Page 92 of 107

Verifying and Validating Machine Intelligence

presented by Andrew Moore

We’ve been build­ing autonomous vehi­cles for about twenty-five years, and now that the tech­nol­o­gy has become adopt­ed much more broad­ly and is on the brink of being deployed, our earnest fac­ul­ty who’ve been look­ing at it are now real­ly inter­est­ed in ques­tions like, a car sud­den­ly real­izes an emer­gency, an ani­mal has just jumped out at it. There’s going to be a crash in one sec­ond from now. Human ner­vous sys­tem can’t deal with that fast enough. What should the car do?

Transforming the Classroom with Ubiquitous Sensing

presented by Amy Ogan

Education has remained large­ly unchanged for mil­len­nia. In any class­room, you see a set of stu­dents gath­ered around a teacher who’s writ­ing on the board, or maybe now we’ve added a PowerPoint deck. But, as in many oth­er fields that have been slow to change, the data rev­o­lu­tion is com­ing for education. 

Making an Ethical Machine

presented by Alan Winfield

The idea of putting a robot sim­u­la­tor inside a robot, well, it’s not a new idea but it’s tricky and very few peo­ple have pulled it off. In fact, it takes a bit of get­ting your head round. The robot needs to have, inside itself, a sim­u­la­tion of itself and its envi­ron­ment, and oth­ers in its envi­ron­ment. And run­ning in real-time as well.

Cybersecurity in the Age of Always-Connected Sensors

presented by Anthony Rowe

We all see the ben­e­fits of active safe­ty sys­tems in cars. But that same safe­ty tech­nol­o­gy, if attacked, can actu­al­ly allow you to immo­bi­lize a vehi­cle or even dis­able breaks while driving.

Personal Privacy Assistants in the Age of the Internet of Things

presented by Lorrie Faith Cranor

Imagine your pri­va­cy assis­tant is a com­put­er pro­gram that’s run­ning on your smart­phone or your smart­watch. Your pri­va­cy assis­tant lis­tens for pri­va­cy poli­cies that are being broad­cast over a dig­i­tal stream. We are build­ing stan­dard for­mats for these pri­va­cy poli­cies so that all sen­sors will speak the same lan­guage that your per­son­al pri­va­cy assis­tant will be able to understand.

1983: A Blackened Window on the World

presented by Joël Vacheron

Rammellzee […] con­sid­ered graf­fi­ti as virus­es. And what he liked to do was to con­nect his pro­duc­tion to mil­i­tary lan­guage. He was say­ing that the graf­fi­ti artists were in a kind of sym­bol­ic cam­paign against the stan­dard­iza­tion of the alphabet.

The Internet of Damned Things

presented by Tobias Revell

We have to be aware that when you cre­ate mag­ic or occult things, when they go wrong they become hor­ror. Because we cre­ate tech­nolo­gies to soothe our cul­tur­al and social anx­i­eties, in a way. We cre­ate these things because we’re wor­ried about secu­ri­ty, we’re wor­ried about cli­mate change, we’re wor­ried about threat of ter­ror­ism. Whatever it is. And these devices pro­vide a kind of stop­gap for help­ing us feel safe or pro­tect­ed or whatever.

Working on ENIAC: The Lost Labors of the Information Age

presented by Mark Priestley, Thomas Haigh

The largest part of the ENIAC team by far were the peo­ple that were actu­ally build­ing the thing. And it’s inter­est­ing they’ve been for­got­ten by his­tory, because although their job titles were wire­men, tech­ni­cians, and assem­blers, being a busi­ness his­to­rian I looked up the account­ing records, and some­times they spell out the pay­roll. You sud­denly see all these women’s names like Ruth, Jane, Alice, Dorothy, Caroline, Eleanor show­ing up.

Lost in the Web – How to Navigate the Legal Maze and Protect Free Speech Online

presented by Nani Jansen

We all know that a lot of speech is mov­ing online these days, either by choice because it’s a cheap and acces­si­ble way of pub­lish­ing, or by neces­si­ty. At the same time we see an increase in attempts to con­trol free speech online, in what should actu­al­ly be a space in which infor­ma­tion can flow freely.

Page 92 of 107