Difference between revisions of "Team:UNOTT/HP/Silver"

Line 55: Line 55:
 
<br> </br>
 
<br> </br>
 
<div  class="div1" style=" background-color: #ffffff;">
 
<div  class="div1" style=" background-color: #ffffff;">
<a href="https://2017.igem.org/File:T--UNOTT--Recording.zip">Download the full audio for the interview here</a>
+
<center> <a href="https://2017.igem.org/File:T--UNOTT--Recording.zip"> <font face="consolas"> Download the full audio for the interview here </font> </a>
<center> <h2> <font face="consolas"> <font face="consolas"> Transcript: </font> </h2> </font> </center>
+
<h2> <font face="consolas"> <font face="consolas"> Transcript: </font> </h2> </font> </center>
 
<p><font face="consolas">  Vikram: Let's begin the interview with a little bit of formalities, I'm Vikram and I will be taking this interview. I am the modeller for the iGEM of Nottingham. What is your name, your role and responsibilities? </font></p>
 
<p><font face="consolas">  Vikram: Let's begin the interview with a little bit of formalities, I'm Vikram and I will be taking this interview. I am the modeller for the iGEM of Nottingham. What is your name, your role and responsibilities? </font></p>
 
<p><font face="consolas"> Tinesh: Hi Vikram. My name is Tinesh, my current role, I have 3 roles at the moment, I am the vice president of a Californian based digital threat management company in London, where I run both the business development function and delivery function across the UK. In addition, I sit on the board of non-exec director for a British cyber company called State Private, and they are a business-consumer email encryption company. And finally, I own my own company Decipher Cyber which is a professional services and innovation led technology company. </font></p>  
 
<p><font face="consolas"> Tinesh: Hi Vikram. My name is Tinesh, my current role, I have 3 roles at the moment, I am the vice president of a Californian based digital threat management company in London, where I run both the business development function and delivery function across the UK. In addition, I sit on the board of non-exec director for a British cyber company called State Private, and they are a business-consumer email encryption company. And finally, I own my own company Decipher Cyber which is a professional services and innovation led technology company. </font></p>  

Revision as of 18:04, 1 November 2017



 

 

HUMAN PRACTICES: SILVER

 



Introduction

As part of our human practices, we aimed to educate the public about synthetic biology and our own project. We accomplished this through talking to the public at our University open days, news article interviews, and 'Tech Nottingham' public talks.

Also, we wanted some feedback from experts working in the field that our project would be applied to. After weeks of persistence, we managed to get an interview with an industry expert of 14 years, who personally came from London to investigate our work.

Industry Expert Interview



Download the full audio for the interview here

Transcript:

Vikram: Let's begin the interview with a little bit of formalities, I'm Vikram and I will be taking this interview. I am the modeller for the iGEM of Nottingham. What is your name, your role and responsibilities?

Tinesh: Hi Vikram. My name is Tinesh, my current role, I have 3 roles at the moment, I am the vice president of a Californian based digital threat management company in London, where I run both the business development function and delivery function across the UK. In addition, I sit on the board of non-exec director for a British cyber company called State Private, and they are a business-consumer email encryption company. And finally, I own my own company Decipher Cyber which is a professional services and innovation led technology company.

Vikram: How do you think we can improve our idea or make it more robust?

Tinesh: Having seen what I seen today, I don't necessarily think there are any improvements to made in the actual security element of it because from what I've seen it sits within the cyber from a label perspective but from a delivery perspective it doesn't because it's bacteria and it's impenetrable so I don't think we can improve on that but we will find that out soon enough

Vikram: What things are you looking for when you look at key coli

Tinesh: For me, it would be applications for how we use this in a cooperate environment and as well, as potentially in an everyday scenario with an everyday person. So those 2 areas are two main areas which are key for me.

Vikram: Do you think bacteria in a physical device is something people would be happy with? Do you think its safe? How could we improve safety?

Tinesh: As long as the delivery model is easy to use and can be adopted by everyday people, that's my only concern. As far as the safety of it, it's contained in a capsule and as there are no issues with the capsule breaking and so on and so forth. But as long as its easily adoptable by an end user, I don't see a challenge.

Vikram: If you were using the device, would you want to know everything about the science or would you be happy if someone told you it was safe?

Tinesh: Myself, someone from cyber and someone from sciences would want to know the ins and outs but I think for most cooperates and commercial organisations, certainly mid-sized organisations, not really. First off, they wouldn't have people who understand science and the science behind it so it would be out their comfort zone so they would bring people in but, from a cyber perspective, if it hits certain markers, helps mitigates certain risks and adds extra measure of security control whether that be physical, building, access or authentication, then they wouldn't necessarily need to know the science. they would be comfortable to see it in a live environment, seeing it doing it's thing, it would be happy.



From this interview, the team received a lot of insight into how Key.Coli could be taken out of the lab environment and be used in the real world. The discussion helped bring up the importance of industry applications of Key.Coli, which the team hadn't considered until then, which later on included replacing the traditional 9-5 check-in system, potentially replace car keys and as a random number generator for cryptographic purposes. Furthermore, the experience helped us to secure meetings with other clients such as Fujitsu, who the team intends on seeing after the Jamboree.



Furthermore, the team was able to get an outsider's perspective on Key.Coli, which helped raise awareness on issues such as the ease of our key design and safety. This lead to improvements on the key design and us to consider using some measures to kill the bacteria in case of exposure.



Tech Nottingham talk

This involved going to a Tech Nottingham event and talking to industry experts and technology enthusiasts about Key.Coli. For 5 minutes, a member from the team spoke to the room and received questions. Generally speaking, the reception to Key.Coli was mixed: speaking afterwards, some people seemed very enthusiastic about using bacteria as a password system whereas other people were highly critical and asked questions, to which the team answered. After the Question Answer session, the reception was far more positive.



This experience was valuable as it gave the team practice on public speaking and conducting a public question session. This is invaluable as at the Jamboree, the team will have to exercise the same skills during the presentation. Furthermore, the public brought up a lot of concerns about safety and practical issues such as what if someone steals the capsule, which made the team think about how they could tackle these issues more effectively. And lastly, it allowed the team to gauge public interest in the project, which fortunately, was very much so.