1
viscon2020
VIScon Digital 20202020-10-102020-10-06600:05Europe/Zurichhttps://symposium.vis.ethz.ch2020-10-05T18:00:00+02:0018:0002:30Online / ETH (BLUE)viscon2020-196-kick-off_hackweekhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/196falseKick-Off HackweekGet practical experience outside of the lecture hallsside_eventWorkshop and introduction to the VIS-Infrastructure for Development.2020-10-07T19:00:00+02:0019:0000:15Online / ETH (BLUE)viscon2020-193-openinghttps://symposium.vis.ethz.ch/en/viscon2020/public/events/193falseOpeningOpening by Nicole Wenzinger and David Kalchofnerside_eventenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>2020-10-07T19:15:00+02:0019:1500:45Online / ETH (BLUE)viscon2020-192-meaningful_relationships_and_sense_of_purpose_in_a_time_of_crisishttps://symposium.vis.ethz.ch/en/viscon2020/public/events/192falseMeaningful relationships and sense of purpose in a time of crisisKeynote by Ekaterina Kamenskayaside_eventenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
The coronavirus outbreak is dramatically changing our lives, including relationships in our communities, families, homes and workplaces. One of the most effective strategies for slowing the pandemic is physical or so called “social” distancing. However, distancing clashes with the human need to connect with others. Research shows that being socially connected in meaningful ways is a key to human health and survival.
We will talk about ways to foster a sense of authentic connection, create communities for receiving and giving support, and find opportunities to innovate and create, changing the focus from “me” to “we” and thereby making a difference to the broader world.The coronavirus outbreak is dramatically changing our lives, including relationships in our communities, families, homes and workplaces. One of the most effective strategies for slowing the pandemic is physical or so called “social” distancing. However, distancing clashes with the human need to connect with others. Research shows that being socially connected in meaningful ways is a key to human health and survival.
We will talk about ways to foster a sense of authentic connection, create communities for receiving and giving support, and find opportunities to innovate and create, changing the focus from “me” to “we” and thereby making a difference to the broader world.2020-10-07T20:10:00+02:0020:1000:55Online / ETH (BLUE)viscon2020-160-5g_security_evolutionhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/160false5G Security EvolutionSecurity challenges and solutions in 5G networksextended_talkenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
"Is 5G more or less secure than the existing generations of the mobile networks?" - this question nowadays is quite often raised by the industry, media and public. This topic will be discussed in this Talk.
5G is expected to become the core connectivity infrastructure for all sectors of the society, with importance similar to electricity or water supply. Billions of connected objects are concerned, not only individual users and smartphones, but also systems used in the critical sectors like energy, transport, banking, health, industrial control, safety, etc. Therefore, ensuring the cyber security and resilience of 5G networks is very essential.We will shortly talk about the next generation of the mobile networks 5G, it's use cases and main characteristics. Then we'll elaborate on the main security challenges brought by 5G, and further deep dive into how 5G security is addressed, both by the standardisation bodies like 3GPP (3rd Generation Partnership Project) and GSMA (GSM Association), and by the network operators like Swisscom. We will cover such key 5G security-enabling technologies like SBA (Service Based Architecture) and usage of HTTP/2, network slicing, unified access-agnostic authentication, enhanced 5G NR (New Radio) security (SUCI, Subscription Concealed Identifier and User Plane integrity protection), Roaming security (SEPP, Security Edge Protection Proxy) and others. We will also see how 5G security is compared to previous (existing) mobile network generations like 4G/LTE, and in the end reference some interesting sources to learn more on the topic./system/events/logos/000/000/160/large/Swisscom.png?1589981598Vadim Paryev2020-10-07T19:00:00+02:0019:0000:15Online / ETH (RED)viscon2020-203-screening_openinghttps://symposium.vis.ethz.ch/en/viscon2020/public/events/203falseScreening: Opening Opening by Nicole Wenzinger and David Kalchofnerside_eventenJoin online: viscon.ethz.ch/livestream2020-10-07T19:15:00+02:0019:1500:45Online / ETH (RED)viscon2020-202-screening_meaningful_relationships_and_sense_of_purpose_in_a_time_of_crisishttps://symposium.vis.ethz.ch/en/viscon2020/public/events/202falseScreening: Meaningful relationships and sense of purpose in a time of crisis Keynote by Ekaterina Kamenskayaside_eventenJoin online: viscon.ethz.ch/livestream
The coronavirus outbreak is dramatically changing our lives, including relationships in our communities, families, homes and workplaces. One of the most effective strategies for slowing the pandemic is physical or so called “social” distancing. However, distancing clashes with the human need to connect with others. Research shows that being socially connected in meaningful ways is a key to human health and survival.
We will talk about ways to foster a sense of authentic connection, create communities for receiving and giving support, and find opportunities to innovate and create, changing the focus from “me” to “we” and thereby making a difference to the broader world.2020-10-07T20:10:00+02:0020:1000:40Online / ETH (RED)viscon2020-148-user_vs_security_-_or_why_rtfm_is_not_good_advicehttps://symposium.vis.ethz.ch/en/viscon2020/public/events/148falseUser vs. Security - or why “RTFM” is not good advicetalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
IT would be so much simpler if it wasn’t for the user, right? Especially when it comes to IT Security. “Layer 8” is one of the biggest threats to data security. Let’s have a closer look at this dilemma and discuss how communications expertise is key for solving the issue. Mature handling of information technology requires a minimum of understanding. Most IT-users have sufficient knowledge to use the Internet, post messages or send pictures to their friends. But that doesn’t necessarily mean they know how to handle their own or their company’s data in a responsible and self-determined manner. The problem has long been recognised and addressed by a field named “Security Awareness”. How? By deploying (communication) measures that inform, train and educate users on the topic of information security.
Currently, the human factor is one of the greatest threats to the security of data and information for organisations: Social engineering is increasingly becoming the preferred method of criminal hackers to gain illegal access. Is security awareness not working? If so, why? And what needs to be done?
This talk takes a look at the current situation of security awareness and why an interdisciplinary approach is long overdue./system/events/logos/000/000/148/large/SWITCH.jpg?1589293853Katja Dörlemann2020-10-08T19:00:00+02:0019:0000:40Online / ETH (BLUE)viscon2020-186-how_does_zoom_store_recordingshttps://symposium.vis.ethz.ch/en/viscon2020/public/events/186falseHow does Zoom Store Recordings?Reverse Engineering C++ and Custom File Formatstalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
<p>Like many others, we found ourselves having to move to online meetings - specifically Zoom, after the ETH closed in the beginning of March 2020.
When recording with Zoom, a nice feature is the ability to save the audio of different people to individual files, allowing easy editing in post.
Unfortunately, Zoom decided to trim any silences found in those audio tracks and as such they become impossible to sync in post.
Thus I decided to reverse engineer Zoom, specifically how they store the temporary recording files and hopefully extract the full untouched audio tracks.</p>
<p>In this talk, I will go through the journey taken, to go from not knowing what part of Zoom handles recordings to fully extracting all data from the temporary files.
Attendees will learn important aspects when reverse engineering any software as well as file formats.
Furthermore, they will see common pitfalls and difficulties I encountered, specifically with C++ software.
I will explore all of this, in the context of how the Zoom recording and transcoding architecture works, as well as the custom file format Zoom uses.</p><p>In theory Zoom has a really great feature to record every person's audio separately.
This is really great for recording our weekly meetings, as sometimes people are too quiet or too loud and allows us to fix such issues in post.
Unfortunately, when exporting, Zoom will automatically remove any periods of silence from the resulting audio files, making this impossible.
However, Zoom also stores the recording in temporary files, which allowed me to get the original audio as well as video.</p>
<p>In the first section of the talk, I will go into detail on how I was able to reverse engineer the file format and which pitfalls I fell into.
Starting at finding the right library responsible for handling these files to finally cracking the code on the way video was stored.
All in all, attendees will learn a great detail of reversing tricks as well as how they might go about building their own file format.
Nonetheless, only some minor knowledge of general software development and programming is needed to follow along.</p>
<p>Before I delve into the details of the file format, the architecture used to orchestrate recordings and transcoding will be explained.
The architecture - which was also reversed - is an important part of the file format design and as such helps understand how it came about.
After an in depth description of the file format, I will comment on its advantages and disadvantages.
Rounding off the talk, will be a demonstration of the file format.</p>
<strong>About Flagbot</strong>
<p>„Flagbot“ is ETH's Capture The Flag team.
Every weekend we take part in online (and sometimes onsite) hacking competitions in the world, and we offer students the thrills of being part of one of the top ranking teams fighting tooth and nail against other passionate hackers to get the latest flag.
In 2019 we ranked first in Switzerland and look forward to become the best in the world.
Furthermore, every Monday we provide lectures on modern hacking topics and techniques to get new members up to speed.
Amongst other things, last year we organized our first big event (BjörnCTF), and organized many collaborations with EPFL's CTF team.</p>/system/events/logos/000/000/186/large/FlagbotLargeFlag.png?1590357461Leonardo Galli2020-10-08T20:00:00+02:0020:0000:40Online / ETH (BLUE)viscon2020-125-can_you_fix_the_world_with_a_startuphttps://symposium.vis.ethz.ch/en/viscon2020/public/events/125falseCan you fix the world with a startup?Tales from crafting a business model around truly sustainable cloud computingtalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
Sustainability is not a business model. Therefore, in this talk you'll learn how to take a great idea about how to use Software to improve sustainability and create an actual business model around it. You'll also get some ideas about deciding whether to turn this business model into a Startup or not. Alongside, you'll get some very practical inputs on how to reduce the carbon footprint of your Software based products, because change happens one commit at a time./system/events/logos/000/000/125/large/positiv.png?1587482167Christoph Buchli
Helio
2020-10-08T19:00:00+02:0019:0000:40Online / ETH (RED)viscon2020-127-building_a_covid-19_contact_tracing_app_for_switzerland_-_privacy_challenges_and_how_we_solved_themhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/127falseBuilding a Covid-19 Contact Tracing App for Switzerland - Privacy Challenges and How We Solved Themtalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
In this talk, I'll explain different architectures for building contact tracing apps for Covid-19, focussing on the privacy challenges of different designs. I'll talk about how the system deployed in Switzerland was designed and developed in a joint effort by researchers at ETH Zurich, EPFL and other institutions.Kenny Paterson2020-10-08T20:00:00+02:0020:0000:40Online / ETH (RED)viscon2020-159-inside_a_robot_s_brainhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/159falseInside a robot’s brainDeep dive on how to make autonomous robots thinktalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
Navigating from A to B is a trivial task for humans, even when it comes to dynamic or crowded environments. But does this also apply to autonomous mobile robots? In this talk we present the main challenges that robots face in the real world and give insights into the most recent algorithmic solutions to tackle them. From computer vision to motion planning and controls, we will outline the main technology components that constitute an autonomous robot’s brain. Autonomous mobile robots will soon be carrying out repetitive, unhygienic and dangerous work in airports, railway stations, construction sites or department stores. This way robots contribute to making human workplaces more interesting and safer again thanks to their support - all while boosting operational efficiency.
For this important mission, autonomous robots need to be able to move independently and safely in all environments. This requires tackling a number of technological challenges such as navigating in complex environments shared with people, achieving precise positioning and safe motions even in the presence of dynamic obstacles. In addition, mobile robots have limited compute capabilities, thus requiring the development of highly efficient and sophisticated algorithms.
In this talk we give an introduction to the main software components that enable autonomous mobile navigation. To name only a few, we will answer the following questions: How to make robots precisely estimate their positions and maintain digital maps of their environments? How to make robots differentiate between static and dynamic obstacles? How to make robots plan and execute safe but efficient paths in complex environments?/system/events/logos/000/000/159/large/7s-symbol-color-RGB.png?1589979971Dina YouakimRenaud Dubé
Website
2020-10-09T19:00:00+02:0019:0003:30ETH (C)viscon2020-164-attacking_and_defending_web_applicationshttps://symposium.vis.ethz.ch/en/viscon2020/public/events/164falseAttacking and Defending Web ApplicationsThe Best Defense is a Strong Offenseworkshop_longen<p>A lot has changed since the invention of the internet and the world wide web.
It has become essentially impossible to imagine a setting where no web applications — such as webshops, messaging applications or social media sites — exist.
With that omnipresence, it becomes increasingly important to consider security in an online world.
Web applications are no longer the static pages they once were, and this opens the doors to a plethora of attacks that could endanger a business or its users.</p>
<p>After an introduction with an overview of some common vulnerabilities in webapps, we intend to give participants some insight into practical attacks and vulnerabilities through a gamified experience.
Several small teams will attack each other, while trying to defend their own team website.
Don't panic, no real websites will be harmed in the process. This will just be a toy website provided by us, without any legal ramifications.</p>
<p><strong>Prerequisites</strong> An interest in cyber security, some minor programming experience and a computer to work from.
We will take care of the necessary infrastructure and vulnerable web application.</p>
<p><strong>Disclaimer:</strong>We only condone the use of this knowledge for ethical hacking within a legal framework.
Any malicious use of knowledge and experience obtained through this workshop is your own responsibility.</p><strong>Part I: Introduction to Web Security (ca. 1h)</strong>
<p>In the first part of the talk, attendees will be introduced to the world of web apps with an overwhelming focus on their security.
First, we will give an overview of the most common technologies used throughout modern web apps, such as Python + Flask, PHP, MySQL, etc.
Next, attendees will receive a brief but broad introduction into many different types of vulnerabilities and ways to exploit them.
Starting at one of the - if not the - most well known vulnerability, an SQL injection, and ending with some rather exotic - although still very relevant - ones, such as Server Side Request Forgery (SSRF) or broken JSON Web Tokens (JWT).</p>
<strong>Part II: Attack and Defense (ca. 2h)</strong>
<p>The second part focuses on putting the skills learned in the first part to practical use.
Initially, attendees will be divided into small team.
Every team will have a server assigned, with a small toy web app running.
The web app is the same for every team and has multiple vulnerabilities that can be exploited in various ways.
The goal is to first identify the vulnerabilities, then patch them on your server, while simultaneously exploiting all other servers.
To get points for exploiting, attendees will have to retrieve something (usually called a flag) stored on the other server, for example in the database.
Like in real web apps, the flag will continuously change and hence the exploit is not a one time set and forget affair, but rather a task of - at least somewhat - automation.</p>
<p>Teams have both physical as well as networked root access to their server.
The source code is available through a Git server running for every team, which will also automatically build and deploy any updates to the code.
Furthermore, we will provide helper software to ease the automation of exploits.
Additionally, every team will have an interface for viewing a complete dump of all traffic coming and going to their server, allowing them to quickly react to exploits and even attempt to steal them.
Lastly, a member of flagbot, the ETH students' CTF team and the organizer behind this event, will be assigned to every team, helping out in every way they can - without actively attacking or defending.</p>
<p>Following a short introduction explaining the above in a bit more detail, we will kickoff the event, running for 2 hours.
After it ended, we will briefly discuss intended solutions as well as any creative exploits or unintended bugs we saw.
Additionally, we will be answering any questions that might arise.
Lastly, the network dumps of the whole event will be published online to dissect and take a look at.</p>
<strong>About Flagbot</strong>
<p>„Flagbot“ is ETH's Capture The Flag team.
Every weekend we take part in online (and sometimes onsite) hacking competitions in the world, and we offer students the thrills of being part of one of the top ranking teams fighting tooth and nail against other passionate hackers to get the latest flag.
In 2019 we ranked first in Switzerland, and looking forward to become the best in the world.
Furthermore, every Monday we provide lectures on modern hacking topics and techniques to get new members up to speed.
Amongst other things, last year we organized our first big event (BjörnCTF), and organized many collaborations with EPFL's CTF team.</p>/system/events/logos/000/000/164/large/FlagbotLargeFlag.png?1590074831Leonardo GalliRobin Jadoul
Organized By
2020-10-09T19:00:00+02:0019:0002:00ETH (D)viscon2020-149-hack_the_hacker_-_the_escape_roomhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/149falseHack the Hacker - the escape roomside_eventenA click on a link in an email infects the computer system of your organization with ransomware. It's up to you and your team to rescue the data. The mission of your team is to find the code that revokes the encryption executed by the malicious software. Together with up to 5 people you have to search the hacker's den for hidden hints and clues. «Hack The Hacker» is a Security Awareness training, that raises interest in security topics and transfers sustainable knowledge through fun and teamwork. Together with up to five people you have to solve security related puzzles in an analogue game environment in the escape room.
In order to prepare you and your team for this adventure, two experts from SWITCH-CERT will give you an introduction into security and provide you with basic knowledge that might come in handy during the game. In a debriefing, we’ll discuss the experienced security aspects and try to answer any open question./system/events/logos/000/000/149/large/SWITCH.jpg?1589294218Katja Dörlemann
«Hack The Hacker» - the escape room
Hack The Hacker – The SWITCH Security Awareness Experience
Flyer - Hack The Hacker - The SWITCH Security Awareness Experience2020-10-09T19:00:00+02:0019:0000:40Online / ETH (BLUE)viscon2020-124-digital_building_twinshttps://symposium.vis.ethz.ch/en/viscon2020/public/events/124falseDigital Building TwinsWhy is it so cold in here?talk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
Conventional buildings are major energy consumers and emitters of carbon dioxide. There is a lot of room for optimization especially when it comes to heating and cooling buildings. Modern buildings are equipped with thousands of sensors that measure environmental data and actuators that control heating valves, fans, lights and other things. By combining data from these sensors and actuators with meta-data such as a construction models we create a digital representation of a building, a digital twin. A digital twin is a platform for all kinds of applications or services that make use of building meta-data and live or historic data. We can monitor and optimize energy consumption or run simulations. Thus, a digital twin is an important tool to reach sustainability goals for a building. Creating a digital twin is a technical challenge as there is a lot of heterogeneity in the things in a building and the protocols and application models that are used.
Conventional buildings are major energy consumers and emitters of carbon dioxide. There is a lot of room for optimization especially when it comes to heating and cooling buildings. Modern buildings are equipped with thousands of sensors that measure environmental data and actuators that control heating valves, fans, lights and other things. By combining data from these sensors and actuators with meta-data such as a construction models we create a digital representation of a building, a digital twin. A digital twin is a platform for all kinds of applications or services that make use of building meta-data and live or historic data. We can monitor and optimize energy consumption or run simulations. Thus, a digital twin is an important tool to reach sustainability goals for a building. Creating a digital twin is a technical challenge as there is a lot of heterogeneity in the things in a building and the protocols and application models that are used.
At Siemens, we use open standards to tackle the technical challenges of creating a digital twin. In this session you will learn about the W3C Web of Things standard and how we combine it with semantic web technologies and knowledge graphs for a digital building twin./system/events/logos/000/000/124/large/sie-logo-claim-petrol-rgb.png?1587361669Maria Husmann2020-10-09T20:00:00+02:0020:0000:55Online / ETH (BLUE)viscon2020-165-internet_tracking_tracing_profiling_and_manipulationhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/165falseInternet tracking, tracing, profiling ... and manipulation?Is there a subtle form of manipulation as a result of tracking and profiling?extended_talkenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
Tracking, the practice of collecting user data when browsing or using apps, may be perceived as a side effect of any internet usage. Tracking-based profiling is seemingly unnoticeable. Thus, individualised advertisement or behavioural targeting may not necessarily worry users.
However, research suggests that the lack of transparency yields to information asymmetry between trackers and everyone else. Some allege that targeted advertising is not limited to the commercial sphere. They argue that manipulation, i. e. violation of the target's autonomy, may render some people vulnerable to the whims of those who control the tracking and profiling apparatus.
This talk will give an introduction to some tracking, tracing and profiling methods. How does tracking differ from tracing? Should concerned users grapple with technical remedies? Conversely, should providers assume tracking to be effective? Is "Everyone Else Does It" a reasonable business practice? Could companies gain competitive advantages by standing out from the crowd?/system/events/logos/000/000/165/large/zl_sr_cropped.png?1590160452Robert Würgler
Cyber and Digital Economy Research Network
2020-10-09T21:10:00+02:0021:1000:40Online / ETH (BLUE)viscon2020-168-beerpong_with_hololens_2https://symposium.vis.ethz.ch/en/viscon2020/public/events/168falseBeerpong with HoloLens 2Using cutting edge Mixed-Reality tech to play Beerpongtalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
As mixed reality is slowly getting traction in the modern world, coding applications for the HoloLens keeps getting easier. At VIScon 2019 we saw that we can create a simple application and run it on the HoloLens 2, all within 20 min.
This year we're taking it one step further. What if you want share your mixed reality experience with your friends? Inviting them into the world you have created and being able to experience it with them. How do we make sure my friends' holograms are aligned with mine? We will cover all these aspects by creating a Beerpong app./system/events/logos/000/000/168/large/logo-microsoft-corporation-brand-windows-server-2016-windows-xp-png-favpng-MfQ9Eh8taScufiz3KRPuRSLjd_1_.jpg?1597668212Patrick Misteli2020-10-09T19:00:00+02:0019:0000:40Online / ETH (RED)viscon2020-130-digital_integrity_of_the_human_person_proposal_for_a_new_fundamental_righthttps://symposium.vis.ethz.ch/en/viscon2020/public/events/130falseDigital integrity of the human person, proposal for a new fundamental right.talk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
Every human evolves today in multi-dimensional physical and digital environment. If each individual is to keep its individuality and autonomy in its daily choices, it must be protected and given effective tools to defend its own autonomy.
Recognizing that human life has been digitally extended must question ourselves on what makes us human today. Should personal data be considered as component of the person, rather than objects that can be owned by whoever collects that data? Should our digital integrity be protected?
If each human person already has a right to physical and mental integrity (Swiss Constitution article 10 al.2), shouldn't it have a right to digital integrity?
This talk will introduce this new legal concept, its possible implications for data protection and how this concept could be introduced in the current legal framework.Alexis Roussel2020-10-09T20:00:00+02:0020:0000:55Online / ETH (RED)viscon2020-142-how_can_we_improve_our_handling_of_technology_s_negative_effectshttps://symposium.vis.ethz.ch/en/viscon2020/public/events/142falseHow can we improve our handling of technology's negative effects?Without paying attention to the root causes of technology’s negative effects we are condemned to a losing battle, as these effects are increasing in amount and complexity.extended_talkenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
The manner in which we invent and apply technology is not only creating ever more negative effects, but ever more complex ones as well. This produces a widening gap between that which we should be able to manage and that which we actually can manage. If we want to change this trend we must start looking at the root causes of the problem.Each further step taken in the evolution of digital technologies and technologies in general offers us an additional mix of advantages and disadvantages. We gladly accept the advantages and try to manage the disadvantages as well as we can. But each further step causes something more fundamental: yet more technology focus, more technological definitions and standardizations, more influencing or displacing of the human through the technological. As the saying goes: everything in moderation – but does our current culture of technology have a sense of moderation, a sense of other values than the technological? For freedom and diversity? If we want to maintain our humanity we must start paying far greater attention to the causal relations between us humans and technology./system/events/logos/000/000/142/large/plakat_hirn.png?1588680052James Heim
For further information, articles, interviews, book and contact info
2020-10-09T21:10:00+02:0021:1000:55Online / ETH (RED)viscon2020-129-lessons_learned_from_127_it-startups_of_eth_alumnihttps://symposium.vis.ethz.ch/en/viscon2020/public/events/129falseLessons Learned from 127 IT-startups of ETH AlumniDos and Donts - based on the insights of all interviewed entrepreneursextended_talkenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
How to become independant, build a company and make sustainable profits, based on the IT skills you have today? In order to answer this question I interviewed the founders of 127 IT-startups of ETH-Alumni, IT-startups, I could get hold of. They revealed to me their secrets about their entrepreneurial successes and failures. The result is a cook-book leading to entrepreneurial success for IT entrepreneurs. /system/events/logos/000/000/129/large/3ab0057.jpg?1587747989Willy Bischofberger
My LinkedIn-Profile:
fileLessons Learned from 127 IT-Startups of ETH-Alumni2020-10-10T14:00:00+02:0014:0003:30ETH (C)viscon2020-170-in_agile_mission_to_marshttps://symposium.vis.ethz.ch/en/viscon2020/public/events/170falseIn agile mission to Marsworkshop_longenWith agile methods to Mars! The task is both an introduction to agile methods and a Scrum simulation. Three groups per 60 minute session compete against each other.Each group consists of a Product Owner (ti&m coach), a developer team (programming), model builder team (design and construction) and surface designer team (construction of the ramp, terrain and garage). The 3 teams each build a Mars robot according to requirements from the backlog.
Iteratively, the teams approach the demanding requirements: Example: driving curves, reversing, overcoming 45° inclines, avoiding obstacles, etc. This task is not easy to solve and can only be successfully completed thanks to the agile approach and ongoing motivation. Communication, creativity and team spirit is the key to success here./system/events/logos/000/000/170/large/ti8m_logo_2014_RGB_ohne.jpg?1590148534Jennifer Harstad2020-10-10T14:00:00+02:0014:0003:30ETH (D)viscon2020-144-just_another_day_in_operationshttps://symposium.vis.ethz.ch/en/viscon2020/public/events/144falseJust Another Day in OperationsThe Art of Keeping Stuff Runningworkshop_longenSuppose you’re working for a software company and you’re tasked with making sure your server application is running smoothly at all times. How do you do that? Join this workshop to find out!Running an application isn’t just about writing code and deploying it. You also have to make sure it <i>runs</i>. When your server runs out of disk space and there’s a random crash in the middle of the night, someone will have to get up and fix it, or your users will be unhappy.
But ideally, you could fix such issues before they happen. Monitoring is the answer. But how does it work? In this workshop, we will show you which tools you can use to predict the future and prevent failures before they occur. We provide a live service and you’ll be able to debug simulated issues, practicing your skills in a real-world scenario. You will need a laptop with internet access, and we will provide the rest.
This workshop does not require any pre-existing knowledge, we will teach you everything from scratch.
/system/events/logos/000/000/144/large/170504_Beekeeper_Logo_rgb_pic-01-01.png?1588758770Filip Wieladek2020-10-10T14:00:00+02:0014:0002:00ETH (E)viscon2020-194-hack_the_hacker_-_the_escape_roomhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/194falseHack the Hacker - the escape roomside_eventen2020-10-10T17:00:00+02:0017:0002:00ETH (E)viscon2020-195-hack_the_hacker_-_the_escape_roomhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/195falseHack the Hacker - the escape roomside_eventen2020-10-10T16:00:00+02:0016:0001:00ETH (G)viscon2020-201-closing_hackweekhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/201falseClosing Hackweekside_eventShow what you have hacked over the last week and see what others have done. 2020-10-10T17:15:00+02:0017:1502:15ETH (I)viscon2020-191-towards_a_digital_utopiahttps://symposium.vis.ethz.ch/en/viscon2020/public/events/191falseTowards a digital utopiaExploring digital utopias for the greater good.workshop_regularenIn this workshop, participants are animated to engage in a macro-view of technology and political discourse. How do we steer techno-social progress away from dystopian futures towards a digital utopia?When we talk about the digital future of society, the conversation often drifts off into bleak, dystopian scenarios: total surveillance, tech giants leeching on our personal data and ubiquitous control enabled by Artificial Intelligence.
But we refuse to believe that this is what the future has in store for us. As Erik Reece, Author of Utopia Drive, puts it: “…things will only get worse if we don’t engage in some serious utopian thinking.” And that is exactly what we (Francesca Giardina from Operation Libero and Nikki Böhler from Opendata.ch) would like to instil in and practice with the participants - serious utopian thinking about techno-social change. We believe that the participants at VIScon will be uniquely challenged by this task, as it means zooming out of the code and re-focussing on the potential impact of their skills and talents on society. Francesca Giardina2020-10-10T13:00:00+02:0013:0000:55Online / ETH (BLUE)viscon2020-189-reinventing_access_control_with_iot_a_cloud-based_innovation_in_an_incumbent_industryhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/189falseReinventing Access Control with IoT: A Cloud-based Innovation in an Incumbent Industryextended_talkenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
Who is allowed in? Who only conditionally? Who no longer? Dormakaba, a provider of security and access solutions in a conservative industry, were one of the first in their market to exploit the opportunities that arise from connecting physical devices, manufacturers and customers with a cloud-based solution. In this talk, we will give you insights on how Zühlke partnered up with one of the leading companies in their respective field and reinvented access control for small to medium-sized businesses with an innovative IoT solution./system/events/logos/000/000/189/large/Zuehlke_Logo_cmyk_big.jpg?1594881459Silvian Melchior and Maria Paola Bianchi, Zühlke2020-10-10T14:00:00+02:0014:0000:40Online / ETH (BLUE)viscon2020-187-unrailed_-_post_mortemhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/187falseUnrailed! - Post MortemFrom Gamelab to Industrytalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
Our journey of developing an international successful video game in midst of our master studies.As a group of master students, we founded the ETH Spin-off, Indoor Astronaut, to finish and publish a video game (“Unrailed!”) which we prototyped during the Game Programming Lab lecture. Now, more than two years later, the project is coming to an end and want to give an overview of our journey./system/events/logos/000/000/187/large/Key_Art_Logo_1920x1080.png?1594123848Lukas RahmannThomas Wolf
Homepage
2020-10-10T15:00:00+02:0015:0000:40Online / ETH (BLUE)viscon2020-178-developing_accessible_softwarehttps://symposium.vis.ethz.ch/en/viscon2020/public/events/178falseDeveloping accessible SoftwareWhy the current effort is not enoughtalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
Since the introduction of the Web Content Accessibility Guidelines (WCAG) and the ARIA standard, the awareness of accessibility rose and it became much easier to develop accessible software. Nonetheless, the situation in Switzerland remains unsatisfactory and users with a disability experience barriers in the digital world on a daily basis.
This talk should give an overview of the current situation in Switzerland and demonstrate typical barriers by means of a live demonstration. Afterward, we will provide a starting point for improvements in order to ensure inclusivity in the future. The following questions will be answered: What does the legal situation in Switzerland look like? How do typical barriers that a user with a visual impairment encounters in the digital world look like? How can we improve the current situation and prevent those barriers?The live demonstration will be conducted by the additional speaker Werner Hänggi.
Werner Hänggi's speaker biography: Since 2002 Werner Hänggi works as a Senior Software Engineer at the software company AdNovum Informatik AG, where he is part of the UX team since the beginning of 2018. He is severely visually impaired and therefore, accessibility and assistive technology play an important part in his everyday life. Werner Hänggi has committed himself to the development of accessible software for many years now and conducts talks and lectures about accessibility regularly.Lina WitzelPicture additional speakerfile2020-10-10T16:00:00+02:0016:0000:40Online / ETH (BLUE)viscon2020-181-building_a_robot_judgehttps://symposium.vis.ethz.ch/en/viscon2020/public/events/181falseBuilding a Robot JudgeData Science for the Lawtalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
With expanding digitization of legal data alongside rapid developments in machine learning, the prospect arises for automating decisions in the legal domain. Data science technologies have the potential to improve legal decisions by making them more efficient and consistent. On the other hand, there are serious risks that automated systems could replicate or amplify existing legal biases and rigidities.
This talk will explore the emerging research on the building blocks for a robot judge. Given the evidence and briefs in this case, how will a judge probably decide? How likely is a criminal defendant to commit another crime? We can use these predictions to better understand the operation of the legal system. There is a special role for natural language understanding tools in this process, as a decent robot judge should be able to read and write legal documents.
Elliott Ash2020-10-10T17:00:00+02:0017:0000:40Online / ETH (BLUE)viscon2020-175-all_aboard_the_hype_trainhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/175falseAll aboard the hype train!Ranil Wijeyratne, Dipl. Ingenieur FH, Senior Software Engineer, Ergontalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
Staying up to date is a big challenge in our industry. New and exciting technologies and paradigms often emerge. Each one is supposedly more disruptive and groundbreaking than the other. How can we stay ahead and what does it mean to stay ahead anyway? Is new always better? Who are we doing this for? What are we trying to improve? This talk attempts to give advice on how to stay sane in an industry that is constantly trying to reinvent itself./system/events/logos/000/000/175/large/ergon_1984_rgb.png?1597824080Ergon Informatik
More about Ergon
2020-10-10T18:00:00+02:0018:0000:40Online / ETH (BLUE)viscon2020-151-the_missing_ml_lecture_before_starting_in_the_industryhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/151falseThe missing ML lecture before starting in the industrytalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
You have attended the ETH machine learning lectures with Prof. Dr. Buhmann and Prof. Dr. Krause. Exciting stuff, right? Your goal is clear - you want to start your first job and conquer the ML industry. There are many ideas and models waiting for you to be built, trained, validated, and optimized. You can’t wait! However, our experience shows that you still need to attend one last ML lecture teaching you how to bring ML models to the industry successfully.
We would like to share our experiences from the Swiss industry and talk to you about what it takes to make ML work outside of an academic environment. What are the reasons why machine learning models are adopted slowly by companies? We will talk about pitfalls, best practices, and all the non-ML knowledge it takes to make it production-ready. Therefore, giving you the perfect head start to thrive in the ML industry.
Come by if we piqued your interest, even without in-depth ML knowledge - we look forward to seeing you there!/system/events/logos/000/000/151/large/Logo_ohne_claim_farbig_gross.png?1589442373Dominik KeuschDaniel Yu
Homepage
2020-10-10T13:00:00+02:0013:0000:40Online / ETH (RED)viscon2020-132-how_machine_learning_is_making_harbours_saferhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/132falseHow Machine Learning is making harbours saferLearnings from building an easy to use Machine Learning Platformtalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
The basics of machine learning are already known for a while now. However, only with the development of high-capacity computers can machine learning be used in the mass market. The fields of application are very broad, and currently a lot of research is conducted. Even though this new research promises improvements in almost any sector. Companies nowadays struggle applying it. This is mainly due to three reasons: the lack of trained talents, the high costs of development and complex deployment into existing enterprise systems. BSI wants to change this by creating a machine learning platform that gives a simple interface directly embedded in the business environment – with a deployment process as simple as one button. It can be used without being an expert in that area, however, still with the flexibility of manually programmed machine learning workflows. In this talk we would like to present to you our motivation, the phase of development and the result of this project. We will illustrate the capabilities of our software using a real life example. At the Harbour of Hamburg we are helping to face the existing and highly complex challenge of maintaining cranes.The development of a machine learning platform which is available to a broad mass of users enables a fast distribution of those technological possibilities. With this platform BSI empowers companies to improve their operational processes. Furthermore, we support marketing agencies in their targeting or data scientists in creating their own machine learning models. During this talk we would like to present a few examples that show how diverse this platform can be applied and how technically mature the platform already is. A special focus will be laid on the software solution created for the Harbour of Hamburg which supports the maintenance of the cranes. Additionally, we will grant a worthwhile insight into our thoughts about the design and share our experience with the different ideas of approaches we had. We will share what went well and where we still need to improve./system/events/logos/000/000/132/large/bsi_cmyk_uncoated.png?1597656497Christoph BräunlichPhilip Heck2020-10-10T14:00:00+02:0014:0000:40Online / ETH (RED)viscon2020-172-how_to_mine_the_planethttps://symposium.vis.ethz.ch/en/viscon2020/public/events/172falseHow to mine the planetAbout accessing and visualizing OpenStreetMap open data and moretalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
<p>In this talk we'll learn the various ways on how to retrieve and visualize Points-of-Interest (POI) from OpenStreetMap (OSM), such as restaurants, schools - or table tennis tables. We show typical use cases of geovisualization using Python in Jupyter Notebooks and JavaScript for interactive web maps. We also disclose the "magic 3 steps" of Location Analytics which combines geonames or address data with foreign open data.</p><p>We at Geometa Lab are often being asked at hackathons or by startups: How can one access OpenStreetMap data for data analysis? And how can geospatial data (short geodata), specifically Points-of-Interest (POI) be visualised using Python/Jupyter Notebooks or JavaScript/webapps? OpenStreetMap (OSM) is the largest citizen science project about vector data of planet earth which we're using here at Geometa Lab as a gold mine in mobility, tourism, planning and spatial data analytics in general.</p>
<p>So we first show some open source libraries we're using to access OSM data, like OSMnx for Python and query-overpass for JavaScript, which both use the cryptic Overpass service. And we show some libraries to visualize geodata as interactive thematic web maps, like matplotlib (or Plotly) for Python and Mapbox GL JS for JavaScript.</p>
<p>Then, we also disclose the "magic 3 steps" of location analytics which combines own data with foreign open data. One can do this since location is "the universal foreign key": Given geonames or address data, step one is to geocode it (i.e. adding a coordinate attribute), then step two is to spatially join (i.e. combining) it with 3rd party geodata, then finally (step 3) is doing the data analysis or geovisualization.</p>
<p>And since we're talking about data mining the planet, we're using OSM for most of the examples as 3rd party geodata. But there's more open data around which will be conclusion where we give tipps on how to discover more open geodata.</p>/system/events/logos/000/000/172/large/SOSM-Logo_v0.90.svg.png?1590357245Stefan Keller
OpenStreetMap
2020-10-10T15:00:00+02:0015:0000:55Online / ETH (RED)viscon2020-158-no_it_security_without_free_softwarehttps://symposium.vis.ethz.ch/en/viscon2020/public/events/158falseNo IT Security without Free SoftwareHow openness contributes to securityextended_talkenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
IT security is one of the most important global issues of recent years. However, apart from the establishment of "cybersecurity" authorities, politicians are not coming up with much. Yet, Free Software can be the solution to many pressing security problems. We look at the advantages and disadvantages and use concrete examples to illustrate why security and openness are not contradictory.Trojans are shutting down hospitals, security concerns regarding Huawei are causing the 5G expansion to slow down worldwide, and all of this during a phase in which societies are forced to speed up digitisation. There is a lot at odds with IT security, which is also demonstrated by the inflationary rise of "cybersecurity" authorities and centres. But it is only recently that the importance of Free Software (also called Open Source) for security has become known outside the narrowest IT scene.
Free Software is an important component of IT security. However, experience has shown that the license alone does not correct critical programming errors and design weaknesses. Max Mehl will therefore show in this lecture how and in what form Free Software can provide a plus in security and why it is so important to make decision-takers understand this as quickly as possible.
But where there is light, there is also shadow. The presentation will therefore also deal with potential disadvantages and cases of weighing up the pros and cons as well as typical counter-arguments./system/events/logos/000/000/158/large/cityhall-code-001.v01.jpg?1589892496Max Mehl2020-10-10T16:00:00+02:0016:0000:40Online / ETH (RED)viscon2020-146-debunking_strategies_regarding_fake_news_on_the_internethttps://symposium.vis.ethz.ch/en/viscon2020/public/events/146falseDebunking strategies regarding fake news on the InternetFindings from communication sciencetalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
In the talk, it is planned to identify strategies from psychological and communication science research on how to effectively refute fake news distributed online. Current studies and practical examples will be presented and discussed.The development of evidence-based recommendations on how fake news and myths can be appropriately exposed (debunking) in online communication and how belief in them can be minimised is important not only for each individual but for society as a whole. The change in media leads to a new configuration of communication and information processes through digitalisation, differentiation, increased complexity, and omnipresence. The players in digital communication are becoming more heterogeneous and we also find public communication on the Internet that is guided by one-sided interests. In terms of communicative practices, it then becomes apparent that there is more room for information of all kinds. This is one of the reasons why myths and fake news persist even in the information age of the Internet, although evidence-based, scientific information and research articles as well as qualitative journalistic debunking contributions are potentially easily accessible here. In everyday life, however, people have little time, cognitive resources, and/or motivation to understand complex topics such as scientific or medical findings. This is why erroneous knowledge often arises. These fake news, myths, misunderstandings are then relatively stable in people's minds and difficult to eliminate. It sometimes requires special debunking strategies to correct once anchored myths. Normatively, it is desirable to be able to effectively combat false news and myths, which have been classified as one of the main threats to our society by the World Economic Forum. Sabrina Heike Kessler2020-10-10T17:00:00+02:0017:0000:40Online / ETH (RED)viscon2020-157-the_meaning_of_trust_worthiness_for_innovationhttps://symposium.vis.ethz.ch/en/viscon2020/public/events/157falseThe Meaning of Trust(worthiness) for Innovationtalk_regularenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
As part of the proposed contribution to VIScon, “ethix – Lab for Innovation Ethics” will present a theory of trust in the context of innovation that is an extension of fundamental interpersonal definitions. We will then discuss the responsibility creators, designers and implementers of innovation have towards being trustworthy from which trust with potential users can develop. The values by which the innovation process is oriented play a central role. When innovation is built on this foundation, it has the potential to be more sustainably integrated into society.Innovation has a constant presence in all spheres of life. Current foci of innovation (e.g., AI, digitization, biotech, etc.) come with promises of making our lives easier, creating more accessible services, and eliciting progress. These ideas become translated into countless and diverse concrete applications.
However, not all of these ideas are able to become true innovation that integrates into our social lives. Success and failure factors of innovative instruments are manifold. However, the aspect of trust of potential users plays an important role. The issue of trust is not only important for existing and potential paying customers, but even more so for innovations directed towards citizens, e.g. civic tech. But simply desiring trust is the wrong starting point: what it means to have someone – or something – be trustworthy is the central starting point. Here mistrust and trust go hand in hand and lead to “authentic” or “justified” trust that is longer lasting.
As part of the proposed contribution to VIScon, “ethix – Lab for Innovation Ethics” will present a theory of trust in the context of innovation that is an extension of fundamental interpersonal definitions. We will then discuss the responsibility creators, designers and implementers of innovation have towards being trustworthy from which trust with potential users can develop. The values by which the innovation process is oriented play a central role. When innovation is built on this foundation, it has the potential to be more sustainably integrated into society.
/system/events/logos/000/000/157/large/ethix_brand_rgb.png?1589785037Scarlett Eisenhauer and Lea Strohm
ethix - Lab for innovation ethics
2020-10-10T18:00:00+02:0018:0000:55Online / ETH (RED)viscon2020-120-whereto_with_aihttps://symposium.vis.ethz.ch/en/viscon2020/public/events/120falseWhereto with AI?Exploring the frontier between AI and philosophyextended_talkenJoin online: <a href="https://viscon.ethz.ch/livestream">viscon.ethz.ch/livestream</a>
This survey talk is aimed at a general audience. It explores some key questions raised by Milestone books of the past 50 years at the frontier between AI and philosophy. It starts by offering a very superficial definition of AI and highlighting some of the limits of computability for non-technical people. It then defines and discusses the idea of the singularity, when AI might overtake human intelligence, and explores the risks it involves. It concludes by summarizing some of the key questions that famous scientists and philosophers have raised around the topic.This is a talk for a general audience that will teach no AI to computer science characters and no philosophy to humanities characters. However both types of characters as well as anyone else will definitely learn something about the side(s) of this coin they are not familiar with, get their brain spinning on critical societal questions around AI, and in passing maybe want to read some of the 30 books which this talk is based on.Phil JansonThe Limits of AI