The document is a presentation from Carnegie Mellon University that discusses trends in computing and visualization. It covers topics like bandwidth, storage, computing power, and human capabilities over time. It emphasizes that aesthetics and understanding user goals are important for visualization. The presentation also highlights how visualizations can bias information through what they show and hide, and that while natural representations may not exist, conceptual models can still be effective. Throughout it provides examples of visualizations and lessons learned about the role of visualization as part of analysis tools.
Social and Problem-Based Learning in Cyberspace: Tools, Techniques & Technolo...Simon Bignell
A conference presentation by Dr Simon Bignell.
Social and Problem-Based Learning in Cyberspace: Tools, Techniques & Technology in Multi-user Virtual World.
Abstract
The number of internet-of-things (IoT) connected devices is increasing daily, providing new opportunities for information access and interactivity. This talk will focus on work developing low-cost, IoT systems for social good using a user-centered design approach with a focus on applications in the built environment. We will discuss how such systems can empower end-users through access to new information, provide services that alleviate their daily challenges, and discuss future directions for these increasingly ubiquitous technologies.
Bio:
Matthew Louis Mauriello is a postdoctoral scholar at Stanford University. He holds a Ph.D. in Computer Science from the University of Maryland, where he was advised by Jon E. Froehlich, and an M.S./B.S. in Computer Science and Applied Mathematics from the State University of New York at Albany. His research in the area of Human-Computer Interaction (HCI) focuses on applying user-centered design and computer science techniques to social good problems, emphasizing those facing our health, education, environmental, and computing systems. His work has been published in top-tier venues for HCI and Ubiquitous Computing with several receiving awards for being in the top 5% of submissions at venues including the international SIGCHI Conference on Human Factors in Computing Systems (CHI)—the premier venue for HCI research.
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...Tatjana Salcedo
Responsive web design is taking higher ed web development by storm. This session will cover how the University of Vermont recently converted their existing fixed-width web design into a responsive one using a mobile-first strategy. We'll discuss both the advantages (and disadvantages) of the mobile first approach as well as tips and techniques used to create a nimble foundation for rapidly converting fixed width sites to responsive ones throughout the institution. In addition, we'll reveal a post launch assessment of the effectiveness and performance of the responsive design.
The bar is rapidly lifting when it comes to creating a compelling and engaging mobile app. Consumers have hundreds of thousands of native apps to choose from in the native app ecosystems, and attracting and sustaining user engagement is quite a challenge. Some app developers are adding game-like features to apps (gamification) and integrating with popular social media platforms in an attempt to encourage engagement. In this talk we will discuss gamification in general, and take a look at how it is being used in mobile apps. In particular, we will share some of the experiences we've had incorporating game and social features into apps that our lab has deployed.
Social and Problem-Based Learning in Cyberspace: Tools, Techniques & Technolo...Simon Bignell
A conference presentation by Dr Simon Bignell.
Social and Problem-Based Learning in Cyberspace: Tools, Techniques & Technology in Multi-user Virtual World.
Abstract
The number of internet-of-things (IoT) connected devices is increasing daily, providing new opportunities for information access and interactivity. This talk will focus on work developing low-cost, IoT systems for social good using a user-centered design approach with a focus on applications in the built environment. We will discuss how such systems can empower end-users through access to new information, provide services that alleviate their daily challenges, and discuss future directions for these increasingly ubiquitous technologies.
Bio:
Matthew Louis Mauriello is a postdoctoral scholar at Stanford University. He holds a Ph.D. in Computer Science from the University of Maryland, where he was advised by Jon E. Froehlich, and an M.S./B.S. in Computer Science and Applied Mathematics from the State University of New York at Albany. His research in the area of Human-Computer Interaction (HCI) focuses on applying user-centered design and computer science techniques to social good problems, emphasizing those facing our health, education, environmental, and computing systems. His work has been published in top-tier venues for HCI and Ubiquitous Computing with several receiving awards for being in the top 5% of submissions at venues including the international SIGCHI Conference on Human Factors in Computing Systems (CHI)—the premier venue for HCI research.
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...Tatjana Salcedo
Responsive web design is taking higher ed web development by storm. This session will cover how the University of Vermont recently converted their existing fixed-width web design into a responsive one using a mobile-first strategy. We'll discuss both the advantages (and disadvantages) of the mobile first approach as well as tips and techniques used to create a nimble foundation for rapidly converting fixed width sites to responsive ones throughout the institution. In addition, we'll reveal a post launch assessment of the effectiveness and performance of the responsive design.
The bar is rapidly lifting when it comes to creating a compelling and engaging mobile app. Consumers have hundreds of thousands of native apps to choose from in the native app ecosystems, and attracting and sustaining user engagement is quite a challenge. Some app developers are adding game-like features to apps (gamification) and integrating with popular social media platforms in an attempt to encourage engagement. In this talk we will discuss gamification in general, and take a look at how it is being used in mobile apps. In particular, we will share some of the experiences we've had incorporating game and social features into apps that our lab has deployed.
How to Analyze the Privacy of 1 Million Smartphone AppsJason Hong
These slides are from a briefing to Congressional staffers about privacy, October 30 2014. It talks about our ongoing work with PrivacyGrade.org, which uses crowdsourcing techniques plus static analysis techniques to infer the privacy-related behaviors of apps.
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Jason Hong
Keynote talk I gave at the Mobile and Cloud Workshop at Mobisys 2014. I talk about my experiences and reflections on privacy, focusing on (1) Urban Analytics, (2) Google Glass, and (3) PrivacyGrade.
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Jason Hong
A one-hour crash course on UX design and User Interface Design. I talk about methods for understanding users (contextual inquiry, diary studies, bodystorming), basic design principles (layout, color, mental models, grid), rapid prototyping (building user interfaces quickly, paper prototypes), and evaluation (heuristic evaluation).
How to Analyze the Privacy of 750000 Smartphone Apps Jason Hong
Describes some of my team's research on analyzing the privacy of Android smartphone apps. Presents PrivacyGrade as well as Gort. Also presents some preliminary work on CrowdVerify, some research we are conducting to analyze privacy policies.
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Jason Hong
A talk I gave for Cylab in Feb 2011 on location privacy, summarizing some of my group's work in this area. I discuss some system architectures for location-based content (using pre-fetching and caching to manage privacy), why people use foursquare, and some empirical work on location sharing.
Hyve presentation at InnoCos Europe conference in Paris, June 2011KGS Global
INSPIRING INNOVATION THROUGH CO-CREATION
Among other online co-creation tools such as crowdsourcing platforms or co-creation studies, co-creation processes are initiated by a phase of “opportunity seeking” in which the Netnography approach is applied. In contrast to quantitative, IT-driven counting of keywords and phrases through web monitoring solutions, Netnography is a qualitative research approach to analyze conversations in order to gain deep Consumer Insights and transfer them into product solutions. The presentation gives an overview of the method as well as the business benefits of the Netnography approach for generating Consumer Insights.
Practical Cases from the cosmetics industry
A toolset of co-creation and open innovation
Realizing and implementing co-creation programs form opportunities and ideas to product launch
Dr. Michael Bartl, CEO , HYVE AG.
Queuing and The Age of Context: Release 1 The Digital Consumer CollaborativeDave Norton
Companies are trying to understand the digital consumer but they often get the basics wrong. Digital consumers are not a segment. They aren't 'early adopters.' Almost every consumer today is a digital consumer. A digital consumer wants to do more with his or her digital tools and will share data to get the job done. Sensors, data, location, social media, and mobile are five forces that create digital context.
This deck was presented in February 2014 to 100 companies who are following the general insights gathered from the Digital Consumer Collaborative via web seminar.
Release 1 covers
- What is the Digital Consumer Collaborative
- How to define the digital consumer
- Three key attributes of consumer behavior: queuing, topics, and tasks.
- The five forces that create digital context
- Sensors, data, location, social media, and mobile
- Scoble & Israel’s, The Age of Context
- Redefining what context means
- Digital ethnography and other steps that companies can take to understand the consumer.
An audio presentation can be found on Stone Mantel’s website, YouTube, and SlideShare.
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Jason Hong
Talk I gave at IAPP 2013 Navigate conference, on designing for the user experience of privacy. I give examples of why privacy is so hard to design for. I also talk about three ideas for improving privacy, including privacy nutrition labels, using crowdsourcing, and privacy placebos.
https://www.privacyassociation.org/events_and_programs/navigate_2013/
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Jason Hong
Talk I gave at ISSA 2013 CISO forum, looking at some human factors issues in cybersecurity. I discuss some of our research in anti-phishing, user interfaces, mental models of cybersecurity, and ways of motivating people.
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Jason Hong
This talk looks at some of the CHIMPS research group's work on urban analytics and on analyzing smartphone apps, and offers a reflection on how we can improve the privacy landscape by focusing on key parts of the ecosystem.
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Jason Hong
I discuss a range of human factors issues for cybersecurity, in particular cybersecurity awareness and education. Topics include mental models, user interfaces, and simulated attacks.
Recently held in Toronto, Canada, the ACM CHI Conference on Human Factors in Computing Systems is the premier international conference of Human-Computer Interaction.
Arnel, Judith and Manna from our Toronto office recently held a Lunch & Learn to share what they learned over four very full days of talks, courses and demos, covering everything from best practices in research to robotics.
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Jason Hong
This talk was for the Cylab partners meeting in 2011. I gave an overview of research my colleagues and I are doing in streamlining authentication as well as understanding human behavior at large scales.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
How to Analyze the Privacy of 1 Million Smartphone AppsJason Hong
These slides are from a briefing to Congressional staffers about privacy, October 30 2014. It talks about our ongoing work with PrivacyGrade.org, which uses crowdsourcing techniques plus static analysis techniques to infer the privacy-related behaviors of apps.
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Jason Hong
Keynote talk I gave at the Mobile and Cloud Workshop at Mobisys 2014. I talk about my experiences and reflections on privacy, focusing on (1) Urban Analytics, (2) Google Glass, and (3) PrivacyGrade.
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Jason Hong
A one-hour crash course on UX design and User Interface Design. I talk about methods for understanding users (contextual inquiry, diary studies, bodystorming), basic design principles (layout, color, mental models, grid), rapid prototyping (building user interfaces quickly, paper prototypes), and evaluation (heuristic evaluation).
How to Analyze the Privacy of 750000 Smartphone Apps Jason Hong
Describes some of my team's research on analyzing the privacy of Android smartphone apps. Presents PrivacyGrade as well as Gort. Also presents some preliminary work on CrowdVerify, some research we are conducting to analyze privacy policies.
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Jason Hong
A talk I gave for Cylab in Feb 2011 on location privacy, summarizing some of my group's work in this area. I discuss some system architectures for location-based content (using pre-fetching and caching to manage privacy), why people use foursquare, and some empirical work on location sharing.
Hyve presentation at InnoCos Europe conference in Paris, June 2011KGS Global
INSPIRING INNOVATION THROUGH CO-CREATION
Among other online co-creation tools such as crowdsourcing platforms or co-creation studies, co-creation processes are initiated by a phase of “opportunity seeking” in which the Netnography approach is applied. In contrast to quantitative, IT-driven counting of keywords and phrases through web monitoring solutions, Netnography is a qualitative research approach to analyze conversations in order to gain deep Consumer Insights and transfer them into product solutions. The presentation gives an overview of the method as well as the business benefits of the Netnography approach for generating Consumer Insights.
Practical Cases from the cosmetics industry
A toolset of co-creation and open innovation
Realizing and implementing co-creation programs form opportunities and ideas to product launch
Dr. Michael Bartl, CEO , HYVE AG.
Queuing and The Age of Context: Release 1 The Digital Consumer CollaborativeDave Norton
Companies are trying to understand the digital consumer but they often get the basics wrong. Digital consumers are not a segment. They aren't 'early adopters.' Almost every consumer today is a digital consumer. A digital consumer wants to do more with his or her digital tools and will share data to get the job done. Sensors, data, location, social media, and mobile are five forces that create digital context.
This deck was presented in February 2014 to 100 companies who are following the general insights gathered from the Digital Consumer Collaborative via web seminar.
Release 1 covers
- What is the Digital Consumer Collaborative
- How to define the digital consumer
- Three key attributes of consumer behavior: queuing, topics, and tasks.
- The five forces that create digital context
- Sensors, data, location, social media, and mobile
- Scoble & Israel’s, The Age of Context
- Redefining what context means
- Digital ethnography and other steps that companies can take to understand the consumer.
An audio presentation can be found on Stone Mantel’s website, YouTube, and SlideShare.
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Jason Hong
Talk I gave at IAPP 2013 Navigate conference, on designing for the user experience of privacy. I give examples of why privacy is so hard to design for. I also talk about three ideas for improving privacy, including privacy nutrition labels, using crowdsourcing, and privacy placebos.
https://www.privacyassociation.org/events_and_programs/navigate_2013/
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Jason Hong
Talk I gave at ISSA 2013 CISO forum, looking at some human factors issues in cybersecurity. I discuss some of our research in anti-phishing, user interfaces, mental models of cybersecurity, and ways of motivating people.
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Jason Hong
This talk looks at some of the CHIMPS research group's work on urban analytics and on analyzing smartphone apps, and offers a reflection on how we can improve the privacy landscape by focusing on key parts of the ecosystem.
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Jason Hong
I discuss a range of human factors issues for cybersecurity, in particular cybersecurity awareness and education. Topics include mental models, user interfaces, and simulated attacks.
Recently held in Toronto, Canada, the ACM CHI Conference on Human Factors in Computing Systems is the premier international conference of Human-Computer Interaction.
Arnel, Judith and Manna from our Toronto office recently held a Lunch & Learn to share what they learned over four very full days of talks, courses and demos, covering everything from best practices in research to robotics.
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Jason Hong
This talk was for the Cylab partners meeting in 2011. I gave an overview of research my colleagues and I are doing in streamlining authentication as well as understanding human behavior at large scales.
Similar to C3E talk on Navigating Cyberspace, January 2014 (20)
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
This was a 15 minute talk at the C3E workshop on navigating cyberspace. I give a brief overview of what works and what doesn’t for visualization. I also talk a bit at the end about ways of scaling things up (in particular, collaboration, crowdsourcing, and machine learning). Some slides in this talk borrowed from Chris Harrison and Jeff Heer
Qmeeinfographic on amount of information
Yeah, we’re more like this
Wonderful book, with a wonderful title that really summarizes the essence of infoviz: using vision to think
Here’s an example of infoviz. Can have text instructions. Can also have a map. Note that this map is good in that it shows relationships, distances, etc. However, this map also has a lot of clutter, in terms of too many unimportant streets, text running into each other, and color makes it hard to differentiate between what’s important and what’s not.
Compare to Google Maps, they de-emphasize certain roads, emphasize others more, and are better at layout of text labels.
Another case study. If you squint, entire map looks red.
Compare to this one, shows that America is actually more purple than red. Same data, different representation.
Divide things up by county. Can immediately see missing data, as well as distribution of who votes for whom.
Distortion view, shows state sizes based on electoral votes.
This is by population size, can see that major population areas tend to vote blue.
All visualizations have biases. Need fast alternatives to help understand things (so you don’t fool yourself), and you need to realize this when dealing with data.
One of the most beautiful visualizations. Note that it’s roughly geographic, but also relational, showing stops relative to each other. Note that the river Thames does not turn at 90 degrees, and it doesn’t show exact distances. The task of a person in the Tube is not about distances, but just relative distances and relative spaces.
Some data sets don’t have a natural visualization though. This is an art piece by Ben Fry of processing fame, and while it’s very cool, note that it doesn’t really use “vision to think”, things don’t pop out here.
And if there’s too much data, sometimes all you get is a big fat blob
This notion of navigating cyberspace probably won’t be successful, because it doesn’t have the same characteristics of a space that we normally think of
But just because there might not be a good natural metaphor doesn’t preclude us from trying to build good conceptual models. If you physically open a computer, you won’t find icons, folders, windows, etc, but it’s still a fantastic conceptual model for helping us make use of the power of a computer. (Despite the fact that it’s 40 years old)
Slide from Jeff Heer
Slide from Jeff Heer
Slide from Jeff HeerData is messy (missing in this case), a common problem
Slide also from Jeff HeerAlso see Licklider’s quote in Man-Machine Symbiosis, he says something similar
Slide also from Jeff HeerToolchain of work (sort of similar to Clang and LLVM toolchain)
Maybe crowdsourcing can help too, this is based on our work on analyzing smartphone apps, to find unusual behaviors
Polo Chau, Christos Faloutsos, Jason Hong, NikiKitturA bottom-up approach for understanding graphs with hundreds of thousands of nodes and edgesUses a bottom-up approach, where you start with exemplars, and then uses machine learning algorithms to expand and cluster the graph