How IoT initiatives impact the IT infrastructure

Internet of Things (IoT) infrastructure spending is making inroads into enterprise IT budgets across a diverse set of industry verticals. Improved business offerings, IoT data management, and new networking elements are key to a successful IoT initiative within an enterprise, according to IDC. “Given the strong uptake in IoT based technology solutions, enterprise IT buyers are looking for vendors who can add IoT capabilities to the current networking and edge IT infrastructure,” said Sathya Atreyam, … More Continue reading How IoT initiatives impact the IT infrastructure

A Solar-Powered Headset From Recycled Parts

Solar power has surged ahead in recent years, and access for the individual has grown accordingly. Not waiting around for a commercial alternative, Instructables user [taifur] has gone ahead and built himself a solar-powered Bluetooth headset.

Made almost completely of recycled components — reducing e-waste helps us all — only the 1 W flexible solar panel, voltage regulator, and the RN-52 Bluetooth module were purchased for this project. The base of the headset has been converted from [taifur]’s old wired one, meanwhile a salvaged boost converter, and charge controller — for a lithium-ion battery — form the power …read more

Continue reading A Solar-Powered Headset From Recycled Parts

Taking A Robot For A Drive

Instructables user [Roboro] had a Mad Catz Xbox steering wheel controller he hasn’t had much use for of late, so he decided to hack and use it as a controller for a robot instead.

Conceivably, you could use any RC car, but [Roboro] is reusing one he used for a robot sumo competition a few years back. Cracking open the controller revealed a warren of wires that were — surprise, surprise — grouped and labelled, making for a far less painful hacking process. Of course, [Roboro] is only using the Xbox button for power, the player-two LED to show the …read more

Continue reading Taking A Robot For A Drive

More on Bluetooth Ingenico Overlay Skimmers

This blog has featured several stories about “overlay” card and PIN skimmers made to be placed atop Ingenico-brand card readers at store checkout lanes. I’m revisiting the topic again because a security technician at a U.S.-based retailer recently shared a few photos of several of these devices pulled from compromised card terminals, and the images and his story offer a fair bit more detail than in previous articles on Ingenico overlay skimmers. Continue reading More on Bluetooth Ingenico Overlay Skimmers

Reverse Engineering Enables Slick Bluetooth Solution for Old Car Stereo

Those of us who prefer to drive older cars often have to make sacrifices in the entertainment system department to realize the benefits of not having a car payment. The latest cars have all the bells and whistles, while the cars of us tightwads predate the iPod revolution and many lack even an auxiliary input jack. Tightwads who are also hackers often remedy this with conversion projects, like this very slick Bluetooth conversion on a Jeep radio.

There are plenty of ways to go about piping your favorite tunes from a phone to an old car stereo, but few are …read more

Continue reading Reverse Engineering Enables Slick Bluetooth Solution for Old Car Stereo

Bluetooth Low Energy – Relationship between PINs and man-in-the-middle attacks

In the Bluetooth core document, there are various Association Models, I’m trying to understand Numeric Comparison, where both devices are capable of showing a six-digit number (which I will call the PIN, although apparently t… Continue reading Bluetooth Low Energy – Relationship between PINs and man-in-the-middle attacks

Bluetooth Low Energy – Relationship between PINs and man-in-the-middle attacks

In the Bluetooth core document, there are various Association Models, I’m trying to understand Numeric Comparison, where both devices are capable of showing a six-digit number (which I will call the PIN, although apparently t… Continue reading Bluetooth Low Energy – Relationship between PINs and man-in-the-middle attacks