SlideShare a Scribd company logo
www.axis.com
Enhancing
Defence-in-Depth using
automated systems
Jeffrey Lam
Senior Manager, End-customers, APAC
www.axis.com
USD**
Total sales 2020
1.2B
3,805
employees* in more
than countries
50
Axis at a glance
*Q4 2020 **Full year 2020, SEK 11.6 B, EUR 1.1 B
Video surveillance I audio |
intercom I access control I
training, service & support
Distributors
Customers
Resellers System integrators
Axis
Local presence around the world
through our extensive partner network
HQ and
founded
in Sweden,
part of
Canon group
Committed to
UN Global
Compact
75,000
partners worldwide
www.axis.com
Jeffrey Lam
Senior Program Manager
Defence in depth
(DiD)
www.axis.com
"Hohenzollern Castle - Stuttgart, Germany" by Trodel is licensed under CC BY-SA 2.0
outer walls
Inner walls
keep
Hill
www.axis.com
Datacenter
Defence in Depth
Perimeter
Premises
Building
Critical Spaces / Asset
www.axis.com
Defence in Depth in critical facilities
Perimeter
Premises Critical Spaces
Buildings
www.axis.com
Jeffrey Lam
Senior Program Manager
Automation &
Integration
www.axis.com
Deter
Detect
Delay
Response
Perimeter
Premises
Building
Critical spaces
Electronic
Systems
Automated
Environmental
Design
DiD INTENT
Manguards
www.axis.com
Objectives
• Reduce response time by reducing human inputs
• Increase effectiveness by using technology
• Facilitate human supervision & intervention
Approach
• Leverage on technology to automate tasks
• Integrate different systems to automate response
• Redesign processes to incorporate both human & tech.
www.axis.com
Automated Systems
INTERFACE
INTEGRATION
INTELLIGENCE
• Information & controls
• User dashboard / interface
• Manguards Communication
• Video images vs meta-data
• Interoperablity
• High level vs low level integration
• Detect & response
• Rules based/Machine Learning
• EDGE / server /cloud
www.axis.com
Jeffrey Lam
Senior Program Manager
Automated Systems
www.axis.com
Defence in Depth - typical systems
Security Cameras
Access control
Analytics & other
applications
Audio
Visitor entry
Control & Command
software
www.axis.com
Response
"Siren Light" by paurian is licensed under CC BY 2.0
"Floodlight Moon" by DOS82 is licensed under CC BY-NC-ND 2.0
"Garage Doors Long Panel Pebble Stone Color" by carywaynepeterson is
licensed under CC BY-ND 2.0
www.axis.com
Perimeter
Detect and verify potential
intrusion incidents at your
perimeter in real time.
www.axis.com
Perimeter Protection
Thermal
Camera
Detect
PTZ
Verify
Network
Horn
Speaker
Network
I/O
controlle
r
Siren
www.axis.com
Drones & Vehicles • Perimeter
Deter
Speakers
Detect
Fixed & PTZ cameras
Access
Vehicle recognition
& Door controller
Detect
Drone detection
system
www.axis.com
Premises & Site
Detect and track
people & objects
across multiple
sites.
www.axis.com
Site and lot management • Premises
Verify
PTZ cameras
Deter
Speakers
Detect
Thermal Cameras
/Radar detectors
Deter /
Detect
Bodyworn system /
Robotic Patrol
www.axis.com
Layer 2: Radar / Robot Guards
Reponse
Speakers
Detect
Multisensor cameras
Radar detectors
www.axis.com
Building
Control entrances
& exits to ensure
only authorized
personnel can
enter or leave the
space.
www.axis.com
Access control • Building exterior and interiors
Grant
access
Door controller
Identify
Card readers
Visitors
Door station
www.axis.com
Crossline and zone intrusion • Building interiors & Server rooms
Deter
Speakers
Detect
Fixed cameras
Verify
PTZ cameras
www.axis.com
Audio Analytics • Building exterior and interiors
Detect
Fixed cameras
Deter
Speakers
www.axis.com
Server rooms & server racks
Smart cameras and sensors
to protect people and assets
in the white space.
www.axis.com
White Space • Server rooms
Deter
Speakers
Multidirectional cameras
Verify
Detect
www.axis.com
Security-based operations
Cabinet, door and rack entry • Server racks
Deny
Rack based
access control
Post-event images
Pre-event images
Modular & PTZ camera
Detect
www.axis.com
Jeffrey Lam
Senior Program Manager
Systems
Considerations
www.axis.com
• Devices vs Applications
• Visibility, Flexibilty and Scalability
Level of
integration
• Comprehensive API
• Open Systems or Proprietary systems
Interoperability
• Supports current & future devices/systems
• Firmware upgrade - LTS track vs Active track
Backward
compatibility
Integrating systems
www.axis.com
IDENTIFY
/
DESIGN
Internal Policies
Regulatory
Compliance
Governance
ISO 27001
GDPR
FIPS 140-2
PCI-DSS
Secure by Default
Devices Inventory
PROTECT
/
DETECT
Hardening Guide
Signed Firmware
Secure Boot
LTS/firmware update
CVE Advisory
Vulnerability
Scanning
Encryption(certificates)
N/W Segmentation
TPM
RESPONSE/
RECOVER
SYS Log /
RemoteSys Log
Backup/Restore
SEIM/SOAR
(automation
&response)
Business Continuity
IT Security
www.axis.com
Jeffrey Lam
Senior Program Manager
Design
Considerations
www.axis.com
Environment considerations
• Lighting levels
• Shadows/ Reflections /Glare
• Dirt / dust/ Rain
• Temperature
• Strong winds / Vibration
• Electro-magnetic Interference
• Others
• Obstruction
• Theft, vandalism
"Hidden Camera" by miskan is licensed under CC BY-NC 2.0
"rain | window | reflection" by waferboard is licensed under CC BY 2.0
www.axis.com
Video considerations - lighting conditions
Lighting conditions are never right!
www.axis.com
Video considerations
Normal transmission: 2881 kbit/s
Without
Zipstream
Zipstream compression : 1433 kbit/s
With
Zipstream
www.axis.com
Cabling considerations
Cabling : major time & costs component
• Trenching, cable runways, grounding
• Surge protection, waterproofing, firestopping
Reduce cabling complexity
• Multi-sensor cameras = 1 cable / switch port
• PoE extenders: Transmitting UTP >100m
Reuse cables :
• UTP couplers/cables repair kit
• Cabling Testing/ Warranty
• Using existing coaxial cables for IP devices
www.axis.com

More Related Content

What's hot

7_16_BrivoOnAir_Datasheet
7_16_BrivoOnAir_Datasheet7_16_BrivoOnAir_Datasheet
7_16_BrivoOnAir_Datasheet
Agnes Sokol
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
dvanwyk30
 
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom SolutionMatrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Comsec
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
TI Safe
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
Sentry Global Technologies, LLC
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
F-Secure Corporation
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
Precisely
 
Video IQ in a Nutshell
Video IQ in a NutshellVideo IQ in a Nutshell
Video IQ in a Nutshell
Pieter Cloete
 
Atlas brochure
Atlas brochureAtlas brochure
Atlas brochure
Mail Box Production
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network Security
Precisely
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
GENIANS, INC.
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
GENIANS, INC.
 
Lco Axxon Introductory 2010 Sales
Lco Axxon Introductory 2010 SalesLco Axxon Introductory 2010 Sales
Lco Axxon Introductory 2010 Sales
luiscoello
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
PrivateWave Italia SpA
 
It security
It securityIt security
It security
avi2607
 
Key Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety NetworksKey Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety Networks
Design World
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
Felipe Prado
 
CyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID ExploitationsCyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID Exploitations
Chad Bowerman
 
System 6000
System 6000System 6000
System 6000
Mail Box Production
 
Complete Security
Complete SecurityComplete Security
Complete Security
Sophos
 

What's hot (20)

7_16_BrivoOnAir_Datasheet
7_16_BrivoOnAir_Datasheet7_16_BrivoOnAir_Datasheet
7_16_BrivoOnAir_Datasheet
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom SolutionMatrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
Video IQ in a Nutshell
Video IQ in a NutshellVideo IQ in a Nutshell
Video IQ in a Nutshell
 
Atlas brochure
Atlas brochureAtlas brochure
Atlas brochure
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network Security
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
Lco Axxon Introductory 2010 Sales
Lco Axxon Introductory 2010 SalesLco Axxon Introductory 2010 Sales
Lco Axxon Introductory 2010 Sales
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
It security
It securityIt security
It security
 
Key Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety NetworksKey Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety Networks
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
 
CyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID ExploitationsCyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID Exploitations
 
System 6000
System 6000System 6000
System 6000
 
Complete Security
Complete SecurityComplete Security
Complete Security
 

Similar to Enhancing Defence in depth with automated systems (SII Physical meets Cyber Security Conference)

Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptx
Jeffrey Lam
 
Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdf
MusicGramOfficial
 
Samsung Security cameras
Samsung Security camerasSamsung Security cameras
Samsung Security cameras
Haitham Youssef
 
Samsung Techwin Hanwha
Samsung Techwin HanwhaSamsung Techwin Hanwha
Samsung Techwin Hanwha
Haitham Youssef
 
4. Innovative Products & Solutions by AXIS.pdf
4. Innovative Products & Solutions by AXIS.pdf4. Innovative Products & Solutions by AXIS.pdf
4. Innovative Products & Solutions by AXIS.pdf
PawachMetharattanara
 
BASS Company profile
BASS Company profileBASS Company profile
BASS Company profile
Rasheed Al Sulh
 
Smart hotel solution
Smart hotel solutionSmart hotel solution
Smart hotel solution
Paul Maina
 
Blaze automation jntu
Blaze automation jntuBlaze automation jntu
Blaze automation jntu
Blaze_Hyd
 
Wireless World
Wireless World Wireless World
Wireless World
bhattsipl
 
Presentation dahua 2019.04.29
Presentation dahua 2019.04.29Presentation dahua 2019.04.29
Presentation dahua 2019.04.29
Ghomsi Adrien
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
Niraj Kumar
 
MOX IRIS Video Door Phone
MOX IRIS Video Door PhoneMOX IRIS Video Door Phone
MOX IRIS Video Door Phone
moxreview
 
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Sumo Logic
 
About BEA Americas
About BEA AmericasAbout BEA Americas
About BEA Americas
BEA, Inc.
 
Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2
MIDIH_EU
 
Vivotek Apresentação
Vivotek ApresentaçãoVivotek Apresentação
Vivotek Apresentação
Artsensor, Soluções de Segurança
 
Ravij profic
Ravij proficRavij profic
Ravij profic
Amit kumar
 
FS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptxFS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptx
PawachMetharattanara
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentation
maitretester
 
FS Presentation CCTV solution.pptx
FS Presentation CCTV solution.pptxFS Presentation CCTV solution.pptx
FS Presentation CCTV solution.pptx
PawachMetharattanara
 

Similar to Enhancing Defence in depth with automated systems (SII Physical meets Cyber Security Conference) (20)

Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptx
 
Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdf
 
Samsung Security cameras
Samsung Security camerasSamsung Security cameras
Samsung Security cameras
 
Samsung Techwin Hanwha
Samsung Techwin HanwhaSamsung Techwin Hanwha
Samsung Techwin Hanwha
 
4. Innovative Products & Solutions by AXIS.pdf
4. Innovative Products & Solutions by AXIS.pdf4. Innovative Products & Solutions by AXIS.pdf
4. Innovative Products & Solutions by AXIS.pdf
 
BASS Company profile
BASS Company profileBASS Company profile
BASS Company profile
 
Smart hotel solution
Smart hotel solutionSmart hotel solution
Smart hotel solution
 
Blaze automation jntu
Blaze automation jntuBlaze automation jntu
Blaze automation jntu
 
Wireless World
Wireless World Wireless World
Wireless World
 
Presentation dahua 2019.04.29
Presentation dahua 2019.04.29Presentation dahua 2019.04.29
Presentation dahua 2019.04.29
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
MOX IRIS Video Door Phone
MOX IRIS Video Door PhoneMOX IRIS Video Door Phone
MOX IRIS Video Door Phone
 
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
 
About BEA Americas
About BEA AmericasAbout BEA Americas
About BEA Americas
 
Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2
 
Vivotek Apresentação
Vivotek ApresentaçãoVivotek Apresentação
Vivotek Apresentação
 
Ravij profic
Ravij proficRavij profic
Ravij profic
 
FS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptxFS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptx
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentation
 
FS Presentation CCTV solution.pptx
FS Presentation CCTV solution.pptxFS Presentation CCTV solution.pptx
FS Presentation CCTV solution.pptx
 

More from Jeffrey Lam

Securing your DC JLBK (DSC).ppt
Securing your DC JLBK (DSC).pptSecuring your DC JLBK (DSC).ppt
Securing your DC JLBK (DSC).ppt
Jeffrey Lam
 
Bringing IT to the factory floor.ppt
Bringing IT to the factory floor.pptBringing IT to the factory floor.ppt
Bringing IT to the factory floor.ppt
Jeffrey Lam
 
Applying Audio to Security (Sep 2021)
Applying Audio to Security (Sep 2021)Applying Audio to Security (Sep 2021)
Applying Audio to Security (Sep 2021)
Jeffrey Lam
 
Comparison USA/China datacenters standards
Comparison USA/China datacenters standardsComparison USA/China datacenters standards
Comparison USA/China datacenters standards
Jeffrey Lam
 
Breaking the rules! bicsi
Breaking the rules! bicsi  Breaking the rules! bicsi
Breaking the rules! bicsi
Jeffrey Lam
 
Green datacenter jeff lam 2008
Green datacenter jeff lam 2008Green datacenter jeff lam 2008
Green datacenter jeff lam 2008
Jeffrey Lam
 
Datacenter space planning(old)
Datacenter space planning(old)Datacenter space planning(old)
Datacenter space planning(old)
Jeffrey Lam
 
Redundancy Datacenter Design
Redundancy Datacenter DesignRedundancy Datacenter Design
Redundancy Datacenter Design
Jeffrey Lam
 

More from Jeffrey Lam (8)

Securing your DC JLBK (DSC).ppt
Securing your DC JLBK (DSC).pptSecuring your DC JLBK (DSC).ppt
Securing your DC JLBK (DSC).ppt
 
Bringing IT to the factory floor.ppt
Bringing IT to the factory floor.pptBringing IT to the factory floor.ppt
Bringing IT to the factory floor.ppt
 
Applying Audio to Security (Sep 2021)
Applying Audio to Security (Sep 2021)Applying Audio to Security (Sep 2021)
Applying Audio to Security (Sep 2021)
 
Comparison USA/China datacenters standards
Comparison USA/China datacenters standardsComparison USA/China datacenters standards
Comparison USA/China datacenters standards
 
Breaking the rules! bicsi
Breaking the rules! bicsi  Breaking the rules! bicsi
Breaking the rules! bicsi
 
Green datacenter jeff lam 2008
Green datacenter jeff lam 2008Green datacenter jeff lam 2008
Green datacenter jeff lam 2008
 
Datacenter space planning(old)
Datacenter space planning(old)Datacenter space planning(old)
Datacenter space planning(old)
 
Redundancy Datacenter Design
Redundancy Datacenter DesignRedundancy Datacenter Design
Redundancy Datacenter Design
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Enhancing Defence in depth with automated systems (SII Physical meets Cyber Security Conference)