142: New and Improved Appendages (Repeat)
Embedded20 Mai 2021

142: New and Improved Appendages (Repeat)

Sarah Petkus offers to let her robot lick Christopher's leg. Christopher agrees reluctantly once we determine the saliva will be anti-bacterial hand sanitizer.

Sarah is a kinetic artist and some of her projects include a robot army (built your own from parts printed out or purchased at robot-army.com), Noodlefeet, and Carl (the flamingo of pendulum inversion). Her Zoness.com site is an umbrella for her drawn and robotic art. Specifically, you may enjoy her webcomic Gravity Road, her YouTube channel, and/or her Robotic Arts blog.

Some other topics we discussed:

Also, please check out our new embedded.fm/blog or if you prefer email updates, sign up at embedded.fm/subscribe.

Episoder(567)

520: All Sorts of Interesting Facts About Teeth

520: All Sorts of Interesting Facts About Teeth

Chris and Elecia apologize, discuss uses and abuses of chatbots, reach out to an uncertain manager, try to help someone out of their professor's draconian rules, and extol the joys of reading.  Chabot Space & Science Center is in Oakland, CA, US. It is wonderful! Some suggestions for UncertainManager: Thanks for the Feedback: The Science and Art of Receiving Feedback Resilient Management Manager's Path Soft Skills Engineering podcast Hang in there! You are probably doing better than you think. Audio books are great! In the US, many libraries have digital libraries with extensive audio collections. There are several apps with different catalogs for the same library Libby, Kanopy, Hoopla, and Palace (check out the California shelf at Palace!). And since you are probably going to ask about the games Elecia doesn't play: Turing Complete shows how logic and logic gates work, building up a processor. Zachtronics' TIS-100 is another logic and processor design game. It is a little ugly in spots (too real world) but it is a really deep dive into learning assembly. It is the precursor to Shenzhen IO but harder to finish. Zachtronics' Shenzhen IO is about circuits and how they work . Human Resource Machine by Tomorrow Corporation is about optimizing resources, it turns out to be a lot like assembly programming. Should you have gotten here because you wanted facts about teeth, Elecia had been enjoying Bite: An Incisive History of Teeth, from Hagfish to Humans. Transcript

6 Feb 58min

519: The Password Is All Zeros

519: The Password Is All Zeros

Mark Omo and James Rowley spoke with us about safecracking, security, and the ethics of doing a bad job. Mark and James gave an excellent talk on the development of their safecracking tools at DEF CON 33: Cash, Drugs, and Guns: Why Your Safes Aren't Safe. It included a section of interaction involving the lock maker's lawyers bullying them and how the Electronic Frontier Foundation (EFF) has a Coders' Rights Project to support security research. As mentioned in the show, the US Cyber Trust Mark baseline has a very straightforward checklist; NISTIR 8259 is the overall standard, NISTIR 8259A is the technical checklist, NISTIR 8259B is the non-technical (process/maintenance) checklist. Roughly the process is NISTIR 8259 -> Plan/Guidance; NISTIR 8259A -> Build; NISTIR 8259B -> Support. We discussed ETSI EN 303 645 V3.1.3 (2024-09) Cyber Security for Consumer Internet of Things: Baseline Requirement and the EU's CRA: Cyber Resilience Act which requires manufacturers to implement security by design, have security by default, provide free security updates, and protect confidentiality. See more here: How to prepare for the Cyber Resilience Act (CRA): A guide for manufacturers. We didn't mention Ghidra in the show specifically, but it is a tool for reverse engineering software: given a binary image, what was the code? Some of the safecracking was helped by the lock maker using the same processor in the PS4 which has many people looking to crack it. See fail0verflow :: PS4 Aux Hax 1: Intro & Aeolia for an introduction.  Mark and James have presented multiple times at Hardwear.io, a series of conferences and webinars about security (not wearables). Some related highlights: 2024: Breaking Into Chips By Reading The Datasheet is about the exploit developed for the older lock version on the safes discussed in the show. USA 2025: Extracting Protected Flash With STM32-TraceRip is about STM32 exploits.

23 Jan 1h 6min

518: Nothing We Can Do About Frogs

518: Nothing We Can Do About Frogs

James Cameron spoke with us about programming for and operating a large telescope. The show is a blend of astronomy, engineering on the fly, and weird lady bug habitats.  The Anglo-Australian Telescope (AAT) is part of the Australian National University's Siding Spring Observatory in Coonabarabran, New South Wales, Australia.  The AAT has an all sky camera where you can check in on a very dark sky.  James was on Embedded Episode 172: Tell Forth You Me Please where we talked about the Forth programming language and his experiences with One Laptop Per Child.  Transcript Unrelated to the AAT, Chris took this image of the Andromeda Galaxy (M31) from his Zwo Seestar 50 over 9 hours (multiple days), stacking the images and processing the data.

9 Jan 1h 8min

517: A Direct, Sensible Podcast

517: A Direct, Sensible Podcast

Nathan Jones and Chris Svec give Chris and Elecia their 2025 performance review.  Donations went to Elevate Tutoring, an organization that provides funding and support to low-income and first-generation college students as well as free STEM tutoring for underserved schools.  Embedded has already sent in the match to the donations for a total of over $5000.  Here is a list of all Embedded.fm episodes. We mentioned the Foldscope, a small but mighty microscope. Also, mentioned was the book If I Only Changed the Software, Why is the Phone on Fire? The show this week is sponsored by us. And you. Please consider supporting Embedded.fm on Ko-fi or Patreon. Or tell a friend about the show. Transcript

2 Jan 1h 1min

516: Voices From the Cataclysms of the Universe

516: Voices From the Cataclysms of the Universe

Sophi Kravitz joined us to talk about art, science, and engineering.  You can see Messages from Space on Sophi's website /sophikravitz.com). A subset of the artwork had a short stay for a demo at Chabot Space & Science Center. The completed work will be shown in 2026. Sophi mentioned collaborating with two sonic environment artists Sofy Yuditskaya and Ria Rajan. Geiger–Müller tube is an ionizing radiation detector. Cosmic rays move through space at nearly the speed of light, generally originating far away and long ago. You can also see them in a cloud chamber, like the one at San Francisco's Exploratorium. We also talked about using sculpting in Blender (there are many online video introductions). Sophi does EE consulting and system quality checking at her company Greenlight. The show this week is sponsored by us. And you. Please consider supporting Embedded.fm on Ko-fi or Patreon. Or tell a friend about the show. Transcript

12 Des 202558min

515: Script Boomers

515: Script Boomers

Nick Kartsioukas joined us to talk about security in embedded systems.  Common Vulnerabilities and Exposures (CVE) is the primary database to check your software libraries, tools, and OSs: cve.org. Open Worldwide Application Security Project (OWASP, owasp.org) has information on how to improve security in all kinds of applications, including embedded application security. There are also cheatsheets, Nick particularly recommends Software Supply Chain Security - OWASP Cheat Sheet.  Wait, what is supply chain security? Nick suggested a nice article on github.com: it is about your code and tools including firmware update, a common weak point in embedded device security. Want to try out some security work? There are capture the flag (CTF) challenges including the Microcorruption CTF (microcorruption.com) which is embedded security related. We also talked about the SANS Holiday Hack Challenge (also see Prior SANS Holiday Hack Challenges). This episode is brought to you by  RunSafe Security. Working with C or C++ in your embedded projects? RunSafe Security helps you build safer, more resilient devices with build-time SBOM generation, vulnerability identification, and patented code hardening. Their Load-time Function Randomization stops the exploit of memory-based attacks, something we all know is much needed. Learn more at RunSafeSecurity.com/embeddedfm. Some other sites that have good information embedded security: This World Of Ours by James Mickens is an easy read about threat modelling Cybersecurity and Infrastructure Security Agency (CISA) is at cisa.gov and, among other things, they describe SBOMs in great detail National Institute of Standards and Technology (NIST) also provides guidance: Internet of Things (IoT) | NIST  NIST Cybersecurity for IoT Program  NIST SP800-213 IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements There is a group of universities and organizations doing research into embedded security: National Science Foundation Center for Hardware and Embedded Systems Security and Trust (CHEST). Descriptive overview and the site is nsfchest.org European Telecommunications Standards Institute (ETSI) - Consumer IoT Security Camera Ubiquiti configuration issue (what not to do) Finally, Nick mentioned Stop The Bleed which provides training on how you can control bleeding, a leading cause of death. They even have a podcast (and we know you like those). Elecia followed up with Community Emergency Response Teams (CERT). Call your local fire department and ask about training near you! Transcript

27 Nov 20251h 10min

514: Just Turn Off All the Computers

514: Just Turn Off All the Computers

Philip Koopman joined us to talk about embedded systems becoming embodied and intelligent. We focus on the safety considerations of making an intelligent and embodied device.  Phil's new book is Embodied AI Safety: Reimagining safety engineering for artificial intelligence in physical systems. It uses robotaxis as an example as it discusses safety, security, human/computer interface, AI, and a bit of legal theory for tort negligence. If you'd like a taster, Phil gave a wonderful summary in his video: Keynote Talk: Embodied AI Safety This new book is intended for a wider (less devotedly technical) audience than his book How Safe Is Safe Enough?: Measuring and Predicting Autonomous Vehicle Safety. Phil was last on the show in episode 473: Math Is Not the Answer where we spoke about his book Understanding Checksums and Cyclic Redundancy Checks  Transcript Thank you! This episode is sponsored by you, our listeners! If you'd like to become members and get ad-free episodes as well as bonus shows, sign up at Patreon or Ko-Fi. Thanks for listening.

14 Nov 20251h 10min

513: I'm Sorry You Learned Something

513: I'm Sorry You Learned Something

Jason Turner of C++ Weekly and Empty Crate spoke with us about the joy of puzzles, the changing directions of an interesting career, and the C++ programming language. I mean, of course we talked about C++. But only a little. Jason recently published Programming Puzzles Big Book: 400 pages of fun for ages 7-99, a book of puzzles for the logically minded. It teaches programming concepts as engaging puzzles: recursion, binary, assembly, Lisp, regular expressions. You may not know what you are learning but you'll likely find you know a lot more about how computers work afterward. For the puzzles, paper is better than electronic. But you can also get the electronic version on LeanPub (which is better if you like to get lost in Wikipedia links). This is not Jason's first puzzle book, he's made them for C++ Object Lifetime and Copy and Reference (see his Amazon and LeanPub author page for other books as well). If you want to catch up on C++, check out C++ Weekly With Jason Turner - YouTube. Note the playlists are useful if you are looking for a deep dive on a particular topic. If you want to get more out of C++ in your organization, Jason's consulting company is Empty Crate. His contact page is there as well (or look for lefticus on most social media platforms). Transcript If you're interested in how 3D printing is changing design engineering, Mouser Electronics has some great resources to check out. Their Empowering Innovation Together platform is taking a deep dive into additive manufacturing—covering smarter production, faster prototyping, and breakthrough materials that move ideas beyond prototypes into real-world products. You'll find podcasts, expert articles, and videos that keep you informed and inspired. Sound like your thing? Head to Mouser.com/empowering-innovation and explore.

30 Okt 20251h 17min

Populært innen Vitenskap

fastlegen
tingenes-tilstand
jss
rekommandert
rss-rekommandert
tomprat-med-gunnar-tjomlid
forskningno
sinnsyn
villmarksliv
fjellsportpodden
rss-paradigmepodden
dekodet-2
tidlose-historier
grunnstoffene
diagnose
vett-og-vitenskap-med-gaute-einevoll
noen-har-snakket-sammen
rss-overskuddsliv
rss-nysgjerrige-norge
rss-skogkurs-podden