Tech Insight : Tasty Offering : Raspberry Pi
With Raspberry Pi Ltd considering an Initial Public Offering, we look at what this kind of computer is, its value in promoting computer literacy, and what similar alternatives there are.
Raspberry Pi
Raspberry Pi, the most well-known Pi, is a series of small, affordable, single-board computers (SBCs) developed by the Raspberry Pi Foundation in the United Kingdom. It is a leader in low-cost, high-performance computing that has now been around for some time. For example, the first Raspberry Pi was introduced on 29 February 2012 and several models featuring improvements in performance, memory, and connectivity options have been introduced since then. The different models cater to a variety of user needs, from the basic Model A and A+ to the more advanced Model B and B+ series, and the high-performance Raspberry Pi 4.
Who Is It For?
The primary goal of the Raspberry Pi project is to promote the teaching of basic computer science in schools and developing countries. Also, as Eben Upton, CEO of Raspberry Pi points out, it was designed to be “affordable enough for young people to own and explore with confidence”.
Raspberry Pi is actually a subsidiary of the Raspberry Pi Foundation, which is a UK charity (founded in 2008), with the goal of promoting interest in computer science among young people.
Large Community
Raspberry Pi products (which are available in over 70 countries) actually enjoy a great deal of community support as they are backed by a large, active community of users and developers who share projects, tutorials, and software, facilitating learning and problem-solving.
Markets
Raspberry Pi says its products are actually sold in three principal markets: the Industrial and Embedded market, which in 2023 accounted for 72 per cent of unit sales, the Enthusiast and Education market, which in 2023 accounted for 28 per cent of unit sales, and the semiconductor market, which Raspberry Pi entered in early 2021 with the launch of its first semiconductor product ( the RP2040 microcontroller).
Raspberry Pi Vs Traditional Computers – What Are The Differences?
The main differences between a Raspberry Pi and other traditional desktop and laptop computers are:
– Size and form. They are significantly smaller (often credit card-sized), making them ideal for space-limited projects.
– It’s much more affordable – ranging from £4 to £35, making it accessible to students and hobbyists.
– The difference in hardware. For example, it comes as a bare circuit board, requiring users to connect their own peripherals like keyboard, mouse, and monitor.
– The operating system. It typically runs a Linux-based OS, with Raspberry Pi OS being the most common, unlike the Windows or macOS on traditional computers.
– The GPIO pins, i.e. it features General-Purpose Input/Output pins for connecting and controlling external hardware like sensors and motors, ideal for DIY projects and hardware programming.
– Much lower power consumption, making it suitable for always-on or power-sensitive projects.
– Community and resources. As mentioned above, it’s supported by a large, active community.
Why Is It In The News?
Raspberry Pi Ltd is in the news at the moment because it is considering an Initial Public Offering – it has announced its expected intention to float on the London Stock Exchange. Raspberry Pi has a strong track record of revenue growth and profitability and for the year ended 31 December 2023, revenues were $265.8 million. Although a valuation for the company hasn’t been officially announced, it’s been rumoured that £300 million+ doesn’t seem too unlikely.
Also, Raspberry Pi has made the news recently because:
– It has unveiled several new products, such as an AI camera kit featuring a 12MP Sony IMX500 sensor, a new 15.6-inch monitor with HDMI connectivity, and the long-awaited M.2 HAT for fast NVMe storage on the Raspberry Pi 5.
– The Raspberry Pi Foundation has significantly increased production of Raspberry Pi 5 units, with the goal of manufacturing up to 90,000 boards per week.
– A new Compute Module 5 (CM5) looks likely to launch soon.
Alternatives
Raspberry Pi is, however, not the only single-board computer or microcontroller out there, and these alternatives are typically aimed at (and used by) a variety of audiences, each with different applications in mind. Here are a few of the most popular SBC alternatives to Raspberry Pi:
– Arduino. While not a direct competitor, Arduino boards are widely used in electronics projects and prototyping. Unlike the Raspberry Pi, Arduino is a microcontroller rather than a full computer. Models include the Arduino Uno, Arduino Mega, and Arduino Nano.
– BeagleBone. BeagleBone boards are powerful single-board computers similar to the Raspberry Pi but often offer more I/O options and are used for more advanced projects. Models include the BeagleBone Black, and BeagleBone Green.
– Odroid. These boards are known for their high performance and are suitable for applications requiring more computing power. Popular models include the Odroid XU4, Odroid C2, and the Odroid N2+.
– Banana Pi. These boards are similar to Raspberry Pi in form factor and functionality but often come with additional features like more RAM or better network connectivity. Models include the Banana Pi M4, and Banana Pi M2 Zero.
– Rock Pi boards offer high performance and are compatible with a range of operating systems, including Linux and Android. Popular models include the Rock Pi 4, and Rock Pi X.
– NanoPi. These boards are compact and affordable, catering to various applications from simple projects to more complex IoT solutions. Models include the NanoPi M4, and NanoPi Neo4.
– Orange Pi. These boards are regarded as being versatile and budget-friendly and can be used for a range of applications similar to the Raspberry Pi. Popular models include the Orange Pi Zero, and Orange Pi PC.
What Does This Mean For Your Business?
The advancements in single-board computers (SBCs) like Raspberry Pi, along with similar devices (e.g. Orange Pi, Arduino, BeagleBone, and Odroid) are transforming the landscape for UK businesses across various sectors. These versatile and affordable tools offer significant value to different user groups, driving innovation and efficiency in multiple domains.
For educational institutions, for example, these devices provide an excellent platform for teaching computer science and STEM subjects. By incorporating SBCs into the curriculum, schools and universities can offer hands-on learning experiences that enhance students’ technical skills and creativity. This not only prepares students for future careers in technology but also fosters a culture of innovation from a young age.
In the realm of development and engineering, businesses can leverage the flexibility and cost-effectiveness of SBCs for rapid prototyping and product development. Whether it’s a startup developing new IoT solutions or an established company refining its automation processes, these devices enable quick iterations and testing at a fraction of the cost of traditional development platforms. The extensive community support and resources available for these devices further facilitate innovation and problem-solving.
Industrial applications also benefit significantly from the deployment of SBCs. For example, the robustness and adaptability of these devices make them ideal for creating custom automation systems, enhancing operational efficiency, and reducing costs. Businesses can implement tailored solutions for monitoring, control, and data analysis, improving productivity and decision-making processes.
The potential flotation of Raspberry Pi and the growth of its competitors like Arduino and BeagleBone could bring significant changes to the market. Increased capital from public offerings would enable these companies to accelerate their innovation cycles, enhance their product offerings, and expand their market reach. This competitive environment could lead to more advanced, cost-effective solutions, benefiting consumers and businesses alike.
For businesses considering the adoption of SBCs, the stability and growth prospects of these companies are likely to mean continued support and development for their platforms. This assurance can encourage more extensive integration of these devices into business operations, knowing that they are backed by financially robust and innovative companies. Moreover, the diverse ecosystem of SBCs ensures that businesses can choose the most suitable device for their specific needs, whether it’s for educational purposes, development, or industrial applications.
Tech News : UK Company Scammed $25 Million Via Deepfakes
It’s been reported that an employee at London-based design and engineering multinational, Arup, was duped by a deepfake video call into paying a staggering $25.6 million to fraudsters.
What Happened?
According to reports published on CNN, back in January, a finance employee in Arup’s Hong Kong office received what they suspected was a phishing email, purporting to be from the company’s UK office, because it requested a secret transaction.
The employee then reportedly took part in a video call with people who looked and sounded like senior staff members (including the CFO) but who were in fact deepfakes! It’s been reported that this deepfake video call led to the employee putting aside previous doubts and subsequently agreeing to transfer 200 million Hong Kong dollars / $25.6 million via 15 separate transactions.
The fraud was reportedly only discovered following the employee making an official inquiry with the company’s headquarters, which resulted in a police investigation.
Confirmed
A spokesperson from Arup (the company behind world-famous buildings such as Australia’s iconic Sydney Opera House and the Bird’s Nest Stadium in Beijing) has been reported as saying that whilst they can’t go into details, they “can confirm that fake voices and images were used”.
Financial Stability Not Affected
Despite $25 million going astray and the initial suspected phishing email, Arup’s reported email statement said: “Our financial stability and business operations were not affected and none of our internal systems were compromised.”
Many Deepfake Scams
There have been many high-profile and large-scale deepfake scams in recent years, including:
– In 2023, a deepfake video scam of consumer champion Martin Lewis was circulated on social media to trick people into investing in something called ‘Quantum AI’ (an app) which scammers claimed was Elon Musk’s new project.
– In 2022, the chief communications officer at the world’s largest crypto exchange, Binance, claimed that a deepfake AI hologram of him (made from video footage of interviews and TV appearances) had been used on a Zoom call to scam another business, leading to significant financial losses.
– In 2020, a branch manager of a Japanese company in Hong Kong received an AI deepfake call that sounded like the Director, but was actually from fraudsters. The call used an AI to mimic the CEO’s voice to instruct a bank manager to engage with a fictional lawyer, which then led to the authorisation and transfer of $35 million to fraudulent accounts.
– In 2019, an energy company in the UK was defrauded of €220,000 ($243,000) through a deepfake audio scam. The fraudsters used AI-generated voice technology to impersonate the CEO of the firm’s parent company, instructing a senior executive to transfer funds to a Hungarian supplier.
More Sophisticated Attacks
Following the recent scamming of Arup, Rob Greig (Arup’s global chief information officer) has been reported as saying : “Like many other businesses around the globe, our operations are subject to regular attacks, including invoice fraud, phishing scams, WhatsApp voice spoofing, and deepfakes.” He noted that “the number and sophistication of these attacks has been rising sharply in recent months”.
What Does This Mean For Your Business?
This massive $25 million deepfake scam involving Arup is a reminder of the growing sophistication and severity of digital fraud. Sadly, this incident is not an isolated case but part of a broader trend of increasingly advanced scams leveraging AI. The rapid advancements in AI technology and its wide availability have made it easier for fraudsters to create highly convincing deepfake videos and audio, posing significant risks to businesses of all sizes.
For UK businesses, this incident is a reminder of the urgent need to enhance security measures and verification processes. Traditional methods of authentication, such as emails and video calls, can no longer be solely relied upon. Instead, businesses may want to adopt multi-layered security strategies that include advanced AI-based detection tools, biometric verification, and identity verification protocols. Regular training and awareness programmes for employees may also now be essential to help them recognise and respond to potential threats.
This incident also highlights the critical role of law enforcement and regulatory bodies in combating digital fraud. Enhanced cooperation and information sharing between businesses, cybersecurity experts, and law enforcement agencies are vital to staying ahead of these sophisticated attacks. Implementing stricter regulations on the use and dissemination of AI technology and ensuring that companies have access to the latest detection and prevention tools will be crucial steps in this battle.
The Arup scam demonstrates that even technologically savvy industries are not immune to the threats posed by deepfakes.
Tech News : Booking.com Becomes “Gatekeeper”
Online travel marketplace, Booking.com, has been designated a ‘gatekeeper’ company by the EU under its new Digital Markets Act (DMA) competition law, meaning that Booking.com now has six months to comply.
Gatekeepers?
Under the EU’s new Digital Markets Act (DMA), ‘gatekeepers’ are large digital platforms that play a pivotal role in the digital economy. They are judged as acting as intermediaries between businesses and users, i.e. controlling key ‘gateways’ through which businesses reach consumers. The DMA, which is aimed at tackling monopolising practices and ensuring fair and open digital markets, sets specific criteria to identify these gatekeepers and imposes obligations and prohibitions on them to prevent anti-competitive practices.
Why Booking.com?
According to the DMA rules, ‘gatekeepers’ are companies within the EU with more than 45 million monthly end users, more than 10,000 business users per year, and a market cap of at least €75bn.
It seems, therefore, that following a self-assessment (submitted on March 1), the EC has decided that the Booking.com travel platform meets the DMA thresholds and, therefore, is now considered to be an “important gateway between businesses and consumers.”
Thierry Bretton, EU Commissioner for Internal Market, has been reported as saying: “Booking is an important player in the European tourism ecosystem and is now also a designated gatekeeper.”
What Does This Mean For Booking.com?
As a gatekeeper, Booking.com now faces specific obligations under the DMA to ensure fair competition and prevent anti-competitive practices. These include:
– Data usage restrictions. Booking.com cannot, for example, use data from business users (e.g. hotels) to compete against them.
– Interoperability. It must allow third parties to interoperate with its services, providing necessary technical access.
– Advertising transparency. Booking.com must offer advertisers and publishers access to performance measurement tools for independent ad verification.
– An anti-tying and bundling obligation means no additional services as a condition for accessing its platform.
– Access to data. Booking.com must provide business users with access to the data they generate on the platform.
– Fair treatment. The company can’t favour its own services or products in search rankings over third-party offerings.
Practical Implications
There are also some practical implications for Booking.com, including:
– Operational adjustments which include significant changes to internal operations, data management, and platform functionalities.
– Increased transparency, e.g. enhanced transparency in ranking, data usage, and advertising charges.
– Additional legal, administrative, and technological expenses to ensure compliance.
– A change to its competitive landscape as the restrictions under the DMA may reduce competitive advantages, levelling the playing field for smaller competitors.
– Increased regulatory scrutiny such as monitoring plus potential penalties from the European Commission for non-compliance.
What Happens If It Doesn’t Comply?
Booking.com now has 6 months to comply but if it doesn’t, it could be facing eye-watering fines of up to 10 per cent of its total worldwide annual turnover, increasing to 20 per cent for repeat offences. Also, it could face periodic penalties up to 5 per cent of its average daily turnover for specific non-compliance issues. To put this in perspective, Booking.com (as part of Booking Holdings) reported a total worldwide turnover of $21.3 billion in 2023.
It’s understood that Booking.com and other gatekeepers have already started implementing measures to comply with their gatekeeper obligations under the DMA and are required to submit detailed compliance reports to the European Commission. However, other companies, like ByteDance (TikTok’s owner) and Meta, have contested their gatekeeper designations
Who Are The Other Gatekeepers?
In addition to the aforementioned ByteDance, Meta, and now Booking.com, other well-known gatekeepers include (not surprisingly) Alphabet (Google), Apple, Amazon, and Microsoft.
Following X’s claim (submitted on 1 March 2024) that, despite meeting the thresholds, it doesn’t qualify as an important gateway between businesses and consumers, it’s understood that the European Commission has opened a market investigation to further assess X’s rebuttal.
What Does This Mean For Your Business?
The designation of Booking.com as a gatekeeper under the EU’s Digital Markets Act (DMA) represents another significant shift in the regulatory landscape for large digital platforms. For Booking.com, this means it must adhere to stringent new rules aimed at ensuring fair competition and preventing the misuse of its market power. This could, however, involve substantial operational adjustments.
For competitors and markets, the DMA’s enforcement may lead to a more balanced competitive environment. Smaller businesses/competitors and new entrants may, for example, find it easier to compete if the ‘gatekeepers’ like Booking.com are restricted from engaging in the many possible anti-competitive practices, e.g. data misuse and unfair bundling of services. This could, of course, foster greater innovation and diversity in the market, as barriers to entry are lowered and smaller companies gain more opportunities to attract customers.
Consumers are also likely to benefit from the DMA’s regulations. For example, with increased transparency in how services are ranked and advertised, they may be able to make more informed choices. The DMA’s requirement for fair treatment and data access may mean that consumers see a wider variety of options and potentially lower prices as competition increases. Also, enhanced data protection measures could help safeguard consumer information, addressing privacy concerns that have become increasingly prominent in the digital age.
Overall, the implementation of the DMA and the compliance efforts by gatekeepers like Booking.com may signal a transformative period for digital markets. UK businesses operating within these markets should prepare for changes in competitive dynamics and be ready to leverage new opportunities that arise from a potentially more equitable digital ecosystem.
An Apple Byte : iPhone Bluetooth Stalking Warning
Apple says it has worked with Google to create an industry specification that can alert users across both iOS and Android if a Bluetooth tracking device is being used to track them (also known as Bluetooth Stalking).
The new capability, which is being implemented in Apple’s new iOS 17.5 (and on Android 6.0+ devices) will deliver an “[Item] Found Moving With You” alert on those devices if an unknown Bluetooth tracking device is seen moving with them over time, regardless of the platform the device is paired with.
Apple says this will “help mitigate the misuse of devices designed to help keep track of belongings.” For example, if a user receives the alert on their iOS device, it means that someone else’s AirTag, Find My accessory, or other industry specification-compatible Bluetooth tracker is moving with them.
Security Stop Press : Insurance Industry and Security Coalition To Tackle Ransomware
Three major UK insurance associations have united in a coalition with GCHQ’s National Cyber Security Centre (NCSC) to help reduce ransom payments made by victims of cybercrime.
The Unprecedented cross-sector coalition is comprised of the NCSC and the Association of British Insurers (ABI), British Insurance Brokers’ Association (BIBA) and the International Underwriting Association (IUA).
With Ransomware being the biggest day-to-day cyber security threat to UK organisations, the coalition, working closely with the NCSC, has developed a set of guidelines and a frameworks for a broad range of stakeholders including insurance providers, businesses, and cyber security professionals, aimed at reducing the frequency and impact of ransomware attacks.
NCSC CEO Felicity Oswald said: “It’s really encouraging to see all corners of the insurance industry unite to support victim organisations with guidance that will help them to better understand their options and reduce harm and disruption to their businesses.”
Sustainability-in-Tech : Underwater Data-Centres Vulnerable to Soundwaves
A study by cybersecurity and robotics researchers at the University of Florida and the University of Electro-Communications has revealed how powerful sound waves could disrupt the operation of underwater data-centres.
Why Underwater Data-Centres?
With demand for data-centres growing due to increasing demand for cloud computing and AI, plus with data-centres producing large amounts of heat, one idea from data-centre operators in recent years has been to submerge servers in metal boxes beneath the sea. Doing so can harness the natural cooling properties of ocean water and can help dramatically cut cooling costs and carbon emissions. For example, back in 2018, Microsoft submerged 2 racks with 864 servers beneath the waves in Scotland as part of the experimental project ‘Natick’.
Soundwave Threat
However, the news from a group of cybersecurity and robotics researchers at the University of Florida and the University of Electro-Communications in Japan has revealed that the successful operation of underwater data-centres has a critical vulnerability – the potential to be seriously affected by underwater sounds. Also, there is the added complication that if servers are submerged in metal boxes below the sea and components broken/damaged (e.g. by sound or other means), it will be a complicated (and costly) operation to fix them.
As highlighted by Md Jahidul Islam, Ph.D., a professor of electrical and computer engineering at UF and author of the study: “The main advantages of having a data center underwater are the free cooling and the isolation from variable environments on land,” but “these two advantages can also become liabilities, because the dense water carries acoustic signals faster than in air, and the isolated data center is difficult to monitor or to service if components break.”
Why Is Sound A Threat?
The study involved submerging test data centre-style servers in a laboratory water tank and in a lake on the UF campus with a speaker playing music in the water, tuned to five kilohertz. This is a frequency designed to make hard drives vibrate uncontrollably and one octave above what can be played on a piano.
The results were that networks were able to be crashed and their reliability disrupted by sound waves generated from 20 feet away. In wild conditions for example, similarly loud and potentially damaging sound waves could be generated by marine life, submarine sonar systems, industrial activity (drilling), earthquakes and seismic activity and more.
The study appears to have shown, therefore, that even something as simple as an underwater speaker playing a D note could have the potential to seriously disrupt or damage server operations in submerged data centres.
Deliberate State-Sponsored Attacks
One key worry highlighted by the study is how deliberate sound injection attacks / acoustic attacks (e.g. by other states as an act of sabotage) could be a real threat to underwater data-centres. For example, as highlighted by UF Professor of Computer and Information Science and Engineering Sara Rampazzi, Ph.D, acoustic attacks on a submerged data-centre could be subtle: “The difference here is an attacker can manipulate the data centre in a controlled way. And it’s not easy to detect”.
Other Defences Tested
As part of the study, the researchers tested different defences for the submerged servers. For example, sound-proof panels were tried but raised the servers’ temperature too much, thereby countering the advantages of cooling with water. Also, active noise cancellation was found to be too cumbersome and expensive to add to every data-centre.
Algorithm
To counter the threat of soundwaves to underwater data-centres, the research team developed a software-based solution in the form of an algorithm. The algorithm they developed (using machine learning) can identify the pattern of disruption caused by acoustic attacks and it’s anticipated that improvements to this algorithm could minimise the damage to networks by reallocating computational resources before an attack can crash the system.
What Does This Mean For Your Business?
With Microsoft’s submerged server tests showing very positive results in terms of low failure rates and dramatically reduced cooling costs, underwater data-centres appear to be something that will be put into practice in the near future. However, until now, the potential threat to their operation caused by sound is not something that has been fully realised or explored until this research.
The study has therefore been valuable in raising awareness of the threat. For example, in addition to demonstrating how server disruption by sound can happen inadvertently (e.g. from a loud submarine sonar blast), it has also raised awareness of how data-centres could be vulnerable to deliberate acoustic attacks as acts of sabotage. Not only does the research have value in highlighting the threats, but it has also enabled the development of what appears to be an effective solution,i.e., an algorithm.
Finding a way to protect underwater data-centres from acoustic attacks helps future-proof the idea, thus enabling its rollout which will benefit data-centre operators (e.g. with lower costs, better heat management, and expansion of much-needed capacity). It also provides protection for all the businesses, organisations, governments, and economies for whom the smooth operation and expansion of the cloud and now AI is vital to their operations, prosperity, and plans. This study, therefore, helps contribute towards both healthier economies and a healthier planet through reducing data-centre carbon emissions.