Contest Update: NIC Contest

And the winners are...
NIC Contest

And the winners are...

In the May/June 2001 issue of Embedded Linux Journal, we announced our second contest, ``Using the NIC as an Embedded System'' (see the Contest Rules and Overview on page 8 of that issue for specific details). We have chosen the 20 finalists based on their proposals and are shipping their computers. Their final entries are due on February 4, 2002 in the form of a web site, and the grand prize winner will receive an all-expense paid trip to Costa Rica. Two runners up will each receive a Lego Mindstorms package, consisting of the Lego Mindstorms Robotics Invention System, Mindstorms Vision Command, The Unofficial Guide to Lego Mindstorms Robots and the Lego Mindstorms Ultimate Accessory Set.

Well, here they are, the winners for the NIC contest. First, let me say that we had a lot of really good entries. Knowing that we only had 20 systems available, we tried to distribute the winning ideas to various industry areas. Thus, you will see home systems, industrial testing systems, retail systems, kiosks and at least one system just for fun.

Additionally, some of the ideas included the construction of additional custom hardware. This shows, as I expected, that we aren't just a bunch of programmers. Like most embedded engineers, we see the need to combine hardware and software design to create the right product.

Thanks to everyone for entering; it was great reading all the ideas. It will continue to be interesting to see how the 20 selected proposals develop into systems.

Because of space limitations, this list of finalists lacks a lot of details. Check out the ELJ web site for specifics.

  • L'âne POS: Using the NIC as a Thin Client, by Jason Burrell

  • Wireless Kiosk, by Holden Karau

  • Implementing DOCSIS-compatible Cable Modem Using a Host Processor, by Huan Liu

  • Non-destructive Evaluation of Aircraft Components for Corrosion, by Alexander Perry

  • Voice-Controlled Wireless MP3 Music System, by Jeff Wisnewski

  • Voting Machine, by Kurt Schiftner

  • Multi-session PPPoE Router, by James A. Courtney

  • Home Appliance Interface (HAPI), by Shawn Bower, Gerry Mletzko, Kris DeMuth, Steve Ernst and Peter Halliday

  • A Cost-Effective Video Conferencing Solution Using ThinkNIC, by Jeremy Bursky

  • Oracle ERP/Java Application Workstation, by Carl Zmola

  • SNOT: Secure Network Orifice Tester, by Steve Johnson

  • IP-Video Transmitter, by Giuseppe Colucciello

  • Adaptive and Efficient Residential HVAC Control, by Philip Zumsteg

  • MobiSale: POS Note Suitable for a Mobile Environment, by Imran Patel

  • PottyPenguin: Addressing Computing Needs While in the Bathroom, by Juan Ignacio del Valle, Alexis Maldonado and Alf Delgado

  • Internet-Aware Communications Device for People with Disabilities, by John Kacur

  • Agent's Contact Mine, by Matthew W. Excell

  • Puffin on the NIC, by Richard J. Jafrate

  • Teleport: Video Conferencing/Telecommuting Station and Distance Learning Terminal, by Mike Machado

  • Shortwave Radio Educational Kiosk, by Jay Sissom

email: phil@ssc.com

______________________

Phil Hughes

Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix