Feeds

Ten pi-fect projects for your new Raspberry Pi

Set the cig-pack sized micro to work doing something useful

High performance access to file storage

Pi/Kindle Chimera

Reg Hardware retro numbers

You're locked in the server room; you could email for help, but there's no terminal to hand. WWMD*? Yup, time to whip up a portable terminal using your jailbroken Kindle and trusty RPi. Actually, when you think about it, it's not so bonkers. For terminal work, e-paper is just about usable. And it'd make a change from paperclip lockpicks.

Kindle-screen Pi

Source: Damaru

Difficulty Level (1-10)
3 - You can do it in software, but, DISCLAIMER that's a jailbroken Kindle, which can be easily bricked. So, yes, I will be building one, but only when I can get to my mother-in-law's, and not using mine...

Extra cost
£60

Shopping List
Kindle, USB keyboard, Micro USB-to-USB cables

Approach
Install a terminal emulator on the Kindle, and USBNetwork. Cable RPi to the Kindle, add a keyboard, and then login to the RPi from the Kindle. Then (the trick) use a terminal multiplexer to share the RPi's session from the Kindle. Voila, external keyboard works, and Kindle = display.

Take it further
At the risk of spoiling the next idea, stick it in a case and run it off a battery.

Online Help
Damaru offers a workthrough for the aptly named KindleBerry Pi

Pi Netbook

Reg Hardware retro numbers

Here's your chance to re-create the Osborne 1. Only in colour. With networking. And no chance of shoulder dislocation. Thanks to the recent explosion in hobbyist electronics - Adafruit and Arduino, I'm looking at you! - the availability of small off-the-shelf HDMI capable LCDs with driver boards has blossomed. There's a variety to choose from 1.5in up, so a Nintendo-scale 'nanobook' isn't totally out of the question.

Pi netbook

Source: Silver Jimny

Difficulty Level (1-10)
7 - OK, you'll definitely need to break out the soldering iron for this

Extra cost
You can easily manage it for under £150

Shopping List
Small flight case or (!) cigar box, an RPi breakout/expansion board, assorted panel mount connectors for peripheral/external connections, keyboard, batteries, LCD

Approach
Really this is about building the peripherals needed for an RPi into your choice of case.

Take it further
How about LiPo rechargeable batteries? Or adding a wireless support and/or GPS. You know you want to.

Online Help
Don't limit yourself to just RPi sources: there are lots of easily adapted self-build laptop workthroughs. There are plenty of RPi-specific examples of this in the wild. For example, the RPi Challenge runner can be found here.

*What would MacGyver do?

Combat fraud and increase customer satisfaction

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.