Behind a nondescript loading dock in Brooklyn stands a normal looking brick building. Go up 3 narrow flights of stairs – you’ll find yourself at the door to the awesome known as NYC Resistor. Last Saturday, NYC Resistor held their 5th Interactive Show, and Hackaday was there! Much like the city it calls home, the Interactive Show is a melting pot. This particular pot is filled with NYC Resistor members (and the public) showing off their projects, NYU’s Tish School ITP students displaying their interactive art, and a good heaping portion of old fashioned hacker partying.
Continue reading “NYC Resistor Heats up the Big Apple with The 2014 Interactive Show”
This anthropomorphized wood bowl will read Tweets out loud. It was built by [William Lindmeier] as part of his graduate work in the Interactive Telecommunications Program (ITP) at New York University. View the clip after the break to see and hear a list from his Twitter feed read in rather pleasant text-to-speech voices.
The electronics involved are rather convoluted. Inside the upturned bowl you’ll find both an Arduino and a Raspberry Pi. But that’s not the only thing that goes into this. The best sounding text-to-speech program [William] could find was for OSX, so there is a remote computer involved as well. But we think what makes this special is the concept and execution, not the level of hardware inefficiency.
The knob to the left sets the volume and is also responsible for powering down the device. The knob of the right lets you select from various Twitter lists. Each turn of the knob is responded to with a different LED color in the nose and a spoken menu label. You can get a quick overview of the project from this summary post.
Continue reading “Twitter radio”
The Polytechnic Institute of NYU is hosting an interesting embedded systems contest. They’ve constructed a solid state cryptographic device that uses a 128-bit private key. Contestants will be tasked with designing and implementing several trojans into the system that will undermine the security. The system is built on a Digilent BASYS Spartan-3 FPGA board. The trojans could do a wide variety of things: transmitting unencrypted, storing and transmitting previously entered plain text, or just shutting down the system entirely. The modified devices still need to pass the factory testing procedure though, which will measure power consumption, code size, and function. After a qualification round, participants will be given the necessary hardware to compete.
[via NYC Resistor (Happy Birthday!)]