This document presents a new picture-embedding 2D barcode called PiCode. PiCode aims to mitigate limitations of conventional 2D barcodes by embedding a picturesque image within the barcode. It is designed to consider both the perceptual quality of the embedded image and decoding robustness. Comparisons show PiCode achieves one of the best image qualities while maintaining a good balance between quality and robustness under various conditions. The document describes the encoding and decoding algorithms used in PiCode. It concludes that PiCode provides an improved perceptual quality picture embedding compared to existing beautified QR codes while still allowing robust decoding.
Information security is important to ensure availability, confidentiality, and integrity of data. Availability means data can be accessed whenever needed. Confidentiality and integrity help protect data from unauthorized access or modification. User names and passwords are used to protect resources and prevent some hacking techniques.
This document provides an overview of a proposed system called UMFroDo (User Management of Coins with Fraud Resilient Device for Off-line micro-Payments) that aims to address weaknesses in an existing system called FRoDo. The proposed system extends FRoDo by adding coin management capabilities and addressing vulnerabilities that could allow sensitive customer data to be stolen. It describes modules for system construction, identity elements, coin elements, attack mitigation, and shopping. The goal is to create a more secure offline payment solution for micro-payments that is resilient against data breaches by leveraging coin management and a tamper-proof security architecture.
Haptics is a technology that adds the sense of touch to virtual objects. It uses sensors and actuators to allow users to feel virtual objects as if they were real. Popular haptic devices include the Phantom interface and CyberGrasp system, which provide tactile and force feedback to the user's hands. Haptics has applications in virtual reality, medical training, museums, assistive technology, entertainment, and more. Key challenges include the high cost and size of devices, as well as rendering realistic forces.
This document discusses firewalls, including their definition, history, types, and purposes. A firewall is a program or hardware device that filters network traffic between the internet and an internal network based on a set of security rules. There are different types of firewalls, including packet filtering routers, application-level gateways, and circuit-level gateways. Firewalls aim to restrict network access and protect internal systems by only allowing authorized traffic according to a security policy.
The document discusses EyePhone, a proposed technology that would allow users to control a mobile phone using only their eyes. EyePhone tracks eye movement and blinks using the front-facing camera to navigate menus, select applications, and emulate mouse clicks. It works through four phases - eye detection, open eye template creation, eye tracking through template matching, and blink detection. Potential applications include an "EyeMenu" interface and monitoring driver safety in cars. The document concludes that EyePhone shows promise as a hands-free way to control mobile devices.
This document discusses Teradata, an RDMS designed for large commercial databases. It provides a brief history of Teradata starting in 1979 and its acquisition by NCR in 1992. It also lists versions released from 2002-2012 and their new features. The advantages are its parallel processing capacity to handle large loads and queries concurrently. It has a shared nothing architecture providing high fault tolerance. Disadvantages include its lack of suitability for small transactions and higher costs. The conclusion states Teradata makes creating and dropping tables easy for data warehousing.
This document provides an overview of Selenium, including what it is, its main components, features, and how it can be used for testing web applications. Selenium is an open source tool for automating web applications that supports many programming languages and browsers. It consists of three main components - Selenium IDE for recording and playback of tests within Firefox, Selenium RC which acts as a server to launch browsers, and Selenium Grid to run tests across multiple browsers and machines in parallel. The document also discusses Selenium commands (Selenese), integrating it with languages like Java, and how it can be used for test case development, execution, and reporting.
This document discusses haptics technology, which adds the sense of touch to virtual environments. It provides an introduction to haptics and its history, describes how haptic devices create virtual environments and simulate the sense of touch, lists some common haptic devices and their applications, discusses limitations, and concludes by anticipating future advances in haptics.
Gi-Fi allows for wireless transfer of audio and video data at up to 5GB per second within an indoor environment of around 10 meters. It uses a single-chip transceiver operating on the 60GHz band with CMOS processing, providing high-speed data transfer, low power consumption, high security, and cost-effectiveness. Within five years, Gi-Fi is expected to become the dominant wireless networking technology, fully mobile and providing low-cost, high-speed broadband access for transferring large files within seconds to develop wireless homes and offices of the future.
The document provides an overview of AngularJS, including:
- AngularJS is an open-source JavaScript framework used to build single-page applications. It extends HTML with new attributes and makes the page more interactive and responsive.
- The key components of AngularJS are directives, controllers, services and filters. It follows the Model-View-Whatever pattern rather than strict MVC.
- AngularJS uses data binding between the model and view, dependency injection, and allows building reusable components. Popular websites like YouTube and Weather.com use AngularJS for their apps and websites.
Digital jewelry combines fashion and technology by embedding computer components like displays, microphones, and antennas into jewelry items like rings, bracelets, and necklaces. This allows the wearer to have important information and call functionality on discrete pieces that work together wirelessly. One prototype is the Java Ring, which has memory, a processor, and Bluetooth connectivity to unlock doors and log into computers with a snap onto a receiver. Digital jewelry could replace many daily items like ID cards and payment methods with a more integrated fashionable design.
A mobile phone jammer prevents cellular phones from receiving signals from base stations by transmitting signals on the same frequencies. They were originally developed for law enforcement and the military but are now used in places where silence is needed like classrooms, hospitals, and places of worship. A jammer works by transmitting signals that interfere with communication between phones and towers. There are different types of jamming devices that use various techniques like directly receiving and transmitting signals or acting as detectors or beacons. Jammers have applications in maintaining silence and security in various settings.
Skin put is a technology under development that uses the human body as an input surface. It works by using a microchip-sized projector and acoustic detector in an armband to detect sound vibrations from taps on the skin. These detected bio-acoustic waves can then serve as input signals to control devices without directly interacting with them. Some potential uses include helping paralyzed people communicate, controlling games and music with finger taps, and making phone calls using gestures on the arm. While this could increase accessibility, challenges include discomfort wearing the armband and currently high costs.
This document provides an overview of 5G technology, including its advantages and applications. It discusses the history of mobile network generations from 1G to 4G and defines 5G as the next generation, which will provide wireless data speeds of up to 1Gbps. 5G aims to support a highly connected "Wireless World Wide Web" and promises advantages like longer battery life, higher data rates, and greater efficiency compared to previous technologies. However, security, privacy, and high infrastructure costs remain challenges as the technology continues to be developed and tested.
This document discusses cloud storage, including what it is, how it works, the benefits for businesses, and costs for users. Cloud storage involves storing digital data across multiple servers, often in different locations, that are managed by hosting companies. Key benefits include data being available from any device, automatic updates, disaster recovery if physical assets are destroyed, and scalability without needing more physical storage space. Potential disadvantages include security concerns about handing data over externally and risks of cloud service providers temporarily losing data.
Rainbow technology enables storing up to 450 GB of data on a single sheet of paper using colored dots in geometric patterns to represent bits. It converts files into rainbow symbols according to a set of algorithms. Compared to DVDs that can only store 4.7 GB, this technique allows over 100 times more data to be stored on biodegradable paper at a fraction of the cost of plastic storage devices, helping reduce e-waste. However, data on paper is also at risk of fading over time.
This document discusses palm vein technology for biometric authentication. It begins with an introduction to palm vein scanning and then describes how the technology works by scanning the unique vein patterns in a user's palm. It registers these patterns during enrollment and then authenticates users by comparing live scans to the stored patterns. The technology provides highly accurate identification and strong security since vein patterns are difficult to forge. It has various applications like banking, computers, ID cards, and hospitals due to being contactless, hygienic, and secure.
The document discusses the Global Positioning System (GPS). It has three segments - space, control, and user. 24 satellites comprise the space segment. The control segment monitors the satellites. GPS uses triangulation of signals from multiple satellites to determine a user's precise location. It provides location and navigation services to both military and civilian users around the world.
Google Glass is an augmented reality project by Google that aims to implement wearable computing. It uses technologies like augmented reality, bone conduction, eye tap, 4G, and Android to allow hands-free displaying of information to the user via a small video display. The user can take photos/videos and get information by voice commands. While promising increased access, it may also raise privacy and safety issues.
Perl is a scripting language created by Larry Wall in 1987. It is an interpreted language useful for tasks like system administration, web development, and text processing due to its powerful string and text manipulation capabilities. Perl code does not need to be compiled and can run on many platforms including Unix, Windows, and Linux. It has scalar, list, and hash variable types and supports both procedural and object-oriented programming. Perl is an open source language with over 20,000 third-party modules available to extend its functionality. The latest version is 5.26.0 released in 2017.
The document discusses the four phases of the software development lifecycle: inception, elaboration, construction, and transition. It provides details on the objectives and essential activities of each phase. The inception phase focuses on establishing scope and demonstrating architecture. The elaboration phase builds prototypes and baselines requirements, architecture, and plans. Construction integrates components and tests features. Transition deploys the software to end users through activities like beta testing and training. The document also discusses engineering artifact sets for managing development, including management, requirements, design, implementation, and deployment artifacts.
The document discusses conventional software management and its challenges. It provides three key points:
1. Only 10% of software projects were delivered successfully on time and budget in the 1990s due to software development being unpredictable and management discipline being a bigger factor in success than technology.
2. The waterfall model was the conventional approach but had issues like late risk resolution, requirements-driven decomposition, and adversarial stakeholder relationships.
3. Modern practices from the 2000s onward used more repeatable processes, off-the-shelf tools, and commercial products for improved economics compared to custom approaches of the 1960-1990 period.
This document discusses various ways to improve software economics, including reducing size, using object-oriented methods, reuse, commercial components, improving processes, team effectiveness, and automation. Key points covered are reducing size through language choice, reuse, and commercial components. Object-oriented methods like UML and visual modeling can also help. Improving processes, personnel skills, and automation through tools can further aid software economics. Quality is improved through requirements, design, architecture, and testing.
cloudgenesis cloud workshop , gdg on campus mitasiyaldhande02
油
Step into the future of cloud computing with CloudGenesis, a power-packed workshop curated by GDG on Campus MITA, designed to equip students and aspiring cloud professionals with hands-on experience in Google Cloud Platform (GCP), Microsoft Azure, and Azure Al services.
This workshop offers a rare opportunity to explore real-world multi-cloud strategies, dive deep into cloud deployment practices, and harness the potential of Al-powered cloud solutions. Through guided labs and live demonstrations, participants will gain valuable exposure to both platforms- enabling them to think beyond silos and embrace a cross-cloud approach to
development and innovation.
Contributing to WordPress With & Without Code.pptxPatrick Lumumba
油
Contributing to WordPress: Making an Impact on the Test TeamWith or Without Coding Skills
WordPress survives on collaboration, and the Test Team plays a very important role in ensuring the CMS is stable, user-friendly, and accessible to everyone.
This talk aims to deconstruct the myth that one has to be a developer to contribute to WordPress. In this session, I will share with the audience how to get involved with the WordPress Team, whether a coder or not.
Well explore practical ways to contribute, from testing new features, and patches, to reporting bugs. By the end of this talk, the audience will have the tools and confidence to make a meaningful impact on WordPressno matter the skill set.
This document discusses haptics technology, which adds the sense of touch to virtual environments. It provides an introduction to haptics and its history, describes how haptic devices create virtual environments and simulate the sense of touch, lists some common haptic devices and their applications, discusses limitations, and concludes by anticipating future advances in haptics.
Gi-Fi allows for wireless transfer of audio and video data at up to 5GB per second within an indoor environment of around 10 meters. It uses a single-chip transceiver operating on the 60GHz band with CMOS processing, providing high-speed data transfer, low power consumption, high security, and cost-effectiveness. Within five years, Gi-Fi is expected to become the dominant wireless networking technology, fully mobile and providing low-cost, high-speed broadband access for transferring large files within seconds to develop wireless homes and offices of the future.
The document provides an overview of AngularJS, including:
- AngularJS is an open-source JavaScript framework used to build single-page applications. It extends HTML with new attributes and makes the page more interactive and responsive.
- The key components of AngularJS are directives, controllers, services and filters. It follows the Model-View-Whatever pattern rather than strict MVC.
- AngularJS uses data binding between the model and view, dependency injection, and allows building reusable components. Popular websites like YouTube and Weather.com use AngularJS for their apps and websites.
Digital jewelry combines fashion and technology by embedding computer components like displays, microphones, and antennas into jewelry items like rings, bracelets, and necklaces. This allows the wearer to have important information and call functionality on discrete pieces that work together wirelessly. One prototype is the Java Ring, which has memory, a processor, and Bluetooth connectivity to unlock doors and log into computers with a snap onto a receiver. Digital jewelry could replace many daily items like ID cards and payment methods with a more integrated fashionable design.
A mobile phone jammer prevents cellular phones from receiving signals from base stations by transmitting signals on the same frequencies. They were originally developed for law enforcement and the military but are now used in places where silence is needed like classrooms, hospitals, and places of worship. A jammer works by transmitting signals that interfere with communication between phones and towers. There are different types of jamming devices that use various techniques like directly receiving and transmitting signals or acting as detectors or beacons. Jammers have applications in maintaining silence and security in various settings.
Skin put is a technology under development that uses the human body as an input surface. It works by using a microchip-sized projector and acoustic detector in an armband to detect sound vibrations from taps on the skin. These detected bio-acoustic waves can then serve as input signals to control devices without directly interacting with them. Some potential uses include helping paralyzed people communicate, controlling games and music with finger taps, and making phone calls using gestures on the arm. While this could increase accessibility, challenges include discomfort wearing the armband and currently high costs.
This document provides an overview of 5G technology, including its advantages and applications. It discusses the history of mobile network generations from 1G to 4G and defines 5G as the next generation, which will provide wireless data speeds of up to 1Gbps. 5G aims to support a highly connected "Wireless World Wide Web" and promises advantages like longer battery life, higher data rates, and greater efficiency compared to previous technologies. However, security, privacy, and high infrastructure costs remain challenges as the technology continues to be developed and tested.
This document discusses cloud storage, including what it is, how it works, the benefits for businesses, and costs for users. Cloud storage involves storing digital data across multiple servers, often in different locations, that are managed by hosting companies. Key benefits include data being available from any device, automatic updates, disaster recovery if physical assets are destroyed, and scalability without needing more physical storage space. Potential disadvantages include security concerns about handing data over externally and risks of cloud service providers temporarily losing data.
Rainbow technology enables storing up to 450 GB of data on a single sheet of paper using colored dots in geometric patterns to represent bits. It converts files into rainbow symbols according to a set of algorithms. Compared to DVDs that can only store 4.7 GB, this technique allows over 100 times more data to be stored on biodegradable paper at a fraction of the cost of plastic storage devices, helping reduce e-waste. However, data on paper is also at risk of fading over time.
This document discusses palm vein technology for biometric authentication. It begins with an introduction to palm vein scanning and then describes how the technology works by scanning the unique vein patterns in a user's palm. It registers these patterns during enrollment and then authenticates users by comparing live scans to the stored patterns. The technology provides highly accurate identification and strong security since vein patterns are difficult to forge. It has various applications like banking, computers, ID cards, and hospitals due to being contactless, hygienic, and secure.
The document discusses the Global Positioning System (GPS). It has three segments - space, control, and user. 24 satellites comprise the space segment. The control segment monitors the satellites. GPS uses triangulation of signals from multiple satellites to determine a user's precise location. It provides location and navigation services to both military and civilian users around the world.
Google Glass is an augmented reality project by Google that aims to implement wearable computing. It uses technologies like augmented reality, bone conduction, eye tap, 4G, and Android to allow hands-free displaying of information to the user via a small video display. The user can take photos/videos and get information by voice commands. While promising increased access, it may also raise privacy and safety issues.
Perl is a scripting language created by Larry Wall in 1987. It is an interpreted language useful for tasks like system administration, web development, and text processing due to its powerful string and text manipulation capabilities. Perl code does not need to be compiled and can run on many platforms including Unix, Windows, and Linux. It has scalar, list, and hash variable types and supports both procedural and object-oriented programming. Perl is an open source language with over 20,000 third-party modules available to extend its functionality. The latest version is 5.26.0 released in 2017.
The document discusses the four phases of the software development lifecycle: inception, elaboration, construction, and transition. It provides details on the objectives and essential activities of each phase. The inception phase focuses on establishing scope and demonstrating architecture. The elaboration phase builds prototypes and baselines requirements, architecture, and plans. Construction integrates components and tests features. Transition deploys the software to end users through activities like beta testing and training. The document also discusses engineering artifact sets for managing development, including management, requirements, design, implementation, and deployment artifacts.
The document discusses conventional software management and its challenges. It provides three key points:
1. Only 10% of software projects were delivered successfully on time and budget in the 1990s due to software development being unpredictable and management discipline being a bigger factor in success than technology.
2. The waterfall model was the conventional approach but had issues like late risk resolution, requirements-driven decomposition, and adversarial stakeholder relationships.
3. Modern practices from the 2000s onward used more repeatable processes, off-the-shelf tools, and commercial products for improved economics compared to custom approaches of the 1960-1990 period.
This document discusses various ways to improve software economics, including reducing size, using object-oriented methods, reuse, commercial components, improving processes, team effectiveness, and automation. Key points covered are reducing size through language choice, reuse, and commercial components. Object-oriented methods like UML and visual modeling can also help. Improving processes, personnel skills, and automation through tools can further aid software economics. Quality is improved through requirements, design, architecture, and testing.
cloudgenesis cloud workshop , gdg on campus mitasiyaldhande02
油
Step into the future of cloud computing with CloudGenesis, a power-packed workshop curated by GDG on Campus MITA, designed to equip students and aspiring cloud professionals with hands-on experience in Google Cloud Platform (GCP), Microsoft Azure, and Azure Al services.
This workshop offers a rare opportunity to explore real-world multi-cloud strategies, dive deep into cloud deployment practices, and harness the potential of Al-powered cloud solutions. Through guided labs and live demonstrations, participants will gain valuable exposure to both platforms- enabling them to think beyond silos and embrace a cross-cloud approach to
development and innovation.
Contributing to WordPress With & Without Code.pptxPatrick Lumumba
油
Contributing to WordPress: Making an Impact on the Test TeamWith or Without Coding Skills
WordPress survives on collaboration, and the Test Team plays a very important role in ensuring the CMS is stable, user-friendly, and accessible to everyone.
This talk aims to deconstruct the myth that one has to be a developer to contribute to WordPress. In this session, I will share with the audience how to get involved with the WordPress Team, whether a coder or not.
Well explore practical ways to contribute, from testing new features, and patches, to reporting bugs. By the end of this talk, the audience will have the tools and confidence to make a meaningful impact on WordPressno matter the skill set.
UiPath Community Zurich: Release Management and Build PipelinesUiPathCommunity
油
Ensuring robust, reliable, and repeatable delivery processes is more critical than ever - it's a success factor for your automations and for automation programmes as a whole. In this session, well dive into modern best practices for release management and explore how tools like the UiPathCLI can streamline your CI/CD pipelines. Whether youre just starting with automation or scaling enterprise-grade deployments, our event promises to deliver helpful insights to you. This topic is relevant for both on-premise and cloud users - as well as for automation developers and software testers alike.
Agenda:
- Best Practices for Release Management
- What it is and why it matters
- UiPath Build Pipelines Deep Dive
- Exploring CI/CD workflows, the UiPathCLI and showcasing scenarios for both on-premise and cloud
- Discussion, Q&A
Speakers
Roman Tobler, CEO@ Routinuum
Johans Brink, CTO@ MvR Digital Workforce
We look forward to bringing best practices and showcasing build pipelines to you - and to having interesting discussions on this important topic!
If you have any questions or inputs prior to the event, don't hesitate to reach out to us.
This event streamed live on May 27, 16:00 pm CET.
Check out all our upcoming UiPath Community sessions at:
https://community.uipath.com/events/
Join UiPath Community Zurich chapter:
https://community.uipath.com/zurich/
Droidal: AI Agents Revolutionizing HealthcareDroidal LLC
油
Droidals AI Agents are transforming healthcare by bringing intelligence, speed, and efficiency to key areas such as Revenue Cycle Management (RCM), clinical operations, and patient engagement. Built specifically for the needs of U.S. hospitals and clinics, Droidal's solutions are designed to improve outcomes and reduce administrative burden.
Through simple visuals and clear examples, the presentation explains how AI Agents can support medical coding, streamline claims processing, manage denials, ensure compliance, and enhance communication between providers and patients. By integrating seamlessly with existing systems, these agents act as digital coworkers that deliver faster reimbursements, reduce errors, and enable teams to focus more on patient care.
Droidal's AI technology is more than just automation it's a shift toward intelligent healthcare operations that are scalable, secure, and cost-effective. The presentation also offers insights into future developments in AI-driven healthcare, including how continuous learning and agent autonomy will redefine daily workflows.
Whether you're a healthcare administrator, a tech leader, or a provider looking for smarter solutions, this presentation offers a compelling overview of how Droidals AI Agents can help your organization achieve operational excellence and better patient outcomes.
A free demo trial is available for those interested in experiencing Droidals AI Agents firsthand. Our team will walk you through a live demo tailored to your specific workflows, helping you understand the immediate value and long-term impact of adopting AI in your healthcare environment.
To request a free trial or learn more:
https://droidal.com/
Introduction and Background:
Study Overview and Methodology: The study analyzes the IT market in Israel, covering over 160 markets and 760 companies/products/services. It includes vendor rankings, IT budgets, and trends from 2025-2029. Vendors participate in detailed briefings and surveys.
Vendor Listings: The presentation lists numerous vendors across various pages, detailing their names and services. These vendors are ranked based on their participation and market presence.
Market Insights and Trends: Key insights include IT market forecasts, economic factors affecting IT budgets, and the impact of AI on enterprise IT. The study highlights the importance of AI integration and the concept of creative destruction.
Agentic AI and Future Predictions: Agentic AI is expected to transform human-agent collaboration, with AI systems understanding context and orchestrating complex processes. Future predictions include AI's role in shopping and enterprise IT.
Agentic AI - The New Era of IntelligenceMuzammil Shah
油
This presentation is specifically designed to introduce final-year university students to the foundational principles of Agentic Artificial Intelligence (AI). It aims to provide a clear understanding of how Agentic AI systems function, their key components, and the underlying technologies that empower them. By exploring real-world applications and emerging trends, the session will equip students with essential knowledge to engage with this rapidly evolving area of AI, preparing them for further study or professional work in the field.
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...Aaryan Kansari
油
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generative AI
Discover Agentic AI, the revolutionary step beyond reactive generative AI. Learn how these autonomous systems can reason, plan, execute, and adapt to achieve human-defined goals, acting as digital co-workers. Explore its promise, key frameworks like LangChain and AutoGen, and the challenges in designing reliable and safe AI agents for future workflows.
Sticky Note Bullets:
Definition: Next stage beyond ChatGPT-like systems, offering true autonomy.
Core Function: Can "reason, plan, execute and adapt" independently.
Distinction: Proactive (sets own actions for goals) vs. Reactive (responds to prompts).
Promise: Acts as "digital co-workers," handling grunt work like research, drafting, bug fixing.
Industry Outlook: Seen as a game-changer; Deloitte predicts 50% of companies using GenAI will have agentic AI pilots by 2027.
Key Frameworks: LangChain, Microsoft's AutoGen, LangGraph, CrewAI.
Development Focus: Learning to think in workflows and goals, not just model outputs.
Challenges: Ensuring reliability, safety; agents can still hallucinate or go astray.
Best Practices: Start small, iterate, add memory, keep humans in the loop for final decisions.
Use Cases: Limited only by imagination (e.g., drafting business plans, complex simulations).
UiPath Community Berlin: Studio Tips & Tricks and UiPath InsightsUiPathCommunity
油
Join the UiPath Community Berlin (Virtual) meetup on May 27 to discover handy Studio Tips & Tricks and get introduced to UiPath Insights. Learn how to boost your development workflow, improve efficiency, and gain visibility into your automation performance.
Agenda:
- Welcome & Introductions
- UiPath Studio Tips & Tricks for Efficient Development
- Best Practices for Workflow Design
- Introduction to UiPath Insights
- Creating Dashboards & Tracking KPIs (Demo)
- Q&A and Open Discussion
Perfect for developers, analysts, and automation enthusiasts!
This session streamed live on May 27, 18:00 CET.
Check out all our upcoming UiPath Community sessions at:
https://community.uipath.com/events/
Join our UiPath Community Berlin chapter:
https://community.uipath.com/berlin/
DePIN = Real-World Infra + Blockchain
DePIN stands for Decentralized Physical Infrastructure Networks.
It connects physical devices to Web3 using token incentives.
How Does It Work?
Individuals contribute to infrastructure like:
Wireless networks (e.g., Helium)
Storage (e.g., Filecoin)
Sensors, compute, and energy
They earn tokens for their participation.
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025Lorenzo Miniero
油
際際滷s for my "Multistream support in the Janus SIP and NoSIP plugins" presentation at the OpenSIPS Summit 2025 event.
They describe my efforts refactoring the Janus SIP and NoSIP plugins to allow for the gatewaying of an arbitrary number of audio/video streams per call (thus breaking the current 1-audio/1-video limitation), plus some additional considerations on what this could mean when dealing with application protocols negotiated via SIP as well.
Grannies Journey to Using Healthcare AI ExperiencesLauren Parr
油
AI offers transformative potential to enhance our long-time persona Grannies life, from healthcare to social connection. This session explores how UX designers can address unmet needs through AI-driven solutions, ensuring intuitive interfaces that improve safety, well-being, and meaningful interactions without overwhelming users.
Content and eLearning Standards: Finding the Best Fit for Your-TrainingRustici Software
油
Tammy Rutherford, Managing Director of Rustici Software, walks through the pros and cons of different standards to better understand which standard is best for your content and chosen technologies.
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)Eugene Fidelin
油
Marko.js is an open-source JavaScript framework created by eBay back in 2014. It offers super-efficient server-side rendering, making it ideal for big e-commerce sites and other multi-page apps where speed and SEO really matter. After over 10 years of development, Marko has some standout features that make it an interesting choice. In this talk, Ill dive into these unique features and showcase some of Marko's innovative solutions. You might not use Marko.js at your company, but theres still a lot you can learn from it to bring to your next project.
Maxx nft market place new generation nft marketing placeusersalmanrazdelhi
油
PREFACE OF MAXXNFT
MaxxNFT: Powering the Future of Digital Ownership
MaxxNFT is a cutting-edge Web3 platform designed to revolutionize how
digital assets are owned, traded, and valued. Positioned at the forefront of the
NFT movement, MaxxNFT views NFTs not just as collectibles, but as the next
generation of internet equityunique, verifiable digital assets that unlock new
possibilities for creators, investors, and everyday users alike.
Through strategic integrations with OKT Chain and OKX Web3, MaxxNFT
enables seamless cross-chain NFT trading, improved liquidity, and enhanced
user accessibility. These collaborations make it easier than ever to participate
in the NFT ecosystem while expanding the platforms global reach.
With a focus on innovation, user rewards, and inclusive financial growth,
MaxxNFT offers multiple income streamsfrom referral bonuses to liquidity
incentivescreating a vibrant community-driven economy. Whether you
'
re
minting your first NFT or building a digital asset portfolio, MaxxNFT empowers
you to participate in the future of decentralized value exchange.
https://maxxnft.xyz/
Adtrans SDG 9000 Series brings high-performance, cloud-managed Wi-Fi 7 to homes, businesses and public spaces. Built on a unified SmartOS platform, the portfolio includes outdoor access points, ceiling-mount APs and a 10G PoE router. Intellifi and Mosaic One simplify deployment, deliver AI-driven insights and unlock powerful new revenue streams for service providers.
Master tester AI toolbox - Kari Kakkonen at Testaus ja AI 2025 ProfessioKari Kakkonen
油
My slides at Professio Testaus ja AI 2025 seminar in Espoo, Finland.
Deck in English, even though I talked in Finnish this time, in addition to chairing the event.
I discuss the different motivations for testing to use AI tools to help in testing, and give several examples in each categories, some open source, some commercial.