Browsed by
Category: Raspberry Pi

Picture in Picture Video with FFMPeg

Picture in Picture Video with FFMPeg

Creating a video with a smaller thumbnail video inside is known as a picture in picture effect. I’ve used other video editors in the past to merge various camera views together to give a more complete experience. In this post I’ll cover how to use FFMpeg to do the same thing. It expands the idea of tiled video, were multiple cameras share equal amounts of screen space. Thumbnails offer flavoring for the main camera view. I’m going to step by…

Read More Read More

Pan, Tilt, and Zoom with FFMpeg

Pan, Tilt, and Zoom with FFMpeg

There are times when the content in an image or video is lost in the surrounding details. Live security camera systems have a feature known as PTZ, short for Pan, Tilt, and Zoom. This allows the live cameras a hardware and software way to focus more on an object of interest. With FFMpeg, we can do something similar. In this post I’ll cover the basics of PTZ. Unlike live security cameras were you might notice a transition from the wide…

Read More Read More

FFMpeg Side by Side and Tiling Video

FFMpeg Side by Side and Tiling Video

FFMpeg has an interesting ability to join multiple video feeds together. In the past, I had use other video editors to do this. They were limited to 2 camera views. In addition, the second camera screen was scaled down and much smaller than the first video. With FFMpeg, we can join more than 2 camera feeds without resizing. I’ll be quick and to the point in this post so try not to blink. In this example I have 4 cameras…

Read More Read More

Bicycle Helmet Embedded Electronics

Bicycle Helmet Embedded Electronics

Several years ago I purchased a small video camera that was shaped like a flashlight for $50.  It had VGA 640 x 480 30 fps video quality and would record up to 2 hours on a single charge.  I used it to record several bike rides around the county on numerous bike trails.  The videos provided a way to recall the conditions and experiences which I used to plan future trips. A couple of years later I purchased some 808…

Read More Read More

CLI email using Blat and SSMTP

CLI email using Blat and SSMTP

When you are away from your computer, how do you know it is operating as expected? Some might use a web front end to allow them a way to periodically check it, but that involves taking a few moments to do. Instead of the person initiating the check, how about having the machine initiate its status. One way to do this is using email as the transport method. In this post I’ll cover two command line email tools that will…

Read More Read More

Monitoring Events with Syslog

Monitoring Events with Syslog

There are different ways to view and track how your systems are operating. Logging is a basic method of keeping records of actions taken by a network device. Most operating systems have some type of logging function. In linux, these log files are mostly processed with syslog. Syslog supports logging to remote hosts, which is useful if a system fails and local logs aren’t available. IOS and Windows take some work to get them to use the same feature. By…

Read More Read More

Dynamic DNS and DDClient

Dynamic DNS and DDClient

In my earlier posts I covered network services. The purpose of those services is to provide a function over a network connection. More often than not the internet connection of a network service host can change. In order for a client to access these network services, it needs to know where the host is. To remedy this problem, a “call home” service is used to register the host so the client can find it. This service is referred to as…

Read More Read More

Automation with SSH tunneling

Automation with SSH tunneling

In the last post I covered how SSH key pairs can be used as a form of two factor authentication, commonly known as 2FA.  In this post I’ll be covering SSH as a means to establish secure communications between systems.  Using SSH will provide a way to run commands on remote hosts, whether they be on node on a local network or accross the globe.  The key pair security is a way to set the remote host to only allow…

Read More Read More

Two Factor Authentication

Two Factor Authentication

Internet facing services are under constant attack. They are a coveted resource that provide footing when exploited. It’s prudent to not loose control of your services to abuse. One way to do this is to enable two factor authentication, commonly known as 2FA. Traditional authentication is based on what you know, a user name and a password. With 2FA, the second factor of authentication is what you have, a number token. In this post I’ll be covering how to setup…

Read More Read More

Metering electrical service to the home

Metering electrical service to the home

This project involves working near and around the electrical service panel. Do not perform these steps unless you are a licensed and qualified electrician. You assume all risk and liability. The information contained here is merely for reference purposes, I do not take any responsibility for the loss of property or life should anyone not follow this warning. Home energy use accounts for 11% of the total energy consumed nation wide. Typically, homes have a variety of energy services provided…

Read More Read More