How To Backup and Restore your Inventory Management System
Connecting all your devices to the Raspberry Pi is very easy, but you want to do it in a specific order so it can recognize all your devices when it boots up. First, connect your HDMI cable to your Raspberry Pi and your monitor, then connect your USB devices. If you’re using an Ethernet cable to connect to your router, go ahead and connect that as well. Finally, once everything is connected, go ahead and plug in your power adapter. The Raspberry Pi does not have a power switch, so once you connect the power adapter, it’ll turn on all by itself.
My name is Cory, I'm a Technical Craftsman specializing in creative problem solving within electronics and software engineering. Professionally, I've worked as an electronics engineer, a plastics fabricator, software engineer, an industrial laser technician, and, of course, a coffee barista. I've spent the last several years working on a Smart Garden System project I named, hydroMazing. I'm sharing my work with you because I would like to empower everyone who is interested in a "Smart" approach to gardening.
A nutrient solution system typically consists of a two or three part liquid solution containing the essential diet for a plant added to clean tap water. The manufacturer of the nutrient solution will include or reference a feeding schedule recommended for various common types of plants. Unfortunately, most minerals are mined and processed by the manufacturers, however, many offer an organic option while some specialize in only organic.
The greatest advantage to using the Arduino family of microcontrollers for DIY electronics projects, is that they are ubiquitous. Since they are so available, they are inexpensive and you can find open-source software to get started. If you’ve ever had the opportunity to work with an Arduino Uno microcontroller board, then you’ve probably executed the flashing LED example. Going further, you might attach a button, or switch, to trigger the LED or to turn it off making the project interactive. There are many sensors that could be connected to the Arduino Uno and setup to trigger events, such as the LED flashing, using threshold values that we would need to experiment with in order to figure out what settings work best for creating the effect we want.
You have a Raspberry Pi, or are comfortable with the idea of using one, and you want to use it to capture video or images using a USB camera. Even though the Raspberry Pi has a port designed specifically for using a camera, it's not as low-cost, nor as convenient as the USB corded camera.
The hydroMazing controller is designed to operate ventilation fans for air circulation, water pumps, occasionally a humidifier, heaters, or any other appliance that is necessary to maintain an ideal environment for plants to grow. Typically, we DIY'ers would hook-up some relays to a microcontroller to achieve control. However, with hydroMazing, the system uses remote controlled wireless AC outlets, ensuring safer control than traditional relays. hydroMazing uses low-cost open-hardware modules and the ubiquitous microcontroller, the Atmega328, on an Arduino Nano*, offering the flexibility of customization and expansion. The sensor choices are endless, but I’ve narrowed it down to a few important and relatively inexpensive modules. A temperature and relative-humidity sensor, moisture sensors for soil, liquid temperature probe for hydroponics, a simple photocell. There are many other optional additions including the float switch or switches and flow-rate sensors.
In my previous article , I explain how to setup the Raspberry Pi to be a web server. I also demonstrate searching log files for "footprints" from the IP requests that have been made to your web server. Now, I would like to discuss protecting your web server from becoming a victim to a potentially malicious attack.
Security and Obscurity “In security engineering, security through obscurity (or security by obscurity) is the reliance on the secrecy of the design or implementation as the main method of providing security for a system or component of a system. A system or component relying on obscurity may have theoretical or actual security vulnerabilities, but... Continue Reading →