Discussion of the Evolution of Education and Research Networking across Europe & Middle East, The paper was presented at the Joint European Network Conference held in Tel Aviv, Israel - June 1997.
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
油
The document outlines a workshop conducted by ITU and CITEL aimed at enhancing cybersecurity capacity building in the Americas, highlighting the urgent need for developing cyber skills due to the rising threats of cybercrime and cyber terrorism. It emphasizes the importance of creating national Computer Incident Response Teams (CIRTs) and establishing partnerships between government, academia, and industry stakeholders for ongoing cybersecurity training programs. Additionally, the document stresses that public awareness and education are crucial for fostering a cybersecurity culture among citizens and businesses.
"Our Intelligent Arctic Vision: 2025-2040" - Extended VersionDr David Probert
油
The document outlines a future vision for an 'Intelligent Arctic Environment' from 2025 to 2040, emphasizing scientific and ecological advancements. It details strategic projects and initiatives aimed at integrating artificial intelligence and ecological monitoring in Arctic regions. The text also highlights a 35th anniversary scientific conference where these concepts will be discussed.
The document presents a vision for an 'Intelligent Arctic Environment' from 2025 to 2040, emphasizing the integration of artificial intelligence in ecological research and applications. It outlines various projects and initiatives aimed at leveraging AI for environmental monitoring, data collection, and management within Arctic regions. The conference details its focus on innovative solutions for ecological issues in the North and encourages collaborative scientific resource allocation.
The document discusses the evolution of security in the 21st century, highlighting the shift from traditional physical security measures to the integration of artificial intelligence (AI) and machine learning across various sectors. It outlines current trends and applications of AI in enhancing security, such as real-time behavior modeling, intelligent CCTV surveillance, and blockchain for data protection. Additionally, it speculates on future scenarios where AI may dominate security practices by 2030 and beyond, emphasizing the need for regulatory measures to address potential risks associated with advanced AI technologies.
This document explores the historical evolution and contemporary significance of AI and cybersecurity in the context of 21st-century geopolitics, highlighting their integration and the strategic risks associated with exporting such technologies. It discusses the shift from hardware-centric concerns to the importance of cyber assets and national critical infrastructure, emphasizing the growing regulation of AI and cybersecurity exports. The author projects that investment strategies will need to adapt to these developments, as nations will increasingly control and regulate the dissemination of cyber AI innovations.
Dr. David Probert reflects on his family's historical connections to the Donbas region, specifically through his great-great-grandfather, Edwin James Williams, who worked as a mining engineer in Hughesovka from 1877 to 1902. The document outlines the establishment and development of this industrial city, its cultural significance, and the challenges faced in the region today. Probert expresses hope for a peaceful resolution to ongoing tensions in Donetsk, highlighting the area's rich heritage rooted in coal mining and steel production.
The document discusses the concept of a 'cyber pandemic' and its growing threat through the increasing frequency of cyber attacks like ransomware, DDoS, and identity theft. It outlines the potentially catastrophic evolution of cyber threats into semi-autonomous and autonomous AI-driven attacks over the next decade, which could compromise critical infrastructure globally. Emphasizing the urgent need for enhanced cybersecurity measures and proactive defenses, the document warns of an impending existential risk if such threats are inadequately addressed.
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
油
The document discusses the themes and sessions of the 40th International East-West Security Conference held in St. Julians, Malta, on November 10-11, 2019, focusing on intelligent integrated security against cyber threats such as cybercrime, cyberterrorism, and cyberwarfare. Key topics include advancements in cybersecurity for the finance sector, industrial cybersecurity, and predicting future cyber threats through intelligent tools and real-time analytics. The conference also highlights the importance of developing effective cybersecurity strategies globally and the historical context of cyber mechanisms.
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
油
The document outlines discussions and strategies regarding the upgrade of industrial cybersecurity to secure critical national infrastructure, highlighting the transition from legacy systems to modern standards. It emphasizes the importance of intelligent cyber solutions and real-time analytics to mitigate cyber threats facing industries, particularly in finance and critical sectors. The conference, held in Malta in November 2019, addresses various themes, including AI in banking, intelligent security against cybercrime, and advancements in industrial control systems.
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
油
The document discusses the intersection of AI, machine learning, and cybersecurity within the finance sector, highlighting their roles in mitigating cyber threats and securing banking transactions. It also touches on the evolution of fintech, the importance of intelligent cybersecurity, and major cyber threats affecting the industry. The conference held in Malta focused on exploring future scenarios and cybersecurity strategies for banks and financial services.
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
油
The document discusses effective cybersecurity strategies for the 2020s, highlighting the importance of intelligent analytics, real-time modeling, and emerging technologies like AI and blockchain. It includes themes on fintech security, intelligent video surveillance, and methods to mitigate cyber threats. The content also emphasizes global cybersecurity frameworks and the complexities of securing cyberspace across different sectors.
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
油
The document discusses the themes and technologies around 24/7 intelligent video surveillance presented at the 39th International East-West Security Conference held in Naples, Italy. Key topics include the integration of AI, deep learning, and biometrics into surveillance systems to enhance data security and privacy for businesses. Additionally, it covers case studies, the evolution of video analytics, and the implications of cyber surveillance in modern society.
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
油
The document discusses trends in fintech security, emphasizing the role of AI, deep learning, and blockchain in mitigating cyber threats for the sector. Key themes include innovative technologies for transaction security, intelligent video surveillance, and a focus on adaptive fintech solutions. The conference presented various cybersecurity scenarios and case studies on recent cyber attacks, highlighting the critical importance of real-time security measures.
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
油
The document outlines the establishment and development of the Arctic Environmental Networks (KolA Net) from 1992 to 1999, a collaborative effort aimed at addressing ecological problems in the North following the dissolution of the USSR. It highlights key milestones such as the initiation of radiation monitoring programs and partnerships with various organizations. The content culminates in a reflection on the challenges faced during the post-Soviet era and the foundation of an international scientific cooperative framework for environmental response.
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
油
The document discusses 'Cybervision: 2020 to 2030', a cybersecurity toolkit presented at the 38th International East-West Security Conference in Nice, France. It highlights the themes of cybersecurity for critical infrastructure, intelligent cyber surveillance using AI, and the mapping of global cyber threats. Additionally, it calls attention to the importance of integrating security measures against prevalent cyber threats and strategies for businesses and governments.
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
油
The document discusses the theme of 'intelligent cyber surveillance' focusing on AI video analytics and biometrics, presented at the 38th International East-West Security Conference in Nice, France on November 5-6, 2018. It explores cybersecurity for critical infrastructure, advanced surveillance tools, and case studies in various sectors such as transport and defense. Additionally, it highlights the growing cyber threats faced by governments and businesses due to increasing global connectivity and presents insights into countering these threats with AI and machine learning.
Cybersecurity for Critical National InfrastructureDr David Probert
油
The document outlines a cybersecurity strategy for critical national infrastructure, presented at the 38th International East-West Security Conference in Nice, France, on November 5-6, 2018. It covers various themes, including case studies, operational cyber standards, and intelligent cyber surveillance, with an emphasis on national strategies and stakeholder collaboration. Additionally, it discusses global cybersecurity landscapes and best practices to enhance security measures for critical infrastructure.
21stC Cybersecurity Trends: 2018-2025 & Beyond!... Dr David Probert
油
The document discusses cybersecurity trends and defenses projected from 2018 to 2025 and beyond, presented at the ISSA Summer Cybersecurity Conference in London. It highlights the evolution from the 19th century physical world to the 21st century intelligent world, emphasizing the complexities of securing cyberspace and the importance of integrated security measures. The presentation also outlines various scenarios, threats, and necessary responses to emerging cyber challenges.
The document discusses security futures from 2018 to 2025, focusing on emerging technologies, tools, and trends in cybersecurity. It emphasizes the importance of board-level cybersecurity strategies, the impact of cyberattacks on businesses, and presents various scenarios for future security challenges. Key recommendations include appointing a Chief Security Officer, integrating cybersecurity into business risk assessments, and developing effective response plans.
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
油
The document discusses cybersecurity threats and defenses presented at the 'Intelligent Business Cybersecurity' conference held in Seville, Spain, on November 20-21, 2017. It outlines major themes such as current cyber threats, practical defense strategies, case studies of cybercrime, and advancements in cybersecurity technology like machine learning and neural security. Emphasis is placed on the need for businesses to develop integrated cybersecurity strategies to mitigate risks posed by evolving cyber threats.
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
油
The document discusses cybersecurity defense strategies from 2018 to 2025, emphasizing the integration of cybersecurity at the board level of businesses. It highlights the transition in cybersecurity tools from traditional methods to advanced technologies involving machine learning and artificial intelligence. Additionally, the document stresses the importance of a robust cybersecurity framework to protect against significant financial losses due to cyber attacks.
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Dr David Probert
油
The document outlines cybersecurity tools and trends expected from 2018 to 2025, emphasizing the need for advanced AI and machine learning solutions to combat various cyber threats. It also highlights the importance of integrating cybersecurity at the board level, with recommendations for actions and investments in developing effective cyber defense strategies. Additionally, it presents scenarios for the evolution of cybersecurity, including neural security and the impacts of evolving threats on critical infrastructures.
The document outlines key topics from the 35th International East/West Security Conference held in Genoa, Italy, on June 5th and 6th, 2017, focusing on practical cyber defense against the top 10 cyber threats. It discusses various cyber threats, including ransomware, botnets, insider threats, and advanced persistent threats, alongside insights into cybersecurity trends and tools for effective defense. Additionally, it highlights the impact of notable ransomware attacks and emphasizes the need for national cybersecurity strategies among EU countries.
This document provides a summary and vision for cybersecurity from 2017 to 2027. It discusses the transition from the physical world of the 19th century to the intelligent world of the 21st century. The author proposes that cybersecurity will become integrated, adaptive, and intelligent through the use of artificial intelligence and machine learning. Key topics covered over the 10 year period include smart security architectures, the internet of things, and how AI will transform cybersecurity. The overall vision is of proactive, real-time cyber defense against the growing threats of cyber crime, terrorism and warfare.
The document discusses the importance of smart security architectures integrating cyber and physical technologies for real-time surveillance in business and government sectors. It emphasizes the transformation of cybersecurity through artificial intelligence and machine learning to combat increasing cyber threats. Key themes include adaptive cybersecurity measures, the convergence of physical and cyber operations, and the need for immediate action against industrialized cyber attacks.
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
油
The document discusses the essential role of cybersecurity in combating terrorism, presented at the 33rd International East/West Security Conference in Prague. It emphasizes the need for integrating cybersecurity operations with real-time surveillance and advanced technologies such as biometrics and AI to effectively address modern threats. Additionally, it outlines the transition from traditional security measures to more adaptive and intelligent solutions to enhance overall security strategies in the digital age.
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
油
This document discusses energizing cybersecurity with biometrics and digital forensics. It covers topics like integrating cybersecurity operations with real-time surveillance and profiling tools to prevent terrorism. Other topics include using biometrics and forensics to defend against cybercrime and terrorism by migrating from 20th century physical security to 21st century smart security. It also discusses profiling and tracking "bad guys" in real-time using tools like facial recognition from CCTV and monitoring social media and dark web communications. The document outlines various cyber-physical threat scenarios from cybercrime and cyberterrorism and how hybrid physical-cyber terrorism will require redesigning security. It also discusses how cyber attacks can enable or facilitate physical attacks and vice versa
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
油
The document discusses the themes and sessions of the 40th International East-West Security Conference held in St. Julians, Malta, on November 10-11, 2019, focusing on intelligent integrated security against cyber threats such as cybercrime, cyberterrorism, and cyberwarfare. Key topics include advancements in cybersecurity for the finance sector, industrial cybersecurity, and predicting future cyber threats through intelligent tools and real-time analytics. The conference also highlights the importance of developing effective cybersecurity strategies globally and the historical context of cyber mechanisms.
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
油
The document outlines discussions and strategies regarding the upgrade of industrial cybersecurity to secure critical national infrastructure, highlighting the transition from legacy systems to modern standards. It emphasizes the importance of intelligent cyber solutions and real-time analytics to mitigate cyber threats facing industries, particularly in finance and critical sectors. The conference, held in Malta in November 2019, addresses various themes, including AI in banking, intelligent security against cybercrime, and advancements in industrial control systems.
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
油
The document discusses the intersection of AI, machine learning, and cybersecurity within the finance sector, highlighting their roles in mitigating cyber threats and securing banking transactions. It also touches on the evolution of fintech, the importance of intelligent cybersecurity, and major cyber threats affecting the industry. The conference held in Malta focused on exploring future scenarios and cybersecurity strategies for banks and financial services.
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
油
The document discusses effective cybersecurity strategies for the 2020s, highlighting the importance of intelligent analytics, real-time modeling, and emerging technologies like AI and blockchain. It includes themes on fintech security, intelligent video surveillance, and methods to mitigate cyber threats. The content also emphasizes global cybersecurity frameworks and the complexities of securing cyberspace across different sectors.
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
油
The document discusses the themes and technologies around 24/7 intelligent video surveillance presented at the 39th International East-West Security Conference held in Naples, Italy. Key topics include the integration of AI, deep learning, and biometrics into surveillance systems to enhance data security and privacy for businesses. Additionally, it covers case studies, the evolution of video analytics, and the implications of cyber surveillance in modern society.
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
油
The document discusses trends in fintech security, emphasizing the role of AI, deep learning, and blockchain in mitigating cyber threats for the sector. Key themes include innovative technologies for transaction security, intelligent video surveillance, and a focus on adaptive fintech solutions. The conference presented various cybersecurity scenarios and case studies on recent cyber attacks, highlighting the critical importance of real-time security measures.
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
油
The document outlines the establishment and development of the Arctic Environmental Networks (KolA Net) from 1992 to 1999, a collaborative effort aimed at addressing ecological problems in the North following the dissolution of the USSR. It highlights key milestones such as the initiation of radiation monitoring programs and partnerships with various organizations. The content culminates in a reflection on the challenges faced during the post-Soviet era and the foundation of an international scientific cooperative framework for environmental response.
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
油
The document discusses 'Cybervision: 2020 to 2030', a cybersecurity toolkit presented at the 38th International East-West Security Conference in Nice, France. It highlights the themes of cybersecurity for critical infrastructure, intelligent cyber surveillance using AI, and the mapping of global cyber threats. Additionally, it calls attention to the importance of integrating security measures against prevalent cyber threats and strategies for businesses and governments.
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
油
The document discusses the theme of 'intelligent cyber surveillance' focusing on AI video analytics and biometrics, presented at the 38th International East-West Security Conference in Nice, France on November 5-6, 2018. It explores cybersecurity for critical infrastructure, advanced surveillance tools, and case studies in various sectors such as transport and defense. Additionally, it highlights the growing cyber threats faced by governments and businesses due to increasing global connectivity and presents insights into countering these threats with AI and machine learning.
Cybersecurity for Critical National InfrastructureDr David Probert
油
The document outlines a cybersecurity strategy for critical national infrastructure, presented at the 38th International East-West Security Conference in Nice, France, on November 5-6, 2018. It covers various themes, including case studies, operational cyber standards, and intelligent cyber surveillance, with an emphasis on national strategies and stakeholder collaboration. Additionally, it discusses global cybersecurity landscapes and best practices to enhance security measures for critical infrastructure.
21stC Cybersecurity Trends: 2018-2025 & Beyond!... Dr David Probert
油
The document discusses cybersecurity trends and defenses projected from 2018 to 2025 and beyond, presented at the ISSA Summer Cybersecurity Conference in London. It highlights the evolution from the 19th century physical world to the 21st century intelligent world, emphasizing the complexities of securing cyberspace and the importance of integrated security measures. The presentation also outlines various scenarios, threats, and necessary responses to emerging cyber challenges.
The document discusses security futures from 2018 to 2025, focusing on emerging technologies, tools, and trends in cybersecurity. It emphasizes the importance of board-level cybersecurity strategies, the impact of cyberattacks on businesses, and presents various scenarios for future security challenges. Key recommendations include appointing a Chief Security Officer, integrating cybersecurity into business risk assessments, and developing effective response plans.
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
油
The document discusses cybersecurity threats and defenses presented at the 'Intelligent Business Cybersecurity' conference held in Seville, Spain, on November 20-21, 2017. It outlines major themes such as current cyber threats, practical defense strategies, case studies of cybercrime, and advancements in cybersecurity technology like machine learning and neural security. Emphasis is placed on the need for businesses to develop integrated cybersecurity strategies to mitigate risks posed by evolving cyber threats.
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
油
The document discusses cybersecurity defense strategies from 2018 to 2025, emphasizing the integration of cybersecurity at the board level of businesses. It highlights the transition in cybersecurity tools from traditional methods to advanced technologies involving machine learning and artificial intelligence. Additionally, the document stresses the importance of a robust cybersecurity framework to protect against significant financial losses due to cyber attacks.
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Dr David Probert
油
The document outlines cybersecurity tools and trends expected from 2018 to 2025, emphasizing the need for advanced AI and machine learning solutions to combat various cyber threats. It also highlights the importance of integrating cybersecurity at the board level, with recommendations for actions and investments in developing effective cyber defense strategies. Additionally, it presents scenarios for the evolution of cybersecurity, including neural security and the impacts of evolving threats on critical infrastructures.
The document outlines key topics from the 35th International East/West Security Conference held in Genoa, Italy, on June 5th and 6th, 2017, focusing on practical cyber defense against the top 10 cyber threats. It discusses various cyber threats, including ransomware, botnets, insider threats, and advanced persistent threats, alongside insights into cybersecurity trends and tools for effective defense. Additionally, it highlights the impact of notable ransomware attacks and emphasizes the need for national cybersecurity strategies among EU countries.
This document provides a summary and vision for cybersecurity from 2017 to 2027. It discusses the transition from the physical world of the 19th century to the intelligent world of the 21st century. The author proposes that cybersecurity will become integrated, adaptive, and intelligent through the use of artificial intelligence and machine learning. Key topics covered over the 10 year period include smart security architectures, the internet of things, and how AI will transform cybersecurity. The overall vision is of proactive, real-time cyber defense against the growing threats of cyber crime, terrorism and warfare.
The document discusses the importance of smart security architectures integrating cyber and physical technologies for real-time surveillance in business and government sectors. It emphasizes the transformation of cybersecurity through artificial intelligence and machine learning to combat increasing cyber threats. Key themes include adaptive cybersecurity measures, the convergence of physical and cyber operations, and the need for immediate action against industrialized cyber attacks.
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
油
The document discusses the essential role of cybersecurity in combating terrorism, presented at the 33rd International East/West Security Conference in Prague. It emphasizes the need for integrating cybersecurity operations with real-time surveillance and advanced technologies such as biometrics and AI to effectively address modern threats. Additionally, it outlines the transition from traditional security measures to more adaptive and intelligent solutions to enhance overall security strategies in the digital age.
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
油
This document discusses energizing cybersecurity with biometrics and digital forensics. It covers topics like integrating cybersecurity operations with real-time surveillance and profiling tools to prevent terrorism. Other topics include using biometrics and forensics to defend against cybercrime and terrorism by migrating from 20th century physical security to 21st century smart security. It also discusses profiling and tracking "bad guys" in real-time using tools like facial recognition from CCTV and monitoring social media and dark web communications. The document outlines various cyber-physical threat scenarios from cybercrime and cyberterrorism and how hybrid physical-cyber terrorism will require redesigning security. It also discusses how cyber attacks can enable or facilitate physical attacks and vice versa
Quantum AI: Where Impossible Becomes ProbableSaikat Basu
油
Imagine combining the "brains" of Artificial Intelligence (AI) with the "super muscles" of Quantum Computing. That's Quantum AI!
It's a new field that uses the mind-bending rules of quantum physics to make AI even more powerful.
"Database isolation: how we deal with hundreds of direct connections to the d...Fwdays
油
What can go wrong if you allow each service to access the database directly? In a startup, this seems like a quick and easy solution, but as the system scales, problems appear that no one could have guessed.
In my talk, I'll share Solidgate's experience in transforming its architecture: from the chaos of direct connections to a service-based data access model. I will talk about the transition stages, bottlenecks, and how isolation affected infrastructure support. I will honestly show what worked and what didn't. In short, we will analyze the controversy of this talk.
"Scaling in space and time with Temporal", Andriy Lupa.pdfFwdays
油
Design patterns like Event Sourcing and Event Streaming have long become standards for building real-time analytics systems. However, when the system load becomes nonlinear with fast and often unpredictable spikes, it's crucial to respond quickly in order not to lose real-time operating itself.
In this talk, Ill share my experience implementing and using a tool like Temporal.io. We'll explore the evolution of our system for maintaining real-time report generation and discuss how we use Temporal both for short-lived pipelines and long-running background tasks.
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...Fwdays
油
Let's talk about our history. How we started the project with a small vector database of less than 2 million records. Later, we received a request for +100 million records, then another +100... And so gradually we reached almost 1 billion. Standard tools were quickly running out of steam - we were running into performance, index size, and very limited resources. After a long series of trials and errors, we built our own low-cost cluster, which today stably processes thousands of queries to more than 1B vectors.
AI Agents and FME: A How-to Guide on Generating Synthetic MetadataSafe Software
油
In the world of AI agents, semantics is king. Good metadata is thus essential in an organization's AI readiness checklist. But how do we keep up with the massive influx of new data? In this talk we go over the tips and tricks in generating synthetic metadata for the consumption of human users and AI agents alike.
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025pcprocore
油
$腫:腫署 告駒諮 & 署 駒諮 腫腫基告 諮介 > https://pcprocore.com/
CapCut Pro Crack is a powerful tool that has taken the digital world by storm, offering users a fully unlocked experience that unleashes their creativity. With its user-friendly interface and advanced features, its no wonder why aspiring videographers are turning to this software for their projects.
OpenPOWER Foundation & Open-Source Core InnovationsIBM
油
penPOWER offers a fully open, royalty-free CPU architecture for custom chip design.
It enables both lightweight FPGA cores (like Microwatt) and high-performance processors (like POWER10).
Developers have full access to source code, specs, and tools for end-to-end chip creation.
It supports AI, HPC, cloud, and embedded workloads with proven performance.
Backed by a global community, it fosters innovation, education, and collaboration.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2025/06/mpu-a-transformative-solution-for-next-gen-ai-at-the-edge-a-presentation-from-fotonation/
Petronel Bigioi, CEO of FotoNation, presents the MPU+: A Transformative Solution for Next-Gen AI at the Edge tutorial at the May 2025 Embedded Vision Summit.
In this talk, Bigioi introduces MPU+, a novel programmable, customizable low-power platform for real-time, localized intelligence at the edge. The platform includes an AI-augmented image signal processor that enables leading image and video quality.
In addition, it integrates ultra-low-power object and motion detection capabilities to enable always-on computer vision. A programmable neural processor provides flexibility to efficiently implement new neural networks. And additional specialized engines facilitate image stabilization and audio enhancements.
You are not excused! How to avoid security blind spots on the way to productionMichele Leroux Bustamante
油
We live in an ever evolving landscape for cyber threats creating security risk for your production systems. Mitigating these risks requires participation throughout all stages from development through production delivery - and by every role including architects, developers QA and DevOps engineers, product owners and leadership. No one is excused! This session will cover examples of common mistakes or missed opportunities that can lead to vulnerabilities in production - and ways to do better throughout the development lifecycle.
From Manual to Auto Searching- FME in the Driver's SeatSafe Software
油
Finding a specific car online can be a time-consuming task, especially when checking multiple dealer websites. A few years ago, I faced this exact problem while searching for a particular vehicle in New Zealand. The local classified platform, Trade Me (similar to eBay), wasnt yielding any results, so I expanded my search to second-hand dealer sitesonly to realise that periodically checking each one was going to be tedious. Thats when I noticed something interesting: many of these websites used the same platform to manage their inventories. Recognising this, I reverse-engineered the platforms structure and built an FME workspace that automated the search process for me. By integrating API calls and setting up periodic checks, I received real-time email alerts when matching cars were listed. In this presentation, Ill walk through how I used FME to save hours of manual searching by creating a custom car-finding automation system. While FME cant buy a car for youyetit can certainly help you find the one youre after!
Delivering solutions to Azure may involve a variety of architecture patterns involving your applications, APIs data and associated Azure resources that comprise the solution. This session will use reference architectures to illustrate the security considerations to protect your Azure resources and data, how to achieve Zero Trust, and why it matters. Topics covered will include specific security recommendations for types Azure resources and related network security practices. The goal is to give you a breadth of understanding as to typical security requirements to meet compliance and security controls in an enterprise solution.