ACM ByteCast - Ramón Cáceres - Episode 56

Episode Date: July 11, 2024

In this episode of ACM ByteCast, Bruke Kifle hosts ACM Fellow Ramón Cáceres, a computer science researcher and software engineer. His areas of focus have included systems and networks, mobile and ed...ge computing, mobility modeling, security, and privacy. Most recently he was at Google, where he built large-scale privacy infrastructure. Previously, Ramón was a researcher at Bell Labs, AT&T Labs, and IBM Research. He also held leadership positions in several startup companies. In addition to being the first ACM Fellow from the Dominican Republic, he is an IEEE Fellow and has served on the board of the CRA Committee on Widening Participation in Computing Research. He holds a PhD in Computer Science from the University of California at Berkeley. Ramón, who took an indirect path to computer science, shares how he started in computer engineering but grew more interested in software, and how his strong background in hardware helped throughout his scientific and engineering career. He identifies some of the most significant challenges facing privacy and security and sheds lights on his work with the Google team that developed Zanzibar, Google's global authorization system supporting services used by billions of people. Ramón looks toward the future of mobile and edge computing in the next 5-10 years and his particular interest in federated machine learning, which brings together AI and mobile and edge computing. In the wide-ranging interview, he also reflects on growing up in the Dominican Republic and later discovering a love for sailing while in Silicon Valley, shares his efforts to bring underrepresented groups into the field of computing, and offers advice for aspiring software engineers.

Transcript
Discussion (0)
Starting point is 00:00:00 This is ACM ByteCast, a podcast series from the Association for Computing Machinery, the world's largest education and scientific computing society. We talk to researchers, practitioners, and innovators who are at the intersection of computing research and practice. They share their experiences, the lessons they've learned, and their own visions for the future of computing. I am your host, Brooke Kifle. Today we're embarking on a journey through the cutting-edge domains of systems and networks,
Starting point is 00:00:35 mobile and edge computing, security, and privacy, all integral components shaping the landscape of our digital future. System and networks facilitate seamless communication and collaboration in our increasingly connected world. Mobile and edge computing redefine how we access and process information, empowering real-time decision-making on an unprecedented scale. At the same rate, security and privacy are essential for safeguarding digital identities and sensitive information from potential threats. These pillars are the backbone of our digital world, shaping how we communicate, innovate, and protect our digital
Starting point is 00:01:10 infrastructure. Ramon Cáceres is a computer science researcher and software engineer, born and raised in the Dominican Republic. His areas of focus have included systems and networks, mobile and edge computing, mobility modeling, security, and privacy. Most recently, he worked at Google, where he built large-scale privacy infrastructure, and was previously a researcher at Bell Labs, AT&T Labs, IBM Research, and has also held leadership positions in several startup companies. Ramon is an ACM Fellow and IEEE Fellow. He serves on the board of the CRA Committee on Widening Participation in Computing Research and holds a PhD and MS degrees in computer science from the University of California at Berkeley
Starting point is 00:01:54 and a bachelor's of engineering from McGill University. Ramon, welcome to ByteCast. Hi, thank you very much for having me. You know, you have such a remarkable and interesting career that spans, you know, research, products, academia, industry. Can you describe some of the key points across your personal and professional career that have led you into the field of computing, but, you know, more specifically motivate you to pursue your field of study? Yeah, so it's been a very indirect path. And I find that often maybe young people feel that they look at someone who's nearing the end of their career with some achievements and feel that people got there in a very direct, purposeful path.
Starting point is 00:02:40 But I think often, as in my case, it took a little bit of exploration and different paths. So let me just give you a sense. I was interested in engineering since I was a boy. I grew up in a community associated with a remote mining operation in the Dominican Republic. And it was very, very small, under 100 people. But the engineers, in my mind as a boy, they built the place, literally. They built all the infrastructure from scratch, the roads, the buildings, the phone network, the electrical network, the plumbing.
Starting point is 00:03:13 And whenever there was a problem to be solved, they often just built something new to solve it. And so I was always interested in that ability to build infrastructure that served people. So that was an interest I had from very young. But as I was finished getting into my senior year of high school, I was still undecided as to which type of engineering I wanted to pursue in university, civil or mechanical or electrical. I just didn't know. And just by chance, a classmate lent me an
Starting point is 00:03:46 issue of Scientific American in the beginning of my senior year of high school, I remember very clearly. And that issue was focused on integrated circuits and their uses in computers. And I had never touched a computer before. I probably had never seen one other than a calculator. But I read the issue with interest and the topic just fascinated me. So largely on the strength of that, reading up that whole magazine cover to cover, I decided to pursue computer engineering for my university career. Back then, it was often considered a branch of electrical engineering. So formally, I joined an electrical engineering program at McGill University. And as my undergraduate studies advanced, I came to realize that I liked computer science as a whole,
Starting point is 00:04:34 including specifically software. Not only the hardware topics that had been the focus of my undergraduate curriculum in computer engineering. And so I went ahead and finished the electrical engineering degree. I was very far along when I realized these other interests. And so I decided to pursue a master's in computer science to learn more about computers and computer science. And when I went to Berkeley for my master's, I fairly quickly switched my focus from hardware to software
Starting point is 00:05:04 after taking some courses in operating systems, which I loved immediately. So another type of kind of gradual exposure was to research. So I had no idea what research was when I started my undergraduate career, certainly. And even when I finished it, I'd never really done any research. I hadn't had the opportunity to work at a research lab at the university. But certainly during my master's at Berkeley, I was surrounded by great research and did a little bit of it for my master's project. And I was very intrigued by doing more research. But I went ahead and finished my plan to go to work after my master's, partly for financial reasons. So I worked for three years as a software engineer, building products.
Starting point is 00:05:46 It was a lot of fun. I learned a lot. But in the back of my mind, I always had this nagging feeling that I wanted to learn more about research. And so after three years as an engineer, I went back for my PhD. And that sent me on the path to a research career. But as you mentioned, I've gone back and forth between research and engineering my whole career. And it's been a fun and indirect path, which, yeah, it's kept me happy. That's quite exciting. It seems like it's, you know, a combination, you know, of a journey of
Starting point is 00:06:15 both exploration, but also, I think, as you described it, gradual exposure. But also, I think you're able to blend such an interesting foundation in sort of the hardware, in addition to some of your studies and experience in software, right? So I'm curious how that breadth of exposure, both from research to practice, but also from hardware and software sort of end-to-end view has enriched your contributions as a scientist and as an engineer. Yeah, that's a good question. I mean, I've often thought that having that strong base in hardware, which I did from
Starting point is 00:06:51 the computer engineering focus of my undergrad, has really helped me throughout my career. I can't speak for how other folks think, but working certainly in systems and networking, which is a fairly low-level software, it's often been useful to me, I felt, to have a really strong sense, concrete sense of what the hardware was doing underneath the software that I was writing, whether it be the CPU and the caches or a network switch or other parts of hardware. Being able to visualize what they were doing concretely, I think, helps a systems and networking person make, found, designed decisions grounded in reality. So I think that that breath has been very helpful to me. for a lot of modern day computer scientists who may potentially have a strong foundation in the software to also ensure equal grounding and understanding what happens sort of in the back, right?
Starting point is 00:07:52 Understanding the fundamentals behind low-level software, but also how the actual hardware enables some of these capabilities. So I think that's quite interesting. You know, I'd love to touch on one of your primary areas of focus, which is this idea of privacy and security. Obviously, safeguarding privacy and security and systems that handle, you know, vast amount of data, user data is actually very important and has been a pervasive topic of discussion for many years, possibly even many decades. So what do you see, having your sort of breadth of experiences working at Google,
Starting point is 00:08:26 working at IBM Research, what do you see as some of the most significant challenges in achieving this goal of managing large amounts of user data, but still upholding and safeguarding these principles of privacy and security? I think the most crucial thing is to prioritize and build in privacy and security from the beginning of designing and building any system or an application, product, or service. This is well known. I'm not the first person to say this. But unfortunately, there are often commercial interests that get in the way of that, not maliciously, but simply because it's a matter of priorities, where to put resources, where to put the engineers and so on. And there's often a lot of pressure to get the market quickly.
Starting point is 00:09:15 You always have to make choices in engineering as to where you put your resources. And it's certainly been the case many times where privacy and security have not been the top priority. And therefore, there's been a certain loss of privacy and security in systems that have come out to the world. And it is very difficult, in my experience, to put privacy and security back or to add it to something once it's been designed and built, and especially once it's out in the world. It takes a lot of work, and it's been designed and built and especially once it's out in the world it takes a lot of work and it's just quite difficult sometimes you know the the horses left the barn kind of thing sometimes in terms of data after several years of data being collected without too many um precautions then it's very hard very hard to get control of that data afterwards so i think that's that's really the challenge is to,
Starting point is 00:10:12 for us as a community and as a society, even to prioritize these two roles of privacy and security from earlier on in the design process for any product. That's going to be an ongoing challenge forever because those trade-offs will always be there. And it is possible to do it. I've seen good examples. And unfortunately, we've do it. I've seen good examples. And unfortunately, we've seen a lot of bad examples in the past as well. Yeah. Maybe grounding this in one of the projects that you've been involved in during your long and fruitful tenure at Google, you were a key member of the team that developed and operated Zanzibar, which I understand is Google's global authorization system. For the audience who maybe may not have an understanding, and myself, could you shed
Starting point is 00:10:49 light on what is the problem that this authorization system addresses, and why is it critical for an organization like Google that manages such large number of user data and user requests? Why is it so important to this digital infrastructure of a company like Google? Sure. So the central issue addressed here is that determine whether an online user is authorized to access a digital object that's out there is central to preserving privacy. So that decision of this, you know, can this user access this object when they attempt to access it is an authorization decision. That's what an authorization system does, is make that
Starting point is 00:11:30 decision. Does this user have permission to access this object? And Zanzibar is such an authorization system. And the main challenge in building and operating Zanzibar is one of SCIM. So that authorization decision is fairly easy to implement. If you have, say, 10,000 users and a million objects, you can do that on a laptop these days, probably, in a database. But when you tackle that problem for the scale of the planet, which is at the scale that Google often operates, you know, billions of users, trillions of objects, it becomes actually quite difficult to build a consistent, correct, high-performance, highly available system that does authorization for all of those users and all of those objects
Starting point is 00:12:14 and all of those permissions, also trillions of permissions. That's what Zanzibar solves. And, you know, again, the requirements are quite stringent. So the system has to be very highly available, very reliable, because if the system like Zanzibar goes down, then all its clients that rely on it for that authorization decision need to assume the answer to every authorization question is no while the system is down because privacy is at stake. And so if the system doesn't respond, then it's essentially a huge denial of service until the system comes back. So availability
Starting point is 00:12:52 is very, very important. And in addition, the system, of course, has to be correct and consistent, because again, privacy is at stake. So if someone removes a user from a permission list, from an access control list, it's really important that other person is really removed. So if somebody doesn't want someone else to access their personal physical locations, which are relevant to physical security in some people, then you really need to make sure that the system consistently
Starting point is 00:13:23 and correctly removes that other person before reporting that it's removed. So correctness is also very important. And then performance is important because the authorization decision is really just the beginning of a task for the product that's involved, whether it be a photo serving product or a video serving product. It's going to ask that authorization decision early on when the user requests access to an object. And the answer is yes, they still have to do all the work of actually presenting the video or the photo to the user. So the latency budget of the authorization system is quite small. So the system has to be fast, it has to be correct and highly available, and it has to handle a massive load.
Starting point is 00:14:06 So at Google, they handle millions of authorization requests per second coming from all over the world. So it turns into a very large scale, reliable system that is not easy to build. So that's where we put our effort and it was a lot of fun working on it. And yeah, there's a lot riding on it, as you said. At the heart, it is protecting privacy by ensuring that only people who have permission to access digital objects are able to do so. So, you know, scalability, availability, correctness, performance, seems like a very stressful and significant undertaking, right? With, as you described it, high consequence of action because this authorization system is what enables access to, you know, these core products,
Starting point is 00:14:50 these core services that people rely on, you know, Google to authorization mechanisms in place to prevent, you know, undesired access of their data. So it seems like quite the stressful undertaking, but hopefully it was an enjoyable journey and a great sense of satisfaction and a pretty meaningful contribution as well. Yeah, you hit it on the head. I mean, as a team, we took our responsibility very, very seriously. And the engineering team was relatively small, never more than 10 people. It was four or five when I started on it. But we also rely very much on the operations side on what Google called system reliability engineers. There's a whole team of people keeping an eye on the system's operation 24 hours a day and responding within minutes, within five minutes, if there's any problem, even just some early warning of a problem.
Starting point is 00:15:45 And so it's a constant attention to detail and attention to make sure the system is healthy and attacking problems early, early on before they bring down the system, which it never did come down. So it's very highly valuable. We're very proud of the availability among all the other objectives that you mentioned.
Starting point is 00:16:04 So 5.9's availability over years of operation. But it does take a realization that it's important to people's lives and just build the engineering team and the site reliability engineering team around those goals and making sure that it's not overlooked again. Very interesting. I'd love to talk about one of your other areas of focus. I know some time back, you know, your work in introducing CloudLits to support this idea of, you know, latency sensitive or resource intensive mobile applications was impactful and obviously still in some form relevant today. You know, considering the
Starting point is 00:16:46 constantly evolving sort of computing paradigm and, you know, the emergence of various computing architectures, edge computing architectures, technologies, what are your thoughts or how do you perceive the future as it relates to mobile and edge computing in the next, say, five or 10 years? Yeah, so I think that the union of artificial intelligence with mobile and edge computing is growing and important. So the ability to do significant machine learning at the edge of a network or even in the mobile devices themselves is going to become increasingly important.
Starting point is 00:17:23 So this is something that's already becoming possible just in the last few years. Our phones can now do speech recognition of your speech and interpretation of that speech and act on commands and do all of that processing locally on your phone. This is something that wasn't possible 10 years ago. I think there are many, many interesting and important applications that will be enabled by this marriage of machine learning with mobile and edge computing. So that's something that I look forward to seeing evolve in the next few years. And where do you see us, I think we
Starting point is 00:17:55 discussed some of these, but joining these two sort of areas of focus, right, on the privacy and security piece, but also the capabilities of what we can unlock with mobile and edge computing. Where do you see these as core enablers for interesting directions in AI, privacy preserving? I think you described some of the capabilities that now we're able to harness at the edge, but do you see some of these benefits bringing these two areas of focus together as well? Yes, I think that one of the areas of work that I've been very interested in following, although I haven't done any work personally on it,
Starting point is 00:18:29 is federated machine learning, which is the idea of instead of sending training data to a central location like a data center, you keep the training data local to where it's being generated, a mobile device, for example, and federating or breaking up the machine learning task into a distributed task where each mobile device does a piece of the learning task with the data that's local to it
Starting point is 00:18:53 and belongs to the user of that mobile device, presumably. And this architecture has very strong privacy-preserving properties, and it's been worked on for years now. I think it's coming to a head. It's being used, and it has many practical applications. And again, I really like the privacy-preserving property of it. So that brings together artificial intelligence, mobile and edge computing, and privacy.
Starting point is 00:19:18 And so I think that's an important development that we'll see much more of in the coming years. Certainly. Yeah, I think alongside some very core tenants, I know privacy and security are, you know, foundational pillars of how we think about AI development and deployment. And so I think a lot of the work around federated learning has been a huge advancement to, you know, leveraging some of these core capabilities that you described, but also ensuring that we uphold, you know, these core tenants or principles of ensuring privacy and
Starting point is 00:19:49 safeguarding, you know, user data. ACM ByteCast is available on Apple Podcasts, Google Podcasts, Podbean, Spotify, Stitcher, and TuneIn. If you're enjoying this episode, please subscribe and leave us a review on your favorite platform. You know, I think these have been very interesting discussions on core technical areas of contribution over the course of your career. I'd like to turn to something quite interesting that I actually saw on your website, which is your very impressive sailing passion and background and competitive sort of experiences as well, which is quite interesting. I'm curious, could you share a bit more about your passion for sailing and perhaps how this pursuit has influenced your life or even informed your scientific interests and contributions? Yeah, thanks for asking. So I've always loved the sea
Starting point is 00:20:45 and boats. I grew up right on the coast of the Dominican Republic with the Caribbean Sea as my backyard, quite literally, maybe 30 yards from my home. And so I did a lot of fishing growing up from the shore, but also on boats and spearfishing. And so I've always loved boats. And I found sailing relatively late in life compared to many people in my 20s. There were no sailboats where I grew up. There were no pleasure craft of any kind. It was all working fishing boats. But a colleague in my first job in Silicon Valley had a beautiful 35-foot sailboat in the San Francisco Bay, which is a wonderful place to sail. There was really good wind there.
Starting point is 00:21:28 And he brought me onto his boat and taught me a few things. And I've been very passionate about sailing since then. That was in my mid-20s. And I love sailing especially because of how peaceful it is. You know, you bring up the sails, you turn off the engine, and it's very, very quiet. You're just relying on the wind to drive you. And that quiet really brings a peacefulness. And I think it's very conducive to creative thought, actually. You're asking me about connections to work.
Starting point is 00:21:55 It's not so much that I do it for work, but I do get a lot of good ideas when my mind clears out there. And so I do get a lot out of that that way as well. Just not thinking about anything else, but sailing and eventually, you know, it's very nice to just clear your mind that way. I like the competitive nature of it. I do a lot of racing on sailboats and that is not as relaxing, but it actually focuses your mind even more. So it does clear your mind of everything else, but very restful that way if you've been working
Starting point is 00:22:30 hard on something and pursuing a problem for a long time, debugging something difficult, and you go for a sailboat race, and you can't afford to be thinking about work when you're racing. And so it does really clear your mind of everything again
Starting point is 00:22:45 it's very i think in the end very conducive to creative thought because you're no longer your mind just gets a rest i think so yeah i think that i mean one one small connect yeah no i think it's great i think uh i'm generally also an advocate that you know we should all have outside of sort of our core, you know, pursuits, professional pursuits, career pursuits, academic pursuits, have these passions that we're able to pursue. And so it's great to see that it's an opportunity for you to get that sort of sense of peace and relaxation, but it also serves as an opportunity for creative thoughts, right? So it's great that it's sort of achieving multiple objectives, but that's quite exciting.
Starting point is 00:23:25 You know, I think the next thing that I actually wanted to, you know, get your thoughts on is, you know, you have this very rich experience, of course, in academia, in industry spanning both, you know, research, but also large scale, you know, highly scalable production sort of products that are used by real users. But you've also navigated these, you know, highly scalable production sort of products that are used by real users. But you've also navigated these, you know, various roles and responsibilities, you know, as a individual contributor, as a leader, how do you approach or how do you think about approaching this gap between theory and practice? You know, you described early in your career that, you know, you worked as a software engineer, went back to graduate school, pursued sort of multiple hats as a researcher, as a startup leader, as an engineer.
Starting point is 00:24:12 So what lessons have you learned from, you know, these rich experiences and how would you offer this as advice to aspiring researchers and innovators? Yeah, but partly it's a personal taste. I'm attracted both to research and to product work. Some people are quite happy to live in either of those worlds for their whole career, and that's great. But I got a taste for both early on, and I've always wanted to do both. And so sometimes when I'm doing only one of them for too long, I miss the other one, and that's led me to do both. And so sometimes when I'm doing only one of them for too long, I miss the other one.
Starting point is 00:24:45 And that's led me to switch jobs. And there are many situations where you're not able to do both in my experience. So when I'm doing only one, I miss the other one. And that switching back and forth has kept me very happy and engaged. It's perhaps not the fastest way to advance a career because there's a cost to switching jobs and focus from product to research and back. There's always a startup cost when you join a new company. But there are situations where you're able to exercise both. So I should say, for example, a company like Google faces hard enough problems, difficult enough problems.
Starting point is 00:25:27 Very often, we talk about the scaling problems in Zanzibar. Those are problems where it requires research. It requires research to solve. And so you're both working on a production system, so you get the satisfaction of impacting people on a daily basis, which is what I get out of product work, and I miss it when I don't have it. But you also get the challenge of working on a hard problem for which you don't know the answer when you first come across it, and you have to do research. You have to explore the problem and try different approaches and finally come up with a good solution.
Starting point is 00:26:01 And so that mix of research and product work is ideal for me. And I haven't always found it in a single job, which is why I've switched back and forth, but it is possible to find it. Very interesting. You know, I think another thing that's quite interesting from sort of your journey that you described is, you know, your upbringing, you're born and raised in the DR. You know, I share a similar background. I was born in Ethiopia, moved to the US at a pretty young age. So not too similar, but I think the core principle is the same. And I know in your role, outside of sort of your core engagements in industry, you serve as a board member for the CRA committee on, you know, widening participation in computing research. So
Starting point is 00:26:45 this idea of really advocating for representation, inclusion, diversity in the field. How has your personal journey sort of motivated your interest in these kind of efforts? But then more generally, how can we sort of as a computing industry or a computing society, create more opportunities for underrepresented groups? What are the things, the initiatives, the sort of things that we have to do to actually promote diversity within the industry and the field? Yes, thanks for asking. So yeah, actually it began in the late 1980s when I went back to Berkeley for my PhD, I became involved and have been involved since in efforts to increase participation of women and underrepresented groups in computing. I
Starting point is 00:27:34 became gradually aware of it certainly as I advanced from you know undergraduate to graduate school It became apparent that there were not very many Latinos around me, for example. And I also became aware of the gross underrepresentation of women in computer science, especially as you move up in seniority, the problem gets even worse. So it's an ongoing struggle. It looked like we were making progress there in the early 90s. And then there's been some steps back, unfortunately. It's very frustrating that we're still struggling with this. But it's important for the field to have a broad representation. I think the products that get created are better. They serve more people
Starting point is 00:28:18 and serve them better. We should keep working to increase that representation. I just came back from a workshop that I helped co-chair, organized by the CRA Committee on Widening Participation in Computing Research that mentions CRAWP. So it's the seventh time we put together a yearly workshop on – it's a mentoring workshop for individuals from groups that are underrepresented in computing, such as African Americans, Latinos, people with disabilities. There's also a sibling workshop that focused on women in computing research. And we bring together all expenses paid.
Starting point is 00:28:59 In this case, it was about 150 students from a broad representation of schools, not just human groups. And we bring them together with about 30 senior researchers, academics, and industry for several days of mentoring talks and one-on-one sessions. And it's one way to bridge that gap that many people feel in feeling comfortable, feeling like they belong at the graduate level. In this case, these are all graduate students. So there are other organizations dedicated to similar goals, and we need to keep working on this
Starting point is 00:29:40 because we've made a tiny bit of progress in the last 30 years, and we need to make a lot more. Certainly think it's uh it's a never-ending process but of course you know i think uh there's all the research to back that you know diverse teams as you said create diverse products are more effective more productive but i think you know starting as early as possible in the pipeline you know early as education, higher education, secondary education, primary education, I think can be sort of the key to widening access for underrepresented groups. So I think it's quite normal, but also very encouraging to see some of your work to contribute to these initiatives as well. Yeah, one of the things I've learned from these efforts over many years is that it's very important to have role models,
Starting point is 00:30:31 someone who looks like you, who feels, you know, represents you. And in that sense, I'm very gratified to have been recognized recently by the ACM as an ACM fellow. As far as I've been able to determine, it looks like I'm the first ACM fellow an ACM fellow. As far as I've been able to determine, it looks like I'm the first ACM fellow from the Dominican Republic. And of course, it feels good personally to be recognized, but it's also, I think, important to,
Starting point is 00:30:54 you know, serve as an example to show young people that it's possible to succeed in this field. And so that encourages them to pursue their career goals is to see that someone has done it as well. 100%. 100%. I think you, even for me as someone who's early in my career,
Starting point is 00:31:14 I think having folks like yourself to look up to is certainly a point of inspiration. And so we take great pride in having you join as an esteemed ACM fellow. And I'm very excited to see how many more future fellows we are able to inspire through your leadership and your mentorship as well. So very exciting. you've had such a rich career. You know, we're seeing so many rapid developments in technology, whether it be from a compute point of view, whether it be from advancements in software and AI and applications.
Starting point is 00:31:53 What are some emerging trends or challenges in computer science or in software engineering that you find particularly interesting or perhaps even concerning or challenging? And what is sort of your call to action or encouragement for those who may be interested in contributing to addressing these challenges or opportunities?
Starting point is 00:32:15 We've touched on some of this before, but let me come at it from this point of view here that you just brought up. I think that the challenge of preserving privacy has been with us for a long time, but it continues to be with us, and it might be exacerbated by the increasing volumes of data we collect and also the advances in artificial intelligence and its great data needs for training.
Starting point is 00:32:42 And so we mentioned before this combination of doing machine learning at the edge of a network and in mobile devices themselves, and the area known as federated learning, which keeps the training data at the point of creation, for example, mobile devices, instead of sending it to a faraway data center for central processing. I think that architecture, that structure, is fundamentally more privacy-preserving than sending data to a central location, keeping it federated, keeping it in the source,
Starting point is 00:33:18 near the source where the devices still belong to the person who generates the data, for example, and doing the learning there without letting the raw data escape. That has very strong privacy-preserving properties. And I think that I find that whole area of work very interesting and promising. And I think, like I said before, it's important to build in privacy into your systems and having a structure of data processing that's fundamentally
Starting point is 00:33:47 more privacy preserving than others is a good step forward. So the challenge is there. It's going to get harder. There's a privacy challenge. And I see hope in this federated learning, in particular, at the edges of the network. Well, I think you captured it well. There's a challenge, but also great promise and opportunity. You know, as we sort of round off this chat,
Starting point is 00:34:11 I'd love to sort of give you an opportunity to share, you know, some pieces of what we call bites of either advice or guidance. There are many of those in the audience who are aspiring entrepreneurs, engineers, scientists. And so, you know, as you think about your journey, as you described, the young boy who is interested in sort of creating solutions to serve people, and over the course of your rich experience in academia and industry, what pieces of guidance or recommendation or life advice would you like
Starting point is 00:34:45 to share to those who are aspiring to reach your levels? Well, I think a very useful thing to realize, which some people may not when they're still young and being formed in their careers, is what I mentioned before that even the most successful people in our field or any field have faced their own challenges. And it's not always this primrose path to, to, to success. People hit challenges. They have setbacks. They have to rethink what they want to do, change direction. I certainly changed direction a number of times as we've talked about several times. And I think that knowing that that is a very common, if not the norm should give people encouragement.
Starting point is 00:35:27 I mean, you should always try to persevere. There will always be setbacks in careers and your work and life in general. And just having the perseverance, the patience to take a step back and see if there's some other direction that will be more fruitful that you should pursue. In my case, you know, I went from electrical engineering to computer science, from hardware to software, and I've gone back and forth from research to product development and a combination of both. And I think that's brought me, you know, great enjoyment to always to pursue my interests and not be discouraged by perhaps hitting a wall at some point and feeling like I'm not being creative anymore in that particular pursuit. And that changing direction allowed me to get new inspiration and new motivation.
Starting point is 00:36:17 So, yes, stay flexible and realize that other people have also had to change direction and take indirect paths to their careers and success. I think those are really great points. There's no one path to success, and there will always be setbacks, but focus on getting back up, persevering, and being patient with yourself. So I think those are wonderful pieces of advice to part with. I think it's been a very interesting discussion, and it's been a great pleasure to have you on ByteCast. Ramon, thank you so much for joining us.
Starting point is 00:36:51 Thank you very much for having me on the podcast. I enjoyed talking to you. ACM ByteCast is a production of the Association for Computing Machinery's Practitioner Board. To learn more about ACM and its activities, visit acm.org. For more information about this and other episodes, please visit our website at learning.acm.org. That's learning.acm.org.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.