Attacking information overload in software development



Similar documents
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

Best Practices for Java Projects Horst Rechner

Database Design Patterns. Winter Lecture 24

What is Visualization? Information Visualization An Overview. Information Visualization. Definitions

Managing explicit knowledge using SharePoint in a collaborative environment: ICIMOD s experience

CS 2112 Spring Instructions. Assignment 3 Data Structures and Web Filtering. 0.1 Grading. 0.2 Partners. 0.3 Restrictions

Monitoring Replication

How To Fix A Snare Server On A Linux Server On An Ubuntu (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking

Learning and cognitive effects of acquired brain injury caused by meningitis or septicaemia

Bitrix Site Manager 4.1. User Guide

The Hadoop Distributed File System

Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. Objectives

Semantic Search in Portals using Ontologies

A methodology for measuring software development productivity using Eclipse IDE

Snare System Version Release Notes

CC414 Database Management Systems

Snare System Version Release Notes

Android Application Development - Exam Sample

Field Audit Trail Implementation Guide

CSE 373: Data Structure & Algorithms Lecture 25: Programming Languages. Nicki Dell Spring 2014

Bayesian Spam Filtering

Learn about OverDrive APIs and how they can benefit search, discovery and reporting services at your library. Contact:

Do Onboarding Programs Work?

Editors Comparison (NetBeans IDE, Eclipse, IntelliJ IDEA)

What s in a Name? Or, How to Manage your Digital Assets

Snare System Version Release Notes

Assisting bug Triage in Large Open Source Projects Using Approximate String Matching

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Personal Cloud. Support Guide for Mac Computers. Storing and sharing your content 2

The Basics of Graphical Models

Quick Start. Creating a Scoring Application. RStat. Based on a Decision Tree Model

Rational Developer for IBM i (RDi) Introduction to RDi

>

Configuring CitectSCADA SNMP projects with MIB2CIT. A reference for CitectSCADA Customers

JMETER - MONITOR TEST PLAN

Analysing log files. Yue Mao Supervisor: Dr Hussein Suleman, Kyle Williams, Gina Paihama. University of Cape Town

SuperViz: An Interactive Visualization of Super-Peer P2P Network

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

Three types of messages: A, B, C. Assume A is the oldest type, and C is the most recent type.

Interaction and Visualization Techniques for Programming

JustClust User Manual

PTC Integrity Eclipse and IBM Rational Development Platform Guide

SEO AND CONTENT MANAGEMENT SYSTEM

Best Available Integration of Outlook and SharePoint

Using the Eclipse Data Tools Platform with SQL Anywhere 10. A whitepaper from Sybase ianywhere

HelpSystems Web Server User Guide

Processing and data collection of program structures in open source repositories

1 Organization of Operating Systems

D1.1 Service Discovery system: Load balancing mechanisms

Intellicus Cluster and Load Balancing- Linux. Version: 7.3

A S B

Microsoft Windows SharePoint

An Empirical Study on Recommendations of Similar Bugs

Social Relationship Analysis with Data Mining

EVALUATING METRICS AT CLASS AND METHOD LEVEL FOR JAVA PROGRAMS USING KNOWLEDGE BASED SYSTEMS

Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,

RFID Based 3D Indoor Navigation System Integrated with Smart Phones

RhoMobile Suite. Develop applications for the next generation of business mobility

Efficient Bug Triaging Using Text Mining

WOS Cloud. ddn.com. Personal Storage for the Enterprise. DDN Solution Brief

IT Service Level Management 2.1 User s Guide SAS

Asset Track Getting Started Guide. An Introduction to Asset Track

Avaya Network Configuration Manager User Guide

GMC Inspire Cloud Services

AIMMS User s Guide - Advanced Data Management

CiteSeer x in the Cloud

Foglight. Dashboard Support Guide

Data storage Tree indexes

Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search

The Value of Taxonomy Management Research Results

SPSS 12 Data Analysis Basics Linda E. Lucek, Ed.D

ACCESSING WEB ARCHIVES

University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task

Developer Dashboards: The Need For Qualitative Analytics

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

A Comparison of Dictionary Implementations

General Product Questions Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4

MOOCviz 2.0: A Collaborative MOOC Analytics Visualization Platform

How to Design and Create Your Own Custom Ext Rep

Release 2.1 of SAS Add-In for Microsoft Office Bringing Microsoft PowerPoint into the Mix ABSTRACT INTRODUCTION Data Access

Columbia University Web Security Standards and Practices. Objective and Scope

Transcription:

Attacking information overload in software development Gail Murphy University of British Columbia Tasktop Technologies This talk contains copyright pictures obtained under license. The license associated with this talk does not apply to these pictures.

sumerian language g clay tablet 2400-2200 BC source: Wikipedia

source: The University of Iowa Libraries

source: The University of Iowa Libraries

source: The University of Iowa Libraries

source: The University of Iowa Libraries

14.8 million books (English/Spanish) in print today download 250 items at a time

information explosion information overload indecision repetition

from anywhere, anytime, anyone to the right information at the right time, in the right place, in the right way to the right person G. Fischer, Int l Workshop Series on RFID, 2004

challenge: weak structure some explicit connections many inferred connections

software development: a subset with stronger structure

software development: a subset with stronger structure

right information right time right place right way right person

group memory episodic memory Hipikat Mylyn

group memory: Hipikat across time and space, developers leave a digital trail of information about a project form an implicit group memory from the digital trail enable a developer to query the group memory for pertinent information joint work with Davor Cubranic

writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents

metadata writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents

heuristic writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents

information retrieval writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents

recommending writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents

does it work? 20 random bugs from Eclipse ; assess files recommended precision: 0 to 0.56 ; recall: 0 to 1 easy task 75% 25% difficult task 75% 50% 75% of newcomers handled 50% of newcomers met basic special cases correctly compared req. compared to 75% of experts to only 25% of experts

right information? right time? right place? right way? right person?

right way? current past

right way? weak rationale for recommendations significant ifi cognitive i effort to apply information overload cognitive overload

episodic memory: Mylyn as a developer works, build a task context that includes a degree-ofinterest (DOI) for each item of information interacted with focus the display of information using a task s context support collaboration through sharing of task contexts joint work with Mik Kersten

interest

task (bug) #1 task (bug) #2

Mechanism Description Applies to Filtering Exclude display of List, tree, graphical elements with DOI views below a threshold Ranking Display elements List views, children sorted by DOI values within tree nodes Decoration Indicate DOI values Any view with foreground or background colour Expansion Expand tree nodes to Any tree view management show elements with certain properties

task (bug) #1 task (bug) #2

does it work? field study with 16 industry participants edit ratio = # edits / # selections 200 percentage change in edit ratio 150 100 50 0 50 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 developer ids

right information? right time? right place? right way? right person?

instead of

500,000 programmers are working like this

development tasks have emergent structure

an anchor for other recommendations run unit tests related to task context + enables easier running of more cases

an anchor for other recommendations active search - difficult to scope

an anchor for other recommendations Hipikat-like yet to be built!

right way? reduces friction encourages flow information overload cognitive overload

what about other knowledge workers? interaction relatively agnostic to target

knowledge worker field study (early Mylyn) y average average scattering tagging path directory ratio length density 5.5 0.1 1.5 0.3 2.7 0.2 1.1 0.9 3 0.1 1.4 0.4 2 03 0.3 0 0 1 0.01 1 0.4

Tasktop p( (extend Mylyn yy beyond programming) g)

meghan allen meghan allen john anvik john anvik elisa baniassad elisa baniassad wesley coelho wesley coelho davor cubranic davor cubranic briande alwis brian de alwis rob elves rob elves thomas fritz thomas fritz jan hannemann jan hannemann lyndon hiew lyndon hiew reid holmes reid holmes mik kersten mik kersten seonah lee seonah lee shawn minto shawn minto martin robillard martin robillard izzet safer izzetsafer david shepherd david shepherd ducky sherwood ducky sherwood annie ying annie ying trevor young trevor young robert walker robert walker and others! and others!

so information information information information information i Information information

overload leads to indecision repetition memory-model inspired attacks Hipikat and Mylyn

recommendations can be about less and not just about more www.cs.ubc.ca/~murphy www.cs.ubc.ca/ murphy www.tasktop.com