Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
The Insider's Guide to Arm Cortex-M Development

You're reading from   The Insider's Guide to Arm Cortex-M Development Leverage embedded software development tools and examples to become an efficient Cortex-M developer

Arrow left icon
Product type Paperback
Published in Oct 2022
Publisher Packt
ISBN-13 9781803231112
Length 276 pages
Edition 1st Edition
Arrow right icon
Authors (3):
Arrow left icon
Jason Andrews Jason Andrews
Author Profile Icon Jason Andrews
Jason Andrews
Pareena Verma Pareena Verma
Author Profile Icon Pareena Verma
Pareena Verma
Zachary Lusiak Zachary Lusiak
Author Profile Icon Zachary Lusiak
Zachary Lusiak
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Part 1: Get Set Up
2. Chapter 1: Selecting the Right Hardware FREE CHAPTER 3. Chapter 2: Selecting the Right Software 4. Chapter 3: Selecting the Right Tools 5. Part 2: Sharpen Your Skills
6. Chapter 4: Booting to Main 7. Chapter 5: Optimizing Performance 8. Chapter 6: Leveraging Machine Learning 9. Chapter 7: Enforcing Security 10. Chapter 8: Streamlining with the Cloud 11. Chapter 9: Implementing Continuous Integration 12. Chapter 10: Looking Ahead 13. Index 14. Other Books You May Enjoy

Leveraging Machine Learning

ML applications have grown to dominate in highly visible and enterprise-scale uses today: Google search results, Facebook/Instagram/TikTok/Twitter sorting algorithms, YouTube’s suggested content, Alexa/Siri voice assistants, internet advertising, and more. These use cases all host their ML models and perform their inferences in the cloud, then show the results to us as end users on our edge devices such as phones, tablets, or smart speakers. This paradigm is beginning to change, with more models being stored (and inferences being run) on the edge devices themselves. The shift to processing at the edge removes the need for transmission to and storage in the cloud, and as a result, provides the benefits listed here:

  • Enhanced security: Reducing attack vectors
  • Enhanced privacy: Reducing the sharing of data
  • Enhanced performance: Reducing application latency

This chapter is intended to give an overview and practical guide for using...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image