Alexa understands you. Jessy is the same, but you also understand her! :-)
Everyone loves to talk to the computer. Especially if it understands you. :-) So the Amazon Alexa is a hype right now. However, it requires your marriage to Amazon and signing contract to sell your soul in the afterlife: Alexa is nothing but a fancy microphone that sends everything you speak to ̶F̶B̶I̶ ̶a̶n̶d̶ ̶C̶I̶A̶ Amazon cloud so it will access your public API. Yes, and give them your access rights, of course...
That is somehow disturbing for privacy and therefore there should exist something better than this. That something at least should be:
- Open source with a true free license (BSD or MIT)
- Processing things (at least accessing the APIs) within your private network and is controlled merely by you alone
- Everyone who understands some electronics and can do CAD engineering can build it (and improve)
So it is all about a complete fork of a dead, unfortunately, Jasper Project, that now end up as Jessy Project: http://www.jessy-project.info
In this hackweek, having only 95% completed hardware PCBs and not finished software do the following:
- Sort out plugin modules
- Rework talking context (i.e. user continue speak to Jessy within the context of the module, but can do something else)
- Train neural network for a wake-up keyword and integrate with the conversation mainloop
- Develop few modules, e.g. asking SUSE Manager for the current status
- Design in CAD and manufacture casing for the hardware (yay!!)
- Place all the "guts" inside that case and wire it all up with a hope it will not go flames
- At least mount LED lamps (PCB controller to them is still certainly outside of the scope here)
Looking for hackers with the skills:
This project is part of:
Hack Week 15
Activity
Comments
Similar Projects
Saline (state deployment control and monitoring tool for SUSE Manager/Uyuni) by vizhestkov
Project Description
Saline is an addition for salt used in SUSE Manager/Uyuni aimed to provide better control and visibility for states deploymend in the large scale environments.
In current state the published version can be used only as a Prometheus exporter and missing some of the key features implemented in PoC (not published). Now it can provide metrics related to salt events and state apply process on the minions. But there is no control on this process implemented yet.
Continue with implementation of the missing features and improve the existing implementation:
authentication (need to decide how it should be/or not related to salt auth)
web service providing the control of states deployment
Goal for this Hackweek
Implement missing key features
Implement the tool for state deployment control with CLI
Resources
https://github.com/openSUSE/saline
Harvester Packer Plugin by mrohrich
Description
Hashicorp Packer is an automation tool that allows automatic customized VM image builds - assuming the user has a virtualization tool at their disposal. To make use of Harvester as such a virtualization tool a plugin for Packer needs to be written. With this plugin users could make use of their Harvester cluster to build customized VM images, something they likely want to do if they have a Harvester cluster.
Goals
Write a Packer plugin bridging the gap between Harvester and Packer. Users should be able to create customized VM images using Packer and Harvester with no need to utilize another virtualization platform.
Resources
Hashicorp documentation for building custom plugins for Packer https://developer.hashicorp.com/packer/docs/plugins/creation/custom-builders
Source repository of the Harvester Packer plugin https://github.com/m-ildefons/harvester-packer-plugin
Contribute to terraform-provider-libvirt by pinvernizzi
Description
The SUSE Manager (SUMA) teams' main tool for infrastructure automation, Sumaform, largely relies on terraform-provider-libvirt. That provider is also widely used by other teams, both inside and outside SUSE.
It would be good to help the maintainers of this project and give back to the community around it, after all the amazing work that has been already done.
If you're interested in any of infrastructure automation, Terraform, virtualization, tooling development, Go (...) it is also a good chance to learn a bit about them all by putting your hands on an interesting, real-use-case and complex project.
Goals
- Get more familiar with Terraform provider development and libvirt bindings in Go
- Solve some issues and/or implement some features
- Get in touch with the community around the project
Resources
- CONTRIBUTING readme
- Go libvirt library in use by the project
- Terraform plugin development
- "Good first issue" list