Unrelated to part 1 – but the same genre. Actors this time: File Cloud: A cloud service for syncing and sharing files. We won’t drop a brand name, will we? Client: Another user of File Cloud. [Redacted]: Once known for reliability and as The Best Network. Dark Platform: Wannabe hackers’ playground. elkement: Somebody who sometimes just wants to be an […]Read More Cloudy Troubleshooting (2)
Actors: Cloud: Service provider delivering an application over the internet. Client: Business using the Cloud Telco: Service provider operating part of the network infrastructure connecting them. elkement: Somebody who always ends up playing intermediary. ~ Client: Cloud logs us off ever so often! We can’t work like this! elkement: Cloud, what timeouts do you use? […]Read More Cloudy Troubleshooting
The Data Kraken wants to grow new tentacles. I am playing with the CMI – Control and Monitoring Interface – the logger / ‘ethernet gateway’ connected to our control units (UVR1611, UVR16x2) via CAN bus. The CMI has become a little Data Kraken itself: Inputs and outputs can be created for CAN bus and Modbus, […]Read More Logging Fun with UVR16x2: Photovoltaic Generator – Modbus – CAN Bus
Technically, I work with Things, as in the Internet of Things. As outlined in Everything as a Service many formerly ‘dumb’ products – such as heating systems – become part of service offerings. A vital component of the new services is the technical connection of the Thing in your home to that Big Cloud. It […]Read More Internet of Things. Yet Another Gloomy Post.
In the last post, I showed how to use Raspberry Pi as CAN bus logger – using a test bus connected to control unit UVR1611. Now I have connected it to my heat pump’s bus. Credits for software and instructions: juerg5524.ch messpunkt.org SK Pang Special thanks to SK Pang Electronics who provided me with CAN […]Read More Hacking My Heat Pump – Part 2: Logging Energy Values
Not that I desire it, but my recent encounters of ransomware make me wonder. Some people in say, accounting or HR departments are forced to use e-mail with utmost paranoia. Hackers send alarmingly professional e-mails that look like invoices, job applications, or notifications of postal services. Clicking a link starts the download of malware that […]Read More Have I Seen the End of E-Mail?
Three years ago I found a research paper that proposed a combination of distributed computing and heating as a service: A cloud provider company like Google or Amazon would install computers in users’ homes – as black-boxes providing heat to the users and computing power to their cloud. In the meantime I have encountered announcements […]Read More Everything as a Service