is presence. While Amazon's Alexa and Google Smart Home already recognize your wishes by voice commands in the cloud, there is a small place, where some offline voice assistants have emerged. These can process voice commands without a connection to the Internet, which is a major advantage for your private sphere - especially, if you consider that e.g. the German Home Office plans to listen to such devices to enlighten crimes. Fortunately, there is a way to protect your private sphere though you want to use smart...

Password Manager Security?

Some months have passed since the german IT news platform golem.de published an article reporting that password managers keep the passwords in memory unencrytped. Today I took the chance to make me my own picture of the problem. I used Keepass for my little Test. First, I created a new password database and protected it with a password. Step 1: Create a new encrypted password database Then I deleted the sample entries and created a new one with a certain password (password: "Hidden information 3214" ... whoops!). The result is, that the password is not shown in the Window. Step 2: Create an entry with a password Next, I copied the password over selecting the entry item in Keepass and pressing Ctrl+C and started a hex editor, HxD, to read out the process memory of Keepass (you could also read all processes memory). Step 3: Reading process memory of KeePass The last step was to search for a part of the password string (here: "Hidden in"). The resu...

AI Learns to Play Computer Games

Let's take a look at an off-topic issue in this article: gaming. Why is it even worth to talk about gaming? First of all, gaming is the first decision driven activity a human can do. Second, gaming is a huge economic factor of today's digital business. Third, everybody loves to play. So, let's take a look at challenges to the developers of computer games. One big challenge to the game developers of modern computer games is to create opponents that are challenging the player - but never too far. Always matching a grade of difficulty that evokes a kind of thrill to the player without being hopeless to beat the computer player. But why is it a challenge? Well, it is something that affects the player directly - and a frustrated player will be a hard judge to the game developer or publisher. We could say: adequate opponents in games are a kind of game quality. Computers can always easily defeat up to 98% of human players For a computer, it is no problem to beat a hum...

What's wrong with Scala? About Yate's Correction

Some months ago, I started a new job as a machine learning engineer for a german trading company. In the course of this, I began to deal more with the programming language Scala. Scala provides some benefits that makes the work easier for data engineers when building data pipelines and there's a good support for spark, which is an advantage in cluster computing. But Scala (of course) also has its idiosyncrasies. This article shows the idiosyncrasy of Yate's correction in the Statistcs package of Scala and its consequences. The Statistics Package Like many other programming languages, Scala also comes with a statistical package called "Statistics". It includes many basic methods of the describing statistics, which you need for many purposes. One of these purposes is, for example, A/B testing. So, what's wrong with Scala? For an A/B test, I tested the significance by own calculations first (in old manner, as I had learned in my studies) before using th...

Hacking Sonos Play 1 and Play 3

For several months I have been an enthusiastic owner of a Sonos home sound system. In addition to a brilliant sound and the operation via smartphone and WLAN, this also offers the possibility to implement a control via the SOAP protocol to implement user-defined functions. This means, that it's possible to "hack" the Sonos devices. Free APIs Available Fortunately, some non-proprietary APIs are available on the net or on GitHub: For Java on any machine and OS (by VMichalak) For python on Raspberry Pi SoCo API for Python on Raspberry Pi It has to be said, that the Python APIs not neccessarily run on Windows (at least they didn't run on my machine), but this is not to expect when they are proclaimed as a Raspberry Pi project. Dependency Nightmare Though the API of VMichalak was the one that worked for me, it has a lot of dependecies which need to be downloaded or to be downloaded an build what requires Maven. OKHTTP (okhttp-3.11.0.jar) OKIO (okio-1...