An overview of our research on gender (diversity) in GitHub teams. In collaboration with colleagues from TU Eindhoven, CMU, UC Davis, TU Delft, U Salerno, UZH. Presented at the Dutch National Software Engineering Symposium (Amsterdam; Feb 1 2019). Based on papers published/accepted for publication at ICSE 2019, CHI 2015.
Crowd Agents: Interactive Crowd-Powered Systems in the Real WorldJeffrey Bigham
In this talk, I discuss several interactive crowd-powered systems
that help people address real-world problems. For instance, VizWiz
sends questions blind people have about their visual environment to
the crowd, Legion allows outsourcing of desktop tasks to the crowd,
and Scribe allows the crowd to caption audio in real-time. The
thousands of people have engaged with these systems, providing an
interesting look at how end users want to interact with crowd work.
Collectively, these systems illustrate a new approach to human
computation in which the dynamic crowd is provided the computational
support needed to act as a single, high-quality agent. The classic
advantage of the crowd has been its wisdom, but our systems are
beginning to show how crowd agents can surpass even expert individuals
on motor and cognitive performance tasks.
Presentation at the Big Software in the Run summer school: Diversity and inclusion in open source software communities. Topics include impact of gender and tenure diversity on productivity, diversity measurement, code of conduct, inclusion.
How Remote Work Can Foster a More Inclusive Environment for Transgender Devel...Denae Ford
In this position paper, we claim that remote work offers a mechanism of control for identity disclosure and empowerment of software developers from marginalized communities. By talking to several transgender software developers we identified three themes that resonate across the trans experience and intersect with the advantages to working in software development remotely: identity disclosure, high-impact technical work and the autonomy to disengage and re-engage. Based on these themes we identify several open questions that the research community should address.
An overview of our research on gender (diversity) in GitHub teams. In collaboration with colleagues from TU Eindhoven, CMU, UC Davis, TU Delft, U Salerno, UZH. Presented at the Dutch National Software Engineering Symposium (Amsterdam; Feb 1 2019). Based on papers published/accepted for publication at ICSE 2019, CHI 2015.
Crowd Agents: Interactive Crowd-Powered Systems in the Real WorldJeffrey Bigham
In this talk, I discuss several interactive crowd-powered systems
that help people address real-world problems. For instance, VizWiz
sends questions blind people have about their visual environment to
the crowd, Legion allows outsourcing of desktop tasks to the crowd,
and Scribe allows the crowd to caption audio in real-time. The
thousands of people have engaged with these systems, providing an
interesting look at how end users want to interact with crowd work.
Collectively, these systems illustrate a new approach to human
computation in which the dynamic crowd is provided the computational
support needed to act as a single, high-quality agent. The classic
advantage of the crowd has been its wisdom, but our systems are
beginning to show how crowd agents can surpass even expert individuals
on motor and cognitive performance tasks.
Presentation at the Big Software in the Run summer school: Diversity and inclusion in open source software communities. Topics include impact of gender and tenure diversity on productivity, diversity measurement, code of conduct, inclusion.
How Remote Work Can Foster a More Inclusive Environment for Transgender Devel...Denae Ford
In this position paper, we claim that remote work offers a mechanism of control for identity disclosure and empowerment of software developers from marginalized communities. By talking to several transgender software developers we identified three themes that resonate across the trans experience and intersect with the advantages to working in software development remotely: identity disclosure, high-impact technical work and the autonomy to disengage and re-engage. Based on these themes we identify several open questions that the research community should address.
Community smells are patterns indicating suboptimal organization and communication of software development teams that have been shown to be related to suboptimal organisation of the source code. Given a long standing association of women and communication mediation, we have conducted a series of studies relating gender diversity to community smells, as well as comparing the results of the data analysis with developers' perception. To get further insights in the relation bwteen gender and community smells, we replicate our study focusing on the Brazilian software teams; indeed, culture-specific expectations on the behavior of people of different genders might have affected the perception of the importance of gender diversity and refactoring strategies when mitigating community smells. Finally, we extend the prediction model by including variables related to national diversity and see how the interplay between national diversity and gender diversity influences presence of community smells.
This talk is based on a series of papers published in 2019-2022 and co-authored with Gemma Catolino, Filomena Ferrucci, Stefano Lambiase, Tiago Massoni, Fabio Palomba, Camila Sarmento, and Damian Andrew Tamburri.
This presentation was provided by Kelly Dagan of Amherst College, during the NISO event "Discovery and Online Search, Part One: Drivers of Change in Online Search," held on June 12, 2019.
"The (R)evolution of Social Media in Software Engineering",
Margaret-Anne (Peggy) Storey
Leif Singer
Brendan Cleary
Fernando Figueira Filho
Alexey Zagalsky
Presented at ICSE 2014, Future of Software Engineering Track, Hyderabad, June 4, 2014.
A preprint of the paper can be found here: http://chiselgroup.files.wordpress.com/2014/01/fose14main-storey-submitted.pdf
Building a community of edupreneurs in learning technologies. Keynote presentation at Future Learning Lab, University of Adger, Kristiansand, Norway by Martha G Russell, Executive Director, mediaX at Stanford University.
Fostering cross-disciplinary collaboration between data science and other disciplines like design.
Creative commons image credits:
- Cook-Anderson, Gretchen. “Snapshots from Space Cultivate Fans among Midwest Farmers.” NASA, NASA, 16 Sept. 2009, https://www.nasa.gov/topics/earth/features/farmer_imagery.html.
- "Coffee For One" by Public Places is licensed under CC BY 2.0: https://wordpress.org/openverse/image/eafd97fb-0174-4fea-8337-a9df5e678f0b
- "Cooking" by omefrans is licensed under CC BY-NC 2.0: https://wordpress.org/openverse/image/e32f7eed-66a4-4b06-82c3-2c313f28fd9f
- "Edge Effect" by Tim Pohlhaus is licensed under CC BY-NC-SA 2.0: https://wordpress.org/openverse/image/45b7ce41-ab94-47d0-8ad5-a3551a50e0d1
- "The Ponte Vecchio 'Old Bridge' and Arno River, Florence, Italy" by Ray in Manila is licensed under CC BY 2.0: https://wordpress.org/openverse/image/7567cf6d-bb94-4719-865d-a55c3f88155b
- "Ha'Penny Bridge, Black and White" by timsackton is licensed under CC BY-SA 2.0:
https://wordpress.org/openverse/image/b25d1863-9d4c-4d95-bf15-9ce5b5d9f78b - "Brooklyn Bridge, New York City, ca. 1910" by trialsanderrors is licensed under CC BY 2.0: https://wordpress.org/openverse/image/0064cc7e-7cfa-43a7-9077-3b7801f03790
Software evolution research is a thriving area of software engineering research. Recent years have seen a growing interest in variety of evolution topics, as witnessed by the growing number of publications dedicated to the subject. Without attempting to be complete, in this talk we provide an overview of emerging trends in software evolution research, such as extension of the traditional boundaries of software, growing attention for social and socio-technical aspects of software development processes, and interdisciplinary research applying research techniques from other research areas to study software evolution, and software evolution research techniques to other research areas. As a large body of software evolution research is empirical in nature, we are confronted by important challenges pertaining to reproducibility of the research, and its generalizability.
Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...Joe McCarthy
Presentation by Joe McCarthy on February 13, 2008, to the Social Networks class (TCSS 590, http://courses.washington.edu/amtgrade/courses/socialnets/Home.html) at the University of Washington, Tacoma, taught by Ankur Teredesai.
These slides were part of the kickoff for the Social Computing Collaborative group at the University of Minnesota - Jan. 2011. Each participant presented a single slide as part of their introduction of themselves and their social computing research interest areas.
Towards Continuous Performance Assessment of Java Applications With PerfBotAlexander Serebrenik
Bots for continuous performance assessment are gaining use as a productivity tool. We discuss how and why open source projects use them and present an in-depth case study of the Nanosoldier bot used by the team behind the Julia programming language. Based on analysing the history of bot usage and interviews with developers we identify lack of a shared platform for performance measurement as an obstacle to wider adoption of performance measurement bots. To address this, we propose a prototype implementation of such a platform called PerfBot.
Joint work with Florian Markusse and Philipp Leitner, presented at 5th International Workshop on
Bots in Software Engineering, collocated with ICSE 2023, Melbourne Australia.
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software...Alexander Serebrenik
The intersection of ageism and sexism can create a hostile environment for veteran software developers belonging to marginalized genders. In this study, we conducted 14 interviews to examine the experiences of people at this intersection, primarily women, in order to discover the strategies they employed in order to successfully remain in the field. We identified 283 codes, which fell into three main categories: Strategies, Experiences, and Perception. Several strategies we identified, such as (Deliberately) Not Trying to Look Younger, were not previously described in the software engineering literature. We found that, in some companies, older women developers are recognized as having particular value, further strengthening the known benefits of diversity in the workforce. Based on the experiences and strategies, we suggest organizations employing software developers to consider the benefits of hiring veteran women software developers. For example, companies can draw upon the life experiences of older women developers in order to better understand the needs of customers from a similar demographic. While we recognize that many of the strategies employed by our study participants are a response to systemic issues, we still consider that, in the short-term, there is benefit in describing these strategies for developers who are experiencing such issues today.
This paper is a joint work with Sterre van Breukelen, Ann Barcomb and Sebastian Baltes
Preprint https://arxiv.org/abs/2302.03723
More Related Content
Similar to Gender Diversity and Inclusion and Software Engineering
Community smells are patterns indicating suboptimal organization and communication of software development teams that have been shown to be related to suboptimal organisation of the source code. Given a long standing association of women and communication mediation, we have conducted a series of studies relating gender diversity to community smells, as well as comparing the results of the data analysis with developers' perception. To get further insights in the relation bwteen gender and community smells, we replicate our study focusing on the Brazilian software teams; indeed, culture-specific expectations on the behavior of people of different genders might have affected the perception of the importance of gender diversity and refactoring strategies when mitigating community smells. Finally, we extend the prediction model by including variables related to national diversity and see how the interplay between national diversity and gender diversity influences presence of community smells.
This talk is based on a series of papers published in 2019-2022 and co-authored with Gemma Catolino, Filomena Ferrucci, Stefano Lambiase, Tiago Massoni, Fabio Palomba, Camila Sarmento, and Damian Andrew Tamburri.
This presentation was provided by Kelly Dagan of Amherst College, during the NISO event "Discovery and Online Search, Part One: Drivers of Change in Online Search," held on June 12, 2019.
"The (R)evolution of Social Media in Software Engineering",
Margaret-Anne (Peggy) Storey
Leif Singer
Brendan Cleary
Fernando Figueira Filho
Alexey Zagalsky
Presented at ICSE 2014, Future of Software Engineering Track, Hyderabad, June 4, 2014.
A preprint of the paper can be found here: http://chiselgroup.files.wordpress.com/2014/01/fose14main-storey-submitted.pdf
Building a community of edupreneurs in learning technologies. Keynote presentation at Future Learning Lab, University of Adger, Kristiansand, Norway by Martha G Russell, Executive Director, mediaX at Stanford University.
Fostering cross-disciplinary collaboration between data science and other disciplines like design.
Creative commons image credits:
- Cook-Anderson, Gretchen. “Snapshots from Space Cultivate Fans among Midwest Farmers.” NASA, NASA, 16 Sept. 2009, https://www.nasa.gov/topics/earth/features/farmer_imagery.html.
- "Coffee For One" by Public Places is licensed under CC BY 2.0: https://wordpress.org/openverse/image/eafd97fb-0174-4fea-8337-a9df5e678f0b
- "Cooking" by omefrans is licensed under CC BY-NC 2.0: https://wordpress.org/openverse/image/e32f7eed-66a4-4b06-82c3-2c313f28fd9f
- "Edge Effect" by Tim Pohlhaus is licensed under CC BY-NC-SA 2.0: https://wordpress.org/openverse/image/45b7ce41-ab94-47d0-8ad5-a3551a50e0d1
- "The Ponte Vecchio 'Old Bridge' and Arno River, Florence, Italy" by Ray in Manila is licensed under CC BY 2.0: https://wordpress.org/openverse/image/7567cf6d-bb94-4719-865d-a55c3f88155b
- "Ha'Penny Bridge, Black and White" by timsackton is licensed under CC BY-SA 2.0:
https://wordpress.org/openverse/image/b25d1863-9d4c-4d95-bf15-9ce5b5d9f78b - "Brooklyn Bridge, New York City, ca. 1910" by trialsanderrors is licensed under CC BY 2.0: https://wordpress.org/openverse/image/0064cc7e-7cfa-43a7-9077-3b7801f03790
Software evolution research is a thriving area of software engineering research. Recent years have seen a growing interest in variety of evolution topics, as witnessed by the growing number of publications dedicated to the subject. Without attempting to be complete, in this talk we provide an overview of emerging trends in software evolution research, such as extension of the traditional boundaries of software, growing attention for social and socio-technical aspects of software development processes, and interdisciplinary research applying research techniques from other research areas to study software evolution, and software evolution research techniques to other research areas. As a large body of software evolution research is empirical in nature, we are confronted by important challenges pertaining to reproducibility of the research, and its generalizability.
Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...Joe McCarthy
Presentation by Joe McCarthy on February 13, 2008, to the Social Networks class (TCSS 590, http://courses.washington.edu/amtgrade/courses/socialnets/Home.html) at the University of Washington, Tacoma, taught by Ankur Teredesai.
These slides were part of the kickoff for the Social Computing Collaborative group at the University of Minnesota - Jan. 2011. Each participant presented a single slide as part of their introduction of themselves and their social computing research interest areas.
Similar to Gender Diversity and Inclusion and Software Engineering (20)
Towards Continuous Performance Assessment of Java Applications With PerfBotAlexander Serebrenik
Bots for continuous performance assessment are gaining use as a productivity tool. We discuss how and why open source projects use them and present an in-depth case study of the Nanosoldier bot used by the team behind the Julia programming language. Based on analysing the history of bot usage and interviews with developers we identify lack of a shared platform for performance measurement as an obstacle to wider adoption of performance measurement bots. To address this, we propose a prototype implementation of such a platform called PerfBot.
Joint work with Florian Markusse and Philipp Leitner, presented at 5th International Workshop on
Bots in Software Engineering, collocated with ICSE 2023, Melbourne Australia.
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software...Alexander Serebrenik
The intersection of ageism and sexism can create a hostile environment for veteran software developers belonging to marginalized genders. In this study, we conducted 14 interviews to examine the experiences of people at this intersection, primarily women, in order to discover the strategies they employed in order to successfully remain in the field. We identified 283 codes, which fell into three main categories: Strategies, Experiences, and Perception. Several strategies we identified, such as (Deliberately) Not Trying to Look Younger, were not previously described in the software engineering literature. We found that, in some companies, older women developers are recognized as having particular value, further strengthening the known benefits of diversity in the workforce. Based on the experiences and strategies, we suggest organizations employing software developers to consider the benefits of hiring veteran women software developers. For example, companies can draw upon the life experiences of older women developers in order to better understand the needs of customers from a similar demographic. While we recognize that many of the strategies employed by our study participants are a response to systemic issues, we still consider that, in the short-term, there is benefit in describing these strategies for developers who are experiencing such issues today.
This paper is a joint work with Sterre van Breukelen, Ann Barcomb and Sebastian Baltes
Preprint https://arxiv.org/abs/2302.03723
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...Alexander Serebrenik
Many software developers started to work from home on a short notice during the early periods of COVID-19. A number of previous papers have studied the wellbeing and productivity of software developers during COVID-19. The studies mainly use surveys based on predefined questionnaires. In this paper, we investigate the problems and joys that software developers experienced during the early months of COVID-19 by analyzing their discussions in online forum devRant, where discussions can be open and not bound by predefined survey questionnaires. The devRant platform is designed for developers to share their joys and frustrations of life. We manually analyze 825 devRant posts between January and April 12, 2020 that developers created to discuss their situation during COVID19. WHO declared COVID-19 as pandemic on March 11, 2020. As such, our data offers us insights in the early months of COVID-19. We manually label each post along two dimensions: the topics of the discussion and the expressed sentiment polarity (positive, negative, neutral). We observed 19 topics that we group into six categories: Workplace & Professional aspects, Personal & Family well-being, Technical Aspects, Lockdown preparedness, Financial concerns, and Societal and Educational concerns. Around 49% of the discussions are negative and 26% are positive. We find evidence of developers’ struggles with lack of documentation to work remotely and with their loneliness while working from home. We find stories of their job loss with little or no savings to fallback to. The analysis of developer discussions in the early months of a pandemic will help various stakeholders (e.g., software companies) make important decision early to alleviate developer problems if such a pandemic or similar emergency situation occurs in near future. Software engineering research can make further efforts to develop automated tools for remote work (e.g., automated documentation).
Empirical Software Engineering 27(5): 117 (2022), presented at ICSE 2023 as part of the Journal First program.
Software developers are known to experience a wide range of emotions while performing development tasks. Emotions expressed in developer communication might reflect openness of the ecosystem to newcomers, presence of conflicts, problems in the software development process or source code itself. In this talk, based on a recent work with Nicole Novielli, I present an overview of the state-of-the-art research on analysis of emotions in software engineering focusing on the studies of emotion in context of software ecosystems. To encourage further applications of emotion analysis in the industry and research we also discuss currently available emotion analysis tools and datasets as well as outline directions for future research.
This is a keynote talk given at the 11th International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems (SESoS 2023), collocated with ICSE 2023 in Melbourne, Australia.
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...Alexander Serebrenik
Modern software development practices increasingly rely on third-party libraries due to the inherent benefits of reuse. However, libraries may contain security vulnerabilities that can propagate to the dependent applications. To counter this, maintainers of dependent projects should monitor their dependencies and security reports to ensure that only patched releases of the upstream applications are in use. As manual maintenance of dependencies has shown to be ineffective, several automated tools (aka bots) have been proposed to assist developers in rapidly identifying and resolving vulnerable dependencies.
In this work, we focus on Dependabot, a popular bot providing security and version updates, and study developers' receptivity to its security updates in engineered and actively maintained JavaScript projects. Moreover, we carry out a fine-grained analysis of the lifecycle of every vulnerability to manifest how they are dealt with in the presence of Dependabot.
Our findings show that the task of fixing vulnerable dependencies is, to a large extent, delegated to Dependabot and that developers merge the majority of security updates within several days. On the other hand, when developers do not merge a security update, they usually address the identified vulnerability manually. This approach, however, often takes up to several months which in turn could expose the projects to security issues.
This paper has won the ACM Distinguished paper award at MSR 2023.
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsAlexander Serebrenik
Static analysis tools generate a large number of
alarms that require manual inspection. In prior work, repositioning of alarms is proposed to (1) merge multiple similar alarms
together and replace them by a fewer alarms, and (2) report
alarms as close as possible to the causes for their generation. The
premise is that the proposed merging and repositioning of alarms
will reduce the manual inspection effort. To evaluate the premise,
this paper presents an empirical study with 249 developers on
the proposed merging and repositioning of static alarms. The
study is conducted using static analysis alarms generated on C
programs, where the alarms are representative of the merging vs.
non-merging and repositioning vs. non-repositioning situations
in real-life code. Developers were asked to manually inspect and
determine whether assertions added corresponding to alarms in
C code hold. Additionally, two spatial cognitive tests are also
done to determine relationship in performance. The empirical
evaluation results indicate that, in contrast to expectations, there
was no evidence that merging and repositioning of alarms reduces
manual inspection effort or improves the inspection accuracy (at
times a negative impact was found). Results on cognitive abilities
correlated with comprehension and alarm inspection accuracy.
Static analysis tools help to detect common programming errors but generate a large number of false positives.
Moreover, when applied to evolving software systems, around
95% of alarms generated on a version are repeated, i.e., they
have also been generated on the previous version. Version-aware
static analysis techniques (VSATs) have been proposed to suppress
the repeated alarms that are not impacted by the code changes
between the two versions. The alarms reported by VSATs after
the suppression, called delta alarms, still constitute 63% of the
tool-generated alarms.
We observe that delta alarms can be further postprocessed
using their corresponding code changes: the code changes due
to which VSATs identify them as delta alarms. However, none
of the existing VSATs or alarms postprocessing techniques
postprocesses delta alarms using the corresponding code changes.
Based on this observation, we use the code changes to classify
delta alarms into six classes that have different priorities assigned
to them. The assignment of priorities is based on the type of
code changes and their likelihood of actually impacting the delta
alarms. The ranking of alarms, obtained by prioritizing the
classes, can help suppress alarms that are ranked lower, when
resources to inspect all the tool-generated alarms are limited.
We performed an empirical evaluation using 9789 alarms
generated on 59 versions of seven open source C applications.
The evaluation results indicate that the proposed classification
and ranking of delta alarms help to identify, on average, 53% of
delta alarms as more likely to be false positives than the others.
What Is an AI Engineer? An Empirical Analysis of Job Ads in The NetherlandsAlexander Serebrenik
Recently, the job market for Artificial Intelligence (AI) engineers
has exploded. Since the role of AI engineer is relatively new, limited
research has been done on the requirements as set by the industry.
Moreover, the definition of an AI engineer is less established than
for a data scientist or a software engineer. In this study we explore,
based on job ads, the requirements from the job market for the
position of AI engineer in The Netherlands. We retrieved job ad
data between April 2018 and April 2021 from a large job ad database,
Jobfeed from TextKernel. The job ads were selected with a process
similar to the selection of primary studies in a literature review. We
characterize the 367 resulting job ads based on meta-data such as
publication date, industry/sector, educational background and job
titles. To answer our research questions we have further coded 125
job ads manually.
The job tasks of AI engineers are concentrated in five categories:
business understanding, data engineering, modeling, software development and operations engineering. Companies ask for AI engineers with different profiles: 1) data science engineer with focus
on modeling, 2) AI software engineer with focus on software development, 3) generalist AI engineer with focus on both models
and software. Furthermore, we present the tools and technologies
mentioned in the selected job ads, and the soft skills.
Our research helps to understand the expectations companies
have for professionals building AI-enabled systems. Understanding
these expectations is crucial both for prospective AI engineers and
educational institutions in charge of training those prospective
engineers. Our research also helps to better define the profession of
AI engineering. We do this by proposing an extended AI engineering life-cycle that includes a business understanding phase.
Joint work with Marcel Meesters and Petra Heck.
Overview of a series of papers published in 2019-2021 on community smells, and their relation to code smells and gender, as well as resolution strategies.
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...Alexander Serebrenik
Women are underrepresented at all levels in computer science (CS) faculties of Dutch
universities. In this report we focus on experiences related to hiring and promoting women as assistant, associate and full professors (or equivalent at NWO-I CWI).
In 2003 Dave et al. have coined the term “opinion mining” to refer to “processing a set of search results for a given item, generating a list of product attributes (quality, features, etc.) and aggregating opinions about each of them (poor, mixed, good)”. Nine years later, in 2012 Brooks and Swigger have applied sentiment analysis in the context of software engineering. Today another nine years have passed and it is time to look back: what have we achieved as a research community and where should we go next?
To answer this question we conducted a systematic literature review involving 185 papers. Based on the literature review we present 1) well-defined categories of opinion mining-related software development activities, 2) available opinion mining approaches, whether they are evaluated when adopted in other studies, and how their performance is compared, 3) available datasets for performance evaluation and tool customization, and 4) concerns or limitations SE researchers might need to take into account when applying/customizing these opinion mining techniques. The results of our study serve as references to choose suitable opinion mining tools for SE tasks, and provide critical insights for the further development of opinion mining techniques in the SE domain.
This work has been done together with Bin Lin, Gabriele Bavota and Michele Lanza from Università della Svizzera italiana, Switzerland, Nathan Cassee from Eindhoven University of Technology, The Netherlands and Nicole Novielli from University of Bari, Italy.
In this talk I will present results obtained on removing self-admitted technical debt. Self-admitted technical debt is an indication in the source code, usually n the source code comments, that the code is not in the right shape yet. Joint work with Emad Shihab, Everton Maldonado, Rabe Abdelkareem, Fiorella Zampetti, Massimiliano Di Penta and Gianmarco Fucci.
Presented at the Google diversity workshop.
Studying gender diversity in software development teams/communities requires understanding gender of individual developers. In this talk I will provide an overview of different ways of asking developers about their gender as well as inferring gender information from the ways they present themselves and artefacts they create. We conclude by discussing limitations of the inference techniques and surveying concerns related to their application.
What is social software engineering? How do we collect the data? What kind of data do we collect? How do we analyse it? What challenges are we facing when collecting and analysing social software engineering data?
Who talks to whom? What communication channels do they use and why? What emotions are involved? Summer School on Software Engineering. Oct 9, 2018. Oulu, Finland.
Peer review is often seen as a cornerstone of modern science. We are going to discuss the current peer review practices in software engineering research, their strengths and limitations. Next we will discuss tips and tricks for writing code reviews, as well as implications for writing papers. I will also share some insights in my own reviewing practices.
My presentation at the Programming Contact Day for the mixed audience of \PhD students from Mathematics and Chemical Technology departments. How can we develop software collaboratively?
Slide 1: Title Slide
Extrachromosomal Inheritance
Slide 2: Introduction to Extrachromosomal Inheritance
Definition: Extrachromosomal inheritance refers to the transmission of genetic material that is not found within the nucleus.
Key Components: Involves genes located in mitochondria, chloroplasts, and plasmids.
Slide 3: Mitochondrial Inheritance
Mitochondria: Organelles responsible for energy production.
Mitochondrial DNA (mtDNA): Circular DNA molecule found in mitochondria.
Inheritance Pattern: Maternally inherited, meaning it is passed from mothers to all their offspring.
Diseases: Examples include Leber’s hereditary optic neuropathy (LHON) and mitochondrial myopathy.
Slide 4: Chloroplast Inheritance
Chloroplasts: Organelles responsible for photosynthesis in plants.
Chloroplast DNA (cpDNA): Circular DNA molecule found in chloroplasts.
Inheritance Pattern: Often maternally inherited in most plants, but can vary in some species.
Examples: Variegation in plants, where leaf color patterns are determined by chloroplast DNA.
Slide 5: Plasmid Inheritance
Plasmids: Small, circular DNA molecules found in bacteria and some eukaryotes.
Features: Can carry antibiotic resistance genes and can be transferred between cells through processes like conjugation.
Significance: Important in biotechnology for gene cloning and genetic engineering.
Slide 6: Mechanisms of Extrachromosomal Inheritance
Non-Mendelian Patterns: Do not follow Mendel’s laws of inheritance.
Cytoplasmic Segregation: During cell division, organelles like mitochondria and chloroplasts are randomly distributed to daughter cells.
Heteroplasmy: Presence of more than one type of organellar genome within a cell, leading to variation in expression.
Slide 7: Examples of Extrachromosomal Inheritance
Four O’clock Plant (Mirabilis jalapa): Shows variegated leaves due to different cpDNA in leaf cells.
Petite Mutants in Yeast: Result from mutations in mitochondrial DNA affecting respiration.
Slide 8: Importance of Extrachromosomal Inheritance
Evolution: Provides insight into the evolution of eukaryotic cells.
Medicine: Understanding mitochondrial inheritance helps in diagnosing and treating mitochondrial diseases.
Agriculture: Chloroplast inheritance can be used in plant breeding and genetic modification.
Slide 9: Recent Research and Advances
Gene Editing: Techniques like CRISPR-Cas9 are being used to edit mitochondrial and chloroplast DNA.
Therapies: Development of mitochondrial replacement therapy (MRT) for preventing mitochondrial diseases.
Slide 10: Conclusion
Summary: Extrachromosomal inheritance involves the transmission of genetic material outside the nucleus and plays a crucial role in genetics, medicine, and biotechnology.
Future Directions: Continued research and technological advancements hold promise for new treatments and applications.
Slide 11: Questions and Discussion
Invite Audience: Open the floor for any questions or further discussion on the topic.
Nutraceutical market, scope and growth: Herbal drug technologyLokesh Patil
As consumer awareness of health and wellness rises, the nutraceutical market—which includes goods like functional meals, drinks, and dietary supplements that provide health advantages beyond basic nutrition—is growing significantly. As healthcare expenses rise, the population ages, and people want natural and preventative health solutions more and more, this industry is increasing quickly. Further driving market expansion are product formulation innovations and the use of cutting-edge technology for customized nutrition. With its worldwide reach, the nutraceutical industry is expected to keep growing and provide significant chances for research and investment in a number of categories, including vitamins, minerals, probiotics, and herbal supplements.
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...Scintica Instrumentation
Intravital microscopy (IVM) is a powerful tool utilized to study cellular behavior over time and space in vivo. Much of our understanding of cell biology has been accomplished using various in vitro and ex vivo methods; however, these studies do not necessarily reflect the natural dynamics of biological processes. Unlike traditional cell culture or fixed tissue imaging, IVM allows for the ultra-fast high-resolution imaging of cellular processes over time and space and were studied in its natural environment. Real-time visualization of biological processes in the context of an intact organism helps maintain physiological relevance and provide insights into the progression of disease, response to treatments or developmental processes.
In this webinar we give an overview of advanced applications of the IVM system in preclinical research. IVIM technology is a provider of all-in-one intravital microscopy systems and solutions optimized for in vivo imaging of live animal models at sub-micron resolution. The system’s unique features and user-friendly software enables researchers to probe fast dynamic biological processes such as immune cell tracking, cell-cell interaction as well as vascularization and tumor metastasis with exceptional detail. This webinar will also give an overview of IVM being utilized in drug development, offering a view into the intricate interaction between drugs/nanoparticles and tissues in vivo and allows for the evaluation of therapeutic intervention in a variety of tissues and organs. This interdisciplinary collaboration continues to drive the advancements of novel therapeutic strategies.
Introduction:
RNA interference (RNAi) or Post-Transcriptional Gene Silencing (PTGS) is an important biological process for modulating eukaryotic gene expression.
It is highly conserved process of posttranscriptional gene silencing by which double stranded RNA (dsRNA) causes sequence-specific degradation of mRNA sequences.
dsRNA-induced gene silencing (RNAi) is reported in a wide range of eukaryotes ranging from worms, insects, mammals and plants.
This process mediates resistance to both endogenous parasitic and exogenous pathogenic nucleic acids, and regulates the expression of protein-coding genes.
What are small ncRNAs?
micro RNA (miRNA)
short interfering RNA (siRNA)
Properties of small non-coding RNA:
Involved in silencing mRNA transcripts.
Called “small” because they are usually only about 21-24 nucleotides long.
Synthesized by first cutting up longer precursor sequences (like the 61nt one that Lee discovered).
Silence an mRNA by base pairing with some sequence on the mRNA.
Discovery of siRNA?
The first small RNA:
In 1993 Rosalind Lee (Victor Ambros lab) was studying a non- coding gene in C. elegans, lin-4, that was involved in silencing of another gene, lin-14, at the appropriate time in the
development of the worm C. elegans.
Two small transcripts of lin-4 (22nt and 61nt) were found to be complementary to a sequence in the 3' UTR of lin-14.
Because lin-4 encoded no protein, she deduced that it must be these transcripts that are causing the silencing by RNA-RNA interactions.
Types of RNAi ( non coding RNA)
MiRNA
Length (23-25 nt)
Trans acting
Binds with target MRNA in mismatch
Translation inhibition
Si RNA
Length 21 nt.
Cis acting
Bind with target Mrna in perfect complementary sequence
Piwi-RNA
Length ; 25 to 36 nt.
Expressed in Germ Cells
Regulates trnasposomes activity
MECHANISM OF RNAI:
First the double-stranded RNA teams up with a protein complex named Dicer, which cuts the long RNA into short pieces.
Then another protein complex called RISC (RNA-induced silencing complex) discards one of the two RNA strands.
The RISC-docked, single-stranded RNA then pairs with the homologous mRNA and destroys it.
THE RISC COMPLEX:
RISC is large(>500kD) RNA multi- protein Binding complex which triggers MRNA degradation in response to MRNA
Unwinding of double stranded Si RNA by ATP independent Helicase
Active component of RISC is Ago proteins( ENDONUCLEASE) which cleave target MRNA.
DICER: endonuclease (RNase Family III)
Argonaute: Central Component of the RNA-Induced Silencing Complex (RISC)
One strand of the dsRNA produced by Dicer is retained in the RISC complex in association with Argonaute
ARGONAUTE PROTEIN :
1.PAZ(PIWI/Argonaute/ Zwille)- Recognition of target MRNA
2.PIWI (p-element induced wimpy Testis)- breaks Phosphodiester bond of mRNA.)RNAse H activity.
MiRNA:
The Double-stranded RNAs are naturally produced in eukaryotic cells during development, and they have a key role in regulating gene expression .
Cancer cell metabolism: special Reference to Lactate PathwayAADYARAJPANDEY1
Normal Cell Metabolism:
Cellular respiration describes the series of steps that cells use to break down sugar and other chemicals to get the energy we need to function.
Energy is stored in the bonds of glucose and when glucose is broken down, much of that energy is released.
Cell utilize energy in the form of ATP.
The first step of respiration is called glycolysis. In a series of steps, glycolysis breaks glucose into two smaller molecules - a chemical called pyruvate. A small amount of ATP is formed during this process.
Most healthy cells continue the breakdown in a second process, called the Kreb's cycle. The Kreb's cycle allows cells to “burn” the pyruvates made in glycolysis to get more ATP.
The last step in the breakdown of glucose is called oxidative phosphorylation (Ox-Phos).
It takes place in specialized cell structures called mitochondria. This process produces a large amount of ATP. Importantly, cells need oxygen to complete oxidative phosphorylation.
If a cell completes only glycolysis, only 2 molecules of ATP are made per glucose. However, if the cell completes the entire respiration process (glycolysis - Kreb's - oxidative phosphorylation), about 36 molecules of ATP are created, giving it much more energy to use.
IN CANCER CELL:
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
introduction to WARBERG PHENOMENA:
WARBURG EFFECT Usually, cancer cells are highly glycolytic (glucose addiction) and take up more glucose than do normal cells from outside.
Otto Heinrich Warburg (; 8 October 1883 – 1 August 1970) In 1931 was awarded the Nobel Prize in Physiology for his "discovery of the nature and mode of action of the respiratory enzyme.
WARNBURG EFFECT : cancer cells under aerobic (well-oxygenated) conditions to metabolize glucose to lactate (aerobic glycolysis) is known as the Warburg effect. Warburg made the observation that tumor slices consume glucose and secrete lactate at a higher rate than normal tissues.
What is greenhouse gasses and how many gasses are there to affect the Earth.moosaasad1975
What are greenhouse gasses how they affect the earth and its environment what is the future of the environment and earth how the weather and the climate effects.
5. Bogdan Vasilescu, Daryl Posnett, Baishakhi Ray, Mark G. J. van den Brand, Alexander Serebrenik, Premkumar T. Devanbu,
Vladimir Filkov: Gender and Tenure Diversity in GitHub Teams. CHI 2015: 3789-3798
6. Bogdan Vasilescu, Daryl Posnett, Baishakhi Ray, Mark G. J. van den Brand, Alexander Serebrenik, Premkumar T. Devanbu,
Vladimir Filkov: Gender and Tenure Diversity in GitHub Teams. CHI 2015: 3789-3798
7. Catolino, Palomba, Tamburri, Serebrenik, Ferrucci. Gender Diversity and Women in Software Teams: How Do They Affect
Community Smells? ICSE SEIS, 2019, pp. 11-20
Palomba, Tamburri, Serebrenik, Zaidman, Arcelli Fontana, Oliveto. Beyond Technical Aspects: How Do Community Smells
Influence the Intensity of Code Smells? IEEE Transactions on Software Engineering, 2018
16. Bauer GR. Making sure everyone counts: considerations for inclusion, identification, and analysis of transgender and transsexual participants in health
surveys. In: Coen S, Banister E, editors. What a difference sex and gender make. Vancouver: Institute of Gender and Health, Canadian Institutes of Health
Research; 2012. pp. 59–67.
16
17. Bauer GR. Making sure everyone counts: considerations for inclusion, identification, and analysis of transgender and transsexual participants in health
surveys. In: Coen S, Banister E, editors. What a difference sex and gender make. Vancouver: Institute of Gender and Health, Canadian Institutes of Health
Research; 2012. pp. 59–67.
Bauer GR, Braimoh J, Scheim AI, Dharma C (2017) Transgender-inclusive measures of sex/gender for population surveys: Mixed-methods evaluation and
recommendations. PLoS ONE 12(5): e0178043.
0
25
50
75
100
Male Female Other
Transfeminine (assigned male at birth, identify as women/non-binary)
Transmasculine (assigned female at birth, identify as men/non-binary)
17
25. Bogdan Vasilescu, Vladimir Filkov, Alexander Serebrenik:
Perceptions of Diversity on Git Hub: A User Survey. CHASE@ICSE 2015: 50-56
“I have used a fake GitHub handle (my normal GitHub
handle is my first name, which is a distinctly female name)
so that people would assume I was male”
Reliability
25
26. Krüger and Hermann. Text. 100%
Keyes. Face. 92.9-96.7%
Stefan Krüger, Ben Hermann. Can an Online Service Predict Gender? - On the State-of-the-Art in Gender Identification from
Texts. Gender Equality Workshop ICSE 2019
Os Keyes. The Misgendering Machines: Trans/HCI Implications of Automatic Gender Recognition. CSCW 2018
Santamaría and Mihaljević. Names.
Gender binary
26
40. Arthurian Romances, French (ca. 1275-1300). Beinecke MS 229, Yale University Library, USA.
Attraction
How well do we
extend a hand to
newcomers?
Retention
How long do different
people stay
engaged?
But…
attraction and retention
are not enough!
42. What is a Code of Conduct?
"Principles, values, standards, or rules of
behaviour that guide the decisions,
procedures and systems of an organization
in a way that (a) contributes to the welfare of
its key stakeholders, and (b) respects the
rights of all constituents affected by its
operations.”
International Federation of Accountants, 2007
43. GitHub hits
1
100
10000
Contributor Covenant
Open Code of Conduct
Python
Citizen
Ubuntu
Django
Geek Feminism
7 Common Codes of Conduct have
>500 hits across GitHub Projects
Parastou Tourani, Alexander Serebrenik, Bram Adams: Code of Conduct in Open Source Projects. 24th IEEE International
Conference on Software Analysis, Evolution, and Reengineering, pp. 24-33, 2017
49. Denae Ford, Reed Milewicz, Alexander Serebrenik. How Remote Work Can Foster a More Inclusive Environment for Transgender
Developers Workshop on Gender Equality in Software Engineering, 2019, pp. 9-12
With special thanks to Denae Ford (NCSU)
49
50. Control of Identity Disclosure:
The desire to be seen as presented
Denae Ford, Reed Milewicz, Alexander Serebrenik. How Remote Work Can Foster a More Inclusive Environment for Transgender
Developers Workshop on Gender Equality in Software Engineering, 2019, pp. 9-12
“Stack Overflow has constrained
expressions of identity. It’s up to
you what content you want to fill in.
GitHub for a while it was required
you expose your email address to
the rest of the world.”
Petruzalek: The obvious drawback of not being
passable is that you become an instant
target. So passability is not only an identity
goal, its also a mean of self-preservation
50
51. Economically Stable Work:
Distance technical merits from identity
Denae Ford, Reed Milewicz, Alexander Serebrenik. How Remote Work Can Foster a More Inclusive Environment for Transgender
Developers Workshop on Gender Equality in Software Engineering, 2019, pp. 9-12
51
52. Economically Stable Work:
Distance technical merits from identity
Denae Ford, Reed Milewicz, Alexander Serebrenik. How Remote Work Can Foster a More Inclusive Environment for Transgender
Developers Workshop on Gender Equality in Software Engineering, 2019, pp. 9-12
You cannot tell from my technical profiles that
I’m transgender. I don’t make a big deal that in
professional context. It’s just not relevant
Ross: “Technology has totally leveled the playing
field for someone like me. I can get on the internet
and watch tutorials. I have the drive to spend five
hours a day to teach myself a skill.”
52
53. Autonomy to Disengage or Reengage
Denae Ford, Reed Milewicz, Alexander Serebrenik. How Remote Work Can Foster a More Inclusive Environment for Transgender
Developers Workshop on Gender Equality in Software Engineering, 2019, pp. 9-12
When [organizations] say [they] have safe space
and don’t take the steps to truly make the space
safe. You have now encouraged these people
to be vulnerable where their safety is
compromised. It’s a very dangerous trend.”
53
54. Control of Identity Disclosure:
The desire to be seen as presented
Economically Stable Work:
Distance technical merits from identity
Autonomy to Disengage or Reengage
Denae Ford, Reed Milewicz, Alexander Serebrenik. How Remote Work Can Foster a More Inclusive Environment for Transgender
Developers Workshop on Gender Equality in Software Engineering, 2019, pp. 9-12
54
55. Denae Ford, Reed Milewicz, Alexander Serebrenik. How Remote Work Can Foster a More Inclusive Environment for Transgender
Developers Workshop on Gender Equality in Software Engineering, 2019, pp. 9-12
We believe that remote work offers
a mechanism of control for identity
disclosure and empowerment of
software developers from any
marginalized communities.
55