63 subscribers
با برنامه Player FM !
Context Enabled Computing
Manage episode 161344181 series 1264075
The most precious resource people have in today’s ever-connected world is their attention. Human interaction with information systems has continually shrunk from hours behind a terminal, to minutes interacting with a cell phone screen, to only 3–5 seconds glancing at a smart watch or wearable device. The key to making information immediately understood and actionable in the era of glance-able interaction is understanding context and, eventually, user intent. People inherently understand context. They naturally apply the context of a situation or conversation during everyday activities. Information systems, on the other hand, apply a user’s context to the task at hand in very different ways. To improve the way that information systems use context, our research has focused on individual and group context supporting dismounted soldiers and first responders operating in edge environments. The goal of our research in context-enabled computing is to ensure that the right information is delivered to the right individual at the right time to ensure mission success. In this webinar, we will cover a wide variety of research activities associated with our efforts to better leverage context for information delivery and sensor tasking.
167 قسمت
Manage episode 161344181 series 1264075
The most precious resource people have in today’s ever-connected world is their attention. Human interaction with information systems has continually shrunk from hours behind a terminal, to minutes interacting with a cell phone screen, to only 3–5 seconds glancing at a smart watch or wearable device. The key to making information immediately understood and actionable in the era of glance-able interaction is understanding context and, eventually, user intent. People inherently understand context. They naturally apply the context of a situation or conversation during everyday activities. Information systems, on the other hand, apply a user’s context to the task at hand in very different ways. To improve the way that information systems use context, our research has focused on individual and group context supporting dismounted soldiers and first responders operating in edge environments. The goal of our research in context-enabled computing is to ensure that the right information is delivered to the right individual at the right time to ensure mission success. In this webinar, we will cover a wide variety of research activities associated with our efforts to better leverage context for information delivery and sensor tasking.
167 قسمت
همه قسمت ها
×
1 DevSecOps: See, Use, Succeed 1:00:41

1 An Introduction to the MLOps Tool Evaluation Rubric 1:00:23



1 A New Performance Zone for Software for National Security 1:02:23









1 Independent Verification and Validation for Agile Projects 1:02:23

1 Generative AI and Software Engineering Education 1:02:05


1 Using a Scenario to Reason About Implementing a Zero Trust Strategy 1:02:22


1 The Future of Software Engineering and Acquisition with Generative AI 1:32:10


1 Ask Us Anything: Generative AI Edition 1:30:37

1 Evaluating Trustworthiness of AI Systems 1:02:08

1 Leveraging Software Bill of Materials Practices for Risk Reduction 1:02:03



1 Top 5 Challenges to Overcome on Your DevSecOps Journey 1:00:36

1 Improving Analytics Using Enriched Network Flow Data 1:02:25

1 How Can Data Science Solve Cybersecurity Challenges? 1:00:01

1 AI Next Generation Architecture 1:01:44

1 Addressing Supply Chain Risk and Resilience for Software-Reliant Systems 1:01:31


1 Finding Your Way with Software Engineering Buzzwords 1:01:38




1 Exploring an AI Engineering Body of Knowledge 1:02:21

1 What are Deepfakes, and How Can We Detect Them? 1:00:00

1 Adapting Agile and DevSecOps to Improve Non-Software Development Teams 1:03:07


1 Ask Us Anything: Zero Trust Edition 1:02:27





1 The Future of AI: Scaling AI Through AI Engineering 1:01:59

1 AI Engineering: Ask Us Anything About Building AI Better 1:04:47

1 Balanced Approaches to Insider Risk Management 1:00:53

1 Software Development Open Forum: Ask Hasan Anything! 1:03:02

1 Software Supply Chain Concerns for DevSecOps Programs 1:03:47

1 How Do We Teach Cybersecurity? 1:00:17

1 Software Supply Chain Concerns for DevSecOps Programs 1:01:06

1 Announcing IEEE 2675 DevOps Standard to Build Reliable and Secure Systems 1:03:29

1 AI Engineering: The National Initiative for Human-Centered, Robust and Secure, and Scalable AI 1:02:20

1 Amplifying Your Privacy Program: Strategies for Success 1:01:06
به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.