Thank You JavaOne!
Thank You
Thank You JavaOne attendees for joining my session today on I/O programming with Java using Pi4J on the Raspberry Pi. Thank You Oracle for accepting my talk and providing the opportunity to for me to spead the embedded/IOT message.
I do plan on posting additional in-depth articles to this blog that cover how I built the demo system and the access control solution. In the meantime, I have posted a couple of photos from the session as well as the slides and links to the source code below.
Photos
Slides / Presentation
Source Code
All of the source code examples used in the presentation can be found here on GitHub:
https://github.com/savagehomeautomation/pi4j-javaone-demos
Reader Comments (10)
I'd really like to hear about plans to harden the software and peripherals on the projects you're designing. I am not yet a programmer, but have a RPi on which I plan to tinker. I am concerned about the software vulnerabilities of various peripherals and the Pi, itself, especially if one is running Java anything. Java has been shown to be one of the most easily hacked languages on windows machines. Is it not the same on Linux machines? If it isn't, is that due to planning and preparation, or just from a lack of targeting by hackers who see that as a small and difficult target set?
Thanks for any information you can provide or point me to.
steve
@Steve,
Security can have a lot to do with the surface exposure that you permit on public facing interfaces such as the Internet. In my case (in my home), the Raspberry Pi's do not have any Internet facing ports or services. All my automation devices and services run behind a protected firewall. This network topology significantly reduces the exposure to external threats.
The Pi4J project itself does not implement any form of security because it does not by itself provide any external communication mechanism. Security layers would need to be implemented at a higher layer if exposing services/ports/sockets/servers/etc.
Pi4J is like a hammer in your toolbox. You don't secure the hammer, you lock the entire toolbox.
Thanks, Robert
Get here all the latest information about internet of things
http://communityforum.sportngin.com/profile/5754430
http://www.kongregate.com/accounts/iotnewsportal
charldar weslie e3d3fd1842 https://hyze.ru/alpocbage
charldar weslie e3d3fd1842 https://hyze.ru/alpocbage
yakyrtrib d4f391380b https://cdn.thingiverse.com/assets/b9/f2/b1/a3/b2/Steinberg_Neo_Soul_Keys_Crack.html
yakyrtrib d4f391380b https://cdn.thingiverse.com/assets/b9/f2/b1/a3/b2/Steinberg_Neo_Soul_Keys_Crack.html
yakyrtrib d4f391380b https://cdn.thingiverse.com/assets/b9/f2/b1/a3/b2/Steinberg_Neo_Soul_Keys_Crack.html
yakyrtrib d4f391380b https://cdn.thingiverse.com/assets/b9/f2/b1/a3/b2/Steinberg_Neo_Soul_Keys_Crack.html
yakyrtrib d4f391380b https://cdn.thingiverse.com/assets/b9/f2/b1/a3/b2/Steinberg_Neo_Soul_Keys_Crack.html