Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
BeagleBone Home Automation Blueprints

You're reading from   BeagleBone Home Automation Blueprints Automate and control your home using the power of the BeagleBone Black with practical home automation projects

Arrow left icon
Product type Paperback
Published in Feb 2016
Publisher
ISBN-13 9781783986026
Length 378 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Rodolfo Giometti Rodolfo Giometti
Author Profile Icon Rodolfo Giometti
Rodolfo Giometti
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Dangerous Gas Sensors FREE CHAPTER 2. Ultrasonic Parking Assistant 3. Aquarium Monitor 4. Google Docs Weather Station 5. WhatsApp Laundry Room Monitor 6. Baby Room Sentinel 7. Facebook Plant Monitor 8. Intrusion Detection System 9. Twitter Access Control System with Smart Card and RFID 10. A Lights Manager with a TV Remote Controller 11. A Wireless Home Controller with Z-Wave Index

Setting up the software


After the hardware has been set up, most of the job is done; to finish our job, we need to first install a tool to get access to our Twitter account, and then we have to add a mechanism to call it each time a successful identification process is accomplished. So, in the following sections I'm going to show how to install and correctly set up a command line tool to communicate with Twitter and then how to call it in three different programming languages for three different identification systems.

To simplify the project a bit, we can use a static list of known IDs stored in each program, but you can understand that this list can be easily managed by an external database. So, I leave this implementation as an exercise for you.

Setting up the Twitter utility

The utility I'm going to use to get access to a Twitter account is named with the single character t. The t program, as reported on its home page, derives from the Twitter SMS commands:

The CLI takes syntactic cues from...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime