SlideShare a Scribd company logo
Fahim Kawsar
Internet of Things Research
IoT 3.0: Connected Living in an Everything-Digital World
1
2Questions
Internet is all about human experience not bits and bytes!
What human experience will be defined by an IoT enabled World?
1980
1990
2000
2010
2014
7
8 5
6
If everything is connected why would you need a device?
Experience
Internet of useless things
and that smart egg tray
They do not solve a real problem
Sense
Learn
Act
The learning thermostat
Seamless access, payment and localisation
Life logging, memory cues and assisting the blind
Quantified self towards better health and lifestyle
or simply living a happier life
Remote awareness of families and friends
Monitoring children's interaction and detecting early sign of autism
Searching the physical world at real time
The awareness mirror
Right information at the right time at the right place
Sensing + Understanding
you and the world around you
Sensing + Understanding
the world around you
The myth of smart home
Wi-Fi is the most Pervasive Sensor Network. Its available literally everywhere.
People
á
n
Places
7
Activity
Location
Location Co-Location Face to Face Interaction
Trajectory Physical Activity
Location Trajectory + Co-Location Personality and Mood Happiness
Location Co-Location Space Management and Recommendation
Location Trajectory State of Use
Location is the key, and behaviour models can extract higher order contexts
ôMobile Object Tags
Static Object Tags
Home Node
- Proximity Ranging Service
- Data Storage Service
EF5
Personal Object AnalyticsQuery Server
Anchor Points Query Service
Index Service
Location Trajectory State of Use A Real World Search Engine for IoT
Self Quantification of Social InteractionLocation Co-Location Face to Face Interaction
Radio
Signal
Capturing
Copresence
Detection
Interaction
Inference
Timeline of Face to Face InteractionsLocation Co-Location Face to Face Interaction
Happiness Map of the SpaceLocation Trajectory + Co-Location Personality and Mood Happiness
• Personal Interaction Reflection
• Personal Time and Activity Management
For Employees
• Discover Emerging Leaders
• Build High Performance Team
For Employers
• Predictive Maintenance & Management
• Personalised Space Recommendation
For Building Managers
Quantified Enterprise
Capturing Personal and Crowd Behaviour with Wi-Fi Analytics
•
• Profiling Spatio-Temporal Behaviour of Individual and Groups
• Extracting Communities and their Properties
• Spatio-Temporal Heat Map of the Venue
• Informed Space Management
• Recommend Contacts Opportunistically
• Personalised Space Recommendation Opportunistically
Sensing + Understanding
you
The most personal device ever
Poor inference Exposes private data Drains battery
But…
DeepX: A Software Accelerator for Embedded Deep Learning
Redefine mobile and IoT application experience by running the deep-learning models energy
efficiently and locally on resource-constrained devices to reduce the sensor inference gap.
Online
Compression
Model Fusion
Optimal
Resource
Allocation
10x improvement in sensory inference quality and 10x reduction of runtime energy and memory
DeepX enables future mobile, wearable and IoT devices to make incredible leaps in understanding you
Accessing
everything
Controlling
everything
Understanding
everything
The Future
Contextual automation in an everything-digital world
Sensing + Understanding
you and the world around you
Thank You
Fahim Kawsar
@raswak
eMail: fahim.kawsar@bell-labs.com

More Related Content

What's hot

Research Talk at Bell Labs - IoT System Architecture and Interactions
Research Talk at Bell Labs - IoT System Architecture and InteractionsResearch Talk at Bell Labs - IoT System Architecture and Interactions
Research Talk at Bell Labs - IoT System Architecture and Interactions
Fahim Kawsar
 
Future of Technology in Social Media
Future of Technology in Social MediaFuture of Technology in Social Media
Future of Technology in Social Media
Moses Gomes
 
Mind reading, A proof of concept
Mind reading, A proof of conceptMind reading, A proof of concept
Mind reading, A proof of concept
Prabhath Suminda
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Taking Qualitative Research to the Cloud - Ericsson Consumerlab
Taking Qualitative Research to the Cloud - Ericsson ConsumerlabTaking Qualitative Research to the Cloud - Ericsson Consumerlab
Taking Qualitative Research to the Cloud - Ericsson Consumerlab
Merlien Institute
 
Mind the Gap - A Pecha Kucha Presentation by Pravin Shekar
Mind the Gap - A Pecha Kucha Presentation by Pravin ShekarMind the Gap - A Pecha Kucha Presentation by Pravin Shekar
Mind the Gap - A Pecha Kucha Presentation by Pravin Shekar
NFN Labs
 
20130128 contextual intelligence v5_5
20130128 contextual intelligence v5_520130128 contextual intelligence v5_5
20130128 contextual intelligence v5_5
bo begole
 
Digital Psychology
Digital PsychologyDigital Psychology
Digital Psychology
Reading Room
 
Contextual intelligence
Contextual intelligenceContextual intelligence
Contextual intelligence
Thei Geurts
 
9/23 Top 5 Deep Learning
9/23 Top 5 Deep Learning9/23 Top 5 Deep Learning
9/23 Top 5 Deep Learning
NVIDIA
 
[0122]seunghyeong
[0122]seunghyeong[0122]seunghyeong
[0122]seunghyeong
ivaderivader
 
9/1 Top 5 Deep Learning
9/1 Top 5 Deep Learning9/1 Top 5 Deep Learning
9/1 Top 5 Deep Learning
NVIDIA
 
The Internet of Things (IoT) in Events
The Internet of Things (IoT) in EventsThe Internet of Things (IoT) in Events
The Internet of Things (IoT) in Events
GEVME
 
Emergency Management Systems for your Organisation
Emergency Management Systems for your OrganisationEmergency Management Systems for your Organisation
Emergency Management Systems for your Organisation
Intergen
 
Cognitive computing ppt.
Cognitive computing ppt.Cognitive computing ppt.
Cognitive computing ppt.
KRIPAPIOUS
 
Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...
Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...
Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...
MIT Enterprise Forum Cambridge
 
The Great Communicator 2008
The Great Communicator 2008The Great Communicator 2008
The Great Communicator 2008
Mike Cerkas
 
Marketing Convergence Across Digital and Physical, Anthony Mullen
Marketing Convergence Across Digital and Physical, Anthony MullenMarketing Convergence Across Digital and Physical, Anthony Mullen
Marketing Convergence Across Digital and Physical, Anthony Mullen
iCrossing
 
Innovative Designs for the Embodied Mind
Innovative Designs for the Embodied MindInnovative Designs for the Embodied Mind
Innovative Designs for the Embodied Mind
Diana Löffler
 
AI as a competitive weapon
AI as a competitive weaponAI as a competitive weapon
AI as a competitive weapon
Jonathan Seal
 

What's hot (20)

Research Talk at Bell Labs - IoT System Architecture and Interactions
Research Talk at Bell Labs - IoT System Architecture and InteractionsResearch Talk at Bell Labs - IoT System Architecture and Interactions
Research Talk at Bell Labs - IoT System Architecture and Interactions
 
Future of Technology in Social Media
Future of Technology in Social MediaFuture of Technology in Social Media
Future of Technology in Social Media
 
Mind reading, A proof of concept
Mind reading, A proof of conceptMind reading, A proof of concept
Mind reading, A proof of concept
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Taking Qualitative Research to the Cloud - Ericsson Consumerlab
Taking Qualitative Research to the Cloud - Ericsson ConsumerlabTaking Qualitative Research to the Cloud - Ericsson Consumerlab
Taking Qualitative Research to the Cloud - Ericsson Consumerlab
 
Mind the Gap - A Pecha Kucha Presentation by Pravin Shekar
Mind the Gap - A Pecha Kucha Presentation by Pravin ShekarMind the Gap - A Pecha Kucha Presentation by Pravin Shekar
Mind the Gap - A Pecha Kucha Presentation by Pravin Shekar
 
20130128 contextual intelligence v5_5
20130128 contextual intelligence v5_520130128 contextual intelligence v5_5
20130128 contextual intelligence v5_5
 
Digital Psychology
Digital PsychologyDigital Psychology
Digital Psychology
 
Contextual intelligence
Contextual intelligenceContextual intelligence
Contextual intelligence
 
9/23 Top 5 Deep Learning
9/23 Top 5 Deep Learning9/23 Top 5 Deep Learning
9/23 Top 5 Deep Learning
 
[0122]seunghyeong
[0122]seunghyeong[0122]seunghyeong
[0122]seunghyeong
 
9/1 Top 5 Deep Learning
9/1 Top 5 Deep Learning9/1 Top 5 Deep Learning
9/1 Top 5 Deep Learning
 
The Internet of Things (IoT) in Events
The Internet of Things (IoT) in EventsThe Internet of Things (IoT) in Events
The Internet of Things (IoT) in Events
 
Emergency Management Systems for your Organisation
Emergency Management Systems for your OrganisationEmergency Management Systems for your Organisation
Emergency Management Systems for your Organisation
 
Cognitive computing ppt.
Cognitive computing ppt.Cognitive computing ppt.
Cognitive computing ppt.
 
Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...
Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...
Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...
 
The Great Communicator 2008
The Great Communicator 2008The Great Communicator 2008
The Great Communicator 2008
 
Marketing Convergence Across Digital and Physical, Anthony Mullen
Marketing Convergence Across Digital and Physical, Anthony MullenMarketing Convergence Across Digital and Physical, Anthony Mullen
Marketing Convergence Across Digital and Physical, Anthony Mullen
 
Innovative Designs for the Embodied Mind
Innovative Designs for the Embodied MindInnovative Designs for the Embodied Mind
Innovative Designs for the Embodied Mind
 
AI as a competitive weapon
AI as a competitive weaponAI as a competitive weapon
AI as a competitive weapon
 

Similar to IoT 3.0 : Connected Living in an Everything-Digital World

Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014
Argus Labs
 
Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014
Filip Maertens
 
Ian Pearson
Ian PearsonIan Pearson
Ian Pearson
Thomas Müller
 
ISS2022 Keynote
ISS2022 KeynoteISS2022 Keynote
ISS2022 Keynote
Mark Billinghurst
 
Supersense! Studio Context
Supersense! Studio ContextSupersense! Studio Context
Supersense! Studio Context
Philip van Allen
 
David Wortley - Serious Gaming
David Wortley - Serious GamingDavid Wortley - Serious Gaming
David Wortley - Serious Gaming
Simeon Nedkov
 
Mobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile contextMobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile context
Florent Stroppa
 
Empathic Computing: Capturing the Potential of the Metaverse
Empathic Computing: Capturing the Potential of the MetaverseEmpathic Computing: Capturing the Potential of the Metaverse
Empathic Computing: Capturing the Potential of the Metaverse
Mark Billinghurst
 
Geolocation and Business
Geolocation and BusinessGeolocation and Business
Geolocation and Business
Salty Dog Hotel & Bistro
 
Childhelplines - Ian Pearson
Childhelplines - Ian PearsonChildhelplines - Ian Pearson
Childhelplines - Ian Pearson
jorikk
 
Shaspa Intelligent Shared Spaces And Sustainable Development
Shaspa Intelligent Shared Spaces And Sustainable DevelopmentShaspa Intelligent Shared Spaces And Sustainable Development
Shaspa Intelligent Shared Spaces And Sustainable Development
David Wortley
 
The sixth sense
The sixth senseThe sixth sense
The sixth sense
Himanshu Garg
 
Augmented Reality: An emerging technology with 3D Design at its core
Augmented Reality:  An emerging technology with 3D Design at its coreAugmented Reality:  An emerging technology with 3D Design at its core
Augmented Reality: An emerging technology with 3D Design at its core
BrianDiaz57
 
Becoming Ubiquitous
Becoming UbiquitousBecoming Ubiquitous
Becoming Ubiquitous
Flemming Funch
 
Better Together: Building Social Immersive Technologies
Better Together: Building Social Immersive TechnologiesBetter Together: Building Social Immersive Technologies
Better Together: Building Social Immersive Technologies
Liv Erickson
 
Michael metcalf
Michael metcalfMichael metcalf
Michael metcalf
Ben Allen
 
Humans vs. the Internet of Things: conciliare tecnologie ed esperienza utente
Humans vs. the Internet of Things: conciliare tecnologie ed esperienza utenteHumans vs. the Internet of Things: conciliare tecnologie ed esperienza utente
Humans vs. the Internet of Things: conciliare tecnologie ed esperienza utente
Fulvio Corno
 
TEDx Leuven 2012
TEDx Leuven 2012TEDx Leuven 2012
TEDx Leuven 2012
Filip Maertens
 
UX Strategy for Any Device
UX Strategy for Any DeviceUX Strategy for Any Device
UX Strategy for Any Device
Dave Hogue
 
Tech trends 2011
Tech trends 2011Tech trends 2011
Tech trends 2011
sputnik5
 

Similar to IoT 3.0 : Connected Living in an Everything-Digital World (20)

Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014
 
Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014
 
Ian Pearson
Ian PearsonIan Pearson
Ian Pearson
 
ISS2022 Keynote
ISS2022 KeynoteISS2022 Keynote
ISS2022 Keynote
 
Supersense! Studio Context
Supersense! Studio ContextSupersense! Studio Context
Supersense! Studio Context
 
David Wortley - Serious Gaming
David Wortley - Serious GamingDavid Wortley - Serious Gaming
David Wortley - Serious Gaming
 
Mobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile contextMobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile context
 
Empathic Computing: Capturing the Potential of the Metaverse
Empathic Computing: Capturing the Potential of the MetaverseEmpathic Computing: Capturing the Potential of the Metaverse
Empathic Computing: Capturing the Potential of the Metaverse
 
Geolocation and Business
Geolocation and BusinessGeolocation and Business
Geolocation and Business
 
Childhelplines - Ian Pearson
Childhelplines - Ian PearsonChildhelplines - Ian Pearson
Childhelplines - Ian Pearson
 
Shaspa Intelligent Shared Spaces And Sustainable Development
Shaspa Intelligent Shared Spaces And Sustainable DevelopmentShaspa Intelligent Shared Spaces And Sustainable Development
Shaspa Intelligent Shared Spaces And Sustainable Development
 
The sixth sense
The sixth senseThe sixth sense
The sixth sense
 
Augmented Reality: An emerging technology with 3D Design at its core
Augmented Reality:  An emerging technology with 3D Design at its coreAugmented Reality:  An emerging technology with 3D Design at its core
Augmented Reality: An emerging technology with 3D Design at its core
 
Becoming Ubiquitous
Becoming UbiquitousBecoming Ubiquitous
Becoming Ubiquitous
 
Better Together: Building Social Immersive Technologies
Better Together: Building Social Immersive TechnologiesBetter Together: Building Social Immersive Technologies
Better Together: Building Social Immersive Technologies
 
Michael metcalf
Michael metcalfMichael metcalf
Michael metcalf
 
Humans vs. the Internet of Things: conciliare tecnologie ed esperienza utente
Humans vs. the Internet of Things: conciliare tecnologie ed esperienza utenteHumans vs. the Internet of Things: conciliare tecnologie ed esperienza utente
Humans vs. the Internet of Things: conciliare tecnologie ed esperienza utente
 
TEDx Leuven 2012
TEDx Leuven 2012TEDx Leuven 2012
TEDx Leuven 2012
 
UX Strategy for Any Device
UX Strategy for Any DeviceUX Strategy for Any Device
UX Strategy for Any Device
 
Tech trends 2011
Tech trends 2011Tech trends 2011
Tech trends 2011
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

IoT 3.0 : Connected Living in an Everything-Digital World