A presentation that I gave to Stockholm School of Entrepreneurship about the status and my perspective of what the future of technology (related to mobile and consumer electronics) might be
Elektrisch laden the Good, the Bad & the Ugly op Ahtlon mobilitycongresVincent Everts
1. The document discusses electric vehicle mobility and trends in electric vehicles such as increasing numbers of charging stations and new models of electric cars.
2. Issues discussed include challenges with battery technology and costs, and the future of oil.
3. New electric vehicles are announced from automakers like BMW, Renault, Mitsubishi and Volkswagen showing increasing investment in electric vehicles.
This presentation was delivered to a class at Stockholm's University for business adminstration during a day where Chindia was covered. I gave my perspective of working in China for almost 15 years.
This document discusses responsive web design and how to adapt websites to different screen sizes and devices. It covers topics like using responsive design techniques like flexible layouts and media queries to automatically adjust website content depending on screen size or orientation. It also discusses how both client-side and server-side detection of device capabilities can be used to optimize content delivery for different devices and their constraints.
MobileMonday is a global grassroots network that brings together local, national, and international innovators in the wireless and mobile industry to facilitate networking, cooperation, partnership, and business development. The document describes MobileMonday events, which are held monthly in cities around the world and focus on industry trends, innovation, and entrepreneurship. It provides details on the format, objectives, and community tools used by MobileMonday to connect members.
The document discusses the rise of responsive design and mobile devices. It notes that with dozens of phone models and screen sizes, designing separate mobile and desktop sites is impractical. Responsive design, which uses fluid grids and media queries to adapt a single website across devices, is presented as a better solution. The document outlines the benefits of responsive design, such as reaching all users and reducing development costs, while also addressing challenges like optimization and accessing all device features. It predicts continued improvements in responsive frameworks, tools, and new technologies that will push responsive design forward.
The document discusses the concept of emergence through examples like flocking behavior in birds, protein folding, and multi-agent systems like the Color Economy. Emergence is described as occurring in complex systems with many mobile parts that interact in a changing environment, often at the edge of order and chaos. Creativity and collaboration are also discussed as emergent phenomena that require many mobile and interacting ideas or people.
This document discusses OpenID and how it can help create a more open web with user-centric identity and authorization. It argues that OpenID allows people to use a single digital identity to access any website rather than having separate usernames and passwords for each one. The document also talks about Drupal's support for OpenID and calls for volunteers to help integrate OpenID and OAuth into Drupal to improve user experience and build a more connected online community.
Elektrisch laden the Good, the Bad & the Ugly op Ahtlon mobilitycongresVincent Everts
1. The document discusses electric vehicle mobility and trends in electric vehicles such as increasing numbers of charging stations and new models of electric cars.
2. Issues discussed include challenges with battery technology and costs, and the future of oil.
3. New electric vehicles are announced from automakers like BMW, Renault, Mitsubishi and Volkswagen showing increasing investment in electric vehicles.
This presentation was delivered to a class at Stockholm's University for business adminstration during a day where Chindia was covered. I gave my perspective of working in China for almost 15 years.
This document discusses responsive web design and how to adapt websites to different screen sizes and devices. It covers topics like using responsive design techniques like flexible layouts and media queries to automatically adjust website content depending on screen size or orientation. It also discusses how both client-side and server-side detection of device capabilities can be used to optimize content delivery for different devices and their constraints.
MobileMonday is a global grassroots network that brings together local, national, and international innovators in the wireless and mobile industry to facilitate networking, cooperation, partnership, and business development. The document describes MobileMonday events, which are held monthly in cities around the world and focus on industry trends, innovation, and entrepreneurship. It provides details on the format, objectives, and community tools used by MobileMonday to connect members.
The document discusses the rise of responsive design and mobile devices. It notes that with dozens of phone models and screen sizes, designing separate mobile and desktop sites is impractical. Responsive design, which uses fluid grids and media queries to adapt a single website across devices, is presented as a better solution. The document outlines the benefits of responsive design, such as reaching all users and reducing development costs, while also addressing challenges like optimization and accessing all device features. It predicts continued improvements in responsive frameworks, tools, and new technologies that will push responsive design forward.
The document discusses the concept of emergence through examples like flocking behavior in birds, protein folding, and multi-agent systems like the Color Economy. Emergence is described as occurring in complex systems with many mobile parts that interact in a changing environment, often at the edge of order and chaos. Creativity and collaboration are also discussed as emergent phenomena that require many mobile and interacting ideas or people.
This document discusses OpenID and how it can help create a more open web with user-centric identity and authorization. It argues that OpenID allows people to use a single digital identity to access any website rather than having separate usernames and passwords for each one. The document also talks about Drupal's support for OpenID and calls for volunteers to help integrate OpenID and OAuth into Drupal to improve user experience and build a more connected online community.
Chad Udell - Developers are from Mars, Designers are from Venus360|Conferences
Where’s the love? Well, often when two coworkers from very different backgrounds are expected to work together, it can be tough to find. Designers and developers can indeed get along with a little foresight on process and understanding of the obstacles along the project’s path. Join Chad Udell in discovering some of those key differences and learn how to overcome them in order to create a blissful state of collaboration
This tutorial was prepared for our Social Media Connections Specialist, Cristina Horta, who was then handling Second Life as part of our "connect" accounts. Rinita Sen will build our ADMSP at Second Life very soon. Stay tuned!
You can find Rinita at:
www.linkingpublic.org
To learn about our community project, join us at www.admsp.org
Visit us at: www.altosdelmarsculpturepark.com
The document appears to be a presentation about collaboration and data given by Richard Wallis, a technology evangelist at Talis. The presentation discusses topics like the technology adoption curve, cloud computing, linked open data, and Talis's data platform which provides storage, querying interfaces and cloud hosting of data. It encourages collaborative sharing and linking of data.
Workshop de Desarrollo con Cascades Blackberry Dev Meeting SantiagoCarlos Solis
Carlos Solis is introducing himself as a Blackberry Elite Developer, Adobe Community Professional, and author of the book "Manual del guerrero movil: PhoneGap". He then provides links to tutorial videos and code for a Blackberry Cascades workshop covering configuring the development environment, creating pages in Cascades, navigation, forms, animation, and controls.
The document discusses Amazon Web Services (AWS) and provides an overview of the various services it offers for running applications and infrastructure in the cloud. It describes services like EC2 for virtual servers, S3 for cloud storage, Route 53 for DNS, load balancing, and SQS for message queuing. It also provides pricing information and links for getting started with AWS. The document is meant as an introduction and recommends further study of more advanced AWS services and resources.
This document is a slideshow from a workshop on social media and feeling socially awkward. The workshop covers establishing a social media landscape, categorizing different types of social media like communities, publishing and reviews. Case studies are presented on how the Obama presidential campaign effectively used social networking sites like Facebook, YouTube, and Twitter to engage supporters. Examples are also given of successful viral marketing campaigns by companies like Travelistic and Blendtec that leveraged social media. The workshop aims to help participants understand social media and how to use it effectively for their brand.
Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...Amazon Web Services
"In March 2012, Japan’s leading mobile operator, NTT DOCOMO, introduced Shabette Concier, an advanced voice-activated personal agent service that enables customers to intuitively and directly operate services and smartphone features with voice commands. Millions of DOCOMO's subscribers are now using this service.
This session explains Shabette Concier's distributed speech recognition architecture, and dialogue-understanding system design, with machine learning technologies and large-scale database systems. Learn why DOCOMO chose the AWS cloud and how DOCOMO engineers overcame all the difficulties from CEO-imposed time constraints, unexpectedly rapid service growth, usage spikes driven by marketing campaigns, and internal resistance to the use of cloud services. The session concludes with lessons learned from a telco's large-scale service development of a mobile app with the AWS cloud."
This is a presentation I did, but never got to deliver. The audience was a group of credit managers and I think they were all running for cover causing the event organizer to cancel the event. Now, I provide it free to you.
ThoughtWorks Quarterly Technology Briefing June 2013, BerlinThoughtworks
The document is a summary of a quarterly technology briefing from June 2013 focused on mobile. It includes presentations on thriving in a future with shattered screens, a day in the life of product design, and a mobile view of the tech radar. The presentations discuss topics like responsive design, HTML5 storage, SMS/USSD as interfaces, CSS frameworks, and JavaScript mobile development.
The document appears to be a presentation about how Sheffield Hallam University implemented new discovery systems and changed how they teach information literacy. It discusses moving from older OPAC systems that librarians knew how to use to more intuitive systems like Summon. It also talks about gathering student feedback to understand how people use the new systems and shifting instruction from teaching databases to teaching search strategies.
Building Scalable, Resilient Infrastructure on CloudStack by Sebastian Stadilbuildacloud
The document discusses how intentionally crashing systems or applications can make them more resilient. It draws an analogy to how car manufacturers crash test cars to improve safety. The document suggests that tools like monitoring, auto-scaling, auto-healing, and collaboration help applications withstand crashes like increased traffic, failures, and security issues, just as crash tests and safety features help improve vehicles. These tools are provided by companies like Scalr to design, manage, and govern resilient infrastructure and applications.
The document appears to be a slide deck presentation covering various topics related to emerging technologies and business, including electric vehicles, cloud computing, mobile applications, social media, location-based services, augmented reality, online video, internet-connected TVs, and the impact of these technologies on consumer behavior and business models. Several specific companies and products are mentioned like Google Glass, Lytro camera, and location-based social networks.
This presentation covers advances in mobile computing and shows how this can be used in medical practice to improve patient care. The latter part of the presentation covers the apps I use professionally to enhance my medical practice
This document discusses the security features of TrueCrypt, including enterprise-level security with fingerprint scanning and hardware encryption using 256-bit AES encryption. It notes that TrueCrypt provides cross-platform compatibility, allows creation of a virtual encrypted disk to encrypt an entire partition with automatic and transparent encryption using AES-256, Serpent, and Twofish algorithms. It promotes TrueCrypt and invites questions.
The document discusses how technology and online resources are enabling a shift from scarcity to abundance in learning. It argues that we are moving away from problems of limited access to information, and towards issues of having too much choice and how to personalize learning for individuals. The key point presented is that through technologies like metadata and social relationships online, it will be possible to create a "Snowflake Effect" where learning can be uniquely tailored to each person's interests and needs.
Social Media And Rural Internet Connectivity Projects At ConkersProjects Webmedia
A slideshow (without soundtrack) about a tweetup organized in the heart of the national forest. the first eco and sustainability tweetup at conkers.
http://me.dm/link/rural - for the quicktime version with no audio. overdubbed audio version coming soon.
The document discusses designing experiences that span multiple platforms or targets. It begins by defining multi-targeted experiences as ones that run across multiple platforms in a context-appropriate way. Examples are then provided of experiences that utilize hub, curated, cloned, and distributed designs to tie platforms together. The document stresses the importance of designing deliverables like elevator pitches and experience maps to holistically represent multi-platform experiences from the user's perspective.
Morgenbooster / Responsive Design 2.0 - Mobile Revolution / 9. oktober 20131508 A/S
This document discusses the evolution of responsive design and the mobile revolution. It covers how the quantity and diversity of connected devices and users is exploding. It highlights how mobile devices are becoming the primary way people access the internet and notes that 90% of users shift between devices. It also discusses challenges with responsive design like explaining it to clients, lack of static design phase, navigation, images, and tables. The document advocates for a mobile-first and content-first approach and emphasizes the importance of user experience across different devices and browsers.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Chad Udell - Developers are from Mars, Designers are from Venus360|Conferences
Where’s the love? Well, often when two coworkers from very different backgrounds are expected to work together, it can be tough to find. Designers and developers can indeed get along with a little foresight on process and understanding of the obstacles along the project’s path. Join Chad Udell in discovering some of those key differences and learn how to overcome them in order to create a blissful state of collaboration
This tutorial was prepared for our Social Media Connections Specialist, Cristina Horta, who was then handling Second Life as part of our "connect" accounts. Rinita Sen will build our ADMSP at Second Life very soon. Stay tuned!
You can find Rinita at:
www.linkingpublic.org
To learn about our community project, join us at www.admsp.org
Visit us at: www.altosdelmarsculpturepark.com
The document appears to be a presentation about collaboration and data given by Richard Wallis, a technology evangelist at Talis. The presentation discusses topics like the technology adoption curve, cloud computing, linked open data, and Talis's data platform which provides storage, querying interfaces and cloud hosting of data. It encourages collaborative sharing and linking of data.
Workshop de Desarrollo con Cascades Blackberry Dev Meeting SantiagoCarlos Solis
Carlos Solis is introducing himself as a Blackberry Elite Developer, Adobe Community Professional, and author of the book "Manual del guerrero movil: PhoneGap". He then provides links to tutorial videos and code for a Blackberry Cascades workshop covering configuring the development environment, creating pages in Cascades, navigation, forms, animation, and controls.
The document discusses Amazon Web Services (AWS) and provides an overview of the various services it offers for running applications and infrastructure in the cloud. It describes services like EC2 for virtual servers, S3 for cloud storage, Route 53 for DNS, load balancing, and SQS for message queuing. It also provides pricing information and links for getting started with AWS. The document is meant as an introduction and recommends further study of more advanced AWS services and resources.
This document is a slideshow from a workshop on social media and feeling socially awkward. The workshop covers establishing a social media landscape, categorizing different types of social media like communities, publishing and reviews. Case studies are presented on how the Obama presidential campaign effectively used social networking sites like Facebook, YouTube, and Twitter to engage supporters. Examples are also given of successful viral marketing campaigns by companies like Travelistic and Blendtec that leveraged social media. The workshop aims to help participants understand social media and how to use it effectively for their brand.
Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...Amazon Web Services
"In March 2012, Japan’s leading mobile operator, NTT DOCOMO, introduced Shabette Concier, an advanced voice-activated personal agent service that enables customers to intuitively and directly operate services and smartphone features with voice commands. Millions of DOCOMO's subscribers are now using this service.
This session explains Shabette Concier's distributed speech recognition architecture, and dialogue-understanding system design, with machine learning technologies and large-scale database systems. Learn why DOCOMO chose the AWS cloud and how DOCOMO engineers overcame all the difficulties from CEO-imposed time constraints, unexpectedly rapid service growth, usage spikes driven by marketing campaigns, and internal resistance to the use of cloud services. The session concludes with lessons learned from a telco's large-scale service development of a mobile app with the AWS cloud."
This is a presentation I did, but never got to deliver. The audience was a group of credit managers and I think they were all running for cover causing the event organizer to cancel the event. Now, I provide it free to you.
ThoughtWorks Quarterly Technology Briefing June 2013, BerlinThoughtworks
The document is a summary of a quarterly technology briefing from June 2013 focused on mobile. It includes presentations on thriving in a future with shattered screens, a day in the life of product design, and a mobile view of the tech radar. The presentations discuss topics like responsive design, HTML5 storage, SMS/USSD as interfaces, CSS frameworks, and JavaScript mobile development.
The document appears to be a presentation about how Sheffield Hallam University implemented new discovery systems and changed how they teach information literacy. It discusses moving from older OPAC systems that librarians knew how to use to more intuitive systems like Summon. It also talks about gathering student feedback to understand how people use the new systems and shifting instruction from teaching databases to teaching search strategies.
Building Scalable, Resilient Infrastructure on CloudStack by Sebastian Stadilbuildacloud
The document discusses how intentionally crashing systems or applications can make them more resilient. It draws an analogy to how car manufacturers crash test cars to improve safety. The document suggests that tools like monitoring, auto-scaling, auto-healing, and collaboration help applications withstand crashes like increased traffic, failures, and security issues, just as crash tests and safety features help improve vehicles. These tools are provided by companies like Scalr to design, manage, and govern resilient infrastructure and applications.
The document appears to be a slide deck presentation covering various topics related to emerging technologies and business, including electric vehicles, cloud computing, mobile applications, social media, location-based services, augmented reality, online video, internet-connected TVs, and the impact of these technologies on consumer behavior and business models. Several specific companies and products are mentioned like Google Glass, Lytro camera, and location-based social networks.
This presentation covers advances in mobile computing and shows how this can be used in medical practice to improve patient care. The latter part of the presentation covers the apps I use professionally to enhance my medical practice
This document discusses the security features of TrueCrypt, including enterprise-level security with fingerprint scanning and hardware encryption using 256-bit AES encryption. It notes that TrueCrypt provides cross-platform compatibility, allows creation of a virtual encrypted disk to encrypt an entire partition with automatic and transparent encryption using AES-256, Serpent, and Twofish algorithms. It promotes TrueCrypt and invites questions.
The document discusses how technology and online resources are enabling a shift from scarcity to abundance in learning. It argues that we are moving away from problems of limited access to information, and towards issues of having too much choice and how to personalize learning for individuals. The key point presented is that through technologies like metadata and social relationships online, it will be possible to create a "Snowflake Effect" where learning can be uniquely tailored to each person's interests and needs.
Social Media And Rural Internet Connectivity Projects At ConkersProjects Webmedia
A slideshow (without soundtrack) about a tweetup organized in the heart of the national forest. the first eco and sustainability tweetup at conkers.
http://me.dm/link/rural - for the quicktime version with no audio. overdubbed audio version coming soon.
The document discusses designing experiences that span multiple platforms or targets. It begins by defining multi-targeted experiences as ones that run across multiple platforms in a context-appropriate way. Examples are then provided of experiences that utilize hub, curated, cloned, and distributed designs to tie platforms together. The document stresses the importance of designing deliverables like elevator pitches and experience maps to holistically represent multi-platform experiences from the user's perspective.
Morgenbooster / Responsive Design 2.0 - Mobile Revolution / 9. oktober 20131508 A/S
This document discusses the evolution of responsive design and the mobile revolution. It covers how the quantity and diversity of connected devices and users is exploding. It highlights how mobile devices are becoming the primary way people access the internet and notes that 90% of users shift between devices. It also discusses challenges with responsive design like explaining it to clients, lack of static design phase, navigation, images, and tables. The document advocates for a mobile-first and content-first approach and emphasizes the importance of user experience across different devices and browsers.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.