With IoT you too can turn your home into a giant flashing 'HORSE BIRTH NOW' klaxon

Complete with loop of neighing noises and phone alerts

An American company has devised a system that takes over your entire home, makes all your lights start flashing and broadcasts neighing noises through the whole house when your pregnant horse starts giving birth.

Custom electronics trade news website CE Pro, reporting on this interesting mashup of smart home and Internet of Things gear, mused: "Couldn't an imminent birth tap into these vast technological resources, maybe prompting an announcement over the in-house speakers?"

This alarming, but, for equinologists, apparently quite useful system, was put together by California-based Simply Sight and Sound on the request of client Aimee Davis, a smart home enthusiast and horse breeder from Chino Hills.

The problem appears to be that when Aimee is in the house, she cannot monitor her horses outside during foaling season. Already having a "whole-house A/V and smart home system" installed, she naturally turned to technology.

Warning: if you are of weak stomach, about to eat or have recently eaten, you may not wish to read past this point. UNDER NO CIRCUMSTANCES click any of the links from here onwards if you are squeamish. Don't say we didn't warn you.

A surprisingly well-advanced technological market exists for monitoring foaling horses. The one used in the whole-home blurt system was something called Foalert, which CE Pro said incorporates a transmitting device that is sutured by a vet "to the mare's privates". An explanatory video of this process is available on YouTube, and we'll let you, dear reader, sully your browsing history by watching it (for the record, CE Pro found this video, not us, and your correspondent held out for about 15 seconds).

We can't really improve on CE Pro's description of how Foalert functions:

The device works like a typical normally-closed door/window sensor. That thing that happens down there when mom is ready ... opens up a gap between the two elements of the sensor, causing the transmitter to send an RF signal to the old-fangled Foalert receiver, which plays some beeping noises through the on-board speaker.

Once mummy gee-gee starts giving birth, the Foalert system is hooked up to the home automation system via its wireless receiver to the Elan smart home system, which runs the interactive gadgetry. That in turn launches the custom-made "birth alert" scene, complete with horror-film-style flashing lights, all 18 (count 'em!) speakers broadcasting a loop of neighing noises, firing off text messages to the homeowner's phone, and quite possibly erecting a Bat Signal and paging Bruce Wayne into the bargain.

It does, genuinely, also support remote viewing of CCTV camera feeds, allowing one to, as CE Pro puts it, "enjoy all that glorious birthing footage live, possibly sharing the miracle on Facebook, and replaying it over and over for friends and family".

The system is supported by a dedicated UPS and remote power management service.

Mickey-taking aside, for a dedicated horse breeder such a system is highly useful; horses are valuable beasts and getting the vet on scene immediately can, for the foal, literally mean the difference between life and death. If the mare starts foaling in the dead of night, turning the entire house into a giant flashing "HORSE BIRTH NOW" klaxon would be enough to wake up even the heaviest sleeper.

Just don't expect much takeup from lily-livered city folk. ®

Similar topics

Other stories you might like

  • What if ransomware evolved to hit IoT in the enterprise?
    Proof-of-concept lab work demos potential future threat

    Forescout researchers have demonstrated how ransomware could spread through an enterprise from vulnerable Internet-of-Things gear.

    The security firm's Vedere Labs team said it developed a proof-of-concept strain of this type of next-generation malware, which they called R4IoT. After gaining initial access via IoT devices, the malware moves laterally through the IT network, deploying ransomware and cryptocurrency miners while also exfiltrating data, before taking advantage of operational technology (OT) systems to potentially physically disrupt critical business operations, such as pipelines or manufacturing equipment.

    In other words: a complete albeit theoretical corporate nightmare.

    Continue reading
  • AMD refreshes Ryzen Embedded line with R2000 series
    The target? Thin clients and industrial devices – with new SoC family running up to 4 independent displays

    Embedded World AMD is bringing to market a new generation of Ryzen chips for embedded apps promising more CPU cores, enhanced built-in graphics and expanded I/O connectivity to drive kit such as IoT devices and thin clients.

    Crucially, AMD plans to make the R2000 Series available for up to 10 years, providing OEM customers with a long-lifecycle support roadmap. This is an important aspect for components in embedded systems, which may be operating in situ for longer periods than the typical three to five-year lifecycle of corporate laptops and servers.

    The Ryzen Embedded R2000 Series is AMD's second-generation of mid-range system-on-chip (SoC) processors that combine CPU cores plus Radeon graphics, and target a range of embedded systems such as industrial and robotic hardware, machine vision, IoT and thin client devices. The first, R1000, came out in 2019.

    Continue reading
  • DeadBolt ransomware takes another shot at QNAP storage
    Keep boxes updated and protected to avoid a NAS-ty shock

    QNAP is warning users about another wave of DeadBolt ransomware attacks against its network-attached storage (NAS) devices – and urged customers to update their devices' QTS or QuTS hero operating systems to the latest versions.

    The latest outbreak – detailed in a Friday advisory – is at least the fourth campaign by the DeadBolt gang against the vendor's users this year. According to QNAP officials, this particular run is encrypting files on NAS devices running outdated versions of Linux-based QTS 4.x, which presumably have some sort of exploitable weakness.

    The previous attacks occurred in January, March, and May.

    Continue reading

Biting the hand that feeds IT © 1998–2022