Okay, how can we Hi, thank you for your time. And I'm running a project where I'm trying to understand how people manage data and research environment. So I'm going to ask you a couple of questions about data and how you manage it, and where do they exist here? So first let me ask you to structure from your desk what kind of data you have and where do they exist? Okay. Obviously piled computers in the desk. I go laptop. Another laptop or phone and then yeah, monitors as a desktop. Desktop. I don't worry too much about when it comes to data management. It's backed up on AFSC separately, the local hard drive space. And I must always use version controls on us or like SVN CVS get, I think at least three. So downloading data management is done externally. This, this and this all having cricket hard drives. But they do that because I'm Security Professional and it makes me nervous because I like to travel with them across borders. They have varying levels of actually being backed. So this one is again a backward SVN CVS. These two basically just aren't backed up unless there's a major component by trying to limit the data is gather data on it. That's the C20 sets in a way. But there's hard drives were bigger. That's connected to the router. And the router and the hard drive had data on a hard drive. The routers running custom software that was set up for me by an unstressed you. I've got a couple of copies of it sitting around the office. I think I put a USB stick over there somewhere. And then there's a copy on the hard drive here, but that's an artifact. And then when it's running, it goes and collects all the traffic coming across it and puts it on a hard drive. So the I guess there's kind of some data in that space as well. I can see that you have a smart TV, Fox. So is there any data that, you know, she's very carefully that there isn't any data on Smart TV. Was particular Smart TV is purchase because it has a tendency to collect audio data and then sending it across the network. So it's actually disconnected from the network unless it's connected to the router for research. So it has no most of its data is what it shipped with. It doesn't have any additional data that I would store on it. For example, I didn't that settings or things like that. And I can see there's a camera there. Oh, yeah, for certain depicted there. So I have actually a camera in a USB drive. So I do step four hacks do maybe interviews with what you're talking about. And in order to do that, I cameras has to be an example of one of the cameras. Audio recorders like a Zune that we'll assume that does. Worrying. And there's a bunch of other video camera similar to the one you've got. So it's a I think there's a couple over there wondering what's like a teapot box. All those we'd record onto SD cards. So I have them. Yeah, I think students may often get cut version things. It'll convert SD card to do USB drives so that students can go and copy that onto their stuff them back again. So yes, you can. Binders and paper shows what they have and that's obviously the binders kind of when I used to go. And so I used to when I was a student, print out a love of the materials that were given. A lot of them are scanning from books. So this is actually a good example of this is how I conducted, I think a lot of usability study. It was a printout that is given to me at Carnegie Mellon. It doesn't exist online and it's actually a really nice material. So the reason it looks so it does look like these photocopy holes. They took the main one that's in this binder and photocopied it and gave it to my students. But it doesn't exist anywhere else in the rest of this local sitting side by Edgar. Cuz I happened to print it at the time. A lot of these are like my privacy Institute and it's all the contents of all the readings that were involved in it. Because again, privacy's a complex topic that a lot of these books have one or two chapters that a student might find very interesting, but not able. And I wanted to do things like draw axes so they know not to waste their time meeting. So I had photocopy all of them and then scanned them in and capital while implying there's I'd efforts data are hard to replace backups of the backups because there are some of the books, HCI class, some of it. But it's mostly just when people asked me to send it back again. Interested, please, or anything else, you're tempted to do? How are you defining data? And digital learning? And digital? I mean, one of the things they take a lot of pictures. I use my phone for a whole lot is taking pictures, the whiteboards, goods. So there's no useful data on that. And if you're acting me computer security, but that's the computer security class trying to be planned right now. And if I go into my phone and we were to look at the pictures, but loads actually, we so can I use that picture? But like most of my phone has screenshots like this in it, which are just pictures of. Don't worry about it too bad, but it's just a picture of a whiteboard. You can't see it so well. You can tell it's the whiteboard because it's got the little smiley face thing. I'm talk to one of the ways I know I took a picture of my whiteboard and not someone else. Swipe partners, there's toys on the top. So I can easily find the ones I took in like near to his office and said, anything inside these fluxes that qualitative research, DnaA boxes. But back then. So we do this whole project, get Internet of Things, and certainly need to be able to move the routers after somebody with visualization pops. An extra router with hard driving it here so that you can take it out and then uses get. I guess I did it because both this and the driver for packet capture data off as they're, they're doing it directly to students to weak enough. Not only do you have faculty, know purposely whose data you want and data you don't want for legal reasons. And I don't want the data from the demos I want to destroy, but it's not always destroying. So sometimes it's in the backpack. How about through smart skim through their site? Those are again the opposite, like the television side. So they exist primarily to produce data rather than be data themselves. So we box them and we try to either hack into them or see what kind of data is sent out. Easy now. So I'll kind of use more in that direction. And also there's a poster standing. Only two of them. So I guess I guess one of those is backed up and one of them is not. So cluster updates. This post is actually the second poster. I left the first poster accidentally on a train. So we were able to just printed again back up the data. This is a poster made by the Seagate group that they just gave me because someone paper, I think we have them granted for a minister who came here, knew they didn't want to do it. But this is the only copy I've got. So I don't actually have a digital fair game for this one. It just lives in the office, but it's also not going to be the most data on here I could Reaper reproduces most of the images that they don't have extra copies of. And it's not really research the more that Stieglitz and actually, okay, is there anything you'd like research death in this office? I guess the other interesting questions would be things like, it's not a big issue anymore. But it used to be very expensive to go and get access to some of the various conference proceedings. So if you're not part of a university, it can be really expensive people get. So used to be a thing where they will give you a USB drive, which hasn't the papers on it, but it's hard to find the papers later. So this is a really simple one that I got from high, remember the university or the comments? This one's more fun though, because this one is coming gigs is this is that many games. It actually embrace and on it. That's from the security and privacy conference. And it contains every single paper published in security and privacy between the years 1982,015. So that's what 35 years worth of research papers they wanted to talk confidences. And so while you can again find a lot of these online, the 1981, it's pretty hard to find. But I don't need that very often. So it mostly this on here. But if it got destroyed, it wouldn't be the end of the world. I could find it easily from Keita and in fact, I guess the other one would be. So every time I go to a conference, we'll find one here, the pole cause trouble. Yeah, I hear people give me business cards. And then sometimes I had to do something with business cards, but sometimes you just want to remember who they are, what they are. So I had these little cards and tell me where I got the business cornet and then they're all stored in this box. So these are F1, sorry, advocates is from Frontiers of Science where I went to that chi 2015-16. These are all the people I met and what the conference are. These aren't backed up anywhere. I tried to actually take pictures for them. I just pictures I can find the right story. Interesting. Okay. Thank you very much for your time. I think I had enough information to carry on my study. Time.