Based on an extensive field study of current firefighting practices, we have developed a system called Siren to support tacit communication between firefighters with multiple levels of redundancy in both communication and user alerts. Siren provides a foundation for gathering, integrating, and distributing contextual data, such as location and temperature. It also simplifies the development of firefighting applications using a peer-to-peer network of embedded devices through a uniform programming interface based on the information space abstraction. As a proof of concept, we have developed a prototype context-aware messaging application in the firefighting domain. We have evaluated this application with firefighters and they have found it to be useful for improving many aspects of their current work practices.
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002Jason Hong
We demonstrate how field studies, interviews, and low-fidelity prototypes can be used to inform the design of ubiquitous computing systems for firefighters. We describe the artifacts and processes used by firefighters to assess, plan, and communicate during emergency situations, showing how accountability affects these decisions, how their current Incident Command System supports these tasks, and some drawbacks of existing solutions. These factors informed the design of a large electronic display for supporting the incident commander, the person who coordinates the overall response strategy in an emergency. Although our focus was on firefighters, our results are applicable for other aspects of emergency response as well, due to common procedures and training.
The Role of Social Influence In Security Feature Adoption, at CSCW 2015Jason Hong
Social influence is key in technology adoption, but its role in security-feature adoption is unique and remains unclear. Here, we analyzed how three Facebook security features—Login Approvals, Login Notifications, and Trusted Contacts—diffused through the social networks of 1.5 million people. Our results suggest that social influence affects one’s likelihood to adopt a security feature, but its effect varies based on the observability of the feature, the current feature adoption rate among a potential adopter’s friends, and the number of distinct social circles from which those feature-adopting friends originate. Curiously, there may be a threshold higher than which having more security-feature adopting friends predicts for higher adoption likelihood, but below which having more feature-adopting friends predicts for lower adoption likelihood. Furthermore, the magnitude of this threshold is modulated by the attributes of a feature—features that are more noticeable (Login Approvals, Trusted Contacts) have lower thresholds.
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Jason Hong
In this position paper, we argue that usable privacy and security is a grand challenge that needs more attention from the HCI community. We also discuss benefits to and new challenges for HCI, and use our research experiences to provide a critique of HCI.
Making Mashups with Marmite, at CHI 2007Jason Hong
There is a tremendous amount of web content available today, but it is not always in a form that supports end-users’ needs. In many cases, all of the data and services needed to accomplish a goal already exist, but are not in a form amenable to an end-user. To address this problem, we have developed an end-user programming tool called Marmite, which lets end-users create so-called mashups that re-purpose and combine existing web content and services. In this paper, we present the design, implementation, and evaluation of Marmite. An informal user study found that programmers and some spreadsheet users had little difficulty using the system .
Using Text Mining to Infer the Purpose of Permission Use in Mobile AppsJason Hong
Understanding the purpose of why sensitive data is used could help improve privacy as well as enable new kinds of access control. In this paper, we introduce a new technique for inferring the purpose of sensitive data usage in the context of Android smartphone apps. We extract multiple kinds of features from decompiled code, focusing on app-specific features and text-based features. These features are then used to train a machine learning classifier. We have evaluated our approach in the context of two sensitive permissions, namely ACCESS_FINE_LOCATION and READ_CONTACT_LIST, and achieved an accuracy of about 85% and 94% respectively in inferring purposes. We have also found that text-based features alone are highly effective in inferring purposes.
Social Cybersecurity, at Google Security Summit March 2015Jason Hong
This is my 3 minute pitch at the Google Security Summit, making a case for what I think academia and Google should be doing more of. The basic premise is, rather than creating new security mechanisms, let's look more at getting people to adopt best practices and features we've already created.
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Jason Hong
We introduce UniAuth, a set of mechanisms for streamlining authentication to devices and web services. With UniAuth, a user first authenticates himself to his UniAuth client, typically his smartphone or wearable device. His client can then authenticate to other services on his behalf. In this paper, we focus on exploring the user experiences with an early iPhone prototype called Knock x Knock. To manage a variety of accounts securely in a usable way, Knock x Knock incorporates features not supported in existing password managers, such as tiered and location-aware lock control, authentication to laptops via knocking, and storing credentials locally while working with laptops seamlessly. In two field studies, 19 participants used Knock x Knock for one to three weeks with their own devices and accounts. Our participants were highly positive about Knock x Knock, demonstrating the desirability of our approach. We also discuss interesting edge cases and design implications.
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002Jason Hong
We demonstrate how field studies, interviews, and low-fidelity prototypes can be used to inform the design of ubiquitous computing systems for firefighters. We describe the artifacts and processes used by firefighters to assess, plan, and communicate during emergency situations, showing how accountability affects these decisions, how their current Incident Command System supports these tasks, and some drawbacks of existing solutions. These factors informed the design of a large electronic display for supporting the incident commander, the person who coordinates the overall response strategy in an emergency. Although our focus was on firefighters, our results are applicable for other aspects of emergency response as well, due to common procedures and training.
The Role of Social Influence In Security Feature Adoption, at CSCW 2015Jason Hong
Social influence is key in technology adoption, but its role in security-feature adoption is unique and remains unclear. Here, we analyzed how three Facebook security features—Login Approvals, Login Notifications, and Trusted Contacts—diffused through the social networks of 1.5 million people. Our results suggest that social influence affects one’s likelihood to adopt a security feature, but its effect varies based on the observability of the feature, the current feature adoption rate among a potential adopter’s friends, and the number of distinct social circles from which those feature-adopting friends originate. Curiously, there may be a threshold higher than which having more security-feature adopting friends predicts for higher adoption likelihood, but below which having more feature-adopting friends predicts for lower adoption likelihood. Furthermore, the magnitude of this threshold is modulated by the attributes of a feature—features that are more noticeable (Login Approvals, Trusted Contacts) have lower thresholds.
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Jason Hong
In this position paper, we argue that usable privacy and security is a grand challenge that needs more attention from the HCI community. We also discuss benefits to and new challenges for HCI, and use our research experiences to provide a critique of HCI.
Making Mashups with Marmite, at CHI 2007Jason Hong
There is a tremendous amount of web content available today, but it is not always in a form that supports end-users’ needs. In many cases, all of the data and services needed to accomplish a goal already exist, but are not in a form amenable to an end-user. To address this problem, we have developed an end-user programming tool called Marmite, which lets end-users create so-called mashups that re-purpose and combine existing web content and services. In this paper, we present the design, implementation, and evaluation of Marmite. An informal user study found that programmers and some spreadsheet users had little difficulty using the system .
Using Text Mining to Infer the Purpose of Permission Use in Mobile AppsJason Hong
Understanding the purpose of why sensitive data is used could help improve privacy as well as enable new kinds of access control. In this paper, we introduce a new technique for inferring the purpose of sensitive data usage in the context of Android smartphone apps. We extract multiple kinds of features from decompiled code, focusing on app-specific features and text-based features. These features are then used to train a machine learning classifier. We have evaluated our approach in the context of two sensitive permissions, namely ACCESS_FINE_LOCATION and READ_CONTACT_LIST, and achieved an accuracy of about 85% and 94% respectively in inferring purposes. We have also found that text-based features alone are highly effective in inferring purposes.
Social Cybersecurity, at Google Security Summit March 2015Jason Hong
This is my 3 minute pitch at the Google Security Summit, making a case for what I think academia and Google should be doing more of. The basic premise is, rather than creating new security mechanisms, let's look more at getting people to adopt best practices and features we've already created.
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Jason Hong
We introduce UniAuth, a set of mechanisms for streamlining authentication to devices and web services. With UniAuth, a user first authenticates himself to his UniAuth client, typically his smartphone or wearable device. His client can then authenticate to other services on his behalf. In this paper, we focus on exploring the user experiences with an early iPhone prototype called Knock x Knock. To manage a variety of accounts securely in a usable way, Knock x Knock incorporates features not supported in existing password managers, such as tiered and location-aware lock control, authentication to laptops via knocking, and storing credentials locally while working with laptops seamlessly. In two field studies, 19 participants used Knock x Knock for one to three weeks with their own devices and accounts. Our participants were highly positive about Knock x Knock, demonstrating the desirability of our approach. We also discuss interesting edge cases and design implications.
We explored a new type of user interface, interactive cover sheets: computer forms laid out on the banner pages of print jobs that people can mark on, scan back into a multifunction printer/scanner, and use as input to applications. Cover sheets are commonly strewn around printer rooms; with interactivity, they can let people see what others have to say, add their own comments, or play games, all while waiting for their print jobs. We designed three prototype applications and deployed them briefly in our research lab. We found that interactive cover sheets can be very appealing, that the sheets must be designed so that people can still identify these pages as cover sheets, and that the slow interaction cycle favors asynchronous applications.
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites, at WWW2007Jason Hong
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, implementation, and evaluation of CANTINA, a novel, content-based approach to detecting phishing web sites, based on the TF-IDF information retrieval algorithm. We also discuss the design and evaluation of several heuristics we developed to reduce false positives. Our experiments show that CANTINA is good at detecting phishing sites, correctly labeling approximately 95% of phishing sites.
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...Jason Hong
We describe our current work in developing novel mechanisms for managing security and privacy in pervasive computing environments. More specifically, we have developed and evaluated three different applications, including a contextual instant messenger, a people finder application, and a phone-based application for access control. We also draw out some themes we have learned thus far for user-controllable security and privacy.
Intelligent Agents for Helping Humanity Reach Its Full PotentialJason Hong
Within fifty years, we will build and deploy highly personalized intelligent agents that can help us find, set, and meet hard goals to improve our lives in meaningful ways that we choose. Think of it as a cross between a lifelong coach, a caring uncle, and an honest and supportive friend. Or, if you are into science fiction, consider it as a combination of Samantha in the movie Her, the Young Lady’s Primer from the book The Diamond Age, and Minds from Iain Bank’s The Culture series. Let’s call this agent Maslow.
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Jason Hong
This talk looks at some of the CHIMPS research group's work on urban analytics and on analyzing smartphone apps, and offers a reflection on how we can improve the privacy landscape by focusing on key parts of the ecosystem.
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Jason Hong
June 2015
This talk looks at our team's ongoing work in using social psychology and diffusion of innovations to improve cybersecurity. It also reflects on the role of theory, in terms of offering inspiration for new ideas, a useful vocabulary, guidance for what to build and how to build things better, as well as insight into the problem space. This talk also offers some advice for people building theories, adapting Pasteur's quadrant and Diffusion of Innovations to theory, to help people who build and design systems.
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Jason Hong
Short 10 minute talk presenting two research projects looking at how to use big data to help with privacy. Ends with three thoughts about privacy: ecosystem, human-in-the-loop, and scalability.
Privacy with Secondary Use of Personal InformationSven Wohlgemuth
Secondary use of personal information is of essential importance for the Internet of Things. The main application is resilience. Biometrics is an example for support of resilience in times of a natural disaster. The primary use of biometrics is to identify people; a secondary use is to improve healthcare services for affected people. This requires information sharing with third parties. The challenge faced for reliable support of the Internet of Things is safety. Special cases of security systems achieve safety for information flow, but they don’t scale for secondary use. Their users lose control on their identity. With the aim of improving usability of security, this research-in-progress proposes a multilateral information flow control. This is privacy as understood with informational self-determination. The key is usage control with secure delegation of rights and a secondary use of personal security-related information as Open Data.
Disasters Happen. We need to manage them to minimize the loss to life and property. Disaster management has been received much attention, but has not been touched much by the latest technology. This paper presents an approach to manage disasters using latest and popular technology. We are interested in building a community of researchers who are interested in developing such tools.
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...RuleML
In order to enhance interoperability and productivity in the develop-ment of situation-aware applications for disaster management, proper mecha-nisms and guidelines are required. They must address the lack of semantics in modelling emergency situations. In addition, the ever-changing and unpredicta-ble nature of disaster scenarios present challenges for information processing and collaboration. This paper proposes a framework that combines the follow-ing elements: (i) a foundational ontology for temporal conceptualization; (ii) well-founded specifications of structural and behavioral models; (iii) a CEP en-gine based on a distributed rule-based platform for situation management; (iv) a model-driven approach. We illustrate the operation of the framework with a scenario for monitoring tuberculosis epidemy.
Public safety in a multi media era facilitating incident management responseJack Brown
Situational awareness
“Situational awareness” was a term originally used to describe the tactical situation during aerial combat . While the literal term doesn’t go back as far as World War I, the idea surfaced then, when pilots first took to the sky in combat. At first, the term referred to the pilot’s ability to know where he was in relation to the enemy and the other pilots of his flight. In reality, that is only positional awareness. However, when pilots added their knowledge of aircraft capabilities and known battle tactics with positional awareness, they were able to interpret, comprehend and anticipate. The comprehension of observations is the essence of situational awareness.
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, hacks into the Cloud-based IoT Camera sees everything we do, without us knowing about it. Invading our personal digital privacy. This study focuses on the vulnerabilities found on White-label Cloud-based IoT Camera on the market specifically on a Chinese brand sold by Shenzhen Gwelltimes Technology. How this IoT device can be compromised and how to protect our selves from such cyber-attacks.
We explored a new type of user interface, interactive cover sheets: computer forms laid out on the banner pages of print jobs that people can mark on, scan back into a multifunction printer/scanner, and use as input to applications. Cover sheets are commonly strewn around printer rooms; with interactivity, they can let people see what others have to say, add their own comments, or play games, all while waiting for their print jobs. We designed three prototype applications and deployed them briefly in our research lab. We found that interactive cover sheets can be very appealing, that the sheets must be designed so that people can still identify these pages as cover sheets, and that the slow interaction cycle favors asynchronous applications.
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites, at WWW2007Jason Hong
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, implementation, and evaluation of CANTINA, a novel, content-based approach to detecting phishing web sites, based on the TF-IDF information retrieval algorithm. We also discuss the design and evaluation of several heuristics we developed to reduce false positives. Our experiments show that CANTINA is good at detecting phishing sites, correctly labeling approximately 95% of phishing sites.
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...Jason Hong
We describe our current work in developing novel mechanisms for managing security and privacy in pervasive computing environments. More specifically, we have developed and evaluated three different applications, including a contextual instant messenger, a people finder application, and a phone-based application for access control. We also draw out some themes we have learned thus far for user-controllable security and privacy.
Intelligent Agents for Helping Humanity Reach Its Full PotentialJason Hong
Within fifty years, we will build and deploy highly personalized intelligent agents that can help us find, set, and meet hard goals to improve our lives in meaningful ways that we choose. Think of it as a cross between a lifelong coach, a caring uncle, and an honest and supportive friend. Or, if you are into science fiction, consider it as a combination of Samantha in the movie Her, the Young Lady’s Primer from the book The Diamond Age, and Minds from Iain Bank’s The Culture series. Let’s call this agent Maslow.
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Jason Hong
This talk looks at some of the CHIMPS research group's work on urban analytics and on analyzing smartphone apps, and offers a reflection on how we can improve the privacy landscape by focusing on key parts of the ecosystem.
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Jason Hong
June 2015
This talk looks at our team's ongoing work in using social psychology and diffusion of innovations to improve cybersecurity. It also reflects on the role of theory, in terms of offering inspiration for new ideas, a useful vocabulary, guidance for what to build and how to build things better, as well as insight into the problem space. This talk also offers some advice for people building theories, adapting Pasteur's quadrant and Diffusion of Innovations to theory, to help people who build and design systems.
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Jason Hong
Short 10 minute talk presenting two research projects looking at how to use big data to help with privacy. Ends with three thoughts about privacy: ecosystem, human-in-the-loop, and scalability.
Privacy with Secondary Use of Personal InformationSven Wohlgemuth
Secondary use of personal information is of essential importance for the Internet of Things. The main application is resilience. Biometrics is an example for support of resilience in times of a natural disaster. The primary use of biometrics is to identify people; a secondary use is to improve healthcare services for affected people. This requires information sharing with third parties. The challenge faced for reliable support of the Internet of Things is safety. Special cases of security systems achieve safety for information flow, but they don’t scale for secondary use. Their users lose control on their identity. With the aim of improving usability of security, this research-in-progress proposes a multilateral information flow control. This is privacy as understood with informational self-determination. The key is usage control with secure delegation of rights and a secondary use of personal security-related information as Open Data.
Disasters Happen. We need to manage them to minimize the loss to life and property. Disaster management has been received much attention, but has not been touched much by the latest technology. This paper presents an approach to manage disasters using latest and popular technology. We are interested in building a community of researchers who are interested in developing such tools.
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...RuleML
In order to enhance interoperability and productivity in the develop-ment of situation-aware applications for disaster management, proper mecha-nisms and guidelines are required. They must address the lack of semantics in modelling emergency situations. In addition, the ever-changing and unpredicta-ble nature of disaster scenarios present challenges for information processing and collaboration. This paper proposes a framework that combines the follow-ing elements: (i) a foundational ontology for temporal conceptualization; (ii) well-founded specifications of structural and behavioral models; (iii) a CEP en-gine based on a distributed rule-based platform for situation management; (iv) a model-driven approach. We illustrate the operation of the framework with a scenario for monitoring tuberculosis epidemy.
Public safety in a multi media era facilitating incident management responseJack Brown
Situational awareness
“Situational awareness” was a term originally used to describe the tactical situation during aerial combat . While the literal term doesn’t go back as far as World War I, the idea surfaced then, when pilots first took to the sky in combat. At first, the term referred to the pilot’s ability to know where he was in relation to the enemy and the other pilots of his flight. In reality, that is only positional awareness. However, when pilots added their knowledge of aircraft capabilities and known battle tactics with positional awareness, they were able to interpret, comprehend and anticipate. The comprehension of observations is the essence of situational awareness.
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, hacks into the Cloud-based IoT Camera sees everything we do, without us knowing about it. Invading our personal digital privacy. This study focuses on the vulnerabilities found on White-label Cloud-based IoT Camera on the market specifically on a Chinese brand sold by Shenzhen Gwelltimes Technology. How this IoT device can be compromised and how to protect our selves from such cyber-attacks.
Incident handling of intrusions related to cyber espionage operations is a complex and challenging task. As a national CERT with a unique national early warning detection system, NSM NorCERT has detected and responded to incidents that vary from traditional incident response and abuse handling to counter-intelligence operations. Based on some real-world examples, this talk will be about incident handling of cyber espionage intrusions. What are the most common pitfalls and how can companies be better prepared?
A flexible network of sensors: case studystreamspotter
Anne-Marie Barthe-Delanoë, Sébastien Truptil, Frédérick Bénaben and Hervé Pingaud on "A flexible network of sensors: case study" at ISCRAM 2013 in Baden-Baden.
10th International Conference on Information Systems for Crisis Response and Management
12-15 May 2013, Baden-Baden, Germany
Kirk Arthur and Chad Wallace, Worldwide Public Safety & Justice, Microsoft Corporation – Improving Urban Safety through innovative technologies and new operational models
Cloud has changed the way we use computing and can yield significant economic, collaborative and efficiency benefits. But with this increased adoption, at both the personal & business level, comes increased exposure to potential risks, threats and attacks. This talk will introduce the fundamentals of cloud security, how cloud service and deployment models influence security, and practices that we can all undertake for threat and risk protection.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Siren: Context-aware Computing for Firefighting, at Pervasive2004
1. Siren: Context-aware
Computing for Firefighting
Xiaodong Jiang, Nicholas Chen, Jason Hong, Kevin Wang
University of California, Berkeley
Leila Takayama James Landay
Stanford University University of Washington
2. March 14, 2015 2Siren: Context-aware Computing for Firefighting
Motivation
Firescause great harm
1,755,000 firesin the United Statesin 1998
4000 deaths, 25000 injuries, 100 firefighter
deaths/ year
Information intensive task
“Firefighting ismaking a lot of decisionson
very little information”
Convergence of sensing and
communication
3. March 14, 2015 3Siren: Context-aware Computing for Firefighting
Research Overview
Goal
Support interaction between firefighters
working inside urban structures
Approach: User-centered Design
Design Principles:
4 monthsof field study
Evaluation:
Quick feedback
Prototype Solution:
Off-the-shelf technology
4. March 14, 2015 4Siren: Context-aware Computing for Firefighting
Outline
Field studiesresults
From field to design
Siren architecture
Siren messaging application
Evaluation
Conclusion & Future work
5. March 14, 2015 5Siren: Context-aware Computing for Firefighting
Field Studies
Method
4 months, 3 depts
Interviewsin
work environment
1 field exercise
2 emergency calls
Participants
1 assistant chief
4 battalion chiefs
2 captains, 2 engineers
5 firefighters
6. March 14, 2015 6Siren: Context-aware Computing for Firefighting
Fieldwork Results
Firefightershave an incomplete picture
Situational assessment isdone by sending advanced
team into fires
Individual firefighter confined to a limited space
Current communication systemsare inadequate
Require explicit control
Broadcast and ephemeral
Detached from information gathering
Firefightersoperate in harsh environments
Inherently unreliable nature of any infrastructure
7. March 14, 2015 7Siren: Context-aware Computing for Firefighting
Communication
“There isa lot of noise on the fire
ground. You’re inside; the fire is
burning; it makesnoise; there’s
breaking glass; there’schain saws
above your head where they’re
cutting a hole in the roof; there’s
other rigscoming in with sirens
blaring; lotsof radio traffic;
everybody trying to radio at the
same time.”
8. March 14, 2015 8Siren: Context-aware Computing for Firefighting
Need for Tacit Communication
Context-dependent sharing of mission-
critical information
“See through the eyesof fellow firefighters”
Opportunistic, spontaneous, persistent
When communication happensiscontext
dependent
Often triggered by external events, without
human initiation
Can be replayed and shared
9. March 14, 2015 9Siren: Context-aware Computing for Firefighting
Tacit Communication: An Example
C
A
B Abandon
10. March 14, 2015 10Siren: Context-aware Computing for Firefighting
From Field to Design
Tacit communication
Ad-hoc P2P
Delayed multi-hop
Context dependence
Robustness: multiple levelsof redundancy
Path redundancy
Storage redundancy
Version redundancy
Feedback redundancy
11. March 14, 2015 11Siren: Context-aware Computing for Firefighting
Siren Architecture
Adapted Context Fabric (Hong et. al.) for a P2P
network of Wi-Fi-enabled Pocket PCs
Siren Modular Applications
Siren
Context Rule Engine
InfoSpace
Storage
Manager
Multi-hop
Communication
Manager
12. March 14, 2015 12Siren: Context-aware Computing for Firefighting
Storage Manager
An InfoSpace consistsof tuples
Each firefighter ownsan InfoSpace containing data
about himself, other peersand the environment
Tagsto specify expiration
InfoSpace snapshot
A view maintained by each device of entitieson the
Siren network
Snapshot taken by aggregating sensor readingsover
a given time window
InfoSpace operators(insert, retrieve) unify
storage and communication
13. March 14, 2015 13Siren: Context-aware Computing for Firefighting
Multi-hop Communication Manager
Message format
XML over HTTP
Semantic slots
Time-based message queuing & routing
One queue for each source
Queue issorted by time
Keep forwarding to all neighborsuntil all semantic
slotsexpire
Version redundancy
Not overwrite older messagesasnewer versions
arrive – why?
Message id: ….
Source: ….
Time_Created:
Semantic Slot 1:
Semantic Slot 2:
Semantic Slot 3:
Type: location
Value: 525 Soda Hall
Confidence: 70%
Expiration:
14. March 14, 2015 14Siren: Context-aware Computing for Firefighting
Context Rule Engine
Take InfoSpace snapshotsasinput, generate
user alerts
Production system consisting of “if-then” rules
Currently supportsfive typesof alerts
“dangerousplace”
“danger to oneself”
“next to dangerousplace”
“othersin danger”
“instructions”
IF (firefighter F IN room A) AND
(surrounding temperature > 1500F)
THEN (generate_alert (firefighter F1 in danger)) AND
(generate_alert (room A is a dangerous place))
15. March 14, 2015 15Siren: Context-aware Computing for Firefighting
Siren-based Messaging Application
for Firefighters
Running on Wi-Fi-enabled Pocket PCs
A set of context rules
A map-based user interface
Use of Berkeley motes
Location beacon
Mobile sensing
Environmental sensing
16. March 14, 2015 16Siren: Context-aware Computing for Firefighting
Video
17. March 14, 2015 17Siren: Context-aware Computing for Firefighting
Evaluation
Used by a group of four firefightersin their fire
house
Positives
Communication redundancy for large complex urban
structures(hospitals, high rises, warehouses)
Location tracking enhance firefighter safety
Like UI with no manual input
Concerns
Ruggednessof technology
Risksof new technology
Deployment issues
18. March 14, 2015 18Siren: Context-aware Computing for Firefighting
Ruggedness of Technology
“It’sgot to be tough; you’ve got
to be able to drop it; it’sgot to
be able to take extreme heat; it’s
got to be able to get wet.”
19. March 14, 2015 19Siren: Context-aware Computing for Firefighting
Thermal Imaging Cameras
PASSSystem
Risks of New Technologies
20. March 14, 2015 20Siren: Context-aware Computing for Firefighting
Deployment Issues
Tighter integration with existing tools(use
in conjunction with thermal imager to
narrow search areas)
Sensor deployment
“Most effective toolsfor usare always
those we can directly accessand maintain”
21. March 14, 2015 21Siren: Context-aware Computing for Firefighting
Conclusion & Future Work
Conclusion
User-centered design of Siren
Support tacit communication needs
Siren messaging application & evaluation
Future Work
Dealing with uncertainty in sensor data
Multimodal interaction techniques
Deployment strategy
22. Thanks to:
Berkeley Fire Dept
El Cerrito Fire Dept
Alameda Fire Dept
NSFITR, CITRIS
Lawrence Leung Xiaodong Jiang
NicholasChen
Jason I. Hong
Kevin Wang
Leila A. Takayama
JamesA. Landay
http://guir.berkeley.edu/siren
Editor's Notes
Shouldn’t just reading the bullets
Cite CHI2004 first
Incomplete pic of situation
Summarize here
Communication is hard
Communication is not currently well managed, but is a focal point of training
Much communication is about timely information and resource allocations
Better graphics
Scott, Jimmy
Text too small
North, south (up/down)
Instead of trying to “blast” sufficient bandwidth through a building using bulky, high-powered, amplified radio
Context Fabric
Delete “5000 lines”
Text box “communciation” too small
Introduction to SIREN:
SIREN is a peer-to-peer infrastructure running on PDAs carried by firefighters. Each firefighter’s PDA is a peer on the network.
SIREN consists of three components: 1. A storage manager that maintains data stored using the infospace programming model 2. a communication manager to facilitate message passing between between PDAs and 3. A context rule engine that allows the application to define context-dependant behavior.
Applications running on top of SIREN consist of 1. A user interface (more needed?) and 2. a set of context rules for the context rule engine.
Peers exchange data via Infospace operators, which we have termed the “Infospace API”
What is a peer in the network?
What is the infrastructure and what is the application.
Siren infrastructure responsible for things in the diagram.
The application 1. specific set of rules, 2. User Interface.
Application interfaces to the SIREN components through the infospace API
Better define snapshot
Weakly consistent? Didn’t get talked about
The storage manager manages the contents within a firefighter’s Infospace. Each firefighter maintains a personal infospace about himself and his environment. To avoid populating an infospace with outdated data, tuples can contain fields such as an expiration time, The storage manager acts on this information to constantly update a firefighter’s infospace.
Periodically, the storage manager takes snapshots of the infospace. What is a snapshot?
A snapshot is everything a firefighter’s infospace has collected about the
Why snapshots? Over a given time window, one may receive multiple readings from the same sources, aggregation is important. For example, might be as simple as taking the last reading, but can also be taking the mean, or the mode.
How are expiration times set? User defined preference file, with some type of configuration UI.
Weakly consistent meaning that different firefighters’s PDAs may have
Discussion didn’t follow the bullets well. – fix!
The primary goal of Siren is to support tacit (automatic) communication between firefighters in hostile environments. We have designed the communication component of Siren with this goal in mind.
Messages are sent via XML over HTTP. The message Id, source, timestamp and other Semantic slots containing different attributes for the data are tagged with XML markup.
Siren contains a multi-hop communication manager to overcome some of the obstacles in communicating inside buildings.
First, since communication may not always possible, because of range, or physical obstructions, a queue is maintained on each PDA for messages received from every other PDA.
Messages in the queue, as well as newly incoming messages, are forwarded to neighboring devices that are in range. This offers increased redundancy by allowing messages to take separate routes to their destination.
A is variable, not a particular room!
SIREN would be very boring if all it did was collect and hoard data.
Siren uses the picture of the environment painted by infospace snapshots to perform context-aware behavior.
The context rule engine allows an application to define sets of context rules, so that SIREN performs certain actions when various conditions are satisfied.
Context rules are formatted as if-then statements. Currently the alerts that SIREN is able to generate are … but those can easily be changed.
The PDAs on which we are running SIREN are Wi-Fi enabled and are able to communicate with each other. They also contain an attached Berkeley mote sensor board to receive data from other motes in the environment.
A number of different applications can be created on top of Siren, as an application is only a user interface and a set of context rules.
To demonstrate how SIREN interoperates with an application built on top of it, we have created an application that assists firefighters in fighting structural fires. Using data collected by the PDA’s own sensor board as well as those of firefighters that are nearby, the application generates context-aware messages alerting the firefighter to imminent danger.
Cut intro and conclusion in video
No credits needed either
We demoed a prototype of the application created on top of SIREN for a group of local firefighters. In general the response was positive. The firefighters were the most excited about the communications redundancy because radio interruption is a frequent problem when they are in large buildings, basements, and shielded areas such as hospitals.
The firefighters also praised the location tracking capabilities. Originally, we were not entirely sure how firefighters would deploy sensor motes within buildings. However, after speaking with the firefighters, they suggested that an advance team of firefighters (usually sent into the building to assess the situation) could also place the sensors while inside the building.
The fact that the UI for the application required no direct manipulation was also a big plus. One firefighter explained that he was not a “techno-wizard”.
Concerns the firefighters had were usually regarding the ruggedness of the technology. First, whether it would hold up in a fire and also the durability in the long run. The firefighters we spoke with were wary of equipment they can’t maintain themselves. Also, they would like to see an increased integration between our application and other tools that they use.
Appreciated that Feeback (e.g. location-aware display) was automatic – no need to manually enter data.
New technologies for firefighters cannot be invasive, bulky, fragile, or distracting
Carrying lots of equipment (40+ lbs)
Use pockets in the coats to carry equipment, strap gear to body, belts
Darkness:
Crawling on ground
Stay near hose lines
Guide ropes
Right-hand searches
However technologies for the IC will not be put into environments of such harsh conditions and stresses
Reasons to focus on the IC =
We just described their environments of work…
There are also lessons to be learned from the use of current technologies.
SCBA Air Monitors
One good design: face mask shakes when getting low on air
Bad design: tiny whistle
Cultural resistance to technology in the field of fire fighting
Uncertainty is inherent in the data, how to resolve? Should it be the user’s responsibility, or should the system automatically deal with it.
Additional Input and output mechanisms. Largely focus on different ways of outputting information, as increased user input is not entirely desirable.
How to deploy these sensors. A) firefighters send in people ahead of time. B) deploying them while firefighters are completing their task, such as attaching them to water hoses, or door stops.
Finally, since this is a slide about the future,