<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Ncedia]]></title><description><![CDATA[This blog is a space for exploring how modern technology actually gets built, connected, and used in the real world.]]></description><link>https://blog.ncedia.se</link><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 02:26:54 GMT</lastBuildDate><atom:link href="https://blog.ncedia.se/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Exploring the Ways to Build AI Agents across Technologies]]></title><description><![CDATA[Overview of AI Agent Building Technologies
AI agents have become central to modern workflows, aiding developers and businesses by automating complex tasks. Various platforms have emerged to support this transformation, providing unique capabilities a...]]></description><link>https://blog.ncedia.se/exploring-the-ways-to-build-ai-agents-across-technologies</link><guid isPermaLink="true">https://blog.ncedia.se/exploring-the-ways-to-build-ai-agents-across-technologies</guid><category><![CDATA[ai agents]]></category><category><![CDATA[Automated Workflows]]></category><category><![CDATA[Logic Apps]]></category><category><![CDATA[microsoft cloud]]></category><category><![CDATA[n8n]]></category><dc:creator><![CDATA[Jonas Nilsson]]></dc:creator><pubDate>Sun, 28 Dec 2025 10:47:51 GMT</pubDate><enclosure url="https://raw.githubusercontent.com/Ncedia/blog-assets/main/751606.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-overview-of-ai-agent-building-technologies">Overview of AI Agent Building Technologies</h2>
<p>AI agents have become central to modern workflows, aiding developers and businesses by automating complex tasks. Various platforms have emerged to support this transformation, providing unique capabilities and abstractions above foundational AI services. This article dives into tools provided by Microsoft like Copilot, Logic Apps Agent Loop, and Foundry Agent Builder, as well as non-Microsoft solutions like n8n and GPT Agent Builder.</p>
<hr />
<h2 id="heading-microsoft-built-ai-agent-technologies">Microsoft-Built AI Agent Technologies</h2>
<h3 id="heading-microsoft-365-copilot">Microsoft 365 Copilot</h3>
<p>Microsoft's Copilot technology integrates deeply into the Microsoft Office 365 ecosystem, leveraging Azure's large language models and Microsoft Graph for contextual insights. <strong>Architecture Design:</strong></p>
<ul>
<li><strong>Entry-point:</strong> Users interface via prompts in productivity apps like Word or Excel.</li>
<li><strong>Core AI Logic:</strong> Powered by Azure OpenAI Service, enabling dynamic prompt handling.</li>
<li><strong>Data Layer:</strong> Contextual data is fetched from Microsoft Graph with relevant access controls.</li>
</ul>
<h4 id="heading-whats-unique">What's Unique?</h4>
<p>Copilot bridges generic functionalities and enterprise-grade confidentiality for legal, productivity, and security use-cases. Its integration with Microsoft Teams enables real-time AI-powered suggestions during collaboration.</p>
<h3 id="heading-agent-loop-in-azure-logic-apps">Agent Loop in Azure Logic Apps</h3>
<p>Agent Loop assists in creating dynamic workflows using Azure Logic Apps. The Agent Loop allows iterative actions, decision making, and complex multi-step task orchestration.</p>
<h4 id="heading-architectural-insights">Architectural Insights:</h4>
<ol>
<li><strong>Logic Integration:</strong> Uses existing Azure Logic Apps connectors (over 1400+ prebuilt integrations).</li>
<li><strong>Dynamic Logic Loop:</strong> Supports conditional iterations and parallel logic paths via low-code approaches.</li>
<li><strong>Custom AI Actions:</strong> Easily integrate models like GPT via Azure OpenAI tools to expand agent logic.</li>
</ol>
<h4 id="heading-advantages">Advantages:</h4>
<p>Agent Loop thrives in scenarios requiring decision-making under ambiguous states or automation that evolves based on runtime outputs.</p>
<h3 id="heading-foundry-agent-builder">Foundry Agent Builder</h3>
<p>The Foundry Agent Builder excels in producing lightweight AI workflows for scalable solutions.</p>
<h4 id="heading-architecture-model">Architecture Model</h4>
<p>Operates atop Azure services, offering SDK support for languages like Python, TypeScript, and C#. The builder provides a centralized platform for training, deploying, and managing agents. </p>
<h4 id="heading-highlights">Highlights:</h4>
<ol>
<li><strong>Quick Deployment:</strong> No-code interfaces for rapid workflows creation.</li>
<li><strong>Scalable:</strong> Integrates with Azure Machine Learning for model optimization and scaling.</li>
</ol>
<hr />
<h2 id="heading-non-microsoft-alternatives">Non-Microsoft Alternatives</h2>
<h3 id="heading-gpt-agent-builder-by-openai">GPT Agent Builder (by OpenAI)</h3>
<p>OpenAI's GPT Agent Builder, popularly launched as AgentKit, empowers developers to deploy agents updated with cutting-edge models like GPT-4 Turbo. The platform supports visual workflow design with minimal coding required.</p>
<h4 id="heading-key-features">Key Features:</h4>
<ul>
<li>Chain-of-thought reasoning and model combinations (e.g., GPT + external APIs).</li>
<li>No-cost sandboxing; cost applies upon running inference tasks.</li>
<li>Prebuilt templates simplify setting up advanced conversational agents.</li>
</ul>
<h3 id="heading-n8n">n8n</h3>
<p>n8n provides a low-code automation tool with robust integrations.</p>
<h4 id="heading-architectural-layout">Architectural Layout:</h4>
<ul>
<li>Built-in workflows and error handling for agents.</li>
<li>Plugin support allowing integration of NLP engines like OpenAI or Hugging Face.</li>
<li>Community-contributed nodes enable customization at scale.</li>
</ul>
<h3 id="heading-strengths">Strengths:</h3>
<ul>
<li>Enables both generic automation and AI workflows.</li>
<li>Easy adoption for non-developers via drag-and-drop GUI for workflow creation.</li>
<li>Extensive community resources and example workflows.</li>
</ul>
<hr />
<h2 id="heading-core-abstractions-across-platforms">Core Abstractions Across Platforms</h2>
<p>While these platforms vary in scope, their architectures align on foundational technologies like:</p>
<ol>
<li><strong>AI Models:</strong> GPT is often the backbone, extended by self-hosted adaptations on cloud services.</li>
<li><strong>Workflow Engines:</strong> Tools like Logic Apps or n8n provide user-friendly design, empowering both developers and business users.</li>
<li><strong>Custom Connectors:</strong> All platforms offer integration possibilities with datasets, APIs, and cloud services.</li>
</ol>
<p>Choosing the right tool often depends on the target user—low-code solutions like n8n are excellent for beginners, while Foundry is better suited for developers seeking more control.</p>
<hr />
<h2 id="heading-conclusion">Conclusion</h2>
<p>AI agent builders offer flexibility, scalability, and robust integrations. Their comprehensive architectures support a wide array of use cases, from enterprise-level automation with tools like Copilot and Foundry, to open, customizable platforms like n8n. Thoroughly evaluate your specific project requirements—data security, coding expertise, or automation complexity—before selecting the right tool.</p>
<hr />
<p>Explore these platforms, and start your journey of creating smarter, more agile systems today.</p>
]]></content:encoded></item><item><title><![CDATA[A Comprehensive Comparison of Xiao ESP32 Models in 2025]]></title><description><![CDATA[Overview of Xiao ESP32 Lineup in 2025
The Xiao ESP32 series continues to be a popular choice for embedded developers thanks to its compact size, powerful features, and versatility. In 2025, the Xiao ESP32 family has expanded with several variants tar...]]></description><link>https://blog.ncedia.se/a-comprehensive-comparison-of-xiao-esp32-models-in-2025</link><guid isPermaLink="true">https://blog.ncedia.se/a-comprehensive-comparison-of-xiao-esp32-models-in-2025</guid><category><![CDATA[xiao]]></category><category><![CDATA[2025]]></category><category><![CDATA[embedded]]></category><category><![CDATA[ESP32]]></category><category><![CDATA[iot]]></category><dc:creator><![CDATA[Jonas Nilsson]]></dc:creator><pubDate>Tue, 23 Dec 2025 13:25:10 GMT</pubDate><enclosure url="https://raw.githubusercontent.com/Ncedia/blog-assets/main/656544.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-overview-of-xiao-esp32-lineup-in-2025">Overview of Xiao ESP32 Lineup in 2025</h2>
<p>The Xiao ESP32 series continues to be a popular choice for embedded developers thanks to its compact size, powerful features, and versatility. In 2025, the Xiao ESP32 family has expanded with several variants targeting different use cases ranging from IoT devices to advanced AI edge applications.</p>
<h2 id="heading-key-models-compared">Key Models Compared</h2>
<h3 id="heading-1-xiao-esp32-basic">1. Xiao ESP32 Basic</h3>
<ul>
<li><strong>CPU:</strong> Dual-core Xtensa LX6, up to 240 MHz</li>
<li><strong>RAM:</strong> 520KB SRAM</li>
<li><strong>Flash:</strong> 4MB</li>
<li><strong>Connectivity:</strong> Wi-Fi 802.11 b/g/n, Bluetooth 5.0</li>
<li><strong>I/O:</strong> GPIOs, ADC, DAC, SPI, I2C, UART</li>
<li><strong>Use Case:</strong> General-purpose IoT, sensor nodes</li>
</ul>
<h3 id="heading-2-xiao-esp32-s3">2. Xiao ESP32-S3</h3>
<ul>
<li><strong>CPU:</strong> Dual-core Xtensa LX7, up to 240 MHz</li>
<li><strong>AI Acceleration:</strong> Vector instructions for neural network acceleration</li>
<li><strong>RAM:</strong> 512KB SRAM</li>
<li><strong>Flash:</strong> 8MB</li>
<li><strong>Connectivity:</strong> Wi-Fi 6 (802.11 ax), Bluetooth 5.2</li>
<li><strong>I/O:</strong> Enhanced GPIOs, SPI, I2C, UART, CAN</li>
<li><strong>Use Case:</strong> AI edge devices, advanced voice recognition, and vision</li>
</ul>
<h3 id="heading-3-xiao-esp32-c6">3. Xiao ESP32-C6</h3>
<ul>
<li><strong>CPU:</strong> Single-core RISC-V, up to 160 MHz</li>
<li><strong>Connectivity:</strong> Wi-Fi 6 (802.11 ax), Bluetooth 5.2, IEEE 802.15.4 (Thread)</li>
<li><strong>RAM:</strong> 400KB SRAM</li>
<li><strong>Flash:</strong> 2MB</li>
<li><strong>I/O:</strong> GPIO, SPI, I2C, UART</li>
<li><strong>Use Case:</strong> Low-power mesh networking, smart agriculture, home automation</li>
</ul>
<h3 id="heading-4-xiao-esp32-c3">4. Xiao ESP32-C3</h3>
<ul>
<li><strong>CPU:</strong> Single-core RISC-V, up to 160 MHz</li>
<li><strong>Connectivity:</strong> Wi-Fi 4 (802.11 n), Bluetooth 5.0</li>
<li><strong>RAM:</strong> 400KB SRAM</li>
<li><strong>Flash:</strong> 4MB</li>
<li><strong>I/O:</strong> GPIO, SPI, I2C, UART</li>
<li><strong>Use Case:</strong> Low cost, secure IoT devices, sensor gateways</li>
</ul>
<h2 id="heading-comparison-summary">Comparison Summary</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Feature</td><td>ESP32 Basic</td><td>ESP32-S3</td><td>ESP32-C6</td><td>ESP32-C3</td></tr>
</thead>
<tbody>
<tr>
<td>CPU</td><td>Dual-core LX6</td><td>Dual-core LX7</td><td>Single-core RISC-V</td><td>Single-core RISC-V</td></tr>
<tr>
<td>Max Frequency</td><td>240 MHz</td><td>240 MHz</td><td>160 MHz</td><td>160 MHz</td></tr>
<tr>
<td>RAM</td><td>520 KB</td><td>512 KB</td><td>400 KB</td><td>400 KB</td></tr>
<tr>
<td>Flash</td><td>4 MB</td><td>8 MB</td><td>2 MB</td><td>4 MB</td></tr>
<tr>
<td>Wi-Fi Standard</td><td>802.11 b/g/n</td><td>Wi-Fi 6 (ax)</td><td>Wi-Fi 6 (ax)</td><td>Wi-Fi 4 (n)</td></tr>
<tr>
<td>Bluetooth Version</td><td>5.0</td><td>5.2</td><td>5.2</td><td>5.0</td></tr>
<tr>
<td>AI Acceleration</td><td>None</td><td>Yes (vector instr.)</td><td>None</td><td>None</td></tr>
<tr>
<td>Target Use Case</td><td>General IoT</td><td>AI, Vision, Voice</td><td>Mesh networks</td><td>Low-cost IoT</td></tr>
</tbody>
</table>
</div><h2 id="heading-choosing-the-right-model">Choosing the Right Model</h2>
<ul>
<li><strong>For AI and advanced applications:</strong> Xiao ESP32-S3 is the most capable option thanks to AI acceleration and latest connectivity.</li>
<li><strong>For low-power mesh and Thread network:</strong> ESP32-C6 excels with RISC-V efficiency and IEEE 802.15.4 support.</li>
<li><strong>For basic IoT needs and legacy compatibility:</strong> ESP32 Basic remains a solid choice.</li>
<li><strong>For budget-oriented devices:</strong> ESP32-C3 offers a compact and affordable solution with robust connectivity.</li>
</ul>
<h2 id="heading-conclusion">Conclusion</h2>
<p>The Xiao ESP32 models in 2025 cater to a broad spectrum of embedded applications with varied CPU architectures, connectivity options, and performance levels. Understanding these distinctions will help developers select the ideal platform for their specific project requirements.</p>
]]></content:encoded></item><item><title><![CDATA[Understanding BLE Sensors and Encrypted Payloads]]></title><description><![CDATA[Introduction to BLE Sensors
Bluetooth Low Energy (BLE) sensors are critical components in modern IoT ecosystems. They provide low-power, wireless data transmission capabilities suitable for a wide range of applications, including health monitoring, a...]]></description><link>https://blog.ncedia.se/understanding-ble-sensors-and-encrypted-payloads</link><guid isPermaLink="true">https://blog.ncedia.se/understanding-ble-sensors-and-encrypted-payloads</guid><category><![CDATA[ble]]></category><category><![CDATA[encryption]]></category><category><![CDATA[iot]]></category><category><![CDATA[sensors]]></category><category><![CDATA[wireless]]></category><dc:creator><![CDATA[Jonas Nilsson]]></dc:creator><pubDate>Tue, 23 Dec 2025 13:21:40 GMT</pubDate><enclosure url="https://raw.githubusercontent.com/Ncedia/blog-assets/main/656521.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction-to-ble-sensors">Introduction to BLE Sensors</h2>
<p>Bluetooth Low Energy (BLE) sensors are critical components in modern IoT ecosystems. They provide low-power, wireless data transmission capabilities suitable for a wide range of applications, including health monitoring, asset tracking, and environmental sensing.</p>
<h2 id="heading-how-ble-sensors-work">How BLE Sensors Work</h2>
<p>BLE sensors operate by broadcasting or connecting to devices using BLE protocol. They transmit data packets containing sensor readings to nearby BLE-enabled devices. The protocol is designed to consume minimal energy, which extends the battery life of sensors working in remote or mobile settings.</p>
<h2 id="heading-importance-of-encryption-in-ble-communication">Importance of Encryption in BLE Communication</h2>
<p>Because BLE sensors often handle sensitive information, such as personal health data or security-related metrics, protecting transmitted data is essential. Encryption ensures that payloads — the data carried within BLE packets — remain confidential and tamper-proof during transmission.</p>
<h3 id="heading-security-features-of-ble">Security Features of BLE</h3>
<ul>
<li><strong>Pairing and Bonding:</strong> Devices pair using methods such as Passkey Entry or Numeric Comparison, establishing shared keys.</li>
<li><strong>Encryption Keys:</strong> BLE uses AES-CCM (Advanced Encryption Standard with Counter with CBC-MAC) to encrypt and authenticate payloads.</li>
<li><strong>Privacy:</strong> BLE supports address randomization to prevent device tracking.</li>
</ul>
<h2 id="heading-encrypted-payload-structure">Encrypted Payload Structure</h2>
<p>The encrypted payload contains:</p>
<ul>
<li>A <strong>nonce</strong> (number used once) part to ensure unique encryption per message.</li>
<li>The <strong>ciphertext</strong> which is the encrypted sensor data.</li>
<li>An <strong>authentication code</strong> to verify data integrity.</li>
</ul>
<p>These components ensure confidentiality and authenticity.</p>
<h2 id="heading-implementing-ble-payload-encryption">Implementing BLE Payload Encryption</h2>
<p>Developers typically rely on BLE stack implementations on platforms such as Android, iOS, or embedded devices. Key considerations include:</p>
<ul>
<li>Managing the security keys securely.</li>
<li>Using secure pairing methods to avoid man-in-the-middle attacks.</li>
<li>Validating encrypted payloads on the receiver side for authentication.</li>
</ul>
<h2 id="heading-challenges-and-best-practices">Challenges and Best Practices</h2>
<ul>
<li><strong>Resource Constraints:</strong> BLE sensors have limited computing power, requiring optimized encryption algorithms.</li>
<li><strong>Latency:</strong> Encryption adds processing time, which must be minimal for real-time applications.</li>
<li><strong>Key Management:</strong> Proper handling of keys is critical; compromised keys lead to security breaches.</li>
</ul>
<p>Best practices include using the latest BLE versions with enhanced security, updating firmware regularly, and employing secure development lifecycles.</p>
<h2 id="heading-conclusion">Conclusion</h2>
<p>BLE sensors combined with encrypted payloads provide a powerful framework for secure, low-power wireless sensing applications. Understanding their interaction is key to designing robust IoT solutions that protect user data and device integrity.</p>
]]></content:encoded></item></channel></rss>