Regardless of an individual's age, appropriate retirement planning or contributions to pension plan is quintessential to ensure a secure living after retirement. at http://maryrue03august.bravesites.com/entries/financial-services/personal-pension-plan
A patient perspective on the Five Year Forward View, pop up uni, 2pm, 3 septe...NHS England
Expo is the most significant annual health and social care event in the calendar, uniting more NHS and care leaders, commissioners, clinicians, voluntary sector partners, innovators and media than any other health and care event.
Expo 15 returned to Manchester and was hosted once again by NHS England. Around 5000 people a day from health and care, the voluntary sector, local government, and industry joined together at Manchester Central Convention Centre for two packed days of speakers, workshops, exhibitions and professional development.
This year, Expo was more relevant and engaging than ever before, happening within the first 100 days of the new Government, and almost 12 months after the publication of the NHS Five Year Forward View. It was also a great opportunity to check on and learn from the progress of Greater Manchester as the area prepares to take over a £6 billion devolved health and social care budget, pledging to integrate hospital, community, primary and social care and vastly improve health and well-being.
More information is available online: www.expo.nhs.uk
Regardless of an individual's age, appropriate retirement planning or contributions to pension plan is quintessential to ensure a secure living after retirement. at http://maryrue03august.bravesites.com/entries/financial-services/personal-pension-plan
A patient perspective on the Five Year Forward View, pop up uni, 2pm, 3 septe...NHS England
Expo is the most significant annual health and social care event in the calendar, uniting more NHS and care leaders, commissioners, clinicians, voluntary sector partners, innovators and media than any other health and care event.
Expo 15 returned to Manchester and was hosted once again by NHS England. Around 5000 people a day from health and care, the voluntary sector, local government, and industry joined together at Manchester Central Convention Centre for two packed days of speakers, workshops, exhibitions and professional development.
This year, Expo was more relevant and engaging than ever before, happening within the first 100 days of the new Government, and almost 12 months after the publication of the NHS Five Year Forward View. It was also a great opportunity to check on and learn from the progress of Greater Manchester as the area prepares to take over a £6 billion devolved health and social care budget, pledging to integrate hospital, community, primary and social care and vastly improve health and well-being.
More information is available online: www.expo.nhs.uk
Was asked to present at Learnography's inaugural Brunchography event. This presentation covered what is happening in the mobile learning space, how businesses can begin to move in this direction and 3 tips they can put to practice right away when designing for mobile.
Please share your thoughts and comments with us at Counter Design Studio on LinkedIn or Twitter (@counterdstudio). Would love to hear how mobile is being used in your business for training and enablement.
Data mining and analysis has been dominated by the big looking at the small. Businesses, institutions and governments examine our habits with an eye to commercial opportunities, welfare, and security. However, big data is migrating analysis into the arena of networking and association to enhance services: advertising, ‘pre-selling,’ healthcare, security and tax avoidance reduction. But this leaves the critical arena of Small Data unaddressed - the small looking at the small - individuals and things examining and exploiting their own data.
Here we consider a future of ubiquitous tagging, sensors, measuring and networked monitoring powered by the IoT. Key conclusions see many devices talking to each other at close range with little (or no) need of internet connection, and more network connections generated between things than those on the net.
For millennia we have crafted artifacts from bulk materials that we have progressively refined to produce ever more precision tools and products. Latterly, we have crossed a critical threshold where our abilities now eclipse Mother Nature. For example; the smallest transistors in production today have feature sizes down to 2nm which is smaller than a biological virus ~20 - 200nm. The implications for ITC, AI, Robotics, and Production are ever more profound as we approach, and most likely undercut, the scale of the atom ~ 0.1-0.4nm. Not only does this open the door to new technologies, it sees new and remarkable capabilities. So, in this presentation we look at this new Tech Horizon spanning robotics to quantum computing and sensory technologies, and how they will help us realise sustainable futures germane to Industry 4.0, 5.0, and beyond.
Telecom customer services appear to be stuck in the early 20th Century with the telephone call the primary channel for service provision that can take days to affect. Compare that to Google, Amazon, IBM, Apple and other modern companies where customers control service provision by the minute or second.
Modem business is driven by the accumulation of customer data, but the Telecom Industry sees vast amounts of customer-related data dormant and untapped. As a result, many new opportunities are lost. For example, the behavior of people, devices, systems, and networks give the earliest indicators of potential security problems.
OTT operators exploit networks and make far greater profits than any other sector and this might be further amplified by the roll-out of 5G. But without a fundamental rethink of FTTP, 5G will fail to deliver sufficient coverage and the advertised data rates. This pending failure is already seeing alternative solutions from outside the industry along with the realization that most ‘things’ on the IoT will never connect to the internet!
It has been estimated that the global earnings of Cyber Criminals will equal or exceed the GDP of the UK sometime in the 2022/23 window. If this was the capability of a country they would be joining the G8! Clearly, we are losing the Cyber War hands down, and the time has long passed when we might ignore the threat scenarios surrounding us.
In this lecture we examine global networks from home and office through the ‘last mile,’ and on to national and international networks to identify the key vulnerabilities and points of potential ingress. We identify the cyber risks as escalating as we approach the periphery of all forms of network. For the most part, the core/carrier networks are virtually unassailable physically as they are dominated by terrestrial and undersea optical fibre cables.
Throughout the ‘carrier’ network levels the difficulty of physical interception, encryption, routing, and path diversity employed renders them secure in the extreme. Attackers, therefore, tend to focus on the exploitation of people, devices, services, home, and office appliances, and latterly, a poorly engineered IoT.
In reality, we are expanding the attack surface of the planet exponentially without due caution or care in the most exposed sectors and locations. And so, we explore potential tech and operational solutions for the future.
NOTE: This lecture is one of a series that has examined technology design and deployment, devices and the IoT, people fallibility, deviousness, internal and external threats.
In class; RED and BLUE Team Exercises have also been conducted in support of the complete Cyber Security Package to date.
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...adamdeja
As the air gap between our daily lives and the Internet continues to shrink the security of our personal data and devices grows in importance. We are facing the daily threat of putting 2000s era computers bolted to toasters online while expecting them to defend against 2017 capable attackers. This talk will explore the continuing trend of IoT, discuss how we’ve been here before, and layout strategies for keeping pace with attackers in the future. This talk will focus on enumerating this risk, discuss the challenges involved, and explore solutions.
First, we will examine this history of how we got here, and what it means to say “security is a snapshot in time.” We then introduce the idea of shared ken – the range of one’s knowledge or sight – and how it impacts security. Third, we discuss the influence of data as code, the meta game, and secrecy as a way of mastering impact and ken.
This talk will allow attendees to walk away with
A holistic view of the history of computer security and how it impacts them today
The importance of extending the range of collective vision to reduce blind spots
Practical advice for BSiders to grow their mindset and improve their impact
Adam is a founding partner and Chief Executive Officer at Deja vu Security. He is dedicated to the leadership and relentless innovation in Deja’s products and services. Previously he has lead teams conducting application and hardware penetration tests for the Fortune 500 technology firms. Adam is a contributing author to multiple security books, benchmarks, tools, and DARPA research projects. Adam holds a degree in Computer Science and a Masters from Carnegie Mellon University in Information Networking.
Possibilities and perils of the data-driven world.joshuakauffman
I gave this lecture and led a discussion at the Future Insight summit in Oslo, Norway, March 13, 2014.
This was an introduction to subjects relating to the data-driven world, including a lengthier bit on the Quantified Self.
I improvised from the presenter notes.They give a pretty good sense of the contour of the talk.
In the Q and A session, people were mostly concerned about privacy implications of personal data collection.
My short answer is that I am also concerned, and think we need to broaden the discussion of privacy so that it transcends the concept of unwanted exposure and recenters itself on questions relating to the terms of exchange of personal data as they relate to social and economic value.
During one of my personal projects I decided to study the internals of Android and the potential of altering the Dalvik VM (e.g. Xposed framework and Cydia) and application behaviour. Not going into detail about runtime hooking of constructors and classes like these two tools provide, I also explored the possibility of reverse engineering and modifying existing applications.
In the web you can find multiple tutorials on Android reverse engineering of applications but not many that do it with real applications that are often subject to obfuscation or with complex execution flows. So in order to learn I decided to pick a common application such as Skype and do the following:
decompile it
study contents and completely remove some functionality (e.g. ads)
change some resources (not described in presentation bellow)
recompile, sign and install.
Used tools include :
apktool – for (de)compiling android applications
jarsigner – for signing android applications
xposed – for intercepting runtime execution flow (will make public in future)
The following presentation describes the steps taken in order to completely remove the ads from skype. This includes any computation or data plan usage the ads consume. Please note the disclaimer of the presentation as this information is for educational purposes only.
Check my website : www.marioalmeida.eu
Was asked to present at Learnography's inaugural Brunchography event. This presentation covered what is happening in the mobile learning space, how businesses can begin to move in this direction and 3 tips they can put to practice right away when designing for mobile.
Please share your thoughts and comments with us at Counter Design Studio on LinkedIn or Twitter (@counterdstudio). Would love to hear how mobile is being used in your business for training and enablement.
Data mining and analysis has been dominated by the big looking at the small. Businesses, institutions and governments examine our habits with an eye to commercial opportunities, welfare, and security. However, big data is migrating analysis into the arena of networking and association to enhance services: advertising, ‘pre-selling,’ healthcare, security and tax avoidance reduction. But this leaves the critical arena of Small Data unaddressed - the small looking at the small - individuals and things examining and exploiting their own data.
Here we consider a future of ubiquitous tagging, sensors, measuring and networked monitoring powered by the IoT. Key conclusions see many devices talking to each other at close range with little (or no) need of internet connection, and more network connections generated between things than those on the net.
For millennia we have crafted artifacts from bulk materials that we have progressively refined to produce ever more precision tools and products. Latterly, we have crossed a critical threshold where our abilities now eclipse Mother Nature. For example; the smallest transistors in production today have feature sizes down to 2nm which is smaller than a biological virus ~20 - 200nm. The implications for ITC, AI, Robotics, and Production are ever more profound as we approach, and most likely undercut, the scale of the atom ~ 0.1-0.4nm. Not only does this open the door to new technologies, it sees new and remarkable capabilities. So, in this presentation we look at this new Tech Horizon spanning robotics to quantum computing and sensory technologies, and how they will help us realise sustainable futures germane to Industry 4.0, 5.0, and beyond.
Telecom customer services appear to be stuck in the early 20th Century with the telephone call the primary channel for service provision that can take days to affect. Compare that to Google, Amazon, IBM, Apple and other modern companies where customers control service provision by the minute or second.
Modem business is driven by the accumulation of customer data, but the Telecom Industry sees vast amounts of customer-related data dormant and untapped. As a result, many new opportunities are lost. For example, the behavior of people, devices, systems, and networks give the earliest indicators of potential security problems.
OTT operators exploit networks and make far greater profits than any other sector and this might be further amplified by the roll-out of 5G. But without a fundamental rethink of FTTP, 5G will fail to deliver sufficient coverage and the advertised data rates. This pending failure is already seeing alternative solutions from outside the industry along with the realization that most ‘things’ on the IoT will never connect to the internet!
It has been estimated that the global earnings of Cyber Criminals will equal or exceed the GDP of the UK sometime in the 2022/23 window. If this was the capability of a country they would be joining the G8! Clearly, we are losing the Cyber War hands down, and the time has long passed when we might ignore the threat scenarios surrounding us.
In this lecture we examine global networks from home and office through the ‘last mile,’ and on to national and international networks to identify the key vulnerabilities and points of potential ingress. We identify the cyber risks as escalating as we approach the periphery of all forms of network. For the most part, the core/carrier networks are virtually unassailable physically as they are dominated by terrestrial and undersea optical fibre cables.
Throughout the ‘carrier’ network levels the difficulty of physical interception, encryption, routing, and path diversity employed renders them secure in the extreme. Attackers, therefore, tend to focus on the exploitation of people, devices, services, home, and office appliances, and latterly, a poorly engineered IoT.
In reality, we are expanding the attack surface of the planet exponentially without due caution or care in the most exposed sectors and locations. And so, we explore potential tech and operational solutions for the future.
NOTE: This lecture is one of a series that has examined technology design and deployment, devices and the IoT, people fallibility, deviousness, internal and external threats.
In class; RED and BLUE Team Exercises have also been conducted in support of the complete Cyber Security Package to date.
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...adamdeja
As the air gap between our daily lives and the Internet continues to shrink the security of our personal data and devices grows in importance. We are facing the daily threat of putting 2000s era computers bolted to toasters online while expecting them to defend against 2017 capable attackers. This talk will explore the continuing trend of IoT, discuss how we’ve been here before, and layout strategies for keeping pace with attackers in the future. This talk will focus on enumerating this risk, discuss the challenges involved, and explore solutions.
First, we will examine this history of how we got here, and what it means to say “security is a snapshot in time.” We then introduce the idea of shared ken – the range of one’s knowledge or sight – and how it impacts security. Third, we discuss the influence of data as code, the meta game, and secrecy as a way of mastering impact and ken.
This talk will allow attendees to walk away with
A holistic view of the history of computer security and how it impacts them today
The importance of extending the range of collective vision to reduce blind spots
Practical advice for BSiders to grow their mindset and improve their impact
Adam is a founding partner and Chief Executive Officer at Deja vu Security. He is dedicated to the leadership and relentless innovation in Deja’s products and services. Previously he has lead teams conducting application and hardware penetration tests for the Fortune 500 technology firms. Adam is a contributing author to multiple security books, benchmarks, tools, and DARPA research projects. Adam holds a degree in Computer Science and a Masters from Carnegie Mellon University in Information Networking.
Possibilities and perils of the data-driven world.joshuakauffman
I gave this lecture and led a discussion at the Future Insight summit in Oslo, Norway, March 13, 2014.
This was an introduction to subjects relating to the data-driven world, including a lengthier bit on the Quantified Self.
I improvised from the presenter notes.They give a pretty good sense of the contour of the talk.
In the Q and A session, people were mostly concerned about privacy implications of personal data collection.
My short answer is that I am also concerned, and think we need to broaden the discussion of privacy so that it transcends the concept of unwanted exposure and recenters itself on questions relating to the terms of exchange of personal data as they relate to social and economic value.
During one of my personal projects I decided to study the internals of Android and the potential of altering the Dalvik VM (e.g. Xposed framework and Cydia) and application behaviour. Not going into detail about runtime hooking of constructors and classes like these two tools provide, I also explored the possibility of reverse engineering and modifying existing applications.
In the web you can find multiple tutorials on Android reverse engineering of applications but not many that do it with real applications that are often subject to obfuscation or with complex execution flows. So in order to learn I decided to pick a common application such as Skype and do the following:
decompile it
study contents and completely remove some functionality (e.g. ads)
change some resources (not described in presentation bellow)
recompile, sign and install.
Used tools include :
apktool – for (de)compiling android applications
jarsigner – for signing android applications
xposed – for intercepting runtime execution flow (will make public in future)
The following presentation describes the steps taken in order to completely remove the ads from skype. This includes any computation or data plan usage the ads consume. Please note the disclaimer of the presentation as this information is for educational purposes only.
Check my website : www.marioalmeida.eu
Overview of the high-availability of YARN. How to make it highly available and the possibility of using NDB MySQL Cluster in order to store the state of the Resource Manager and the Application Masters without having to depend on different architectures such as Zookeeper and HDFS.
Missing references, will add soon!!
Dimemas and Multi-Level Cache SimulationsMário Almeida
This report describes the simulation and benchmarking steps taken in order to predict the parallel performance of an application using Dimemas and Cache-level simulations. Using Dimemas [3] the time
behaviour of NAS [1] integer sort was simulated for the architecture of the Barcelona Super Computer, MareNostrum [4]. The performance was evaluated as a function of the architecture latency, bandwidth,
connectivity and CPU speed. For Cache-Level Simulations, Intel's pin tool was used to benchmark a simple parallel application in function of the cache and cluster sizes.
High Availability of Services in Wide-Area Shared Computing NetworksMário Almeida
(Check my blog @ http://www.marioalmeida.eu/ )
Highly available distributed systems have been widely used and have proven to be resistant to a wide range of faults. Although these kind of services are easy to access, they require an investment that developers might not always be willing to make. We present an overview of Wide-Area shared computing networks as well as methods to provide high availability of services in such networks. We make some references to highly available systems that are being used and studied at the moment this paper was written (2012).
(Check my blog @ http://www.marioalmeida.eu/ )
In this presentation I present the performance metrics and results of running the parsec benchmark with the raytrace application on Upc's boada server
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Empirical Study of Android Alarm Usage for Application Scheduling
1. An Empirical Study of Android Alarm
Usage for Application Scheduling
Mario Almeida1
, Muhammad Bilal1
Jeremy Blackburn2
, Konstantina Papagiannaki2
1
Polytechnic University of Catalonia
2
Telefonica Research
1
(4knahs@gmail.com)
2. Energy: Major Concern for Mobiles
● Main Culprits?
○ Screen
○ Radio
○ CPU
○ Graphics
○ Sensors
● Interactive Use
● Background Use
(ACM ID 1855861 USENIXATC'10)
2
3. How Much Background Use Is There?
Online presence apps tend to run in
background 70-80% of the time!
(Andrius et al CONEXT’13)
3
4. How Much Background Use Is There?
Up to 9 times faster energy drain with 4 popular apps!
(Andrius et al CONEXT’13)
4
5. How To Schedule Background Tasks?
Android alarms to the rescue!
Time critical (exact) or not (inexact/deferrable)
Apps can determine:
● Deferrability
● Trigger time
● Repetition interval of alarms!
5
6. How To Schedule Background Tasks?
From Android Kitkat (19) alarms can be batched!
● Reduced wakeups
● Saves energy (data)
6
Major target of energy saving innovation in last 2 Google IO conferences!
Traffic shaping (e.g., batching) cannot ignore app-
protocol interaction & OS integration
*Vergara et al IWCMC’13
7. How To Schedule Background Tasks?
Android 6 (SDK23 ,Oct 15) -> 3 new APIsJobInfo APIs (21) not adopted by apps
7
9. How To Schedule Background Tasks?
Android 6 (SDK23 ,Oct 15) -> 3 new APIsJobInfo APIs (21) not adopted by apps
9
API Fragmentation leads to unpredictable
QoS/performance
10. Questions
● How outdated are target SDKs?
● How widespread is alarm usage?
● How do apps use alarms?
● How do alarms impact a running device?
● How to improve alarm usage?
?
10
11. Dataset & Methodology
● Google Play Store Crawler
○ Up to 564 of the most popular free apps for each
app category
○ >22K unique apps
● Popular apps
○ + representative apps on user devices
○ + likely -> optimized for energy consumption
> 81% of total
downloads!
11
May 2015
*Viennot et al SIGMETRICS’14
13. How Outdated Are Target SDKs?
Majority (76%)
18 months.
(SDK<=19).
~Half lagging by >
21 months!
13
14. How Widespread Is Alarm Usage?
Most Alarms Exact Alarms
Widgets (80%) Casino games (37.9%)
Wallpapers (63%) Weather (35%)
Personalization (60%) Family games (32.5%)
Communication(59%) Communication (32.1%)
47% of apps use
alarms
Apps define up to 70
alarm!
14
15. Why Are Alarms So Widespread?
10% of ALL alarms
are defined in
these libraries
22% are
exact!
15
16. How Do Apps Use Alarms?
31.5% of all alarms are repeating!
*Note: apps can have both exact and inexact alarms!
16
SDK < 19
Alarm Type
Percentage of
Apps
Inexact Alarms 8.49%
Exact Alarm 44.05%
Any Alarm 46.06%
SDK >= 19
Alarm Type Percentage of
Apps
Inexact Alarms 52.91%
Exact Alarm 2.31%
Any Alarm 53.49%
17. Is It That Many Apps Are Outdated?
Even regularly
updated apps often
do not update their
SDK!
17
18. How Do Alarms Impact A Running
Device?
Experiment:
● Install dataset apps on freshly flashed device
● Run them once and let them on for 30m
● Reboot, let the phone go idle, wait 30m
● Record alarm definitions/wake ups for 3h
We used a device with Android 4.4.4 (SDK 19)
with alarm batching capabilities!
18
19. How Do Alarms Impact A Running
Device?
Dataset 1:
● 30 most popular apps
○ >1K to >500M downloads
Dataset 2:
● 30 apps with most setRepeating alarms and
SDK <19
○ deferred if SDK>= 19
19
20. How Frequent Are Device Wakeups?
Not deferred due to SDK target!
High correlation (r=0.86, p<0.01)
alarm registered <-> wakeups
20
Dataset 1:
● 261 alarms registered, 20% woke the
device
Dataset 2:
● 1041 alarms registered, 61% woke
device!
21. Examples Of Careless Alarm Usage
● Norton Security & Antivirus
○ Both SDK 17, 10M-50M downloads, together
woke the device 141 times!
● Spoora (instant messaging)
○ SDK 9, 10-50K downloads, woke the device 372
times!
● Facebook app & messenger
○ Do not share communication, both do keep-alives
and woke the device 47 times!
21
22. How To Improve Alarm Usage?
● Improve dev knowledge?
○ What about API fragmentation?
● Make all alarms inexact?
○ Does it break?
● Simply target a newer SDK?
○ Might work for more recent devices
● iOS?
○ Are alarms really needed?
22
23. Summary
● ~ 50% apps define alarms, from which ~40%
have exact alarms.
● Alarms & API fragmentation can greatly affect
energy efficiency.
● Most alarms use APIs outdated by >18months.
● Alarms:
○ Present in all categories.
○ Up to 70 alarm definitions per app.
○ At least 10% due to 3rd party libs.
○ Can wake the device very often -> wrong SDK 23
24. CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE
ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME CITE ME
Thank You For Your Time!
Questions?
24
25. News prior to study!
Doze:
● Android 6 -> SDK 23 (study is <= 22).
● Long period of inactivity -> defer alarms
● setExact() and setWindow() -> deferred
● BUT:
○ 3 new apis (setAndAllowWhileIdle,
setExactAndAllowWhileIdle and setAlarmClock)
○ Better name semantics, devs can still misuse!
25