Feeds

Dev bakes actual, edible raspberry pie with Raspberry Pi

Voice-controlled microwave oven tweets your treats

Choosing a cloud hosting partner with confidence

A New Zealand developer named Nathan Broadbent has baked a raspberry pie using a Raspberry Pi.

Broadbent decided to do so after spotting a thread on Reddit that suggested “Food items should have QR codes that instruct the microwave exactly what to do. Like high for 2 minutes, let stand 1 minute, medium 1 minutes.” The developer liked the sound of that idea, felt it was just the kind of thing a Raspberry Pi could be good for and got to work.

Several months later, the results are there for all to see in the video below.

Watch Video

You can also be alerted when the oven has cooked something, thanks to its Twitter feed.

Cooking up a Pi-controlled microwave was not a trivial effort: Broadbent had to wire Arduino Nano to the Pi's GPIO, route power through the oven into the Pi, replace the microwave oven's control panel and do much more besides.

Then there was the small matter of the scanner and database of foods so the microwave could automatically heat foods to their optimal temperatures. Such a database did not exist, so Broadbent whipped it up at microwavecookingdb.com.

The code for the smart oven is now on GitHub. The recipe for the pie is here .

Broadbent's blogged many more details of the project here . ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.