Simone Cammel

  • microsoft
  • october 2025

CTO research @ microsoft NL

Artificial Intelligence

Moore’s law is in hyperdrive

GPT - 2018 - 117mil params GPT2 - 2019 - 1.5 billion GPT 3.5 - 2022 - 175 billion paramaters

Intelligence will be common with AI???

”AI will take my job”

protocols are coming up for AI’s to exchange information.

vibecoding mentioned

you can ask AI how a colorblind person would see your website

more important

  • analytical judgement
  • flexibility
  • emotional intelligence

You cannot always trust AI

AI TOWN - farmville?

AI is based on humens, which means we can’t always trust it.

gemini was able to create nazi images, and they were all asian or black.

google enforcer inclusivity, so if you google doctor, it won’t only give men, even if there is more info on men.

RISKS:

  • harmful content and code
  • jailbreks & prompt injection attacks
  • hallucinations
  • IP infringement
  • Manipulation & human like behaviour

The people that still understand how to use AI whilst also understanding the risk

2 teens were arrested in the netherlands for hacking for russia

we need to do risk mitigation

teens have the best chance to learn to live with AI, whilst old people would need to adapt to it.

knbow how to work with or against it.

guess gandalfs password is a teaching tool for using GEN AI

AI is trying not to be shut down, we can see this in prompts. The more intelligent they become, this behaviour changes.

If we don’t understand this, we’ll have a problem.

GPT 5 is trainign GPT 6. (this might be a big hazard)

When do we get intelligence inside of robots

It can now sort things into trash bins based on your local rules.

know what are the risks of AGI, and don’t only stick with python

forethought is a website where you can know how to prepare yourself for AI.

Today is the slowest it will ever be.

Jurre Overgoor

USB Communication explained

  • Jurre Overgoor @ Topicus

jsr-80 is the way the java language evolves. it is a specification for usb support

but it is not really active.

i need to learn how usb works

we are learning about usb 2.0, nothing newer.

You can use Wireshark Wireshark uses LibPCap for usb

LibPCap can intercept packets on a high level.

Usb Sniffer

Usb host: controls communication, your laptop Usb peripheral: other USB devices to connect to a host Usb Hub: a special kind of peripheral that connects multiple usb peripherals

USB 2.0 uses 4 wires on a hardware layer

  • 1 red: VBUS
  • 2: White D+
  • 3: green D-
  • 4: black ground

USB is a tiered star topology

a star topology is 1 device that connects to other devices.

Tier 1 is always inside your laptop, the root. the other tiers are devices. the maximum of tiers is 7. this is for signal timing constraints for signal propagation.

The max devices per host is 127.

step 1: device discovery

Device enumeration. every peripheral has a device descriptor, a data structure containing info on the usb device. Vendor ID, Product ID, USB Revision

bNumConfigurations. every usb device has 1 or more configurations. Most only have 1.

Wifi sticks have 2 configurations.

USB Configuration descriptor:

  • power draw
  • bus powered / self powered
  • number of interfaces

bNumInterfaces is a grouping of functionality. Printer can print, scan, copy, fax. all functionality will be in different usb interface.

It is descibed in an usb interface descriptor.

bNumEndpoints is where the actual data is sent back and forth. Most are unidirectional.

every device has a maximum of 15 endpoints.

USB endpoint descriptor

  • data transfer type
  • direction (in or out, viewed from your pc)
  • max size
  • something

This is all you need to know to start communicating

step 2: communication

it goes through pipes.

A pipe is a software term, the state of the endpoint that u use to transfer

It has paramaters like bandwith, transfer type, data size and buffer size

IN/OUT are viewed from the host, so IN is going to your laptop

all information is Host initiated, unlike tcp where it can be both

OUT comm

  1. token phase: hey imma send some data
  2. data phase: here is data
  3. handshake phase: client: hey i received your data

IN comm

  1. token phase: hey i want to receive data
  2. data phase: client: here is data
  3. handshake phase: host: hey i received your data

BULK TRANSFER

it uses error correction.

bulk transfer is used for sending pdfs to printer

networking 101

bulk transfer uses spare un-allocated bandwidth.

control transfer is used for endpoint 0, you use it to query your device descriptors or configuration descriptors. enpoint 0 always exists. This is the only back aND FORTH COMM

Best effort delivery, if it fails, try again.

INTERRUPT TRANSFER

periodic small data info communication. USB mouse uses this. hey, what is you position.

poll rate is in the endpoint descriptor.

if you have anb usb mouse and a datastick, then you need to preallocate for the mouse, and use the rest for data transfer

there is error correction, but no retransmission

ISOCHRONOUS TRANSFER

periodic transfer, but more continuous. like a webcam. The webcam will keep sending frames untill it is told to stop. time sensitive info. there is no re-transmission.

There are vendor specific protocols over USB. it is not part of the USB standard.

USB/IP

it is a translation for usb over tcp, for using a webcam that you want to expose over the internet. this could be used for creating mocks or just for viewing your webcam on the cloud.

This is a linux project.