IM Power Project Summer 2007 Raye Gomez April Wensel Heather Tomko Jen Mankoff (mentor) Anind Dey.

Slides:



Advertisements
Similar presentations
VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Using the National Document Assembly Server Marc Lauritsen Bart Earle Alan Soudakoff Capstone Practice Systems December 12, 2008.
Instructors: Connie Hutchison & Christopher McCoy
Display Power Management Policies in Practice Stephen P. Tarzia Peter A. Dinda Robert P. Dick Gokhan Memik Presented by: Andrew Hahn.
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Workflows in Archie IMS Support Person: Sonja Henderson
The Control Panel Howard Klein April 20, Contents Customizing the desktop, mouse & keyboard Controlling PC power usage Task scheduling for computer.
By: Rachel Hall and Amy Austin.  Grade: All levels  Price  Host App: $24.99  Student App: free (allows up to 32 students)  Location: App Store 
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
Multi-DNC Data Collection/Monitoring
MS CRM Integration WhosOn Service Integration Presentation MS CRM User Group.
THE UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Improving IM Collaboration in the Workplace Kirstin Williams COMP
OWL PRODUCT CATALOGUE 2010 Reduce electricity costs Reduce carbon emissions Save precious fossil fuels.
Unit 1: Getting Started. What is a network?? A group of two or more computers that are linked together. Network Interface Card (NIC), basic network software.
Department of Energy Energy Savers PowerPoint: Home Office and Home Electronics 9 of 12.
Did You Know? Number of spam s sent each day? 100 billion.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Interpret Application Specifications
Introduction to Computers Essential Understanding of Computers and Computer Operations.
CS 0008 Day 2 1. Today Hardware and Software How computers store data How a program works Operators, types, input Print function Running the debugger.
April 12, Using a screen saver saves my monitor and/or energy. Turning my computer off and on reduces the life of the hard drive. I can use blank.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Authors: Mateusz Jarus, Ewa Kowalczuk, Michał Madziar, Ariel Oleksiak, Andrzej Pałejko, Michał Witkowski Poznań Supercomputing and Networking Center GICOMP.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
The aim We had to “build” a laptop from scratch. We needed to install the software and the Operating system needed. We came across all sorts of problems.
GML-3 GPRS BASED METER AND LOGGER THREE PHASE METER WITH INBUILT DATA LOGGER © Embuilt Technologies Visit us at Or For.
Get the best performance out of your PC By Matthew Pinch.
WHAT TO DO BEFORE GREEN OFFICE WEEK WE GIVE YOU TEMPLATES The week before Green Office Week starts, we suggest that you prepare all of your material.
COMP 4923 Green IT audit for Registrar’s Office John, Michael, Sarah.
Microsoft Office Communicator A General Introduction.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
PROJECT MULTICASTER Kenneth Brian Gilliam Computer Electronic Networking Dept. of Technology Eastern Kentucky University.
NETWORK SERVERS Oliver Topping (with a little help from my Mum)
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
TEAM Basic TotalElectrostatic ManagementAwareness&
1 Tradedoubler & Mobile Mobile web & app tracking technical overview.
1 ADP Algebra II End-Of-Course Online Field Test Test Administrator Training September, 2007.
Open your web browser and navigate to protechra.webex.com Open your web browser and navigate to protechra.webex.com.
Suite zTPFGI Facilities. Suite Focus Three of zTPFGI’s facilities:  zAutomation  zTREX  Logger.
National Center for Supercomputing Applications NCSA OPIE Presentation November 2000.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
COP3502: Introduction to Computer Science Yashas Shankar.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
CERN IT Department CH-1211 Genève 23 Switzerland t Monitoring: Tracking your tasks with Task Monitoring PAT eLearning – Module 11 Edward.
Complete Branding with Video Kit Part2 Everything you need included (does not include items you already have)
ADK ComponentConfiguration Manager Site System Windows Deployment ToolsCentral Administration Site Server Primary Site Server All SMS Provider.
VDI-in-a-box TM 1 Kaviza Client End User Quick Start Manual.
The Diagnostic Pathfinder System Introduction Getting Started.
Access : connection to the Internet account : an arrangement you have with a company or Internet provider to use a service they provide. browse : to look.
Today: Student will be able to describe the basics of their class and computing Tell me about you and how you use computers. Lesson 1 Slide 1.
1 Why Use Technology?  Research  Independent Learning  Immediate Feedback  Organization.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
JavaScript 101 Introduction to Programming. Topics What is programming? The common elements found in most programming languages Introduction to JavaScript.
BLOG STARTUP. What is a blog A Blog (or weblog) is an online journal or ‘diary’ that can be immediately and easily updated. A Blog can consist of a list.
© 2012, Toshiba India Private Limited. Toshiba Eco Utility.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
Elluminate Live! Participant's Guide Ensure your computer meets the minimum system requirements recommended for running an Elluminate Live! session on.
COMM 3050 – Online Project Update. Project Roles  Organizer Responsible for creating Zoom account technical aspects and posting recorded meeting to S:
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
A University Challenge Program Save energy and the environment.
HTML Structure II (Form) WEEK 2.2. Contents Table Form.
Using the AFRESH software Ruaraidh Dobson University of Aberdeen V1.0 27/04/2016.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Green Computing How to use your computer more sustainably By: Young Yi, Zheng Mi, & Arica Crootof.
Chapter 1 Getting Started
Technology Literacy Hardware.
Bomgar Remote support software
Presentation transcript:

IM Power Project Summer 2007 Raye Gomez April Wensel Heather Tomko Jen Mankoff (mentor) Anind Dey

Goals  Motivation reduce the amount of idle time to decrease carbon emissions (i.e. ecological footprint)  Determine Average user idle time Reasons for idle time How to cause user reduce idle time

Set-Up  Subjects Completed two week monitoring: 50 Laptop users: 40 Desktop users: 10 Completed study:  ~30 laptop users  desktop users TBA

Set-Up (cont.)  Randomly chosen for interview: 15 so far: 8 laptop users, desktop users TBA  8 laptop interviewees also gave preliminary opinions on feedback devices  All subjects Bot diary on last day Daily survey each night before logging off

Daily Survey  Were you logged onto primary your computer while online today? If not, at what times?  How many hours did you spend using the computer?  What was the shortest/longest amount of time that you stayed online?  How long was your computer performing assigned tasks requiring no input (i.e. virus scan)? How long was it not?  What power mode was your computer in today?  Describe all the times that you went idle and why.  What programs were you running today?

Bot Diary Every time a user came back from idle on last day:  Hello, it looks like you just returned from being idle. What were you just doing just now? What was your computer doing this time?

Information We Were Looking For  Time of status changes  Frequency and duration of idle times  User awareness when they were idle what their power settings were what programs they were running.  Interviews to get more in-depth information about reasons for idle time

Our Findings - General Surveys  95% of users run their computer on AC.  Biggest motivators for energy saving Money Altruism  About half of users use automatic standby/sleep setting

Our Findings - Interviews (Daily Surveys and Logs)  Most idle time for short periods (i.e. eating, cooking, bathroom, phone, etc.)  The average user believes turning the computer off extends the life of the machine leaves their computer on for easy access  Most common running programs: web browser, followed by the client  Most users run a screen saver, but only about half run anti-virus software

Suggestions For those running nothing while idle: roughly 85%  "Consider turning your computer off when you won't be using it for 30 minutes or more." (roughly 50%)  "Turn off your computer when you go to sleep." (less than 5%)  "Program your settings to automatically put your computer to sleep after 10 minutes of being idle." (roughly 10%) **The percentage of users in this category that ALWAYS leave their computer in full power mode is about 60%.

Initial Technology  AIM bot Built with AIM SDK in Java Keeps subjects in Buddy List Records status changes of all subjects Accepts commands from experimenter  diary study  survey reminders

Additional Technology  Sensor In Java Records processes, CPU usage, TCP usage Updates database every minute  Logger In Ruby Provides access to database through URL, e.g. :timestamp/:eventid/:eventname/:notes

Phase II – Behavior Change Choices  Variables  Modalities  Content

Phase II – Behavior Change Choices  Variables guilt vs. reward awareness vs. suggestions frequency of feedback historic vs. real time information  Modalities  Content

Phase II – Behavior Change Choices  Variables guilt vs. reward awareness vs. suggestions frequency of feedback historic vs. real time information  Modalities  Content

Phase II – Behavior Change Choices  Variables  Modalities window (constant or pop-up) instant message tray icon cell phone text message audio screen saver  Content

Phase II – Behavior Change Choices  Variables  Modalities window (constant or pop-up) instant message tray icon cell phone text message audio screen saver  Content

Phase II – Behavior Change Choices  Variables  Modalities  Content kwh of energy dollars pounds of co2 trees hours

Phase II – Behavior Change Choices  Variables  Modalities  Content kwh of energy dollars pounds of co2 trees hours

Phase II – Behavior Change Choices  Variables  Modalities  Content kwh of energy dollars pounds of co2 trees hours

Phase II – Behavior Change Choices  Variables  Modalities  Content kwh of energy dollars pounds of co2 trees hours

Phase II – Behavior Change Choices  Variables  Modalities  Content kwh of energy dollars pounds of co2 trees hours

Phase II – Behavior Change Choices  Variables  Modalities  Content kwh of energy dollars pounds of co2 trees hours

Phase II – Behavior Change Choices  Variables  Modalities  Content kwh of energy dollars pounds of co2 trees hours

Tentative Plans  Study effect of personalized suggestions on behavior change  Hypothesis Personalized suggestions will cause greater change than awareness alone  Measure Energy saving attitudes  Surveys, interviews Idle behavior  Bot, sensor

Tentative Plans  60 participants  1 week baseline  2 weeks with feedback  3 groups Idle cost Idle cost + generic suggestions Idle cost + personalized updates + opportunity

Three Feedback Types  Group 1 No suggestions.  Group 2 Turn your computer off at night.  Group 3 Instead of downloading at night, download over lunch and turn your computer off at night.

Components  AIM bot Sends info to logger about user status changes whenever they happen Sends suggestion to database when user comes off of idle  Feedback program  Logger  Database

Components  AIM bot  Feedback program Installed on client machines Sends CPU/TCP usage Retrieves idle time, suggestions, status Window  Logger  Database

Components  AIM bot  Feedback program  Logger Provides access to database via URLs as before  Database

Components  AIM bot  Feedback program  Logger  Database Stores AIM status and CPU/TCP data

Suggestions  Hand generated for each user after baseline  AIM bot chooses best Priority during current time period When same suggestion was last sent  Displayed in window

Window Projected annual cost based on today Change from baseline projection Change from yesterday’s projection Suggestion when user comes back from being idle