SlideShare a Scribd company logo
1 of 3
Download to read offline
Camera	Obscura	for	Obscuring	Cameras*	
	
	
Roger	G.	Johnston,	Ph.D.,	CPP	
Right	Brain	Sekurity	
https://rbsekurity.com	
	
	
Introduction	
	
				It's	possible	to	form	images	without	lenses.		A	full	color	image	can	be	formed	using	only	a	
pinhole.		Pinhole	imaging	has	been	undertaken	for	hundreds	of	years	by	artists	and	solar	
eclipse	observers	using	the	camera	obscura—literally,	"dark	room".		This	is	a	darkened	
room	(or	box)	with	a	small	hole	in	the	wall.		Objects	outside	the	room	in	the	bright	light	are	
imaged	on	the	room's	opposite	interior	wall.		The	images	are	upside	down	and	reversed.	
	
				One	of	the	intriguing	things	about	pinhole	(camera	obscura)	images	is	that	they	have	an	
infinite	"depth	of	field".		This	means	that	all	objects	in	the	field	of	view—near	or	far—are	
simultaneously	in	focus,	unlike	photographs	taken	using	lenses	with	limited	depth	of	field.		
When	artists	and	hobbyists	display	their	film	pinhole	images,	people	looking	at	the	images	
are	often	startled	or	disoriented	by	what	they	see.		They	are	used	to	imaging	using	the	
human	eye,	which	has	a	relatively	narrow	depth	of	field.	
	
			Pinhole	photography	is	usually	done	using	high-sensitive	film	because	of	the	small	
amount	of	light	that	comes	through	the	pinhole.		The	recent	availability	of	off-the-shelf,	
low-cost,	low-light	video	cameras,	however,	makes	it	easy	to	produce	camera	obscura	color	
videos.		I	believe	this	may	be	the	first	report	of	using	a	small,	low-light	video	camera	for	a	
miniature	camera	obscura,	though	large	video	cameras	have	been	used	in	room-size	
versions	[5].	
	
				I	demonstrate	the	performance	of	my	miniature	camera	obscura	in	a	recent	YouTube
video.[1]		The	video	shows	color	images	made	with	a	Spinel	2-megapixel,	HD	video	camera	
with	0.001	lux	sensitivity	using	only	a	pinhole,	no	lenses.		The	camera	costs	$48	retail	and	
runs	on	5	volts.		What	is	shown	is	only	the	raw	video	with	no	image	processing	to	improve	
brightness,	contrast,	graininess,	or	image	quality.		Presumably	more	expensive	low-light	
cameras,	and	those	to	be	developed	in	the	future,	will	allow	higher-quality	images.	
	
				[Note	that	vendors	of	video	cameras	often	talk	about	their	"pinhole"	cameras	but	these	
are	not	the	camera	obscura.		They	are	merely	video	cameras	with	a	small	diameter	lens	or	
lenses.		The	small	diameter	of	the	lens(es)	does	tend	to	allow	a	good	depth	of	field	(and	
fewer	lens	aberrations),	but	not	as	good	a	depth	of	field	as	the	true	camera	obscura.]		
	
_____________	
*This	paper	was	not	peer	reviewed.		Revised	December	1,	2021
Security	Implications	
	
				There	are	4	reasons	why	a	true	pinhole	video	camera	might	have	security	interest.		
Consider,	for	example,	the	surreptitious	surveillance	of	a	conference	room	or	office		
using	a	covert	video	camera	hidden	in	the	wall.		The	first	advantage	of	the	true	pinhole	
camera	is	that	only	a	very	small	hole	is	needed	in	the	wall	for	the	camera	to	view	the	
proceedings.		My	YouTube	video	demonstrates	the	use	of	a	pinhole	only	100	µm	in	
diameter.[1]		That	small	a	hole	in	the	wall	would	be	hard	to	find.	
	
				The	second	advantage	of	using	a	pinhole	video	camera	for	hidden	surveillance	is	that	
everything	in	the	field	of	view	is	automatically	in	focus,	including	objects	very	close	to	the	
camera.	
	
				The	third	advantage	of	a	pinhole	video	camera	for	covert	surveillance	is	that	one	low-
tech	method	often	recommended	[2-4]	to	find	a	hidden	video	camera	in	a	room	is	to	turn	
off	the	room	lights.		A	flashlight	is	then	used	to	probe	the	room,	looking	for	retro-reflections	
off	the	camera	lens	or	off	the	imaging	sensor	of	the	camera	behind	the	lens.		With	a	camera	
obscura,	there	is,	however,	no	such	lens	reflection	because	there	is	no	lens.		Any	reflection	
off	the	imaging	sensor	behind	the	pinhole	is	very	difficult	to	discern	because	the	pinhole	
prevents	any	significant	amount	of	light	reflecting	off	the	interior	imaging	sensor	from	
exiting	the	pinhole.	
	
				The	final	advantage	of	a	pinhole	camera	for	covert	surveillance	is	that	systems	to	"blind"	
video	cameras	using	lasers	have	been	proposed	as	countermeasures.[4]		The	laser	light	is	
so	bright	that	it	swamps	the	desired	image	by	saturating	the	photo	sensor.		This	is	a	more	
problematic	approach	with	a	pinhole	camera.		While	I	was	able	to	somewhat	saturate	the	
image	of	my	pinhole	video	camera	with	a	5-mW	green	laser,	this	required	almost	perfect	
angular	alignment	with	the	axis	of	the	camera,	something	that	might	be	difficult	to	do	
reliably	in	practice,	especially	in	a	large	room.			
	
				It	might	also	be	possible	for	the	bad	guys	to	recover	partial	video	images	despite	laser	
saturation	by	using	image	processing	on	their	covert	video	images.		When	coherent	laser	
light	passes	through	a	pinhole,	it	creates	circular	interference	rings	called	"Airy's	Disc".[6]		
The	camera	pixels	at	the	diffraction	ring	minima	are	not	saturated.		Also,	because	laser	light	
is	monochromatic	(one	color),	it	is	possible	that	a	usable	image	could	be	obtained	by	
keeping	only	the	red,	green,	or	blue	pixels	in	the	color	video,	depending	on	the	laser's	color.	
	
	
Conclusion	
	
				Security	professionals	should	be	aware	that	covert	video	cameras	do	not	require	lenses,	
and	can	operate	with	a	very	small	viewing	aperture	as	small	as	100	microns	(or	smaller).		
Moreover,	it	is	important	to	recognize	that	conventional	detection	or	countermeasure	
schemes	that	work	for	covert	video	cameras	with	lenses	may	not	work	for	pinhole	cameras	
(cameras	obscura).
References	
	
	
1.	RG	Johnston,	“Camera	Obscura",	YouTube	video,	https://youtu.be/u3mlQzaKAIo	
	
2.	E	Harper,	"The	Secrets	to	Finding	Hidden	Cameras",	April	10,	2019,		
https://www.techlicious.com/tip/the-secrets-to-finding-hidden-cameras/comments-
/CP2/	
	
3.	S	Rosenblatt,	"Suspect	a	hidden	camera	in	your	Airbnb	or	hotel?",	May	21,	2019,	
https://the-parallax.com/2019/05/21/hidden-cameras-airbnb-spying/	
	
4.	KN	Truong,	et	al.,	"Preventing	Camera	Recording	by	Designing	a	Capture-Resistant	
Environment",	https://www.cc.gatech.edu/fac/summetj/papers/truongk-
ubicomp2005.pdf	
	
5.		See,	for	example,	D	Cowern,	PBS/Physics	Girl,	"We	Turned	this	Truck	into	a	GIANT	
CAMERA!",	YouTube	video,	https://www.youtube.com/watch?v=qIp9kItDUh8	
	
6.		Hyperphysics,	“Circular	Aperture	Diffraction”,	http://hyperphysics.phy-
astr.gsu.edu/hbase/phyopt/cirapp2.html

More Related Content

What's hot

SPG B&W Photography
SPG B&W PhotographySPG B&W Photography
SPG B&W PhotographyJanellaDatu
 
Pinhole
Pinhole Pinhole
Pinhole SMHSart
 
Photography - a new art or yet another scientific achievement
Photography - a new art or yet another scientific achievementPhotography - a new art or yet another scientific achievement
Photography - a new art or yet another scientific achievementAbdelkarim Benabdallah
 
Principles of the Camera Obscura
Principles of the Camera ObscuraPrinciples of the Camera Obscura
Principles of the Camera ObscuraMark W. Decker
 
The history of the pinhole camera
The history of the pinhole cameraThe history of the pinhole camera
The history of the pinhole cameratianaphoto
 
3000 Presentation 6: Lecture 5 Space - Light
3000 Presentation 6: Lecture 5 Space - Light 3000 Presentation 6: Lecture 5 Space - Light
3000 Presentation 6: Lecture 5 Space - Light Edward Bowen
 
3000 Presentation 4: Lecture 3 Space Part 3
3000 Presentation 4: Lecture 3 Space Part 3 3000 Presentation 4: Lecture 3 Space Part 3
3000 Presentation 4: Lecture 3 Space Part 3 Edward Bowen
 
7 travel photography hacks you need to follow for better photos
7 travel photography hacks you need to follow for better photos7 travel photography hacks you need to follow for better photos
7 travel photography hacks you need to follow for better photosLeo Erwin Garcia
 
Lesson 3 • Types of Cameras
Lesson 3 • Types of CamerasLesson 3 • Types of Cameras
Lesson 3 • Types of CamerasMarcio Sargento
 
Invention Camera
Invention CameraInvention Camera
Invention CameraRita Duarte
 
Vocabulary packet 7 greek word parts
Vocabulary packet 7 greek word partsVocabulary packet 7 greek word parts
Vocabulary packet 7 greek word partsrfitzwater
 

What's hot (18)

SPG B&W Photography
SPG B&W PhotographySPG B&W Photography
SPG B&W Photography
 
Photography
Photography Photography
Photography
 
Pinhole
Pinhole Pinhole
Pinhole
 
Photography - a new art or yet another scientific achievement
Photography - a new art or yet another scientific achievementPhotography - a new art or yet another scientific achievement
Photography - a new art or yet another scientific achievement
 
Principles of the Camera Obscura
Principles of the Camera ObscuraPrinciples of the Camera Obscura
Principles of the Camera Obscura
 
The history of the pinhole camera
The history of the pinhole cameraThe history of the pinhole camera
The history of the pinhole camera
 
3000 Presentation 6: Lecture 5 Space - Light
3000 Presentation 6: Lecture 5 Space - Light 3000 Presentation 6: Lecture 5 Space - Light
3000 Presentation 6: Lecture 5 Space - Light
 
History of photography
History of photographyHistory of photography
History of photography
 
3000 Presentation 4: Lecture 3 Space Part 3
3000 Presentation 4: Lecture 3 Space Part 3 3000 Presentation 4: Lecture 3 Space Part 3
3000 Presentation 4: Lecture 3 Space Part 3
 
Cameras
CamerasCameras
Cameras
 
7 travel photography hacks you need to follow for better photos
7 travel photography hacks you need to follow for better photos7 travel photography hacks you need to follow for better photos
7 travel photography hacks you need to follow for better photos
 
Butchcassidy
ButchcassidyButchcassidy
Butchcassidy
 
Organising production
Organising productionOrganising production
Organising production
 
Picture planning
Picture planningPicture planning
Picture planning
 
Lesson 3 • Types of Cameras
Lesson 3 • Types of CamerasLesson 3 • Types of Cameras
Lesson 3 • Types of Cameras
 
Invention Camera
Invention CameraInvention Camera
Invention Camera
 
Vocabulary packet 7 greek word parts
Vocabulary packet 7 greek word partsVocabulary packet 7 greek word parts
Vocabulary packet 7 greek word parts
 
Pre production planning
Pre production planningPre production planning
Pre production planning
 

Similar to Camera Obscura Pinhole Surveillance

Photos taken by Pinhole camera
Photos taken by Pinhole cameraPhotos taken by Pinhole camera
Photos taken by Pinhole camerakatyciai1
 
Intro to photography
Intro to photographyIntro to photography
Intro to photographymcrawf
 
Humanities: Introduction of Photography
Humanities: Introduction of PhotographyHumanities: Introduction of Photography
Humanities: Introduction of PhotographyChelbert Yuto
 
Innovation in optical design - a short history
Innovation in optical design -  a short historyInnovation in optical design -  a short history
Innovation in optical design - a short historyDave Shafer
 
Photography.intro
Photography.introPhotography.intro
Photography.introJulia Tay
 
HUMANITIES MIDTERM (PHOTOGRAPHY)
HUMANITIES MIDTERM (PHOTOGRAPHY)HUMANITIES MIDTERM (PHOTOGRAPHY)
HUMANITIES MIDTERM (PHOTOGRAPHY)Angela Tolentino
 
Ibn Al-haytham’s Camera Obscura at the University of
Ibn Al-haytham’s Camera Obscura at the University ofIbn Al-haytham’s Camera Obscura at the University of
Ibn Al-haytham’s Camera Obscura at the University ofIslam Bazlamit
 

Similar to Camera Obscura Pinhole Surveillance (12)

Photos taken by Pinhole camera
Photos taken by Pinhole cameraPhotos taken by Pinhole camera
Photos taken by Pinhole camera
 
Photography
PhotographyPhotography
Photography
 
Intro to photography
Intro to photographyIntro to photography
Intro to photography
 
Humanities: Introduction of Photography
Humanities: Introduction of PhotographyHumanities: Introduction of Photography
Humanities: Introduction of Photography
 
Photography
PhotographyPhotography
Photography
 
Innovation in optical design - a short history
Innovation in optical design -  a short historyInnovation in optical design -  a short history
Innovation in optical design - a short history
 
reflection.pdf
reflection.pdfreflection.pdf
reflection.pdf
 
presentation on lens
presentation on lenspresentation on lens
presentation on lens
 
Photography.intro
Photography.introPhotography.intro
Photography.intro
 
Pinhole Presentation
Pinhole PresentationPinhole Presentation
Pinhole Presentation
 
HUMANITIES MIDTERM (PHOTOGRAPHY)
HUMANITIES MIDTERM (PHOTOGRAPHY)HUMANITIES MIDTERM (PHOTOGRAPHY)
HUMANITIES MIDTERM (PHOTOGRAPHY)
 
Ibn Al-haytham’s Camera Obscura at the University of
Ibn Al-haytham’s Camera Obscura at the University ofIbn Al-haytham’s Camera Obscura at the University of
Ibn Al-haytham’s Camera Obscura at the University of
 

More from Roger Johnston

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityRoger Johnston
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Roger Johnston
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link Roger Johnston
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Roger Johnston
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Roger Johnston
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020Roger Johnston
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentRoger Johnston
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability AssessmentsRoger Johnston
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Roger Johnston
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments Roger Johnston
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityRoger Johnston
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Roger Johnston
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Roger Johnston
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security DevicesRoger Johnston
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security InvestmentRoger Johnston
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Roger Johnston
 
Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Roger Johnston
 

More from Roger Johnston (20)

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & Security
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)
 
Security Audits.pdf
Security Audits.pdfSecurity Audits.pdf
Security Audits.pdf
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)
 
Want seals with that?
Want seals with that?Want seals with that?
Want seals with that?
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020
 
Security Assurance
Security AssuranceSecurity Assurance
Security Assurance
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability Assessment
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability Assessments
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical Security
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security Devices
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)
 
Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Journal of Physical Security 10(1)
Journal of Physical Security 10(1)
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Camera Obscura Pinhole Surveillance