My talk for IoT Bandung - MeetUp #15 event. As software developer, I share how to improve software development process when developing for IoT device, especially Arduino.
Keynote I delivered in Movreak Awakens - Star Wars ep.7 movie party event, which we also announced formally to public, DyCode's new subsidiary that focuses on IoT, DycodeX.
It's a story of product development, combining those. I presented this deck during Bandung Developer Day #2 on Dec 10, 2015, at UNIKOM university, Bandung.
Develop & Deploy Node.js app on Windows AzureAndri Yadi
It's the keynote on Telkom Bandung Digital Valley's TechThursday. I talked about developing and deploying Node.js application on Windows Azure.
Attented by 20 web developers around Bandung city.
To try the code I demoed, here's the repo:
https://github.com/andriyadi/NodeAzureStorageSocketIO
The IoTino is an Arduino-compatible platform designed for Internet of Things applications. It features integrated Bluetooth Low Energy communication and digital/analog I/O in a small, low-cost, and low-power form factor. The IoTino allows for quick prototyping and product deployment of IoT solutions. It is based on the widely used Arduino architecture to take advantage of the large community of Arduino developers. The IoTino system includes main boards, shields, and software APIs to enable a range of IoT applications.
The document discusses the Java Ring, a wearable computer in the form of a finger ring. It contains a small microprocessor, 6KB of RAM, and can run applets from the Java virtual machine. The ring uses 1-Wire communication protocol and can authenticate users to internet services with a touch. Potential applications include secure access, digital signatures, and storing user credentials. It provides advantages as a wearable computer that is always with the user.
The document discusses Java Ring, a type of digital jewelry that functions similarly to a mobile phone. It contains components like RAM, ROM, and a Java Virtual Machine. The Java Ring is compact and can be used for security purposes like access control and e-cash transactions. It works by communicating with a reader when the ring is pushed onto the reader's blue dot receptor. The Java Ring has advantages like being durable and functioning in various environments, while storing multiple passwords and information. However, it also has limitations like limited processor power and memory.
The document describes a Java ring, which is a finger ring containing a microprocessor and Java virtual machine. The ring can run applets to enable various functions like attendance tracking, door access, and car security. It contains RAM, ROM, a real-time clock, and an iButton - a stainless steel can housing a computer chip with a unique address. The iButton allows the ring to communicate with a reader and host system. The ring provides security through its stainless casing and ability to require a PIN. It has applications in access control and thermochron usage while being portable and rugged.
Keynote I delivered in Movreak Awakens - Star Wars ep.7 movie party event, which we also announced formally to public, DyCode's new subsidiary that focuses on IoT, DycodeX.
It's a story of product development, combining those. I presented this deck during Bandung Developer Day #2 on Dec 10, 2015, at UNIKOM university, Bandung.
Develop & Deploy Node.js app on Windows AzureAndri Yadi
It's the keynote on Telkom Bandung Digital Valley's TechThursday. I talked about developing and deploying Node.js application on Windows Azure.
Attented by 20 web developers around Bandung city.
To try the code I demoed, here's the repo:
https://github.com/andriyadi/NodeAzureStorageSocketIO
The IoTino is an Arduino-compatible platform designed for Internet of Things applications. It features integrated Bluetooth Low Energy communication and digital/analog I/O in a small, low-cost, and low-power form factor. The IoTino allows for quick prototyping and product deployment of IoT solutions. It is based on the widely used Arduino architecture to take advantage of the large community of Arduino developers. The IoTino system includes main boards, shields, and software APIs to enable a range of IoT applications.
The document discusses the Java Ring, a wearable computer in the form of a finger ring. It contains a small microprocessor, 6KB of RAM, and can run applets from the Java virtual machine. The ring uses 1-Wire communication protocol and can authenticate users to internet services with a touch. Potential applications include secure access, digital signatures, and storing user credentials. It provides advantages as a wearable computer that is always with the user.
The document discusses Java Ring, a type of digital jewelry that functions similarly to a mobile phone. It contains components like RAM, ROM, and a Java Virtual Machine. The Java Ring is compact and can be used for security purposes like access control and e-cash transactions. It works by communicating with a reader when the ring is pushed onto the reader's blue dot receptor. The Java Ring has advantages like being durable and functioning in various environments, while storing multiple passwords and information. However, it also has limitations like limited processor power and memory.
The document describes a Java ring, which is a finger ring containing a microprocessor and Java virtual machine. The ring can run applets to enable various functions like attendance tracking, door access, and car security. It contains RAM, ROM, a real-time clock, and an iButton - a stainless steel can housing a computer chip with a unique address. The iButton allows the ring to communicate with a reader and host system. The ring provides security through its stainless casing and ability to require a PIN. It has applications in access control and thermochron usage while being portable and rugged.
This document discusses the Java Ring, which is a finger ring containing a microprocessor, memory, and Java virtual machine. It can run applets to store user information and perform functions when touched to a receptor. The Java Ring is made of stainless steel and is more durable than smart cards. It has various applications including banking, security, login, and storage of usernames and passwords. The document provides an introduction, history, components, working, comparison to smart cards, applications, and conclusions about the Java Ring.
This document is a certificate of completion for a specialization in programming the Internet of Things (IOT). The specialization included 6 courses that covered topics such as the Arduino and Raspberry Pi platforms, C and Python programming, interfacing with microcontrollers, and a capstone project to design and build an IOT device. The certificate verifies that Mohammed Ahmed Zaki successfully completed the online, non-credit specialization in IOT programming from the University of California, Irvine.
Java ring is a finger ring that contains a small microprocessor with built in capabilities for the user.Java ring is a sort of a smartcard that is wearable on a finger,a stainless-steel ring,16-millimeters (0.6 inches) in diameter.
The document is a project report for a smart mirror created by a student team. It includes an overview of the project, a list of the hardware and software used, including APIs and a Raspberry Pi. It describes changes made from the previous quarter, including struggles faced and contributions by team members. It provides details on the final product and lessons learned.
The document discusses the history and features of the Java Ring, a wearable computer in the form of a finger ring. It describes how the Java Ring originated from Dallas Semiconductor's 1-Wire protocol and iButton technology. The Java Ring contains a small microprocessor, Java virtual machine, memory, and real-time clock, allowing it to store user credentials and authenticate the user. Information is transferred via a 1-Wire communication protocol through a Blue Dot Receptor. The key benefits of the Java Ring are that it is wearable, controlled by the user, and can enable rapid authentication and access to services.
The Java Ring is a tiny wearable computer encased in stainless steel that is worn like a ring. It contains a 1-million transistor processor, 134KB of RAM and 32KB of ROM memory, and a real-time clock powered by a lithium backup. It can store user credentials, credit card numbers, URLs and electronic cash. Using a Blue Dot receptor connected to a computer via serial port, the Java Ring can authenticate users and wirelessly transmit encrypted data for applications like e-banking, smart car components, and smart door locks. The Java Ring provides always-on computing capabilities and security features like rapid data erasure and an unalterable processor clock for authentication.
Computer Science: Your Ticket to a Cool CareerNick Landry
Do you think technology is cool? Do you dream of working for tech giants like Microsoft, Google or Apple? Is your goal to start your own software business and build the next Uber or WhatsApp? A University degree in Computer Science can open thousands of doors in Information Technology and pave the way to a successful and prosperous career. In honor of Computer Science Education Week, join 22-year industry veteran Nick Landry from Microsoft for a conversation about careers in software. Come learn about the opportunities and how you can start preparing today, and bring your questions too!
Java Ring is a stainless-steel ring that houses a microprocessor called an iButton, which contains 134KB RAM, 32KB ROM, and a Java virtual machine. It was introduced in 1998 to enable personalized services using information stored on the ring. Examples included a robot making coffee based on a user's preferences. While Java Rings are not widely used, similar wearable devices could be used for applications like automatically adjusting vehicle settings based on the driver's stored preferences.
The Java Ring is a finger ring containing a small microprocessor that implements the Java Card 2.0 API. It stores information in NVRAM and runs applets. When snapped into a Blue Dot receptor connected to a computer, it allows personalized services and functions like storing cash, unlocking doors, and tracking attendance. Originally introduced in 1998, Java Rings have been tested for uses like cashless school lunches and checking out library books.
This document provides a brief history of mobile application development and summaries of Android and iPhone development environments. It discusses key events and devices from 1956 to 2002 that helped establish mobile technologies. It then summarizes the Android and iPhone operating systems, developer environments, programming languages, and architectures. Tips are provided on user interface design, resource management, and other tools like PhoneGap and Titanium for cross-platform development.
JenkinsMobi: Jenkins XML API for Mobile ApplicationsLuca Milanesio
This document summarizes a presentation about using the Jenkins XML API for mobile applications. It discusses:
1. The presenters who created a mobile app called JenkinsMobi to access Jenkins builds from mobile devices using the XML API.
2. The challenges of mobile development like limited resources and the need to minimize data usage.
3. How JenkinsMobi was developed using the XML API and XPath to reduce data transfer by only retrieving essential build information.
4. Tips for using the XML API securely and efficiently in mobile apps for iOS and Android like asynchronous connections and XML parsing.
The document discusses Java Rings, which are finger rings containing microprocessors that run Java applications. It provides an overview of the history and components of Java Rings, how they work, examples of their applications, and security features. Some disadvantages are that implementation costs can be high, information storage is limited, and theft is a risk.
The document discusses the Java ring, which is a stainless steel ring containing a computer chip called an iButton that stores user information and runs Java applets. It was introduced in 1998 to provide personalized services. The ring communicates with readers through the iButton and 1-wire protocol with a touch. Applications include access control, time/attendance, e-cash, and more. It has advantages like convenience and security but also risks less parental control and privacy issues.
This document contains information about Shivananda (Shivoo) R Koteshwar, General Manager & Site Head at MediaTek. It includes his social media links and provides an overview of the resources and support MediaTek can provide for IoT product development, including hardware, software, technical support, cloud services, and assistance through various stages of the product development process.
The document discusses Java rings, which are finger rings containing microprocessors that can store and run small Java programs. Specifically, it describes the I-button, a stainless steel ring developed by Dallas Semiconductor in 1989 containing a 1 million transistor chip with RAM, ROM, a Java Virtual Machine and other components. The document outlines the historical background of Java rings, their components, security features, applications like access control and comparisons to other technologies like credit cards. It concludes that Java rings offer a secure way to carry digital information and credentials and may see wider use in the future.
An informal conversation about the mobile software/hardware ecosystem and MeeGo (a Linux-based open-source OS for mobile and embedded devices). Slides work best with my color commentary added. Presentation to Portland MeeGo Network on June 20, 2011.
This document provides information about hacking with Arduino and the Android Open Accessory Development Kit (ADK). It includes instructions on installing the ADK, debugging Arduino code, and an example code walkthrough. Suggested hack projects include building a keyboard that takes input from an Android device's screen and controls LEDs and tones on an Arduino board.
A Java ring is a finger ring containing a microprocessor that allows the user to store and access personal information. It uses Java Card technology, including a Java virtual machine, memory, and applets. When snapped into a reader, it can perform tasks like accessing doors, making payments, and checking out books. While providing authentication and security, privacy and control are potential disadvantages.
The document discusses the history and capabilities of Java Rings. Java Rings are small wearable computers in the form of rings that contain a microprocessor, memory, and Java virtual machine. They were introduced by Sun Microsystems in 1998 and can store user credentials, cash balances, and URLs. The rings use Dallas Semiconductor's iButton technology, which encases computer chips in stainless steel for durability. Information is transferred via a 1-wire communication protocol. Potential applications include secure authentication, digital signatures, and storing user profiles.
Summer Training / Internship Program 2014 with Live Projectsrohitit249
Linux Soft Technologies is proposing an 11-part summer training program for B.Tech students covering topics such as Linux, networking, cybersecurity, cloud computing, web and software development, mobile apps, SEO, embedded systems and more. The training would be provided through experienced instructors at Linux Soft's training center or the university campus, include assignments on live international projects, and result in certificates. Students would need to register by March 30th with a letter from their college and a Rs. 1000 fee.
Echelon Indonesia 2016 - Innovation Through Opportunities in IoT & ArduinoAndri Yadi
In Echelon Indonesia 2016, April 5, I talked about what IoT and Arduino are all about, technological perspective in IoT, and some opportunities around IoT where we can innovate. I also gave my view on IoT market and players in Indonesia.
It's exciting time!
Internet of Things - Technological PerspectiveAndri Yadi
When I was asked to go back to my campus and share about Internet of Things, I found that it's a broad topic. So I limit the talk only from technological standpoint while still giving a bit about business opportunities. So this is the deck used for that talk.
This document discusses the Java Ring, which is a finger ring containing a microprocessor, memory, and Java virtual machine. It can run applets to store user information and perform functions when touched to a receptor. The Java Ring is made of stainless steel and is more durable than smart cards. It has various applications including banking, security, login, and storage of usernames and passwords. The document provides an introduction, history, components, working, comparison to smart cards, applications, and conclusions about the Java Ring.
This document is a certificate of completion for a specialization in programming the Internet of Things (IOT). The specialization included 6 courses that covered topics such as the Arduino and Raspberry Pi platforms, C and Python programming, interfacing with microcontrollers, and a capstone project to design and build an IOT device. The certificate verifies that Mohammed Ahmed Zaki successfully completed the online, non-credit specialization in IOT programming from the University of California, Irvine.
Java ring is a finger ring that contains a small microprocessor with built in capabilities for the user.Java ring is a sort of a smartcard that is wearable on a finger,a stainless-steel ring,16-millimeters (0.6 inches) in diameter.
The document is a project report for a smart mirror created by a student team. It includes an overview of the project, a list of the hardware and software used, including APIs and a Raspberry Pi. It describes changes made from the previous quarter, including struggles faced and contributions by team members. It provides details on the final product and lessons learned.
The document discusses the history and features of the Java Ring, a wearable computer in the form of a finger ring. It describes how the Java Ring originated from Dallas Semiconductor's 1-Wire protocol and iButton technology. The Java Ring contains a small microprocessor, Java virtual machine, memory, and real-time clock, allowing it to store user credentials and authenticate the user. Information is transferred via a 1-Wire communication protocol through a Blue Dot Receptor. The key benefits of the Java Ring are that it is wearable, controlled by the user, and can enable rapid authentication and access to services.
The Java Ring is a tiny wearable computer encased in stainless steel that is worn like a ring. It contains a 1-million transistor processor, 134KB of RAM and 32KB of ROM memory, and a real-time clock powered by a lithium backup. It can store user credentials, credit card numbers, URLs and electronic cash. Using a Blue Dot receptor connected to a computer via serial port, the Java Ring can authenticate users and wirelessly transmit encrypted data for applications like e-banking, smart car components, and smart door locks. The Java Ring provides always-on computing capabilities and security features like rapid data erasure and an unalterable processor clock for authentication.
Computer Science: Your Ticket to a Cool CareerNick Landry
Do you think technology is cool? Do you dream of working for tech giants like Microsoft, Google or Apple? Is your goal to start your own software business and build the next Uber or WhatsApp? A University degree in Computer Science can open thousands of doors in Information Technology and pave the way to a successful and prosperous career. In honor of Computer Science Education Week, join 22-year industry veteran Nick Landry from Microsoft for a conversation about careers in software. Come learn about the opportunities and how you can start preparing today, and bring your questions too!
Java Ring is a stainless-steel ring that houses a microprocessor called an iButton, which contains 134KB RAM, 32KB ROM, and a Java virtual machine. It was introduced in 1998 to enable personalized services using information stored on the ring. Examples included a robot making coffee based on a user's preferences. While Java Rings are not widely used, similar wearable devices could be used for applications like automatically adjusting vehicle settings based on the driver's stored preferences.
The Java Ring is a finger ring containing a small microprocessor that implements the Java Card 2.0 API. It stores information in NVRAM and runs applets. When snapped into a Blue Dot receptor connected to a computer, it allows personalized services and functions like storing cash, unlocking doors, and tracking attendance. Originally introduced in 1998, Java Rings have been tested for uses like cashless school lunches and checking out library books.
This document provides a brief history of mobile application development and summaries of Android and iPhone development environments. It discusses key events and devices from 1956 to 2002 that helped establish mobile technologies. It then summarizes the Android and iPhone operating systems, developer environments, programming languages, and architectures. Tips are provided on user interface design, resource management, and other tools like PhoneGap and Titanium for cross-platform development.
JenkinsMobi: Jenkins XML API for Mobile ApplicationsLuca Milanesio
This document summarizes a presentation about using the Jenkins XML API for mobile applications. It discusses:
1. The presenters who created a mobile app called JenkinsMobi to access Jenkins builds from mobile devices using the XML API.
2. The challenges of mobile development like limited resources and the need to minimize data usage.
3. How JenkinsMobi was developed using the XML API and XPath to reduce data transfer by only retrieving essential build information.
4. Tips for using the XML API securely and efficiently in mobile apps for iOS and Android like asynchronous connections and XML parsing.
The document discusses Java Rings, which are finger rings containing microprocessors that run Java applications. It provides an overview of the history and components of Java Rings, how they work, examples of their applications, and security features. Some disadvantages are that implementation costs can be high, information storage is limited, and theft is a risk.
The document discusses the Java ring, which is a stainless steel ring containing a computer chip called an iButton that stores user information and runs Java applets. It was introduced in 1998 to provide personalized services. The ring communicates with readers through the iButton and 1-wire protocol with a touch. Applications include access control, time/attendance, e-cash, and more. It has advantages like convenience and security but also risks less parental control and privacy issues.
This document contains information about Shivananda (Shivoo) R Koteshwar, General Manager & Site Head at MediaTek. It includes his social media links and provides an overview of the resources and support MediaTek can provide for IoT product development, including hardware, software, technical support, cloud services, and assistance through various stages of the product development process.
The document discusses Java rings, which are finger rings containing microprocessors that can store and run small Java programs. Specifically, it describes the I-button, a stainless steel ring developed by Dallas Semiconductor in 1989 containing a 1 million transistor chip with RAM, ROM, a Java Virtual Machine and other components. The document outlines the historical background of Java rings, their components, security features, applications like access control and comparisons to other technologies like credit cards. It concludes that Java rings offer a secure way to carry digital information and credentials and may see wider use in the future.
An informal conversation about the mobile software/hardware ecosystem and MeeGo (a Linux-based open-source OS for mobile and embedded devices). Slides work best with my color commentary added. Presentation to Portland MeeGo Network on June 20, 2011.
This document provides information about hacking with Arduino and the Android Open Accessory Development Kit (ADK). It includes instructions on installing the ADK, debugging Arduino code, and an example code walkthrough. Suggested hack projects include building a keyboard that takes input from an Android device's screen and controls LEDs and tones on an Arduino board.
A Java ring is a finger ring containing a microprocessor that allows the user to store and access personal information. It uses Java Card technology, including a Java virtual machine, memory, and applets. When snapped into a reader, it can perform tasks like accessing doors, making payments, and checking out books. While providing authentication and security, privacy and control are potential disadvantages.
The document discusses the history and capabilities of Java Rings. Java Rings are small wearable computers in the form of rings that contain a microprocessor, memory, and Java virtual machine. They were introduced by Sun Microsystems in 1998 and can store user credentials, cash balances, and URLs. The rings use Dallas Semiconductor's iButton technology, which encases computer chips in stainless steel for durability. Information is transferred via a 1-wire communication protocol. Potential applications include secure authentication, digital signatures, and storing user profiles.
Summer Training / Internship Program 2014 with Live Projectsrohitit249
Linux Soft Technologies is proposing an 11-part summer training program for B.Tech students covering topics such as Linux, networking, cybersecurity, cloud computing, web and software development, mobile apps, SEO, embedded systems and more. The training would be provided through experienced instructors at Linux Soft's training center or the university campus, include assignments on live international projects, and result in certificates. Students would need to register by March 30th with a letter from their college and a Rs. 1000 fee.
Echelon Indonesia 2016 - Innovation Through Opportunities in IoT & ArduinoAndri Yadi
In Echelon Indonesia 2016, April 5, I talked about what IoT and Arduino are all about, technological perspective in IoT, and some opportunities around IoT where we can innovate. I also gave my view on IoT market and players in Indonesia.
It's exciting time!
Internet of Things - Technological PerspectiveAndri Yadi
When I was asked to go back to my campus and share about Internet of Things, I found that it's a broad topic. So I limit the talk only from technological standpoint while still giving a bit about business opportunities. So this is the deck used for that talk.
This document discusses Arduino and its history and applications. It notes that Arduino was created in 2005 as an educational open-source hardware project. It was developed by Massimo Banzi and others to provide a low-cost, easy-to-use platform for prototyping that could be used in classrooms. Arduino was built upon Wiring, an earlier open-source electronics platform, to make hardware programming more approachable. It has since grown into a large community and product line used widely for hardware prototyping, especially in IoT and home automation applications.
The document discusses Arduino, an open-source hardware platform used for building electronics projects. It notes that Arduino is a microcontroller board that can be programmed to read input and control output from various sensors and actuators. The document provides details on Arduino components, programming, common shields and expansions, applications in different domains, and its popularity as an accessible platform for physical computing.
This talk was given at CESEC 2015 which is a Summer School on Critical Embedded Systems: http://cesec2015.sciencesconf.org/
These slides present the Arduino Designer why and how we develop it with Eclipse Sirius:
http://www.eclipse.org/sirius/
It presents also the Eclipse Sirius Animation feature:
http://www.eclipse.org/sirius/lab.html
It's technical and live coding talk that I delivered on Bandung Digital Valley's TechThursday program. In which I discuss deeply about ESP8266 development, Azure IoT Hub cloud and DycodeX's iothub.id cloud, and working with HomeKit framework on iOS and integration with Siri.
Microcontrollers contain a processing core, flash memory, RAM, I/O peripherals, and are used for specific tasks. The Arduino is an open-source physical computing platform based on a microcontroller board with a USB plug and uses a version of Processing for programming. Arduino boards can be programmed using the Arduino IDE and expanded with shields to add additional functionality.
The document discusses Arduino, an open-source hardware platform for building electronics projects. It notes that Arduino uses a microcontroller and can be programmed using a simplified version of C/C++. The document outlines what Arduino boards contain, how they can be expanded with shields, how to program them using the Arduino IDE software, examples of Arduino projects, and the benefits of the Arduino platform for learning and prototyping.
Lab Handson: Power your Creations with Intel Edison!Codemotion
by Francesco Baldassarri - Come along and play with Intel Edison, for the Internet of Things? Learn about the Developer Kit for IoT, chose your preferred environment and test it – or test all the possibilities? We will be providing information and hands on training for developers interested in testing our solutions in C/C++, Javascript, Arduino, Wyliodrin and Python. Just bring you laptop and we will help you to get started. We will also provide information about our Cloud Analytics platform, and test hardware samples with the Grove Starter Kit – Intel IoT Edition. Visit us anytime and start making! What will you make?
This document provides an overview of OpenFrameworks for Flash developers. It includes:
1. An introduction to OpenFrameworks and how it can be used to create C++ applications with less hassle than traditional methods.
2. A breakdown of the basic structure of an OpenFrameworks application including the main classes and functions.
3. Step-by-step explanations of three example OpenFrameworks projects that create circles, an animation, and particles.
4. Additional resources for learning more about OpenFrameworks, creative coding, and getting involved in the OpenFrameworks community.
An introduction to Internet of Things and Maker MovementAndri Yadi
I use this keynote to deliver an introduction to IoT and gave demo of few use cases, that (to be real) mostly developed by my own company. I also shared about maker movement, especially in Indonesia.
It's a very late upload, as the event was on Dec 10, 2016 :)
IRJET- IOT Dune Buggy –Control it from AnywhereIRJET Journal
This document describes an IOT dune buggy robot that can be controlled over the internet from anywhere in the world. The robot uses an Arduino microcontroller along with a WiFi module to connect to cloud services and receive commands sent through a mobile app. The objective is to reduce human efforts by allowing remote control and surveillance through the robot. The robot's architecture connects the Arduino, WiFi module and sensors to the cloud where commands are sent from an Android app to control the robot's movement and stream data from its sensors.
IRJET- IOT Dune Buggy –Control it from AnywhereIRJET Journal
This document describes an IOT dune buggy robot that can be controlled over the internet from anywhere in the world. The robot uses an Arduino microcontroller connected to a WiFi module to receive commands through a cloud service and move accordingly. An Android app is designed to allow the user to control the robot's movements and view its surroundings through a camera. The objectives are to reduce human efforts and time by allowing remote surveillance and control of the robot. Future applications could include using the robot for border surveillance or bomb disposal tasks in the military.
Arduino is an open-source hardware platform for building interactive electronic projects. It consists of a simple open hardware design with an Atmel processor and input/output support. The hardware is less expensive than other prototyping devices. It is accompanied by a software side written in Java and based on Processing. Arduino began in Italy to control student-built interaction design projects and is descended from the open-source Wiring platform. It has a large community and potential for growth supporting its future success.
Matteo Valoriani, Antimo Musone - The Future of Factory - Codemotion Rome 2019Codemotion
In the last 3 years Mixed Reality devices and AI technology have opened the door to an infinite number of new disrupting opportunities, but it is not the only revolution underway. Thanks to the combination of new powerful cloud services, AI and local computation capabilities, we can evolve the traditional industrial applications to enter in Industry 4.0 In this session we will showcase and describe the implementation of an industrial application that uses an offline ONNX Model, trained online on cloud service but deployed locally on dedicated AI chip.
This document provides biographical information about the author and a history of electronics and computing. It discusses digital logic, circuit boards, microcontrollers, computers, and introduces the Arduino and Raspberry Pi open-source hardware platforms. Details are provided about the Arduino, including common boards, projects, and an introductory video. Specifications and supported operating systems are listed for the Raspberry Pi along with example introductory and demo videos.
Similar to IoT Development from Software Developer Perspective (20)
A late upload. This slide was presented on Aug 31, 2019, when I delivered a talk for AIoT seminar in University of Lambung Mangkurat, Banjarbaru. It's part of Republic of IoT 2019 event.
TechInAsia PDC 2019 - Unlocking The Potential of IoT with AIAndri Yadi
A late upload. I was honored to involve and deliver speaking for the 3rd time in TechInAsia - Product Development Conference (PDC). In this PDC 2019, I shared about the potential of IoT to be unlocked with the help of AI.
Global Azure Bootcamp 2019 - AIoT powered by AzureAndri Yadi
It's very late share. The deck I presented when discussing AIoT powered by Microsoft Azure, during Global Azure Bootcamp 2019 - Bandung, Indonesia on April 2019.
Introduction to AIoT & TinyML - with ArduinoAndri Yadi
On last March 21, 2020, we participated in worldwide Arduino Day 2020 and organized the online event for Bandung, Indonesia. This is the deck I delivered for my talk and demo.
Opportunities & Challenges in IoT - Future of IoT industry in Indonesia 2019 ...Andri Yadi
The document discusses opportunities and challenges for IoT in Indonesia from 2019 to 2024. It notes that Indonesia's IoT market is projected to reach $444 trillion by 2022, driven mainly by platform and application sectors. It also predicts Indonesia will have 400 million IoT devices by 2022, with manufacturing and healthcare making up the largest portions. The document advocates combining AI and IoT to create new use cases and business models, and discusses challenges around talent, infrastructure, regulations, and startups in developing Indonesia's IoT industry. It outlines efforts by the Indonesia IoT Association to address these challenges through collaboration, certifications, and socialization events.
Microsoft Azure-powered IoT & AI Solution To Help FarmerAndri Yadi
This deck is presented during my speaking in Microsoft's //DevCon / Digital Economy Summit, Jakarta, Feb 27, 2020, which was one of a kind event since it was attended by Mr. Satya Nadella (CEO of Microsoft) and Mr. Joko Widodo (President of Indonesia). I shared about how Azure can power SMARTernak - a livestock-farming assistance platform - to help farmers.
Delivered a talk to discuss developer-perspective technical introduction, stories around LoRa/LoRaWAN, also the state in Indonesia.
Use this deck for a sharing session with Maker4Nation community, back then on Oct 3, 2018 in Jakarta.
I was invited by Indosat Ooredoo, one of 3 biggest telco operator in Indonesia, to share about IoT Development for its Ask The Expert program. This is the deck I use to discuss about tips and tricks, thoughts, and some real-world use cases for IoT development and implementation.
Global Azure Bootcamp 2018 - Azure IoT CentralAndri Yadi
The deck I presented when talking about Azure IoT Central during Global Azure Bootcamp 2018, in Bandung city, Indonesia.
I should have uploaded this on last March 2018. Usual, lot of works. So, some info in this deck may change and some code referred may be deprecated. But the concept still should be relevant.
Maker Movement toward IoT Ecosystem in IndonesiaAndri Yadi
I had an honour to share my thought on Indonesia Maker Movement to a group of Indonesia IoT stakeholders and community. It's during a forum group discussion organized by Indonesia Ministry of Communication and Informatics.
IoT for Agriculture in a Nutshell: Technical PerspectiveAndri Yadi
It's a late upload. I had a chance to share my thought on how IoT can help agriculture, esp precision agriculture. I used this slide for the talk in a Indonesia Ministry of Agriculture's event.
Road to Republic of IoT - IoT Technologies & Machine LearningAndri Yadi
Yep, should have uploaded this on July 2017. To promote Republic of IoT (RIoT) hackathon, we do roadshow to few cities in Indonesia and this time in Semarang city. Here, I talked about technologies will be used during hackathon, especially LoRa, ESP32, and machine learning.
IoT Connectivity: The Technical & PotentialAndri Yadi
I had a chance to deliver a talk in Huawei Tech Day 2017 at University of Indonesia. I used this slide to discuss the connectivity options in IoT, from the technical perspective, while also discussed a bit of the potential.
I used this slide to deliver a talk in "Face the Future through IoT" seminar, where I talked technicality behind IoT and delivered a comprehensive demo from the sensor, connectivity, and process with Machine Learning, all on top of Azure.
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa ConnectivityAndri Yadi
Should have posted 1 year ago. In this Global Azure Bootcamp 2017, I had a chance to share how to connect IoT devices to Azure IoT Hub by leveraging LoRa/LoRaWAN connectivity.
This document provides an overview of industrial Internet of Things (IIoT). It discusses how IIoT can help with operational efficiency, predictive maintenance, and asset tracking. It also covers common IIoT technologies like sensors, microcontrollers, connectivity options, cloud platforms, and energy sources. A demo is shown of a power meter sending data to the cloud. The global IIoT market is estimated to reach $2.6 trillion by 2020 according to Cisco, showing the huge opportunity it presents.
Road to Republic of IoT - ESP32 Programming and LoRaAndri Yadi
To promote Republic of IoT (RIoT) hackathon, we do roadshow to few cities in Indonesia and this time in Bogor. Here, I talked about technologies will be used during hackathon, especially LoRa and ESP32.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
27. Arduino language is based on
Wiring framework. Arduino IDE is
based on Processing (in Java).
Arduino language is implemented in
C++
Arduino supports latest major C++
standard, C++11
DID YOU
KNOW?
63. We contribute
Education
100+ seminars, workshops, trainings delivered
Delivered to 20+ communities, organisations,
campuses
Next, could be yours…
Just drop us a message:
http://edu.dycode.co.id | edu@dycode.com