Understanding the Privacy Implications of Using Context-based Awareness Cues ...Ville Antila
Information from the physical world is increasingly being digitalized and shared in social networks. We share our locations, tag photos and add different kinds of informal awareness cues about the physical world to our online communities. In this paper, we investigate the privacy implications of shared context cues in social networking services. We present an experimental mobile application, which allows users to add different descriptions of context information to their Facebook and Twitter status updates. The application was used by 12 persons during a two-week user trial using their own devices and Facebook accounts. The results indicate that user-defined abstractions of context items were often preferred over more accurate indicators due to privacy concerns or discomfort in sharing. We also found out that using shared context from friends in vicinity needs careful design to overcome the extended privacy implications.
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status UpdatesVille Antila
Presentation of an experimental mobile application, which allows users to add different descriptions of context information to their Facebook status updates. The meaningfulness and the usage of different context descriptions were evaluated in a two-week user trial. The results show that the most frequently used awareness cues in the test setting were location, surroundings, friends and activity. The results also indicate that user-defined semantic abstractions of context items (e.g. “home”, “work”) were often more informative and useful than more accurate indicators (e.g. the address or the name of the place). We also found out that using shared context from friends in vicinity (e.g. identifying the people around) needs careful design to overcome the extended privacy implications.
RoutineMaker: Towards End-User Automation of Daily Routines Using SmartphonesVille Antila
People use smartphones in daily activities for accessing and storing information in various situations. In this paper, we present a work in progress for detecting and automating some of these activities. To explore the possible patterns we developed an experimental application to detect daily tasks used by smartphones and analyzed it to provide suggestions for “routines”. We conducted a two-week user study with 10 users to evaluate the approach. During the study the application logged the usage patterns, sent information to the server where it was analysed and clustered. The participants could also automate their smartphone tasks using the analysed data. The findings suggest that people would be willing to automatize tasks given that the approach gives flexibility and expressiveness without too much information overload. Future work includes refining the algorithms based on the gathered real-life data and modifying the interaction design to approach the challenges found with the initial study.
Understanding the Privacy Implications of Using Context-based Awareness Cues ...Ville Antila
Information from the physical world is increasingly being digitalized and shared in social networks. We share our locations, tag photos and add different kinds of informal awareness cues about the physical world to our online communities. In this paper, we investigate the privacy implications of shared context cues in social networking services. We present an experimental mobile application, which allows users to add different descriptions of context information to their Facebook and Twitter status updates. The application was used by 12 persons during a two-week user trial using their own devices and Facebook accounts. The results indicate that user-defined abstractions of context items were often preferred over more accurate indicators due to privacy concerns or discomfort in sharing. We also found out that using shared context from friends in vicinity needs careful design to overcome the extended privacy implications.
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status UpdatesVille Antila
Presentation of an experimental mobile application, which allows users to add different descriptions of context information to their Facebook status updates. The meaningfulness and the usage of different context descriptions were evaluated in a two-week user trial. The results show that the most frequently used awareness cues in the test setting were location, surroundings, friends and activity. The results also indicate that user-defined semantic abstractions of context items (e.g. “home”, “work”) were often more informative and useful than more accurate indicators (e.g. the address or the name of the place). We also found out that using shared context from friends in vicinity (e.g. identifying the people around) needs careful design to overcome the extended privacy implications.
RoutineMaker: Towards End-User Automation of Daily Routines Using SmartphonesVille Antila
People use smartphones in daily activities for accessing and storing information in various situations. In this paper, we present a work in progress for detecting and automating some of these activities. To explore the possible patterns we developed an experimental application to detect daily tasks used by smartphones and analyzed it to provide suggestions for “routines”. We conducted a two-week user study with 10 users to evaluate the approach. During the study the application logged the usage patterns, sent information to the server where it was analysed and clustered. The participants could also automate their smartphone tasks using the analysed data. The findings suggest that people would be willing to automatize tasks given that the approach gives flexibility and expressiveness without too much information overload. Future work includes refining the algorithms based on the gathered real-life data and modifying the interaction design to approach the challenges found with the initial study.
Location-Based Service (LBS) becomes increasingly popular with the dramatic growth of smartphones and social network services (SNS), and its context-rich functionalities attract considerable users.
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...Ville Antila
In this paper we introduce an experimental application to demonstrate the usage of context-based awareness cues in status updates, especially in SNS’s (Social Networking Services). The presented application allows users to add different descriptions of context information to their Twitter messages and Facebook status updates in a narrative format. We have also developed an adapted version of the system including conference-specific context-types such as the timetable of the presentations and indoor-location detection using Bluetooth beacons. One goal for the demonstrator is to explore the practical use of context abstractions in a conference setup and synthesize interesting insight based on the usage patterns during the event.
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...Ville Antila
In this paper, we investigate the usage of context-based awareness cues in informal information sharing, especially in social networking services. We present an experimental mobile application, which allows users to add different descriptions of context information to their Facebook status updates. The meaningfulness and the usage of different context descriptions were evaluated in a two-week user trial. The results show that the most frequently used awareness cues in the test setting were location, surroundings, friends and activity. The results also indicate that user-defined semantic abstractions of context items (e.g. “home”, “work”) were often more informative and useful than more accurate indicators (e.g. the address or the name of the place). We also found out that using shared context from friends in vicinity (e.g. identifying the people around) needs careful design to overcome the extended privacy implications.
Preserving Global and Local Features for Robust FaceRecognition under Various...CSCJournals
The increasing use of biometric technologies in high-security applications and beyond has stressed the requirement for highly dependable face recognition systems. Much research on face recognition considering the large variations in the visual stimulus due to illumination conditions, viewing directions or poses, facial expressions, aging, and disguises such as facial hair, glasses, or cosmetics has been done earlier. However, in reality the noises that may embed into an image document during scanning, printing or image capturing process will affect the performance of face recognition algorithms. Though different filtering algorithms are available for noise reduction, applying a filtering algorithm that is sensitive to one type of noise to an image which has been degraded by another type of noise lead to unfavourable results. In turn, these conditions stress the importance of the design of robust face recognition algorithms that retain recognition rates even under noisy conditions. In reality, many face recognition algorithms exist and produce good results for noiseless environments but not with various noises. In this work, numerous experiments have been conducted to analyze the robustness of our proposed Combined Global and Local Preserving Features (CGLPF) algorithm along with other existing conventional algorithms under different types of noises such as Gaussian noise, speckle noise, salt and pepper noise and quantization noise.
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
Location privacy in Location Based Services (LBS) is the capability to protect the connection between user’s identity, uncertainty sources, servers and database, thereby restraining an impending attacker from conveniently linking users of LBS to convinced locations. Smart Phones have become most important gadget for maintaining the daily activities, highly interconnected urban population is also increasingly dependent on these gadgets to regulate and schedule their daily lives. These applications often depend on current location of user or a class of user. Use of Smart Mapping technology is also increasing in large area; this system provides an easy attainable online platform that can be used for accessing many services. This survey paper projects the privacy-preserving algorithm to find the most favorable meeting location for a class of users. GSM calculates the location of all users.
Bieg Eye And Pointer Coordination In Search And Selection TasksKalle
Selecting a graphical item by pointing with a computer mouse is a ubiquitous task in many graphical user interfaces. Several techniques have been suggested to facilitate this task, for instance, by reducing the required movement distance. Here we
measure the natural coordination of eye and mouse pointer
control across several search and selection tasks. We find that users automatically minimize the distance to likely targets in an intelligent, task dependent way. When target location is highly predictable, top-down knowledge can enable users to initiate pointer movements prior to target fixation. These findings question the utility of existing assistive pointing techniques and suggest that alternative approaches might be more effective.
This poster introduces an experimental application to demonstrate the usage of context-based awareness cues in status updates, especially in SNS’s (Social Networking Services). The presented application allows users to add different descriptions of context information to their Twitter messages and Facebook status updates in a narrative format.
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
This paper presents a survey on current applications which practice the pervasive mechanism of cyber foraging. The applications include the LOCUSTS framework, Slingshot, Pupetter. This applications advocated the operating principle of task sharing among resource deficient mobile devices. These applications face some design issues for providing efficient performance like task distribution and task migration apart from the security aspect. The general operating mechanism of the cyber foraging technique are also discussed upon and the design options to leverage the throughput of the inherent mechanism is also represented in a suitable way.
Vertical Fragmentation of Location Information to Enable Location Privacy in ...ijasa
The aim of the development of Pervasive computing was to simplify our lives by integrating
communication technologies into real life. Location aware computing which is evolved from pervasive
computing performs services which are dependent on the location of the user or his communication
device. The advancements in this area have led to major revolutions in various application areas,
especially mass advertisements. It has long been evident that privacy of personal information, in this
case location of the user, is rather a touchy subject with most people. This paper explores the Location
Privacy issue in location aware computing. Vertical fragmentation of the stored location information of
users has been proposed as an effective solution for this issue.
Vision-based approaches for mobile indoor localization do not rely on the infrastructure and are therefore scalable and cheap. The particular requirements to a navigation user interface for a vision-based system, however, have not been investigated so far.
Such mobile interfaces should adapt to localization accuracy, which strongly relies on distinctive reference images, and other factors, such as the phone’s pose. If necessary, the system should motivate the user to point at distinctive regions with the smartphone to improve localization quality.
We present a combined interface of Virtual Reality (VR) and Augmented Reality (AR) elements with indicators that help to communicate and ensure localization accuracy. In an evaluation with 81 participants, we found that AR was preferred in case of reliable localization, but with VR, navigation instructions were perceived more accurate in case of localization and orientation errors. The additional indica- tors showed a potential for making users choose distinctive reference images for reliable localization.
Recognition of activities of daily living with egocentric visionNaeem Shehzad
in this presentation you can learn Recognition of activities of daily living with egocentric vision. in this presentation I mention all the data in very convenient way , hope you can get it easy.
thank you.
Micro interactions and multi dimensional graphical user interfaces in the des...Vivian Motti
Wearables have a large potential to support diverse applications. However designing their interfaces is challenging. Limited resources, dynamic constraints and situational impairments add more challenges to the UI design for wearable devices. To support stakeholders in this activity, in this presentation we discuss two design paradigms for wrist worn devices: micro interactions and multi dimensional UIs. Slides presented at the HFES Annual Meeting in 2015.
Location-Based Service (LBS) becomes increasingly popular with the dramatic growth of smartphones and social network services (SNS), and its context-rich functionalities attract considerable users.
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...Ville Antila
In this paper we introduce an experimental application to demonstrate the usage of context-based awareness cues in status updates, especially in SNS’s (Social Networking Services). The presented application allows users to add different descriptions of context information to their Twitter messages and Facebook status updates in a narrative format. We have also developed an adapted version of the system including conference-specific context-types such as the timetable of the presentations and indoor-location detection using Bluetooth beacons. One goal for the demonstrator is to explore the practical use of context abstractions in a conference setup and synthesize interesting insight based on the usage patterns during the event.
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...Ville Antila
In this paper, we investigate the usage of context-based awareness cues in informal information sharing, especially in social networking services. We present an experimental mobile application, which allows users to add different descriptions of context information to their Facebook status updates. The meaningfulness and the usage of different context descriptions were evaluated in a two-week user trial. The results show that the most frequently used awareness cues in the test setting were location, surroundings, friends and activity. The results also indicate that user-defined semantic abstractions of context items (e.g. “home”, “work”) were often more informative and useful than more accurate indicators (e.g. the address or the name of the place). We also found out that using shared context from friends in vicinity (e.g. identifying the people around) needs careful design to overcome the extended privacy implications.
Preserving Global and Local Features for Robust FaceRecognition under Various...CSCJournals
The increasing use of biometric technologies in high-security applications and beyond has stressed the requirement for highly dependable face recognition systems. Much research on face recognition considering the large variations in the visual stimulus due to illumination conditions, viewing directions or poses, facial expressions, aging, and disguises such as facial hair, glasses, or cosmetics has been done earlier. However, in reality the noises that may embed into an image document during scanning, printing or image capturing process will affect the performance of face recognition algorithms. Though different filtering algorithms are available for noise reduction, applying a filtering algorithm that is sensitive to one type of noise to an image which has been degraded by another type of noise lead to unfavourable results. In turn, these conditions stress the importance of the design of robust face recognition algorithms that retain recognition rates even under noisy conditions. In reality, many face recognition algorithms exist and produce good results for noiseless environments but not with various noises. In this work, numerous experiments have been conducted to analyze the robustness of our proposed Combined Global and Local Preserving Features (CGLPF) algorithm along with other existing conventional algorithms under different types of noises such as Gaussian noise, speckle noise, salt and pepper noise and quantization noise.
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
Location privacy in Location Based Services (LBS) is the capability to protect the connection between user’s identity, uncertainty sources, servers and database, thereby restraining an impending attacker from conveniently linking users of LBS to convinced locations. Smart Phones have become most important gadget for maintaining the daily activities, highly interconnected urban population is also increasingly dependent on these gadgets to regulate and schedule their daily lives. These applications often depend on current location of user or a class of user. Use of Smart Mapping technology is also increasing in large area; this system provides an easy attainable online platform that can be used for accessing many services. This survey paper projects the privacy-preserving algorithm to find the most favorable meeting location for a class of users. GSM calculates the location of all users.
Bieg Eye And Pointer Coordination In Search And Selection TasksKalle
Selecting a graphical item by pointing with a computer mouse is a ubiquitous task in many graphical user interfaces. Several techniques have been suggested to facilitate this task, for instance, by reducing the required movement distance. Here we
measure the natural coordination of eye and mouse pointer
control across several search and selection tasks. We find that users automatically minimize the distance to likely targets in an intelligent, task dependent way. When target location is highly predictable, top-down knowledge can enable users to initiate pointer movements prior to target fixation. These findings question the utility of existing assistive pointing techniques and suggest that alternative approaches might be more effective.
This poster introduces an experimental application to demonstrate the usage of context-based awareness cues in status updates, especially in SNS’s (Social Networking Services). The presented application allows users to add different descriptions of context information to their Twitter messages and Facebook status updates in a narrative format.
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
This paper presents a survey on current applications which practice the pervasive mechanism of cyber foraging. The applications include the LOCUSTS framework, Slingshot, Pupetter. This applications advocated the operating principle of task sharing among resource deficient mobile devices. These applications face some design issues for providing efficient performance like task distribution and task migration apart from the security aspect. The general operating mechanism of the cyber foraging technique are also discussed upon and the design options to leverage the throughput of the inherent mechanism is also represented in a suitable way.
Vertical Fragmentation of Location Information to Enable Location Privacy in ...ijasa
The aim of the development of Pervasive computing was to simplify our lives by integrating
communication technologies into real life. Location aware computing which is evolved from pervasive
computing performs services which are dependent on the location of the user or his communication
device. The advancements in this area have led to major revolutions in various application areas,
especially mass advertisements. It has long been evident that privacy of personal information, in this
case location of the user, is rather a touchy subject with most people. This paper explores the Location
Privacy issue in location aware computing. Vertical fragmentation of the stored location information of
users has been proposed as an effective solution for this issue.
Vision-based approaches for mobile indoor localization do not rely on the infrastructure and are therefore scalable and cheap. The particular requirements to a navigation user interface for a vision-based system, however, have not been investigated so far.
Such mobile interfaces should adapt to localization accuracy, which strongly relies on distinctive reference images, and other factors, such as the phone’s pose. If necessary, the system should motivate the user to point at distinctive regions with the smartphone to improve localization quality.
We present a combined interface of Virtual Reality (VR) and Augmented Reality (AR) elements with indicators that help to communicate and ensure localization accuracy. In an evaluation with 81 participants, we found that AR was preferred in case of reliable localization, but with VR, navigation instructions were perceived more accurate in case of localization and orientation errors. The additional indica- tors showed a potential for making users choose distinctive reference images for reliable localization.
Recognition of activities of daily living with egocentric visionNaeem Shehzad
in this presentation you can learn Recognition of activities of daily living with egocentric vision. in this presentation I mention all the data in very convenient way , hope you can get it easy.
thank you.
Micro interactions and multi dimensional graphical user interfaces in the des...Vivian Motti
Wearables have a large potential to support diverse applications. However designing their interfaces is challenging. Limited resources, dynamic constraints and situational impairments add more challenges to the UI design for wearable devices. To support stakeholders in this activity, in this presentation we discuss two design paradigms for wrist worn devices: micro interactions and multi dimensional UIs. Slides presented at the HFES Annual Meeting in 2015.
SMARCOS Abstract Paper submitted to ICCHP 2012Smarcos Eu
This study is part of the European project "Smarcos" (http://www.smarcos-project.eu/) that includes among its goals the development of services which are specifically designed and accessible for blind users.
In this paper we present the prototype application designed to make the main phone features available in a way which is accessible for a blind user. The prototype has been developed to firstly evaluate the interaction modalities based on gestures, audio and vibro-tactile feedback.
Eye(I) Still Know! – An App for the Blind Built using Web and AIDr. Amarjeet Singh
This paper proposes eye(I) still know!, a voice control solution for the visually impaired people. The main purpose is even though the blind cannot see they can still know where to go and what to do! Nearby 60% of total blind population across the world is present in India. In a time where no one likes to rely on anyone, this is a small effort to make the blind independent individuals. This can be achieved using wireless communication, voice recognition and image scanning. The application with the use of object identification will priorly inform about the barriers in the path.
The software will use the camera of the device and scan all the obstacles with their corresponding distances from the user. This will be followed by audio instructions through audio output of the device.
This will efficiently direct the user through his/her way.
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEEMEMTECHSTUDENTPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
An effective approach to develop location-based augmented reality information...IJECEIAES
Using location-based augmented reality (AR) for pedestrian navigation can greatly improve user action to reduce the travel time. Pedestrian navigation differs in many ways from the conventional navigation system used in a car or other vehicles. A major issue with using location-based AR for navigation to a specific landmark is their quality of usability, especially if the active screen is overcrowded with the augmented POI markers which were overlap each other at the same time. This paper describes the user journey map approach that led to new insights about how users were using location-based AR for navigation. These insights led to a deep understanding of challenges that user must face when using location-based AR application for pedestrian navigation purpose, and more generally, they helped the development team to appreciate the variety of user experience in software requirement specification phase. To prove our concept, a prototype of intuitive location-based AR was built to be compared with existing standard-location based AR. The user evaluation results reveal that the overall functional requirements which are gathered from user journey have same level of success rate criteria when compared with standard location-based AR. Nevertheless, the field study participants highlighted the extended features in our prototype could significantly enhance the user action on locating the right object in particular place when compared with standard location-based AR application (proved with the required time).
Understanding user interactivity for immersive communications and its impact ...Alpen-Adria-Universität
A major challenge for the next decade is to design virtual and augmented reality systems for real-world use cases such as healthcare, entertainment, e-education, and high-risk missions. This requires immersive systems that operate at scale, in a personalized manner, remaining bandwidth-tolerant whilst meeting quality and latency criteria. This can be accomplished only by a fundamental revolution of the network and immersive systems that has to put the interactive user at the heart of the system rather than at the end of the chain. With this goal in mind, in this talk, we provide an overview of our current researches on the behaviour of interactive users in immersive experiences and its impact on the next-generation multimedia systems. We present novel tools for behavioural analysis of users navigating in 3-DoF and 6-DoF systems, we show the impact and advantages of taking into account user behaviour in immersive systems. We then conclude with a perspective on the impact of users behaviour studies into QoE.
Geochronos File Sharing Application Using CloudIJERA Editor
Accessing, running and sharing applications and data at present face many challenges. Cloud Computing and Social Networking technologies have the potential to simplify or eliminate many of these challenges. Social Networking technologies provide a means for easily sharing applications and data. Now a day’s people want to be connected 24x7 to the world around them. Networking and Communication have come together to make the world a small place to live in. People want to be in constant touch with their subordinates where ever they are and avail emergency services whenever needed. In this paper we present an on-line/on-demand interactive application service (Software as a Service). The service is built on a cloud computing basement that provisions virtualized application servers based on user demand. An open source social networking platform is leveraged to establish a portal front-end that enables applications and results to be easily shared between users. In the proposed system users can access the documents uploaded into the cloud by others and provide any data they have in hand to other users through the same cloud. This also allows the users to have an interactive session through the chat screens present in the cloud. The paper also highlights some major security issues existing in current cloud computing environment.
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
The continuous development of cloud computing,seve ral trends are opening up to new forms of outsourci ng. Public data integrity auditing is not secure and efficient for shared dynamic data. In existing scheme figure out the collusion attack and provide an efficient public integrity au diting scheme,with the help of secure group user r evocation based on vector commitment and verifier�local revocation group signature. It provides secure and efficient s cheme which support public checking and efficient user revocati on. Problem of existing work they used TPA (Third p arty auditor) for key generation and key agreement. Use of TPA as central system if it fails then whole system gets failed. If we are working with cloud,user identity is major conc ern because user doesn�t want to reveal his persona l information to public. This concept not included in it. In this paper,based these con�s we proposed a dynamic dat a sharing in public cloud using multi-authority system. The prop osed scheme is able to protect user�s privacy again st each single authority. .
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Jedrzejczyk
1. 2010 CRC PhD Student Conference
“Privacy-Shake”, a Haptic Interface for Managing Privacy
Settings in Mobile Location Sharing Applications.
Lukasz Jedrzejczyk
l.jedrzejczyk@open.ac.uk
Supervisors Arosha Bandara
Bashar Nuseibeh
Blaine Price
Department/Institute Computing Dept.
Status Fulltime
Probation viva After
Starting date June 2008
Abstract
I describe the “Privacy-Shake”, a novel interface for managing coarse grained privacy
settings. I built a prototype that enables users of Buddy Tracker, an example location
sharing application, to change their privacy preferences by shaking their phone. Users
can enable or disable location sharing and change the level of granularity of disclosed
location by shaking and sweeping their phone. In this poster I present and motivate
my work on Privacy-Shake and report on a lab-based evaluation of the interface with
16 participants.
1. INTRODUCTION
The proliferation of location sharing applications raises several concerns related to
personal privacy. Some solutions involving location privacy policies have been
suggested (e.g., [1]). However, prior research shows that end-users have difficulties in
expressing and setting their privacy preferences [2,3]. Setting privacy rules is a time-
consuming process, which many people are unwilling to do until their privacy is
violated. Moreover, privacy preferences vary across the context, and it is hard to
define privacy policy that reflects the dynamic nature of our lives. I see this as a
strong motivation to design interfaces that help users update their privacy settings as a
consequence of their daily tasks within the system. The underlying requirement of my
interface is to provide an efficient, heads-up interface for managing location privacy
that does not overwhelm the configuration over action [4].
In order to fulfil this requirement I developed the Privacy-Shake, a haptic interface [5]
supporting ad-hoc privacy management. To evaluate the Privacy-Shake interface I
conducted a lab-based study to examine its effectiveness and explore users‟ reactions
to that technology. I also evaluated several usability aspects of Privacy-Shake and
compared its performance against graphical user interface. My study confirmed the
potential of haptic interfaces for performing simple privacy tasks and showed that
Privacy-Shake can be faster than the GUI. However, my subjective results suggest
further work on improving the interface, such as support for individual calibration and
personalized gestures for better efficiency.
Page 41 of 125
2. 2010 CRC PhD Student Conference
2. THE PRIVACY-SHAKE SYSTEM
The current prototype of Privacy-Shake is developed in Java and works on Android
powered mobile devices. It uses the built in accelerometer to monitor the current
position of the device. The application works in a background to save time needed for
switching the phone on.
The current prototype supports the following settings: visibility (user can
enable/disable location sharing) and granularity (changing the level of granularity of
disclosed location from exact location to city level location).
2.1 Haptic interaction
Due to the dynamic nature of the mobile device, every action has to be initiated by a
dynamic, vertical shake. This is required to distinguish the action from the noise
generated by user‟s daily movements, e.g. walking, jogging, using a lift. As the
system recognizes the movement, vibrational feedback is provided to confirm that the
system is ready. Once the system is initiated, a user can change privacy settings by
performing one of the following actions:
• Vertical movement enables location sharing (Figure 1a),
• Horizontal movement (left and right) disables location sharing (Figure 1b),
• By moving the phone forward, a user can change the granularity of disclosed
location to the city level (Figure 1c),
• User instructs the system to share exact location by approximating the phone
to his body (Figure 1d).
Successful action is confirmed by short vibration (the length depends on the action)
and optional auditory message (e.g. natural language message “Anyone can see you”)
when the user enables location sharing.
Figure 1. Privacy-Shake in action. Arrows present the direction of movement
that triggers a privacy-management task.
3. In lab evaluation
I conducted a lab-based trial of Privacy-Shake interface to evaluate the usability of the
interface and examine both the potential and vulnerabilities of the current prototype.
3.1 Method
I recruited 16 participants aged from 23 to 45 for the study, 8 women and 8 men.
Most of them had prior experience with motion-capture interaction, mainly from
playing the Nintendo Wii. Eleven participants were graduate students, 4 were
recruited from the university‟s stuff and the remaining user was recruited outside the
university. Participants were asked to complete the following privacy management
tasks using Privacy-Shake (results presented in Figure 2):
T1. Enable location sharing,
T2. Disable location sharing,
Page 42 of 125
3. 2010 CRC PhD Student Conference
T3. Change the granularity of disclosed location to (a) exact location (building
level), (b) city level,
T4. Disable location sharing using the GUI.
The following measures were recorded:
Time to performing a task – from the time when user started the initiation
movement to the vibration confirming the action,
Number of successfully completed tasks,
Time of disabling location sharing using the GUI.
Participants took part in the study individually, at the beginning of each session I
introduced the Privacy-Shake concept and the purpose of the study. Users were
presented a short demo of the system and were given a chance to play with the
interface prior to performing four privacy management tasks using Privacy-Shake.
Each participant had three attempts to perform each task. At the end of each session I
asked participants to complete a questionnaire to rate the Privacy-Shake.
3.2 Results
Twelve participants reported that learning how to use the Privacy-Shake was easy (2
users reported that it was difficult), 12 of them said that it is also easy to remember
how to use it, as the interaction is simple and intuitive. However, 4 users said that
they would not like to use it due to the awkwardness of the interface and potential
harm it may cause, e.g. accidentally pushing people in a crowded bus.
Figure 2. Bar chart presents the percentage of successfully completed tasks
(efficiency) during the study.
Four participants reported that using Privacy-Shake was annoying and six of them
said that it caused frustration, which is related to the problems their experienced with
the interface. Only five users managed to successfully complete each privacy
management task using Privacy-Shake. Three users could not disable their location
sharing and nine users had problems changing the granularity of disclosed location.
The biggest difficulty users experienced was with task 3b, only three users
successfully completed the task three times. More than a half of all attempts to
perform this task were unsuccessful (58%). Only task T1 was successfully completed
by all users, thirteen participants disabled location sharing using Privacy-Shake and
ten of them successfully changed the granularity of location to city level. Two users
successfully completed 11 of 12 attempts, which was the best result during the study.
Page 43 of 125
4. 2010 CRC PhD Student Conference
58% of all attempts were successful. I observed that females performed slightly better
at using Privacy-Shake with 64% efficiency versus 53% for males.
4. CONCLUSIONS AND FUTURE WORK
I presented the concept and initial results of the evaluation of Privacy-Shake, a novel
interface for „heads-up‟ privacy management. The chosen demographic was not broad,
but the study helped me identify both social and technical issues related to the
interface. One of the main issues I found were lack of individual calibration and
support for more discreet movements, which highlights the future research agenda for
my work on Privacy-Shake. Though the actual efficiency is not ideal, the comparison
between the mean time of performing tasks T2 (6 seconds) and T4 (18 seconds)
shows that haptic interface can be successfully used to perform some basic privacy
management tasks faster than the traditional GUI. The Privacy-Shake concept
received a positive feedback, which encourages me to continue the work on
improving the interface and enhancing the user experience. Further work is also
needed to extend the functionality of Privacy-Shake by implementing new gestures
for managing group settings or expressing more fine-grained preferences.
5. REFERENCES
[1] G. Myles, A. Friday, and N. Davies, “Preserving Privacy in Environments
with Location-Based Applications,” IEEE Pervasive Computing, vol. 2, 2003, pp. 56-
64.
[2] L.F. Cranor and S. Garfinkel, Security and usability: designing secure systems
that people can use, O'Reilly Media, Inc., 2005.
[3] N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao,
“Understanding and capturing people‟s privacy policies in a people finder
application,” The Journal of Personal and Ubiquitous Computing, vol. 13, Aug. 2009,
pp. 401-412.
[4] S. Lederer, I. Hong, K. Dey, and A. Landay, “Personal privacy through
understanding and action: five pitfalls for designers,” Personal Ubiquitous Computing,
vol. 8, 2004, pp. 440-454.
[5] S. Robinson, P. Eslambolchilar, and M. Jones, “Sweep-Shake: finding digital
resources in physical environments,” Proc. of Mobile HCI'09, ACM, 2009, p.12.
Page 44 of 125