SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
1 Silicon Laboratories Confidential
In 2020
2 Silicon Laboratories Confidential
+30 billion devices
3 Silicon Laboratories Confidential
connect to the internet
4 Silicon Laboratories Confidential
It starts with EFM32 Zero Gecko
ARM Cortex-M0+ for IoT
5 Silicon Laboratories Confidential
ARM Cortex-M0+
110 µA/MHz
Brown-out Detection
Power-on Reset, RTC and
RAM retention
0.9 nA
12-bit ADC,
programmable current DAC
Peripheral Reflex System
AES encryption hardware
$0.49 in volume
6 Silicon Laboratories Confidential
7 Silicon Laboratories Confidential
8 Silicon Laboratories Confidential
9 Silicon Laboratories Confidential
10 Silicon Laboratories Confidential
11 Silicon Laboratories Confidential
Design Everything
12 Silicon Laboratories Confidential
Design Everything
13 Silicon Laboratories Confidential
Simplicity Studio
• All the code examples
• All the documentation
• All the software
In one place!
Just USB to the kits...
14 Silicon Laboratories Confidential
Simplicity Studio
 Software for Windows, Linux and Mac/OS X
 Free libraries, source code templates, application notes
 Unique code creation, debug and power profiler tools
15 Silicon Laboratories Confidential
Smart, wearable products
16 Silicon Laboratories Confidential
All types of tags
17 Silicon Laboratories Confidential
18 Silicon Laboratories Confidential
silabs.com/zero-gecko

Mais conteúdo relacionado

Mais procurados

S420 Ideal For Server Room Monitoring
S420 Ideal For Server Room MonitoringS420 Ideal For Server Room Monitoring
S420 Ideal For Server Room MonitoringRizwan Majeed Khan
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemKaspersky Lab
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via smsqqlan
 
Nio100 product guide 20150520
Nio100 product guide 20150520Nio100 product guide 20150520
Nio100 product guide 20150520和得 王
 
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...Positive Hack Days
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017Jiunn-Jer Sun
 
Sigfox + Arduino MKRFOX Workshop
Sigfox + Arduino MKRFOX WorkshopSigfox + Arduino MKRFOX Workshop
Sigfox + Arduino MKRFOX WorkshopNicolas Lesconnec
 

Mais procurados (8)

S420 Ideal For Server Room Monitoring
S420 Ideal For Server Room MonitoringS420 Ideal For Server Room Monitoring
S420 Ideal For Server Room Monitoring
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via sms
 
Nio100 product guide 20150520
Nio100 product guide 20150520Nio100 product guide 20150520
Nio100 product guide 20150520
 
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017
 
Sigfox + Arduino MKRFOX Workshop
Sigfox + Arduino MKRFOX WorkshopSigfox + Arduino MKRFOX Workshop
Sigfox + Arduino MKRFOX Workshop
 
Vpn presnt
Vpn presntVpn presnt
Vpn presnt
 

Destaque

Top Lessons Learned: Industrial Automation Webinar Series
Top Lessons Learned: Industrial Automation Webinar SeriesTop Lessons Learned: Industrial Automation Webinar Series
Top Lessons Learned: Industrial Automation Webinar SeriesSilicon Labs
 
Overview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson TuttleOverview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson TuttleSilicon Labs
 
Router CPU Load in Home Networks
Router CPU Load in Home NetworksRouter CPU Load in Home Networks
Router CPU Load in Home NetworksSilicon Labs
 
Aiming Low: Low-Power MCUs for the IoT
Aiming Low: Low-Power MCUs for the IoTAiming Low: Low-Power MCUs for the IoT
Aiming Low: Low-Power MCUs for the IoTSilicon Labs
 
Clock Tree Timing 101
Clock Tree Timing 101Clock Tree Timing 101
Clock Tree Timing 101Silicon Labs
 
Choosing Between a Wireless Module and a Wireless SoC
Choosing Between a Wireless Module and a Wireless SoCChoosing Between a Wireless Module and a Wireless SoC
Choosing Between a Wireless Module and a Wireless SoCSilicon Labs
 
Multiprotocol Wireless Gecko SoCs
Multiprotocol Wireless Gecko SoCsMultiprotocol Wireless Gecko SoCs
Multiprotocol Wireless Gecko SoCsSilicon Labs
 
Developing Biomedical Devices with Bluetooth
Developing Biomedical Devices with BluetoothDeveloping Biomedical Devices with Bluetooth
Developing Biomedical Devices with BluetoothSilicon Labs
 
Multi-mode Wireless SoCs
Multi-mode Wireless SoCsMulti-mode Wireless SoCs
Multi-mode Wireless SoCsSilicon Labs
 
Building a More Connected World
Building a More Connected WorldBuilding a More Connected World
Building a More Connected WorldSilicon Labs
 
Integrating Speed and Flexibility Isolating Industrial Control
Integrating Speed and Flexibility Isolating Industrial ControlIntegrating Speed and Flexibility Isolating Industrial Control
Integrating Speed and Flexibility Isolating Industrial ControlSilicon Labs
 
BLDC motor control reference design press presentation
BLDC motor control reference design press presentationBLDC motor control reference design press presentation
BLDC motor control reference design press presentationSilicon Labs
 
Applications and Industries Being Powered by Bluetooth Low Energy
Applications and Industries Being Powered by Bluetooth Low EnergyApplications and Industries Being Powered by Bluetooth Low Energy
Applications and Industries Being Powered by Bluetooth Low EnergySilicon Labs
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devicesmentoresd
 
Developing Accessories for the Apple HomeKit Ecosystem
Developing Accessories for the Apple HomeKit EcosystemDeveloping Accessories for the Apple HomeKit Ecosystem
Developing Accessories for the Apple HomeKit EcosystemSilicon Labs
 

Destaque (15)

Top Lessons Learned: Industrial Automation Webinar Series
Top Lessons Learned: Industrial Automation Webinar SeriesTop Lessons Learned: Industrial Automation Webinar Series
Top Lessons Learned: Industrial Automation Webinar Series
 
Overview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson TuttleOverview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
 
Router CPU Load in Home Networks
Router CPU Load in Home NetworksRouter CPU Load in Home Networks
Router CPU Load in Home Networks
 
Aiming Low: Low-Power MCUs for the IoT
Aiming Low: Low-Power MCUs for the IoTAiming Low: Low-Power MCUs for the IoT
Aiming Low: Low-Power MCUs for the IoT
 
Clock Tree Timing 101
Clock Tree Timing 101Clock Tree Timing 101
Clock Tree Timing 101
 
Choosing Between a Wireless Module and a Wireless SoC
Choosing Between a Wireless Module and a Wireless SoCChoosing Between a Wireless Module and a Wireless SoC
Choosing Between a Wireless Module and a Wireless SoC
 
Multiprotocol Wireless Gecko SoCs
Multiprotocol Wireless Gecko SoCsMultiprotocol Wireless Gecko SoCs
Multiprotocol Wireless Gecko SoCs
 
Developing Biomedical Devices with Bluetooth
Developing Biomedical Devices with BluetoothDeveloping Biomedical Devices with Bluetooth
Developing Biomedical Devices with Bluetooth
 
Multi-mode Wireless SoCs
Multi-mode Wireless SoCsMulti-mode Wireless SoCs
Multi-mode Wireless SoCs
 
Building a More Connected World
Building a More Connected WorldBuilding a More Connected World
Building a More Connected World
 
Integrating Speed and Flexibility Isolating Industrial Control
Integrating Speed and Flexibility Isolating Industrial ControlIntegrating Speed and Flexibility Isolating Industrial Control
Integrating Speed and Flexibility Isolating Industrial Control
 
BLDC motor control reference design press presentation
BLDC motor control reference design press presentationBLDC motor control reference design press presentation
BLDC motor control reference design press presentation
 
Applications and Industries Being Powered by Bluetooth Low Energy
Applications and Industries Being Powered by Bluetooth Low EnergyApplications and Industries Being Powered by Bluetooth Low Energy
Applications and Industries Being Powered by Bluetooth Low Energy
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
 
Developing Accessories for the Apple HomeKit Ecosystem
Developing Accessories for the Apple HomeKit EcosystemDeveloping Accessories for the Apple HomeKit Ecosystem
Developing Accessories for the Apple HomeKit Ecosystem
 

Semelhante a EFM32 Zero Gecko Cortex-M0 - the Internet of Things starts here

CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...PROIDEA
 
Taller IoT en la Actualidad
Taller IoT en la ActualidadTaller IoT en la Actualidad
Taller IoT en la ActualidadLaurence HR
 
IDF_Eclipse_Plugin_EclipseCon2020_v2.pdf
IDF_Eclipse_Plugin_EclipseCon2020_v2.pdfIDF_Eclipse_Plugin_EclipseCon2020_v2.pdf
IDF_Eclipse_Plugin_EclipseCon2020_v2.pdfKondal Kolipaka
 
Feasibility of Security in Micro-Controllers
Feasibility of Security in Micro-ControllersFeasibility of Security in Micro-Controllers
Feasibility of Security in Micro-Controllersardiri
 
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with Intel
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with IntelWKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with Intel
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with IntelAmazon Web Services
 
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with Intel
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with IntelWKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with Intel
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with IntelAmazon Web Services
 
Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)Future Insights
 
Track 2 session 4 - st dev con 2016 - opensoftwarex
Track 2   session 4 - st dev con 2016 - opensoftwarexTrack 2   session 4 - st dev con 2016 - opensoftwarex
Track 2 session 4 - st dev con 2016 - opensoftwarexST_World
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsAleksandr Timorin
 
Intels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminarIntels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminarBlue Line
 
Eikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONEEikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONE2FA, Inc.
 
Iot Bootcamp - abridged - part 1
Iot Bootcamp - abridged - part 1Iot Bootcamp - abridged - part 1
Iot Bootcamp - abridged - part 1Marcus Tarquinio
 
Internet of things - The Present & The Future
Internet of things - The Present & The FutureInternet of things - The Present & The Future
Internet of things - The Present & The Futureiotians
 
Webinar: Desenvolvendo Projetos com soluções Wi-Fi e Bluetooth da Infineon
Webinar: Desenvolvendo Projetos com soluções Wi-Fi e Bluetooth da InfineonWebinar: Desenvolvendo Projetos com soluções Wi-Fi e Bluetooth da Infineon
Webinar: Desenvolvendo Projetos com soluções Wi-Fi e Bluetooth da InfineonEmbarcados
 
FPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusionFPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusionPersiPersi1
 
Introduction to Oberon HomeKit SDKs
Introduction to Oberon HomeKit SDKsIntroduction to Oberon HomeKit SDKs
Introduction to Oberon HomeKit SDKsCuno Pfister
 

Semelhante a EFM32 Zero Gecko Cortex-M0 - the Internet of Things starts here (20)

CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
 
Java & IoT
Java & IoTJava & IoT
Java & IoT
 
Taller IoT en la Actualidad
Taller IoT en la ActualidadTaller IoT en la Actualidad
Taller IoT en la Actualidad
 
IDF_Eclipse_Plugin_EclipseCon2020_v2.pdf
IDF_Eclipse_Plugin_EclipseCon2020_v2.pdfIDF_Eclipse_Plugin_EclipseCon2020_v2.pdf
IDF_Eclipse_Plugin_EclipseCon2020_v2.pdf
 
Feasibility of Security in Micro-Controllers
Feasibility of Security in Micro-ControllersFeasibility of Security in Micro-Controllers
Feasibility of Security in Micro-Controllers
 
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with Intel
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with IntelWKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with Intel
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with Intel
 
A2 e overview
A2 e overviewA2 e overview
A2 e overview
 
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with Intel
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with IntelWKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with Intel
WKS420 Create an IoT Gateway & Establish a Data Pipeline to AWS IoT with Intel
 
Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)
 
Track 2 session 4 - st dev con 2016 - opensoftwarex
Track 2   session 4 - st dev con 2016 - opensoftwarexTrack 2   session 4 - st dev con 2016 - opensoftwarex
Track 2 session 4 - st dev con 2016 - opensoftwarex
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 
Intels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminarIntels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminar
 
Eikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONEEikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONE
 
Iot Bootcamp - abridged - part 1
Iot Bootcamp - abridged - part 1Iot Bootcamp - abridged - part 1
Iot Bootcamp - abridged - part 1
 
How PUF Technology is Securing Io
How PUF Technology is Securing IoHow PUF Technology is Securing Io
How PUF Technology is Securing Io
 
Internet of things - The Present & The Future
Internet of things - The Present & The FutureInternet of things - The Present & The Future
Internet of things - The Present & The Future
 
Webinar: Desenvolvendo Projetos com soluções Wi-Fi e Bluetooth da Infineon
Webinar: Desenvolvendo Projetos com soluções Wi-Fi e Bluetooth da InfineonWebinar: Desenvolvendo Projetos com soluções Wi-Fi e Bluetooth da Infineon
Webinar: Desenvolvendo Projetos com soluções Wi-Fi e Bluetooth da Infineon
 
Arrow israel
Arrow israelArrow israel
Arrow israel
 
FPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusionFPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusion
 
Introduction to Oberon HomeKit SDKs
Introduction to Oberon HomeKit SDKsIntroduction to Oberon HomeKit SDKs
Introduction to Oberon HomeKit SDKs
 

Mais de Silicon Labs

Develop Secure, Interoperable Smart Home Products with Z-Wave
Develop Secure, Interoperable Smart Home Products with Z-WaveDevelop Secure, Interoperable Smart Home Products with Z-Wave
Develop Secure, Interoperable Smart Home Products with Z-WaveSilicon Labs
 
Benchmarking Bluetooth Mesh, Thread, and Zigbee Network Performance
Benchmarking Bluetooth Mesh, Thread, and Zigbee Network PerformanceBenchmarking Bluetooth Mesh, Thread, and Zigbee Network Performance
Benchmarking Bluetooth Mesh, Thread, and Zigbee Network PerformanceSilicon Labs
 
Why the IoT the Needs Upgradable Security
Why the IoT the Needs Upgradable SecurityWhy the IoT the Needs Upgradable Security
Why the IoT the Needs Upgradable SecuritySilicon Labs
 
Enhance Home and Building Automation with Multiprotocol Wireless Connectivity
Enhance Home and Building Automation with Multiprotocol Wireless ConnectivityEnhance Home and Building Automation with Multiprotocol Wireless Connectivity
Enhance Home and Building Automation with Multiprotocol Wireless ConnectivitySilicon Labs
 
5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...
5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...
5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...Silicon Labs
 
Extending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh NetworkingExtending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh NetworkingSilicon Labs
 
Selecting the Right Mesh Technology for Your Application
Selecting the Right Mesh Technology for Your ApplicationSelecting the Right Mesh Technology for Your Application
Selecting the Right Mesh Technology for Your ApplicationSilicon Labs
 
Getting the Most Out of Bluetooth 5
Getting the Most Out of Bluetooth 5Getting the Most Out of Bluetooth 5
Getting the Most Out of Bluetooth 5Silicon Labs
 
Step Right Up: Design the Next Winning Wearable
Step Right Up: Design the Next Winning Wearable Step Right Up: Design the Next Winning Wearable
Step Right Up: Design the Next Winning Wearable Silicon Labs
 

Mais de Silicon Labs (9)

Develop Secure, Interoperable Smart Home Products with Z-Wave
Develop Secure, Interoperable Smart Home Products with Z-WaveDevelop Secure, Interoperable Smart Home Products with Z-Wave
Develop Secure, Interoperable Smart Home Products with Z-Wave
 
Benchmarking Bluetooth Mesh, Thread, and Zigbee Network Performance
Benchmarking Bluetooth Mesh, Thread, and Zigbee Network PerformanceBenchmarking Bluetooth Mesh, Thread, and Zigbee Network Performance
Benchmarking Bluetooth Mesh, Thread, and Zigbee Network Performance
 
Why the IoT the Needs Upgradable Security
Why the IoT the Needs Upgradable SecurityWhy the IoT the Needs Upgradable Security
Why the IoT the Needs Upgradable Security
 
Enhance Home and Building Automation with Multiprotocol Wireless Connectivity
Enhance Home and Building Automation with Multiprotocol Wireless ConnectivityEnhance Home and Building Automation with Multiprotocol Wireless Connectivity
Enhance Home and Building Automation with Multiprotocol Wireless Connectivity
 
5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...
5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...
5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...
 
Extending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh NetworkingExtending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh Networking
 
Selecting the Right Mesh Technology for Your Application
Selecting the Right Mesh Technology for Your ApplicationSelecting the Right Mesh Technology for Your Application
Selecting the Right Mesh Technology for Your Application
 
Getting the Most Out of Bluetooth 5
Getting the Most Out of Bluetooth 5Getting the Most Out of Bluetooth 5
Getting the Most Out of Bluetooth 5
 
Step Right Up: Design the Next Winning Wearable
Step Right Up: Design the Next Winning Wearable Step Right Up: Design the Next Winning Wearable
Step Right Up: Design the Next Winning Wearable
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

EFM32 Zero Gecko Cortex-M0 - the Internet of Things starts here