The pervasiveness of data brings forward particular challenges.
Emerging themes: Devolving compute onto device.
Data preprocessing: Internet of Intelligence.
|compute||~10 gigaflops||~ 1000 teraflops?|
|communicate||~1 gigbit/s||~ 100 bit/s|
This phenomenon has already revolutionised biology.
Large scale data acquisition and distribution.
What does it mean for IoT
Fog computing: barrier between cloud and device blurring.
Stuxnet: Adversarial and Security implications for intelligent systems.
Complex feedback between algorithm and implementation
Paradoxes of the Data Society
Quantifying the Value of Data
Privacy, loss of control, marginalisation
Election polls (UK 2015 elections, EU referendum, US 2016 elections)
Clinical trials vs personalized medicine: Obtaining statistical power where interventions are subtle. e.g. social media
Modern Measurement deals with depth (many subjects) … or breadth lots of detail about subject.
Will summarization be devolved to the device?
Advantages for privacy and latency.
There’s a sea of data, but most of it is undrinkable
We require data-desalination before it can be consumed!
Three Bands of Data Readiness:
Band C - accessibility
Band B - validity
Band A - usability
Encourage greater interaction between application domains and data scientists
Encourage visualization of data
Incentivise the delivery of data.
Society is becoming harder to monitor
Individual is becoming easier to monitor
Marketing can become more sinister when the target of the marketing is well understood and the (digital) environment of the target is also so well controlled
Potential for explicit and implicit discrimination on the basis of race, religion, sexuality, health status
All prohibited under European law, but can pass unawares, or be implicit
Control of persona and ability to project
Need better technological solutions: trust and algorithms.
Major new challenge for systems designers.
Internet of Intelligence but currently:
They are componentwise built from ML Capabilities.
Each capability is independently constructed and verified.
Road line detection
Important for verification purposes.
Whole systems are being deployed.
But they change their environment.
The experience evolved adversarial behaviour.
There is a massive need for turn around and update
Early Example: Stuxnet.
Many solutions rely on education and awareness