To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
We develop a model that successfully learns social and organizational human network structure using ambient sensing data from distributed plug load energy sensors in commercial buildings. A key goal for the design and operation of commercial buildings is to support the success of organizations within them. In modern workspaces, a particularly important goal is collaboration, which relies on physical interactions among individuals. Learning the true socio-organizational relational ties among workers can therefore help managers of buildings and organizations make decisions that improve collaboration. In this paper, we introduce the Interaction Model, a method for inferring human network structure that leverages data from distributed plug load energy sensors. In a case study, we benchmark our method against network data obtained through a survey and compare its performance to other data-driven tools. We find that unlike previous methods, our method infers a network that is correlated with the survey network to a statistically significant degree (graph correlation of 0.46, significant at the 0.01 confidence level). We additionally find that our method requires only 10 weeks of sensing data, enabling dynamic network measurement. Learning human network structure through data-driven means can enable the design and operation of spaces that encourage, rather than inhibit, the success of organizations.
Recommendations of sustainable design methods are usually based on theory, not empirical industry tests. Furthermore, since professionals often mix components of different design methods, recommending whole methods may not be relevant. It may be better to recommend component activities or mindsets. To provide empirical grounding for recommendations, this study performed 23 workshops on three sustainable design methods involving over 172 professionals from 27 companies, including consultancies and manufacturers in three industries (consumer electronics, furniture and clothing). The design methods tested were The Natural Step, Whole System Mapping and Biomimicry. Participants were surveyed about what components in each design method drove perceived innovation, sustainability or other value, and why. The most valued components only partially supported theoretical predictions. Thus, recommendations should be more empirically based. Results also found unique and complementary value in components of each method, which suggests recommending mixed methods for sustainable design. This may help design professionals find more value in green design practices, and thus integrate sustainability more into their practice.
Earlier reports revealed oxysterol metabolites of Opisthorchis spp. liver fluke origin conjugated with DNA bases, suggesting that the generation of these DNA-adducts may underlie the mutagenicity and carcinogenicity of the infection with these food-borne pathogens. Here, we employed liquid chromatography-mass spectrometry to investigate, compare and contrast spectrograms of soluble extracts from Fasciola hepatica adult worms from bile ducts of cattle with those from O. viverrini and O.felineus from experimentally infected hamsters. F. hepatica and Opisthorchis spp. shared common compounds including oxysterol-like metabolites, bile acids and DNA-adducts, but the spectrometric profiles of F. hepatica included far fewer compounds than Opisthorchis species. These findings support the postulate that parasitic oxysterol-like metabolites could be related to carcinogenesis associated to infection and they point to a molecular basis for the differences among major groups of liver flukes concerning infection-induced malignancy.
Chordoma is a rare bone cancer for which there are no approved drugs. Surgery is the principle treatment but complete resection can be challenging due to the location of the tumours in the spine and therefore finding an effective drug treatment is a pressing unmet clinical need. A major recent study identified the transcription factor Brachyury as the primary vulnerability and drug target in chordoma. Previously, all-trans retinoic acid (ATRA) has been shown to negatively influence expression of the Brachyury gene, TBXT. Here we extend this finding and demonstrate that ATRA lowers Brachyury protein levels in chordoma cells and reduces proliferation of the chordoma cell line U-CH1 as well as causing loss of distinctive chordoma cell morphology. ATRA is available as a generic drug and is the first line treatment for acute promyelocytic leukaemia (APL). This study implies ATRA could have therapeutic value if repurposed for chordoma.
Bollobás and Nikiforov (J. Combin. Theory Ser. B.97 (2007) 859–865) conjectured the following. If G is a Kr+1-free graph on at least r+1 vertices and m edges, then ${\rm{\lambda }}_1^2(G) + {\rm{\lambda }}_2^2(G) \le (r - 1)/r \cdot 2m$, where λ1 (G)and λ2 (G) are the largest and the second largest eigenvalues of the adjacency matrix A(G), respectively. In this paper we confirm the conjecture in the case r=2, by using tools from doubly stochastic matrix theory, and also characterize all families of extremal graphs. Motivated by classic theorems due to Erdös and Nosal respectively, we prove that every non-bipartite graph of order and size contains a triangle if one of the following is true: (i) ${{\rm{\lambda }}_1}(G) \ge \sqrt {m - 1} $ and $G \ne {C_5} \cup (n - 5){K_1}$, and (ii) ${{\rm{\lambda }}_1}(G) \ge {{\rm{\lambda }}_1}(S({K_{[(n - 1)/2],[(n - 1)/2]}}))$ and $G \ne S({K_{[(n - 1)/2],[(n - 1)/2]}})$, where $S({K_{[(n - 1)/2],[(n - 1)/2]}})$ is obtained from ${K_{[(n - 1)/2],[(n - 1)/2]}}$ by subdividing an edge. Both conditions are best possible. We conclude this paper with some open problems.
Supporting designers is one of the main motivations for design research. However, there is an ongoing debate about the ability of design research to transfer its results, which are often provided in form of design methods, into practice. This article takes the position that the transfer of design methods alone is not an appropriate indicator for assessing the impact of design research by discussing alternative pathways for impacting design practice. Impact is created by different means – first of all through the students that are trained based on the research results including design methods and tools and by the systematic way of thinking they acquired that comes along with being involved with research in this area. Despite having a considerable impact on practice, this article takes the position that the transfer of methods can be improved by moving from cultivating method menageries to facilitating the evolution of method ecosystems. It explains what is understood by a method ecosystem and discusses implications for developing future design methods and for improving existing methods. This paper takes the position that efforts on improving and maturing existing design methods should be raised to satisfy the needs of designers and to truly support them.
In order to understand queueing performance given only partial information about the model, we propose determining intervals of likely values of performance measures given that limited information. We illustrate this approach for the mean steady-state waiting time in the $GI/GI/K$ queue. We start by specifying the first two moments of the interarrival-time and service-time distributions, and then consider additional information about these underlying distributions, in particular, a third moment and a Laplace transform value. As a theoretical basis, we apply extremal models yielding tight upper and lower bounds on the asymptotic decay rate of the steady-state waiting-time tail probability. We illustrate by constructing the theoretically justified intervals of values for the decay rate and the associated heuristically determined interval of values for the mean waiting times. Without extra information, the extremal models involve two-point distributions, which yield a wide range for the mean. Adding constraints on the third moment and a transform value produces three-point extremal distributions, which significantly reduce the range, producing practical levels of accuracy.
Tuesday. 7.45am. Your commute is going well. No delays so far. Of the 15 emails awaiting your attention, you’ve answered eight. Only seven more to go. But these are tricky ones. You dip into your phone's browser, download a file from your work's server, scan it to ensure it has the data you need. Back into email. ‘Hi Sarah, sales were up 3.4% in March. Let me know if you need further info.’ Back into the browser. Apparently, there was an angry message posted on Twitter last night. You find it, look through the profile of the customer, copy the message. Back into email. ‘Hi James, some flak on Twitter last night. I’m pasting the message. Please resolve.’ You see that Sarah has replied already. She wants to know what sales were in March for the last five years. You’ll be arriving soon. No time for this. ‘Sarah, I’ll come back to you in twenty: just arriving on train.’ James has replied also. ‘Who wrote this tweet?’ Back into the browser. No internet connection? You look up: other commuters are looking up and around, confused. Seems the train's Wi-Fi has gone down. Only then do you notice: you missed your stop.
For many people today, the separation of time spent at work and time spent away from work has disappeared. Before the digital revolution, a fair few workers would have worked during their commute: reading a report perhaps, or preparing notes in advance of an afternoon meeting. But there were technological limits to this type of activity. With no email, your connection to a Sarah or a James hinged on meeting them once you arrived in the office or giving them a call from your desk. While reading a report, you weren't receiving ‘pings’ asking you to handle some other matter. Nowadays, technology facilitates and encourages multiple simultaneous conversations across numerous platforms. Once you’re online – which could be from the moment you wake up – work activities can easily suck you in: answering emails, checking technical reports, looking for updates, requesting information from colleagues, editing files, and more, all while you make coffee, eat breakfast, get the kids dressed, take them to school, and head for the train.
Wednesday. It's 10.30am and you’re heading out to grab a coffee at your favourite spot, Lou's Café. Swiping your staff card, you exit the building, passing the security booth, glancing up at the cameras watching you leave. You tap your phone to hail a rideshare cab, which arrives just a minute later and takes you toward the town centre. At the coffee shop you pay with a tap of your debit card, collecting points with your loyalty card. While you wait for the coffee, you notice a screen near the milk which flashes an ad directed right at you, your name at the top: ‘Make warts a thing of the past. Get 20% off our cream at Chem-Care. Scan the QR code for an in-store voucher.’ That was embarrassing. You wish these ads were less intrusive. Checking your phone out of habit – why is this coffee taking so long to arrive; you’ve been waiting a minute already – you see another ad for Chem-Care, which is now offering a twofor-one on wart cream if you tweet about Lou's Café.
In today's digital world, the line between your public persona and private affairs is blurring. The scenario above is an exaggeration: chances are, an imaginary company like Chem-Care wouldn't actually direct such a personal ad in public like that, although tying your purchase in one venue to your location in another is already happening. What you think is your private business – you have a couple of warts, they’re annoying, you’re bothered by them, and you’d rather not advertise this to others – is now a business opportunity that algorithms can identify and use as the basis for steering your future purchases in a specific direction. Massive investments are being made right now by all sorts of companies to capitalize on and monetize these sorts of opportunities. Whether it is information based on your online search activity or the places you frequent when you’re out spending money, you’re now just one of billions of other targeted humans.
Digital life demands and creates data shadows and footprints made up of trillions of our individual responses to the prompts and invitations playing out on our devices, the services located within them, and the world at large.
Thursday. It's 1pm. You’ve been trying to change how you work. You arranged to meet a colleague for lunch by emailing her yesterday, rather than contacting her via WhatsApp today. You’ve spent the morning working in a focused way, ignoring email and messages, and staying away from social media. Before heading out of the office you’ve just caught up on those communications in a quick intensive session and placed your phone on silent. Lunch feels a little strange because you leave your phone in your pocket and not on the table next to your plate. You describe the morning to your friend: how you read a book on the train for the first time in years (and how odd that felt when everyone around you was on their phone); how you’ve purposefully been using a new web browser that hides your IP address; and how you’re more carefully curating what you share online. She doesn't seem too impressed, but it has actually felt like a good move to you; certainly, it's been different and, yes, it's been a little bit inconvenient. But it has also felt liberating.
Hopefully this scenario sounds appealing and achievable. We think it starts to set out what a slow computing day might look like. As we pointed out in Chapter 1, slow computing is a means to address the various issues that acceleration and data extraction create. It seeks to do this in a way that prioritizes and protects your needs and interests, and creates public good for society as a whole. Practising slow computing requires individual and collective actions: people making decisions to change how they lead their digital lives by considering and changing their own situations, and pooling their actions and drawing on the diverse actions of others.
This chapter focuses on tactics you individually can use to fulfil the strategy of slow computing. It is about taking ownership of the issue and being proactive in tackling acceleration and extraction at a personal level. To that end, we set out some interventions aimed at slowing down your computing. We emphasize reconfiguring the time you spend on your digital participation, while curating and limiting the extent to which you leave data footprints and cast data shadows. Adopting these ideas can be empowering because it can give you back a degree of control.
Sunday. 10pm. The week is over. You’ve done well. You’ve managed to move away from frantic messaging and updating without giving up being online. You’ve taken note of your data trails and adjusted your practices along with others to slow down and evade excessive data extraction. Life isn't perfect all of a sudden, but you’ve been taking part in a reassessment of your digital life and you’ve some more control now. The weekend has been relaxing without being constantly tethered to the internet. Tomorrow is Monday and the day will start again at 6.30am. The question is whether the working week will be as crazily busy and stressful as usual, or whether it’ll be possible to slow it down and be calmer, more focused and balanced. You think about checking your email and social media accounts, but decide it can wait until tomorrow. There's no point ruining a night's sleep by worrying about the contents of a message or the state of the world according to Facebook. In fact, you think you might give social media a break for a few days. The world is not going to end because you only log in a couple of times a week. You turn off the light and quickly fall into a deep sleep.
This doesn't sound too bad, does it? You’re still feeling the joy of computing, but more on your terms. You’ve achieved some kind of balance between acceleration and data extraction and getting on with your everyday life. You’ve found some harmony between work and home. You’re living a slow computing life. You’re no longer a slave to your devices; you’ve more freedom from the digital leash. You’re less harried, stressed and distracted. You’re not careening through life, but doing more of the things you want, when you want to, and you’re not as beholden to the demands of others. You feel like you have more time for yourself – for rest, leisure, personal interests and goals, and contemplation. You’re doing fewer things, but you’re enjoying what you do more. In fact, you feel like you’ve become more productive and your work has improved. It seems like you’ve got more control over your digital footprints and shadows. You’re still using services, but you have a hand in deciding what data are gathered. You have a better sense of your rights and an understanding about how to challenge malpractice.
The coronavirus pandemic started to sweep across the globe just as this book was going to press. All aspects of daily life changed once delay, and then containment measures, were put in place. Initially, closing down most workplaces and schools and restricting movement seemingly created new scope for people to practise slow computing. Rather than dashing here and there, trying to cope with a crowded diary and too many tasks, those people not on the frontline would be static and confined to the home. Life would become stationary, routines broken, busyness reduced, and work-life balance restored. However, the scope for pursuing slow computing is now in question like never before.
In many ways our lives have become even more digitallymediated. In our own cases, at very short notice we had to pivot our teaching from face-to-face contact on our university campus into virtual classes. New knowledge and skills had to be acquired about new pedagogies and platforms (Teams, Skype, Zoom, Moodle, etc). Classes and meetings were to be conducted from home. Social interactions with family and friends shifted to video calls, WhatsApp and Facebook. Information was elicited through social media and news sites. Streaming services replaced out-of-home social activities. Our time was still fragmented and interleaved, and rather than our sense of stress being lowered, it was heightened by the sense of isolation and the fear and anxiety expressed through our media channels. We thus tried to follow our own slow computing advice by limiting the use of social media and making sure to do non-digitally mediated activities: exercise, cooking, gardening, reading, playing traditional games.
We’re fortunate. For some of our colleagues (and also our students), the new digital realities of working at home have posed acute challenges. Many were left looking after bored, coopedup children who needed home schooling, play and reassurance. They’ve had to cope with family-wide fights over who will use the computer. New skills have been acquired to access and install software and work out how to use new services. Some have quite limited access to broadband internet. Other workers have not been allowed to self-isolate due to the nature of their job, performing essential work. In many cases, this work has intensified due to increased demand or the stress of trying to deliver it in difficult circumstances.
Aiming to help researchers capture output from the early stages of engineering design projects, this article presents a new research tool for digitally capturing physical prototypes. The motivation for this work is to collect observations that can aid in understanding prototyping in the early stages of engineering design projects, and this article investigates if and how digital capture of physical prototypes can be used for this purpose. Early-stage prototypes are usually rough and of low fidelity and are thus often discarded or substantially modified through the projects. Hence, retrospective access to prototypes is a challenge when trying to gather accurate empirical data. To capture the prototypes developed through the early stages of a project, a new research tool has been developed for capturing prototypes through multi-view images, along with metadata describing by whom, why, when, and where the prototypes were captured. Over the course of 17 months, this research tool has been used to capture more than 800 physical prototypes from 76 individual users across many projects. In this article, one project is shown in detail to demonstrate how this capturing system can gather empirical data for enriching engineering design project cases that focus on prototyping for concept generation. The authors also analyze the metadata provided by the system to give understanding into prototyping patterns in the projects. Lastly, through enabling digital capture of large quantities of data, the research tool presents the foundations for training artificial intelligence-based predictors and classifiers that can be used for analysis in engineering design research.
Friday. 5pm. The strangest thing just happened. An email from management arrived saying: ‘In accordance with the firm's new work-life balance strategy, the email client will be paused today at 5.30pm and will reopen on Monday at 8.30am. All messages sent during the weekend will be held by the client and delivered on Monday morning. All staff are requested to enjoy the weekend. Management are exploring the possibility of also pausing the email system overnight during the working week.’ You don't get it. What's got into them? A colleague stops by. Apparently, the union pushed for this. Management agreed because they thought it’d be good PR. The local news channel's running a story on it tonight. Whatever, it seems like brilliant news and the office is buzzing.
It's hard to believe that any company would make such a move, right? Or that an employer would install an open source operating system on all of its computers and encourage all staff to use a Tor browser. But why not imagine such collective moves toward slow computing? For all that slowing down requires individuals to adjust their practices and create individual choreographies of data dancing to secure data sovereignty, slow computing collectively is ultimately what's needed. Workplaces are as good an arena to begin as any. In fact, given the reality of ‘working time drift’ there are few sites as appropriate to implementing the slowness in slow computing. In this regard, therefore, we tip our hats to the French ‘right to disconnect’ policy, a move akin to what we have mentioned in our imagined example. Workers in French companies with more than 50 employees now have the right to negotiate times when they will not be obliged to check emails or text messages. Companies in other jurisdictions have implemented similar policies aimed at protecting their workers from stress-related illnesses and burnout and ensuring they get suitable rest. For example, Volkswagen blocks work email being sent to the mobile phones of workers between 6pm and 7am, and Daimler permits workers going on holiday to automatically delete all new emails while they are away. Those seem like positive steps in the right direction.