Simone Cammel
- microsoft
- october 2025
CTO research @ microsoft NL
Artificial Intelligence
Moore’s law is in hyperdrive
GPT - 2018 - 117mil params GPT2 - 2019 - 1.5 billion GPT 3.5 - 2022 - 175 billion paramaters
Intelligence will be common with AI???
”AI will take my job”
protocols are coming up for AI’s to exchange information.
vibecoding mentioned
you can ask AI how a colorblind person would see your website
more important
- analytical judgement
- flexibility
- emotional intelligence
You cannot always trust AI
AI TOWN - farmville?
AI is based on humens, which means we can’t always trust it.
gemini was able to create nazi images, and they were all asian or black.
google enforcer inclusivity, so if you google doctor, it won’t only give men, even if there is more info on men.
RISKS:
- harmful content and code
- jailbreks & prompt injection attacks
- hallucinations
- IP infringement
- Manipulation & human like behaviour
The people that still understand how to use AI whilst also understanding the risk
2 teens were arrested in the netherlands for hacking for russia
we need to do risk mitigation
teens have the best chance to learn to live with AI, whilst old people would need to adapt to it.
knbow how to work with or against it.
guess gandalfs password is a teaching tool for using GEN AI
AI is trying not to be shut down, we can see this in prompts. The more intelligent they become, this behaviour changes.
If we don’t understand this, we’ll have a problem.
GPT 5 is trainign GPT 6. (this might be a big hazard)
When do we get intelligence inside of robots
It can now sort things into trash bins based on your local rules.
know what are the risks of AGI, and don’t only stick with python
forethought is a website where you can know how to prepare yourself for AI.
Today is the slowest it will ever be.
Jurre Overgoor
USB Communication explained
- Jurre Overgoor @ Topicus
jsr-80 is the way the java language evolves. it is a specification for usb support
but it is not really active.
i need to learn how usb works
we are learning about usb 2.0, nothing newer.
You can use Wireshark Wireshark uses LibPCap for usb
LibPCap can intercept packets on a high level.
Usb Sniffer
Usb host: controls communication, your laptop Usb peripheral: other USB devices to connect to a host Usb Hub: a special kind of peripheral that connects multiple usb peripherals
USB 2.0 uses 4 wires on a hardware layer
- 1 red: VBUS
- 2: White D+
- 3: green D-
- 4: black ground
USB is a tiered star topology
a star topology is 1 device that connects to other devices.
Tier 1 is always inside your laptop, the root. the other tiers are devices. the maximum of tiers is 7. this is for signal timing constraints for signal propagation.
The max devices per host is 127.
step 1: device discovery
Device enumeration. every peripheral has a device descriptor, a data structure containing info on the usb device. Vendor ID, Product ID, USB Revision
bNumConfigurations. every usb device has 1 or more configurations.
Most only have 1.
Wifi sticks have 2 configurations.
USB Configuration descriptor:
- power draw
- bus powered / self powered
- number of interfaces
bNumInterfaces is a grouping of functionality.
Printer can print, scan, copy, fax. all functionality will be in different usb interface.
It is descibed in an usb interface descriptor.
bNumEndpoints is where the actual data is sent back and forth. Most are unidirectional.
every device has a maximum of 15 endpoints.
USB endpoint descriptor
- data transfer type
- direction (in or out, viewed from your pc)
- max size
- something
This is all you need to know to start communicating
step 2: communication
it goes through pipes.
A pipe is a software term, the state of the endpoint that u use to transfer
It has paramaters like bandwith, transfer type, data size and buffer size
IN/OUT are viewed from the host, so IN is going to your laptop
all information is Host initiated, unlike tcp where it can be both
OUT comm
- token phase: hey imma send some data
- data phase: here is data
- handshake phase: client: hey i received your data
IN comm
- token phase: hey i want to receive data
- data phase: client: here is data
- handshake phase: host: hey i received your data
BULK TRANSFER
it uses error correction.
bulk transfer is used for sending pdfs to printer
networking 101
bulk transfer uses spare un-allocated bandwidth.
control transfer is used for endpoint 0, you use it to query your device descriptors or configuration descriptors. enpoint 0 always exists. This is the only back aND FORTH COMM
Best effort delivery, if it fails, try again.
INTERRUPT TRANSFER
periodic small data info communication. USB mouse uses this. hey, what is you position.
poll rate is in the endpoint descriptor.
if you have anb usb mouse and a datastick, then you need to preallocate for the mouse, and use the rest for data transfer
there is error correction, but no retransmission
ISOCHRONOUS TRANSFER
periodic transfer, but more continuous. like a webcam. The webcam will keep sending frames untill it is told to stop. time sensitive info. there is no re-transmission.
There are vendor specific protocols over USB. it is not part of the USB standard.
USB/IP
it is a translation for usb over tcp, for using a webcam that you want to expose over the internet. this could be used for creating mocks or just for viewing your webcam on the cloud.
This is a linux project.