SlideShare a Scribd company logo
Copyright © 2017 Huami Inc. All rights reserved.
Designing Wearable Fitness for Everyone
Frederik Hermann, Head of Marketing and Sales, Huami
Manufacturers of Amazfit and the Mi Band
WT | Wearable Technologies Conference 2017 EUROPE
February 7 - 8, 2017 | ICM (Germany)
for
our own
brands
We design, engineer and develop products
for
Xiaomi
4
5
Mi Band
Minimalistic
Industry’s most power-efficient BT chip
CNC’d aluminium alloy core
30-day battery life
Low price point
Right time
6
Mi Band 2
UV coated and scratch-resistant OLED display
Optical heart rate sensor (PPG)
20+ days of battery life
Comfort and simplicity
Great attention to quality and detail
Co-developed custom Bluetooth chip
with Dialog Semiconductor
Hypoallergenic very comfortable band
Simplicity in mind
Easy to use
8
33 Million units sold
#2 largest manufacturer of wearables
Source: IDC Worldwide Quarterly Wearable Device Tracker, Q4 2016
www.amazfit.com
Amazfit Equator Amazfit Pace Amazfit Arc
GPS, Phone-Free Music,
PPG, Always-On LCD Display,
WiFi, up to 11 days battery life
11
Where are we heading as an industry?
Maturing and consolidation of the market
A slowing down from the initial boom
But overall wearable adoption is still steadily rising
More variety > smartwatches, hybrid watches and other form factors
Opportunity: sports, medical and healthcare applications
We need more meaningful interpretation of the data
To foster behavior change: cue / trigger > routine > emotional reward
12
Where do you see the biggest opportunities?
Thank You
www.amazfit.com | @amazfit | business@amazfit.com
Addendum
Amazfit Equator
Zirconium Oxide Ceramic Core
Polished over 120,000 times
Fired at 2642°F for perfect shine
30 manufacturing procedures
Hypoallergenic and scratch-resistant
Weighs only 0.28oz / 8g
10-day battery life
Amazfit Equator
Amazfit Moonbeam
Amazfit Equator Rose Gold
Amazfit App
@ineslebihan #huami
Amazfit Accessories
Founded in 2014
340 employees worldwide
4 offices in the US and China
$35M Series B from Sequoia
Capital, Banyan Capital,
Morningside Ventures
Exclusive wearable tech partner
within the Xiaomi ecosystem
Third consecutive year profitable
$1B valuation
AR / VR
Healthcare
Medical
IoTSport / Fitness
Lifestyle
Huami's Future
www.huami-usa.com

More Related Content

Similar to Designing Wearable Fitness for Everyone

MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity
MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity
MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity
MIPI Alliance
 
Project Report on "Xiaomi"
Project Report on "Xiaomi"Project Report on "Xiaomi"
Project Report on "Xiaomi"
OmkarKodak
 
SOI Applications -- an overview and some examples
SOI Applications -- an overview and some examplesSOI Applications -- an overview and some examples
SOI Applications -- an overview and some examples
Adele Hars
 
ON Semiconductor Corporate Overview Presentation
ON Semiconductor Corporate Overview PresentationON Semiconductor Corporate Overview Presentation
ON Semiconductor Corporate Overview Presentation
ON Semiconductor
 
04 b why ipod is successful
04 b why ipod is successful04 b why ipod is successful
04 b why ipod is successfulWesley Shu
 
Wearables show march 2015
Wearables show   march 2015Wearables show   march 2015
Wearables show march 2015
Satya Harish
 
DCEU 18: Designing a Global Centralized Container Platform for a Multi-Cluste...
DCEU 18: Designing a Global Centralized Container Platform for a Multi-Cluste...DCEU 18: Designing a Global Centralized Container Platform for a Multi-Cluste...
DCEU 18: Designing a Global Centralized Container Platform for a Multi-Cluste...
Docker, Inc.
 
iNet-IoT company introduction
iNet-IoT  company introductioniNet-IoT  company introduction
iNet-IoT company introduction
Jennie Wang
 
BOSCH - AL-VS IP Portfolio 2014 (SIS Event).pdf
BOSCH - AL-VS IP Portfolio 2014 (SIS Event).pdfBOSCH - AL-VS IP Portfolio 2014 (SIS Event).pdf
BOSCH - AL-VS IP Portfolio 2014 (SIS Event).pdf
PawachMetharattanara
 
Tech snippets E-magazine-July17
Tech snippets E-magazine-July17Tech snippets E-magazine-July17
Tech snippets E-magazine-July17
Srikanth G
 
Ba401making Smal Big
Ba401making Smal BigBa401making Smal Big
Ba401making Smal BigThammasat
 
IBM Corporate Strategy: Move To Value - Divest To Invest
IBM Corporate Strategy: Move To Value - Divest To InvestIBM Corporate Strategy: Move To Value - Divest To Invest
IBM Corporate Strategy: Move To Value - Divest To Invest
Anne Phey - Innovator
 
MIPI DevCon 2016: How Has the Mobile Evolution Influenced Other Industries?
MIPI DevCon 2016: How Has the Mobile Evolution Influenced Other Industries?MIPI DevCon 2016: How Has the Mobile Evolution Influenced Other Industries?
MIPI DevCon 2016: How Has the Mobile Evolution Influenced Other Industries?
MIPI Alliance
 
Bosch in the Epicenter of New Trends and the Role of Leadership_20171023.pdf
Bosch in the Epicenter of New Trends and the Role of Leadership_20171023.pdfBosch in the Epicenter of New Trends and the Role of Leadership_20171023.pdf
Bosch in the Epicenter of New Trends and the Role of Leadership_20171023.pdf
MGImportadora
 
SFScon 2020 - Oliver Fendt - Free Software Adoption in Industry - a personal ...
SFScon 2020 - Oliver Fendt - Free Software Adoption in Industry - a personal ...SFScon 2020 - Oliver Fendt - Free Software Adoption in Industry - a personal ...
SFScon 2020 - Oliver Fendt - Free Software Adoption in Industry - a personal ...
South Tyrol Free Software Conference
 
Apple iPhone X: MEMS Microphones from Goertek, Knowles, and AAC Technologies ...
Apple iPhone X: MEMS Microphones from Goertek, Knowles, and AAC Technologies ...Apple iPhone X: MEMS Microphones from Goertek, Knowles, and AAC Technologies ...
Apple iPhone X: MEMS Microphones from Goertek, Knowles, and AAC Technologies ...
system_plus
 
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement
Yole Developpement
 
FUJIFILM Europe: Corporate Profile 2016
FUJIFILM Europe: Corporate Profile 2016FUJIFILM Europe: Corporate Profile 2016
FUJIFILM Europe: Corporate Profile 2016
Petra C. Fujiwara
 
How the MEMS Industry Can Extract More Value From its Customers? by JC. Eloy ...
How the MEMS Industry Can Extract More Value From its Customers? by JC. Eloy ...How the MEMS Industry Can Extract More Value From its Customers? by JC. Eloy ...
How the MEMS Industry Can Extract More Value From its Customers? by JC. Eloy ...
Yole Developpement
 
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...
Paolo Sammicheli
 

Similar to Designing Wearable Fitness for Everyone (20)

MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity
MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity
MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity
 
Project Report on "Xiaomi"
Project Report on "Xiaomi"Project Report on "Xiaomi"
Project Report on "Xiaomi"
 
SOI Applications -- an overview and some examples
SOI Applications -- an overview and some examplesSOI Applications -- an overview and some examples
SOI Applications -- an overview and some examples
 
ON Semiconductor Corporate Overview Presentation
ON Semiconductor Corporate Overview PresentationON Semiconductor Corporate Overview Presentation
ON Semiconductor Corporate Overview Presentation
 
04 b why ipod is successful
04 b why ipod is successful04 b why ipod is successful
04 b why ipod is successful
 
Wearables show march 2015
Wearables show   march 2015Wearables show   march 2015
Wearables show march 2015
 
DCEU 18: Designing a Global Centralized Container Platform for a Multi-Cluste...
DCEU 18: Designing a Global Centralized Container Platform for a Multi-Cluste...DCEU 18: Designing a Global Centralized Container Platform for a Multi-Cluste...
DCEU 18: Designing a Global Centralized Container Platform for a Multi-Cluste...
 
iNet-IoT company introduction
iNet-IoT  company introductioniNet-IoT  company introduction
iNet-IoT company introduction
 
BOSCH - AL-VS IP Portfolio 2014 (SIS Event).pdf
BOSCH - AL-VS IP Portfolio 2014 (SIS Event).pdfBOSCH - AL-VS IP Portfolio 2014 (SIS Event).pdf
BOSCH - AL-VS IP Portfolio 2014 (SIS Event).pdf
 
Tech snippets E-magazine-July17
Tech snippets E-magazine-July17Tech snippets E-magazine-July17
Tech snippets E-magazine-July17
 
Ba401making Smal Big
Ba401making Smal BigBa401making Smal Big
Ba401making Smal Big
 
IBM Corporate Strategy: Move To Value - Divest To Invest
IBM Corporate Strategy: Move To Value - Divest To InvestIBM Corporate Strategy: Move To Value - Divest To Invest
IBM Corporate Strategy: Move To Value - Divest To Invest
 
MIPI DevCon 2016: How Has the Mobile Evolution Influenced Other Industries?
MIPI DevCon 2016: How Has the Mobile Evolution Influenced Other Industries?MIPI DevCon 2016: How Has the Mobile Evolution Influenced Other Industries?
MIPI DevCon 2016: How Has the Mobile Evolution Influenced Other Industries?
 
Bosch in the Epicenter of New Trends and the Role of Leadership_20171023.pdf
Bosch in the Epicenter of New Trends and the Role of Leadership_20171023.pdfBosch in the Epicenter of New Trends and the Role of Leadership_20171023.pdf
Bosch in the Epicenter of New Trends and the Role of Leadership_20171023.pdf
 
SFScon 2020 - Oliver Fendt - Free Software Adoption in Industry - a personal ...
SFScon 2020 - Oliver Fendt - Free Software Adoption in Industry - a personal ...SFScon 2020 - Oliver Fendt - Free Software Adoption in Industry - a personal ...
SFScon 2020 - Oliver Fendt - Free Software Adoption in Industry - a personal ...
 
Apple iPhone X: MEMS Microphones from Goertek, Knowles, and AAC Technologies ...
Apple iPhone X: MEMS Microphones from Goertek, Knowles, and AAC Technologies ...Apple iPhone X: MEMS Microphones from Goertek, Knowles, and AAC Technologies ...
Apple iPhone X: MEMS Microphones from Goertek, Knowles, and AAC Technologies ...
 
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement
3DIC & 2,5D TSV Interconnect trends 2014 Kinsale Presentation Yole Developpement
 
FUJIFILM Europe: Corporate Profile 2016
FUJIFILM Europe: Corporate Profile 2016FUJIFILM Europe: Corporate Profile 2016
FUJIFILM Europe: Corporate Profile 2016
 
How the MEMS Industry Can Extract More Value From its Customers? by JC. Eloy ...
How the MEMS Industry Can Extract More Value From its Customers? by JC. Eloy ...How the MEMS Industry Can Extract More Value From its Customers? by JC. Eloy ...
How the MEMS Industry Can Extract More Value From its Customers? by JC. Eloy ...
 
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...
 

More from Frederik Hermann

From Sales Manager to Sales Leader: How to Build a High-Performance Coaching ...
From Sales Manager to Sales Leader: How to Build a High-Performance Coaching ...From Sales Manager to Sales Leader: How to Build a High-Performance Coaching ...
From Sales Manager to Sales Leader: How to Build a High-Performance Coaching ...
Frederik Hermann
 
Enabling Managers To Coach with Data [Webinar Slides]
Enabling Managers To Coach with Data [Webinar Slides]Enabling Managers To Coach with Data [Webinar Slides]
Enabling Managers To Coach with Data [Webinar Slides]
Frederik Hermann
 
What’s Next In Wearable Technology
What’s Next In Wearable TechnologyWhat’s Next In Wearable Technology
What’s Next In Wearable Technology
Frederik Hermann
 
Startup Lessons Learned
Startup Lessons LearnedStartup Lessons Learned
Startup Lessons Learned
Frederik Hermann
 
The Beginner’s Guide to Growth Hacking
The Beginner’s Guide to Growth HackingThe Beginner’s Guide to Growth Hacking
The Beginner’s Guide to Growth Hacking
Frederik Hermann
 
Lean Marketing for Startups
Lean Marketing for StartupsLean Marketing for Startups
Lean Marketing for Startups
Frederik Hermann
 
A Brief History Of JAJAH
A Brief History Of JAJAHA Brief History Of JAJAH
A Brief History Of JAJAH
Frederik Hermann
 
Startup Marketing & PR
Startup Marketing & PRStartup Marketing & PR
Startup Marketing & PR
Frederik Hermann
 
Virales Marketing - Diplomarbeit
Virales Marketing - DiplomarbeitVirales Marketing - Diplomarbeit
Virales Marketing - Diplomarbeit
Frederik Hermann
 
Virales Marketing - Vom Funken zum Lauffeuer
Virales Marketing - Vom Funken zum LauffeuerVirales Marketing - Vom Funken zum Lauffeuer
Virales Marketing - Vom Funken zum Lauffeuer
Frederik Hermann
 

More from Frederik Hermann (10)

From Sales Manager to Sales Leader: How to Build a High-Performance Coaching ...
From Sales Manager to Sales Leader: How to Build a High-Performance Coaching ...From Sales Manager to Sales Leader: How to Build a High-Performance Coaching ...
From Sales Manager to Sales Leader: How to Build a High-Performance Coaching ...
 
Enabling Managers To Coach with Data [Webinar Slides]
Enabling Managers To Coach with Data [Webinar Slides]Enabling Managers To Coach with Data [Webinar Slides]
Enabling Managers To Coach with Data [Webinar Slides]
 
What’s Next In Wearable Technology
What’s Next In Wearable TechnologyWhat’s Next In Wearable Technology
What’s Next In Wearable Technology
 
Startup Lessons Learned
Startup Lessons LearnedStartup Lessons Learned
Startup Lessons Learned
 
The Beginner’s Guide to Growth Hacking
The Beginner’s Guide to Growth HackingThe Beginner’s Guide to Growth Hacking
The Beginner’s Guide to Growth Hacking
 
Lean Marketing for Startups
Lean Marketing for StartupsLean Marketing for Startups
Lean Marketing for Startups
 
A Brief History Of JAJAH
A Brief History Of JAJAHA Brief History Of JAJAH
A Brief History Of JAJAH
 
Startup Marketing & PR
Startup Marketing & PRStartup Marketing & PR
Startup Marketing & PR
 
Virales Marketing - Diplomarbeit
Virales Marketing - DiplomarbeitVirales Marketing - Diplomarbeit
Virales Marketing - Diplomarbeit
 
Virales Marketing - Vom Funken zum Lauffeuer
Virales Marketing - Vom Funken zum LauffeuerVirales Marketing - Vom Funken zum Lauffeuer
Virales Marketing - Vom Funken zum Lauffeuer
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Designing Wearable Fitness for Everyone