This document contains information about an upcoming DotNetMalaga meetup including the organizers Bruno Capuano and Rocket Science Circuit Led. It also contains various technical topics including Arduino, face detection, cloud advantages, SQL, digital signage, and more.
2015 06 11 Windows 10 Developer Readiness by MVPs - Internet Of ThingsBruno Capuano
2015 06 11 Windows 10 Developer Readiness by MVPs - Internet of Things. Slides used in the session, the source code demos are in http://elbruno.com. Follow me @elbruno
2014 09 12 Dia Programador Session MaterialsBruno Capuano
Materiales utilizados durante el evento virtual del día del programador en córdoba. Trata temas como USB Hacking, desarrollo de apps con Leap Motion, trabajo con Arduinos, Kinect V2, reconocimiento facial, y desarrollo de apps para Lego Mindstorms EV3
Mindstorms EV3 is LEGO's 3rd generation robot building kit — now with a complete Linux OS on the programming brick. Think of it as a Raspberry Pi on wheels (or tracks!), that can shoot balls, grab things, play sounds, sense its surroundings and connect to mobile phones, arduinos and micro:bits.
In this session you'll learn the basics of hacking Mindstorms robots and see some examples of controlling robots using voice commands (using Google Voice or Apple's Siri), wearables and microcontrollers, computer vision (face detection) and web browsers!
2015 06 11 Windows 10 Developer Readiness by MVPs - Internet Of ThingsBruno Capuano
2015 06 11 Windows 10 Developer Readiness by MVPs - Internet of Things. Slides used in the session, the source code demos are in http://elbruno.com. Follow me @elbruno
2014 09 12 Dia Programador Session MaterialsBruno Capuano
Materiales utilizados durante el evento virtual del día del programador en córdoba. Trata temas como USB Hacking, desarrollo de apps con Leap Motion, trabajo con Arduinos, Kinect V2, reconocimiento facial, y desarrollo de apps para Lego Mindstorms EV3
Mindstorms EV3 is LEGO's 3rd generation robot building kit — now with a complete Linux OS on the programming brick. Think of it as a Raspberry Pi on wheels (or tracks!), that can shoot balls, grab things, play sounds, sense its surroundings and connect to mobile phones, arduinos and micro:bits.
In this session you'll learn the basics of hacking Mindstorms robots and see some examples of controlling robots using voice commands (using Google Voice or Apple's Siri), wearables and microcontrollers, computer vision (face detection) and web browsers!
So, you want to build a hardware product? Every so often, a device comes along that changes the way we live our daily lives and things are never the same again. With today's digital technology, such devices may come more frequently than in the past - personal gadgets you cannot live without. What’s inside? What makes it tick? How do you find out? In this sharing session, Mark will provide an introduction to hardware hacking and why it matters, going through some quick tips on getting cosy with hardware to find out what makes it tick. Mark (MK FX) is a founder of Bazinga! Pte Ltd, a technology development and prototyping company that builds gadgets from ideas. An engineer since birth, because if you can dream it, think it - you can build it.
CodeRage XI international Conference: Arduino + Delphi Mobile Apps Vic Fernandes
This is the playback of my CodeRage XI international Conference lecture speaking about Arduino + Delphi Mobile Apps
This presentation was done in 9 cities around Brazil for the ExtremeDelphi event during 2016 and also in Rome-Italy at the ITDevCon event.
Very happy to be speaking for the first time at the CodeRage!!! Only great speakers and hundreds of attendees from all around the world! Wow!
GS-4093, "AstoundSound for Gaming – The next dimension in the evolution of Au...AMD Developer Central
Presentation, GS-4093, "AstoundSound for Gaming – The next dimension in the evolution of Audio!" by Jerry Mahabub and Michel Henein at the AMD Developer Summit (APU13) Nov. 11-13, 2013.
Confusion of Things — The IoT Hardware KerfuffleOmer Kilic
Presented at OSHCamp 2015, as part of Wuthering Bytes at Hebden Bridge
While the definition of the term IoT (i.e: Internet of Things) is as cloudy as the “cloud”, everyone seems to be doing it. With excitement levels reaching stratospheric levels, the amount of buzzword-driven articles and colourful (and oh so unnecessary) abstract vector drawings that depict toasters communicating with cars have essentially made lives of many engineers who just want to build things a living hell.
This talk will strip back the layers of marketing and aim to answer the question: “Which hardware platform should you use for building connected devices?”. With the plethora of chips/single board computers and specifically IoT-branded offerings out there, the platform choice does get a little difficult at times. By breaking down the application at hand into certain key requirement categories, this process could be simplified. There will also be mention of some of the most popular hardware platforms and how they differ from each other.
[German] Boards für das IoT-PrototypingLars Gregori
IoT Boards (e.g. Arduino, Raspberry Pi, ESP8266, ...) for prototyping with price tags, technical information and comparison between MCU, MPU and SoC (System on a Chip)
SMARTSTATION is leading Thin Client and Compact size Mini PC manufacturing company.It provides IT Virtualization solution in Citrix and Vmware VDI environment. SMART Mini pc is very compact size computing device with high performance
Road to Republic of IoT - ESP32 Programming and LoRaAndri Yadi
To promote Republic of IoT (RIoT) hackathon, we do roadshow to few cities in Indonesia and this time in Bogor. Here, I talked about technologies will be used during hackathon, especially LoRa and ESP32.
Hardwear.io 2018 BLE Security Essentials workshopSlawomir Jasek
Bluetooth Low Energy (Smart, 4) is recently gaining more and more traction as one of the most common and rapidly growing IoT technologies. Unfortunatelly the prevalence of technology does not come with security. Alarming vulnerabilities in BLE smart locks, medical devices and banking tokens are revealed day by day. And yet, the knowledge on how to comprehensively assess them seems very uncommon.
In this workshop you will get familiar with the basics of BLE security. We will work on a dedicated, readily available BLE hardware nRF devkit device. You will learn how to program and flash it yourself, using special web interface and ready templates. Such approach allows to better understand how things work “under the hood”, experiment with different options, and then secure the hardware properly.
From attacker’s perspective, we will cover among others: sniffing, spoofing, MITM, replay and relay.
Having enough time, we will play with a collection of vulnerable smart locks, sex toys and other devices.
Im Rahmen einer kurzen Präsentation nach Pecha-Kucha Art (wenig Text, viele Bilder) und einer Live-Demo (am Freifunk Stand) möchte ich Einsteigern und Freifunkern gerne ein kleines Wochenendprojekt auf Basis der ESP8266 Platform vorstellen.
Konkret geht es um einen mobilen "Freifunk-Scanner", in dessen Herz ein ESP8266-201 schlägt, zu dem sich u.a. eine WLAN-Antenne, vier Buttons, ein 3,7v LiPo sowie ein kleines 1,8'' TFT Display und ein wenig Arduino Code gesellt. Im Rahmen des Vortrags möchte ich von der Problemstellung über die ersten Ideen einen Einblick in die ESP8266 Platform, sowie die Entwicklungsschritte dieses kleinen Projektes geben.
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy toolSlawomir Jasek
Bluetooth Low Energy is probably the most thriving technology implemented recently in all kinds of IoT devices: gadgets, wearables, smart homes, medical equipment and even banking tokens. The BLE specification assures secure connections through link-layer encryption, device whitelisting and bonding - a mechanisms not without flaws, although that's another story we are already aware of. A surprising number of devices do not (or simply cannot - because of the use scenario) utilize these mechanisms. The security (like authentication) is, in fact, provided on higher "application" (GATT protocol) layer of the data exchanged between the "master" (usually mobile phone) and peripheral device. The connection from "master" in such cases is initiated by scanning to a specific broadcast signal, which by design can be trivially spoofed. And guess what - the device GATT internals (so-called "services" and "characteristics") can also be easily cloned.
Using a few simple tricks, we can assure the victim will connect to our impersonator device instead of the original one, and then just proxy the traffic - without consent of the mobile app or device. And here it finally becomes interesting - just imagine how many attacks you might be able to perform with the possibility to actively intercept the BLE communication! Basing on several examples, I will demonstrate common flaws possible to exploit, including improper authentication, static passwords, not-so-random PRNG, excessive services, bad assumptions - which allow you to take over control of smart locks, disrupt smart home, and even get a free lunch. I will also suggest best practices to mitigate the attacks. Ladies and gentlemen - I give you the BLE MITM proxy. A free open-source tool which opens a whole new chapter for your IoT device exploitation, reversing and debugging. Run it on a portable Raspberry Pi, carry around BLE-packed premises, share your experience and contribute to the code.
So, you want to build a hardware product? Every so often, a device comes along that changes the way we live our daily lives and things are never the same again. With today's digital technology, such devices may come more frequently than in the past - personal gadgets you cannot live without. What’s inside? What makes it tick? How do you find out? In this sharing session, Mark will provide an introduction to hardware hacking and why it matters, going through some quick tips on getting cosy with hardware to find out what makes it tick. Mark (MK FX) is a founder of Bazinga! Pte Ltd, a technology development and prototyping company that builds gadgets from ideas. An engineer since birth, because if you can dream it, think it - you can build it.
CodeRage XI international Conference: Arduino + Delphi Mobile Apps Vic Fernandes
This is the playback of my CodeRage XI international Conference lecture speaking about Arduino + Delphi Mobile Apps
This presentation was done in 9 cities around Brazil for the ExtremeDelphi event during 2016 and also in Rome-Italy at the ITDevCon event.
Very happy to be speaking for the first time at the CodeRage!!! Only great speakers and hundreds of attendees from all around the world! Wow!
GS-4093, "AstoundSound for Gaming – The next dimension in the evolution of Au...AMD Developer Central
Presentation, GS-4093, "AstoundSound for Gaming – The next dimension in the evolution of Audio!" by Jerry Mahabub and Michel Henein at the AMD Developer Summit (APU13) Nov. 11-13, 2013.
Confusion of Things — The IoT Hardware KerfuffleOmer Kilic
Presented at OSHCamp 2015, as part of Wuthering Bytes at Hebden Bridge
While the definition of the term IoT (i.e: Internet of Things) is as cloudy as the “cloud”, everyone seems to be doing it. With excitement levels reaching stratospheric levels, the amount of buzzword-driven articles and colourful (and oh so unnecessary) abstract vector drawings that depict toasters communicating with cars have essentially made lives of many engineers who just want to build things a living hell.
This talk will strip back the layers of marketing and aim to answer the question: “Which hardware platform should you use for building connected devices?”. With the plethora of chips/single board computers and specifically IoT-branded offerings out there, the platform choice does get a little difficult at times. By breaking down the application at hand into certain key requirement categories, this process could be simplified. There will also be mention of some of the most popular hardware platforms and how they differ from each other.
[German] Boards für das IoT-PrototypingLars Gregori
IoT Boards (e.g. Arduino, Raspberry Pi, ESP8266, ...) for prototyping with price tags, technical information and comparison between MCU, MPU and SoC (System on a Chip)
SMARTSTATION is leading Thin Client and Compact size Mini PC manufacturing company.It provides IT Virtualization solution in Citrix and Vmware VDI environment. SMART Mini pc is very compact size computing device with high performance
Road to Republic of IoT - ESP32 Programming and LoRaAndri Yadi
To promote Republic of IoT (RIoT) hackathon, we do roadshow to few cities in Indonesia and this time in Bogor. Here, I talked about technologies will be used during hackathon, especially LoRa and ESP32.
Hardwear.io 2018 BLE Security Essentials workshopSlawomir Jasek
Bluetooth Low Energy (Smart, 4) is recently gaining more and more traction as one of the most common and rapidly growing IoT technologies. Unfortunatelly the prevalence of technology does not come with security. Alarming vulnerabilities in BLE smart locks, medical devices and banking tokens are revealed day by day. And yet, the knowledge on how to comprehensively assess them seems very uncommon.
In this workshop you will get familiar with the basics of BLE security. We will work on a dedicated, readily available BLE hardware nRF devkit device. You will learn how to program and flash it yourself, using special web interface and ready templates. Such approach allows to better understand how things work “under the hood”, experiment with different options, and then secure the hardware properly.
From attacker’s perspective, we will cover among others: sniffing, spoofing, MITM, replay and relay.
Having enough time, we will play with a collection of vulnerable smart locks, sex toys and other devices.
Im Rahmen einer kurzen Präsentation nach Pecha-Kucha Art (wenig Text, viele Bilder) und einer Live-Demo (am Freifunk Stand) möchte ich Einsteigern und Freifunkern gerne ein kleines Wochenendprojekt auf Basis der ESP8266 Platform vorstellen.
Konkret geht es um einen mobilen "Freifunk-Scanner", in dessen Herz ein ESP8266-201 schlägt, zu dem sich u.a. eine WLAN-Antenne, vier Buttons, ein 3,7v LiPo sowie ein kleines 1,8'' TFT Display und ein wenig Arduino Code gesellt. Im Rahmen des Vortrags möchte ich von der Problemstellung über die ersten Ideen einen Einblick in die ESP8266 Platform, sowie die Entwicklungsschritte dieses kleinen Projektes geben.
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy toolSlawomir Jasek
Bluetooth Low Energy is probably the most thriving technology implemented recently in all kinds of IoT devices: gadgets, wearables, smart homes, medical equipment and even banking tokens. The BLE specification assures secure connections through link-layer encryption, device whitelisting and bonding - a mechanisms not without flaws, although that's another story we are already aware of. A surprising number of devices do not (or simply cannot - because of the use scenario) utilize these mechanisms. The security (like authentication) is, in fact, provided on higher "application" (GATT protocol) layer of the data exchanged between the "master" (usually mobile phone) and peripheral device. The connection from "master" in such cases is initiated by scanning to a specific broadcast signal, which by design can be trivially spoofed. And guess what - the device GATT internals (so-called "services" and "characteristics") can also be easily cloned.
Using a few simple tricks, we can assure the victim will connect to our impersonator device instead of the original one, and then just proxy the traffic - without consent of the mobile app or device. And here it finally becomes interesting - just imagine how many attacks you might be able to perform with the possibility to actively intercept the BLE communication! Basing on several examples, I will demonstrate common flaws possible to exploit, including improper authentication, static passwords, not-so-random PRNG, excessive services, bad assumptions - which allow you to take over control of smart locks, disrupt smart home, and even get a free lunch. I will also suggest best practices to mitigate the attacks. Ladies and gentlemen - I give you the BLE MITM proxy. A free open-source tool which opens a whole new chapter for your IoT device exploitation, reversing and debugging. Run it on a portable Raspberry Pi, carry around BLE-packed premises, share your experience and contribute to the code.
Feasibility of Security in Micro-Controllersardiri
Is it possible to secure micro-controllers used within IoT?
With the introduction of micro controllers such as the Arduino, Raspberry Pi and BeagleBone – it has become easy to connect sensors to gather information and utilise network connections to build an IoT ecosystem. Strong encryption schemes like RSA/AES/SHA and ecliptic curves cryptography (ECC) have been difficult to introduce due to limited performance and memory capabilities of the micro controllers used and using standard libraries just isn’t feasible – we find that designated and optimised software is the only feasible way forward.
Robotics and Arduino. A simple presentation about how a microcontroller works and a "Hello World" project/program. Blinking a led. Atmega328p info about architecture.
The Arduino Uno Board is an open resource microcontroller board based on the ATmega328 chip. This Board has 14 digital I/O pins, 6 analog input pins, onboard 16 MHz ceramic resonator, Port for USB connection, Onboard DC power jack, An ICSP header and a microcontroller reset button. Robomart is the biggest selling store in india buy arduino board, buy arduino online, arduino india, arduino uno price, arduino uno india, arduino uno price in india, arduino board price in india at best prices. https://www.robomart.com/arduino-uno-online-india
Arduino is the popular open-source electronics prototyping platform based on easy-to-use hardware and software. It's intended for artists, designers, hobbyists, and anyone interested in creating interactive objects or environments and is designed to be as flexible as possible to fit your project's needs.
Advanced View of Atmega Microcontroller Projects List - ATMega32 AVR.pdfWiseNaeem
Most of the electronics geeks are asking the whole list of Atmega AVR projects PDF here we will share list every month as our projects are being updated on daily basis.
Global AI on Virtual Tour Oslo - Anomaly Detection using ML.Net on a drone te...Bruno Capuano
Slides used during the session "Anomaly Detection using ML.Net on a drone telemetry from Azure IoT" for the Global AI on Virtual Tour - Oslo on June 2021
2020 08 06 Global XR Talks - Lessons Learned creating a multiplatform AI proj...Bruno Capuano
Slides used during the session "Lessons Learned creating a multiplatform AI project for Azure Kinect and Hololens 2" for the Global XR Talks on the 2020 08 06
2020 06 13 Best of Build 2020 - Canada Community Edition - Artificial Intelli...Bruno Capuano
Slides used during the "Best of Build 2020 - Canada Community Edition" for the Artificial Intelligence session. Shared session with Frank Boucheros. More information on my blog.
Global Azure AI Tour Buenos Aires Argentina, Drones and AIBruno Capuano
Slides used during my session "How to fly a drone with 20 lines of code and use some AI" for the Global AI Tour event. Virtual Mode for Buenos Aires, Argentina.
2020 04 18 Global AI On Tour Monterrey - Program a Drone using AIBruno Capuano
Slides used in my online session "¡Vamos a programar a un dron para que siga rostros!" for the Global AI On Tour Monterrey.
El próximo 18 de Abril estará hablando de drones, Inteligencia Artificial, Docker, y otras sorpresas para el evento gratuito de Global AI On Tour Monterrey !
2020 04 09 Global AI Community Virtual Tour - Drones and AIBruno Capuano
Slides used during my session "Let’s code a drone to follow faces! Using AI, Python, containers and more. As a bonus we will some Enterprise scenarios." as part of the Global AI Community Virtual Tour.
Slides used during the virtual conference, NetCoreConf on April 04, 2020. The session was a introduction to Machine Learning for .Net developers, using ML.Net as the main framework.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
19. Microcontroller
Miniature computer
• Processor, Storage and RAM
all in one tiny package!
• Atmel Microcontroller (MCU),
typically Atmega328
Atmega328 Information
Component Specification
Clock Speed 16MHz
Flash Memory 32K
EEPROM 1K
SRAM 2K
Analog -> Digital 6Ch 10bit
Communication SPI
Digital 14 I/O
PWM 6 Channel (Digital)
41. DML
• SELECT
• FROM
• WHERE
• GROUP BY
• HAVING
• CASE WHEN THEN ELSE
• INNER/LEFT OUTER JOIN
• UNION
• CROSS/OUTER APPLY
• CAST
• INTO
• ORDER BY ASC, DSC
SAQL – Language & Library
Scaling Extensions
• WITH
• PARTITION BY
• OVER
Date and Time Functions
• DateName
• DatePart
• Day
• Month
• Year
• DateTimeFromParts
• DateDiff
• DateAdd
Windowing Extensions
• TumblingWindow
• HoppingWindow
• SlidingWindow
Aggregate Functions
• Sum
• Count
• Avg
• Min
• Max
• StDev
• StDevP
• Var
• VarP
String Functions
• Len
• Concat
• CharIndex
• Substring
• PatIndex
Temporal Functions
• Lag, IsFirst
• CollectTop
42.
43. Digital Media Solutions for Retail (Use Case)
Solutions
Audience Measurement
User Behavior
Displays & Digital Signage
Interactivity, NUI
POS, Kiosk, Devices
CRM
ERP
Business Intelligence
& Analytics
Traffic Measurement Customer Recognition Behavior Analysis
In-Store
In-Store
Outside of
Store
Omni-Channel Digital Signage Interactivity