Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Micropython Podcasts

Series
Series
Episodes
Language:
English
All languages
English
Afrikaans
Cymraeg
Dansk
Deutsch
Eesti
Español
Esperanto
Français
Gaeilge
Gàidhlig
Hrvatski
Indonesia
Khmer
Latviešu
Lietuvių
Malay
Nederlands
Norsk
Oʻzbekcha
Pyccĸий
Shqip
Slovenčina
Slovenščina
Suomi
Svenska
Tatar
Tiếng Việt
Türkçe
català
italiano
magyar
polski
português
română
rumantsch
Íslenska
Čeština
Ελληνικά
Български
Српски
Українська
беларуская
Қазақша
Հայերեն
עברית
اردو
العربية
فارسی
हिन्दी
বাংলা
ไทย
ქართული
中文
日本語
한국어
show episodes
 
Artwork

1
Inspiring Computing

Gareth Thomas

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Inspiring Computing podcast is where computing meets the real world. This podcast aims to trigger your curiosity by talking to proficient and advanced users of MATLAB, Python, Julia who use these tools to deepen their understanding of the world, simulate, explore trade-offs and gain insights that help companies add more value. In addition to proficient users we will also talk with the product marketing, toolbox authors, package developers and library maintainers to see what drives the de ...
  continue reading
 
Loading …
Episodes
Series
Episodes
Sort:
Newest
Newest
Oldest
Longest
Shortest
Language:
English
All languages
English
Afrikaans
Cymraeg
Dansk
Deutsch
Eesti
Español
Esperanto
Français
Gaeilge
Gàidhlig
Hrvatski
Indonesia
Khmer
Latviešu
Lietuvių
Malay
Nederlands
Norsk
Oʻzbekcha
Pyccĸий
Shqip
Slovenčina
Slovenščina
Suomi
Svenska
Tatar
Tiếng Việt
Türkçe
català
italiano
magyar
polski
português
română
rumantsch
Íslenska
Čeština
Ελληνικά
Български
Српски
Українська
беларуская
Қазақша
Հայերեն
עברית
اردو
العربية
فارسی
हिन्दी
বাংলা
ไทย
ქართული
中文
日本語
한국어
show series
 
This talk introduces participants to the Bosch BMI270 (inertial sensor) and BME690 (environmental sensor) on the WHY2025 Hackathon Badge. After a brief overview of MEMS technology and how these tiny sensors are made and used, we’ll dive into a hands-on session showing how to read sensor data using MicroPython — so you can start experimenting right …
  continue reading
 
After some internal evaluation and a journalists inquiry on the possibility of chinese state actors having access to camera footage, Muncipality the Hague decided to do a security test focused on an APT threat on their traffic camera infrastructure. During the session we will show how the team approached this project, how some of the cinematic scen…
  continue reading
 
A shared understanding of what time it is and the rate at which time progresses is essential in many areas of technology from industrial control to broadcast. There are two main ways of synchronizing time between multiple computers, Network Time Protocol (NTP) and Precision Time Protocol (PTP). NTP is sufficient for certificate validation, but when…
  continue reading
 
Zero Trust (ZT) has evolved from pure network access to hype. ZT Everywhere has become a buzzword. If you ask about it during product presentations, the sales person sometimes runs out of the meeting.If we look beneath the surface, we find a lot of code that we trust in zero trust environments without realising it. Istio containers in service meshe…
  continue reading
 
The Dutch Electoral Council builds its new software-to-be, with a small in-house team, open source and in public. We call her Abacus. In this talk we'll go in depth on the technical and management side of our project. We invite you to join and check out our work! Our talk contains actual code written in Rust."The software used in elections is devel…
  continue reading
 
How do you scale up victim notifications from a couple of hundreds, to thousands, to millions to billions of stolen credentials?Credential theft is on the rise. Cybercriminals are gettings smarter and more efficient. Why hack in, if you can log in?At the DIVD we see this trend in the cases where we assist with notifying victims of credential theft.…
  continue reading
 
This is NOT an introductory talk about ISMS (Information-Security-Management)! It is about my experiences and reflections about real-life issues when deploying an ISMS. There will be a section dedicated to 'hacking' an ISMS, though.The presumed audiences are:- individuals working in the realm of IS-/IT-security management- hackers working in enviro…
  continue reading
 
We in Quantum Development (WIQD) is a growing community dedicated to promoting diversity, equity, and inclusion (DEI) in the quantum ecosystem. In this presentation, we will introduce WIQD’s mission and activities, share insights from our first Women’s Day Hackathon, and highlight why fostering an inclusive quantum community is essential for innova…
  continue reading
 
This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and more.Ever wanted to become sovereign on the internet? Want to know what its like to run an ISP? Are you a sysadmin that wants to learn more about networking? Then you're …
  continue reading
 
Experiences from a hacker working at the Election Council of The Netherlands.After critically following the elections for 8 years from the outside, a hacker was employed as one of the functional administrators of the software supporting the elections. Sharing experiences of the use of election software during 7 elections (2020-2023), from local, na…
  continue reading
 
Are you interested in maps? Are you searching for a FLOSS mapping navigation? Do you need geodata? Do you need a map on your site? Do you want to help creating maps from your local environment or from vulnerable places? Then, you have come to the right talk! This talks gives a broad overview of OpenStreetMap, the community and how to get started wi…
  continue reading
 
What happens when an attacker controls time on a Linux system? This talk looks at how system clocks work, and what breaks when they’re manipulated. From bypassing delays to triggering subtle logic errors, we’ll explore how unstable time can subvert assumptions, break security controls, and cause software to behave in unexpected or unsafe ways.This …
  continue reading
 
Wikipedia tells us that _low-background steel_ is steel produced before the detonation of the first nuclear bombs. Yep, you guessed it, **this is a talk about Large Language Models**. LLM outputs have quickly spread like radionuclides, threatening everything from the scientific record to the existence of the Internet as we know it. In this talk I'l…
  continue reading
 
A team of Dutch scientist and cloud engineers is working on Ecofed: European Cloud Services in an Open Federated Ecosystem. The objective and scope of the ECOFED project are to develop a technical framework for a more open and integrated cloud usage model. This framework will enable multiple clouds from various providers to function as a single, co…
  continue reading
 
As everybody knows, "L" in IoT stands for long-term support.I'll take you on a tour of my technical adventure where I revived an abandoned IoT "AI" translator and gave it a new life, 2025-style. Through deciphering peculiar protocols and formats, reverse engineering firmware and software and doing the necessary research to write new software, we'll…
  continue reading
 
Lightning talks are a 5 to 10 minute quick talk on an interesting subject. They can be with or without slides, and with or without proper preparation. if you weren't accepted in the main CfP, this is also a great opportunity to give an abridged version of your talk. These sessions will be available to sign up to later on, with details on the wiki: …
  continue reading
 
Did you know that if you change a single bit from 1 to 0 (or vice versa) in the first 'g' of the domain name google.com (which is 01100111 in binary) you will end up with variety of valid "bitflip" domains like coogle.com, oogle.com, & woogle.comSo what happens if you generate and register a bunch of cheap bitfliped versions of popular cloud / Saas…
  continue reading
 
Security teams want to prevent incidents - but what if controlled breaking prevents catastrophic failures? Drawing from aviation safety, chaos engineering, and resilience design, discover why 'unbreakable' security comes from breaking things on purpose. Learn to transform incident culture from blame to learning, implement controlled failure practic…
  continue reading
 
Sometimes ago, I embarked on a journey into the world of electronics and FPGA technology with no prior knowledge. What began as passion for retro gaming evolved into a quest for preservation via reverse engineering and FPGA-based emulation. This presentation will share my journey, highlighting the challenges of learning Verilog, the tools, the reso…
  continue reading
 
TIC-80 fantasy console Byte Jam is a friendly competition to livecode a demo in a relaxed atmosphere.TIC-80 fantasy console Byte Jam is a friendly competition to livecode a demo in a relaxed atmosphere. This can take an hour or more depending on the inspiration and time needed of the participants. You could follow the suggested random chosen topic …
  continue reading
 
Our digital communities are controlled by corporate platforms that surveil, manipulate, and arbitrarily deplatform us. We need a Bill of Digital Rights—ensuring privacy, ownership, algorithmic control, and self-governance. This talk lays out the Four Freedoms for Social Media and how open protocols like ATProtocol, ActivityPub, and Nostr make them …
  continue reading
 
I used CircuitPython (but could have also used MicroPython as well, so this is not about A vs. B) to implement various smart-home related projects. I will present some of my projects and also dive into what Python has to offer for (personal, not corporate-style) embedded devices (and the development process).1) Introduction - My (past) smart-home s…
  continue reading
 
Afturmath closes the live music program with an immersive journey of sound and light. Combining modular synthesizers, lasers, and abstract video synthesis, Afturmath crafts dense, evolving sonic landscapes that invite you to lose yourself in the experience.Licensed to the public under https://creativecommons.org/licenses/by/4.0/about this event: ht…
  continue reading
 
Modern software development and operations heavily relies on third-party applications, libraries, containers etc. This presentation will showcase how dev, ops, but also security management can be transparent about dependency versioning and known vulnerabilities, while also staying on track with updates.It will show demos of Open Source Standards li…
  continue reading
 
The Light and Music entertainment platform Lightupyourbanjo began in 2010 when “Cash-a-billy with a Bluegrass bite” band Ed and the Fretmen wanted to have better lights on their banjo. They developed banjo lights with addressable LEDs for in and outside mounting showing interactive animations, written in C++ supporting the songs, and wrote songs to…
  continue reading
 
This talk will enable you to lead architecture conversations and discuss their security options through an informal diagramming technique. I will use examples such as key/encryption architectures, DevOps, and even your home music system.Presentation at https://digitalinfrastructures.nl/why2025/You have seen many diagrams of computer and information…
  continue reading
 
This talk will present the design philosophy behind Offworld Voyage, a decentralized science initiative that develops ecologically sustainable training habitats for use in simulated Mars surface exploration missions - while also solving for adaptation to extreme climate change on Earth.The Offworld Voyage M.A.R.S. Tesseract Space Analog Simulation …
  continue reading
 
You've maybee seen the raking robot that got a CEH (Certified Estetisch Harker) certificate, the Telex linked to Twitter/Telegram or the ASCII foto booth. They are all made by me. If this talk gets accepted I will do a deep dive on these three contraptions and what I learned building them.Beside Schuberg Philis, DIVD, attending the farm and keeping…
  continue reading
 
Learn how to build end-to-end encrypted social apps including the newly released Bitchat using Nostr and MLS (Messaging Layer Security). We'll go from Nostr basics through to encrypted groups, explore the open source libraries and apps already in production, and show how to build your own. Includes live coding demonstrating how to create secure, pr…
  continue reading
 
During this talk we look at hardware and firmware reverse engineering, but also at corporate intimidation tactics and how to respond ethically as a security researcher.Leveraging the hard-coded AES keys, outdated software, and lots and lots of custom code we found, we were able to install "custom code" on some phones and access global customer conf…
  continue reading
 
It's hard for a platform to have meaningful, useful ratings/reviews without both substantially Knowing Your Customer, engineering to detect manipulated reviews,and responding in a nuanced way -- to increase a fraudster's costs, and not just train them to hide better. Lots of examples of diverseplatforms not doing a very good job of this. (I'll also…
  continue reading
 
In 2017 a large corporation announced that they wanted to build a € 50 million theme park in a small forest that I had known from my childhood, thus replacing the future of our children with simple entertainment. An overwhelming feeling of injustice came over us. We created a plan, and we stuck to it. We drew a line in the sand.Fatalism can be your…
  continue reading
 
My experience of contributing to an open-source project for the first time and the juicy details (maths) of the geometry of the Sferical lamps (the ones that hang in Heaven / Silent Lounge)I'd like to take you with me on how I build a generator for spherical lampshades. I'll talk about how math slowly turns into magic. The math is mainly trigonomet…
  continue reading
 
In a world of relentless cyber-threats, MIAUW (Methodology for Information Security Assessment with Audit Value) turns every pentest into a high-impact, traceable mission. This session reveals how its storyline-driven playbook fuses technical exploitation, legal rigor and forensic reporting into a reusable blueprint that regulators love and attacke…
  continue reading
 
live-bootstrap is a worthy attempt to provide a reproducible, automatic, complete end-to-end bootstrap from a minimal number of binary seeds to a supported fully functioning operating system. Although it is starts with a minimal binary seed of only 280 bytes it also depends on a lot of other sources. What are those sources exactly and how can we re…
  continue reading
 
In 2017 (just before SHA2017) the Dutch healthcare sector came together to create Stichting Z-CERT, the Zorg Computer Emergency Response Team. A nonprofit to protect and advise the Dutch Healthcare sector. What started as a small startup has now grown into a scaleup with the ambitions to match.A lot has changed in the 3 years since the last talk ab…
  continue reading
 
Over the past few years, I’ve been casually poking around and stumbling upon exposed data and insecure infrastructure all across the telco ecosystem. From unsecured debug portals to full backend access, the leaks themselves might seem technically boring.In this talk, I’ll walk through a handful of real-world cases, showing how misconfigurations, sl…
  continue reading
 
I (hopefully) will have cycled from my home city of Mannheim all the way to the WHY camping grounds (>500km) in one go.I will report how I approached the whole endeavour, how I prepared, what the challenges were and what the hard part was.If I happen to not make it, I will describe how, why and what I should have done better.Planing and executing a…
  continue reading
 
Adversary-in-the-Middle (AiTM) phishing kits have matured into full-service SaaS platforms. This talk dives into the infrastructure, control panels, and sellers behind modern AiTM attacks. From Dockerized environments to Telegram bot-based UIs, we unpack how these platforms operate, scale, and monetize. We also highlight how this SaaS model is spre…
  continue reading
 
You want to learn more about Linux permissions? This is the talk for you. Let's learn about the basic UID/GID concepts in Linux and expand into more complex ACLs. Then escalating on the "everything-is-a-file" concept and applying the learned security logic onto program behavior using SELinux or AppArmor.The first point a "normal" user encounters Li…
  continue reading
 
Placeholder for WHY2025 Infrastructure Review... various *OC teams will present about the infrastructure they have built for WHY2025.At least Team:NOC will join; previously also Team:Nuts (Power), Team:POC and Team:VOC have joined.Licensed to the public under https://creativecommons.org/licenses/by/4.0/about this event: https://program.why2025.org/…
  continue reading
 
TETRA is a European standard for trunked radio used globally by police, military and civilian parties alike. In the past, we already published the hitherto secret inner workings of TETRA and on several of its severe security issues. We're now back to discuss the last crucial part of TETRA security - its optional (and costly) end-to-end encryption, …
  continue reading
 
For a good decade now, containerisation has been a popular solution: Addressing issues such as security, fault tolerance, and scalability, it has turned into a mainstay in IT. Though with a technology that ubiquitous, it does deserve investigation whether it has been put to good use or rather pressed into service.This talk includes a brief history …
  continue reading
 
The most common configurations seen in scanning domain names with [Internet.nl](https://internet.nl), e.g. those found in [biannual governmental measurements](https://www.forumstandaardisatie.nl/metingen/informatieveiligheidstandaarden).This talk will explain how to configure modern security standards on your domain name with the help of [the open …
  continue reading
 
Pwn2Own Ireland added a new target in the smarthome category: the Aeotec Smart Hub. We assumed this target would be an easy win. However, getting the firmware of this device turned out te be a lot harder than anticipated. First, we had to modify the board to dump the encrypted flash. Then, we abused a secure boot flaw to get the decryption key. Thi…
  continue reading
 
By 2025, an estimated 1.1 billion women globally will enter menopause, a natural, but misunderstood phase of life. This talk will address the stigma, myths, and misinformation surrounding menopause, focusing on the mental, physical, social, and economic challenges women face. It will also explore the struggles of LGBTQ+ individuals, often overlooke…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play