Counting Eggs With A Webcam

You’ll have to dig out your French dictionary (or Google translate) for this one, but it is worth it. [Nicolas Giraud] has been experimenting with ways to use a webcam to detect the number of eggs chickens have laid in a chicken coop. This page documents these experiments using a number of different algorithms to automatically detect the number of eggs and notify the owner. The system is simple, built around a Pi running Debian Jesse Lite and a cheap USB webcam. An LED running off one of the GPIO pins illuminates the eggs, and the camera then captures the …read more

Continue reading Counting Eggs With A Webcam

Security orchestration and automation: Closing the gap in incident response

Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group (ESG). The research also explored the drivers of this shift, identifying the shortage of qualified cybersecurity professionals and the heavy reliance on manual resources as the main contributing factors. ESG surveyed 100 IT professionals with knowledge or responsibility for their organization’s incident response processes and technologies. The research shows that 91 … More Continue reading Security orchestration and automation: Closing the gap in incident response

US gets federal guidelines for safe deployment of self-driving cars

The Obama Administration has issued a new Federal Automated Vehicles Policy to help facilitate the responsible introduction of self-driving cars. The policy sets a proactive approach to providing safety assurance and facilitating innovation through four key parts. Vehicle performance guidance uses a 15-point Safety Assessment to set clear expectations for manufacturers developing and deploying automated vehicle technologies. Model state policy delineates the Federal and State roles for the regulation of highly automated vehicle technologies as … More Continue reading US gets federal guidelines for safe deployment of self-driving cars

Hackaday Prize Entry: Environmental Regulation

A while back, [Kyle] wanted to grow gourmet mushrooms. The usual way of doing this is finding a limestone cave and stinking up half the county with the smell of manure. Doing this at home annoys far fewer neighbors, leading him to create a device that will regulate temperature, humidity, and carbon dioxide concentration. It’s called Mycodo, and it’s one of the finalists for the Automation portion of the Hackaday Prize.

Mycodo is designed to read sensors and activate relays, and when it comes to environmental sensors, there’s no shortage of sensors available. Right now, Mycodo has support for the …read more

Continue reading Hackaday Prize Entry: Environmental Regulation

Automate Git and Upgrade Your Battle Station With a Custom Peripheral

[mfaust] wakes up in the morning like a regular person, goes to work like a regular person, types in tedious commands for his software versioning utilities like a regular person, and then, as a reward, gets his coffee, just like rest of us. However, what if there was a way to shorten the steps, bringing us all closer to the wonderful coffee step, without all those inconvenient delays? Well, global industry is trying its best to blot out the sun, so mornings are covered there. [Elon Musk’s] thinktank proposed the hyperloop, which should help with the second step. [mfaust] built …read more

Continue reading Automate Git and Upgrade Your Battle Station With a Custom Peripheral

Macro-based malware evolves to bypass traditional defenses

Macro-based malware is growing into full-featured malware capable of detecting and bypassing traditional security tools, Barkly researchers have discovered. Macro-based malware: The past Malware peddlers have been misusing Word macros to deliver malware for nearly fifteen years. The approach, which takes advantage of the macros’ capability to automatically execute a series of instructions as a single command, has initially been used in the early 2000s. As users became accustomed to it, this malware delivery tactic … More Continue reading Macro-based malware evolves to bypass traditional defenses