This is a sequel to Pentagon of MEANING. Here we point out that what we generally accept as meaning of text is its most valid interpretation according to published grammar & vocabulary of the language.
Such meaning is arrived at by sharing and negotiation of the text and its interpretation / clarification etc.
The secret of reaching a common meaning is NOT long negotiation but it is: creating most unambiguous text. This is possible with the help of machine aided drafting of text.
This is the subject of full paper by the author "Machine Mediated Meaning for Semantic Interoperability" which will be uploaded shortly.
Please take a look and give your views.
Ogden and Richards published a full book "The Meaning of Meaning" in 1923. It is also a subject of a lot of research by a broad spectrum of scholars & scientists. But they have identified only 3 elements of meaning but we found FIVE. Hence, PENTAGON of Meaning moving from their TRIANGLE of Meaning.
The five elements are: Speaker S, Concept X in her mind, Text T to express X, Listener L, who creates Concept X' from T. Out of these only S, T and L are public, open for observation. The concepts X and X' are private separately to S and L and the meaning is X for S and X' for L. That is subject of this PPT. It is elaborated and discussed.
From here we need to arrive at common and open meaning of T. We have another PPT for that.
There is a full paper Machine Mediated Meaning for Semantic Interoperability, which you can find on slideshare soon.
Please leave a comment.
Using Activity theory to study the factors influencing the sustained adoption of e-portfolio curricula by secondary school Visual arts educators in South Africa.
Ogden and Richards published a full book "The Meaning of Meaning" in 1923. It is also a subject of a lot of research by a broad spectrum of scholars & scientists. But they have identified only 3 elements of meaning but we found FIVE. Hence, PENTAGON of Meaning moving from their TRIANGLE of Meaning.
The five elements are: Speaker S, Concept X in her mind, Text T to express X, Listener L, who creates Concept X' from T. Out of these only S, T and L are public, open for observation. The concepts X and X' are private separately to S and L and the meaning is X for S and X' for L. That is subject of this PPT. It is elaborated and discussed.
From here we need to arrive at common and open meaning of T. We have another PPT for that.
There is a full paper Machine Mediated Meaning for Semantic Interoperability, which you can find on slideshare soon.
Please leave a comment.
Using Activity theory to study the factors influencing the sustained adoption of e-portfolio curricula by secondary school Visual arts educators in South Africa.
Define ‘pragmatics’ and discourse or discourse analysis;
Explore aspects of meaning not predictable from the linguistic structure;
Discuss how humans cooperate with one another when they talk.
Describe turn-talking and politeness in conversation
Framework for Online Software Evolution FOSE 04AUG22.pdfPutcha Narasimham
Framework for Online Software Evolution: FOSE
Abstract
Business Application Software BAS malfunctions often during early stages of development and deployment. They are inevitable and unavoidable. They are costly and time consuming to fix. There are two kinds of errors that cause BAS malfunction, (1) Errors in Business Policies, Rules, Information and Data (2) Software Errors of BAS. It is here proposed that some means of quick and safe correction and relaunching process be built into software design and operation. There are two separate proposals for (1) and (2). The second is discussed here.
ASIS (current) Process Map shows BAS running on its platform with its actors. The software development system (CI/CD Server) with BAS Developers is NOT connected to BAS or actors of BAS. The proposed Framework for Online Software Evolution FOSE is added to interconnect BAS Developer, CI/CD Server, and Platform of BAS online (while running).
Business Actor of BAS initiates Software Correction Request and online Business Authority (specially added actor of BAS) approves it for transmission to FOSE. Approved Software Correction Requests flow from BAS to FOSE and FOSE to BAS Developer. The BAS Developer then identifies the affected parts of BAS that need correction and works on the source code of BAS available in CI/CD Server. Then he or she corrects parts of BAS and tests them to generate a corrected trial version of BAS. The corrected trial version of BAS is available to the end users of BAS for evaluation of how their requests have been processed and met. The corrected and tested parts of BAS are then released to the Platform of BAS. The framework FOSE is notified of this for updating the status of approved software correction requests maintained in FOSE. Then FOSE allows launch of the new version of BAS. Making end users initiate “software correction requests”, approving them and passing them through FOSE to online BAS Developers in a closed loop, are the key factors for software evolution.
Thus, the BAS together with FOSE, becomes robust BAS continually. Here the software itself is Agile---not the software development. Incomplete software can safely be launched and run without frequent crashes. Unspecified user requirements get systemically captured from the business actors and met.
---III---
See examples and explanation in a separate word document
Normal Business Application Software BAS provides ONLY the business functionality, which is good enough if it works well. However that is never the case particularly for the new functionality offered for the first time. Invariably unforeseen business and software situations arise and the the BAS needs modifications often at design level of the business logic and or the BAS itself. All this has to be done off line. Here it is proposed that both Business Support and Software Development Support be brought ONLINE. Here the Application Software itself becomes AGILE in operation---NOT just the software development process.
This is facilitated by two radical design changes.
First, the BAS it self is restructured and designed to bring Business Authority ONLINE and set up a Business Policy and Rules Repository BPRR.
Second, an additional Framework for Online Software Evolution is provided to bring the BAS Developers and the software development system online.
See how the combination works in this and two supplementary PPTs.
Plan Anything personally or professionally. Planning is a preparation for the future with a GOAL for some one. I dentify all of them. There are two major branches: Resource Planning and Action Planning. Planning can be elaborate or simple. Select the factors for quick success of your mission. Drop what is not relevant but do not miss anything vital. Best wishes,
Machine mediated meaning for semantic interoperability pvn 120109 pdfPutcha Narasimham
Definition of meaning applicable in human and machine contexts is proposed. This points out that what is taken as meaning of an expression is an equivalent expression but NOT meaning. Meaning is the result of acting out what is implied in the expression or execution of the expression. This is valid for machines and humans interchangeably.
Relation in set theory of math is flawed. It remains undetected and uncorrected even now. This 11 slide PPT point outs the errors with examples, corrects them, giving a better definition. It may be too elementary but how can math live with errors in fundamentals?
Define ‘pragmatics’ and discourse or discourse analysis;
Explore aspects of meaning not predictable from the linguistic structure;
Discuss how humans cooperate with one another when they talk.
Describe turn-talking and politeness in conversation
Framework for Online Software Evolution FOSE 04AUG22.pdfPutcha Narasimham
Framework for Online Software Evolution: FOSE
Abstract
Business Application Software BAS malfunctions often during early stages of development and deployment. They are inevitable and unavoidable. They are costly and time consuming to fix. There are two kinds of errors that cause BAS malfunction, (1) Errors in Business Policies, Rules, Information and Data (2) Software Errors of BAS. It is here proposed that some means of quick and safe correction and relaunching process be built into software design and operation. There are two separate proposals for (1) and (2). The second is discussed here.
ASIS (current) Process Map shows BAS running on its platform with its actors. The software development system (CI/CD Server) with BAS Developers is NOT connected to BAS or actors of BAS. The proposed Framework for Online Software Evolution FOSE is added to interconnect BAS Developer, CI/CD Server, and Platform of BAS online (while running).
Business Actor of BAS initiates Software Correction Request and online Business Authority (specially added actor of BAS) approves it for transmission to FOSE. Approved Software Correction Requests flow from BAS to FOSE and FOSE to BAS Developer. The BAS Developer then identifies the affected parts of BAS that need correction and works on the source code of BAS available in CI/CD Server. Then he or she corrects parts of BAS and tests them to generate a corrected trial version of BAS. The corrected trial version of BAS is available to the end users of BAS for evaluation of how their requests have been processed and met. The corrected and tested parts of BAS are then released to the Platform of BAS. The framework FOSE is notified of this for updating the status of approved software correction requests maintained in FOSE. Then FOSE allows launch of the new version of BAS. Making end users initiate “software correction requests”, approving them and passing them through FOSE to online BAS Developers in a closed loop, are the key factors for software evolution.
Thus, the BAS together with FOSE, becomes robust BAS continually. Here the software itself is Agile---not the software development. Incomplete software can safely be launched and run without frequent crashes. Unspecified user requirements get systemically captured from the business actors and met.
---III---
See examples and explanation in a separate word document
Normal Business Application Software BAS provides ONLY the business functionality, which is good enough if it works well. However that is never the case particularly for the new functionality offered for the first time. Invariably unforeseen business and software situations arise and the the BAS needs modifications often at design level of the business logic and or the BAS itself. All this has to be done off line. Here it is proposed that both Business Support and Software Development Support be brought ONLINE. Here the Application Software itself becomes AGILE in operation---NOT just the software development process.
This is facilitated by two radical design changes.
First, the BAS it self is restructured and designed to bring Business Authority ONLINE and set up a Business Policy and Rules Repository BPRR.
Second, an additional Framework for Online Software Evolution is provided to bring the BAS Developers and the software development system online.
See how the combination works in this and two supplementary PPTs.
Plan Anything personally or professionally. Planning is a preparation for the future with a GOAL for some one. I dentify all of them. There are two major branches: Resource Planning and Action Planning. Planning can be elaborate or simple. Select the factors for quick success of your mission. Drop what is not relevant but do not miss anything vital. Best wishes,
Machine mediated meaning for semantic interoperability pvn 120109 pdfPutcha Narasimham
Definition of meaning applicable in human and machine contexts is proposed. This points out that what is taken as meaning of an expression is an equivalent expression but NOT meaning. Meaning is the result of acting out what is implied in the expression or execution of the expression. This is valid for machines and humans interchangeably.
Relation in set theory of math is flawed. It remains undetected and uncorrected even now. This 11 slide PPT point outs the errors with examples, corrects them, giving a better definition. It may be too elementary but how can math live with errors in fundamentals?
UseCase modeling is very diverse, often inconsistent and erroneous. This is due to imprecise and incomplete definition and specification of UML which does not have any glossary of terms and fails to formally define the terms--UseCase in particular. The very nature of UseCase is undefined and uncertain though all the versions of UML. I noticed these factors and discovered UseCase to be fundamentally a DIALOG of messages which in turn are composed of information and data in 2008. I have been uploading my analyses and proposals to SlideShare since 2010. Here is a new summary of my analyses and proposals in light of BPMN's definition of "conversation" which is essentially the same as my "dialog". The linked in discussions prompted model UseCase as an Association Class and remodel what is called UseCase Diagram as a new Class Diagram without the old misleading "UseCase Ovals" inside System under Consideration. I also recommend treating UML Actor as an External Entity playing multiple roles which is any done by default.
I welcome review and feedback. Thanks
Harmonizing use cases, dialogs or conversations, process maps, usecase diagra...Putcha Narasimham
UseCase concept is unique and profound concept to represent the needs of businesses and users from their view point. Based on UseCase and Actor identification, the System to be Developed can be specified and evolved systematically. This summary updates and integrates many proposals made earlier. It logically integrates all the concepts of the title.
How to study any publication deeply for analysis and research. The process and reporting format are presented with examples. This paves way for incremental discovery and innovation and validation / consolidation.
Allocation of resources to generate high value in services or designing most cost effective means for high customer satisfaction are NOT always done systematically or with quantification. But it is possible and worth doing.
Are there any generic tools to analyze and assess documents? Here are some suggestions including Procedure to Cluster Concepts & Check for their Coupling in a document.
I found it helpful. I suppose something like this or even better would be available.
Describing something new poses very serious problems. Dictionaries and encyclopedia have met this requirement fairly well but those methods and techniques are NOT within the reach of millions of us who have to "describe things or introduce things" for teaching, documenting, modeling for analysis and design etc.
Here is my proposal to do it with a simple table. Yes, it is derived from class definition and description of OOAD but it is very effective for use in general. See how it works and let's help millions of students and teachers who struggle to describe things. Here is a structure to it which solves 80% of the problem. Cheers!
Software is very special. I is grand, spectacular, regenerative and perpetual source of value---like nothing else we know.
Perhaps for this very reason it is misused and wasted. By cooperatively REUSING ALL ARTIFACTS of software, we can reap unheard of benefits repeatedly. Here is an outline of how we can do it. That is ReSAR. Let's start.
Multiple Actors DO interact with the SuC, which is why the SuC exists in the first place, but NO TWO of them can do so through a single UseCase. There can be NO Second Actor in a UseCase.
Each interaction, more appropriately the dialog, can only have two members actively involved in the dialog.
First is the SuC and the second is the associated Actor.
The nature of UseCase and its implications were well discussed in
http://www.slideshare.net/putchavn/usecase-case-is-a-dialog-not-a-process
http://www.slideshare.net/putchavn/use-casesingle-session
http://www.slideshare.net/putchavn/one-use-case-one-actor
Yet there are discussions and justifications for associating multiple actors with the same UseCase.
UseCase is a DIALOG involving only one SuC and One Actor per Session. There is NO scope for another actor to take part in that dialog. Here is an example ATM Cash withdrawal. It needs THREE separate UCs.
This is explained using Process Maps to show the separation and how to separate.
This should end the confusion and persistent misunderstanding and misrepresentation.
Combined UseCase Description, MockUp Screens & System Sequence DiagramPutcha Narasimham
There are different artifacts (documents) for Use Case Description, Mock-up Screens and System Sequence Diagram. That is because each UML diagram (or table or description, Use Case Description has no diagram) can accommodate only a few modeling elements.
Analysts often need a set of UML diagrams and descriptions to evolve and represent concepts. They have to be drawn quickly and iteratively to formulate and express the business concepts and requirements. They need to be created and edited together, not in isolation.
It is here claimed that the contents of these three UML artifacts can be combined into a single text-document with tables & without drawings.
Concept Maps are very effective for language-free expression and communication of concepts visually. The fundamental structures, which are not all graphic, are also very elegant for encoding knowledge for machine processing.
The building blocks of knowledge (Nodes and Links) are NOT sufficiently "expressive & precise". HyperPlex fills this need. See the PPT by that name in https://www.slideshare.net/putchavn
Both the concepts are explained with examples.
Good for general use and a prerequisite for knowing what is knowledge and how to represent it. Leave a comment.
[1] A view that a UseCase (UC) is a "dialog" between the System under Consideration (SuC) and an Actor (for a specific UC) brings focus to what "messages need to be exchanged between the SuC and Actor to reach UC Goal".
[2] Agreeing on and specifying UC Goal is related to business or application. UC Goal would be the right first step of UC description.
[3] There are many "means" of generating "messages from SuC", through various internal activities within the SuC. They need not be (I would even say should not be) specified in UC Description.
[4] The concept of UseCase is profound and useful because it is a "dialog" but NOT a process. This distinction is not defined and clarified which is why, I think, the full benefits of UC modeling are not widely realized.
[5] This view of UC (as per 1, 2 & 3) clearly separates the "internal processes" of the SuC from UC. The "internal processes" can be hypothesized and evolved separately using UML Sequence Diagrams. All the business / user needs can be specified with sufficient precision and rigor through the “messages” of UC dialog. There are no external dependencies, though constraints may exist and have to be taken care of.
I have REVISED & uploaded the PPT with TWO Sections, Section 2 First.
[6] I would like to study applications and demonstrate how the "dialog" view of UseCase would simplify & clarify UseCase description for the business user as well as system developer without sacrificing precision and usefulness.
02 FEB 14
Returning part of output back to input is considered feedback but this is NOT valid in all cases. This identifies what is missing in a complete FEEDBACK model: The User or Customer of the output. The feedback must come from the User of the output based on using the output. What such user gives is TRUE feedback. Many cases in which feedback works effectively it is because the feedback is TRUE. Such cases are discussed to support this view.
Use this and let me know your cases and how you are using TRUE feedback.
BA and RE Coaching, Training, Teaching,through Quizzes, Assignments, Mini Projects. Learning by DOING with MINIMUM LECTURING
Short intense Single Module Courses....of 4 to 6 Sessions.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
2. This is also Section 5 of
Semantic Web:
Dealing with Knowledge & Meaning
Putcha V. Narasimham
Knowledge Enabler Systems
putchavn@yahoo.com
3. Recall: Five Elements S, X, T, L and X’
Meaning is MEDIATED
X
22 JAN 14
1-S thinks 2-X
& presents it as 3-T
4-L gets T & creates
5-X’ in her mind
private
S
Open &
Common
Text T
L
X’
private
3
4. Relating S, X, T, L and X’
Meaning is MEDIATED
22 JAN 14
X & X’ are private to S and L
They must be brought out into S
open common view
Then S and L must agree on what
is common in their private
concepts
Meaning is an agreement reached
by sharing & negotiation
X
private
Open &
Common
Text T
L
X’
private
4
5. Bringing X & X’ into Open Common View
For communication to be complete
and common meaning to emerge
Meaning is MEDIATED
22 JAN 14
The concepts X, privately held by the
Speaker S of T and
X’ privately held by the Listener L of T
Must be brought into open, common
view and agreed upon by S and L
X
X
No CC yet
Common
Concept
CC
X’
X’
5
6. Dialog helps Creating Common Concept
Meaning is MEDIATED
22 JAN 14
Both the Speaker and Listener
S
X
must know the language of T
very well
Listener has to express X’
Text T
differently in T’ (now L becomes
a speaker of T’)
L repeating T DOES NOT imply
that L got the meaning of T
Text T’
L
X’
6
7. Listener Speaks & Speaker Listens
Meaning is MEDIATED
22 JAN 14
Now S has to listen to T’ &
Construct X’’ strictly from T’
When X” gets close to X,
T’ becomes public expression of
coming together of private
concepts X, X’ and X”
Then meaning of T’ becomes
Open, common & correct for S & L
X”
X
S
Based on T’
Text T’
This may
take more
exchanges
of T
X’
L
7
8. Multimedia for Complete Communication
Meaning is MEDIATED
22 JAN 14
Multi-media content &
Face to face communications
are often used
To ensure complete and
correct communication
Body language is one of the
modes of communication
X
S
Multimedia
X’
L
8
9. Meaning is Agreed Common Concept
Meaning is MEDIATED
22 JAN 14
Dialog enables sharing & negotiation
of privately held X & X’
And arriving at a common concept CC
Expressed as the latest agreed Text T
CC (still private) is the real & correct
meaning of the latest agreed T
For only those involved, not universal
X
X Common
Concept
X’
X’
9
10. Conditions for Common Agreed Meaning
the Speaker S and
the Listener L must know
and use the correct
Meaning is MEDIATED
Both
22 JAN 14
Syntax of language of T
Meanings of all the words
of T used and
Context of T
This principle is valid for
Human-human and
Human-machine (will see shortly)
communications with focus on
meaning
Human-machine communications
Have limited domain
And the process has to be explicit
10
11. Is meaning always subjective?
X’N
Meaning is MEDIATED
Text T
22 JAN 14
X’1
L1
L2
L’N
For given Text T
Is there anything like
X’2
Minimal essential X’ of X’1, X’2, ..X’N of
N individual listeners? or
What we may call general meaning or
mean meaning
Perhaps it can be established with
some conditions
11
12. Meaning is Subjective in humans
Meaning is MEDIATED
22 JAN 14
Because meaning
is a concept X’
Generated
privately in mind
of listener
However under special conditions
Meaning of T can be less subjective
And machines can also arrive at
meaning---literal meaning, of course
12
13. Conditions for Meaning to be Objective
Meaning is MEDIATED
22 JAN 14
The grammar
and vocabulary
Of the language
of T are
Well-defined &
Rigorously
applied and
verified
This ensures that interpretation of T
cannot vary much irrespective of who
interprets
When they are so well-defined and
machine readable,
machines can also interpret
13
14. Machines Can Interpret & Even Mediate
Meaning is MEDIATED
22 JAN 14
What is more
important is
To create text
unambiguously,
This is eminently
feasible
So, we have
Machine Mediated Meaning for Semantic
Interoperability
First presented in a conference at Hyderabad
Central University in 2003
Published in Semantic Universe in Jan 2009
(not accessible now)
Revised substantially in Jan 2014,
See it on slideshare for details
14
16. What machines actually do
Meaning is MEDIATED
22 JAN 14
Thoughts & concepts may be
creative and unique but
They must be expressed strictly
according to standard, published
grammar & vocabulary.
Machine can play a major role in
creating NLT which only has single
interpretation
Actually machines do not
generate meaning
They eliminate multiple
meanings at inception at the
speaker end
So whoever interprets can
only have a single valid
meaning of NLT
16
17. Conclusion:
Meaning is MEDIATED
22 JAN 14
What we call meaning is actually shared negotiated
meaning of agreed text
This is possible with restricted meaning of meaning or
literal meaning
Then machines can apply standard grammar &
vocabulary
To generate unambiguous text which has only one
Keep
Going
meaning ….literal meaning
17