This is the original keynote file for my talk at the Smart Disclosure Summit in Washington DC on March 30, 2012. I will upload a PDF with notes separately.
This is the original keynote file for my talk at the Smart Disclosure Summit in Washington DC on March 30, 2012. I will upload a PDF with notes separately.
In this presentation, Pranita introduces IoT and discusses trends that will impact us in the next five years. Pranita is interested in applications that are at the confluence of augmented reality and IoT.
Government For The People, By The People, In the 21st CenturyTim O'Reilly
My joint keynote with Jennifer Pahlka of Code for America at the Accela Engage conference in San Diego on August 5, 2014. We talk about current advances in technology, and how they call for anyone developing services to put their users at the center. In particular, we talk about how these lessons apply to government. Making government work by the people and for the people in a 21st century way is central to restoring faith in government.
e-Research and the Demise of the Scholarly ArticleDavid De Roure
Innovations 2013 - e-Science, we-Science and the latest evolutions in e-publishing. STM International Association of Scientific, Technical & Medical Publishers. 4th December 2013, Congress Centre, Great Russell Street, London, UK.
50 most memorable and inspirational quotes from SXSW 2015. Austin, TX. Enjoy!
This document is released under creative commons licence.
www.mediafeed.pl
Over de oorsprong van verhalen in onze cultuur, en de rol die techniek daarin altijd gespeeld heeft. Om tenslotte te laten zien hoe de digitale revolutie de mogelijkheden van storytelling heeft verrijkt.
In this presentation, Pranita introduces IoT and discusses trends that will impact us in the next five years. Pranita is interested in applications that are at the confluence of augmented reality and IoT.
Government For The People, By The People, In the 21st CenturyTim O'Reilly
My joint keynote with Jennifer Pahlka of Code for America at the Accela Engage conference in San Diego on August 5, 2014. We talk about current advances in technology, and how they call for anyone developing services to put their users at the center. In particular, we talk about how these lessons apply to government. Making government work by the people and for the people in a 21st century way is central to restoring faith in government.
e-Research and the Demise of the Scholarly ArticleDavid De Roure
Innovations 2013 - e-Science, we-Science and the latest evolutions in e-publishing. STM International Association of Scientific, Technical & Medical Publishers. 4th December 2013, Congress Centre, Great Russell Street, London, UK.
50 most memorable and inspirational quotes from SXSW 2015. Austin, TX. Enjoy!
This document is released under creative commons licence.
www.mediafeed.pl
Over de oorsprong van verhalen in onze cultuur, en de rol die techniek daarin altijd gespeeld heeft. Om tenslotte te laten zien hoe de digitale revolutie de mogelijkheden van storytelling heeft verrijkt.
[SOCRS2013]Differential Context Modeling in Collaborative FilteringYONG ZHENG
Abstract: Context-aware recommender systems (CARS) try to adapt their recommendations to users’ specific contextual situations. In many recommender systems, particularly those based on collaborative filtering (CF), the additional contextual constraints may lead to increased sparsity in the user preference data, thus fewer matches between the current user context and previous situations. Our earlier work proposed two approaches to deal with this problem – differential context relaxation (DCR) and differential context weighting (DCW) and we have successfully examined them using user-based collaborative filtering (UBCF). In this paper, we put DCR and DCW into one framework called differential context modeling (DCM). As a general framework, DCM is able to be applied to other recommendation algorithms other than UBCF. We expand the application of DCM to the other two CF approaches: item-based CF and slope one recommender. Predictive performances are evaluated based on two real-world data sets and experimental results demonstrate that applying DCM to those two algorithms is able to improve predictive accuracy compared with our baselines: context-free CF algorithms and contextual pre-filtering algorithms.
These are the slides of my PhD. thesis dissertation called "A Framework for Abstraction and Virtualization of Sensors in Mobile Context Aware Computing". It was presented on June 29 2015.
In this presentation we illustrate a novel context-aware mobile recommender system for places of interest (POIs). Unlike existing systems, which learn users’ preferences solely from their past ratings, it considers also their personality - using the Five Factor Model. Personality is acquired by asking users to complete a brief and entertaining questionnaire as part of the registration process, and is then exploited in: (1) an active learning module that actively acquires ratings-in-context for POIs that users are likely to have experienced, hence reducing the stress and annoyance to rate (or skip rating) items that the users don’t know; and (2) in the recommendation model that builds up on matrix factorization and therefore can be trained even if the users haven’t rated any items yet.
The Internet of Things, Ambient Intelligence, and the Move Towards Intelligen...George Vanecek
With the successful adoption of cloud-based services and the increasing capabilities of smart connected/wireless devices, the software and consumer electronics industries are turning towards innovating solutions within the Internet-of-Things (IoT) to offer consumers (and enterprises) smart solutions that take the dynamics of the real-world into consideration.
The vision is to bring the awareness of what happens in the real-world, how people live and how smart devices operate in the real world into the view and control of the digital world. Here the digital world is the totality of the Internet, the Web, and the private and public cloud services.
In this session, we will look at key technical trends and their increasing interdependency in the areas of real-world Sensing, Perception, Machine Learning, Context-awareness, dynamic Trust Determination, Semantic Web and Artificial Intelligence which are now enabling ambient intelligence and driving the emergence of Intelligence Systems within the Internet of Things. We will also look at the challenges that such interdependencies expose, and the opportunities that their solutions offer to the industry.
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...Amit Sheth
Keynote at the 3rd Asian Semantic Web Conference (ASWC2008), Bangkok, Thailand, Feb 2-5, 2009. http://aswc2008.ait.ac.th/invitedspeaker2.html
More details: http://wiki.knoesis.org/index.php/Computing_For_Human_Experience
Using Past Statistical Data and Present Situation We can Predict the Future Using Data Science.
This Small PowerPoint Presentation is given by P.Nikhil, D.Dhanunjaya Rao from Government College, Rajahmundry.
Hope it is useful for future Generation.
Thank You.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
9. Dot.com / Internet Boom
1996
Internet users per 100 inhabitants
2017
nearly 50% of world’s population
By 2017, there will be about 3.6 billion
Internet users -more than 48% of the world's
projected population (7.6 billion).
In 2012, there were 2.3 billion Internet users -
about 32% of the world's population (7.2
billion).
12. HUMAN WITH TECHNOLOGY
Augmenting…
• Activity/Inactivity
• Exercise Tagging
• Heart Rate
• Elevation/Stairs/Steps/Distance
• Calories Burned
• Calorie Intake (Nutrition)
• Sleep Quality / Time
The Quantified Self
• Fitness Trackers & tagging
• Navigator / Compass
• Search / Social / Google Now
• Music, Video & Photo
• News / Entertainment
• Make Call / Send Messages
• & many more…
Human Augmentation
• Integrated Sensor
• Kick Ball – Instant Feedback on Speed,
Spin, Strike Point..
• Power strike training
• Learn & challenge yourself.
Wearable User Interfaces
Source: Fitbit Flex Source: Google Galss Source: Adidas miCoach
13. REPLACING HUMANS
Machines…
• Fewer traffic collisions
• Higher speed limit
• Eliminated Parking pro
• Reduction of physical road sign problem
• Removal of constraints on occupants' state
( Doesn’t matter, under age, over age, blind,
distracted, intoxicated, or impaired)
• Smoother ride
Self-ruling Vehicles Mobile Robots
• Think Like a Human
• Watson has 3 main services: Ask,
Discover & Decide
• Providing Business Value
Virtual Assistants
Source: Google self-driving vehicle Source: US Army Source: IBM Watson Engagement Advisor
Watson puts content into context, delving into the
data and coming back with a relevant response.
• Machines don't get tired
• They don't close their eyes
• They don't hide under trees
• They don't waste time
• They don’t fall sick
• They don’t holiday.
14. HUMANS & MACHINES
Working Together…
Autonomous Vehicles Mobile Robots
• Products Organizes & rearranges themselves
• Orders Auto Filled When the Customers Want
Them
• Decreased human errors
Virtual Assistants
Source: Baxter Rethink Robotics Source: Amazon Robot
• Machines don't get tired
• They don't close their eyes
• They don’t fall sick
• They don’t holiday.
• Higher speed & accuracy
• Smoother ride
• Provide Emotional Indication
16. SHAPE OUR FUTURE?
How will technology
• Machines Understanding Humans
and the Environment
• Humans Understanding Machines
• Machines and Humans Becoming Smarter
17. Machines Understanding
HUMANS & ENVIROMENT
Key Technology Areas:
• Smart Dust
• Brain Computer Interface
• Affective Computing
• 3D Scanners
• Natural-Language Question Answering
• Mobile Health Monitoring
• Gesture Control
• Speech Recognition
AffdexEmotiv Systems
19. Machines & Humans
BECOMING SMARTER
Key Technology Areas:
• Quantum Computing
• Big Data
• Cloud Computing
• In-Memory Analytics
• Predictive Analytics
• Prescriptive Analytics
AND FASTER
20. Let’s
CONCLUDE
• Devices are seamlessly integrated into the life of users and having services
readily available to everywhere users go
• It is an emerging paradigm to free everyday users from manually configuring and
instructing computer systems
• Allow us “to do more, by doing less”
• Is about building systems that can self-monitor, self-heal and self-configure (zero
maintenance).
• Human attention devoted to interaction can be reduced so that users can focus on
high-level tasks
22. We live in a world where there is more
and more information, and less and less
meaning.
23.
24. Who is
KAPIL ?
Year before Current Search
Google Complex Searching Algorithms Takes
Different Context in to consideration.
Context is never static
25. What is
CONTEXT ?
Context is any information that can be used to characterize
the situation of an entity. An entity is a person, place, or
object that is considered relevant to the interaction
between a user and an application, including the user and
the application themselves.”
Sensing & Identifying relevant context
Using obtained context information
26. Information Sample
CONTEXTUAL • User identity
• Spatial information (location, orientation, speed, acceleration…)
• Temporal information (time of the day, date, season of the year)
• Environmental information (temperature, air quality, light or noise level)
• Social situation (who you are with, people that are nearby)
• Resources that are nearby (accessible devices, networks, hosts)
• Availability of resources (battery, display, network, bandwidth)
• Physiological measurements (blood pressure, heart rate, respiration rate,
muscle activity, tone of voice)
• Activity (talking, reading, walking, running, sleeping)
• Schedules and agendas
27. Let’s put it in to
BUSINESS CONTEXT ?
DATA
+
ANALYTICS
=
INFORMATION
+
INFORMARION CONTEXT
=
UXINSIGHT
+
ACTION
=
BETTER
INSIGHT
Not just “deliver any service at any
time, anywhere”,
but rather
“delivering the right service at the
right moment”
before even user think of requesting
&
BUSINESS
We use computer & internet in 2014 – Send Mails, Calls, Discuss topics we are interested in, listen music, watch movies, buy/sell trade, play and many more…….etc.. Even our banking going virtual
What we taken for granted today, only a vague idea few decades back.
Today most of the business failing not because of RND & Concept, its because of technology adoption.
Internet bubble started in 1996 > Less than 15 years old…
Before 1957, computer only worked on one task at a time (Batch Processing) & off Couse it was quite infective.
Computer was growing and bigger & bigger and computer were kept in cool room. Specialists were called to handle, since developer didn’t had access to m/c
Year 1957 Marked a big change, remote connection was established, so that developer can work directly from their place.
At the same time idea of time sharing has came up, this first concept in the computer industry to share the power of computer processing power on one computer with multiple users
Oct 4 – 1957, During the cold war, First unmanned satellite was sent into obit by soviet union. Fear of missile emerged.
In order to secure the American leading technology, Us founded the DARPA (feb 1958)
At that time knowledge was only transferred by people, DARPA planned a large scale computer network in order to accelerate knowledge transfer & to avoid the doubling which has already existed.
This became ARPANET- this is the fundamental to history of internet.
In 1962, American Fairey aircraft deducted, middle and long rage missiles in CUBA, which able reach United State & it took fear of atomic conflict.
At that time information system had a centralized network architecture. To avoid breakdown during attach.. A decentralized network architecture was introduced.
Communication still used to work through radio waves.. That could cause problem in case of atomic attach.
Direct wave - Long reach is not passible. Then they developed distributed network with a minimum of interference.
In this way term internet was form.
TCP/IP protocol – Designed to communicate with other network – that’s how internet was boned (inter-net)
By Feb28 – 1990 Arpanet Hardware was removed, but the internet was up running
Moore's Law
Computer power is doubling every 18 months
Future can be reasonably predicted out to & By 2020, chips may cost just a penny
Millions of chips will be scattered into our world
The computer will be everywhere, and nowhere
After 2020..Post-silicon era: Quantum computing - Artificial Intelligence and
The Quantified Self : incorporating technology into data acquisition on aspects of a person's daily life. Such self-monitoring and self-sensing, which combines wearable sensors and wearable computing, is also known as life logging. ... Measure vital science, fitness level and understand functioning of human & fitness levels
Google Glass is a wearable computer with an optical head-mounted display (OHMD). It was developed by Google with the mission of producing a mass-market ubiquitous computer. Google Glass displays information in a smartphone-like hands-free format.
This is really broad area of using technology to really augment the human.. Technology which we are producing, is augmen
Wearable computers, also known as body-borne computers or wearables are miniature electronic devices that are worn by the bearer under, with or on top of clothing. This class ofwearable technology has been developed for general or special purpose information technologies and media development.
The Google driverless car is a project by Google that involves developing technology for autonomous cars. The software powering Google's cars is called Google Chauffeur. Lettering on the side of each car identifies it as a "self-driving car.
SMARTDUST:
Wireless sensors, with sensing, computing, communication & power in one tiny particle (package)
Size of the smartdust is as small as small grain particle.
These tiny small piece of computer can form a small invisible network that can manage infrastructure, Agriculture & all the physical world.
These tiny computer record information about their surrounding & info can sent to other computer or to YOU.
Eg. Lift auto dial.. Pothole notification.. bridge collapse.. Computer bootingup.
BRAIN COMPUTER INTERFACE – Brain Gate - Electrode chip human.
is a technology which allows a human to control a computer, peripheral, or other electronic device with thought.
With the help of brain Gate – Lectrode chip.. Operate computer remotely.. No more need to voice recognize system.
Who will first Use – Military, Patient, Robots..
AFFECTIVE COMPUTING
Sense and respond respectfully to human emotions….through physical change in the body like heart rate, sweat etc..
if person communicating to technology is frustrated, weather confused… In that case technology can respond differently to keep him engaging.
3D SCANNERS
Aims to capture the geometry of the shape / world
New trend showing…phone can capture or shoot multiple image to extend the 3D models.. Also can be enhanced with the help internet
Internet of Things:
Physical World connected to internet – Things meaning (Everything & Anything, which can collect, process and share information)
Every object around is may be connected &.
It opens up new world of infinite possibilities – everything become smarter and smarter overtime
Machine-to-Machine Communication Services:
Cars communicate to open the gate & garage door
If you are in office.. Home water heater can switch off
Mesh Networks: Sensor:
Mesh network architecture is not defined network. Device sends data to nearest nod (device) and data moves nod to nod.
Self Healing, self discovering and configuring.
2020.. You can have video chat without internet using mesh interwork.
Activity Stream: An activity stream is a list of recent activities performed by an individual in a single website ( Facebook, google .. News feeds etc )
Quantum Computing: A quantum computer is a computation device that makes direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.
Unlike classical computer using 0 & 1.. In QC it used Qbit (either 0 or 1 or 01 at the same time
Capable of solving many problems - Optimization… Solving mysteries, Healthcare, Transportation…
Prescriptive Analytics: Analysis the all data and provide Descriptive + Predictive & Prescriptive Analytics..
Its not just telling what’s going on, It’s not just telling what might happen, but it also telling what to do about it.
Big Data:
Ability to data mine large data set of information.
Last year more data has produce last year than before in the human history
It has become the bridge between IT & Business
Volume- How much data you are moving.. Variety- Where will we get the data (data sources) Velocity- how fast will we receive the data?
In-Memory Data:
Cloud Computing:
You only pay what you use… Complete infrastructure will taken care with and you need to just pay as you use.y
Your data follows you every where on the cloud..
Very is to establish you business across globe.