Home Blog Page 3

Widespread media processing operations with Jetpack Media3 Transformer



Widespread media processing operations with Jetpack Media3 Transformer

Posted by Nevin Mital – Developer Relations Engineer, and Kristina Simakova – Engineering Supervisor

Android customers have demonstrated an rising need to create, personalize, and share video content material on-line, whether or not to protect their reminiscences or to make folks snicker. As such, media enhancing is a cornerstone of many partaking Android apps, and traditionally builders have usually relied on exterior libraries to deal with operations akin to Trimming and Resizing. Whereas these options are highly effective, integrating and managing exterior library dependencies can introduce complexity and result in challenges with managing efficiency and high quality.

The Jetpack Media3 Transformer APIs supply a local Android answer that streamline media enhancing with quick efficiency, in depth customizability, and broad machine compatibility. On this weblog publish, we’ll stroll by way of a number of the commonest enhancing operations with Transformer and focus on its efficiency.

Getting arrange with Transformer

To get began with Transformer, try our Getting Began documentation for particulars on how you can add the dependency to your mission and a fundamental understanding of the workflow when utilizing Transformer. In a nutshell, you’ll:

    • Create one or many MediaItem cases out of your video file(s), then
    • Apply item-specific edits to them by constructing an EditedMediaItem for every MediaItem,
    • Create a Transformer occasion configured with settings relevant to the entire exported video,
    • and at last begin the export to avoid wasting your utilized edits to a file.

Apart: You can too use a CompositionPlayer to preview your edits earlier than exporting, however that is out of scope for this weblog publish, as this API continues to be a piece in progress. Please keep tuned for a future publish!

Right here’s what this seems like in code:

val mediaItem = MediaItem.Builder().setUri(mediaItemUri).construct()
val editedMediaItem = EditedMediaItem.Builder(mediaItem).construct()
val transformer = 
  Transformer.Builder(context)
    .addListener(/* Add a Transformer.Listener occasion right here for completion occasions */)
    .construct()
transformer.begin(editedMediaItem, outputFilePath)

Transcoding, Trimming, Muting, and Resizing with the Transformer API

Let’s now check out 4 of the most typical single-asset media enhancing operations, beginning with Transcoding.

Transcoding is the method of re-encoding an enter file right into a specified output format. For this instance, we’ll request the output to have video in HEVC (H265) and audio in AAC. Beginning with the code above, listed here are the traces that change:

val transformer = 
  Transformer.Builder(context)
    .addListener(...)
    .setVideoMimeType(MimeTypes.VIDEO_H265)
    .setAudioMimeType(MimeTypes.AUDIO_AAC)
    .construct()

Lots of you could already be acquainted with FFmpeg, a preferred open-source library for processing media information, so we’ll additionally embody FFmpeg instructions for every instance to function a useful reference. Right here’s how one can carry out the identical transcoding with FFmpeg:

$ ffmpeg -i $inputVideoPath -c:v libx265 -c:a aac $outputFilePath

The following operation we’ll strive is Trimming.

Particularly, we’ll set Transformer as much as trim the enter video from the three second mark to the 8 second mark, leading to a 5 second output video. Beginning once more from the code within the “Getting arrange” part above, listed here are the traces that change:

// Configure the trim operation by including a ClippingConfiguration to
// the media merchandise
val clippingConfiguration =
   MediaItem.ClippingConfiguration.Builder()
     .setStartPositionMs(3000)
     .setEndPositionMs(8000)
     .construct()
val mediaItem =
   MediaItem.Builder()
     .setUri(mediaItemUri)
     .setClippingConfiguration(clippingConfiguration)
     .construct()

// Transformer additionally has a trim optimization function we will allow.
// This may prioritize Transmuxing over Transcoding the place doable.
// See extra about Transmuxing additional down on this publish.
val transformer = 
  Transformer.Builder(context)
    .addListener(...)
    .experimentalSetTrimOptimizationEnabled(true)
    .construct()

With FFmpeg:

$ ffmpeg -ss 00:00:03 -i $inputVideoPath -t 00:00:05 $outputFilePath

Subsequent, we will mute the audio within the exported video file.

val editedMediaItem = 
  EditedMediaItem.Builder(mediaItem)
    .setRemoveAudio(true)
    .construct()

The corresponding FFmpeg command:

$ ffmpeg -i $inputVideoPath -c copy -an $outputFilePath

And for our ultimate instance, we’ll strive resizing the enter video by scaling it right down to half its unique peak and width.

val scaleEffect = 
  ScaleAndRotateTransformation.Builder()
    .setScale(0.5f, 0.5f)
    .construct()
val editedMediaItem =
  EditedMediaItem.Builder(mediaItem)
    .setEffects(
      /* audio */ Results(emptyList(), 
      /* video */ listOf(scaleEffect))
    )
    .construct()

An FFmpeg command might appear like this:

$ ffmpeg -i $inputVideoPath -filter:v scale=w=trunc(iw/4)*2:h=trunc(ih/4)*2 $outputFilePath

In fact, you can even mix these operations to use a number of edits on the identical video, however hopefully these examples serve to reveal that the Transformer APIs make configuring these edits easy.

Transformer API Efficiency outcomes

Listed below are some benchmarking measurements for every of the 4 operations taken with the Stopwatch API, operating on a Pixel 9 Professional XL machine:

(Be aware that efficiency for operations like these can rely on quite a lot of causes, akin to the present load the machine is below, so the numbers under must be taken as tough estimates.)

Enter video format: 10s 720p H264 video with AAC audio

  • Transcoding to H265 video and AAC audio: ~1300ms
  • Trimming video to 00:03-00:08: ~2300ms
  • Muting audio: ~200ms
  • Resizing video to half peak and width: ~1200ms

Enter video format: 25s 360p VP8 video with Vorbis audio

  • Transcoding to H265 video and AAC audio: ~3400ms
  • Trimming video to 00:03-00:08: ~1700ms
  • Muting audio: ~1600ms
  • Resizing video to half peak and width: ~4800ms

Enter video format: 4s 8k H265 video with AAC audio

  • Transcoding to H265 video and AAC audio: ~2300ms
  • Trimming video to 00:03-00:08: ~1800ms
  • Muting audio: ~2000ms
  • Resizing video to half peak and width: ~3700ms

One method Transformer makes use of to hurry up enhancing operations is by prioritizing transmuxing for fundamental video edits the place doable. Transmuxing refers back to the means of repackaging video streams with out re-encoding, which ensures high-quality output and considerably sooner processing occasions.

When not doable, Transformer falls again to transcoding, a course of that entails first decoding video samples into uncooked information, then re-encoding them for storage in a brand new container. Listed below are a few of these variations:

Transmuxing

    • Transformer’s most well-liked strategy when doable – a fast transformation that preserves elementary streams.
    • Solely relevant to fundamental operations, akin to rotating, trimming, or container conversion.
    • No high quality loss or bitrate change.

Transmux

Transcoding

    • Transformer’s fallback strategy in circumstances when Transmuxing is not doable – Includes decoding and re-encoding elementary streams.
    • Extra in depth modifications to the enter video are doable.
    • Loss in high quality as a result of re-encoding, however can obtain a desired bitrate goal.

Transcode

We’re repeatedly implementing additional optimizations, such because the not too long ago launched experimentalSetTrimOptimizationEnabled setting that we used within the Trimming instance above.

A trim is often carried out by re-encoding all of the samples within the file, however since encoded media samples are saved chronologically of their container, we will enhance effectivity by solely re-encoding the group of images (GOP) between the beginning level of the trim and the primary keyframes at/after the beginning level, then stream-copying the remainder.

Since we solely decode and encode a set portion of any file, the encoding latency is roughly fixed, no matter what the enter video period is. For lengthy movies, this improved latency is dramatic. The optimization depends on having the ability to sew a part of the enter file with newly-encoded output, which implies that the encoder’s output format and the enter format should be appropriate.

If the optimization fails, Transformer robotically falls again to regular export.

What’s subsequent?

As a part of Media3, Transformer is a local answer with low integration complexity, is examined on and ensures compatibility with all kinds of units, and is customizable to suit your particular wants.

To dive deeper, you’ll be able to discover Media3 Transformer documentation, run our pattern apps, or discover ways to complement your media enhancing pipeline with Jetpack Media3. We’ve already seen app builders profit significantly from adopting Transformer, so we encourage you to strive them out your self to streamline your media enhancing workflows and improve your app’s efficiency!

swift – iOS Credit score Card Autofill Not Working Regardless of Setting Correct TextContentTypes


I am making an attempt to implement bank card autofill in my iOS app utilizing the advisable textContentType properties, however the autofill performance is not working in any respect.

I’ve arrange my textual content fields as follows:

cardNumberField.textContentType = .creditCardNumber
nameOnCardField.textContentType = .title
expirationDateField.textContentType = .creditCardExpiration 
securityCodeField.textContentType = .creditCardSecurityCode

Nevertheless, once I faucet on these fields, iOS would not present any autofill solutions for saved bank cards.

What I’ve Tried

  • Made positive I am utilizing iOS 14+ for the expiration and safety code fields
  • Verified that I’ve bank cards saved in Safari’s Autofill settings
  • Double-checked that each one fields are editable and enabled
  • Confirmed the fields are correctly added to the view hierarchy
  • Examined on a bodily system (iPhone 12, iOS 15.5)

Related Code

override func viewDidLoad() {
    tremendous.viewDidLoad()
    
    // Arrange textual content area content material sorts for bank card autofill
    cardNumberField.textContentType = .creditCardNumber
    nameOnCardField.textContentType = .title
    
    if #obtainable(iOS 14.0, *) {
        expirationDateField.textContentType = .creditCardExpiration
        securityCodeField.textContentType = .creditCardSecurityCode
    }
    
    // Set keyboard sorts appropriately
    cardNumberField.keyboardType = .numberPad
    expirationDateField.keyboardType = .numberPad
    securityCodeField.keyboardType = .numberPad
    securityCodeField.isSecureTextEntry = true
}

Surroundings

  • iOS 15.5
  • Xcode 14.2
  • Swift 5.7
  • Testing on bodily system (not simulator)

Query

What may very well be stopping the bank card autofill performance from working regardless of setting the right textContentType values? Is there any extra configuration wanted past setting these properties?

Veeam Report Finds Ransomware Is Nonetheless Thriving


Veeam lately held its person occasion, VeeamON 2025, in San Diego. The annual present has been utilized by the info resilience market chief to announce new merchandise and improvements to the 1000’s of attendees. One mainstay of the occasion has been the discharge of Veeam’s state of ransomware report that highlights key tendencies and the way the combat in opposition to this development is progressing.

With the RSAC safety present on faucet, I believed it made sense to have a look at the highlights of the report and implications to safety groups. Probably the most obvious information level is how prevalent ransomware is immediately. Almost 70% of firms have skilled a ransomware assault prior to now 12 months, barely down from 75% the 12 months earlier than. Do not be fooled by this enchancment. Ransomware has superior, cybercriminals are smarter and corporations have a tougher time recovering from ransomware assaults, in line with Veeam’s “2025 Ransomware Traits & Proactive Methods” report.

The report, primarily based on a survey of 1,300 organizations worldwide, uncovered a serious shift in how cybercriminals function. They’re skipping their common tactic of locking down methods, going straight for information theft as a substitute. The brand new tactic is to interrupt right into a community, extract delicate information, corresponding to monetary information or mental property, after which threaten to launch it except a ransom is paid. These exfiltration-only assaults occur quick and are tougher to detect, particularly when firms have weak safety.

Associated:Id Authentication: How Blockchain Places Customers In Management

It isn’t simply the techniques which have modified, but in addition the teams finishing up ransomware assaults. In 2024, world legislation enforcement took down teams corresponding to LockBit, BlackCat and Black Basta. This enforcement brought about smaller teams to kind, a lot of which now give attention to mid-sized companies with weaker defenses.

These cybercriminals are additionally launching assaults a lot sooner. Final 12 months, for instance, two of the highest ransomware teams carried out assaults in lower than 24 hours after gaining entry. Traditionally, risk actors would break into an atmosphere, and it might take weeks and even months to find out what information to steal. The accelerated velocity of entry to theft removes more often than not safety groups have to search out the anomalies that might result in indicators of compromise.

One constructive development is that fewer firms are giving in to ransom calls for. In 2024, 36% of victims refused to pay in any respect, and plenty of who did managed to barter a lot decrease funds. On common, 82% of those that paid ended up paying lower than the unique demand. The everyday ransom dropped by almost half, hitting a low of $110,000 by the top of 2024.

Firms that labored with incident response specialists have been far much less more likely to pay, proving how necessary outdoors assist might be throughout a disaster. It is exhausting to name this a win, however a minimum of the monetary harm is minimized — though one might argue the dangerous actors are making it up in quantity.

One development I’ve seen over time is that paying a ransom would not assure security, and the Veeam report bore that out. It discovered 69% of firms that paid a ransom have been attacked once more. Moreover, new legal guidelines and worldwide efforts are discouraging funds altogether. The Worldwide Counter Ransomware Initiative, backed by 68 international locations, is pushing organizations to strengthen defenses relatively than fund cybercriminals. Some governments have even banned public sector ransom funds.

The actual problem comes with restoration. That is the place many firms fall brief. Nearly all of the survey respondents — 89% — stated attackers focused their backups. On common, a 3rd of these backups have been tampered with or deleted. Fewer than 10% recovered 90% of their servers on time, and barely half recovered most of their methods in any respect.

Do not Skip the Finest Practices

Why is restoration so troublesome? Many firms skip fundamental finest practices. Solely 32% used immutable backups that may’t be altered, whereas 28% examined their restored information in a protected atmosphere earlier than bringing methods again on-line. Shockingly, almost 40% restored information immediately into reside environments with out checking for malware, opening the door to reinfection and prolonged downtime.

I’ve talked to CISO after CISO who has confessed that they restored contaminated information, which then led to a different breach and one other ransomware request. It’s vital that firms have an immutable copy of unpolluted information to recuperate from.

Whereas expertise is important, the report highlighted how usually firms underestimate the necessary position individuals play in ransomware response. Solely 26% had a transparent course of for deciding whether or not to pay a ransom, and 30% had an outlined chain of command for dealing with assaults. Over a 3rd of firms let inner workers talk immediately with cybercriminals, as a substitute of bringing in skilled negotiators, which is dangerous.

Though 98% of firms had a ransomware response plan, lower than half included key particulars like verified backups (44%), clear backup copies (44%), various infrastructure (37%), containment plans (32%) or a transparent chain of command (30%). The businesses that recovered quickest have been those that had these particulars locked down and practiced their response forward of time.

Most firms acknowledge they should do higher. Almost all of these surveyed stated they plan to extend their budgets for each prevention and restoration in 2025. Nonetheless, Veeam warned that throwing cash on the drawback is not sufficient. Ransomware is not one thing firms can fully keep away from. The actual distinction comes right down to resilience, that means how rapidly and successfully an organization can get again on its ft after an assault.

The businesses that recuperate rapidly make certain their backups are locked down and clear earlier than restoring something. In addition they do not solely depend on their IT groups to combat fires. They spend money on good safety habits, corresponding to updating methods, limiting entry and utilizing higher detection instruments. Lastly, they do not deal with the whole lot on their very own. They rent incident response groups and negotiators who know easy methods to handle the scenario.

In different phrases, the businesses that bounce again quickest are those that plan forward, do not lower corners in relation to safety and know when to ask for assist.



Get in gear for warehouse automation on the Robotics Summit & Expo

0


Craig Van den Avont of GAM Enterprises will discuss the importance of gear and other components of warehouse automation at the 2025 Robotics Summit & Expo.

Provide chains across the globe face challenges together with financial uncertainty, labor shortages, and expectations of fast and reasonably priced order success. Automation guarantees to assist, however robotics builders and suppliers should to work carefully with warehouse operators to deal with their wants. On the Robotics Summit & Expo subsequent week, GAM Enterprises Inc. will share report findings on present warehouse developments and its experiences within the movement management market.

From fastened automation resembling conveyors and sortation techniques to the newest autonomous cell robots (AMRs) and automatic storage and retrieval techniques (ASRS), the market is scorching, with vital alternatives for each established robotics suppliers and startups. On the identical time, robotics suppliers have to make sure that their techniques are strong and versatile sufficient to satisfy rising demand, notably in e-commerce and third-party logistics (3PL).

The correct motion-control applied sciences are important for functions together with order choosing and consolidation, palletizing, put-away, and goods-to-person (G2P) supplies dealing with, famous GAM. As robotic arms and carry vans enhance their payload and attain, they require larger torque capability, better stability, and the flexibility to maneuver — and cease — rapidly and easily.

From best-in-class elements to a holistic strategy to the warehouse or distribution middle as a system, gearboxes may help meet heightened demand for precision, repeatability, and security. Integrators and finish customers want to pay attention to current processes, the circulation of products, and interactions amongst associates and tools resembling forklifts and robots.

This session on “Assembly Warehouse Calls for: Robotics, Movement Management, and Gearbox Methods for Smarter Automation” within the Robotics Summit & Expo Engineering Theater will look at the next issues for builders:

  • Figuring out utility necessities and course of flexibility
  • The varieties of robots which can be presently out there
  • Guaranteeing that elements meet efficiency expectations
  • How to decide on a trusted provider/associate
  • Configurability and customization
  • Specialised techniques versus general-purpose ones, such because the promise of humanoids

Automation skilled to deal with warehouse robotics

Craig Van den Avont is president at GAM Enterprises. In 1998, he was a founding father of GAM Gear LLC. Over time, the corporate grew from a startup to a market chief.

Van den Avont led the firm to implement full manufacturing at its location in Mount Prospect, Sick., and he’s pleased with GAM’s position in bringing manufacturing again to the U.S. Craig can also be the board chairman for the Illinois Manufacturing Excellence Heart (IMEC).

IMEC is the official Illinois consultant of the Manufacturing Extension Partnership (MEP) community underneath the U.S. Division of Commerce and the Nationwide Institute of Requirements and Know-how (NIST). The MEP Nationwide Community is a public-private partnership that delivers complete, confirmed options to U.S. producers, fueling progress and advancing U.S. manufacturing.

IMEC is devoted to offering producers in Illinois with the instruments and strategies to create sustainable aggressive futures within the world market.

Previous to GAM Enterprises, Van den Avont was the chief engineer at Rexroth-Indramat (now Bosch-Rexroth), a German producer of servo-based movement management techniques utilized in manufacturing facility automation. He began as a mechanical engineer on the firm and was promoted to chief engineer in solely 4 years.

Earlier than Rexroth, Craig was a design engineer at McDonnell Douglas, the place he labored on the DC-9/MD-80 plane on the Douglas plant in Lengthy Seaside, Calif.

Born and raised within the Chicago space, Van den Avont earned his BS in aeronautical-astronautical engineering from the College of Illinois in Urbana-Champaign and his MBA from DePaul College. Craig is captivated with U.S. manufacturing and actively works to advertise its success on an area, nationwide, and world degree. He has participated in a roundtable dialogue with the U.S. Division of Commerce Manufacturing Council’s Sub-Committee on Innovation and Analysis and Growth.

Van den Avont has been acknowledged by the Northwest Academic Council for Pupil Success (NESS) for GAM’s involvement with the native center, secondary, and post-secondary colleges, serving to to advertise careers in STEM (science, expertise, engineering, and arithmetic) and manufacturing.

Concerning the 2025 Robotics Summit & Expo

The Robotics Summit & Expo will convey collectively greater than 5,000 attendees targeted on constructing robots for numerous industrial industries. Attendees can achieve insights into the newest enabling applied sciences, engineering finest practices, rising developments, and extra.

Keynote audio system will embrace:

The present could have greater than 50 instructional periods in tracks on AI, design and growth, enabling applied sciences, healthcare, and logistics. The Engineering Theater on the present ground may even function displays by trade specialists.

The expo corridor will function over 200 exhibitors showcasing the newest enabling applied sciences, merchandise, and companies that may assist robotics engineers all through their growth journeys.

The Robotics Summit additionally provides quite a few networking alternatives, a Profession Truthful, a robotics growth problem, the RBR50 Robotics Innovation Awards Gala, and extra.

Registration is now open.


SITE AD for the 2025 Robotics Summit registration.
Register now so you do not miss out!


Women Energy Tech Evokes the Subsequent Era of Tech Leaders


The way forward for expertise is shiny, particularly after the resounding success of the seventh annual Cisco Women Energy Tech, held on the Cisco campus in Richardson, Texas, on April 17, 2025!

Girls Power Tech Event Leaders standing together
Women Energy Tech Leaders

This impactful occasion linked 73 shiny younger college students with the huge potential of STEM, supported by 13 devoted educators. These proficient contributors hail from Cisco Networking Academy faculties, a strategic partnership that enables us to successfully attain and encourage the following era of tech professionals.

What’s Women Energy Tech?

In celebration of Worldwide Women in Data and Communication Know-how (ICT) Day, Cisco Richardson hosts Networking Academies throughout the North Texas Metroplex, providing college students a full day of empowerment, studying, and satisfying actions. This occasion blends inspiring talks, hands-on labs, mentorship, and networking into an interesting and academic expertise.

Women Energy Tech is extra than simply an occasion. It’s a motion devoted to empowering women and younger girls to pursue careers in expertise and bridge the gender hole in STEM. We’re cultivating the following era of innovators, problem-solvers, and tech leaders.

A day of inspiration and exploration

Inspiring messages

The day kicked off with an inspiring keynote handle from Melissa Kraft, the CIO of the Metropolis of Frisco. She shared her tech journey, highlighting its energy and boundless alternatives, and delivered a profound message to the younger girls:

“Tech is highly effective. YOU make it significant. Bear in mind, you belong on this house.”
—Melissa Kraft, CIO, Metropolis of Frisco

Constructing on this momentum, the ladies then engaged in a considerate dialogue, sharing their private inspirations and what sparks their curiosity inside the world of expertise.

Following the keynote, Veronica Valladarez, Cisco Account Government – Portfolio, delivered an inspiring handle.

She vividly shared the outstanding story of Cisco co-founder Sandy Lerner and her resilient journey of turning adversity into a brand new, profitable enterprise. Veronica then linked this to the ladies’ potential by her empowering message:

“Rejection is simply redirection. True innovators make NEW worlds when the outdated ones don’t settle for them.”
—Veronica Valladarez, Account Government, Cisco Portfolio

Her phrases deeply resonated, fostering self-belief and resilience to encourage the younger girls to worth their distinctive views.

Partaking actions

To interrupt the ice and foster connections, the attendees participated in a full of life Networking Bingo Sport. This enjoyable and interactive exercise inspired college students to step exterior their consolation zones, meet new folks, and uncover shared pursuits, constructing a supportive and collaborative ambiance proper from the beginning.

To present our shiny younger attendees a style of various sides of expertise and join them with inspiring position fashions, we ran our labs and velocity mentoring classes in a dynamic rotation.

  • AI Lab: Suited to Victory – Younger minds explored the fundamentals of synthetic intelligence by a hands-on experiment. On this exercise, they skilled a mannequin to categorise fits of playing cards utilizing their webcam. They explored how algorithms be taught, experimented with picture recognition software program, and even brainstormed how AI may very well be used to unravel real-world issues.
  • Sphero Lab: Maze Mayhem – College students realized to program and management revolutionary programmable robotic balls by a LEGO maze. This hands-on expertise helped foster problem-solving abilities, creativity, and a deeper understanding of programming rules.
  • Velocity Mentoring – This offered a useful alternative for the scholars to attach with a various group of achieved professionals from numerous tech fields. The rapid-fire, targeted conversations allowed the younger girls to ask questions, acquire insights into completely different profession paths, and obtain customized recommendation and encouragement.

The day culminated in an Awards ceremony, celebrating the contributors’ enthusiasm, engagement, and newfound information. The grins on the scholars’ faces as they acquired recognition have been a testomony to the occasion’s impression.

Extra than simply tech

Women Energy Tech isn’t nearly technical abilities; it’s about constructing a robust, supportive neighborhood the place younger girls really feel empowered, assured, and know their voices and concepts are valued.

We have been significantly moved by the conversations we overheard – women sharing their aspirations and inspiring one another to pursue their desires fearlessly. This sense of camaraderie and mutual help is precisely what Women Energy Tech goals to domesticate.

What attendees stated

“My favourite a part of the occasion was getting to attach one-on-one with the unimaginable folks from Cisco. I beloved listening to everybody’s profession trajectories because it gave me a lot perspective—it helped me keep grounded in my very own imaginative and prescient whereas eager about all the probabilities forward. My greatest takeaway was the significance of staying open-minded and dedicated to steady studying. I noticed that mindset can open doorways you didn’t even know existed!”
—Jassmin

“I used to be scared, all the time asking myself, ‘What if it’s exhausting? However you guys confirmed me what it means to work in expertise and what it will possibly do for the folks. You confirmed me that, regardless of my pursuits, tech all the time has a spot for somebody. I thanks for all you have got carried out!”
—Aaliya

“Thanks for internet hosting this nice occasion. It was inspiring and really helpful. The wonderful mentors I’ve met by networking have considerably modified my life choices. As an immigrant, I don’t have a lot steering in these points of my profession, and this occasion was a fantastic alternative for me. Thanks!”
—Nameless Thank-You Be aware

Trying forward

Women Energy Tech 2025 was an funding sooner or later. It was a day when younger girls found their potential, linked with position fashions, and realized {that a} profession in expertise shouldn’t be solely potential but additionally extremely thrilling and significant. The vitality and enthusiasm witnessed all through the day left little question that the way forward for tech is in shiny fingers. We are able to’t wait to see the wonderful issues these younger girls will obtain!

To make sure the continued success and progress of this annual Women Energy Tech occasion, we persistently want devoted leaders to help with coordination, supportive companions to fund partaking actions, and impactful audio system to encourage our attendees.

If you’re excited by getting concerned, e mail us.

Thanks to everybody who made it potential

Our honest gratitude to The Batiste Undertaking for our Tech labs, and to our Cisco Inclusive Group sponsors, Ladies in Science and Engineering (WISE) and Conexión LatinX Community.

A heartfelt due to the 13 devoted educators, two inspiring audio system, 40 enthusiastic volunteers, 11 dedicated Women Energy Tech leaders, and particularly the sensible women who participated. You all introduced the imaginative and prescient of Women Energy Tech to life.

What was your favourite a part of Women Energy Tech 2025? Share your ideas and photographs utilizing #GirlsPowerTech2025!


5 Empowering Ideas for ICT Profession Success

 Join Cisco U. | Be a part of the Cisco Studying Community.

Comply with Cisco Studying & Certifications

X | Threads | Fb | LinkedIn | Instagram | YouTube

Use #CiscoU and #CiscoCert to affix the dialog.

Share: