My opening lecture at the »trust in robots« summer school at TU Wien, september 2019 - http://www.tuaustria.ac.at/fileadmin/shares/tuaustria/veranstaltungen/2019-05/Summerschool_Trust_Robots_Programme_final_V1.pdf
Cost of an Error: Who Pays for Programming Blunders?PVS-Studio
Modern programmers live in a very special period of time, when the software is penetrating into literally all spheres of human life and is installed on a numerous amount of devices that are a part of our every day life. Nobody is surprised by software in the fridges, watches and coffee-machines. However, the dependence of people on the smart technology is also growing. The inevitable consequence: the reliability of the software becomes priority number 1. It's hard to scare someone with a freaked out coffee-maker, although it can bring a lot of harm (liters of boiling coffee flowing on your white marble countertop...). But the thought of growing requirements for the quality of software is really important, that's why let's talk about errors in the code that led to significant waste of time and money.
Humanity will change more in the next 20 years than in the previous 300 years. What if …robots replaced the world’s workforce?
This is the presentation delivered by Glen Leonhard at London Business School's 2015 Global Leadership Summit.
The role, potential, and future of HMITorben Haagh
We have a continuum of control over a vehicle from direct human contact to the vehicle driving itself in response to the driver's wishes, or, in a more fanciful world, anticipating the driver's intention and acting accordingly.
Find out more about automotive HMI
http://bit.ly/cockpit-hmi
Using the Open Source VS Code Editor with the HPCC Systems PlatformHPCC Systems
As part of the 2018 HPCC Systems Summit Community Day event:
Up first, Matt Butler, Kennesaw State University, briefly discusses his poster, The Future of Automotive Telemetry: Assessing Inherent Risk Implications and Cyber Security Vulnerabilities.
Following, Arjuna Chala presents his breakout session in the User Interfaces track.
Are you a fan of the VS Code Editor for building and debugging your code? Join me as I demonstrate how this can be used as a modern, extensible alternative to the ECL IDE and why most developers choose the VS Code editor due to its benefits of being cross-platform, multi-language support, and open source.
Arjuna Chala is Sr. Director of Special Projects for the HPCC Systems® platform at LexisNexis Risk Solutions®. With almost 20 years of experience in software design, Arjuna leads the development of next generation big data capabilities including creating tools around exploratory data analysis, data streaming and business intelligence. Arjuna strives to understanding new technologies and bring innovative applications and design to the HPCC System platform. Dedicated to development excellence, Arjuna served as a key member of the team to bring the HPCC Systems platform to the open source community. In his work with HPCC Systems community leaders and system integrator partners, Arjuna’s efforts have contributed to the spread of HPCC Systems technology into the enterprise domestically as well as the international markets of China, Brazil, Europe and India. Arjuna has a BS in Computer Science from RVCE, Bangalore University.
Cost of an Error: Who Pays for Programming Blunders?PVS-Studio
Modern programmers live in a very special period of time, when the software is penetrating into literally all spheres of human life and is installed on a numerous amount of devices that are a part of our every day life. Nobody is surprised by software in the fridges, watches and coffee-machines. However, the dependence of people on the smart technology is also growing. The inevitable consequence: the reliability of the software becomes priority number 1. It's hard to scare someone with a freaked out coffee-maker, although it can bring a lot of harm (liters of boiling coffee flowing on your white marble countertop...). But the thought of growing requirements for the quality of software is really important, that's why let's talk about errors in the code that led to significant waste of time and money.
Humanity will change more in the next 20 years than in the previous 300 years. What if …robots replaced the world’s workforce?
This is the presentation delivered by Glen Leonhard at London Business School's 2015 Global Leadership Summit.
The role, potential, and future of HMITorben Haagh
We have a continuum of control over a vehicle from direct human contact to the vehicle driving itself in response to the driver's wishes, or, in a more fanciful world, anticipating the driver's intention and acting accordingly.
Find out more about automotive HMI
http://bit.ly/cockpit-hmi
Using the Open Source VS Code Editor with the HPCC Systems PlatformHPCC Systems
As part of the 2018 HPCC Systems Summit Community Day event:
Up first, Matt Butler, Kennesaw State University, briefly discusses his poster, The Future of Automotive Telemetry: Assessing Inherent Risk Implications and Cyber Security Vulnerabilities.
Following, Arjuna Chala presents his breakout session in the User Interfaces track.
Are you a fan of the VS Code Editor for building and debugging your code? Join me as I demonstrate how this can be used as a modern, extensible alternative to the ECL IDE and why most developers choose the VS Code editor due to its benefits of being cross-platform, multi-language support, and open source.
Arjuna Chala is Sr. Director of Special Projects for the HPCC Systems® platform at LexisNexis Risk Solutions®. With almost 20 years of experience in software design, Arjuna leads the development of next generation big data capabilities including creating tools around exploratory data analysis, data streaming and business intelligence. Arjuna strives to understanding new technologies and bring innovative applications and design to the HPCC System platform. Dedicated to development excellence, Arjuna served as a key member of the team to bring the HPCC Systems platform to the open source community. In his work with HPCC Systems community leaders and system integrator partners, Arjuna’s efforts have contributed to the spread of HPCC Systems technology into the enterprise domestically as well as the international markets of China, Brazil, Europe and India. Arjuna has a BS in Computer Science from RVCE, Bangalore University.
Humans create robots and not robots create humans.
Humans create robots and not robots create humans.
AI and Robots in Workplace: This slide shares some of the spaces where robots are invading(replacing humans), possible job opportunities for the people who would be replaced, other that that what solutions could be for robots overtaking humans.
In modern life we have to face many problems because of traffic congestion. It is said that the
high volume of vehicles, the inadequate infrastructure and the irrational distribution of the development are
main reasons for increasing traffic jam. The major reason for traffic congestion is the high number of vehicle
which was caused by the increase in population and the development of economy. Traffic congestion is a
condition that occurs as use increases, and is characterized by slower speeds, longer trip times, and increased
vehicular queuing. Here I am considering vittila junction in Ernakulum district where we can see a high traffic
junction. Here in my proposed work I am depending on 8 different roads that meet at a single junction. In that I
will consider pedestrian, vehicles, and ambulance and red light violation detection persons too. The use of
RFID and GPS will help to make the lane clear for ambulance. Using the RFID we can detect the red light
violators and we can assign fine to them. Lastly for pedestrian I am providing one subway and one overbridged.
IRJET-An Arrangement for Automatic Notification and Severity Estimation of A...IRJET Journal
Parthiban.p ,Vasanthkumar.ss ,Mohana.J "An Arrangement for Automatic Noti?cation and Severity Estimation of Automotive Accidents", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
New contact technologies consolidated into present vehicles proposal an opportunity for larger assistance to people injured in traf?c accidents. Current studies display how contact skills ought to be upheld by arti?cial intellect arrangements capable of automating countless of the decisions to be seized by emergency services, thereby adapting the save time to the severity of the mishap and cutting assistance time. To improve the completed save procedure, a fast and precise estimation of the severity of the mishap embody a key point to aid emergency services larger guesstimate the needed resources. This paper proposes a novel intelligent arrangement that is able to automatically notice road accidents, notify them across vehicular webs, and guesstimate their severity established on the believed of data excavating and vision inference. Our arrangement considers the most relevant variables that can describe the severity of the accidents . Aftermath display that a finished Vision Creation in Databases (KDD) procedure, alongside an adequate selection of relevant features, permits producing estimation models that can forecast the severity of new accidents. We develop a prototype of our arrangement established on off-the-shelf mechanisms and validate it at the Applus+ IDIADA Automotive Scutiny Firm abiilities, showing that our planning can particularly cut the period demanded to alert and use emergency services afterward an mishap seizes place.
Cops are constantly adapting their equipment to the environment. Our kit bags have grown larger and larger as we collected equipment to deal with the job. Our departments gives us the basics and as we face new situations we think about what we could have used as a tool to have made the task easier. Then, we go out and get that tool – for next time. Much of the commercially produced police equipment used by our peers today was developed “on the fly” by those who walked the beat before us. The concept of the cruiser as a mobile office was developed by those of us who worked long shifts and thought “What could be added to this car to make my job easier? Make me more comfortable? Help me to hunt down dangerous offenders?”
In a new report, EU-OSHA publishes the findings of a major 2-year project to anticipate the effects of digitalisation on occupational safety and health (OSH) in the EU. The final results of this foresight project highlight developments in ICT-enabled technologies, the potential impact of these technologies on the nature and organisation of work, and the challenges and opportunities to OSH that they may bring.
Smart Digital Port Market Transformation thanks to Internet of Things (IoT), Artificial Intelligence (AI), Digital Twin, (private) 5G/B5G, C-V2X, and Robotics (incl. UAV/UTM).
an introductory talk at an embedded ethics workshopt for the faculty of informatics at TU Wien, illustrating the scope of ethical issues with technology with the example of chatGPT.
Humans create robots and not robots create humans.
Humans create robots and not robots create humans.
AI and Robots in Workplace: This slide shares some of the spaces where robots are invading(replacing humans), possible job opportunities for the people who would be replaced, other that that what solutions could be for robots overtaking humans.
In modern life we have to face many problems because of traffic congestion. It is said that the
high volume of vehicles, the inadequate infrastructure and the irrational distribution of the development are
main reasons for increasing traffic jam. The major reason for traffic congestion is the high number of vehicle
which was caused by the increase in population and the development of economy. Traffic congestion is a
condition that occurs as use increases, and is characterized by slower speeds, longer trip times, and increased
vehicular queuing. Here I am considering vittila junction in Ernakulum district where we can see a high traffic
junction. Here in my proposed work I am depending on 8 different roads that meet at a single junction. In that I
will consider pedestrian, vehicles, and ambulance and red light violation detection persons too. The use of
RFID and GPS will help to make the lane clear for ambulance. Using the RFID we can detect the red light
violators and we can assign fine to them. Lastly for pedestrian I am providing one subway and one overbridged.
IRJET-An Arrangement for Automatic Notification and Severity Estimation of A...IRJET Journal
Parthiban.p ,Vasanthkumar.ss ,Mohana.J "An Arrangement for Automatic Noti?cation and Severity Estimation of Automotive Accidents", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
New contact technologies consolidated into present vehicles proposal an opportunity for larger assistance to people injured in traf?c accidents. Current studies display how contact skills ought to be upheld by arti?cial intellect arrangements capable of automating countless of the decisions to be seized by emergency services, thereby adapting the save time to the severity of the mishap and cutting assistance time. To improve the completed save procedure, a fast and precise estimation of the severity of the mishap embody a key point to aid emergency services larger guesstimate the needed resources. This paper proposes a novel intelligent arrangement that is able to automatically notice road accidents, notify them across vehicular webs, and guesstimate their severity established on the believed of data excavating and vision inference. Our arrangement considers the most relevant variables that can describe the severity of the accidents . Aftermath display that a finished Vision Creation in Databases (KDD) procedure, alongside an adequate selection of relevant features, permits producing estimation models that can forecast the severity of new accidents. We develop a prototype of our arrangement established on off-the-shelf mechanisms and validate it at the Applus+ IDIADA Automotive Scutiny Firm abiilities, showing that our planning can particularly cut the period demanded to alert and use emergency services afterward an mishap seizes place.
Cops are constantly adapting their equipment to the environment. Our kit bags have grown larger and larger as we collected equipment to deal with the job. Our departments gives us the basics and as we face new situations we think about what we could have used as a tool to have made the task easier. Then, we go out and get that tool – for next time. Much of the commercially produced police equipment used by our peers today was developed “on the fly” by those who walked the beat before us. The concept of the cruiser as a mobile office was developed by those of us who worked long shifts and thought “What could be added to this car to make my job easier? Make me more comfortable? Help me to hunt down dangerous offenders?”
In a new report, EU-OSHA publishes the findings of a major 2-year project to anticipate the effects of digitalisation on occupational safety and health (OSH) in the EU. The final results of this foresight project highlight developments in ICT-enabled technologies, the potential impact of these technologies on the nature and organisation of work, and the challenges and opportunities to OSH that they may bring.
Smart Digital Port Market Transformation thanks to Internet of Things (IoT), Artificial Intelligence (AI), Digital Twin, (private) 5G/B5G, C-V2X, and Robotics (incl. UAV/UTM).
an introductory talk at an embedded ethics workshopt for the faculty of informatics at TU Wien, illustrating the scope of ethical issues with technology with the example of chatGPT.
Keynote am 18. E-Learning Tag an der FH JOANNEUMpeterpur
Seit fast zehn Jahren gibt es in Einführungslehrveranstaltungen an der TU Wien »double blind peer reviewing« mit 1.000 Studierenden. In der Keynote von Peter Purgathofer (TU Wien) werden die besonderen Herausforderungen dieses Settings diskutiert und die Vorgehensweise sowie Lösungsansätze vorgestellt, mit denen die vielen Probleme eines solchen Ansatzes behandelt werden.
Details zu den im Vortrag erwähnten Artikel sind auf https://www.researchgate.net/profile/Peter_Purgathofer zu finden.
vortrag im rahmen der vorstellung des förderprogrammes »users in focus« der wirtschaftsagentur [http://lisavienna.at/de/events/wirtschaftsagentur-call-users-focus-2016]
talk for the legal departement of university of economics vienna at http://extrajournal.net/2014/01/31/infolaw-3d-drucker-aus-sicht-des-immaterialgueterrechts-am-11-februar-2014-in-der-wu-wien/
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
4. [...] Die Unfallursache ist voraussichtlich eine menschliche Fehlleistung des zuständigen
Fahrdienstleiters. Nach einer technischen Störung bei einer Weiche (vermutlich
witterungsbedingt) musste das Störungsprozedere vom Fahrdienstleiter in Penzing manuell
in Kraft gesetzt werden, dabei wurde laut vorläufigem Ermittlungsstand vergessen ein Signal
umzustellen.
Railway accident in Vienna:
human error cause for train
collision?
6. [...] Die Unfallursache ist voraussichtlich eine menschliche Fehlleistung des zuständigen
Fahrdienstleiters. Nach einer technischen Störung bei einer Weiche (vermutlich
witterungsbedingt) musste das Störungsprozedere vom Fahrdienstleiter in Penzing manuell
in Kraft gesetzt werden, dabei wurde laut vorläufigem Ermittlungsstand vergessen ein Signal
umzustellen.
Railway accident in Vienna:
human error cause for train
collision?
7. how can you create technologies
that gracefully recede/degrade
when they don’t work?
15. [...] Die Unfallursache ist voraussichtlich eine menschliche Fehlleistung des zuständigen
Fahrdienstleiters. Nach einer technischen Störung bei einer Weiche (vermutlich
witterungsbedingt) musste das Störungsprozedere vom Fahrdienstleiter in Penzing manuell
in Kraft gesetzt werden, dabei wurde laut vorläufigem Ermittlungsstand vergessen ein Signal
umzustellen.
Railway accident in Vienna:
human error cause for train
collision?
16. are we aware of the limitations of
your technology, and can we
communicate them?
20. »[…] a touchscreen system that was complex and that
sailors had been poorly trained […]
When we started getting the feedback […] it was really
eye-opening. And it goes into the, in my mind, ›just
because you can doesn’t mean you should‹ category[…]
As a result of innovation and a desire to incorporate new
technology, ›we got away from the physical throttles, and
that was probably the number-one feedback from the
fleet – they said, just give us the throttles that we can
use.‹«
https://news.usni.org/2019/08/09/navy-reverting-ddgs-back-to-physical-throttles-after-fleet-rejects-touchscreen-controls
21. »As the massive B-17 Flying Fortress touched down, the
pilot flicked the control to slow his descent as he had
always done. Within seconds, the massive plane hit the
ground, skidding on its belly, igniting the fuselage and
bursting into flames.«
22.
23.
24.
25.
26.
27.
28. [...] Die Unfallursache ist voraussichtlich eine menschliche Fehlleistung des zuständigen
Fahrdienstleiters. Nach einer technischen Störung bei einer Weiche (vermutlich
witterungsbedingt) musste das Störungsprozedere vom Fahrdienstleiter in Penzing manuell
in Kraft gesetzt werden, dabei wurde laut vorläufigem Ermittlungsstand vergessen ein Signal
umzustellen.
Railway accident in Vienna:
human error cause for train
collision?
29. how can technology contribute to
accidents/disasters or cause other
problems because of how it is
designed/configured/etc.?
33. »Our analysis shows that this voting system is far below
even the most minimal security standards applicable in
other contexts.«
avi rubin, informatiker, john hopkins university
fundstücke u.a.
#defineDESKEY((des_KEY8F2654hd4"
34. »Diebold hadn't password-protected the [vote database]
file or secured the audit log, so anyone with access to the
tabulation program during an election could change votes
and alter the log to erase the evidence.«
kim zetter, wired news
39. »Diebold voting machines opened with hotel minibar key
The key that controls access to a standard Diebold
voting machine is a common key that can be ordered from
the Internet, also used to open hotel minibars.«
boingboing.net
40. »California banned the use of Diebold machines because
the security was so bad.«
Bob Rowe, www.coastalpost.com/04/12/02a.htm
41. »The important thing isn't the voting software, it's an
effective voting procedure.«
comment by chandon seldon on slashdot.org
42. »The important thing isn't the voting software, it's an
effective voting procedure.«
user comment by chandon seldon on slashdot.org
43.
44. Process guide to Austria's E-Voting project:
http://www.oeh-wahl.at
I. Vote Casting between May 18th,
08:00 and May 22nd, 2009, 18:00
1. Encryption with the public key of the
election commission
Identification
Using Citizen Card
May 28th, 2009, 17:00
1. Removal of
the signatur
II. Counting
of the Votes
2. Mixing of the
encrypted ballots
3. Decryption with the private
key of the election commission,
then counting the votes
2. Signing of the completed
encrypted ballot
Hiermit gebe ich,
Max Mustermann,
0800001, die folgenden
verschlüsselten
Stimmen ab.
Hiermit gebe ich,
Max Mustermann,
0800001, die folgenden
verschlüsselten
Stimmen ab.
Hiermit gebe ich,
Max Mustermann,
0800001, die folgenden
verschlüsselten
Stimmen ab.
Hiermit gebe ich,
Max Mustermann,
0800001, die folgenden
verschlüsselten
Stimmen ab.
45. Process guide to Austria's E-Voting project:
http://www.oeh-wahl.at
I. Vote Casting between May 18th,
08:00 and May 22nd, 2009, 18:00
1. Encryption with the public key of the
election commission
Identification
Using Citizen Card
May 28th, 2009, 17:00
1. Removal of
the signatur
II. Counting
of the Votes
2. Mixing of the
encrypted ballots
3. Decryption with the private
key of the election commission,
then counting the votes
2. Signing of the completed
encrypted ballot
Hiermit gebe ich,
Max Mustermann,
0800001, die folgenden
verschlüsselten
Stimmen ab.
Hiermit gebe ich,
Max Mustermann,
0800001, die folgenden
verschlüsselten
Stimmen ab.
Hiermit gebe ich,
Max Mustermann,
0800001, die folgenden
verschlüsselten
Stimmen ab.
Hiermit gebe ich,
Max Mustermann,
0800001, die folgenden
verschlüsselten
Stimmen ab.
➔
wahlkommission
wähler/innen
trust? black box
49. implementation and use of
technologies transforms
mathematical concepts that are
provably correct into techno-social
»alloys«
50. malware in personal computers
Report: 48% of 22 million scanned computers infected
with malware [ZDnet]
32% of computers around the world are infected with
viruses and malware [dotTech]
Malware infects 30% of computers in the U.S.
[InfoWorld]
53. who will benefit from the
technology we create? who will
lose?
what is now common, but will
then become hard or impossible?
54. [...] Die Unfallursache ist voraussichtlich eine menschliche Fehlleistung des zuständigen
Fahrdienstleiters. Nach einer technischen Störung bei einer Weiche (vermutlich
witterungsbedingt) musste das Störungsprozedere vom Fahrdienstleiter in Penzing manuell
in Kraft gesetzt werden, dabei wurde laut vorläufigem Ermittlungsstand vergessen ein Signal
umzustellen.
Railway accident in Vienna:
human error cause for train
collision?
57. five sources of danger in automation
risk compensation
irony of automisation
58.
59. Many Aviators Have Difficulty
Manually Flying Planes, Study
Commissioned by FAA Finds
»Commercial airline pilots have
become so dependent on
automation that poor manual
flying skills and failure to master
the latest changes in cockpit
technology pose the greatest
hazards to passengers, an
international panel of air-safety
experts warns.«
60. five sources of danger in automation
risk compensation
irony of automisation
stress
61. five sources of danger in automation
risk compensation
irony of automisation
stress
errors
62. five sources of danger in automation
risk compensation
irony of automisation
stress
errors
the »bathtub curve«
66. [...] Die Unfallursache ist voraussichtlich eine menschliche Fehlleistung des zuständigen
Fahrdienstleiters. Nach einer technischen Störung bei einer Weiche (vermutlich
witterungsbedingt) musste das Störungsprozedere vom Fahrdienstleiter in Penzing manuell
in Kraft gesetzt werden, dabei wurde laut vorläufigem Ermittlungsstand vergessen ein Signal
umzustellen.
Railway accident in Vienna:
human error cause for train
collision?
68. Cheaper, better robots will replace human workers in the
world's factories at a faster pace over the next decade,
pushing labor costs down 16%, a report Tuesday said[…]
Robots will cut labor costs by 33% in South Korea, 25%
in Japan, 24% in Canada and 22% in the United States
and Taiwan.
The cost of owning and operating a robotic spot welder,
for instance, has tumbled from $182,000 in 2005 to
$133,000 last year, and will drop to $103,000 by 2025
69.
70.
71. »›There are approximately 4 million truck, taxi, limousine
and bus drivers in the United States, not to mention gas
station attendants and traffic policemen,‹ writes Posner,
the University of Chicago scholar, in his essay on
automation and employment. ›Not all these jobs will be
eliminated overnight,‹ he says, ›but they could go quite
fast.‹«
Der Spiegel
72. automation is rarely designed
to regard the interests of
more than a few people.
73. »The progress in AI research
makes it timely to focus research
not only on making AI more
capable, but also on maximizing
the societal benefit of AI.«
74. how can we design technologies to
be human-centered instead of
»just because we can«?
76. »Human drivers may be forgiven for making an instinctive
but nonetheless bad split-second decision, such as
swerving into incoming traffic rather than the other way
into a field. But programmers and designers of automated
cars don’t have that luxury, since they do have the time to
get it right and therefore bear more responsibility for bad
outcomes.«
Lin, P. 2013, The Ethics of Autonomous Cars,
The Atlantic.
77. »[…] an incident over the weekend in which the owner
of a Tesla Model X SUV crashed into a building and claimed
it had suddenly accelerated on its own. But Tesla vehicles
are constantly connected to their manufacturer via the
Internet, and the company had this to say in a
statement to the Verge:
›Data shows that the vehicle was traveling at 6 mph
when the accelerator pedal was abruptly increased to 100
percent.‹«
Tesla Knows When a Crash Is Your Fault, and Other
Carmakers Soon Will, Too. MIT Technology Review
78.
79.
80.
81. »Legislation – preferably world-wide on a similar basis to civil
aviation – is needed now.
Product liability should be relaxed for driverless cars.
Accidents should be investigated on a no-blame model and
recommendations made to avoid any repetition.
All commercial algorithms for this sort of control decision should
be made public.
All design and development of driverless software should be
legally required to have open ethical scrutiny at all stages.«
Blay Whitby (2016), technology ethicist
82. »The progress in AI research
makes it timely to focus research
not only on making AI more
capable, but also on maximizing
the societal benefit of AI.«
83. 1. Instead of preventing misuse: reduce effects, minimise damages
2. Instead of automation and take-over: technology as support, human
cooperation as basis
3. Instead of monopolies: keep alternatives, secure plurality
4. Instead of reliance on a single solution: create redundancies
5. Instead of dependence on a single vendor: temporal, spacial,
technological and organisational diversity
6. Instead of centralisation: decoupled, transparent, decentral solutions
7. Instead of total failure: reach stable state in partial or complete failure
8. Instead of surprises: systematic planning for emergencies
9. Instead of heteronomy: design of technology, esp. safety systems, with
approval of concerned parties and the public
10. Renounce economic advantage if potential damage is too high
alexander roßnagel:
10 design-proposals
1989
roßnagel et al, die verletzlichkeit
der »informationsgesellschaft«
84.
85.
86.
87.
88. how can we design
technologies to be
human-centered
instead of »just
because we can«?
who will benefit from
the technology we
create? who will lose?
what is now common,
but will then become
hard or impossible?
how can technology
contribute to
accidents/disasters or
cause other problems
because of how it is
designed/configured/
etc.?
how can technology
contribute to
accidents/disasters or
cause other problems
because of how it is
designed/configured/
etc.?
how can you create
technologies that
gracefully recede/
degrade when they
don’t work?