{"version":"1.0","provider_name":"2020 Summit","provider_url":"https:\/\/embeddedvisionsummit.com\/2020","title":"Federated Edge Computing System Architectures - 2020 Summit","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"IQErb7zyBW\"><a href=\"https:\/\/embeddedvisionsummit.com\/2020\/session\/federated-edge-computing-system-architectures\/\">Federated Edge Computing System Architectures<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/embeddedvisionsummit.com\/2020\/session\/federated-edge-computing-system-architectures\/embed\/#?secret=IQErb7zyBW\" width=\"600\" height=\"338\" title=\"&#8220;Federated Edge Computing System Architectures&#8221; &#8212; 2020 Summit\" data-secret=\"IQErb7zyBW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/embeddedvisionsummit.com\/2020\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/embeddedvisionsummit.com\/2020\/wp-content\/uploads\/sites\/7\/2020\/06\/SpeakerCard_Krishnamoorthy.jpg","thumbnail_width":1600,"thumbnail_height":837,"description":"With ever-increasing amounts of video and other sensor data, and growing requirements for privacy and low latency, inferencing at the edge is increasingly attractive. But there are many ways to allocate and coordinate computing resources for edge inferencing. For example, [&hellip;]"}