Connect with us
Raspberry Pi 400 Touch Screen Kits Unveiled Ready computers Raspberry Pi 400 Touch Screen Kits Unveiled Ready computers

Computers

Raspberry Pi 400 Touch Screen Kits Unveiled

Published

on

Among those who are fond of computer technology, you can find many people familiar with the concept of Raspberry Pi. The Raspberry Pi is a miniature computer that literally fits in the palm of your hand, but this kind of device had one drawback – the lack of a display. But then Waveshare came to the rescue with the introduction of Raspberry Pi 400 kits equipped with a 13.3 or 7 inch touchscreen display.

Progress does not stand still and the Raspberry Pi is also gradually evolving. About a month ago, the Raspberry Pi 400 was introduced – a keyboard with a microcomputer inside.

Raspberry Pi 400 Touch Screen Kits Unveiled

Waveshare has gone further and offers entire kits that include a Raspberry Pi 400, mouse, microHDMI cable, Micro-USB touch cable, power supply, and microSD card. An additional display power supply is included with the 13.3-inch model.

A total of two sets were released: with a 13.3-inch display (resolution 1920 x 1080 pixels) and with a 7-inch display (resolution 1024 x 600 pixels). Both displays are equipped with an IPS matrix, and the 13-inch display also has a built-in speaker. The large model can handle up to 10 touch points, while the 7-inch model can handle up to 5 points.

Waveshare delivers truly portable PCs that can fit into a small backpack or bag and can be easily deployed when needed. The Raspberry Pi 400 7-inch kit is priced at $ 179.99, while the 13.3-inch kit is priced at $ 269.99.

Source: Tom’s Hardware

Click to comment

Leave a Reply

Your email address will not be published.

Computers

Computer simulations have shown that global warming will lead to regular super downpours

Published

on

Computer simulations have shown that global warming will lead to

Global climate change will provoke regular powerful downpours. An article about this is published in Geophysical Research Letters.

Computer simulations have shown that global warming will lead to regular super downpours

This conclusion was made by specialists from the University of Copenhagen and the Danish Meteorological Institute when studying a super shower that passed over Copenhagen in July 2011. The authors of the work decided to recreate it in a computer simulation to find out what caused it. The simulation was run 13 times, once for each level of global temperature, namely: -1 degrees Celsius relative to the norm (pre-industrial era), 0 (norm in 2011), and +1, +2 and +3 degrees Celsius . The distance between the data points in the model, known as the grid size, was about 2.5 kilometers (this can be roughly considered model pixels). In comparison, global climate model grid points are typically at least 50 kilometers apart, so the new simulation can be considered extremely accurate.

It turned out that the higher the temperature was, the more abundant the downpour became and the more powerful the flood it caused. In particular, if the climate had not warmed by one degree over the 20th century, the chance of the formation of a super shower in 2011 would have been half as much. The authors of the paper believe that this fact should be taken into account when planning climate policy.

Continue Reading

Components

The new space computers will be 100 times more powerful than the current ones. NASA selects architecture and manufacturer for next-generation space processors

Published

on

The new space computers will be 100 times more powerful

NASA has chosen a new processor architecture that will be used to create chips for future space missions.

The new space computers will be 100 times more powerful than the current ones.  NASA selects architecture and manufacturer for next-generation space processors

The management opted for the RISC-V architecture and, in particular, SiFive, which develops the corresponding processor cores. The company announced that the new High-Performance Spaceflight Computing (HPSC) processor, which will be used in virtually all NASA missions, including lunar and Martian missions, will use the eight-core SiFive Intelligence X280 RISC-V vector core and four additional SiFive cores RISC-V. As a result, this should provide a 100-fold increase in the computing power of new space computers compared to current generation solutions.

Significant performance increases will help open up new opportunities for various elements of missions, including autonomous rovers, imaging, spaceflight, guidance systems, communications, and so on.

It is still unclear when the first devices based on the new processors will be launched. Given the timing of the development of space missions, it is likely that at least a few more years will pass.

Continue Reading

Computers

In Israel, they figured out how to steal data from a computer using a speaker and a smartphone

Published

on

In Israel they figured out how to steal data from

In Israel, they showed a new technique for stealing data from an isolated PC. For this, an ultrasonic channel and a smartphone gyroscope are used. The new method is called GAIROSCOPE and was developed by Israeli researcher Mordechai Guri.

In Israel, they figured out how to steal data from a computer using a speaker and a smartphone

The technique uses a program that causes an isolated computer to transmit information using a microelectromechanical system (MEMS). Such a system can emit ultrasound, which is then captured using a smartphone’s gyroscope, and another program can decode the data and translate it into binary code. A computer speaker is used as an example of MEMS.

At the first stage, it is necessary to install a program for generating ultrasound on the victim’s computer. This can be done in different ways – from a banal flash drive to a hacker attack or compromise of software supply chains. You can even embed such a program into a web page using JavaScript. You also need to infect the smartphone of company employees. This can be done using a hacked website or mobile app.

After that, the speaker can transmit data in the range of ultrasound that a person cannot hear. The infected smartphone is nearby and perceives these signals using a gyroscope, after which it is only necessary to send them from the smartphone via Wi-Fi.

In Israel, they figured out how to steal data from a computer using a speaker and a smartphone

Experimental results show that a similar method can be used to transmit data at a speed of 1-8 bps at distances of 0-600 cm. That is, it is only suitable for stealing keys. Passwords and other similar information.

Guri notes that it is possible to defend against the attack. For this you need:

  • remove speakers and sound drivers from computers;
  • track ultrasonic signals using sensors;
  • oblige employees to keep smartphones at least 800 cm away from computers;
  • drown out the signal with external noise.

Previously, the same researcher developed the SATAn attack method, which uses a SATA cable as an antenna for data transmission.

Continue Reading

Most Popular