Edge Security in an Insecure World
(Source: elenabsl/Shutterstock.com) As the cost of embedded networked devices falls—consider the Raspberry Pi as one example—they become ubiquitous. But, a hidden cost in this proliferation is...
Read Blog
(Source: elenabsl/Shutterstock.com) As the cost of embedded networked devices falls—consider the Raspberry Pi as one example—they become ubiquitous. But, a hidden cost in this proliferation is...
Read Blog
(Source: Phonlamai Photo/Shutterstock.com) Early machine learning was search-based and relied mainly on brute-force approaches with some optimization. But as machine learning matured, it...
Read Blog
(Source: Virrage Images/Shutterstock.com) In the early days, AI was powered predominantly by the Lisp (LISt Processor) programming language on dedicated hardware that ran primitive Lisp...
Read Blog
How AI shaped languages from Lisp to Python and R.
Read Article
From idea to solution, the steps involved in machine learning deployment.
Read Article
(Source: Zapp2Photo/Shutterstock.com) Our lives are increasingly connected and translated into data. This data reveals information about ourselves that we might not understand and could be used...
Read Blog
(Source: whiteMocca/Shutterstock.com) Blockchain is an evolving technology with roots in cryptocurrencies. It provides an immutable digital ledger that is decentralized and secure. But while...
Read Blog
(Source: BeeBright/Shutterstock.com) Developing the next great Internet of Things (IoT) product is exciting, and the technology available today makes it easier than ever. The landscape of...
Read Blog
Linux is the most widely used operating system for the Internet of Things. That's not surprising given the breadth and depth of its capabilities. In t
Read Article
Penetration testing (pen testing) is the evaluation of a network or device against known exploits using a variety of different types of tools. In this
Read Article
IoT forced a sea change in computing and network architectures. This was due to a variety of factors including quantities of end-devices, processing n
Read Article
Explore how you can use the Intel OpenVINO toolkit to automatically identify and classify defective objects on a conveyor belt.
Read Article
With the number of security cameras deployed, how do you constantly monitor each camera? This problem can be solved using deep learning. Explore how y
Read Article
Explore how you can use the Intel OpenVINO toolkit to automatically identify parking spot availability based upon cars entering or exiting a lot.
Read Article
Understanding consumer sentiment about a product is a new frontier for computer vision. In this blog, we will explore how you can use the Intel OpenV
Read Article
Explore how you can use the Intel OpenVINO toolkit to automatically infer a machine operator's level of focus and mood based on video input of their
Read Article
Bringing internet connectivity to devices has swung the pendulum back from centralized computing to decentralization. IoT and edge computing continue
Read Article