Meeting Mycroft: An Open AI Platform You Can Order Around By Voice

Mycroft developer Ryan Sipes, speaking from the show floor of this year's OSCON in Austin, Texas...

(see our video interview here), says that what started out as a weekend project to use voice input and some light AI to locate misplaced tools in a makerspace morphed into a much more ambitious, and successfully crowd-funded, project -- hosted at the Lawrence Center for Entrepreneurship in Lawrence, Kansas -- when he and his fellow developers realized that the state of speech recognition and interfaces to exploit it were in a much more rudimentary state than they initially assumed.

How ambitious? Mycroft bills itself as "an open hardware artificial intelligence platform"; the goal is to allow you to "interact with everything in your house, and interact with all your data, through your voice." That's a familiar aim of late, but mostly from a shortlist of the biggest names in technology.  Apple's Siri is exclusive to (and helps sell) Apple hardware; Google's voice interface likewise sells Android phones and tablets, and helps round out Google's apps-and-interfaces-for-everything approach. Amazon and Microsoft have poured resources into voice recognition systems, too -- Amazon's Echo, running the company's Alexa voice service, is probably the most direct parallel to the Mycroft system that was on display at OSCON, in that it provides a dedicated box loaded with mics and a speaker system for 2-way voice interaction.

The Mycroft system, though, is based on two of the first names in open hardware -- Raspberry Pi and Arduino --  and it's meant to be and stay open; all of its software is released under GPL v3. The initial hardware for Mycroft includes RCA ports, as well as an ethernet jack, 4 USB ports, HDMI, and dozens of addressable LEDs that form Mycroft's "face." That HDMI output might not be immediately useful, but Sipes points out that the the hardware is powerful enough to play Netflix films, or multimedia software like Kodi, and to control them by voice. Unusually for a consumer device, even one aimed at hardware hackers,  Mycroft also includes an accessible ribbon-cable port, for users who'd like to hook up a camera or some other peripheral. Two other "ports" (of a sort) might appeal to just those kind of users, too: if you pop out the plugs emblazoned with the OSI Open Hardware logo, two holes on each side of Mycroft's case facilitate adding it to a robot body or other mounting system. 

The open-source difference in Mycroft isn't just in the hacker-friendly hardware. The real star of the show is the software (Despite the hardware on offer, "We're a software company," says Sipes), and that's proudly open as well. The Python-based project is drawing on, and creating, open source back-end tools, but not tied to any particular back-end for interpreting or acting on the voice input it receives. The team has open sourced several tools so far: the Adapt intent parser, text-to-speech engine Mimic (based on a fork of CMU's Flite), and open speech-to-text engine OpenSTT.

The commercial projects named above (Siri, et al) may offer various degrees of privacy or extensibility, but ultimately they all come from "large companies that work really hard to mine your data" and to keep each user in a silo, says Sipes. By contrast, "We're like Switzerland." With Mycroft the speech recognition and speech synthesis tools are swappable, and there's an active dev community adding new voice-activated capabilities ("skills") to the system.

And if you can program Python, your idea could be next.  

Views: 329

Comment

You need to be a member of Codetown to add comments!

Join Codetown

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Google’s TurboQuant Compression May Support Faster Inference, Same Accuracy on Less Capable Hardware

Google Research unveiled TurboQuant, a novel quantization algorithm that compresses large language models’ Key-Value caches by up to 6x. With 3.5-bit compression, near-zero accuracy loss, and no retraining needed, it allows developers to run massive context windows on significantly more modest hardware than previously required. Early community benchmarks confirm significant efficiency gains.

By Bruno Couriol

Presentation: Empower Your Developers: How Open Source Dependencies Risk Management Can Unlock Innovation

Celine Pypaert discusses the ubiquitous nature of open-source software and shares a blueprint for securing modern applications. She explains how to prioritize high-risk vulnerabilities using exploitability data, the role of Software Bill of Materials (SBOM), and the importance of bridging the gap between DevOps and Security through clear accountability and automated governance.

By Celine Pypaert

Zendesk Says AI Makes Code Abundant, Shifting the Bottleneck to “Absorption Capacity”

Zendesk argues that GenAI shifts the bottleneck in software delivery from writing code to “absorption capacity”, which is the organisation’s ability to define problems clearly, integrate changes into the wider system, and turn implementation into reliable value. As code becomes abundant, architectural coherence, review capacity, and delivery flow become the main constraints.

By Eran Stiller

Claude Code Used to Find Remotely Exploitable Linux Kernel Vulnerability Hidden for 23 Years

Anthropic researcher Nicholas Carlini used Claude Code to find a remotely exploitable heap buffer overflow in the Linux kernel's NFS driver, undiscovered for 23 years. Five kernel vulnerabilities have been confirmed so far. Linux kernel maintainers report that AI bug reports have recently shifted from slop to legitimate findings, with security lists now receiving 5-10 valid reports daily.

By Steef-Jan Wiggers

Article: Using AWS Lambda Extensions to Run Post-Response Telemetry Flush

At Lead Bank, synchronous telemetry flushing caused intermittent exporter stalls to become user-facing 504 gateway timeouts. By leveraging AWS Lambda's Extensions API and goroutine chaining in Go, flush work is moved off the response path, returning responses immediately while preserving full observability without telemetry loss.

By Melvin Philips

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service