Intelligent Agents for Helping Humanity Reach Its Full PotentialJason Hong
Within fifty years, we will build and deploy highly personalized intelligent agents that can help us find, set, and meet hard goals to improve our lives in meaningful ways that we choose. Think of it as a cross between a lifelong coach, a caring uncle, and an honest and supportive friend. Or, if you are into science fiction, consider it as a combination of Samantha in the movie Her, the Young Lady’s Primer from the book The Diamond Age, and Minds from Iain Bank’s The Culture series. Let’s call this agent Maslow.
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Jason Hong
Keynote talk I gave at the Mobile and Cloud Workshop at Mobisys 2014. I talk about my experiences and reflections on privacy, focusing on (1) Urban Analytics, (2) Google Glass, and (3) PrivacyGrade.
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Jason Hong
June 2015
This talk looks at our team's ongoing work in using social psychology and diffusion of innovations to improve cybersecurity. It also reflects on the role of theory, in terms of offering inspiration for new ideas, a useful vocabulary, guidance for what to build and how to build things better, as well as insight into the problem space. This talk also offers some advice for people building theories, adapting Pasteur's quadrant and Diffusion of Innovations to theory, to help people who build and design systems.
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Jason Hong
This document summarizes a talk about privacy issues related to smartphone data collection and usage. The talk discusses how smartphones have become ubiquitous and how they collect intimate personal data through sensors, location tracking, and other means. It then describes two projects: Livehoods, which uses geotagged social media data to analyze urban areas and neighborhoods; and PrivacyGrade, which grades apps on their privacy practices. The talk reflects on inferences that can be made from such data, potential for discrimination, and developers' lack of privacy knowledge, arguing for improvements across the whole privacy ecosystem.
How to Analyze the Privacy of 1 Million Smartphone AppsJason Hong
These slides are from a briefing to Congressional staffers about privacy, October 30 2014. It talks about our ongoing work with PrivacyGrade.org, which uses crowdsourcing techniques plus static analysis techniques to infer the privacy-related behaviors of apps.
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Jason Hong
Talk I gave at ISSA 2013 CISO forum, looking at some human factors issues in cybersecurity. I discuss some of our research in anti-phishing, user interfaces, mental models of cybersecurity, and ways of motivating people.
Privacy and Security for the Emerging Internet of ThingsJason Hong
Intel iSecCon2016 conference
I talk about the pyramid of IoT devices, sketch out some of the security and privacy issues, and present some of the ongoing work we are doing in this space at Carnegie Mellon University.
CHIuXiD (Indonesia) keynote about privacy and security. Includes why care about privacy, design challenges, design opportunities, and brief discussion of some of my team's research on mobile sensing.
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Jason Hong
Talk Feb2019 at Lakehead University for Rise of the Machines
In the near future, our smart devices will know almost everything about us. These devices offer the opportunity to vastly improve our healthcare, urban planning, safety, and more. However, these same devices also pose dramatic new challenges for privacy and for ethics. In this talk, I'll discuss how these smart devices work, what they can learn about us, and what we need to make sure that the benefits of these technologies vastly outweigh the costs.
https://www.lakeheadu.ca/about/news-and-events/news/archive/2019/node/50549
How to Analyze the Privacy of 750000 Smartphone Apps Jason Hong
Describes some of my team's research on analyzing the privacy of Android smartphone apps. Presents PrivacyGrade as well as Gort. Also presents some preliminary work on CrowdVerify, some research we are conducting to analyze privacy policies.
The document discusses communication trends predicted for 2026, including television, social media, video streaming, and Pokémon Go. For television, it states the theory of relative constancy, that television will remain popular despite increased video streaming. Regarding social media, it describes how Moore's innovation adoption rate shows new platforms gradually replacing older ones. It predicts social media will be even larger in 2026. For video streaming, it applies uses and gratifications theory to explain the growing popularity of services like Netflix and Hulu. Finally, it discusses how critical mass theory explains Pokémon Go's success through social influences and predicts the game will remain popular if servers can handle capacity.
Paul Hudson evaluates the significance of the pace of change we’ve witnessed in the last 10 years and predicts the likely pace of change over the next 10 years. What can we expect in the future and what does this means for your business?
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Jason Hong
This is a talk I gave in April 2013 at Carnegie Mellon University's CyLab weekly seminar. It describes some of our team's latest work on combining crowdsourcing with static and dynamic analysis to understand the privacy and security behaviors of smartphone apps.
Lee Rainie discusses the latest Pew Research Center findings about the state of technology and media in 2015 and looks at five major trends that will shape the media environment and consumer habits in the coming years. This is a presentation he gave at the recent Tencent Media Summit in Beijing, China.
Research associate Kathryn Zickuhr discussed the Pew Research Center’s latest data on older adults and technology at JASA’s Seminar on Advocacy and Volunteering in New Landscapes in New York, NY.
Getting Going with Mobile (What Your Users Really Want!)Forum One
Here is a sample user scenario storyboard for a key audience of your organization:
1. Sarah is waiting for the bus on her way to work.
2. She opens the organization's mobile app to check for any last minute updates on an event happening that evening.
3. Browsing the event details, she notices a call for volunteers and decides to sign up.
4. On the bus, she uses the app to register as a volunteer, selecting her availability and interests.
5. At work during her lunch break, Sarah receives a confirmation email on her phone about her volunteer shift that evening.
6. After work, Sarah uses the navigation features in the app to find directions to the
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, presented the Center’s latest findings about the use of digital technology and its future at the Federal Reserve Board’s Editors and Designers conference in Philadelphia on October 6, 2016. During the keynote he discussed the impact of social media, collaboration, and future trends in technology with a special focus on the issues tied to security and reputational risk that face the Federal Reserve System. He described how the Center’s research can help communicators:
-Disseminate their messages across multiple digital and traditional media channels
-Engage their audience and encourage amateur evangelism
-Assess the impact of their outreach and observe challenges to their material
-Think like long a long-tail organization that also has real-time immediacy
The document summarizes research from the Pew Research Center on technology adoption among lower-income populations. It finds that while 85% of Americans use the internet, only 70% have broadband at home, with lower rates among those earning under $30,000 annually. For those groups, mobile devices and public libraries are increasingly important access points. Around 1/3 of those earning under $20k are non-users, who tend to be older. Younger lower-income adults have higher rates of smartphone ownership, and use mobile phones as their primary internet access.
The document summarizes data from Pew Research Center on technology adoption among older adults. It finds that while 59% of seniors age 65+ now go online, lower-income seniors and those with disabilities are less likely to use the internet or mobile devices. While most seniors own cell phones, younger seniors are more likely to own smartphones or tablets. The data also shows that internet users feel more connected than non-users and that tablets are nearly as common as smartphones among older adults.
Lee Rainie, Director of the Pew Research Center Internet Project gave this presentation to community foundation leaders and philanthropists as part of a program organized by the Knight Digital Media Center. He discussed the new media and information ecosystem in communities and how foundations can think about new opportunities in this environment.
The document summarizes key internet trends from a 2013 conference. It notes that global internet users grew to 2.4 billion in 2012 with 8% annual growth, driven largely by emerging markets like China, India, and Indonesia. Mobile internet access and usage is growing rapidly, surpassing desktop access in some countries. Social media and content sharing across photos, videos, fitness data, and other media is exploding, driven by smartphones and platforms like Facebook, YouTube, and Instagram. Mobile transactions and usage are also rising significantly across many companies.
In this wide-ranging new talk that was given as a part of Dartmouth College’s Strategic Planning process and their “Leading Voices in Higher Education Speaker Series http://strategicplanning.dartmouth.edu/aspire/leading-voices-in-higher-education-speaker-series, Amanda Lenhart talked about the technological milieu of today’s teens and college students as they grew from children to young adults and the ways in which each major new technological development disrupted our previous communication strategies. The talk also explored the ways that social media is changing campus culture as well as how digital tools are changing where learning happens – MOOCs and mixed classes, flipped classrooms – as well as how it occurs for K-12 as well as within higher education.
To view all 71 minutes of the talk and Q &A, as well as shorter video on the future of the university, please visit: http://strategicplanning.dartmouth.edu/aspire/amanda-lenhart
A survey of nearly 900 Internet stakeholders reveals fascinating new perspectives on the way the Internet is affecting human intelligence and the ways that information is being shared and rendered.
The document summarizes a presentation by Amanda Lenhart from the Pew Research Center on dating and relationships in the digital age. It discusses how people have long sought assistance in finding partners through various means, including online dating sites and apps. Data from Pew surveys show that while 11% of Americans have used online dating, experiences vary, with 66% having gone on dates but only 23% entering long-term relationships from online meetings. It also examines how technology impacts existing couples, with most reporting little effect but younger adults seeing more influence, both positive and negative.
The document discusses trends in digital media consumption and online advertising. It notes that the online ad market is growing rapidly and will surpass newspapers by 2009. It also discusses how consumers, especially youth, are spending more time with digital/online media like social networks, games, and videos compared to traditional TV and print. Marketers are thus shifting more ad spending online to reach these engaged audiences.
Entefy's research report on information overload and digital complexityEntefy
Entefy conducted a survey of 1,500 professionals in the U.S. What we found were surprising insights into digital complexity, app fatigue, and information overload.
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Jason Hong
The document discusses a workshop on using big data techniques to improve privacy. It describes PrivacyGrade.org, a site that analyzes apps' privacy policies and compares them to user expectations. Many apps request unnecessary permissions. The workshop discussed using crowdsourcing to better understand privacy policies and expectations. Speakers emphasized the need to consider the whole privacy ecosystem, involve users to understand semantics, and create solutions that can scale.
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
Talk Feb2019 at UCSD's Halıcıoğlu Data Science Institute, Security and Privacy at the Edge: Challenges and Future Directions
In the near future, our smart devices will know almost everything about us. These devices, combined with AI technologies, will offer many opportunities to vastly improve society in positive ways. However, these same technologies also pose dramatic new challenges for privacy and for ethics. In this talk, I'll sketch out why privacy is so hard to tackle, how and why we have failed in privacy and ethics in web and smartphones, and discuss some possible social, legal, and technical approaches for steering IoT in more positive directions.
http://datascience.ucsd.edu/security-and-privacy-symposium/venue.html
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Jason Hong
Talk Feb2019 at Lakehead University for Rise of the Machines
In the near future, our smart devices will know almost everything about us. These devices offer the opportunity to vastly improve our healthcare, urban planning, safety, and more. However, these same devices also pose dramatic new challenges for privacy and for ethics. In this talk, I'll discuss how these smart devices work, what they can learn about us, and what we need to make sure that the benefits of these technologies vastly outweigh the costs.
https://www.lakeheadu.ca/about/news-and-events/news/archive/2019/node/50549
How to Analyze the Privacy of 750000 Smartphone Apps Jason Hong
Describes some of my team's research on analyzing the privacy of Android smartphone apps. Presents PrivacyGrade as well as Gort. Also presents some preliminary work on CrowdVerify, some research we are conducting to analyze privacy policies.
The document discusses communication trends predicted for 2026, including television, social media, video streaming, and Pokémon Go. For television, it states the theory of relative constancy, that television will remain popular despite increased video streaming. Regarding social media, it describes how Moore's innovation adoption rate shows new platforms gradually replacing older ones. It predicts social media will be even larger in 2026. For video streaming, it applies uses and gratifications theory to explain the growing popularity of services like Netflix and Hulu. Finally, it discusses how critical mass theory explains Pokémon Go's success through social influences and predicts the game will remain popular if servers can handle capacity.
Paul Hudson evaluates the significance of the pace of change we’ve witnessed in the last 10 years and predicts the likely pace of change over the next 10 years. What can we expect in the future and what does this means for your business?
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Jason Hong
This is a talk I gave in April 2013 at Carnegie Mellon University's CyLab weekly seminar. It describes some of our team's latest work on combining crowdsourcing with static and dynamic analysis to understand the privacy and security behaviors of smartphone apps.
Lee Rainie discusses the latest Pew Research Center findings about the state of technology and media in 2015 and looks at five major trends that will shape the media environment and consumer habits in the coming years. This is a presentation he gave at the recent Tencent Media Summit in Beijing, China.
Research associate Kathryn Zickuhr discussed the Pew Research Center’s latest data on older adults and technology at JASA’s Seminar on Advocacy and Volunteering in New Landscapes in New York, NY.
Getting Going with Mobile (What Your Users Really Want!)Forum One
Here is a sample user scenario storyboard for a key audience of your organization:
1. Sarah is waiting for the bus on her way to work.
2. She opens the organization's mobile app to check for any last minute updates on an event happening that evening.
3. Browsing the event details, she notices a call for volunteers and decides to sign up.
4. On the bus, she uses the app to register as a volunteer, selecting her availability and interests.
5. At work during her lunch break, Sarah receives a confirmation email on her phone about her volunteer shift that evening.
6. After work, Sarah uses the navigation features in the app to find directions to the
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, presented the Center’s latest findings about the use of digital technology and its future at the Federal Reserve Board’s Editors and Designers conference in Philadelphia on October 6, 2016. During the keynote he discussed the impact of social media, collaboration, and future trends in technology with a special focus on the issues tied to security and reputational risk that face the Federal Reserve System. He described how the Center’s research can help communicators:
-Disseminate their messages across multiple digital and traditional media channels
-Engage their audience and encourage amateur evangelism
-Assess the impact of their outreach and observe challenges to their material
-Think like long a long-tail organization that also has real-time immediacy
The document summarizes research from the Pew Research Center on technology adoption among lower-income populations. It finds that while 85% of Americans use the internet, only 70% have broadband at home, with lower rates among those earning under $30,000 annually. For those groups, mobile devices and public libraries are increasingly important access points. Around 1/3 of those earning under $20k are non-users, who tend to be older. Younger lower-income adults have higher rates of smartphone ownership, and use mobile phones as their primary internet access.
The document summarizes data from Pew Research Center on technology adoption among older adults. It finds that while 59% of seniors age 65+ now go online, lower-income seniors and those with disabilities are less likely to use the internet or mobile devices. While most seniors own cell phones, younger seniors are more likely to own smartphones or tablets. The data also shows that internet users feel more connected than non-users and that tablets are nearly as common as smartphones among older adults.
Lee Rainie, Director of the Pew Research Center Internet Project gave this presentation to community foundation leaders and philanthropists as part of a program organized by the Knight Digital Media Center. He discussed the new media and information ecosystem in communities and how foundations can think about new opportunities in this environment.
The document summarizes key internet trends from a 2013 conference. It notes that global internet users grew to 2.4 billion in 2012 with 8% annual growth, driven largely by emerging markets like China, India, and Indonesia. Mobile internet access and usage is growing rapidly, surpassing desktop access in some countries. Social media and content sharing across photos, videos, fitness data, and other media is exploding, driven by smartphones and platforms like Facebook, YouTube, and Instagram. Mobile transactions and usage are also rising significantly across many companies.
In this wide-ranging new talk that was given as a part of Dartmouth College’s Strategic Planning process and their “Leading Voices in Higher Education Speaker Series http://strategicplanning.dartmouth.edu/aspire/leading-voices-in-higher-education-speaker-series, Amanda Lenhart talked about the technological milieu of today’s teens and college students as they grew from children to young adults and the ways in which each major new technological development disrupted our previous communication strategies. The talk also explored the ways that social media is changing campus culture as well as how digital tools are changing where learning happens – MOOCs and mixed classes, flipped classrooms – as well as how it occurs for K-12 as well as within higher education.
To view all 71 minutes of the talk and Q &A, as well as shorter video on the future of the university, please visit: http://strategicplanning.dartmouth.edu/aspire/amanda-lenhart
A survey of nearly 900 Internet stakeholders reveals fascinating new perspectives on the way the Internet is affecting human intelligence and the ways that information is being shared and rendered.
The document summarizes a presentation by Amanda Lenhart from the Pew Research Center on dating and relationships in the digital age. It discusses how people have long sought assistance in finding partners through various means, including online dating sites and apps. Data from Pew surveys show that while 11% of Americans have used online dating, experiences vary, with 66% having gone on dates but only 23% entering long-term relationships from online meetings. It also examines how technology impacts existing couples, with most reporting little effect but younger adults seeing more influence, both positive and negative.
The document discusses trends in digital media consumption and online advertising. It notes that the online ad market is growing rapidly and will surpass newspapers by 2009. It also discusses how consumers, especially youth, are spending more time with digital/online media like social networks, games, and videos compared to traditional TV and print. Marketers are thus shifting more ad spending online to reach these engaged audiences.
Entefy's research report on information overload and digital complexityEntefy
Entefy conducted a survey of 1,500 professionals in the U.S. What we found were surprising insights into digital complexity, app fatigue, and information overload.
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Jason Hong
The document discusses a workshop on using big data techniques to improve privacy. It describes PrivacyGrade.org, a site that analyzes apps' privacy policies and compares them to user expectations. Many apps request unnecessary permissions. The workshop discussed using crowdsourcing to better understand privacy policies and expectations. Speakers emphasized the need to consider the whole privacy ecosystem, involve users to understand semantics, and create solutions that can scale.
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
Talk Feb2019 at UCSD's Halıcıoğlu Data Science Institute, Security and Privacy at the Edge: Challenges and Future Directions
In the near future, our smart devices will know almost everything about us. These devices, combined with AI technologies, will offer many opportunities to vastly improve society in positive ways. However, these same technologies also pose dramatic new challenges for privacy and for ethics. In this talk, I'll sketch out why privacy is so hard to tackle, how and why we have failed in privacy and ethics in web and smartphones, and discuss some possible social, legal, and technical approaches for steering IoT in more positive directions.
http://datascience.ucsd.edu/security-and-privacy-symposium/venue.html
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
The document discusses challenges in understanding large amounts of information and proposes approaches to scale understanding through information visualization, machine learning, and crowdsourcing. It provides examples of how visualization can show or hide important information and discusses techniques like focus+context and color use. The document also examines examples of successful crowdsourced analysis projects and factors in designing effective crowd-based systems like motivation, quality control, and skill levels.
Learning Experience Design (ATD 2016 ICE W316)Chan Lee
The document discusses learning experience design and learner behaviors based on a presentation by Jay Chon and Chan Lee. Some key points:
- Learners expect immersive, on-demand learning experiences like popular apps, but learning experiences are often lacking.
- Mobile apps see much higher engagement than mobile web. Learning needs a mobile presence.
- Popular apps are social, entertainment, or utility focused. Learning does not feature highly.
- Data from 400+ companies shows mobile learners spend more time and are more engaged than web learners.
- Experience design should understand learner personas, map the learning journey, and define metrics for improvement.
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Jason Hong
This document summarizes a presentation on applying social psychology to cybersecurity. It discusses how over 40% of changes to cybersecurity behaviors had a social influence or dimension. Studies found that observing friends' security behaviors and social sensemaking around incidents increased likelihood of behavior changes. The presentation argues that cybersecurity research could benefit from incorporating more social and behavioral theories to help encourage widespread adoption of better security practices. It provides examples of work analyzing how social influences impact security feature adoption on Facebook.
Effectively aligning m-Government strategies to your organisational objective...Reading Room
* Capturing your organisational objectives and goals as they apply to mobile strategy
* Exploring different methodologies and approaches to public engagement, including social media, crowdsourcing and ramification
* Developing mobile web applications and native apps based on research and underpinned by public feedback
This document summarizes a webinar about using mobile apps to enhance events. The webinar covered trends in mobile adoption like the growth of smartphones and apps. It discussed how events can use mobile apps to engage attendees through the event and year-round. The webinar predicted that mobile apps will improve events by enabling seamless integration, historical e-portfolios, leveraging networks, detailed sponsor data, and more interactive features like check-ins, surveys, and notes. Attendees were told they could receive continuing education credit and find resources on the Meetings Focus webinar club page.
1. The document proposes the WatchDawgs app to address rising criminal activity, especially sexual assault, and delayed crime reporting at the University of Washington.
2. The app would allow students to report criminal activity in real time and monitor recent crime activity on a map. It would also provide safety resources and a way to contact campus police.
3. The goals are to have one in four new students download the app, improve crime reporting, and ultimately reduce criminal activity on campus by 15% through increased awareness, reporting, and collaboration between students and police.
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...DMI
This document provides an overview of mobile marketing presented by Magnus Jern, CEO of Golden Gekko. Key points include:
- Mobile usage exceeds print and radio and will surpass desktop web by 2015, but mobile advertising spend still lags behind time spent on mobile.
- Both apps and mobile web have strengths - apps drive ongoing engagement but mobile web reaches more users. A mobile-first approach is important.
- Creating a great mobile solution requires identifying a clear key use case, relevant content, and factors like utility and entertainment to drive engagement.
- Successful mobile marketing requires testing ideas, monitoring key metrics, and continually improving based on data and user feedback.
This document provides information about Digital Vision, an initiative by Oxfam to support the adoption of digital technologies within its programs. It lists the aims of Digital Vision such as embedding digital approaches, sharing learning, and prioritizing inclusion. It also discusses some of the opportunities and risks of using digital tools, including faster communication but also challenges around exclusion and data security. The document emphasizes that digital should complement rather than replace existing work and that women's rights should be central.
Digital Research in Low-Resource CountriesQualtrics
When you’re doing research in areas with no internet, collecting and analysing the data could be a pain. Lando and David from Health Focus spoke at Qualtrics Converge Europe about how they’re collecting data using the offline app in order to avoid the costly and time-consuming research often needed in low-resource countries.
Transforming Web Business to a Mobile Business - Presentation by Sirish KosarajuRapidValue
How to transform your web business to mobile business. A presentation by Sirish Kosaraju, Co-Founder & COO at RapidValue Solutions. This presentations address the following topics:
1. Why Mobile?
2. How is Mobile Different from Web?
3. Technology Considerations when moving to Mobile
4. Business Considerations when moving to Mobile
5. Summary
UNICEF Digital Strategy | Mobile Social Trends for 2015Jim Rosenberg
Global Digital Trends for 2015
and UNICEF’s Digital Strategy
presented at Dialogkonferansen 2014, Strømstad Sweden @JimRosenberg
Other modern technologies at age 20; imagine how far we’ll go with the consumer-facing internet.
Social media is your embassy; a good website is your home country.
Steady, consistent content is essential to engagement.
Owned content > Facebook’s algorithms.
The big picture is comprised of many, many details.
The perfect tweet or flawless video takes time, effort, and money.
People are your greatest asset – your own colleagues, as well as the people you serve.
“People want to be a part of something bigger than themselves.” #H2H by @BryanKramer
If your clients sense you’re open and engaged, they’ll be that way, too. Same goes for your staff.
Principles for Digital Strategy at UNICEF
Digital enables transparency and accountability.
To the online audience, we are one UNICEF with many facets.
We work in a multilingual world. Our content and engagement must reflect that.
Content and engagement efforts should include people with low- or no- internet connectivity.
All products and services should be mobile-first and multiplatform.
Our product approach is agile.
Open standards are at the heart of what we do.
We’ll measure and test our efforts, using data to inform content and engagement choices.
Conversations > Campaigns.
Global frame, local action. Take a global message that national markets/teams can adapt. Messages and calls to action should be easily tailored and localized by language, country.
Have one integrated editorial calendar. Media, marketing, web, social, offline, visuals.
Team: balance all-rounders with deep expertise.
Do fewer things better.
Find the storyteller in the elevator.
2018.07.10 MyGov citizen centric service. Université de l'innovation publique...MiquelEstape
This document discusses developing citizen-centric government services. It notes that governments now hold large amounts of citizen data but don't use it effectively. New generations expect more customized, proactive, and trustworthy digital services. The "MyGov" initiative aims to provide such services by analyzing citizens' data and needs, co-designing solutions, and validating prototypes with users. The proposed "MyGov Social" mobile app would use data science to send customized recommendations and notifications to citizens about benefits and status updates, empowering citizens and saving them time while improving government efficiency. The goal is to make citizens' lives easier by building trust and putting their needs first in service design.
The Objective of the Industry Report was :-
To increase the overall knowledge base about the Social and Digital Media Industry.
To understand the strategies adopted by the companies to increase their presence and revenue as a whole.
We have crossed the Rubicon on mobile, and there is no going back. Consumers now spend 51% of their media time – including 40 minutes of video – on mobile devices each day.
And yet, confusion continues to swirl around what buyers can do – at scale – to reach their target audiences on their mobile devices with native, video and location-targeted brand marketing.
How do you put our collective obsession with all things mobile and video to work for your campaigns?
On Thursday, Nov. 12th, guest speaker, Forrester Research’s Jennifer Wise, Rubicon Project’s Joe Prusz, and Adelphic’s Emily Del Greco discussed what’s next in automating mobile advertising and more.
A non-technical introduction to mobile analytics. Learn how it managed, analyzed, and how it drives business and product decisions.
This presentation focuses on in-app-analytics.
Important aspects it covers:
1. The tool covers Flurry for in-app-analytics: active users, retention, events, funnels, segments, user acquisition
2. It introduces App Annie for sales analytics
3. Case studies from Cammy and Skater
This document outlines a mobile strategy for a company. It discusses the growing mobile landscape and the importance of mobile as a data source. Mobile usage exceeds TV and Earth's population. The document reviews mobile trends in different countries and how people use mobile devices throughout the day. It emphasizes using mobile data to better understand consumers and personalize experiences. Examples are given of how other companies in FMCG categories are using mobile for CRM programs, augmented reality, and connecting offline and online. The overall goal is to increase awareness, engagement, and revenues by optimizing the company's mobile strategy.
UiPath Automation Developer Associate Training Series 2025 - Session 4DianaGray10
Please join us for session 4 of the Developer Associate series, where we will cover selectors in Studio and PDF Automation in Studio.
Topics covered:
Selectors in Studio
PDF Automation with Studio
Required self-paced training to be completed for this session:
Selectors in Studio Deep Dive - 2 modules - 1h 30m - https://academy.uipath.com/courses/selectors-in-studio-deep-dive
PDF Automation with Studio - 2 modules - 1h 15m - https:/academy.uipath.com/courses/pdf-automation-in-studio
⁉️ For any questions you may have, please use the dedicated Forum thread. You can tag the hosts and mentors directly and they will reply as soon as possible.
Data Intelligence Platform Transforming Data into Actionable Insights.pptxLisa Gerard
In today’s data-driven world, a Data Intelligence Platform plays a crucial role in empowering organizations to make informed, strategic decisions. By leveraging advanced analytics, seamless data integration, and robust governance, businesses can transform vast amounts of data into actionable insights.
Exploring ScyllaDB’s DynamoDB-Compatible API by Guilherme Nogueira & Nadav Ha...ScyllaDB
In this talk we inspect how ScyllaDB implemented Alternator, the DynamoDB-compatible API. We review internal table structure, load balancing and deployment characteristics. We also inspect an existing workload in DynamoDB and compare it running on Scylla Cloud as a DBaaS. Aspects include performance, cost, feature comparison with DynamoDB.
Spin Glass Models of Neural Networks: The Curie-Weiss Model from Statistical ...Charles Martin
The Curie–Weiss Model is a classic from physics that is foundational to understanding the statistical mechanics approach to the theory of neural networks. And, in particular, to the theory behind weightwatcher. In this deck, I present:
• Core Mathematical Techniques: Explore the mean-field theory and the saddle-point approximation (SPA) in the large-N limit, which provide a clear derivation of the phase diagram.
• Simple Phase Behavior: See how the model predicts a phase transition—from a disordered paramagnetic state to an ordered ferromagnetic state—which parallels the behavior observed in neural network training.
• Bridging to Modern Theory: The math here is also essential for understanding the theoretical backbone behind Weightwatcher SETOL theory. Both introduce critical techniques that help explain and predict phase behavior in modern deep learning architectures.
Whether you’re a physicist or an ML practitioner, these insights offer a deeper look at how classical models inform today’s neural network theory.
Scaling distributed systems introduces massive complexity. This talk builds a clear mental model of concurrency, key challenges like consistency vs. availability, and essential techniques like partitioning and replication—helping you design and scale systems with confidence.
Migrating 50TB Data From a Home-Grown Database to ScyllaDB, Fast by Terence LiuScyllaDB
Terence share how Clearview AI's infra needs evolved and why they chose ScyllaDB after first-principles research. From fast ingestion to production queries, the talk explores their journey with Rust, embedded DB readers, and the ScyllaDB Rust driver—plus config tips for bulk ingestion and achieving data parity.
Ensuring AI Trust and Transparency with Inclusive Design Ted Drake
Trauma-informed design (TID) principles were established in architecture and service design with an emphasis on providing safe spaces for those who have suffered trauma. More recently, TID has been adopted within digital design of web and mobile applications. The core principles of TID also lead to usable design that respects the user’s privacy, security, and trust.
How Yieldmo Cut Database Costs and Cloud Dependencies Fast by Todd ColemanScyllaDB
Yieldmo processes hundreds of billions of ad requests daily with subsecond latency. Initially using DynamoDB for its simplicity and stability, they faced rising costs, suboptimal latencies, and cloud provider lock-in. This session explores their journey to ScyllaDB’s DynamoDB-compatible API.
Rapid Microbiological Methods in the Pharmaceutical Industry3rania3rania33
Rapid Microbiological Methods in
the Pharmaceutical Industry.
RRMs
The conventional microbiological methods used are limited by the time it takes to grow the
microorganism under the specifed test conditions. These methods have traditionally required
days until the results are obtained.
We want methods that are: Faster > More Sensitive > Lower Price > Higher Throughput > More
Specific > New Targets
The new methodsmany advantages, including shorter processing times, improved accuracy,
enhanced limits of detection, and other key attributes associated with the method.
TYPES OF NEW TECHNOLOGIES—RAPID MICROBIOLOGICAL METHODS:
Growth-based methods
Viability-based methods
Cellular component or artifact-based technologies
Nucleic acid-based
Spectroscopic methods
There isn’t only one way to be a great technical leader.
To be a great technical leader you need to play to your strengths.
This talk explains why, shows you how to use the People, Process, Technology framework to identify your strengths, covers how using your strengths is best way to do your most important job, which is delivering business outcomes.
Extreme Elasticity with Tablets, Raft and Kubernetes by Maciej ZimnochScyllaDB
Recent ScyllaDB versions have improved elasticity using Tablets and Raft-based Consistent Topology Changes, allowing for fast bootstrapping and parallel scaling. A demo presents doubling cluster size and autoscaling after crossing 90% disk utilization.
Webinar - Zilliz Cloud Monthly Demo - March 2025Zilliz
Join our monthly demo for a technical overview of Zilliz Cloud, a highly scalable and performant vector database service for AI applications
Topics covered
- Zilliz Cloud's scalable architecture
- Key features of the developer-friendly UI
- Security best practices and data privacy
- Highlights from recent product releases
- This webinar is an excellent opportunity for developers to learn about Zilliz Cloud's capabilities and how it can support their AI projects. Register now to join our community and stay up-to-date with the latest vector database technology.
UiPath Automation Developer Associate Training Series 2025 - Session 3DianaGray10
In session 3, we will cover User Interface (UI) Automation for Studio.
Required self-paced training for this lesson is:
User Interface (UI) Automation with Modern Design in Studio 2 modules - 3h - https:/academy.uipath.com/courses/user-interface-ui-automation-with-modern-design-in-studio
UI Automation Synchronization with Studio - 2 modules - 1 h 30 m - https://academy.uipath.com/courses/ui-automation-synchronization-with-studio
UI Automation Descriptors in Studio - 2 modules - 2h - https:/academy.uipath.com/courses/ui-automation-descriptors-in-studio
⁉️ For any questions you may have, please use the dedicated Forum thread. You can tag the hosts and mentors directly and they will reply as soon as possible.
Surviving Majority Loss: When a Leader Fails by Konstantin OsipovScyllaDB
In this lightning talk I will present all common combinations of ScyllaDB deployments, single and multi-DC, and how well they play out with Raft based topology management. I'll present ScyllaDB's 2024.2 new feature, zero token nodes, and discuss how they could be used to improve resilience to failure in complex deployments. Another nice feature, which we call "Dynamic voter selection" which is currently available in scylladb.git and our nightly builds helps reduce the load of Raft on large clusters and dynamically adjust Raft to node starts and stops, always maintaining maximal Raft availability.
The Most Important Tech Innovations of 2024Arif Efendi
Connective technology is a realm where technological advancements are having a game-changing impact, such as reconfigurable intelligent surfaces that optimise wireless communications links. In addition, high-altitude platform station systems are posing the potential for new levels of communication and observation capabilities.
Teams Call Records: Treasure Trove or Pandora’s Box?panagenda
Webinar Recording: https://www.panagenda.com/webinars/teams-call-records-treasure-trove-or-pandoras-box/
Are Microsoft Teams call records, provided via the Graph API, an undiscovered treasure trove of data to be used for improving your users Teams call experience or a Pandora’s box that no one should open due to the complexity of the data it contains?
Join us for an exclusive webinar where we dive deep into the journey of Microsoft call telemetry data. From its creation and upload, to processing, and making it available to customers. Discover how data privacy settings and other factors influence the output, and learn about key differences like how guest users and external users are handled in meetings.
Stefan will guide you through the structure of Microsoft call records and provide expert insights on how to interpret this valuable data. Don’t miss this opportunity to enhance your understanding and make the most of your call records data!
What you will take away
- Learn what data is available in the Microsoft call records and how to access it
- Insights into the scope of available call telemetry
- Understanding of the value and limitations of the available data (privacy settings & possible GDPR restrictions)
- Understand how data differs where external & guest users are involved
- Understand the impact of factors like location, policies and settings on the availability of the data
Bridging the Gap from Telco to Techco with Agile ArchitectureBATbern
The Telco industry is undergoing a major IT transformation, shifting from Telco to Techco. This shift is driven by a breakneck pace of technological change that traditional architectures simply cannot keep up with. In my presentation, I will explore the profound impact of digitization on Telco architecture. Using examples from Swisscom's Network Division, I will show why Agile Architecture is crucial for cutting complexity, accelerating time-to-market, and sparking innovation within the organization. This approach isn't just strategic; it's vital for the future success of our industry. Join me to uncover how Swisscom is navigating this transformation and what lessons can be applied to your organization.
#4: Lin et al, Expectation and Purpose: Understanding User’s Mental Models of Mobile App Privacy thru Crowdsourcing. Ubicomp 2012.
http://www.cmuchimps.org/publications/expectation_and_purpose_understanding_users_mental_models_of_mobile_app_privacy_through_crowdsourcing_2012/pub_download
#5: Moto Racing / https://play.google.com/store/apps/details?id=com.motogames.supermoto
#15: On the left is Nissan Maxima gear shift. It turns out my brother was driving in 3rd gear for over a year before I pointed out to him that 3 and D are separate. The older Nissan Maxima gear shift on the right makes it hard to make this mistake.
#18: Lin et al, Modeling Users’ Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. SOUPS 2014.
INTERNET, READ_PHONE_STATES, ACCESS_COARSE_LOCATION, ACCESS_FINE_LOCATION, CAMERA, GET_ACCOUNTS, SEND_SMS, READ_SMS, RECORD_AUDIO, BLUE_TOOTH and READ_CONTACT
#26: The draw of the crowd is devilishly strong
There have been studies demonstrating that if you have lots of people looking up, pretty much every passerby will too
#28: http://www.carlsonschool.umn.edu/assets/118359.pdf
Baseline environmental message was 35%
#33: Das, S., A. Kramer, L. Dabbish, J.I. Hong. Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation. In The 21st ACM Conference on Computer and Communications Security (CCS 2014). 2014. [19.5% accept rate]http://www.cmuchimps.org/publications/increasing_security_sensitivity_with_social_proof_a_large_scale_experimental_confirmation_2014
#35: Results more subtle than presented in this table, see the CCS 2014 paper for details.
The basics are there though, that social conditions worked better than control in almost every case