This document summarizes Mahamood Hussain's presentation on delivering compelling usages for imaging with Intel architecture-based platforms. The presentation discusses how saturated the mobile photography market has become and the need to drive breakthrough innovation through understanding user needs. It then outlines a framework called the "3 W's" to develop new usages by defining the target user, understanding pain points, and rapidly prototyping solutions. A variety of potential imaging and depth-enhanced use cases are presented that were identified through user interviews.
Cross Platform Development Using Fluttervivatechijri
Today the development of cross-platform mobile application has under the state of compromise. The developers are not willing to choose an alternative of either building the similar app many times for many operating systems or to accept a lowest common denominator and optimal solution that will going to trade the native speed, accuracy for portability. The Flutter is an open-source SDK for creating high-performance, high fidelity mobile apps for the development of iOS and Android. Few significant features of flutter are - Just-in-time compilation (JIT), Ahead- of-time compilation (AOT compilation) into a native (system-dependent) machine code so that the resulting binary file can execute natively. The Flutter’s hot reload functionality helps us to understand quickly and easily experiment, build UIs, add features, and fix bugs. Hot reload works by injecting updated source code files into the running Dart Virtual Machine (VM). With the help of Flutter, we believe that we would be having a solution that gives us the best of both worlds: hardware accelerated graphics and UI, powered by native ARM code, targeting both popular mobile operating systems.
Future Applications of Smart Iot Devicesvivatechijri
With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges that are connected with these applications going from splendid savvy urban areas, to medical care administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have immensely improved in the continuous years, there are so far different issues that require attention. Since the IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner, IoT is planning for new components of exploration to be finished. This paper presents the progressing headway of IoT advancements and inspects future applications.
Simple steps on how to get started with your new DTEK50 secure smartphone powered by Android. This quick how-to guide will help you make the most of DTEK50 with information on how to use the Content Transfer app, regain control of your privacy, and take dazzling photos with DTEK50’s cameras.
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
When Android first made its way into the consumer market, no one could have predicted the impact it would have. Android was an operating system developed with a simple idea at its core: Google’s founders wanted smarter mobile devices that better served their users. Today, that simple idea has helped make Android the most popular mobile OS on the market, with a global share of 66%.
Android’s popularity can largely be traced to its sheer diversity. Almost from the beginning, it has been an open platform, and there are countless devices from countless manufacturers that users can choose between. Therein lies the problem – due to its widespread popularity, Android finds itself targeted by criminals and malware with greater frequency than any other operating system. This means that although the OS is not inherently vulnerable, any vulnerabilities that do exist tend to be exploited if they aren’t patched in a timely fashion. Moreover, because so many different vendors count themselves as players in the Android space, it’s inevitable that some will lag behind with security patching. In the meantime, their devices will remain vulnerable, even as they’re being used to handle sensitive business data.
“Nearly every organization supporting smartphones and tablets must have a strategy to support Android devices, despite some of the security challenges,” reads a recent white paper by J. Gold Associates. “As we moved to a more mobile world over the past several years, the number of potential attack points increased dramatically, and many of them consisted of user-selected and often unsecured devices as a byproduct of BYOD,” the paper continues. “The ability to secure data and prevent corporate breaches consistently ranks among the top issues both IT and general management struggle with on a regular basis. A February 2016 Ponemon Institute survey shows that 67% of companies are either certain or very likely to have had a security breach due to a mobile device.”
Slow security patching is far from the only threat facing Android within the enterprise. To grant themselves additional freedoms and run certain applications, many users choose to root their devices, stripping away core security functionality in the interest of personalization. And though measures such as Samsung KNOX and Android for Work exist to separate corporate and private data, these software solutions can be fooled by a savvy enough user.
That’s where BlackBerry comes in. Security has always been in our blood, and we’ve always made it our priority to protect both our clients and their data. That’s why we’ve made our own foray into the Android device market, bringing our full security expertise to bear.
Deploying Intel Architecture-based Tablets with Windows* 8 at IntelIT@Intel
Intel IT recently deployed Intel® Atom™ processor-based tablets with Microsoft Windows* 8 in our enterprise in a proof of concept.
Our participants were pleased with the experience, and reported greater productivity and flexibility.
Presentation on Microsoft Technologies in Teaching, Learning and Research presented at Microsoft IT Academy Summit 2011 October. - Presentation Video in low quality to allow upload
This is the second version of Build an AR app presentation. It gives a detailed step by step guide on building a complete AR app from scratch using Vuforia
Gary Brown (Movidius, Intel): Deep Learning in AR: the 3 Year HorizonAugmentedWorldExpo
A talk from the Develop Track at AWE USA 2017 - the largest conference for AR+VR in Santa Clara, California May 31- June 2, 2017.
Gary Brown (Movidius, Intel): Deep Learning in AR: the 3 Year Horizon
Deep learning techniques are gaining in popularity in many facets of embedded vision, and this holds true for AR and VR. Will they soon dominate every facet of vision processing? This talk explores this question by examining the theory and practice of applying deep learning to real world problems for Augmented Reality, with real examples describing how this shift is happening today quickly in some areas, and slower in others.
http://AugmentedWorldExpo.com
Cross Platform Development Using Fluttervivatechijri
Today the development of cross-platform mobile application has under the state of compromise. The developers are not willing to choose an alternative of either building the similar app many times for many operating systems or to accept a lowest common denominator and optimal solution that will going to trade the native speed, accuracy for portability. The Flutter is an open-source SDK for creating high-performance, high fidelity mobile apps for the development of iOS and Android. Few significant features of flutter are - Just-in-time compilation (JIT), Ahead- of-time compilation (AOT compilation) into a native (system-dependent) machine code so that the resulting binary file can execute natively. The Flutter’s hot reload functionality helps us to understand quickly and easily experiment, build UIs, add features, and fix bugs. Hot reload works by injecting updated source code files into the running Dart Virtual Machine (VM). With the help of Flutter, we believe that we would be having a solution that gives us the best of both worlds: hardware accelerated graphics and UI, powered by native ARM code, targeting both popular mobile operating systems.
Future Applications of Smart Iot Devicesvivatechijri
With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges that are connected with these applications going from splendid savvy urban areas, to medical care administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have immensely improved in the continuous years, there are so far different issues that require attention. Since the IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner, IoT is planning for new components of exploration to be finished. This paper presents the progressing headway of IoT advancements and inspects future applications.
Simple steps on how to get started with your new DTEK50 secure smartphone powered by Android. This quick how-to guide will help you make the most of DTEK50 with information on how to use the Content Transfer app, regain control of your privacy, and take dazzling photos with DTEK50’s cameras.
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
When Android first made its way into the consumer market, no one could have predicted the impact it would have. Android was an operating system developed with a simple idea at its core: Google’s founders wanted smarter mobile devices that better served their users. Today, that simple idea has helped make Android the most popular mobile OS on the market, with a global share of 66%.
Android’s popularity can largely be traced to its sheer diversity. Almost from the beginning, it has been an open platform, and there are countless devices from countless manufacturers that users can choose between. Therein lies the problem – due to its widespread popularity, Android finds itself targeted by criminals and malware with greater frequency than any other operating system. This means that although the OS is not inherently vulnerable, any vulnerabilities that do exist tend to be exploited if they aren’t patched in a timely fashion. Moreover, because so many different vendors count themselves as players in the Android space, it’s inevitable that some will lag behind with security patching. In the meantime, their devices will remain vulnerable, even as they’re being used to handle sensitive business data.
“Nearly every organization supporting smartphones and tablets must have a strategy to support Android devices, despite some of the security challenges,” reads a recent white paper by J. Gold Associates. “As we moved to a more mobile world over the past several years, the number of potential attack points increased dramatically, and many of them consisted of user-selected and often unsecured devices as a byproduct of BYOD,” the paper continues. “The ability to secure data and prevent corporate breaches consistently ranks among the top issues both IT and general management struggle with on a regular basis. A February 2016 Ponemon Institute survey shows that 67% of companies are either certain or very likely to have had a security breach due to a mobile device.”
Slow security patching is far from the only threat facing Android within the enterprise. To grant themselves additional freedoms and run certain applications, many users choose to root their devices, stripping away core security functionality in the interest of personalization. And though measures such as Samsung KNOX and Android for Work exist to separate corporate and private data, these software solutions can be fooled by a savvy enough user.
That’s where BlackBerry comes in. Security has always been in our blood, and we’ve always made it our priority to protect both our clients and their data. That’s why we’ve made our own foray into the Android device market, bringing our full security expertise to bear.
Deploying Intel Architecture-based Tablets with Windows* 8 at IntelIT@Intel
Intel IT recently deployed Intel® Atom™ processor-based tablets with Microsoft Windows* 8 in our enterprise in a proof of concept.
Our participants were pleased with the experience, and reported greater productivity and flexibility.
Presentation on Microsoft Technologies in Teaching, Learning and Research presented at Microsoft IT Academy Summit 2011 October. - Presentation Video in low quality to allow upload
This is the second version of Build an AR app presentation. It gives a detailed step by step guide on building a complete AR app from scratch using Vuforia
Gary Brown (Movidius, Intel): Deep Learning in AR: the 3 Year HorizonAugmentedWorldExpo
A talk from the Develop Track at AWE USA 2017 - the largest conference for AR+VR in Santa Clara, California May 31- June 2, 2017.
Gary Brown (Movidius, Intel): Deep Learning in AR: the 3 Year Horizon
Deep learning techniques are gaining in popularity in many facets of embedded vision, and this holds true for AR and VR. Will they soon dominate every facet of vision processing? This talk explores this question by examining the theory and practice of applying deep learning to real world problems for Augmented Reality, with real examples describing how this shift is happening today quickly in some areas, and slower in others.
http://AugmentedWorldExpo.com
Preparing the Data Center for the Internet of ThingsIntel IoT
Intel’s Mark Skarpness provides an overview of the Internet of Things and discusses how the data center is essential for the IoT.
For more information go to www.intel.com/iot
Como criar um mundo autônomo e conectado - Jomar SilvaiMasters
Jomar Silva - Technical Evangelist, Intel
A evolução das tecnologias de hardware, software e comunicação nos últimos anos permite projetar um novo mundo digital, autônomo e conectado.
A Internet das Coisas quando utilizada em conjunto com Inteligência Artificial propiciam um novo patamar de aplicações autônomas e conectadas, que serão a base para a criação deste novo mundo digital.
O grande desafio neste novo cenário é o imenso volume de dados que precisa ser capturado e processado em tempo real para permitir o desenvolvimento de soluções como carros autônomos e sistemas automáticos de segurança baseado em monitoramento por vídeo.
Na palestra iremos abordar estes desafios técnicos, Internet das Coisas, Inteligência Artificial, Visão Computacional, arquiteturas base para o desenvolvimento de soluções autônomas end-to-end e sobre tecnologias e produtos de hardware e software da Intel que podem te ajudar a enfrentar estes desafios de forma otimizada.
Serão abordados diversos projetos de software Open Source, bem como repositórios de soluções de código aberto que poderão ser utilizados para acelerar o aprendizado do desenvolvedor neste novo mundo digital, autônomo e conectado.
Apresentado no InterCon 2018 - https://eventos.imasters.com.br/intercon
APIs have become ubiquitous and they have profoundly changed the way we connect to the world. They have opened the doors to enterprise back-end infrastructure and made it possible for developers to build innovative mobile applications. But this IT revolution comes with its share of challenges. “If we build it they will come” is no longer an effective API launch strategy. AnyPresence and WIP Factory are joining forces to share valuable best practices on improving API adoption.
Bring Intelligence to the Edge with Intel® Movidius™ Neural Compute StickDESMOND YUEN
Motiviation to move intelligence to the edge
Edge compute use cases
Barriers to moving intelligence to the edge
Deep learning algorithms – can they run on an edge device?
Movidius Neural Compute Stick (arch,usage, etc)
How to Test Security and Vulnerability of Your Android and iOS AppsBitbar
Watch a live presentation at http://offer.bitbar.com/how-to-test-security-and-vulnerability-of-your-android-and-ios-apps
Majority of today’s mobile apps consist of third-party code/libraries. This is a prudent and well-accepted development practice that offloads the task of developing code for non-core functions of your mobile app – or game. Identifying third-party code, its vulnerabilities and its license restrictions, is highly critical in order to understand your security exposure and your liability.
Stay tuned and join our upcoming webinars at http://bitbar.com/testing/webinars/
Intel Microsoft Webinar HTML5: AppUp Presenttaionsoussislim
Le centre Intel AppUp(sm) supporte maintenant le langage HTML5. Ce Webinar animé par des experts Intel et Microsoft vous permettra de vous plonger dans le langage et de redécouvrir ses fondamentaux mais de connaître aussi toutes les spécificités d’AppUp(sm) : Le partage de revenu, le déploiement sur les teminaux etc…
Webinar réalisé le 12 Décembre 2011 avec:
- Slim Soussi, Intel
- Vladimir Kostarev, Intel
- David Catuhe, Microsoft
- David Rousset, Microsoft
AI for All: Biology is eating the world & AI is eating Biology Intel® Software
Advances in cell biology and creation of an immense amount of data are converging with advances in Machine learning to analyze this data. Biology is experiencing its AI moment and driving the massive computation involved in understanding biological mechanisms and driving interventions. Learn about how cutting edge technologies such as Software Guard Extensions (SGX) in the latest Intel Xeon Processors and Open Federated Learning (OpenFL), an open framework for federated learning developed by Intel, are helping advance AI in gene therapy, drug design, disease identification and more.
Python Data Science and Machine Learning at Scale with Intel and AnacondaIntel® Software
Python is the number 1 language for data scientists, and Anaconda is the most popular python platform. Intel and Anaconda have partnered to bring scalability and near-native performance to Python with simple installations. Learn how data scientists can now access oneAPI-optimized Python packages such as NumPy, Scikit-Learn, Modin, Pandas, and XGBoost directly from the Anaconda repository through simple installation and minimal code changes.
Streamline End-to-End AI Pipelines with Intel, Databricks, and OmniSciIntel® Software
Preprocess, visualize, and Build AI Faster at-Scale on Intel Architecture. Develop end-to-end AI pipelines for inferencing including data ingestion, preprocessing, and model inferencing with tabular, NLP, RecSys, video and image using Intel oneAPI AI Analytics Toolkit and other optimized libraries. Build at-scale performant pipelines with Databricks and end-to-end Xeon optimizations. Learn how to visualize with the OmniSci Immerse Platform and experience a live demonstration of the Intel Distribution of Modin and OmniSci.
AI for good: Scaling AI in science, healthcare, and more.Intel® Software
How do we scale AI to its full potential to enrich the lives of everyone on earth? Learn about AI hardware and software acceleration and how Intel AI technologies are being used to solve critical problems in high energy physics, cancer research, financial inclusion, and more. Get started on your AI Developer Journey @ software.intel.com/ai
Software AI Accelerators: The Next Frontier | Software for AI Optimization Su...Intel® Software
Software AI Accelerators deliver orders of magnitude performance gain for AI across deep learning, classical machine learning, and graph analytics and are key to enabling AI Everywhere. Get started on your AI Developer Journey @ software.intel.com/ai.
Advanced Techniques to Accelerate Model Tuning | Software for AI Optimization...Intel® Software
Learn about the algorithms and associated implementations that power SigOpt, a platform for efficiently conducting model development and hyperparameter optimization. Get started on your AI Developer Journey @ software.intel.com/ai.
Reducing Deep Learning Integration Costs and Maximizing Compute Efficiency| S...Intel® Software
oneDNN Graph API extends oneDNN with a graph interface which reduces deep learning integration costs and maximizes compute efficiency across a variety of AI hardware including AI accelerators. Get started on your AI Developer Journey @ software.intel.com/ai.
AWS & Intel Webinar Series - Accelerating AI ResearchIntel® Software
Scale your research workloads faster with Intel on AWS. Learn how the performance and productivity of Intel Hardware and Software help bridge the gap between ideation and results in Data Science. Get started on your AI Developer Journey @ software.intel.com/ai.
Whether you are an AI, HPC, IoT, Graphics, Networking or Media developer, visit the Intel Developer Zone today to access the latest software products, resources, training, and support. Test-drive the latest Intel hardware and software products on DevCloud, our online development sandbox, and use DevMesh, our online collaboration portal, to meet and work with other innovators and product leaders. Get started by joining the Intel Developer Community @ software.intel.com.
Advanced Single Instruction Multiple Data (SIMD) Programming with Intel® Impl...Intel® Software
Explore practical elements, such as performance profiling, debugging, and porting advice. Get an overview of advanced programming topics, like common design patterns, SIMD lane interoperability, data conversions, and more.
Build a Deep Learning Video Analytics Framework | SIGGRAPH 2019 Technical Ses...Intel® Software
Explore how to build a unified framework based on FFmpeg and GStreamer to enable video analytics on all Intel® hardware, including CPUs, GPUs, VPUs, FPGAs, and in-circuit emulators.
Review state-of-the-art techniques that use neural networks to synthesize motion, such as mode-adaptive neural network and phase-functioned neural networks. See how next-generation CPUs with reinforcement learning can offer better performance.
RenderMan*: The Role of Open Shading Language (OSL) with Intel® Advanced Vect...Intel® Software
This talk focuses on the newest release in RenderMan* 22.5 and its adoption at Pixar Animation Studios* for rendering future movies. With native support for Intel® Advanced Vector Extensions, Intel® Advanced Vector Extensions 2, and Intel® Advanced Vector Extensions 512, it includes enhanced library features, debugging support, and an extensive test framework.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
4. 4
Evolution of Mobile Photography: The Yo-Yo Effect
Simple. Lo-Fi.
Hardware Differentiation
Software
Differentiation
App Explosion
App Saturation
HardwareExplosion
5. 5
Winning the User Engagement Battle
High Engagement
Low Engagement
Low Reach
High Reach
Source: Comscore, Multi-platform app measurement & segmentation, Jun 2014
Social
Multimedia
Services
Gaming
News & Lifestyle
Business
Facebook*
Instagram*
Candy Crush*
Google* Hangouts
Mint
Scan Me
Line
Gaming
HoldemPro Poker
Struggling
Emerging
Star
Waning
6. 6
Hyper-Competition Driving Usage Innovation
2D Camera/ Flat Images
3D Camera/ Depth Images
Uni-Modal
Multi-Modal
How Can we Drive Breakthrough Innovation in a Saturated Market?
Camera Effects & Filters
Look Away to Pause
Picture Narration
OCR
Gesture Nav.
Dual Camera Video Calling
Image Refocus
Auto Layering
8. 8
Breakthrough Usages: The 3 W’s
Who is the target?
What is the pain point?
What is the solution?
?
Define your persona
Develop a Point-of-View
Prototype & Test
9. 9
Who is the Target: Defining Your Persona
User interviews
Surveys
Tribal Knowledge/ Experts
Industry Analysis
Secondary/ Tertiary Research
10. 10
What is the Pain Point: Defining the Problem
User Empathy
Challenges
Desires
Aspirations
Surprising Insight
User
Point-of-View
11. 11
What is the Solution: Prototyping & User Testing
13. 13
Dual Camera Imaging Use Cases
Video Narration
‘Instant’ 360oPanoramaHands-Free Focus
Light Meter
“Adds a compelling, personal touch to shared media”
“…overriding camera auto-focus is frustrating”… “a common need”
“…love to have camera analyze lighting for more accurate light readings”
“…able to quickly and easily capture a panorama is very compelling”
Source: User interviews conducted by Intel Corp., Q4’13
14. 14
Depth Enhanced Use Cases: Gaming
Lean to Look
Game Props
Game Element Interaction
Remote/ Shared Gaming
“…adds an immersive element into the game”
“…to see and interact with the other person is fantastic”
“…great for open-ended actions like examining an object”
“…makes for more realistic game- play”
Source: User interviews conducted by Intel Corp., Q1’14
15. 15
Depth Enhanced Use Cases: 3D Capture
Upper Torso Scanning
Face Scanning
Object Scanning
“…great for 3D printing or simply preserving a memory”
“…capturing in 3D will help buyers feel confident when buying” (e-commerce participant)
“…love the idea of an interactive, more immersive experience thru avatars ”
Source: User interviews conducted by Intel Corp., Q1’14
16. 16
Depth Enhanced Use Cases: Learning & Edutainment
Immersive Content Creation
Shared Media Consumption
Immersive Music Creation
Augmented Reflective Play
“…like to customize the experience and change backgrounds and avatars”
“…really cool to have real and virtual objects interact together”
“…It’s like interacting with your music”
“… watching a move ‘face-to-face’ virtually is fun”
Source: User interviews conducted by Intel Corp., Q1’14
17. 17
Depth Enhanced Use Cases
Air Drawing
Accessories Fitting
Body Scanning
Learn Sign Language
“…unique tool for adding a bit of creative spark to a video conference”
“…having the feedback is what would make it work”
“…It’s almost like having a tailor for you”
“…you could try hundreds of pairs of glasses sitting at home”
Source: User interviews conducted by Intel Corp., Q2’14
18. 18
Putting Use Cases to Work
Ideation
Focus Group Testing
Quant Survey (Optional)
App Development
MW/ Library/ Core
App Field Testing
Partner Show & Tell
Partner Disclosures & Engagement
App Update
2 Weeks
2 Weeks
3 Weeks
3 Weeks
2 Weeks
2 Weeks
User test results data
Usages defined
Survey data
Partner disclosures, feedback and requirements
User test results data
Gold app release
Libraries, source code, developer documentation, demos
Library/ MW, API documentation
Art/ UX assets, source code, developer documentation, RC app
Top Usages
User Empathy
20. 20
Summary and Call to Action
•The Yo-yo effect dictates that hardware and software alternately lead and follow each other
•Imaging hardware is at the cusp of an explosion right now
•Break-thru usages is about –
•Knowing who your customer is
•Understanding their pain points
•Rapidly iterating thru possible solutions
•Talk to your Intel Sales representative/ scale account manager if you want next level access to Proof of Concepts
21. 21
Participate for Chance to Win!!
Innovation and fun go hand in hand.
Get your RFID/USB wristband and details at the Software & Services Pavilion in the Technology Showcase or at one of our mobile carts outside MosconeWest.
Once you register, you’re connected to:
•Software and services content
•Tracking earned coins for the “Surf the Code” game and other prizes
•Your own 3D avatar with 10 coins... Play the game, share with friends
Visit the Software & Services Pavilion to earn more coins
•Talk with Intel experts about your development needs and plans
•Tinker on your own time with self-run labs, source code, tools
•Swipe your wristband on the Galileo Scan Stations to get coins
Play to Win in the Software & Services Pavilion
•Get 5 coins to play “Surf the Code”... Gift cards for three highest scores!
•Get 10 coins to get your 3D avatar... And enter daily drawing for tablets and 2-in-1s
•Get 15 coins for your King Code t-shirt, and increase total game score potential
Don’t let the fun stop!
Daily lunch at food trucks
Developer Networking Party, Sept 9, 7:30-11:30pm. Meet and Greet, Sept 10, 4-7:30pm.
22. 22
Additional Sources of Information
•A PDF of this presentation is available from our Technical Session Catalog: www.intel.com/idfsessionsSF. This URL is also printed on the top of Session Agenda Pages in the Pocket Guide.
•More web based info: http://www.intel.com/RealSense
24. 24
Risk Factors
The above statements and any others in this document that refer to plans and expectations for the second quarter, the year and the future are forward- looking statements that involve a number of risks and uncertainties. Words such as “anticipates,” “expects,” “intends,” “plans,”“believes,” “seeks,” “estimates,” “may,” “will,” “should” and their variations identify forward-looking statements. Statements that refer to or are based on projections, uncertain events or assumptions also identify forward-looking statements. Many factors could affect Intel’s actual results, and variances from Intel’s current expectations regarding such factors could cause actual results to differ materially from those expressed in these forward-looking statements. Intel presently considers the following to be important factors that could cause actual results to differ materially from thecompany’s expectations. Demand for Intel's products is highly variable and, in recent years, Intel has experienced declining orders in the traditional PC market segment. Demand could be different from Intel's expectations due to factors including changes in business and economic conditions; consumer confidence or income levels; customer acceptance of Intel’s and competitors’ products; competitive and pricing pressures, including actionstaken by competitors; supply constraints and other disruptions affecting customers; changes in customer order patterns including order cancellations; and changes in the level of inventory at customers. Intel operates in highly competitive industries and its operations have high costs that are either fixed or difficult to reduce in the short term. Intel's gross margin percentage could vary significantly from expectations based on capacity utilization; variations in inventory valuation, including variations related to the timing of qualifying products for sale; changes in revenue levels; segment product mix; the timing and execution of the manufacturing ramp and associated costs; excess or obsolete inventory; changes in unit costs; defects or disruptions in the supply of materials or resources; and product manufacturing quality/yields. Variations in gross margin may also be caused by the timing of Intel product introductions and related expenses, including marketing expenses, and Intel's ability to respond quickly to technological developments and to introduce new products or incorporate new features into existing products, which may result in restructuring and asset impairment charges. Intel's results could be affected by adverse economic, social, political and physical/infrastructure conditions in countries where Intel, its customers or its suppliers operate, including military conflict and other security risks, natural disasters, infrastructure disruptions, health concerns and fluctuations in currency exchange rates. Intel’s results could be affected by the timing of closing of acquisitions, divestitures and other significant transactions. Intel's results could be affected by adverse effects associated with product defects and errata (deviations from published specifications), and by litigation or regulatory matters involving intellectual property, stockholder, consumer, antitrust, disclosure and other issues, such as the litigation and regulatory matters described in Intel's SEC filings. An unfavorable ruling could include monetary damages or an injunction prohibiting Intel from manufacturing or selling one or more products, precluding particular business practices, impacting Intel’s ability to design its products, or requiring other remedies such as compulsory licensing of intellectual property. A detailed discussion of these and other factors that could affect Intel’s results is included in Intel’s SEC filings, including the company’s most recent reports on Form 10-Q, Form 10-K and earnings release.
Rev. 4/15/14