Developing An Automatic Tool For CAN Bus Hacking

In the old days, a physical button or switch on the dashboard of your car would have been wired to whatever device it was controlling. There was potentially a relay in the mix, but still, it wasn’t too hard to follow wires through the harness and figure out where they …read more

Continue reading Developing An Automatic Tool For CAN Bus Hacking

A Bolt-On I2C Navigation Key for Your Next Project

We often talk about the advantages of modular hardware here at Hackaday; the ability to just order a few parts online, hook them up with some jumper wires, and move onto the software side of things is a monumental time saver when it comes to prototyping. So anytime we see …read more

Continue reading A Bolt-On I2C Navigation Key for Your Next Project

Seth Molson is Designing the Future, One Show at a Time

From the banks of levers and steam gauges of 1927’s Metropolis to the multicolored jewels that the crew would knowingly tap on in the original Star Trek, the entertainment industry has always struggled with producing imagery of advanced technology. Whether constrained by budget or imagination, portrayals usually go in one of two directions: they either rely too heavily on contemporary technology, or else they go so far in the opposite direction that it borders on comical.

But it doesn’t always have to be that way. In fact, when technology is shown properly in film it often serves as inspiration …read more

Continue reading Seth Molson is Designing the Future, One Show at a Time

Is it possible to verify that it’s safe to enter social media credentials in a given [IOS, Android, Win10] app?

When logging into web sites using federated login, it’s easy to verify that the site that I’m entering my credentials into the site of the identity provider by looking at the address bar and ensuring that the certificate is v… Continue reading Is it possible to verify that it’s safe to enter social media credentials in a given [IOS, Android, Win10] app?

Dealing with violating privacy of registered users during failed authentication

We are forth and back discussing how to deal with privacy issues during failed authentication, password reset and account creation on a web application.

Let’s say I am in the process of creating an account on an application … Continue reading Dealing with violating privacy of registered users during failed authentication

Twilio launches Flex, a fully programmable contact center

Earlier this year we reported that Twilio was going to launch a full contact center solution called Flex on March 12 — lo and behold, today is March 12 and Twilio today announced the launch of Flex at the Enterprise Connect conference in Orlando…. Continue reading Twilio launches Flex, a fully programmable contact center

Microsoft Teams Gets a User Interface Makeover

Teams Splash

Teams is the poster child for Office 365 right now, so it’s only right that Microsoft has refreshed the Teams UI a year into the app’s life. The changes look pretty good and are useful, even if the Who Bot might not be able to unpick the complexities of the organization you work for.

The post Microsoft Teams Gets a User Interface Makeover appeared first on Petri.

Continue reading Microsoft Teams Gets a User Interface Makeover