the digital deluge lecture 5 learning in retirement david coll professor emeritus department of...

42
The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

Upload: hillary-barrett

Post on 26-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

The Digital DelugeLecture 5

Learning in RetirementDavid Coll

Professor EmeritusDepartment of Systems and Computer

Engineering

Winter 2009

Page 2: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

The Youth Ball Welcomes Obama with a Sea of Digital CamerasJanuary 22, 2009

Page 3: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

The World is Aware

• International Herald Tribune, May 30, 2005International Herald Tribune, May 30, 2005– Facing a digital worldFacing a digital world– Famous makers from yesteryear run to catch upFamous makers from yesteryear run to catch up

• The New York Times, July 28, 1990The New York Times, July 28, 1990– CONSUMER'S WORLD: Coping With Digital Audio CONSUMER'S WORLD: Coping With Digital Audio

Tape Tape • Forbes.com: Tales From The Marketing WarsForbes.com: Tales From The Marketing Wars

Coping In A Changing World, March 16, 2007Coping In A Changing World, March 16, 2007– A recent article caught my attention. A recent article caught my attention. – It was entitled "Kodak takes Hit in Film and Digital." It was entitled "Kodak takes Hit in Film and Digital." – It discussed, in some detail, how analysts had begun It discussed, in some detail, how analysts had begun

to question just what future the firm that has been to question just what future the firm that has been synonymous with film and pictures might have in the synonymous with film and pictures might have in the consumer photography market. consumer photography market.

Page 4: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Justin Thorpe’s Web 2.0 BlogTheater: “This Digital Life: Basic Instructions for Coping with the 21st Century”, July 21, 2007

• “I wasn’t really sure what to expect when my friend Joseph Price invited me to a play he wrote, “This Digital Life: Basic Instructions for Coping with the 21st Century.” I had a hard time imagining a play about technology.

• The description is as follows:• Sometimes, late at night, do you Google yourself?

Have you ever sent yourself an email from the future? Three short plays explore life, death, and infamy in the age of Second Life and Wikipedia.”

Page 5: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Praning’s Shoutrout, September 29, 2008

• I am still learning how to do things in digital way; like digital scrapping and slide shows.

• Good thing, I found this site, Roxio Extreme Digital Makeover, which is primarily set up to help people, like me, ease the burden in making digital presentations, which can be time consuming for beginners.

• I watched a video, the Wedding Day Crunch, to see a sample of their work and it’s really amazing how they made simple photographs of a couple, who’s planning to get married soon, turn into an interesting slide show that the couple will present on their wedding day.

Page 6: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

Coping when everything is digital? Digital Documents and Issues in Document Retention, 2004 - 68 page “white paper”

• Will you cope when everything is digital?Will you cope when everything is digital?• Recent legal and business developments mean Recent legal and business developments mean

renewed attention is being directed into renewed attention is being directed into corporate computer systems in Australia, the corporate computer systems in Australia, the US and around the world. Questions such as US and around the world. Questions such as the following are becoming common:the following are becoming common:– How can digital documents be used, and when How can digital documents be used, and when

can they be destroyed?can they be destroyed?– What happens if you ignore them after they are What happens if you ignore them after they are

no longer ’useful’?no longer ’useful’?– Will you be able to rely on them when you need Will you be able to rely on them when you need

them?them?– In a court case, could you prove they mean what In a court case, could you prove they mean what

they say? they say?

Page 7: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

AIIM Association for Information and Image Management.

• AIIM is the ECM community that provides AIIM is the ECM community that provides education, research, and best practices to education, research, and best practices to help organizations find, control, and help organizations find, control, and optimize their information.optimize their information.

• Few in the information industries would Few in the information industries would contest the forehead-slappingly obvious contest the forehead-slappingly obvious observation that the operational tempo of observation that the operational tempo of work has picked up. work has picked up.

• Nor would anyone contest the statement Nor would anyone contest the statement that we are now expected to observe, that we are now expected to observe, orient, decide, and act upon a global, 24-7, orient, decide, and act upon a global, 24-7, non-stop flow of information. non-stop flow of information.

Page 8: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• It is not “news” that Society demands more It is not “news” that Society demands more information and more information information and more information processing. processing.

• Like it or not, we live in a world where real-Like it or not, we live in a world where real-time analysis and response is expected. time analysis and response is expected. This is the hyper-connected “This is the hyper-connected “infocosminfocosm.”.”

• What do we do about all this “always-on-What do we do about all this “always-on-ness”? ness”?

• Evolutionary psychologists, cognitive Evolutionary psychologists, cognitive scientists, and no less a behavioral scientists, and no less a behavioral authority than our mothers tell us that we authority than our mothers tell us that we humans were not designed to run round-humans were not designed to run round-the-clock. the-clock.

Page 9: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• How you choose to cope with the design How you choose to cope with the design disconnect between the seasonal and disconnect between the seasonal and diurnal savannah which shaped us and the diurnal savannah which shaped us and the ubiquitously connected, Internet-powered, ubiquitously connected, Internet-powered, wi-fi-tethered infocosm which currently wi-fi-tethered infocosm which currently surrounds us will impact your career and surrounds us will impact your career and your health.your health.

Page 10: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

The Digital DelusionalsThe Digital Delusionals • These folks actually think they can use hand-held These folks actually think they can use hand-held

devices to keep up. devices to keep up. • IDC defines a “hyperconnected” user as someone IDC defines a “hyperconnected” user as someone

whowho– uses at least seven communication devices (landline uses at least seven communication devices (landline

phone, cell phone, PC, etc.) and nine communication phone, cell phone, PC, etc.) and nine communication applications (IM, Web conferencing, social networks, applications (IM, Web conferencing, social networks, etc.). etc.).

– Some 16 percent of workers surveyed fall into IDC’s Some 16 percent of workers surveyed fall into IDC’s definition of hyper-connected. Within five years, IDC definition of hyper-connected. Within five years, IDC predicts that 40 percent of workers will be hyper-predicts that 40 percent of workers will be hyper-connected. connected.

• This group should not be confused with the “thumb This group should not be confused with the “thumb tribe” of young Japanese whose social life revolves tribe” of young Japanese whose social life revolves around and identity is defined by their use of around and identity is defined by their use of technology. technology.

Page 11: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

The WebEmersonians.The WebEmersonians.

• When asked to sum up his work, Ralph Waldo When asked to sum up his work, Ralph Waldo Emerson said his central doctrine was “the Emerson said his central doctrine was “the infinitude of the private man.”infinitude of the private man.”

• Admirable in their intentions, this self-reliant but Admirable in their intentions, this self-reliant but tragically wrong-headed group of hard workers tragically wrong-headed group of hard workers believes they can keep up assisted by Web believes they can keep up assisted by Web resources. resources.

• These are the folks who populate the landing These are the folks who populate the landing pages of the very sizable “how to” category of the pages of the very sizable “how to” category of the Web. Web.

• They believe they can; via brute force, sleep They believe they can; via brute force, sleep deprivation, and a mastery of search; learn what deprivation, and a mastery of search; learn what they need to know and do what they need to do. they need to know and do what they need to do.

Page 12: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

The Delegationals The Delegationals • They know that there is way too much work and They know that there is way too much work and

information for any one human to manage. information for any one human to manage. • It takes a village to survive the requirements of the It takes a village to survive the requirements of the

infocosm. Such “villages” typically comprise the infocosm. Such “villages” typically comprise the headman, a direct report or two, several headman, a direct report or two, several contractors, and a relatively new arrival to the contractors, and a relatively new arrival to the workspace - the virtual assistant. workspace - the virtual assistant.

• These resources - accessible via the Web - bid to These resources - accessible via the Web - bid to do your bidding.do your bidding.

• You might connect toYou might connect to– DoMyStuff.com, TasksEveryday.com, DoMyStuff.com, TasksEveryday.com,

VirtualAssistants. comVirtualAssistants. com

– International Virtual Assistants Association, International Virtual Assistants Association, Virtual Market Support, and/ or Executive Virtual Market Support, and/ or Executive Secretarial Services. Secretarial Services.

Page 13: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

The Cyber- Sailors The Cyber- Sailors

• These folks are defined by acceptance; These folks are defined by acceptance; believing that in today’s world, as believing that in today’s world, as individuals we are largely powerless. individuals we are largely powerless.

• These folks are convinced that the outside These folks are convinced that the outside world will continue to turn without their world will continue to turn without their constant attention.constant attention.

• According to one blogger, the mantra of the According to one blogger, the mantra of the cyber-sailors is: “We accept that we can’t cyber-sailors is: “We accept that we can’t change the wind but can adjust the sails.” change the wind but can adjust the sails.”

Page 14: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

The Boundarials. The Boundarials.

• This group aggressively manages “work-life This group aggressively manages “work-life balance” refusing to neglect other important balance” refusing to neglect other important area of their lives such as family, friends, area of their lives such as family, friends, and hobbies in favor of work-related chores and hobbies in favor of work-related chores and goals. and goals.

• They pre-announce their “rules-of-They pre-announce their “rules-of-workplace-engagement” to colleagues and workplace-engagement” to colleagues and bosses. bosses.

Page 15: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

The Neo-Utopians. The Neo-Utopians.

• William Gibson, author of Neuromancer, William Gibson, author of Neuromancer, once commentedonce commented

• ““One of the things our grandchildren will One of the things our grandchildren will find quaintest about us is that we find quaintest about us is that we distinguish the digital from the real, the distinguish the digital from the real, the virtual from the real. virtual from the real.

• In the future, that will become literally In the future, that will become literally impossible. The distinction between impossible. The distinction between cyberspace and that which isn’t cyberspace cyberspace and that which isn’t cyberspace is going to be unimaginable.” is going to be unimaginable.”

Page 16: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• ““Neo-Utopians … believe that the current Neo-Utopians … believe that the current disconnect between human design specs disconnect between human design specs and the world of work we live in todayand the world of work we live in today– which was to a very large extent precipitated by which was to a very large extent precipitated by

the rapid evolution of technology [as opposed to the rapid evolution of technology [as opposed to the slower evolution of humanity], the slower evolution of humanity],

• will right itself through several mechanismswill right itself through several mechanisms– massive automation of time-consuming low-end massive automation of time-consuming low-end

taskstasks– intensified focus on strategic tasks [Things That intensified focus on strategic tasks [Things That

Matter]Matter]– extended life spans [we will have more time to extended life spans [we will have more time to

do what we need to do]do what we need to do]– and personal robots. and personal robots.

Page 17: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

[email protected]; [email protected]; http://billstarnaud.blogspot.com/ or http://green-broadband.blogspot.com/

• How Web 2.0 tools are transforming How Web 2.0 tools are transforming science. science.

• The 2 projects mentioned have been The 2 projects mentioned have been funded by CANARIE in the latest NEP funded by CANARIE in the latest NEP program amongst a total of 11 similar program amongst a total of 11 similar projects .  projects . 

• For more examples of how web 2.0 is For more examples of how web 2.0 is revolutionizing science please see my revolutionizing science please see my Citizen Science Blog. Citizen Science Blog.

Page 18: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

Oceans 2.0

• Described as an extension of the internet under the ocean, the Venus Coastal Observatory off Canada's west coast provides oceanographers with a continuous stream of undersea data once accessible only through costly marine expeditions. When its sister facility Neptune Canada launches next summer, the observatories' eight nodes will provide ocean scientists with an unprecedented wealth of information.

Page 19: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Sifting through all that data, however, can be quite a task. So the observatories, with the help of CANARIE Inc., operator of Canada's advanced research network, are developing a set of tools they call Oceans 2.0 to simplify access to the data and help researchers work with it in new ways. Some of their ideas look a lot like such popular consumer websites as Facebook, Flickr, Wikipedia and Digg.

Page 20: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• And they're not alone. This set of online interaction technologies called Web 2.0 is finding its way into the scientific community.

• Michael Nielsen, a Waterloo, Ont., physicist who is working on a book on the future of science, says online tools could change science to an extent that hasn't happened since the late 17th century, when scientists started publishing their research in scientific journals.

Page 21: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• One way to manage the data boom will involve tagging data, much as users of websites like Flickr tag images or readers of blogs and web pages can "Digg" articles they approve.

• On Oceans 2.0, researchers might attach tags to images or video streams from undersea cameras, identifying sightings of little-known organisms or examples of rare phenomena.

Page 22: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• The Canadian Space Science Data Portal (CSSDP), based at the University of Alberta, is also working on online collaboration tools. Robert Rankin, a University of Alberta physics professor and CSSDP principal investigator, foresees scientists attaching tags to specific data items containing occurrences of a particular process or phenomenon in which researchers are interested.

Page 23: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• "You've essentially got a database that has been developed using this tagging process," he says.

• If data tagging is analogous to Flickr or Digg, other initiatives look a bit like Facebook.

Page 24: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Pirenne envisions Oceans 2.0 including a Facebook-like social networking site where researchers could create profiles showing what sort of work they do and what expertise they have.

• When a scientist is working on a project and needs specific expertise — experience in data mining and statistical analysis of oceanographic data, for example — he or she could turn to this facility to find likely collaborators.

Page 25: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

Coping

• There are a number of ways of coping There are a number of ways of coping with the Digital Delugewith the Digital Deluge

• Increasing your information processing Increasing your information processing capacitycapacity

– AcquiringAcquiring– ProcessingProcessing– StorageStorage– CommunicatingCommunicating

Page 26: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

Coping

• Decreasing the actual amount of information that must be stored.

• More powerful compression algorithms• Avoiding unnecessary replication

Page 27: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

Acquiring

• Improved Technology - Machines and Procedures– Faster– More Comprehensive– More Observant, Intuitive

• Search Engines• Subscription Services• User Profilers• Subject Observers• Observation/Seeking Strategies

Page 28: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

Processing

• Representation– Efficient Sampling– Compression– Uniform representation: an analytical concept,

referring to a process which allows information from several realms or disciplines to be displayed and worked with as if it came from the same realm or discipline. The term is also applied when taking information from a number of sources, which may have used different methodologies and metrics in their data collection, and building a single large collection of information, where some records may be more complete than others across all fields of data.

Page 29: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Curation• “Digital curation is the curation, preservation, maintenance,

and collection and archiving of digital assets.• Digital curation is the process of establishing and developing

long term repositories of digital assets for current and future reference[1by researchers, scientists, and historians, and scholars generally.” http://en.wikipedia.org/wiki/Digital_curation

Page 30: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

Analysis• Data Mining: “the process of extracting hidden

patterns from data”. • As more data is gathered, with the amount of data

doubling every three years, data mining is becoming an increasingly important tool to transform this data into knowledge.

• It is commonly used in a wide range of applications, such as marketing, fraud detection and scientific discovery.

• Data mining can be applied to data sets of any size, and while it can be used to uncover hidden patterns, it cannot uncover patterns which are not already present in the data set.”

– http://en.wikipedia.org/wiki/Data_mining

Page 31: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Data mining is the process of extracting hidden patterns from data.

• As more data is gathered, with the amount of data doubling every three years

• Data mining is becoming an increasingly important tool to transform this data into information.

• It is commonly used in a wide range of applications, such as marketing, fraud detection and scientific discovery.

Page 32: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Data mining is the process of using computing power to apply methodologies, including new techniques for knowledge discovery, to data.[

•  Data mining identifies trends within data that go beyond simple data analysis. Through the use of sophisticated algorithms, non-statistician users have the opportunity to identify key attributes of processes and target opportunities.

Page 33: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Data mining identifies trends within data that go beyond simple data analysis.

• Through the use of sophisticated algorithms, non-statistician users have the opportunity to identify key attributes of processes and target opportunities.

Page 34: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• For many years, businesses and governments have used increasingly powerful computers to sift through volumes of data such as airline passenger trip records, census data and supermarket scanner data to produce market research reports.

• Continuous innovations in computer processing power, disk storage, data capture technology, algorithms, methodologies and analysis software have dramatically increased the accuracy and usefulness of the extracted information.

Page 35: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• The term data mining is often used to apply to the two separate processes of knowledge discovery and prediction.

• Knowledge discovery provides explicit information about the characteristics of the collected data, using a number of techniques (e.g., association rule mining)

• Forecasting and predictive modeling provide predictions of future events, and the processes may range from the transparent (e.g., rule-based approaches) through to the opaque (e.g., neural networks).

Page 36: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Since the availability of affordable computer processing power in the last quarter of the 20th century, organizations have been accumulating vast and ever growing amounts of data, including, for example:– operational and transactional data

• such as sales, cost, inventory, payroll and accounting data

– nonoperational data• such as forecasts and macro economic data

– meta data• data about the data itself, such as logical

database design, data dictionary definitions, and executive summaries and scientific abstracts.

Page 37: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

Tasks

• Classification- Arranges the data into predefined groups. – For example an email program might attempt

to classify an email as legitimate or spam.

• Clustering - Is like classification but the groups are not predefined, so the algorithm will try to group similar items together.

Page 38: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Regression - Attempts to find a function which models the data with the least error.

• Association rule learning - Searches for relationships between variables. – For example a supermarket might gather

data of what each customer buys. Using association rule learning, the supermarket can work out what products are frequently bought together, which is useful for marketing purposes. This is sometimes referred to as "market basket analysis".

Page 39: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

Applications

• Combating terrorism• It has been suggested that both the Central

Intelligence Agency and the Canadian Security Intelligence Service have employed [data mining]

Page 40: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Previous data mining to stop terrorist programs under the U.S. government include

• the Total Information Awareness (TIA) program,

• Computer-Assisted Passenger Prescreening System (CAPPS II),

• Analysis, Dissemination, Visualization, Insight, Semantic Enhancement (ADVISE)

• Multistate Anti-Terrorism Information Exchange (MATRIX),

• and the Secure Flight program.

Page 41: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• These programs have been discontinued due to controversy over whether they violate the US Constitution's 4th amendment, although many programs that were formed under them continue to be funded by different organizations, or under different names, to this day.

Page 42: The Digital Deluge Lecture 5 Learning in Retirement David Coll Professor Emeritus Department of Systems and Computer Engineering Winter 2009

• Two plausible data mining techniques in the context of combatting terrorism include "pattern mining" and "subject-based data mining".

• An example of a probable application to national security monitoring would be the ability for government analysts to define a pattern of interest as "all individuals traveling from the United States to the Middle East in the next six months" and have the ADVISE tool provide an alert whenever this pattern emerges in the data.[7