Students Learning To Hack Microsoft Kinect

Students are learning to hack a piece of hardware that until recently, they probably only used for gaming--Microsoft Kinect. Kinect, which broke records with the fastest sales in consumer electronics history within its first 60 days of sales, is a sensor input device for the Xbox gaming console.

Kinect does what it sounds like--that is, it connects the user with the computer, whether that computer is an Xbox or literally a computer, via sensors including an RGB camera, depth sensor and microphone. By using Microsoft's Kinect software development kit (SDK), developers can not only hack the hardware, they can do so with permission from Microsoft--and teachers are taking advantage of Kinect as a learning tool.

As computer science teacher Bryan Baker put it recently at the ISTE 2011 conference, "I want to light a fire for you and your kids because this is really cool stuff." Baker uses Kinect and the XNA Game Studio as a learning tool for high school students who are learning programming and game design.

Students are learning to hack a piece of hardware that until recently, they probably only used for gaming--Microsoft Kinect. Kinect, which broke records with the fastest sales in consumer electronics history within its first 60 days of sales, is a sensor input device for the Xbox gaming console.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Here are the five core principles for monetizing your storage like never before and winning more customer applications than ever for your cloud and hosted services. These are your keys to the next generation data center.

  • On-Demand Webinar Your developers are shifting to a DevOps delivery model to increase the speed of delivering new code and features to your customers. But as a security and IT practitioner, you want security-first, enterprise-wide solutions that support your development teams without compromising on security. During this session, we discuss why it is important to: Secure and manage secrets used by machines (e.g. micro-services, applications, scripts, CI/CD tools, hosts, etc.) and privileged users …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date