Is 'net neutrality' an objectively measurable thing? The scientific report recently commissioned by Ofcom (the UK telecoms regulator) on Traffic Management Detection says 'no'. Furthermore, 'neutrality' isn't even what we want! This presentation is an annotated version from a webinar that summarises the report and suggests a way out of the 'neutrality' quagmire.
Broadband is a relatively new technology, and its underlying science is still being developed. We have long understood the 'right' units in other engineering disciplines: mass, length, hardness, etc. What is the 'right' unit for supply and demand for broadband?
This presentation discusses the need for having the right metric. This means solving two problems: the 'abstraction' gap, and the 'inference' gap. âQ is the ideal metric because it fills both gaps.
Introduction to ÎQ and Network Performance Science (extracts)Martin Geddes
Â
Introduction and summary sections from long slide deck (165 slides) on network performance science as the associated mathematical breakthrough that makes it possible.
FCC Open Internet Transparency - a review by Martin GeddesMartin Geddes
Â
How technically sound and effective are the Federal Communications Commission's proposed rules on broadband measurement? This short informal report evaluates them and finds a concerning shortfall.
Network performance optimisation using high-fidelity measuresMartin Geddes
Â
Communications service providers are seeking to increase their profitability and return on assets Predictable Network Solutions Ltd has the capability to support optimisation beyond traditional approaches to network data analytics. This capability is built around a robust scientific method. CSPs can benefit greatly from enhancing the fidelity of their measurements of critical aspects of network performance. Standard techniques fail to capture enough resolution. We have the missing leading-edge measurement capabilities that all CSPs need.
This presentation shares some of the latest advances in network performance science. What are the problems with how people today measure, model and manage performance? What are the state of the art approaches? A case study from Kent Public Service Network will illustrate the scope for improvements in all network operators.
Broadband is a relatively new technology, and its underlying science is still being developed. We have long understood the 'right' units in other engineering disciplines: mass, length, hardness, etc. What is the 'right' unit for supply and demand for broadband?
This presentation discusses the need for having the right metric. This means solving two problems: the 'abstraction' gap, and the 'inference' gap. âQ is the ideal metric because it fills both gaps.
Introduction to ÎQ and Network Performance Science (extracts)Martin Geddes
Â
Introduction and summary sections from long slide deck (165 slides) on network performance science as the associated mathematical breakthrough that makes it possible.
FCC Open Internet Transparency - a review by Martin GeddesMartin Geddes
Â
How technically sound and effective are the Federal Communications Commission's proposed rules on broadband measurement? This short informal report evaluates them and finds a concerning shortfall.
Network performance optimisation using high-fidelity measuresMartin Geddes
Â
Communications service providers are seeking to increase their profitability and return on assets Predictable Network Solutions Ltd has the capability to support optimisation beyond traditional approaches to network data analytics. This capability is built around a robust scientific method. CSPs can benefit greatly from enhancing the fidelity of their measurements of critical aspects of network performance. Standard techniques fail to capture enough resolution. We have the missing leading-edge measurement capabilities that all CSPs need.
This presentation shares some of the latest advances in network performance science. What are the problems with how people today measure, model and manage performance? What are the state of the art approaches? A case study from Kent Public Service Network will illustrate the scope for improvements in all network operators.
Addicted to speed: Why broadband service providers need a âhealthier lifestyleâMartin Geddes
Â
Broadband service providers are trapped in a vicious circle of network upgrades where they try to use capacity to fix scheduling problems. To escape this cycle, they need to construct their networks differently to schedule traffic appropriately. The benefits are enormous.
The ISP industry has been selling the public and government on the benefits of 'superfast' broadband. This presentation argues that the goal should instead be 'superfit' broadband.
The issue of quality in networks has been long being troublesome, resulting in endless deferral. It was a hard issue for the pioneers to deal with âqualityâ and âQoSâ as the underlying mathematics was insufficient to support their ambitions. We have now filled in a significant part of the missing mathematical foundations. The culmination of that work is the âQ framework.
As a by-product of this framework, a new approach to sharing quality has become possible: a polyservice network. We believe that this is a significant conceptual and practical advance. However, we have (until now) lacked industry standard terminology to describe it.
This short presentation introduces the idea of a polyservice network, and contrasts it with pre-existing approaches to âpriority QoSâ.
The goal of this presentation is to share exemplars of important broadband Internet access performance phenomena. In particular, we highlight the critical role of stationarity.
When they have non-stationarity, networks are useless for most applications. We show real-world examples of both stationarity and non-stationarity, and discuss the implications for broadband stakeholders.
These phenomena are only visible when using state-of-the-art high-fidelity metrics and measures that capture instantaneous flow.
Network Cost and Performance Transformation ServicesMartin Geddes
Â
Presentation prepared by Predictable Network Solutions. Overview on their network cost and performance transformations services for communication service providers.
Introduction to network quality arbitrageMartin Geddes
Â
Many large operators have expressed a desire to undertake disruptive change, and we have often proposed an agenda for such change. What typically happens is that, after several rounds of engagement, we observe that there is little mainstream organisational appetite to engage in disruption. Why so?
The main reason is a perception gap between the current state of the art (which any leading operator delivers) and our understanding of the state of the possible (which most operators are very far from). This gap exaggerates the risks of engaging in disruption, and underestimates the potential rewards.
Another reason is that our industry as a whole implicitly believes that network service quality is a matter of detecting and rectifying âfaultsâ. This framing inhibits the consideration of the alternative paradigm of networks as resource trading spaces. As a result, the significant âquality arbitrageâ that exists in all IP networks is not visible.
Operators face the risk that others will exploit the arbitrage opportunity, to their serious commercial disadvantage. This has happened before, e.g. with TDM and the rise of ISPs, and is happening now with SD-WAN. We propose that a larger multinational operators need to proactively initiate the disruption via a new business unit.
Sample proposal summary for quality arbitrage business unitMartin Geddes
Â
The telecoms industry is getting to grips with quality and performance. The current system has a weak control over quality, and many pricing mismatches. As a result, there are arbitrage opportunities everywhere. This presentation for a global telco proposed a new business unit to take advantage of them.
When we get water, electricity, or gas delivered to our home or place of work we expect it to have predictable quality. Why isn't this also true of broadband? The answer is we don't (yet) have the "glue" to integrate performance in digital supply chains.
Network performance - skilled craft to hard scienceMartin Geddes
Â
This document describes the technical and business journey for network operators wanting to turn network performance from a skilled craft into hard science.
Digital supply chain quality managementMartin Geddes
Â
We've figured out how to send physical goods around the world: aggregate them into containers. We're still struggling how to do digital good, which we disaggregate into packets. Here's the answer.
The Properties and Mathematics of Data Transport QualityMartin Geddes
Â
A Brief Introduction to âQualityâ in Data Networks; its Interaction with End User Experience, its Conservation, Propagation, and how it can be Traded, Costed and Managed.
ieee projects 2012 for cse in mobile computing, ieee projects mobile computing 2012, bulk ieee projects, bulk ieee projects 2012, bulk ieee projects 2012 for cse, bulk ieee projects 2012 for cse with abstract, bulk ieee projects 2012 for cse in mobile computing, bulk ieee projects 2012 mobile computing, ieee projects 2012 mobile computing, ieee 2012 projects, ieee 2012 projects for cse, ieee projects for cse 2012 free download, ieee projects for cse 2012 with abstract, ieee 2012 papers, ieee 2012 projects on mobile computing, ieee 2012 projects in mobile computing, ieee 2012 projects for it, ieee projects 2012 for cse in java, 2012 ieee projects, 2012 ieee projects for cse, 2012 ieee projects list, latest ieee projects 2012 for cse, latest ieee projects 2012 for it
Advanced techno-economic modelling of distribution network investment require...Power System Operation
Â
In an increasingly dynamic and changing electricity sector
with rising distributed energy resources, new network investment models are needed that enable consideration
of flexibility, uncertainty and risk. Existing modelling frameworks include âtop downâ models that offer a comparison of investment and investment strategies between
scenarios and âbottom upâ models that consider detailed
technical impacts on real networks. These frameworks are broadly appropriate for analysing investment, with
the requirements of the business, stakeholders and
regulator influencing the specific model design and
implementation. There are a number of dimensions across network engineering, investment, customers and energy markets to be captured and represented in the modelling
at some level. This paper presents a number of advanced modelling techniques which can be applied to both topdown
and bottom up modelling frameworks, enabling
better consideration of customer variability, network risk and optioneering of solutions.
Drawing on Bayesian statistics, customer load has been represented using a sophisticated statistical model that
reflects both variability and uncertainty in demand on LV networks. This can help to explicitly quantify network risk due to existing loads, new loads and customer flexibility. A network âemulatorâ model provides significantly faster run-
times for analysis of large solution sets by parameterising the variables of a power flow model against the inputs.
This has been applied and tested with LV, HV and EHV networks with results closely matching equivalent power
flow models. Implemented in combination with the
Bayesian customer load model enables probabilistic,
risk- based modelling. A constrained cost optimisation algorithm has also been developed to find the lowest cost
Addicted to speed: Why broadband service providers need a âhealthier lifestyleâMartin Geddes
Â
Broadband service providers are trapped in a vicious circle of network upgrades where they try to use capacity to fix scheduling problems. To escape this cycle, they need to construct their networks differently to schedule traffic appropriately. The benefits are enormous.
The ISP industry has been selling the public and government on the benefits of 'superfast' broadband. This presentation argues that the goal should instead be 'superfit' broadband.
The issue of quality in networks has been long being troublesome, resulting in endless deferral. It was a hard issue for the pioneers to deal with âqualityâ and âQoSâ as the underlying mathematics was insufficient to support their ambitions. We have now filled in a significant part of the missing mathematical foundations. The culmination of that work is the âQ framework.
As a by-product of this framework, a new approach to sharing quality has become possible: a polyservice network. We believe that this is a significant conceptual and practical advance. However, we have (until now) lacked industry standard terminology to describe it.
This short presentation introduces the idea of a polyservice network, and contrasts it with pre-existing approaches to âpriority QoSâ.
The goal of this presentation is to share exemplars of important broadband Internet access performance phenomena. In particular, we highlight the critical role of stationarity.
When they have non-stationarity, networks are useless for most applications. We show real-world examples of both stationarity and non-stationarity, and discuss the implications for broadband stakeholders.
These phenomena are only visible when using state-of-the-art high-fidelity metrics and measures that capture instantaneous flow.
Network Cost and Performance Transformation ServicesMartin Geddes
Â
Presentation prepared by Predictable Network Solutions. Overview on their network cost and performance transformations services for communication service providers.
Introduction to network quality arbitrageMartin Geddes
Â
Many large operators have expressed a desire to undertake disruptive change, and we have often proposed an agenda for such change. What typically happens is that, after several rounds of engagement, we observe that there is little mainstream organisational appetite to engage in disruption. Why so?
The main reason is a perception gap between the current state of the art (which any leading operator delivers) and our understanding of the state of the possible (which most operators are very far from). This gap exaggerates the risks of engaging in disruption, and underestimates the potential rewards.
Another reason is that our industry as a whole implicitly believes that network service quality is a matter of detecting and rectifying âfaultsâ. This framing inhibits the consideration of the alternative paradigm of networks as resource trading spaces. As a result, the significant âquality arbitrageâ that exists in all IP networks is not visible.
Operators face the risk that others will exploit the arbitrage opportunity, to their serious commercial disadvantage. This has happened before, e.g. with TDM and the rise of ISPs, and is happening now with SD-WAN. We propose that a larger multinational operators need to proactively initiate the disruption via a new business unit.
Sample proposal summary for quality arbitrage business unitMartin Geddes
Â
The telecoms industry is getting to grips with quality and performance. The current system has a weak control over quality, and many pricing mismatches. As a result, there are arbitrage opportunities everywhere. This presentation for a global telco proposed a new business unit to take advantage of them.
When we get water, electricity, or gas delivered to our home or place of work we expect it to have predictable quality. Why isn't this also true of broadband? The answer is we don't (yet) have the "glue" to integrate performance in digital supply chains.
Network performance - skilled craft to hard scienceMartin Geddes
Â
This document describes the technical and business journey for network operators wanting to turn network performance from a skilled craft into hard science.
Digital supply chain quality managementMartin Geddes
Â
We've figured out how to send physical goods around the world: aggregate them into containers. We're still struggling how to do digital good, which we disaggregate into packets. Here's the answer.
The Properties and Mathematics of Data Transport QualityMartin Geddes
Â
A Brief Introduction to âQualityâ in Data Networks; its Interaction with End User Experience, its Conservation, Propagation, and how it can be Traded, Costed and Managed.
ieee projects 2012 for cse in mobile computing, ieee projects mobile computing 2012, bulk ieee projects, bulk ieee projects 2012, bulk ieee projects 2012 for cse, bulk ieee projects 2012 for cse with abstract, bulk ieee projects 2012 for cse in mobile computing, bulk ieee projects 2012 mobile computing, ieee projects 2012 mobile computing, ieee 2012 projects, ieee 2012 projects for cse, ieee projects for cse 2012 free download, ieee projects for cse 2012 with abstract, ieee 2012 papers, ieee 2012 projects on mobile computing, ieee 2012 projects in mobile computing, ieee 2012 projects for it, ieee projects 2012 for cse in java, 2012 ieee projects, 2012 ieee projects for cse, 2012 ieee projects list, latest ieee projects 2012 for cse, latest ieee projects 2012 for it
Advanced techno-economic modelling of distribution network investment require...Power System Operation
Â
In an increasingly dynamic and changing electricity sector
with rising distributed energy resources, new network investment models are needed that enable consideration
of flexibility, uncertainty and risk. Existing modelling frameworks include âtop downâ models that offer a comparison of investment and investment strategies between
scenarios and âbottom upâ models that consider detailed
technical impacts on real networks. These frameworks are broadly appropriate for analysing investment, with
the requirements of the business, stakeholders and
regulator influencing the specific model design and
implementation. There are a number of dimensions across network engineering, investment, customers and energy markets to be captured and represented in the modelling
at some level. This paper presents a number of advanced modelling techniques which can be applied to both topdown
and bottom up modelling frameworks, enabling
better consideration of customer variability, network risk and optioneering of solutions.
Drawing on Bayesian statistics, customer load has been represented using a sophisticated statistical model that
reflects both variability and uncertainty in demand on LV networks. This can help to explicitly quantify network risk due to existing loads, new loads and customer flexibility. A network âemulatorâ model provides significantly faster run-
times for analysis of large solution sets by parameterising the variables of a power flow model against the inputs.
This has been applied and tested with LV, HV and EHV networks with results closely matching equivalent power
flow models. Implemented in combination with the
Bayesian customer load model enables probabilistic,
risk- based modelling. A constrained cost optimisation algorithm has also been developed to find the lowest cost
Peter Coffee (VP Platform Research at salesforce.com) keynote on harnessing disruption in Mobile, Social, and Big Data technologies using cloud services and predictive tools
In this business analysis training, you will learn Gap Analysis. Topics covered in this session are:
⢠GAP Analysis
⢠Basic Process
⢠Stages
⢠Feasibility Study
⢠What is Feasibility Study?
⢠Why?
⢠Types
⢠ROI
⢠Feasibility Matrix
⢠Example
For more information, visit this link: https://www.mindsmapped.com/courses/business-analysis/business-analyst-training-for-beginners/
We present a novel application of advanced logic-based business rules (Rulelog) and natural language processing (Textual Logic): to automatically generate detailed explanations for business decision making and education. Business users need to deeply understand the critical knowledge that underlies organizational decisions. Students at all levels want to understand the "why" not just the "what", and benefit from automated support for developing higher cognitive and critical thinking skills. Our approach is domain-neutral, and its generated explanations are interactively navigable. We give two case studies:
¡ Regulations & policies in financial compliance. A key challenge in compliance is the ever-growing amount and complexity of regulations & policies. Our approach aids compliance professionals to interpret the results of automated decision support systems and to contribute more rapidly and effectively to evolving the implemented business rules that underlie those systems.
¡ Review and test prep in college-level science. A key challenge in education is the high cost of personalizing the learning experience. Our approach reduces that cost, deepens the learning experience, and empowers the student.
The cloud: financial, legal and technical. Presentation by Morgan Hill, Amazon and Taylor Wessing. Held on Tuesday, 14th Sep 2010 at The City Club, London.
This presentation was given at ITU Telecom World in December 2015. It gives a viewpoint on key telecoms regulatory issues from the viewpoint of being a network performance expert.
Taming the regulatory tiger with jwg and smartlogicAnn Kelly
Â
From CEOs to board members to operational managers, regulatory compliance is an ongoing concern. In a rapidly changing marketplace where complex regulations come from multiple regulatory bodies, the consequences of non-compliance can be costly to the enterprise in time, money and damage to their reputation.
JWG, a London think tank, has created RegDelta â a state-of-the-art regulatory change management platform - that allows individual stakeholders to quickly understand the impact of regulations and maintain a single source of truth for their regulatory obligations.
Hear Elliot Burgess, Head of Product and Client Services at JWG and Paul Gunstone, Sales Director at Smartlogic discuss the challenges organizations face identifying and complying with relevant regulations, JWGâs approach to taming the regulatory tiger with semantics and see a demo of the JWG RegDelta platform.
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...Karan Menon
Â
Paper Presentation in PLM 2018
Authors:
Karan Menon, Hannu Kärkkäinen, Thorsten Wuest & Timo Seppälä
Tampere University of Technology; West Virginia University; ETLA, Finland.
Public safety is at a crossroads both from an operational and a technology perspective.
It is moving away from the reactive, resource-intensive models of the past to efficiency-driven, proactive, community-based models. From narrowband radio communications to coordinate their workforce to an environment that delivers more effective public safety through delivery of rich information infield over multiple technologies. It is not yet clear where the intersection will finally lie.
This presentation indicates that the answer is unified critical communications and no one technology will suit anyone or everyone. It puts forward a number of suggestions that will allow public safety agencies to prepare for the future and successfully navigate this period of change.
Transformation of legacy landscape in the insurance worldNIIT Technologies
Â
Evolving business models decrease the distance between customers and providers. The need for direct and easy communication and the transparency between the two increases, and products silos are curtailed. The insurance industry is struggling with a multitude of applications that require extensive maintenance and have mediocre capabilities. This white paper aims at helping organizations understand the issues involved in effective management of the existing legacy systems.
Overview of Records Management. Records management (RM) is the practice of maintaining the records of an organization from the time they are created up through their eventual disposal. This presentation walks through the key drivers, records management adoption issues, policy alignment and the cloud.
Exploring the opportunities and pitfalls of new and emerging technologies in ...Livingstone Advisory
Â
Presentation delivered at Annual Future of Local Government Summit
Rydges, Melbourne, Thursday 23rd May 2013
This is a variant of the presentation delivered in April 2013 to the Municipal Association of Victoria
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
Similar to Essential science for broadband regulation (20)
Superfast or superfit? The case for UK broadband policy reformMartin Geddes
Â
This is a critical moment for UK digital infrastructure policy. The context is one of rapid political, market and technological change. As a nation, we face important decisions over topics like post-Brexit regulation, universal service delivery, Openreach independence, TETRA replacement and 5G readiness. The imperative is to reflect on whether our historic approaches will meet our future needs. Where we anticipate a shortfall, we must act to protect our long-term national interest.
This paper aims to educate policymakers about one specific shortfall: the growing âcapability gapâ between broadband demand and supply.
It makes two recommendations.
This unwanted situation is avoidable by two readily attainable changes in our policy approach.
Firstly, our policy metrics need to reflect the readiness of broadband infrastructure to support both present and future demand.
Secondly, the money needs to move to incentivise the right market behaviours to create a correspondingly fit-for-purpose supply.
When these reforms are enacted together, this will help to position the UK with a world-class infrastructure ready to attract capital and talent on a global scale.
Broadband service quality - rationing or markets?Martin Geddes
Â
"Net neutrality" is implicitly framed as a debate over how to deliver an equitable ration of quality to each broadband user and application. This is the wrong debate to have, since it is both technically impossible and economically unfair. We should instead be discussing how to create a transparent market for quality that is both achievable and fair.
The End of Information Technology: Introducing Hypersense & Human TechnologyMartin Geddes
Â
If we were to climb into a time machine and set the dial for ten years into the future, what might personal communications look like? Might you inhabit a soothing virtual reality where your conference call takes place in a simulated lakeside villa? Might you consult with a virtual doctor? Employ a âGuardian Avatarâ to act autonomously on your behalf eliminating online drudgery and security concerns? Although no particular future is certain, the seeds of what is to come can always be found within the present reality, albeit often only in retrospect.
The future of computing is a symbiosis of machines and people. To achieve this we need an "operating system" upgrade for digital technology. We all need a Guardian Avatar to help us to navigate the "metaverse", and to care for us and protect us.
Evaluating the internet end-user experience in the Russian FederationMartin Geddes
Â
This presentation examines the underlying structure of the quality loss over the Internet between Russia and points in Europe. It uses extremely high-fidelity measurements and uncovers a unique data set as a result.
The human race is on a journey from beasts to superheroes to gods. This short presentation frames our progression, and the key challenge that we need to face to get there.
Beyond 'neutrality' - how to reconnect regulation to reality?Martin Geddes
Â
How can we anchor broadband policy in technical reality? The key is to understand that there is a critical missing element missing from the current literature: the stochastic nature of broadband. This has significant and serious implications for all regulators, ISPs and consumer advocates.
The perception gap: the barrier to disruptive innovation in telecomsMartin Geddes
Â
The 'state of the possible' in telecoms is a long way ahead the 'state of the art'. The new science of network performance enables a large leap in customer experience and cost. However, the perception among operators is that only relatively small, incremental improvements are possible.
This presentation explores the reasons for this 'perception gap' between what is seen to be possible, and what actually is. It draws on our work at senior levels for tier 1 operators, as well as examples from outside the telecoms industry.
Overcoming this gap opens the possibility to disruptive innovation. Who will seize the opportunity? Incumbents, challengers or new entrants?
This paper is a bibliography of articles on the key technology trends of today: Mass personalisation, Inclusive and accessible design, Data-driven decision making, Generational change, Portfolio careers, Virtual workplace solution, Privacy, Resurgence in voice, On-the-go communications, Future of email, Virtual reality, Gaming and gamification, Sensor revolution, Sensual interfaces, Soundscaping, Wearables, Social robotics, Sentiment analysis, Anticipatory computing, Virtual assistants, Wireless and mobility, Distributed trust systems, Batteries and power, âGlomadâ workers, Home teleworking, Data destruction, Cybermeetings, Security as a service, Human productivity, Simplified security
A forecast of the needs of future business communications users, based on research by Martin Geddes and Dean Bubley. We address the questions: What are the future communications needs of workers? ďżźHow and where do people work?
A Study of Traffic Management Detection Methods & ToolsMartin Geddes
Â
This scientific report was commissioned by the UK telecoms regulator, Ofcom, from Predictable Network Solutions Ltd. It evaluates the suitability of different traffic management techniques for regulatory use. The conclusions are very significant for the "net neutrality" debate, since it points out many common misconceptions about how broadband actually works.
Hypertext to Hypervoice - The next stage in collaboration on the WebMartin Geddes
Â
Imagine a world where computers enrich our voices with superhuman powers; where voice is integrated into our social media just as text and images currently are; where our voice can be used as a communication tool at its full capacity: simple, powerful and rich. This is the world of hypervoice, where voice on the Web is as native and
natural as hypertext.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
Â
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
đ Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Â
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties â USA
Expansion of bot farms â how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks â Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Â
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Enhancing Performance with Globus and the Science DMZGlobus
Â
ESnet has led the way in helping national facilitiesâand many other institutions in the research communityâconfigure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Â
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatâs changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Â
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navyâs DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATOâs (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Â
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
Â
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Dev Dives: Train smarter, not harder â active learning and UiPath LLMs for do...UiPathCommunity
Â
đĽ Speed, accuracy, and scaling â discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Miningâ˘:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing â with little to no training required
Get an exclusive demo of the new family of UiPath LLMs â GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
đ¨âđŤ Andras Palfi, Senior Product Manager, UiPath
đŠâđŤ Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
Â
In this second installment of our Essentials of Automations webinar series, weâll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
Weâll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether youâre tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Letâs turn complexity into clarity and make your workspaces work wonders!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Â
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Â
Essential science for broadband regulation
1. Essential science
for broadband regulation
PREDICTABLE
NETWORK
SOLUTIONS
Š 2015 Predictable Network Solutions Ltd - All Rights Reserved
September 2015
2. ⢠This presentation is an edited and annotated version
of the one shown on the webinar âEssential Science
for Broadband Regulationâ performed on 3rd
September 2015.
â The numbered pages correspond to those in the webinar.
⢠The webinar was produced by Predictable Network
Solutions Ltd with support from Martin Geddes
Consulting Ltd.
â To watch the webinar, download this presentation and click
here. To read the Ofcom report on which the webinar is
based, download this presentation and click here.
⢠Please note that the webinar (and this
accompanying presentation) is not at Ofcomâs
request or endorsed by Ofcom.
3. What is this presentation about?
Predictable Network
Solutions Ltd
responded to an
Ofcom invitation to tender
âA Study of Traffic Management
Detection Methods & Toolsâ
2
4. ⢠Our offer is to help you to reframe the issue of
broadband traffic management; to share what we
discovered from writing the report; and to help
illuminate the way forward.
⢠Our hope is to grow awareness of our ground-
breaking work and the framework we use; and to
initiate a discussion on how we, as an industry, can
better work together.
6. ⢠As far as we are aware, we are the only people able
to make prospective system-wide statements about
broadband performance backed by mathematical
proof.
⢠This presentation was put together by a team with
over 70 years of collective experience in distributed
systems and their performance.
⢠We have been successfully applying network
performance science for a number of years, and have
several âworld firstâ breakthroughs, including the first
ever quality-assured ISP.
⢠Our clients include US DoD/Boeing, CERN, and many
tier 1 operators (both fixed and mobile).
7. The scope of the report
IN SCOPE
Performance
Science
Mathematics
Reasoning
OUT OF SCOPE
Blocking
Pricing
Economics
Policy
5
8. ⢠The report addresses questions of pure science; not
policy, or economics, or law.
⢠The framework that was used in the report can be
applied to such questions â but this was beyond the
remit.
⢠Hence issues like âzero ratingâ are out of scope.
10. ⢠Traffic Management (TM) is what happens at points
in the network where demand exceeds supply (at
short timescales) and resource allocation decisions
are made (e.g. packet scheduling algorithms).
⢠Differential Traffic Management (DTM) is TM in
which the resource allocation decisions depend on
some aspect of the traffic (source, destination,
markings, payload, etc.).
⢠Traffic Management Detection (TMD) is any method
that uses observation of operational behaviour of the
network with the goal of detecting the presence of
DTM.
11. The question posed by Ofcom
An explicit question,
similar to spectrum management:
Are any TMD methods
suitable for regulatory use?
Some implicit questions:
How to find âbad actorsâ? (using undeclared DTM)
How to detect and remedy âfoul playâ? (using TMD)
7
13. ⢠Aspects of the conclusions have only been
considered in the UK legal, market and technology
context.
⢠This is important as the UK has a rich digital supply
chain: open access, wholesale and retail, and many
suppliers and technologies.
⢠It also introduces new subtleties, like the layering of
the network protocols that affect the utility of TMD.
⢠However, the underlying science is universal.
15. ⢠Ofcomâs remit is defined in the Communications Act
2003, and is highly relevant.
⢠The Act requires the regulator to balance the cost of
any regulation against its utility.
⢠The utility must consider the impact of the regulation
on the weaker in society, such as small businesses,
the disabled, those in rural areas, or the poor.
17. ⢠Any new regulation has to be efficient and effective
in its ability to detect, isolate and attribute any
performance issues.
⢠It must also be strong enough to stand up in court. As
such, we have approached this analysis as âexpert
witness strengthâ. We believe it to be highly robust.
⢠TMD is being considered here for a new purpose that
its creators had not designed it for. Many of the
shortfalls we have noted have also been identified by
the original creators of these TMD techniques.
⢠This presentation is not intended as a critique of
what were originally network research projects.
19. ⢠The issue of TMD sits in a wider context, the
contentious issue of ânet neutralityâ. Many people,
rightly or wrongly, are upset about the broadband
industry.
⢠The idea of ânet neutralityâ bundles up these
technical issues around traffic management with
others, such as the abuse of market power.
⢠We are separating out the science of broadband
performance from the wider debate.
21. ⢠The report is significant because the ânet neutralityâ
policy debate has thus far lacked rigorous scientific
foundations with respect to traffic management.
⢠The report identifies several widespread
misconceptions about how broadband works that
have significant policy implications.
⢠The report (briefly) identifies a way to reframe the
problem of broadband performance regulation to
transcend the (over)heated debate we see today.
23. Our methodology
1. Problem specification
2. Research of TMD tools
3. Evaluate their
fitness-for-purpose
14
24. ⢠The methodology we followed started with a
problem specification, in which we defined TM and
the role of TMD.
⢠We then undertook research to identify the
important TMD tools and how they relate.
⢠We then evaluated these toolsâ fitness-for-purpose
against Ofcomâs explicit criteria. These included their
scalability, fidelity to reality (false +ve/-ve), and
spatial localisation of performance issues.
⢠We also addressed Ofcomâs implicit question: âEven if
you succeed at TMD, does it help Ofcom meet its
remit?â.
26. ⢠This citation graph captures the key published
articles we found in this subject area.
⢠There are clearly some key ânodesâ of papers that are
seen as being of the greatest significance.
⢠We believe that this search process has flushed out
all of the likely candidate TMD techniques for which
public data existed at the time the report was
compiled (second half of 2014).
30. ⢠There were three key criteria, and no TMD tool was
found to satisfy them all.
â Localisation: there are locations where TM can occur that
are below L3 routing, so cannot be pinned down by any of
the TMD tools studied.
â Scalability: TMD may excessively consume network
resources due to the volume or rate of load if scaled up.
â Reliability: They all fall well short of the standard of
mathematical proof, so the âhigh barâ of a regulator cannot
be met.
⢠Network tomography is a new alternative approach
to observation that has the required localisation and
scalability. Its applicability in this regulatory domain
requires further research.
31. The real issue⌠We have been looking
at the problem in the wrong way
18
32. ⢠Users only care about delivered performance
outcomes. That experience is only a result of the
end-to-end quality.
⢠The experience is variable because the resource is
shared. There is a concern about âunfairnessâ of poor
performance due to that sharing.
⢠Regulators want to understand their role in managing
âfairnessâ. Their implicit feeling is that DTM may lead
to âunfairâ discrimination.
⢠The issue is that framing the problem in terms of
DTM and TMD is unhelpful.
34. ⢠There is a more fundamental question. Broadband is,
by definition, packet-based statistical multiplexing.
So what is the service are users buying?
â What are its key parameters?
â What is it reasonable for users to expect from the
service?
â How to know if they got it?
36. ⢠To answer these questions, you need a framework to
evaluate competing answers.
⢠What might that framework be?
37. Properties of a good framework
⢠Coherent
â Stand up scrutiny (scientific, and hence legal)
⢠Useful
â Relatable to Ofcomâs goals
⢠Practical
â Implementable with available technologyâŚ
â âŚat reasonable cost
21
38. ⢠TMD techniques are looking for different TM
behaviours. You might think of this as âin this basket
of fruit, is there an apple, or an orange?â
⢠We are dealing with a class of âsquishy things from
trees with seeds in themâ.
⢠To generalise the problem into a framework we need
a âTheory of fruitâ to characterise and classify them
â Calories, number of pips, type of flesh, vitamins,
minerals, poisonous or edible, colour, and season.
39. ⢠The reportâs appendices outline the framework we
used. It is a âtheory of broadband performanceâ and
is mathematical in its nature.
⢠The framework is a general framing of the âsemantics
of performanceâ (of packet networks).
⢠It is called ââQâ â it captures the essential
performance properties that emerge from networks
⢠Whilst it has had multiple industry applications, this
is the first time it has been used in a regulatory
context.
40. Some key basic concepts
What did you
want it to do?
Intentional
semantics
What did you
ask it to do?
Denotational
semantics
What did it
actually do?
Operational
semantics
22
41. ⢠The framework starts with some simple questions
about what the system is supposed to do, was asked
to do, and actually did.
⢠Computer scientists have fancy terms for these
simple questions: intentional, denotational and
operational semantics.
â Itâs a bit like sending your children to bed: you wanted
them in bed at 9pm, you asked them to go to bed for 9pm,
and they went to bed at 9pm.
⢠However, these may not align (as any parent can tell
you). Broadband performance regulation is about
managing any misalignment.
42.
43. ⢠Think of deploying a fruit machine as an example.
⢠Intentional semantics
â âMake a profit from gambling, legallyâ
⢠Denotational semantics
â âSymbols on wheels and a promise of paymentâ
⢠Operational semantics
â âMany people have fun losing money, and few
even more fun winning moneyâ
⢠A regulator would wish to ensure compliance with
the law (the intention), which means the payout
(operation) needs to meet the payout ratio
(denotation).
44. Typical network
performance engineering
⢠Intentional semantics
â âDeliver a unified comms systemâ
⢠Denotational semantics
â âDeliver this quantity of quality to these
users as expressed in this protocolâ
⢠Operational semantics
â A working UC system with a bounded
performance failure rate
24
45. Example:
Typical broadband ISP performance
⢠Intentional semantics
â âBest effortâ
⢠Denotational semantics
â Peak burst âspeedâ
⢠Operational semantics
â âWhatever happens, happenedâ
â Yesterday it worked, today it isnât working, and
thatâs how networks work (or donât)
25
46. Example: broadband regulation
⢠Intentional semantics
â âSupport societyâs communications
needs, whilst protecting the weakestâ
⢠Denotational semantics
â A collection of regulation policies
⢠Operational semantics
â An objective system of measurement and
enforcement
26
47. Traffic management detection
⢠Intentional semantics
â âSomeone may be acting with bad
intentâ
⢠Denotational semantics
â âDifferential traffic management was
inferred to be presentâ
⢠Operational semantics
â âDifferential outcomes were observedâ
28
48. ⢠Deducing the intention from the operation is logically
impossible. It CANNOT be done, philosophically or
practically.
⢠Therefore using current TMD to derive intention in
any general way is attempting a mathematically
intractable problem from a âhigh barâ regulatory
perspective, due to false positives and negatives.
⢠Hence detecting and locating âneutrality violationsâ or
âdiscriminationâ is tantamount to a mathematical
foolsâ errand.
⢠So what can be done?
49. âLevels of fairness
& justiceâ
Intentional
Semantics
Denotational
Semantics
Operational
Semantics
Social (all telcos)
Business (all users)
Individual user QoE
Application
performance
outcome
End-to-end packet
loss and delay
Local packet queues
& serialisation
Point to point
transmission
Physics
The âgame boardâ of broadband
performance regulation
29
50. ⢠This is our first formulation of the key issues, and a
the framework to evaluate competing theories of
broadband regulation. It lays out the logical levels at
which âfairnessâ might apply.
⢠We think youâll agree that âelectron or photon
fairnessâ is not a widespread concern, but social
fairness is! Yet we have to create the social fairness
by the information we convey via electrons and
photons, and all the intermediate levels.
⢠So where in this âboardâ should we be focusing our
attention?
51. âLevels of fairness
& justiceâ
Intentional
Semantics
Denotational
Semantics
Operational
Semantics
Social (all telcos)
Business (all users)
Individual user QoE
Application
performance
outcome
End-to-end packet
loss and delay
Local packet queues
& serialisation
Point to point
transmission
Physics
The ânet neutralityâ
debate framing
TMD
Open
Internet
30
52. ⢠The common approach to analysing the ânet
neutralityâ issue is to start with a consideration of
âbest effortâ operational behaviours at the level of
queues.
⢠It then presumes that âfairâ treatment of packets
results in âfairâ treatment of application providers
and users. A theory of âopen Internetâ is usually
invoked to explain the need for such fairness.
⢠The reasoning from that initial point relies on a
âtransitive closureâ assumption, whereby fairness at
one level results in fairness at a higher level.
⢠We have to challenge that assumption! Indeed, not
only may all the assumption(s) not hold, the arrows
and âjoinsâ have (yet) to make a rational argument!
54. ⢠The core problem with this chain of reasoning is how
to differentiate âflukesâ from âfaultsâ in the ânetwork
casinoâ. With âbest effortâ, the default is âeverything is
a flukeâ.
⢠So how to formulate the intentional when trying to
detect âunfairnessâ? For âbest effortâ broadband, the
intentional semantics are (by definition) undefined!
⢠The issue: there is no general means to distinguish
flukes from faults (and cannot be one).
⢠So reverse engineering intention on the basis of TMD
notions of fairness is not a meaningful question to
even ask!
55. Three inference failures
in the idea of ânet neutralityâ
1. You canât even observe
all possible forms of DTM
2. TMD attempts to generalise
the specific to the general
3. Presence or absence of DTM isnât what
determines benefit to citizens anyway!
32
56. ⢠Current TMD is only telling you about a very narrow
set of DTM behaviours of those possible. Regulation
would would need to consider all possible traffic
management policies and mechanisms in all current
and likely future network architectures.
⢠Furthermore, absence of evidence of unfairness is
not evidence of absence of it. Conversely, presence
of certain behaviours is not proof of unfairness.
⢠Finally, discouraging DTM is operationally infeasible.
Equality of misery isnât what citizens need, and in any
case certain crucial aspects of network stability
require DTM.
57. Problems we actually need to address
1. What is the intention
that you should be regulating?
2. What could you practically
operationally observe?
3. How can we focus on ends,
not means?
33
58. ⢠What is the intention the regulator should be
regulating?
â What are âgoodâ and âbadâ intentions, anyway?
⢠What could you actually operationally observe?
â âNeutralnessâ is not observable!
â So what would be desirable to observe?
⢠How can we focus on ends, not means?
â We want to just observe if the intention was
delivered.
â Leave network operators freedom on the question
of how to deliver it.
61. ⢠We werenât asked for a way out of the âdead endâ
⢠Yet there is another way of framing the question that
DOES have the appropriate propertiesâŚ
⢠âŚand needs more work to implement
⢠Itâs not about ânet neutralityâ, itâs really about
âbroadband policyâ.
⢠To progress we need to change the language:
â Decouple TM, TMD, ânet neutralityâ (i.e. âfairnessâ)
â Enable a market with suitable performance
differentiators
62.
63. ⢠Given Ofcomâs original framing
â The relationship of network performance to QoE is
known, but not yet widely understood
â Causality is commonly misrepresented (e.g. failure
to understand the existence of a predictable
region of operation; emergent nondeterminism
not even considered)
⢠Questioning Ofcomâs framing
â The whole industry is grappling with the nature of
cause and effect, resource allocation and
outcome, technical vs socio-legal issues
64. What facts does
good policy need to work from?
⢠Packet networks are stochastic
⢠They have emergent properties
⢠They are engineered by us
â They are not merely natural phenomena!
â We control the semantics
37
65. ⢠Statistical sharing - the principle that makes âalways
onâ mass connectivity economically feasible - is also
the key cause of variability in delivered service
quality.
â This is because an individual shared resource can only
process one thing at a time, so others that arrive have to
wait.
⢠The unpredictability of the load from very many
users and applications makes networks inherently
random and possibly nondeterministic.
⢠The real-time statistical (i.e. stochastic) behaviour is
what determines the performance of applications.
66. What are the myths that
we need to be wary of?
⢠Belief in unbounded network self-optimisation
⢠Belief in the intentionality of flukes
⢠Belief that more capacity always solves all
performance issues
38
67. ⢠Scientific progress is made by understanding what are
the good questions to ask â the good questions are ones
than can be answered (many can not).
⢠The âmythsâ enumerated here are ones that we often
hear expressed, whose implicit acceptance stops
important questions from being asked. The facts:
1 Networks canât self-optimise over all timescales and all
sizes.
2 Statistical flukes can occur and, given protocol
behaviours, there are various other induced
phenomena outside the direct control of the network
provider.
3 Making things faster, adding capacity, helps some issues
â but there are always limits that need to be engaged
with in the debate.
69. ⢠In working on the report, combined with other work
we see that there is a potential practical resolution to
broadband performance policy. One that is a âwin-
win-winâ for users, ISPs, and society.
⢠It has become clear that framing ânetwork neutralityâ
in terms of âpacket fairnessâ is not just unhelpful, it is
untenable.
⢠The approach needed is one where the actors in the
digital supply chain can constructively act together,
not one which is based on blame and its attribution.
⢠Such an approach has the potential to deliver the
predictable/consistent levels of performance needed
to support future applications
â IoT, e-health & education, smart grids, intelligent cities &
transport, etc.
70. âLevels of fairness
& justiceâ
Intentional
Semantics
Denotational
Semantics
Operational
Semantics
Social (all telcos)
Business (all users)
Individual user QoE
Application
performance
outcome
End-to-end packet
loss and delay
Local packet queues
& serialisation
Point to point
transmission
Physics
The alternative
âquality floorâ framing
40
71. ⢠Our proposal is to approach the regulatory problem
in a different way.
⢠The issues of economics, law, policy, mathematics,
physics and technology need to be teased apart.
⢠Each domain needs to be offered a space in which
subject matter experts can legitimately express their
knowledge without unconsciously expressing
opinions on adjacent areas in which they are not
authorities.
⢠A rational form of reasoning needs to start with the
intentional, and work its way down and across,
refining the social intention into operational
behaviours.
⢠A âquality floorâ is one way to achieve this.
72. Our proposed way forward
⢠People:
â Socialisation of the science of performance in the
policy community and beyond.
⢠Process:
â Align policy to performance science.
⢠Technology:
â Quality floor (narrow the intentional semantics).
â Network tomography (objective measurement of
operational semantics).
41
73. ⢠The process of aligning policy to performance science
needs to address the following issues:
â What is quality (i.e. performance)?
â What does it mean to deliver it?
â How to measure it?
â How to attribute it in a supply chain?
74. Next steps
42
Regulators: Educate yourself on the science
Telcos and ISPs: Measure and manage quality
through the usersâ eyes
Industry bodies: Start a dialogue around value
delivered and service
differentiation, not commodity
speed
Consumer advocates: Campaign for minimum quality
(not peak speeds)
75. Our relevant services
⢠We offer education and training in network
performance science, and run both public and
private workshops.
⢠We offer consulting services to help with
broadband network product innovation and
operational optimisation.
⢠We offer network tomography technology,
which captures the operational behaviours
needed for effective regulation.
76. Join us to
move this debate
and industry forward
Contact Martin Geddes at
mail@martingeddes.com
to set up a time to talk