This is a high-level talk on making use of location in your applications. It covers the basics of creating location-based software, fun and interesting ways to make use of geographic data, and how to deal with common privacy concerns. You'll gain an understanding of how location can enhance and support everything from finding your way in the world, to games, to productivity tools.
Information on some of the copyright issues when creating digital content on the web - licences, tracing copyright holders. Focus is on UK law, but relevant internationally
Information on some of the copyright issues when creating digital content on the web - licences, tracing copyright holders. Focus is on UK law, but relevant internationally
Proactive Displays: Augmenting the Social Space of an Academic Conference (CS...Joe McCarthy
Academic conferences provide a social space for people to present their work, learn about others’ work, and interact informally with one another. However, opportunities for interaction are unevenly distributed among the attendees. We seek to extend these opportunities by allowing attendees to easily reveal something about their background and interests in different settings through the use of proactive displays: computer displays coupled with sensors that can sense and respond to the people nearby. We designed, implemented and deployed a suite of proactive display applications at a recent academic conference: AutoSpeakerID augmented formal conference paper sessions; Ticket2Talk augmented informal coffee breaks. A mixture of qualitative observation and survey response data are used to frame the impacts of these applications from both individual and group perspectives, highlighting the creation of new opportunities for both interaction and distraction. We end with a discussion of how these social space augmentations relate to the concepts of focus and nimbus as well as the problem of shared interaction models.
More information on this work, including the paper associated with this presentation, can be found here: http://interrelativity.com/proactivedisplays/
This is my presentation from the ISDE7 / WALIS / NRM Conference held in Perth. It focuses on my personal experiences with citizen science and the environment over the last couple of years.
Managing and publishing sensitive data in the social sciences - Webinar trans...ARDC
Transcript of the 29th March ANDS webinar.
Slides and recording are available from the ANDS website: http://www.ands.org.au/news-and-events/presentations/2017
This presentation looks at issues surrounding the licensing of research data for reuse. It outlines the concepts behind data licensing, looks at data reuse licenses used by CESSDA data archives, considers the role of Creative Commons and Open Data Licenses in sharing social science research data, and highlights some of the problems, issues, and challenges facing archives and repositories.
Ethics and information architecture - The 6th Academics and Practitioners Rou...Sarah Rice
Information architecture is not neutral.
By organizing information for discovery and use, we not only make information accessible but also provide the lens through which people will experience it. Designing information architectures involves making and imposing value choices, which positions the work and study of information architecture in the realm of ethics.
The information architecture community has considered ethics at the micro level, for instance by finding ways to do good in specific interactions. But to what extent have we thought about ethics in the context of our overall profession? When we design IAs do we, as practitioners, surrender our moral authority to someone else? Or do we follow a code?
Proactive Displays: Augmenting the Social Space of an Academic Conference (CS...Joe McCarthy
Academic conferences provide a social space for people to present their work, learn about others’ work, and interact informally with one another. However, opportunities for interaction are unevenly distributed among the attendees. We seek to extend these opportunities by allowing attendees to easily reveal something about their background and interests in different settings through the use of proactive displays: computer displays coupled with sensors that can sense and respond to the people nearby. We designed, implemented and deployed a suite of proactive display applications at a recent academic conference: AutoSpeakerID augmented formal conference paper sessions; Ticket2Talk augmented informal coffee breaks. A mixture of qualitative observation and survey response data are used to frame the impacts of these applications from both individual and group perspectives, highlighting the creation of new opportunities for both interaction and distraction. We end with a discussion of how these social space augmentations relate to the concepts of focus and nimbus as well as the problem of shared interaction models.
More information on this work, including the paper associated with this presentation, can be found here: http://interrelativity.com/proactivedisplays/
This is my presentation from the ISDE7 / WALIS / NRM Conference held in Perth. It focuses on my personal experiences with citizen science and the environment over the last couple of years.
Managing and publishing sensitive data in the social sciences - Webinar trans...ARDC
Transcript of the 29th March ANDS webinar.
Slides and recording are available from the ANDS website: http://www.ands.org.au/news-and-events/presentations/2017
This presentation looks at issues surrounding the licensing of research data for reuse. It outlines the concepts behind data licensing, looks at data reuse licenses used by CESSDA data archives, considers the role of Creative Commons and Open Data Licenses in sharing social science research data, and highlights some of the problems, issues, and challenges facing archives and repositories.
Ethics and information architecture - The 6th Academics and Practitioners Rou...Sarah Rice
Information architecture is not neutral.
By organizing information for discovery and use, we not only make information accessible but also provide the lens through which people will experience it. Designing information architectures involves making and imposing value choices, which positions the work and study of information architecture in the realm of ethics.
The information architecture community has considered ethics at the micro level, for instance by finding ways to do good in specific interactions. But to what extent have we thought about ethics in the context of our overall profession? When we design IAs do we, as practitioners, surrender our moral authority to someone else? Or do we follow a code?
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
27. Navigation route based on minimum travel distance Alternate route based on streets not yet walked (beginner) Alternate route based on streets not yet walked (advanced)
40. Thanks! Contact me: [email_address] http://lifeofaudrey.com Photos by: Mary Anne Thygesen, Reid Beels, Igal Koshevoy, and Audrey Eschright
Editor's Notes
I think location is one of the most exciting things about writing software for portable devices (phones, laptops).
The first step for most location-based applications is to get the user’s coordinates. So, the application requests location access from the user. Location services are available for both native and web apps, and code samples for either are easy to find online.
Assuming we have a GPS signal, or are connected to a wifi or cell node that's in the geographic database: tada!
The response we get back from location services includes the user’s latitude and longitude, a set of point coordinates. The coordinates imply a specific location can be determined, but the actual accuracy will vary depending on whether the location was obtained using GPS, or through cell or wifi node locations. GPS works best outside with a clear view of the sky.
A point is a single pair of lat/long coordinates, often represented with a map pin like the one above.
There are three basic types of geographic vector data.
Lines often represent roads, routes, or various kinds of boundaries. A line doesn’t have a width. Lines are made up of a collection of connected points.
Polygons are also made up of a series of points, but these points define the boundaries of an area.
If I ask you, “where are we right now?” you’re probably not going to give me a bunch of coordinates. We think of place in terms of various other definitions, including how we make use of the space.
Let’s look at some questions we can answer with location data.
What’s this place called? What’s nearby? Wikipedia articles that include geographic information can be placed on a map, and similar things could be done with other data sources on buildings, historical landmarks, public works of art, or other local features.
How do I get from my current location to somewhere else? How much will it cost? What’s the most efficient route if I’m walking, biking, or riding mass transit? This requires data on streets, transit routes, bike paths, and other ways of getting around. OpenTripPlanner has the goal of helping users plan trips across many different kinds of transport.
What’s the best Italian restaurant I can walk to from here? Where are my friends hanging out? A number of existing apps attempt to help users find restaurants, stores, and locate their friends. These kinds of services are built on top of business listing databases, which can be obtained from various sources or built up by users. Some apps have started to share location data with each other, for example Foursquare’s venue data is used by Instagram.
Restaurants and your friends aren’t the only things we might want to locate geographically. Location-based tools can help map anything you can think of, from hardware stores to feral cats to emergency shelters. This is the mobile app for Ushahidi, a disaster-mapping service. It connects to a piece of web-based software, to allow people to map resources out in the field, and filter and verify those reports as they’re received. I’m using it in a somewhat off-label way, in order to map food carts in Portland.
Not all location-based apps need to wait for the user to check in somewhere or ask a question. A system like GeoLoqi’s geonotes can be used to leave reminders for yourself: todos, shopping lists, access codes. Geonotes pop up only when you arrive within a certain radius of the point where the note is left.
Location can act as a filter or context for other information, such as local news, weather, and sports events. This is Everyblock, a local news service. They aggregate a variety of location-tagged data, so a user can select their current location or a neighborhood and see all items for that area.
Weather Underground uses location to automatically pull up a weather report. Using location services here makes the mobile website more convenient and faster to use, especially when you’re on the road.
This is ESPN Passport, an app that provides info about nearby live sports events. Checking in at the game provides access to stats and other details.
This is a new one called “Please Stay Calm” that involves hunting zombies. It’s only available through the Canadian app store, but zombie hunting seems to be a popular locative gaming / augmented reality theme. One thing I like about how this game is set up is that businesses get an infection status, changing the gameplay in that location. If you’re working on location-based games, think about not just how the game works when at a specific location, but at all locations of a certain type. Does your game act differently when inside or outdoors? When at the grocery store versus the coffee shop?
This game is called Seek & Spell. It’s like Boggle but you get the letter tiles by collecting them off a map outside. This can be played alone or with a group.
This is Map Attack, which is another project built on top of Geoloqi. Players are assigned to one of two teams, and they go out and collect points from the areas marked on the map. It was inspired by Pac Manhattan, which is a game where you play live action Pacman on a city grid. We played this particular round of it at WhereCamp in the Bay Area last spring. The red team is winning because they used a bike to get around faster.
Task Ave. is a todo list app that lets you organize your items by where the task needs to be done, and get reminders when you’re nearby. This works like a more specialized version of the geonotes we saw before.
This is a location-based alarm clock. There are a few versions of this type of app out there, but the basic functionality is that it lets commuters nap on the bus or train and be woken before they miss their stop.
Runkeeper is a popular fitness app that uses the phone’s GPS to track your route, letting users see how far and fast they ran. This is a fairly basic use of the GPS, but it’s much easier than keeping track of the same data manually.
GPS Serendipitor from the Sentient City Survival Kit. This is a concept sketch: the idea is to take the direct route between two places and make it more complicated, more likely to take the user off the familiar path. http://survival.sentientcity.net/blog/?page_id=16
Location and mapping aren’t outdoor-only activities. This is Meridian, an app that provides maps and navigational information inside stadiums and stores. Automatic location finding is not generally available inside buildings, but even without that, there’s still lots of functionality to explore. Meridian’s service for getting directions inside Powell’s Books has you select what room you’re starting from, then provides directions to the section where you’ll find the book you’re looking for.
The sense of magic comes from having the software do just the right thing, before you know you need it. If place can add context, how does that change what you can anticipate the user needs?
Where do you get the rest of the data to make these things happen? Both free and commercial services exist. There’s been a big push in many parts of the country over the last few years to make government-created data more accessible to developers. A large portion of this is geographic data, but it’s often straight out of GIS systems like ESRI ArcView, so some enthusiasts are working on making public geo-data more accessible to other developers.
There’s a reason the location services tools require the user to authorize your app to find out where they are: you’re collecting personal information, sometimes in the background while the user does other things.
Users make assumptions about what their data is going to be used for based on what they can see. Most people don’t think about possible side-effects or alternate uses. If you’re going to collect data to sell to third parties, even in the aggregate, make that explicit up front. Allow the user to decide who else can see where they’ve been.
You aren’t going to need it. For many applications, data retention may not be necessary to complete the task.
Regulations on location data collection can vary from place to place. In general, regulations may affect what data you can collect, what kind of permission is needed from the user, and what other parties the data can be shared with.
The news is full of stories about activists and dissidents around the world being targeted through their online activity. Revealing personal location data can harm any number of vulnerable users, from journalists to women escaping domestic violence. As the developer, you have the most potential insight into what data you’re collecting on people, and what can be done with it. Use this knowledge responsibly.
Technical problems to watch out for: what happens when you have a data connection but no GPS? Or GPS but no data connection? Often one works better in places where the other doesn’t. Think about strategies to handle this, like storing an action that needs the data connection until the user is back online, or letting the person manually select where they are.
Self-explanatory, I hope. Go forth and build awesome things.