Sponsored Content
Full Discussion: Arduino Robot Tank Project
Special Forums Hardware Arduino Robot Tank Project Post 303043242 by Neo on Wednesday 22nd of January 2020 05:04:57 AM
Old 01-22-2020
Some FYI on this project.

I'm currently waiting on KeyeStudio, the supplier of this RobotTank kit, to come off their Chinese New Years holiday and provide us with the basic "demo" Arduino sketches for this, instead of the Mixly graphical "code" they provide.

There are a few reasons for this. First, I'm personally not into graphical programming (like Mixly, which seem like a child's programming toy to me) and strongly prefer the C++ like Arduino IDE coding. Second, when I downloaded the mixly archive file provided by KeyeStudio, my Avast anti-virus scanner complains the archive contains some malware; and I'm just too busy to debug and "de-virus" the KeyeStudio Mixly archive.

KeyeStudio has kindly informed me they would get me the actual Arduino demo sketches for this robot kit after the Chinese New Years holiday is past, sometimes in February. I was going to make a video on the "virus alert" when unarchiving the mixly archive from KeyeStudio, but I've just been busy and making a "look at this virus alert" video for a supplier has not been a priority here. KeyeStudio was not satisfied with my photos of the virus alert(s) and requested a video!


I imagine, however, I'll start coding this robot long before I get the demo Ardunio sketches from KeyeStudio, but let's see what happens. My plan is to go beyond the kit and add some other sensors plus some other command and control boards. Let's see how long this kit can hold our attention. We have been playing with the kit little by little, not in a hurry, since we are waiting on supplier to get us the Arduino demo sketches before diving too far into this.

More later as we progress......

Note: The spelling is correct. It is KeyeStudio, not KeyStudio.
 

6 More Discussions You Might Find Interesting

1. Windows & DOS: Issues & Discussions

Adding robot and drives

Hi All Im running veritas netbackup 6.5.5, on MWindows 2003 master server. Ive just added a Quantum PX500 with 2 drives, the problem im facing is that now under the storage unit tab on console all the storage unit types for NDMP have the new robot listed and not the original one. The set up i... (0 Replies)
Discussion started by: blossy786
0 Replies

2. Programming

Arduino-cli - Uploading to Unknown Chinese Arduino Boards using the Arduino Command Line Interface

In my further exploration of Arduino, today I decided to install the arduino-cli on my mac today. https://github.com/arduino/arduino-cli I followed the instructions for macOS but when I got to this part: arduino-cli board list I got the dreaded "Unknown" Fully Qualified Board Name... (1 Reply)
Discussion started by: Neo
1 Replies

3. Programming

More Arduino Stuff...

HI all... (Apologies for any typos.) To add to Neo's Arduino subject matter I have decided to upload this in ".zip" format. Ignore "*.info" files these are AMIGA icons only and also the "HAM" drawer as these are photos in ancient AMIGA HAM modes. I have noticed that there are current... (6 Replies)
Discussion started by: wisecracker
6 Replies

4. Programming

Arduino UNIX Time - Syncing Computer UNIX Time to Arduino Time with Python

Just finished a quick Python script to send the current unix time over to the Arduino from macOS, so in the absence of GPS or some other way to get the unix timestamp (epoch time) to the Arduino, I can get my macOS and Arduino UNO synced to within a second. Normally, when the Arduino starts... (9 Replies)
Discussion started by: Neo
9 Replies

5. Programming

Arduino Project with NB-IoT (3GPP) and LoRa / LoRaWAN

My favorite projects are always related to the "latest" tech in command and control, networking and network communications. This Elecrow GSM/GPRS/EDGE SIM5360E 3G Shield seems to be the "latest and the greatest" as far as 3G and GPS, as far as I can see so far, but I has it drawbacks for sure.... (6 Replies)
Discussion started by: Neo
6 Replies

6. Programming

Arduino Project: iPhone to HM-10 BLE to NB-IoT Shield to NB-IoT Network to Internet to Linux Server

This post describes a "work in progress" project I started today. Here is the High Level Overview: Currently, this project sits on my desk as an Arduino UNO (on the bottom), an NB-IoT Shield (sandwiched in the middle), a Sensor Shield (on top) with a HM-10 BLE Module (in the little... (13 Replies)
Discussion started by: Neo
13 Replies
P11-KIT(8)							  System Commands							P11-KIT(8)

NAME
p11-kit - Tool for operating on configured PKCS#11 modules SYNOPSIS
p11-kit list-modules p11-kit extract --filter=<what> --format=<type> /path/to/destination DESCRIPTION
p11-kit is a command line tool that can be used to perform operations on PKCS#11 modules configured on the system. See the various sub commands below. The following global options can be used: -v, --verbose Run in verbose mode with debug output. -q, --quiet Run in quiet mode without warning or failure messages. LIST MODULES
List system configured PKCS#11 modules. $ p11-kit list-modules The modules, information about them and the tokens present in the PKCS#11 modules will be displayed. EXTRACT
Extract certificates from configured PKCS#11 modules. $ p11-kit extract --format=x509-directory --filter=ca-anchors /path/to/directory You can specify the following options to control what to extract. The --filter and --format arguments should be specified. By default this command will not overwrite the destination file or directory. --comment Add identifying comments to PEM bundle output files before each certificate. --filter=<what> Specifies what certificates to extract. You can specify the following values: ca-anchors Certificate anchors (default) trust-policy Anchors and blacklist blacklist Blacklisted certificates certificates All certificates pkcs11:object=xx A PKCS#11 URI If an output format is chosen that cannot support type what has been specified by the filter, a message will be printed. None of the available formats support storage of blacklist entries that do not contain a full certificate. Thus any certificates blacklisted by their issuer and serial number alone, are not included in the extracted blacklist. --format=<type> The format of the destination file or directory. You can specify one of the following values: x509-file DER X.509 certificate file x509-directory directory of X.509 certificates pem-bundle File containing one or more certificate PEM blocks pem-directory Directory PEM files each containing one certifiacte openssl-bundle OpenSSL specific PEM bundle of certificates openssl-directory Directory of OpenSSL specific PEM files java-cacerts Java keystore 'cacerts' certificate bundle --overwrite Overwrite output file or directory. --purpose=<usage> Limit to certificates usable for the given purpose You can specify one of the following values: server-auth For authenticating servers client-auth For authenticating clients email For email protection code-signing For authenticated signed code 1.2.3.4.5... An arbitrary purpose OID EXTRACT TRUST
Extract standard trust information files. $ p11-kit extract-trust OpenSSL, GnuTLS and Java cannot currently read trust information directly from the trust policy module. This command extracts trust information such as certificate anchors for use by these libraries. What this command does, and where it extracts the files is distribution or site specific. Packagers or administrators are expected customize this command. BUGS
Please send bug reports to either the distribution bug tracker or the upstream bug tracker at https://bugs.freedesktop.org/enter_bug.cgi?product=p11-glue&component=p11-kit. SEE ALSO
pkcs11.conf(5) Further details available in the p11-kit online documentation at http://p11-glue.freedesktop.org/doc/p11-kit/. p11-kit P11-KIT(8)
All times are GMT -4. The time now is 10:56 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy