Wednesday, April 15, 2015

Arduino! Tomorrow!


If you missed the Arduino Innovation lunch today at Boyer, be sure to hit up the one at Arbor Lakes tomorrow (Thursday in room 1412 in Building 1). Chris Mueller will give you an introduction to this fun technology that's easy to learn and inexpensive to get started with.


Thursday, March 19, 2015

Tor! What is it good for?

Thanks to everyone that attended the March ITS Innovation Lunches about Tor!

Here is the presentation that I put together on the subject, with links to relevant news articles and the Tor and Tails project sites.



There were a lot of questions and interest in Tor, which is great!

Links from the presentation

How can you access the Tor network?
Potential use cases for Tor include: 

Questions from the audience—Answered!

Since Tor and Tails are both anonymity-based, questions came up about security. Tor doesn't provide end-to-end encryption, leaving exit node traffic vulnerable to spying. What can you do to get around that?
How easy would it be to compromise the network?
Since file-sharing isn't allowed, what are other safe, secure ways to share larger files on the network?
  • Use email that is Tor-enabled and preferably encrypted.
  • To share files in a whistleblowing scenario, organizations have started using SecureDrop, and the New Yorker set up a service called StrongBox built on the same framework.
When you visit a website, what IP address DO they get, since your original is hidden?
  • Suspicion around the room was correct—the Tor exit node's IP address is the one shared with the destination web server. There are only so many Tor exit nodes, so the more there are, the safer (and more anonymous) Tor users there are. 
Is Alex Halderman's group at U-M doing research regarding Tor?
People were also curious about what email options, for example, were available for people who did most of their computing on the Tails operating system.
  • Hushmail is a private email account that you can set up.
  • Alternatively, you can use GPGTools to encrypt your existing email, and send secure encrypted emails to people, who can then read them after they decrypt them. 
  • To use GPGTools and other forms of encryption, you need to set up a public key so that people can send you encrypted messages, and you send them encrypted emails in return! I set up an account on Keybase (here's me), which has a slick web interface for encryption, and also makes it really easy to set up and start using encryption. If you're interested in setting up an account, contact me for an invite.
And since Tails is an anonymity and privacy-based operating system for Windows, Mac, and Linux, there were questions about mobile options as well.
Thanks again to everyone that came to the lunch! Next month's lunch will cover Arduino



Friday, February 20, 2015

3D Scanning Lunch - Pictures and Videos!

Thanks to those of you that attended yesterday's innovation lunch about 3D scanning! Here are some pictures from the event.

Martin scans a participant with the Microsoft Kinect
The 3D scanner used was a Microsoft Kinect combined with Skanect software. In case you missed it at the lunch, here is a quick (2 minute) video on how the Kinect depth sensor works.

Also available was the Leap Motion. A quick (also 2 minute) video by CNET news shows how the Leap Motion works!

Some applications of the Leap Motion are:



Alex experiments with the Leap Motion
More information on next month's innovation lunch is coming soon!





Monday, February 9, 2015

Survey!!

Just a reminder to take the survey about the Innovation Lunch.


It helps let us know what you are interested in seeing next.

3D Scanning

On February 19th we have the topic of 3D scanning. There will be a short introductory talk, a list of software you can use and then some hands on fun.


- A Microsoft Kinect with Skanect software(http://skanect.occipital.com/)

- A Leap Motion(https://www.leapmotion.com/) will be on hand for you to see and use.




Friday, December 12, 2014

GPUs (video cards)

On December 11th Michael Grube from MCIT came and talked about how all those kids playing video games are helping shape the future of computing.

The video card in your computer likely has a 100 times more cores than your CPU. Michael talked about the challenges and advantages of tapping into all those parallel processors. He also covered the interesting discovers which might be made by having an order of more computational power.

The Mythbusters, as always, have some interesting examples of how CPUs and GPUs are different.



Click here to download his presentation and example code.

Monday, September 8, 2014

3D printing!

September 18th from 12-1pm Tyler will be talking about 3D printers. He'll be talking about why you would use them, some of the limitations and where you can get access to them. We'll have 15 minutes of discussion / question time at the end.

He will have a Cupcake Makerbot that you can check out and 3doodler.

Room 1412, Arbor Lakes building 1.

Bring your own lunch!


In separate news the 3D lab is having an open house September 12th.

For more information see the following URL

http://um3d.dc.umich.edu/