The intersection of ageism and sexism can create a hostile environment for veteran software developers belonging to marginalized genders. In this study, we conducted 14 interviews to examine the experiences of people at this intersection, primarily women, in order to discover the strategies they employed in order to successfully remain in the field. We identified 283 codes, which fell into three main categories: Strategies, Experiences, and Perception. Several strategies we identified, such as (Deliberately) Not Trying to Look Younger, were not previously described in the software engineering literature. We found that, in some companies, older women developers are recognized as having particular value, further strengthening the known benefits of diversity in the workforce. Based on the experiences and strategies, we suggest organizations employing software developers to consider the benefits of hiring veteran women software developers. For example, companies can draw upon the life experiences of older women developers in order to better understand the needs of customers from a similar demographic. While we recognize that many of the strategies employed by our study participants are a response to systemic issues, we still consider that, in the short-term, there is benefit in describing these strategies for developers who are experiencing such issues today.
This paper is a joint work with Sterre van Breukelen, Ann Barcomb and Sebastian Baltes
Preprint https://arxiv.org/abs/2302.03723
There is a common agreement that ethical concerns are of high importance when it comes to systems equipped with Artificial Intelligence (AI). Demands for ethical AI are declared from all directions. As a response, in recent years, public bodies, governments, and universities have rushed in to provide a set of principles to be considered when AI-based systems are designed and used. We have learned, however, that high-level principles do not turn easily into actionable advice for practitioners. Hence, also companies are publishing their own ethical guidelines to guide their AI development. These guidelines do not seem to help the developers. To bridge this gap, we present a method for implementing AI Ethics in practice. The ECCOLA method has been developed in collaboration with researchers and practitioners in the field, and it is under proof-testing in several AI companies. The presentation outlines the method and its practical use cases.
Social science for software developers:
Using tools from social science to inform software design: should software developers also be social scientists?
Social Science for software developers:
Using tools from social science to inform software design: should software developers also be social scientists?
Human Interaction, Emerging Technologies and Future Systems Vkrcdnsqxswifzizvzs
The lastest on Emergent Technology Q Clearance, Novel Tracking using Bio Chemical Sensors, particle Smart Surveillance dust from the Department of Energy and more, check out all the information in the book for a detailed guide on the newest biomedical technology.
To review and score each of the fascinating ideas we received during the ideation phase of the Unusual Solutions Competition, we recruited an expert panel of judges. We are thrilled with the group that we assembled, reflective of the diversity of the ideas that we received, and embodying the innovative spirit of the finalists whom they will select. Meet our jury panel here.
For many decades now, the software industry has attempted to bridge the productivity gap, develop higher quality code and manage the ever growing complexity of software-intensive systems. The results have been mixed, and as a result, a great majority of today's software is still written manually by human developers. This is about to change rapidly as recent developments in the field of Artificial Intelligence show promising results. While artists and designers have been taken by surprise by OpenAI’s DALL-E 2’s capabilities in designing unique art, ChatGPT has astonished the rest of the world with its capability of understanding human interaction. AI-assisted coding solutions such as Github’s Copilot and Replit’s Ghostwriter, among many others, are rapidly developing in a direction where AI generates new code that runs fast with high quality. Little is known about the true capabilities of AI programmers and their impact on the software development industry, education, and research. This talk sheds light on the current state of ChatGPT, large language models including GPT-4, AI-assisted coding, highlights the research gaps, and proposes a way forward.
There is a common agreement that ethical concerns are of high importance when it comes to systems equipped with Artificial Intelligence (AI). Demands for ethical AI are declared from all directions. As a response, in recent years, public bodies, governments, and universities have rushed in to provide a set of principles to be considered when AI-based systems are designed and used. We have learned, however, that high-level principles do not turn easily into actionable advice for practitioners. Hence, also companies are publishing their own ethical guidelines to guide their AI development. These guidelines do not seem to help the developers. To bridge this gap, we present a method for implementing AI Ethics in practice. The ECCOLA method has been developed in collaboration with researchers and practitioners in the field, and it is under proof-testing in several AI companies. The presentation outlines the method and its practical use cases.
Social science for software developers:
Using tools from social science to inform software design: should software developers also be social scientists?
Social Science for software developers:
Using tools from social science to inform software design: should software developers also be social scientists?
Human Interaction, Emerging Technologies and Future Systems Vkrcdnsqxswifzizvzs
The lastest on Emergent Technology Q Clearance, Novel Tracking using Bio Chemical Sensors, particle Smart Surveillance dust from the Department of Energy and more, check out all the information in the book for a detailed guide on the newest biomedical technology.
To review and score each of the fascinating ideas we received during the ideation phase of the Unusual Solutions Competition, we recruited an expert panel of judges. We are thrilled with the group that we assembled, reflective of the diversity of the ideas that we received, and embodying the innovative spirit of the finalists whom they will select. Meet our jury panel here.
For many decades now, the software industry has attempted to bridge the productivity gap, develop higher quality code and manage the ever growing complexity of software-intensive systems. The results have been mixed, and as a result, a great majority of today's software is still written manually by human developers. This is about to change rapidly as recent developments in the field of Artificial Intelligence show promising results. While artists and designers have been taken by surprise by OpenAI’s DALL-E 2’s capabilities in designing unique art, ChatGPT has astonished the rest of the world with its capability of understanding human interaction. AI-assisted coding solutions such as Github’s Copilot and Replit’s Ghostwriter, among many others, are rapidly developing in a direction where AI generates new code that runs fast with high quality. Little is known about the true capabilities of AI programmers and their impact on the software development industry, education, and research. This talk sheds light on the current state of ChatGPT, large language models including GPT-4, AI-assisted coding, highlights the research gaps, and proposes a way forward.
Service Research, Innovation, and (Safe) Practice in the Humanity-Centered AI Era
EMAC - https://www.emac-online.org/interest-groups/emac-special-interest-groups
EMAC SIG Service Marketing - https://www.linkedin.com/company/emac-sig-service-marketing/
Service Marketing Seminar - https://sites.google.com/view/service-marketing-seminar/startseite
Special Session on “Applications of Artificial Intelligence and IoT in Comput...Christo Ananth
Christo Ananth, Special Session on “Applications of Artificial Intelligence and IoT in Computer Science and Engineering”, 6th International Conference on Computer Science and Application Engineering, CSAE 2022,Nanjing, China, 21-23 October, 2022.
Special Session on “Applications of Artificial Intelligence in IoT Security”Christo Ananth
Christo Ananth, Akhatov Akmal Rustamovich, Special Session on “Applications of Artificial Intelligence in IoT Security”, 1ST International Conference On Communication, Security And Artificial Intelligence (ICCSAI-2022),Greater Noida, NCR,New Delhi,India, 23-24 December,2022.
Maliheh (Mali) Izadi, PhD, Andrea Di Sorbo, and Sebastiano Panichella co-chaired the 3rd Intl. Workshop on NL-based Software Engineering
April 20 2024, Lisbon, Portugal.
From Software through Art to Social EntrepreneurshipLetizia Jaccheri
The main goal of my research through 30 years is to understand software by empirical studies. While researchers traditionally use students as subjects to pilot studies before they are carried out in industrial environments, the supporting pillar of my working method is to set up studies with students that go beyond the contribution to scientific literature and identify benefits for other stakeholders. The four primary actors are: students, instructors, industry, and researchers Later, in our studies we have identified issues that appear at the intersection between art and software. Artistic software projects have often a social goal and are highly innovative. Our studies in art and software have given the ground for two research directions. The first is maker movement and its role in educational practices.Typical topics of interest vary from engineering -oriented pursuits such as electronics, robotics, 3D printing to the use of art and craft. Leveraging the beneficial outcomes from the Maker Movement approach and programming languages designed for children, together with a group of researchers, and artists we have designed, implemented and evaluated workshop programs. In our studies we have identified the important factors that characterize the design of the activities and the main aspects of children's engagement in such software intensive activities The second research direction is to harness the power of big data, increase collective and individual awareness about societal problems and ultimately create the needed intelligence that will lead entrepreneurs and policy makers to innovative solutions for societal challenges towards a sustainable society.
Social Software and Community Information SystemsRalf Klamma
Social Software links social entities on the Internet. With this term we label new communication and collaboration media like wikis, blogs, social bookmarking but also traditional media supporting communities of practice. Scientific and professional communities challenge information systems engineering with high demands on traceable and secured collaboration and processing of scientific data. Flexibility, adaptation, interoperability are only a few requirements to mention.
With the advent of international standards XML-based standards like MPEG-7 for the handling of complex multimedia metadata and service oriented architectures engineers and community facilitators can create more generic services for the many communities with diverse but professional needs. Therefore, communities have to be incorporated in the community information systems engineering process.
In the talk we present a new reflective information system architecture called ATLAS offering self observation mechanisms for the establishment of a community-centered learning and improvement process for social software.
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich DataMargaret-Anne Storey
(Abstract and video links below)
ACM SIGSOFT Webinar May 4th, 2016
Distinguished lecture at ISR, UCI, April 2016.
UCI Video is available at: https://www.youtube.com/watch?v=Ujm4G7ayRQQ
Webinar link will be available shortly.
This talk is based on a short chapter to appear in a forthcoming book on "Perspectives on Data Science for Software Engineering", it can be preordered here:
http://goo.gl/Wi30Ra
Abstract:
Software analytics and the use of computational methods on "big" data in software engineering is transforming the ways software is developed, used, improved and deployed. Software engineering researchers and practitioners are witnessing an increasing trend in the availability of diverse trace and operational data and the methods to analyze it. This information is being used to paint a picture of how software is engineered and suggest ways it may be improved. But we have to remember that software engineering is inherently a socio-technical endeavour, with complex practices, activities and cultural aspects that cannot be externalized or captured by tools alone---in fact, they may be perturbed when trace data is surfaced and analyzed in a transparent manner.
In this talk, I will ask:
- Are researchers and practitioners adequately considering the unanticipated impacts that software analytics can have on software engineering processes and stakeholders?
- Are there important questions that are not being asked because the answers do not lie in the data that are readily available?
- Can we improve the application of software analytics using other methods that collect insights directly from participants in software engineering (e.g., through observations)?
I will explore these questions through specific examples. I hope to engage the audience in discussing how software analytics that depend on "big data" from tools, as well as methods that collect "thick" data from participants, can be mutually beneficial in improving software engineering research and practice.
Most Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdfInsightsSuccess4
Dr. Haibin Zhu, Vice President – Systems Science and Engineering, IEEE SMC Society and Professor, Nipissing University, Canada, is a trailblazer in the field of computer science and robotics. His academic journey began with a bachelor’s degree in computer engineering in the early 1980s.
Software Technology Insurance for CustomersSPIN Chennai
This presentation explains about Software Technology designed to improve the quality of life involves academic engineers, social scientists and architects,together with representatives of user groups and in several cases a manufacturer. It also gives a snapshot of future technology innovations and statistics of the household internet usage.
Who talks to whom? What communication channels do they use and why? What emotions are involved? Summer School on Software Engineering. Oct 9, 2018. Oulu, Finland.
Towards Continuous Performance Assessment of Java Applications With PerfBotAlexander Serebrenik
Bots for continuous performance assessment are gaining use as a productivity tool. We discuss how and why open source projects use them and present an in-depth case study of the Nanosoldier bot used by the team behind the Julia programming language. Based on analysing the history of bot usage and interviews with developers we identify lack of a shared platform for performance measurement as an obstacle to wider adoption of performance measurement bots. To address this, we propose a prototype implementation of such a platform called PerfBot.
Joint work with Florian Markusse and Philipp Leitner, presented at 5th International Workshop on
Bots in Software Engineering, collocated with ICSE 2023, Melbourne Australia.
More Related Content
Similar to “STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers
Service Research, Innovation, and (Safe) Practice in the Humanity-Centered AI Era
EMAC - https://www.emac-online.org/interest-groups/emac-special-interest-groups
EMAC SIG Service Marketing - https://www.linkedin.com/company/emac-sig-service-marketing/
Service Marketing Seminar - https://sites.google.com/view/service-marketing-seminar/startseite
Special Session on “Applications of Artificial Intelligence and IoT in Comput...Christo Ananth
Christo Ananth, Special Session on “Applications of Artificial Intelligence and IoT in Computer Science and Engineering”, 6th International Conference on Computer Science and Application Engineering, CSAE 2022,Nanjing, China, 21-23 October, 2022.
Special Session on “Applications of Artificial Intelligence in IoT Security”Christo Ananth
Christo Ananth, Akhatov Akmal Rustamovich, Special Session on “Applications of Artificial Intelligence in IoT Security”, 1ST International Conference On Communication, Security And Artificial Intelligence (ICCSAI-2022),Greater Noida, NCR,New Delhi,India, 23-24 December,2022.
Maliheh (Mali) Izadi, PhD, Andrea Di Sorbo, and Sebastiano Panichella co-chaired the 3rd Intl. Workshop on NL-based Software Engineering
April 20 2024, Lisbon, Portugal.
From Software through Art to Social EntrepreneurshipLetizia Jaccheri
The main goal of my research through 30 years is to understand software by empirical studies. While researchers traditionally use students as subjects to pilot studies before they are carried out in industrial environments, the supporting pillar of my working method is to set up studies with students that go beyond the contribution to scientific literature and identify benefits for other stakeholders. The four primary actors are: students, instructors, industry, and researchers Later, in our studies we have identified issues that appear at the intersection between art and software. Artistic software projects have often a social goal and are highly innovative. Our studies in art and software have given the ground for two research directions. The first is maker movement and its role in educational practices.Typical topics of interest vary from engineering -oriented pursuits such as electronics, robotics, 3D printing to the use of art and craft. Leveraging the beneficial outcomes from the Maker Movement approach and programming languages designed for children, together with a group of researchers, and artists we have designed, implemented and evaluated workshop programs. In our studies we have identified the important factors that characterize the design of the activities and the main aspects of children's engagement in such software intensive activities The second research direction is to harness the power of big data, increase collective and individual awareness about societal problems and ultimately create the needed intelligence that will lead entrepreneurs and policy makers to innovative solutions for societal challenges towards a sustainable society.
Social Software and Community Information SystemsRalf Klamma
Social Software links social entities on the Internet. With this term we label new communication and collaboration media like wikis, blogs, social bookmarking but also traditional media supporting communities of practice. Scientific and professional communities challenge information systems engineering with high demands on traceable and secured collaboration and processing of scientific data. Flexibility, adaptation, interoperability are only a few requirements to mention.
With the advent of international standards XML-based standards like MPEG-7 for the handling of complex multimedia metadata and service oriented architectures engineers and community facilitators can create more generic services for the many communities with diverse but professional needs. Therefore, communities have to be incorporated in the community information systems engineering process.
In the talk we present a new reflective information system architecture called ATLAS offering self observation mechanisms for the establishment of a community-centered learning and improvement process for social software.
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich DataMargaret-Anne Storey
(Abstract and video links below)
ACM SIGSOFT Webinar May 4th, 2016
Distinguished lecture at ISR, UCI, April 2016.
UCI Video is available at: https://www.youtube.com/watch?v=Ujm4G7ayRQQ
Webinar link will be available shortly.
This talk is based on a short chapter to appear in a forthcoming book on "Perspectives on Data Science for Software Engineering", it can be preordered here:
http://goo.gl/Wi30Ra
Abstract:
Software analytics and the use of computational methods on "big" data in software engineering is transforming the ways software is developed, used, improved and deployed. Software engineering researchers and practitioners are witnessing an increasing trend in the availability of diverse trace and operational data and the methods to analyze it. This information is being used to paint a picture of how software is engineered and suggest ways it may be improved. But we have to remember that software engineering is inherently a socio-technical endeavour, with complex practices, activities and cultural aspects that cannot be externalized or captured by tools alone---in fact, they may be perturbed when trace data is surfaced and analyzed in a transparent manner.
In this talk, I will ask:
- Are researchers and practitioners adequately considering the unanticipated impacts that software analytics can have on software engineering processes and stakeholders?
- Are there important questions that are not being asked because the answers do not lie in the data that are readily available?
- Can we improve the application of software analytics using other methods that collect insights directly from participants in software engineering (e.g., through observations)?
I will explore these questions through specific examples. I hope to engage the audience in discussing how software analytics that depend on "big data" from tools, as well as methods that collect "thick" data from participants, can be mutually beneficial in improving software engineering research and practice.
Most Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdfInsightsSuccess4
Dr. Haibin Zhu, Vice President – Systems Science and Engineering, IEEE SMC Society and Professor, Nipissing University, Canada, is a trailblazer in the field of computer science and robotics. His academic journey began with a bachelor’s degree in computer engineering in the early 1980s.
Software Technology Insurance for CustomersSPIN Chennai
This presentation explains about Software Technology designed to improve the quality of life involves academic engineers, social scientists and architects,together with representatives of user groups and in several cases a manufacturer. It also gives a snapshot of future technology innovations and statistics of the household internet usage.
Who talks to whom? What communication channels do they use and why? What emotions are involved? Summer School on Software Engineering. Oct 9, 2018. Oulu, Finland.
Towards Continuous Performance Assessment of Java Applications With PerfBotAlexander Serebrenik
Bots for continuous performance assessment are gaining use as a productivity tool. We discuss how and why open source projects use them and present an in-depth case study of the Nanosoldier bot used by the team behind the Julia programming language. Based on analysing the history of bot usage and interviews with developers we identify lack of a shared platform for performance measurement as an obstacle to wider adoption of performance measurement bots. To address this, we propose a prototype implementation of such a platform called PerfBot.
Joint work with Florian Markusse and Philipp Leitner, presented at 5th International Workshop on
Bots in Software Engineering, collocated with ICSE 2023, Melbourne Australia.
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...Alexander Serebrenik
Many software developers started to work from home on a short notice during the early periods of COVID-19. A number of previous papers have studied the wellbeing and productivity of software developers during COVID-19. The studies mainly use surveys based on predefined questionnaires. In this paper, we investigate the problems and joys that software developers experienced during the early months of COVID-19 by analyzing their discussions in online forum devRant, where discussions can be open and not bound by predefined survey questionnaires. The devRant platform is designed for developers to share their joys and frustrations of life. We manually analyze 825 devRant posts between January and April 12, 2020 that developers created to discuss their situation during COVID19. WHO declared COVID-19 as pandemic on March 11, 2020. As such, our data offers us insights in the early months of COVID-19. We manually label each post along two dimensions: the topics of the discussion and the expressed sentiment polarity (positive, negative, neutral). We observed 19 topics that we group into six categories: Workplace & Professional aspects, Personal & Family well-being, Technical Aspects, Lockdown preparedness, Financial concerns, and Societal and Educational concerns. Around 49% of the discussions are negative and 26% are positive. We find evidence of developers’ struggles with lack of documentation to work remotely and with their loneliness while working from home. We find stories of their job loss with little or no savings to fallback to. The analysis of developer discussions in the early months of a pandemic will help various stakeholders (e.g., software companies) make important decision early to alleviate developer problems if such a pandemic or similar emergency situation occurs in near future. Software engineering research can make further efforts to develop automated tools for remote work (e.g., automated documentation).
Empirical Software Engineering 27(5): 117 (2022), presented at ICSE 2023 as part of the Journal First program.
Software developers are known to experience a wide range of emotions while performing development tasks. Emotions expressed in developer communication might reflect openness of the ecosystem to newcomers, presence of conflicts, problems in the software development process or source code itself. In this talk, based on a recent work with Nicole Novielli, I present an overview of the state-of-the-art research on analysis of emotions in software engineering focusing on the studies of emotion in context of software ecosystems. To encourage further applications of emotion analysis in the industry and research we also discuss currently available emotion analysis tools and datasets as well as outline directions for future research.
This is a keynote talk given at the 11th International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems (SESoS 2023), collocated with ICSE 2023 in Melbourne, Australia.
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...Alexander Serebrenik
Modern software development practices increasingly rely on third-party libraries due to the inherent benefits of reuse. However, libraries may contain security vulnerabilities that can propagate to the dependent applications. To counter this, maintainers of dependent projects should monitor their dependencies and security reports to ensure that only patched releases of the upstream applications are in use. As manual maintenance of dependencies has shown to be ineffective, several automated tools (aka bots) have been proposed to assist developers in rapidly identifying and resolving vulnerable dependencies.
In this work, we focus on Dependabot, a popular bot providing security and version updates, and study developers' receptivity to its security updates in engineered and actively maintained JavaScript projects. Moreover, we carry out a fine-grained analysis of the lifecycle of every vulnerability to manifest how they are dealt with in the presence of Dependabot.
Our findings show that the task of fixing vulnerable dependencies is, to a large extent, delegated to Dependabot and that developers merge the majority of security updates within several days. On the other hand, when developers do not merge a security update, they usually address the identified vulnerability manually. This approach, however, often takes up to several months which in turn could expose the projects to security issues.
This paper has won the ACM Distinguished paper award at MSR 2023.
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsAlexander Serebrenik
Static analysis tools generate a large number of
alarms that require manual inspection. In prior work, repositioning of alarms is proposed to (1) merge multiple similar alarms
together and replace them by a fewer alarms, and (2) report
alarms as close as possible to the causes for their generation. The
premise is that the proposed merging and repositioning of alarms
will reduce the manual inspection effort. To evaluate the premise,
this paper presents an empirical study with 249 developers on
the proposed merging and repositioning of static alarms. The
study is conducted using static analysis alarms generated on C
programs, where the alarms are representative of the merging vs.
non-merging and repositioning vs. non-repositioning situations
in real-life code. Developers were asked to manually inspect and
determine whether assertions added corresponding to alarms in
C code hold. Additionally, two spatial cognitive tests are also
done to determine relationship in performance. The empirical
evaluation results indicate that, in contrast to expectations, there
was no evidence that merging and repositioning of alarms reduces
manual inspection effort or improves the inspection accuracy (at
times a negative impact was found). Results on cognitive abilities
correlated with comprehension and alarm inspection accuracy.
Static analysis tools help to detect common programming errors but generate a large number of false positives.
Moreover, when applied to evolving software systems, around
95% of alarms generated on a version are repeated, i.e., they
have also been generated on the previous version. Version-aware
static analysis techniques (VSATs) have been proposed to suppress
the repeated alarms that are not impacted by the code changes
between the two versions. The alarms reported by VSATs after
the suppression, called delta alarms, still constitute 63% of the
tool-generated alarms.
We observe that delta alarms can be further postprocessed
using their corresponding code changes: the code changes due
to which VSATs identify them as delta alarms. However, none
of the existing VSATs or alarms postprocessing techniques
postprocesses delta alarms using the corresponding code changes.
Based on this observation, we use the code changes to classify
delta alarms into six classes that have different priorities assigned
to them. The assignment of priorities is based on the type of
code changes and their likelihood of actually impacting the delta
alarms. The ranking of alarms, obtained by prioritizing the
classes, can help suppress alarms that are ranked lower, when
resources to inspect all the tool-generated alarms are limited.
We performed an empirical evaluation using 9789 alarms
generated on 59 versions of seven open source C applications.
The evaluation results indicate that the proposed classification
and ranking of delta alarms help to identify, on average, 53% of
delta alarms as more likely to be false positives than the others.
What Is an AI Engineer? An Empirical Analysis of Job Ads in The NetherlandsAlexander Serebrenik
Recently, the job market for Artificial Intelligence (AI) engineers
has exploded. Since the role of AI engineer is relatively new, limited
research has been done on the requirements as set by the industry.
Moreover, the definition of an AI engineer is less established than
for a data scientist or a software engineer. In this study we explore,
based on job ads, the requirements from the job market for the
position of AI engineer in The Netherlands. We retrieved job ad
data between April 2018 and April 2021 from a large job ad database,
Jobfeed from TextKernel. The job ads were selected with a process
similar to the selection of primary studies in a literature review. We
characterize the 367 resulting job ads based on meta-data such as
publication date, industry/sector, educational background and job
titles. To answer our research questions we have further coded 125
job ads manually.
The job tasks of AI engineers are concentrated in five categories:
business understanding, data engineering, modeling, software development and operations engineering. Companies ask for AI engineers with different profiles: 1) data science engineer with focus
on modeling, 2) AI software engineer with focus on software development, 3) generalist AI engineer with focus on both models
and software. Furthermore, we present the tools and technologies
mentioned in the selected job ads, and the soft skills.
Our research helps to understand the expectations companies
have for professionals building AI-enabled systems. Understanding
these expectations is crucial both for prospective AI engineers and
educational institutions in charge of training those prospective
engineers. Our research also helps to better define the profession of
AI engineering. We do this by proposing an extended AI engineering life-cycle that includes a business understanding phase.
Joint work with Marcel Meesters and Petra Heck.
Community smells are patterns indicating suboptimal organization and communication of software development teams that have been shown to be related to suboptimal organisation of the source code. Given a long standing association of women and communication mediation, we have conducted a series of studies relating gender diversity to community smells, as well as comparing the results of the data analysis with developers' perception. To get further insights in the relation bwteen gender and community smells, we replicate our study focusing on the Brazilian software teams; indeed, culture-specific expectations on the behavior of people of different genders might have affected the perception of the importance of gender diversity and refactoring strategies when mitigating community smells. Finally, we extend the prediction model by including variables related to national diversity and see how the interplay between national diversity and gender diversity influences presence of community smells.
This talk is based on a series of papers published in 2019-2022 and co-authored with Gemma Catolino, Filomena Ferrucci, Stefano Lambiase, Tiago Massoni, Fabio Palomba, Camila Sarmento, and Damian Andrew Tamburri.
Overview of a series of papers published in 2019-2021 on community smells, and their relation to code smells and gender, as well as resolution strategies.
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...Alexander Serebrenik
Women are underrepresented at all levels in computer science (CS) faculties of Dutch
universities. In this report we focus on experiences related to hiring and promoting women as assistant, associate and full professors (or equivalent at NWO-I CWI).
In 2003 Dave et al. have coined the term “opinion mining” to refer to “processing a set of search results for a given item, generating a list of product attributes (quality, features, etc.) and aggregating opinions about each of them (poor, mixed, good)”. Nine years later, in 2012 Brooks and Swigger have applied sentiment analysis in the context of software engineering. Today another nine years have passed and it is time to look back: what have we achieved as a research community and where should we go next?
To answer this question we conducted a systematic literature review involving 185 papers. Based on the literature review we present 1) well-defined categories of opinion mining-related software development activities, 2) available opinion mining approaches, whether they are evaluated when adopted in other studies, and how their performance is compared, 3) available datasets for performance evaluation and tool customization, and 4) concerns or limitations SE researchers might need to take into account when applying/customizing these opinion mining techniques. The results of our study serve as references to choose suitable opinion mining tools for SE tasks, and provide critical insights for the further development of opinion mining techniques in the SE domain.
This work has been done together with Bin Lin, Gabriele Bavota and Michele Lanza from Università della Svizzera italiana, Switzerland, Nathan Cassee from Eindhoven University of Technology, The Netherlands and Nicole Novielli from University of Bari, Italy.
In this talk I will present results obtained on removing self-admitted technical debt. Self-admitted technical debt is an indication in the source code, usually n the source code comments, that the code is not in the right shape yet. Joint work with Emad Shihab, Everton Maldonado, Rabe Abdelkareem, Fiorella Zampetti, Massimiliano Di Penta and Gianmarco Fucci.
Presented at the Google diversity workshop.
Studying gender diversity in software development teams/communities requires understanding gender of individual developers. In this talk I will provide an overview of different ways of asking developers about their gender as well as inferring gender information from the ways they present themselves and artefacts they create. We conclude by discussing limitations of the inference techniques and surveying concerns related to their application.
What is social software engineering? How do we collect the data? What kind of data do we collect? How do we analyse it? What challenges are we facing when collecting and analysing social software engineering data?
May Marketo Masterclass, London MUG May 22 2024.pdfAdele Miller
Can't make Adobe Summit in Vegas? No sweat because the EMEA Marketo Engage Champions are coming to London to share their Summit sessions, insights and more!
This is a MUG with a twist you don't want to miss.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers
1. “STILL AROUND”: EXPERIENCES AND SURVIVAL
STRATEGIES OF VETERAN WOMEN SOFTWARE
DEVELOPERS
Sterre van Breukelen Ann Barcomb Sebastian Baltes Alexander Serebrenik
Eindhoven University of
Technology
University of Calgary University of Adelaide
Eindhoven University of
Technology
The Netherlands Canada Australia The Netherlands
4. RQ1. What age- and gender-specific experiences have veteran software
developers of marginalized genders had in their careers?
RQ2. What strategies have veteran software developers of marginalized genders
adopted that they perceive as contributing to their survival in software
engineering?
5. van Breukelen, Barcomb, Baltes, Serebrenik "STILL AROUND": Experiences and Survival Strategies of Veteran Women Software Developers. 45th International Conference on Software Engineering, 2023
6. Baltes, Park, Serebrenik. Is 40 the new 60? How popular media portrays the employability of older software developers, IEEE Software, 37(6):26-31, 2020
10. A company approached me. . . They were like
‘our ideal candidate would be a Woman of
Color [who has] also survived a stroke’. —Elliot
As I approached menopause, there was another
shift of just this contempt, because you’re not
even a sexually available female. And there’s ‘No,
I don’t even have an interest in having sex with
you and so why would I ever listen to you?‘
You’re going to try and tell me I’m wrong and
you’re unattractive.’ So it got worse.. —Emery
+
-
11.
12. All those young guys don’t want their mom
programming with them, their grandmother, on
the other hand. —Dani
Editor's Notes
Good morning, Alexander and I are going to present our paper on experiences and survival strategies of veteran women software developers. This is joint work with Sterre and Ann. Sterre was a master’s student at TU Eindhoven who we supervised together.
This research has been triggered by a tweet of Tracy Chou. She is one of Time's 12 Women of the Year (2022), a software engineer and advocate for diversity in technology-related fields. Her tweet alludes to the negative experiences and rarity of older women who are still active in the field of software development. While recent years have seen growing research attention to diversity in software engineering, and both age and gender have been studied independently, the experiences of veteran women and non-binary people who have remained in the software industry have been rarely considered.
It is worth looking at the continuation of Tracy’s tweet.
She mentions being 10 years in tech, loving software engineering, but hating the environment, and being told that there’s no sexism and that she’s only projecting it to her environment.
This is what motivated us to study and better understand the specific experiences of veteran women software developers.
Gaslighting is the subjective experience of having one's reality repeatedly questioned by another.
Indeed, veteran women find themselves at the intersection of ageism and sexism:Software developers are overwhelmingly younger men, considering what we know about developer demographics from surveys.
Besides well-established sexism in the field of software engineering, statements such as Mark Zuckerberg’s famous quote that “Young people are just smarter” point to ageism in the industry.
It is important to understand that experiences of individuals on the intersection of diversity aspects cannot be reduced to combinations of individual aspects. For example, Ross et al. have observed that the experiences of Black women differ from those of Black men and of non-Black women: “a smaller percentage of Black women reported being introduced to CS by a family member or a friend (17% and 3%, respectively) than was the case for non-Black women (24% and 10%, respectively) and Black men (21% and 9%, respectively).” Moreover, Black women do not necessarily know whether their negative experiences should be attributed to their gender or their race.
Kimberlé Crenshaw introduced the concept of intersectionality, arguing that diversity aspects are not mutually exclusive but intersecting, implying that one should be acutely aware of different challenges experienced by people at the intersection of multiple diversity aspects.
Monique Ross, Zahra Hazari, Gerhard Sonnert, Philip M. Sadler: The Intersection of Being Black and Being a Woman: Examining the Effect of Social Computing Relationships on Computer Science Career Choice. ACM Trans. Comput. Educ. 20(2): 9:1-9:15 (2020)
Hence, our research questions were:…
In your research questions and sampling approach, we included all marginalized genders, but our participants identified as women plus one non-binary person who identified as woman for most of their career.
Hence our results focus on women, while our research questions are broader.
We started with Twitter users participating in the before-mentioned thread, then checked their self-identified gender based on Twitter profiles and websites. We looked for pronouns and gendered terms (e.g., “mother”).
Then sent a screening survey to all users with public contact details that were not men.
To the 39 respondents, we then applied our our filtering criteria based on age, experience, still working in industry, and self-identified gender.
To this end we have conducted a series of interviews with veteran women. We started with participants in the aforementioned thread. To identify women among the participants we looked into pronouns used on their profiles and gendered terms (such as ‘mother’).
All these strategies have been proposed for “older developers”, but how old is old?
Still, even the highest number, 50+ years, which is a common threshold in scientific papers [6], is far away from a typical retirement age in industrialized countries.
Previous research has shown that 40 is the threshold when developers are starting to be seen as old, so we have reused the same threshold in the current study.
We further operationalized ‘older’ as having at least 18 years of experience in the software industry, based on a typical career including school and university.
To evaluate the stability of our findings, we also included three participants that, while not strictly belonging to the target demographics, might share experiences and strategies with other interviewees.
One participant slightly younger, one who left the industry, and one identified as non-binary.
The answers of those participants were in line with the other feedback we got from our interviews.
In total, we have conducted 14 interviews until reaching saturation.
Now Alexander is going to take over for the results.
Overview of Sterre’s findings: strategies, experiences and perception. Of course, I do not expect you to see all the details.
older women, who are sometimes unsure of whether the negative experiences were because of their gender or their age.
There were not many Positive experiences related to age and gender, although Being a Role Model and More Opportunities Due to Gender and Age were found. One participant described how companies specifically looking to develop products aimed at her demographic led to opportunities: “A company approached me and said they were in the business, they wanted to make an app that would help predict who would have a stroke. . . They were like ‘our ideal candidate would be a Woman of Color [who has] also survived a stroke.’ ”
Negative experiences were far more common, such as Seen as Non/less Technical , which has also been widely observed in the literature.
We found that Gender Related Strategies contained the most strategies, with eight separate categories and 308 code segments. The categories were: Against Gender Bias Strategies, Career Related Strategies, Changing Work Environment, Changing Your Appearance, Communication Methods, Ignoring Situations, Traditionally Feminine, and Traditionally Masculine. Of these, Against Gender Bias Strategies was the largest category, with 70 code segments and eight subcodes, such as Backing Other Women Up
Here we see the part of the sunburst related to experiences.
We see many things that we have expected in relation to gender (e,g., sexism) and age (e.g., being considered behind on tech or too expensive). What is important is that intervieweesare sometimes unsure of whether the negative experiences were because of their gender or their age.
Here we see the part of the sunburst related to experiences.
older women, who are sometimes unsure of whether the negative experiences were because of their gender or their age.
Please take time to read he quotes.
On this slide we see strategies that the interviewees have implemented to survive. Some of the age-related strategies such as leveraging experience, or teaching new techniques have been discussed before; similarly exposing biases and backing up other women have been discussed in the literature. I would like to highlight a one of the strategies related to the intersection of gender and age.
Dani’s quote suggests that age might be considered a positive after a certain point. At least when discussing programming with young men. Additionally, it might give some idea of how aging affects women within the industry. Dani’s quote suggests that when women are middle-aged, they are considered mothers, and when they are elderly, they are grandmothers. This highlights how women are thought of as motherly figures, which is seen in other strategies and experiences. This is also an example of the most diverse subcategory “Standing against bias”.
So what does this all mean?
Organisations should invest in creating a good working environment and a positive atmosphere, investing older developers of marginalized genders with sense of control of their work and their careers, supporting their promotion, assigning tasks and paying them on par with men. While these recommendations are true for any employer, they are even more pertinent for software engineering given the scarcity of older women and non-binary people in this industry. Moreover, specifically in case of software engineering the inclusion of developers who are more representative of the population ensures that the software can meet the needs of society as a whole.
Developers themselves can move to a different work environment (e.g., by starting their company, moving to a different company, becoming consultant or manager) or try to change their work environment (e.g., by unionizing, standing up against gender bias or carving new opportunities for themselves). Changing appearance is one of the commonly mentioned but profoundly problematic strategies.
So to summarise: we have tried to understand the experiences of veteran women, and recall that ‘veteran’ is 40 or older. We have conducted a series of interviews. We made several recommendations both to organisations and to veteran women developing software. We recognise that these recommendations are merely band aid solutions applied to systemic issues; however, we hope that in short-term they might help developers to survive in the industry.