Kelsey Gilmore-Innis's favorites

Favorite sessions for this user

* "R" You Ready for Some Football? Hacking Fantasy Sports with Open Source Software

You've probably heard about "robot jounalism" - computers writing finance and sports stories. Well, there's just one teensy little problem with robots writing finance and sports stories: investors and fantasy sports gamers don't want the data turned into text! They want their data raw, right and fast. They need clean, timely data to make objective decisions using tried-and-true statistical methodologies. So I'm not going to talk about robot journalism - I'm going to talk about fantasy sports: getting the data, analyzing it and using statistical decision-making tools to enhance the probability of winning.
M. Edward (Ed) Borasky

* Bringing Security to Your Open Source Project

With high profile breaches in open source projects, the issue of security has become one of great import to many people. But many projects, especially smaller ones, are intimidated by the idea of a security audit. This talk will discuss ways for smaller projects to experiment, learn, and even have fun improving their security. No PhDs in security required!
Terri Oda

* Building Diverse Social Networks

While only a handful of social networks like Dreamwidth and Quirell explicitly prioritize diversity, there are plenty of lessons to learn about what to do — and what not to do — from Facebook, Twitter, and others. Best practices include counter-oppressive politics, embedded in the community guidelines and norms; and the right tools, technologies, and policies. This session will look at what does and doesn't work in a variety of online environments.
Jon Pincus, Lynn Cyrin

* Calculating Guilt: Using open-source software in forensic DNA testing

DNA testing has become the "gold standard" of forensics, but linking an item of evidence to a person of interest isn't always clear cut. New open source tools allow DNA analysts to give statistical weight to evidentiary profiles that were previously unusable, letting juries weigh the evidence for themselves. This talk will discuss my lab's validation and implementation of the Lab Retriever software package for probabilistic genotyping.
Sarah Chenoweth

* Care and Feeding of a Healthy Job Hunt

A job hunt can be a demoralizing and dehumanizing process, but there are a lot of things which you can do to make it more productive and less stressful.
VM Brasseur

* Cassandra at the Keyboard: Whistleblowing at all scales

What do you do if you see something that needs change in your organization. How do you "say something" for your "see something"? What are the benefits and drawbacks of even minor whistleblowing?
Heidi Waterhouse

* Cat-herd's Crook: Enforcing Standards in 10 Programming Languages

At MongoDB we write open source database drivers in ten programming languages. Ideally, all behave the same. We also help developers in the MongoDB community replicate our libraries’ behavior in even more (and more exotic) languages. How can we herd these cats along the same track? For years we failed, but we’ve recently gained momentum on standardizing our libraries. Testable, machine-readable specs prove which code conforms and which does not.
Samantha Ritter, A. Jesse Jiryu Davis

* Catalyzing Diversity: Practical Advice for Navigating Minority STEM Communities to Open Up Open Source

How can Open Source Software projects attract minorities? Come to learn practical strategies to implement your diversity goals into actionable outreach efforts. We will describe ways to tap into minority STEM communities that exist both online and in meatspace. The former include Tweet chats and hashtags used by people of color who are enthusiasts of science (like #BLACKandSTEM) and tech (like #LATISM). The live events include annual conferences of minority students and professionals such as the Richard Tapia Celebration of Diversity in Computing.
Alberto Roca, Shauna Gordon-McKeon

* Community Moderation: you can't always halt a flamewar with one raised eyebrow (but it rarely hurts to try)

Even in an email list, moderation isn't limited to setting the entire email list to require approval before messages are posted. You can create rules which reflect the culture you'd like to see, and call attention to ways that the community differs from that culture. You can point out when a particular post doesn't fit with that culture -- publicly or privately, whichever you think will do the most good. You can point out when a particular post exemplifies something great about the culture. You can point out particular rules that everyone needs to keep abiding by, without calling out a specific post. If a specific person, or a specific handful of people, have trouble with the rules, you could put them in particular on moderated posting for some time. If someone keeps breaking the rules, that person is a good candidate for being removed entirely. There are limits to what the rest of the community and the moderators should have to deal with, even though your project may choose to keep that as a last resort. Sometimes the problem can be solved by redirection. If the main email list is getting cluttered with off-topic posts, consider a just-for-fun or off-topic side list to divert threads to once they wander off code and into sports, kittens, beer, or knitting. It's easier to say "You shouldn't do that here" than "You shouldn't do that, period"; it's even easier to say "You shouldn't do that here, but it would be great right over there." And most of us could use a sports, kittens, beer, or knitting break every now and then.
Azure Lunatic

* Consequences of an Insightful Algorithm

We have ethical responsibilities when coding. We're able to extract remarkably precise intuitions about an individual. But do we have a right to know what they didn't consent to share, even when they willingly shared the data that leads us there? How do we mitigate against unintended outcomes? In this talk, we'll learn how to build in systematic empathy, integrate practices for examining how our code might harm individuals, and net consequences that can be better for everyone.
Carina C. Zona

* Desigining for Renaming

Renaming yourself is never easy. In Santa Clara County in the State of California, to file a petition to change one's name costs over $400, and may take six months or more. Then one must change one's name (and possibly one's gender marker) on the dozens of sites and services one uses. On many sites, that's easy, I go to preferences and edit my name. But then the site addresses me as "Mr. Emma Humphries," oh really? Other systems will correctly greet me as "Emma" when I log in. But still call me by $DEAD_NAME when they send an email. This brings us to the first best practice: When I change my name in one place, change it in all the places.
Emma Humphries

* Dog Food is for Dogs: Escape the Crate of Your Perspective with User Research

Dogfooding—using your own products—is nice, but is it sufficient to produce good design for people who aren’t you? Our familiarity with our projects and their quirks makes us poor substitutes for users in the wild. So just who are these users, and how do you incorporate them into design and development? In this workshop, we'll explore user experience design and research strategies that will help you design for people who aren’t you.
Rachel Shadoan, amelia abreu

* Email as Distributed Protocol Transport: How Meeting Invites Work and Ideas for the Future

Learn how meeting invites work and some crazy other ideas for distributed protocols built on email.
Christine Spang

* Failing With Grace

One of the biggest challenges of building distributed systems is dealing with failure. In this talk we'll explore how distributed systems fail and then once we're good and scared, we'll cover a number of approaches and tools to help you deal with failure.
Sean O'Connor

* For Love and For Money

Let’s talk about the work we want to do, the work we have to do, and how we might create systems that don’t continue to force bad choices between building community, technical work, and diversity activism.
Audrey Eschright

* Good Enough Voter Verification & Other Identity Architecture Schemes for Online Communities

This talk is a deep dive into considerations for Identity Architecture for online communities. It's most specifically applications for political action, civic engagement, or virtual nations. I'll talk about pragmatic solutions for voter verification using the state voter registration database, schemes for peer to peer authentication, offline/online identification, Impartial Identity Architecture to control conflict, and more. The discussion is high level and appropriate for beginners, but there will be links to code and big ideas.
Ele Mooney

* Hello, my name is __________.

Our personal identity is core to how we perceive ourselves and wish to be seen. All too often, however, applications, databases, and user interfaces are not designed to fully support the diversity of personal and social identities expressed throughout the world.
Nova Patch

* How the Internet Works

The Internet runs the world; it connects our devices, powers our businesses, and even talks to our thermostats. But how does it all happen? We will follow an adventurous young web browser from the moment a hapless user presses "enter" and witness the trials and tribulations of many packets. Ride alongside the most fearsome syscalls as we learn how the Internet works!
Noah Kantrowitz

* HTTP Can Do That?!

I have explored weird corners of HTTP -- malformed requests that try to trick a site admin into clicking spam links in 404 logs, an API that responds to POST but not GET, and more. In this talk I'll walk you through those (using Python, netcat, and other tools you might have lying around the house).
Sumana Harihareswara

* Internet of Things Militia: Paramilitary Training for your IoT devices

Security folk generally talk about how the Internet of Things is bad for security, but it also brings new sensors and connected devices that could co-operate in new and interesting ways. Could we use internet things to enhance security?
Terri Oda

* Leveraging Docker to Enable Learning

When giving workshops or presenting online tutorials, it's frequently the case that the system setup can take longer than the actual learning exercises. Using Docker to provide a learning sandbox solves this problem while avoiding changing the learner's system in potentially destructive ways.
Kirsten Hunter

* Male/Female/Othered: Implementing Gender-Inclusiveness in User Data Collection

You want to gather information about your users that you can use to improve their experience and yours. They want their identities to be acknowledged and treated with respect. This talk is about meeting both needs: How to ask about gender in ways that welcome the diversity of reality while still being able to analyze the data you get back. We'll discuss the nature of that challenge, how some major websites address it, and example solutions for different scenarios.
Finn Ellis, Jonathan Harker

* Morning Keynote — Put Up or Shut Up: An Open Letter to Tech Companies Seeking Diverse Teams

People from marginalized communities struggle to break into tech, clawing our way through a racist, sexist, classist, ableist system only to be fired, quit or just suffer in misery. I’ll explore what it really takes to create a workplace that is truly welcoming of everyone.
Kronda Adair

* Probably

If you want to understand probability better (and you should), this is the talk for you.
Bart Massey

* Removing Barriers: Ascend Project Post Mortem

Last year the Ascend Project was announced, then in the fall the first pilot took place in Portland. This year we'll report back on how it went, hear from participants, and break down what worked and what could be changed for future versions of this type of program. You'll definitely come away with some ideas for your next learning event, code school, or sponsored training.
Lukas Blakk, Kronda Adair

* The Graceful Exit: Approaches for Changing One's Role in an Open Community

Open culture communities are passionate, dedicated backed by people. What happens when those people need to change their roles within the community? I've played varied roles in open culture communities through the years. In this talk I'll go over what worked well and what I wish I had approached in a different way when my role needed to change.
Kate Chapman

* The Public Library As An (Almost) Open Source Institution

Your public library can be one of your best allies for creating, distributing, and promoting Open Source ideas and projects. They want to help - they just need to know how.
Alex Byrne

* User Research For Non-Researchers

User research doesn't have to be time-consuming, elaborate, or performed by a UX professional. If you're willing to talk to a few strangers, you can do user research. In this presentation, I'll talk about how to do lightweight research on any product or topic, no matter what your background and training are. I'll focus on the most effective tools for quick research, and some of the common pitfalls for novice researchers.
Jane Davis

* What Are Computers, Really?

We'll take a whirlwind tour of the theory behind what computers do. We'll start with counting on our fingers and end with an explanation of why there are some problems where the laws of physics say "no, a computer can never do this". No mathematical background necessary.
Clarissa Littler

* What's in a name? Phonetic Algorithms for Search and Similarity

Search can be as simple as returning a word or part of word based on character similarity. LIKE and wildcard matches can be sufficient, but can only account for character or string matching, and fail on misspelled words or names. Phonetic algorithms can help us find matches for misspellings and typo'd user data.
Mercedes Coyle

Favorite proposals for this user

* 90 writing tips in 45 minutes

Almost every job involves a little writing, even if it's code comments or repair notes on a car. But what if you don't feel confident with writing? I have a rapid-fire presentation of writing tips and tricks that can help get you started, keep you going, and make your work better, even if you don't think you're a writer, I bet it will help!
Hacks 2015-01-20 02:50:35 +0000
Heidi Waterhouse

* Alice and Bob Are Really Confused

Journalists, activists, artists, business owners and other fine folks in New York City are asked to install PGP. You won't believe what happens next.
Culture 2015-03-15 00:29:32 +0000
David Huerta

* Be careful what you wish for: a successful developer community discouraged away from open source

Let's say you want your freedom-valuing software community to be wildly successful - with lots of user demand, a viable way that people can make money from their work if they want to, a heavily international audience, and lots of young people interested. What happens if you get what you want? I'll explain cultural context from the iOS jailbreaking community that can serve as some interesting early warning signs of problems that could happen in open source.
Business 2015-03-08 08:34:33 +0000
Britta Gustafson

* Corporate Source vs. Open Source

Has Open Source sold out? Has the corporate world somehow managed to take over the soul of open source without anyone noticing? When did open source "projects" requiring hundreds of thousands of dollars to participate become a thing?! In this talk we'll explore this and what it means for the OSS community at large.
Culture 2015-03-10 20:18:07 +0000
John Coggeshall

* Could Spambots Exist in Victorian England? and other questions about technology, society, and communication

As a tool for human communication, the internet has successes and failures. It allows us to meet people, collaborate, strengthen communities, and learn new things. It also enables oppression, harassment, and noise. These problems aren't new, but choices made in constructing the internet have often served to blindly facilitate their spread. Instead of continuing to assume that the technical, social, and economic constraints that kept such problems from destroying past systems will continue to hold, let's break down what's different from then to now, and find a new set of solutions.
Hacks 2015-02-25 04:35:16 +0000
Audrey Eschright

* Designing Reactive Systems with Akka

This session will show attendees how to building reactive services using Akka and Scala. Reactive services are scalable, reliable, and efficient and we'll demonstrate the basic model, a simple development workflow, and the tools and libraries that make it all work.
Chemistry 2015-03-08 21:14:48 +0000
Thomas Lockney

* Geeks and the News Cycle

Large news entities - like Gawker and Huffington Post - that cater to casual and regular consumers get some of their most popular news stories from places like Reddit, Twitter, and HackerNews. Their news stories are sourced by the user generated content of these sites - the commons if you will - they digest them, and then profit from the advertising income. This talk will look into how this consumer-newsgiant-consumer dynamic treats the communities that it benefits from, how the 'merit' of news stories' ranking on popularity competition sites like reddit relate to the meritocracy in tech, and how people react to suddenly being at the center of a media storm.
Culture 2015-01-28 04:20:33 +0000
Simon Vansintjan

* Naked and Afraid: Mobile Offline Access to Emergency Data

There's an emergency. You need critical information that you put in the cloud. But the internet and mobile networks are all down. What now?
Cooking 2015-03-09 00:32:27 +0000
Matt Woodward

* Objectivity is a Myth: Your Data is Not Objective and Neither Are You

Data is often treated as an impartial representation of reality--an unbiased delivery mechanism for "ground truth". Data collection, however, is designed by people, whose knowledge and beliefs influence the design decisions they make. How does that impact what we think we know, and how can we adapt our processes to account for it?
Culture 2015-03-08 01:37:51 +0000
Rachel Shadoan

* So You Want To Write A Tech Article

Have you ever said, “I could write an article about that!”? Imagine what it feels like to walk into Barnes & Noble, pick up a magazine and see your article featured right there on the cover. Who do you contact? What's the process? What the heck is step one? In this talk, you'll get an insider's look at breaking into the mysterious world of tech article writing, from an industry veteran.
Hacks 2015-03-04 17:06:42 +0000
Rob Reilly

* Why nobody cares about your GitHub project

Open source is hard. Everybody tells you to create a GitHub account and start throwing your code out there. Once you do, you realize that nobody really cares. In this talk, we'll see what you can do to increase the visibility of your work and how this can dramatically affect the quality of your project.
Chemistry 2015-02-24 15:16:27 +0000
Zeno Rocha