Quantitative + Qualitative = User Behavior Analytics
Introducing REAL User Behavior Analytics to your product team to better understand what and how users use your online/mobile applications.
7 Key Principles Designing for VUI/CUI
1. Onboarding the user & help them get started
2. Keep conversation exchanges brief to reduce cognitive load.
3. Examples work better than instructions.
4. Delight without interfering with the tasks.
5. Use explicit confirmation for important actions, & implicit for less risky.
6. Design for failure.
7. Respect the user's privacy and security.
What is Voice?
Why you should consider adding voice?
Voice: Pros vs Cons
Introducing Voice into your SDLC / PDLC
5 Steps to Designing for Voice Before Coding
7 Principles for Designing for Voice
Real Life Conditions
Voice AI Persona, Personality, Tone and Character
Resources, Tools, and More
@igotux
The Rise of Voice Invoca Report: Nov 2017Isidore Gotto
Voice assistants are becoming more widely used, changing how consumers learn about brands through voice search and interact with brands through voice apps. As voice technology improves, it is enabling new forms of customer acquisition, engagement, and support. Marketers must understand how voice interactions can enhance customer relationships and build voice experiences that connect to their digital strategies.
User Testing Webinar: Mobile Banking Industry Insights 02.21.2018Isidore Gotto
This document summarizes the findings of a study comparing the mobile banking experiences of Bank of America, Chase, and Wells Fargo. Key findings include:
1. Transferring money between accounts was the easiest task for all banks. Setting fraud alerts had the lowest ratings.
2. Bank of America had the top-rated overall experience and consistency. Finding statements was difficult in the Wells Fargo app.
3. All banks can improve navigation and labeling to make features easier to find. Meeting expectations is not enough - apps must delight users.
The document discusses predictions for 2018. Some key points:
1. Customer experience initiatives will plateau or decline for most companies, with 30% seeing further quality declines costing them a point of growth.
2. 20% of CEOs will fail to act on digital transformation, putting their firms at risk.
3. Talent shortages will widen the divide between digital leaders and laggards, with laggards paying up to 20% more to attract scarce skills.
4. Intelligent agents will directly influence 10% of purchase decisions as they gain a richer understanding of individual preferences and behaviors.
7 Key Principles Designing for VUI/CUI
1. Onboarding the user & help them get started
2. Keep conversation exchanges brief to reduce cognitive load.
3. Examples work better than instructions.
4. Delight without interfering with the tasks.
5. Use explicit confirmation for important actions, & implicit for less risky.
6. Design for failure.
7. Respect the user's privacy and security.
What is Voice?
Why you should consider adding voice?
Voice: Pros vs Cons
Introducing Voice into your SDLC / PDLC
5 Steps to Designing for Voice Before Coding
7 Principles for Designing for Voice
Real Life Conditions
Voice AI Persona, Personality, Tone and Character
Resources, Tools, and More
@igotux
The Rise of Voice Invoca Report: Nov 2017Isidore Gotto
Voice assistants are becoming more widely used, changing how consumers learn about brands through voice search and interact with brands through voice apps. As voice technology improves, it is enabling new forms of customer acquisition, engagement, and support. Marketers must understand how voice interactions can enhance customer relationships and build voice experiences that connect to their digital strategies.
User Testing Webinar: Mobile Banking Industry Insights 02.21.2018Isidore Gotto
This document summarizes the findings of a study comparing the mobile banking experiences of Bank of America, Chase, and Wells Fargo. Key findings include:
1. Transferring money between accounts was the easiest task for all banks. Setting fraud alerts had the lowest ratings.
2. Bank of America had the top-rated overall experience and consistency. Finding statements was difficult in the Wells Fargo app.
3. All banks can improve navigation and labeling to make features easier to find. Meeting expectations is not enough - apps must delight users.
The document discusses predictions for 2018. Some key points:
1. Customer experience initiatives will plateau or decline for most companies, with 30% seeing further quality declines costing them a point of growth.
2. 20% of CEOs will fail to act on digital transformation, putting their firms at risk.
3. Talent shortages will widen the divide between digital leaders and laggards, with laggards paying up to 20% more to attract scarce skills.
4. Intelligent agents will directly influence 10% of purchase decisions as they gain a richer understanding of individual preferences and behaviors.
Answer lab best practices in research and design for voice user interfacesIsidore Gotto
The document discusses research conducted on smart speaker owners to understand usage patterns and opportunities for improvement. Some key findings include:
- Most owners are satisfied with their devices but many have experienced technical issues or frustrations.
- Third-party applications are confusing for many users and a significant portion have encountered problems.
- Brands need to ensure they deliver high-quality voice experiences or risk damaging their reputation.
- Best practices for voice application design include focusing on tasks that leverage voice strengths and reducing complexity.
The document discusses emerging technology trends and high-potential startups. It profiles several startups working in areas like neurotechnology, regenerative medicine, synthetic animal products, synthetic agriculture, AI chips, and more. These startups are developing technologies to treat chronic pain, help paralyzed patients control devices, 3D print organs, grow meat and leather without animals, improve crop yields, and more. The document also lists top investors in these game-changing companies.
Grow your business with the power of Graph Database. We take a look at how a social graph database could help legal professionals Grow their Legal Practice
User Experience Tools for the UX Professional Isidore Gotto
Being asked all the time on what tools do I use or recommend, I put together this list of common user experience tools that any UX professional should have in their toolbox.
Follow me @igotux
This document lists and provides links to numerous social media and technology events from 2011-2012. Some of the major events highlighted include the WEB 2.0 Expo, Blogwell Expo, CMX Expo, MIX conference, events from iirusa on social and web 2.0, and Internet Week NYC. The document also provides additional resources on social media marketing from MediaBistro and suggestions to subscribe to Mediapost and Microstrategy for more information. A variety of event topics are covered including social media, blogging, search marketing, user experience, and more.
Microsoft html5 web camp june 15 in nyc notesIsidore Gotto
The document summarizes the Microsoft HTML5 Web Camp that was held in NYC on June 15. It provides an overview of the topics covered, including HTML5 semantic markup, audio, video, canvas, geolocation, CSS3, SVG, ECMAScript5, and emerging standards. It also lists several references and tools that were recommended for HTML5 development.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Answer lab best practices in research and design for voice user interfacesIsidore Gotto
The document discusses research conducted on smart speaker owners to understand usage patterns and opportunities for improvement. Some key findings include:
- Most owners are satisfied with their devices but many have experienced technical issues or frustrations.
- Third-party applications are confusing for many users and a significant portion have encountered problems.
- Brands need to ensure they deliver high-quality voice experiences or risk damaging their reputation.
- Best practices for voice application design include focusing on tasks that leverage voice strengths and reducing complexity.
The document discusses emerging technology trends and high-potential startups. It profiles several startups working in areas like neurotechnology, regenerative medicine, synthetic animal products, synthetic agriculture, AI chips, and more. These startups are developing technologies to treat chronic pain, help paralyzed patients control devices, 3D print organs, grow meat and leather without animals, improve crop yields, and more. The document also lists top investors in these game-changing companies.
Grow your business with the power of Graph Database. We take a look at how a social graph database could help legal professionals Grow their Legal Practice
User Experience Tools for the UX Professional Isidore Gotto
Being asked all the time on what tools do I use or recommend, I put together this list of common user experience tools that any UX professional should have in their toolbox.
Follow me @igotux
This document lists and provides links to numerous social media and technology events from 2011-2012. Some of the major events highlighted include the WEB 2.0 Expo, Blogwell Expo, CMX Expo, MIX conference, events from iirusa on social and web 2.0, and Internet Week NYC. The document also provides additional resources on social media marketing from MediaBistro and suggestions to subscribe to Mediapost and Microstrategy for more information. A variety of event topics are covered including social media, blogging, search marketing, user experience, and more.
Microsoft html5 web camp june 15 in nyc notesIsidore Gotto
The document summarizes the Microsoft HTML5 Web Camp that was held in NYC on June 15. It provides an overview of the topics covered, including HTML5 semantic markup, audio, video, canvas, geolocation, CSS3, SVG, ECMAScript5, and emerging standards. It also lists several references and tools that were recommended for HTML5 development.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.