WORDS OF WISDOM

January 28, 2019


If you are like me, you would hope that elected “public servants” at the federal level are as smart if not smarter than the average American.  Is that not too much to ask?  Coming home just now I listened to an XM Radio broadcast from the White House Media Room.  Questions and answerers, or the lack thereof, addressing difficulties with our immigration laws and what the Dems and Pubs will do in the next eighteen (18) days to fix it. If no fix results, we are shut down for another period of time—an expensive period of time.   Members of the media, Congress and the Oval Office always address the “broken immigration” problem and promise to fix it although they have not done so for decades.  The Oval Office tells us a border wall, a fence, a barrier, etc. will solve this problem.  I have no real idea. All I know is we have a back and forth that is very detrimental to our country and gets nothing accomplished.  In the southern part of our country we call this a pissing contest. Ego vs Ego.

I long for words of wisdom from our dumb-ass politicians realizing they are merely politicians and not statesmen. With this in mind, I sought out others noted for their wisdom.  Here is a small portion of what I found:

  • Accept challenges so that you can feel the exhilaration of victory—George S. Patton.
  • If you must speak ill of another, do not speak it, write it in the sand near the water’s edge—Napoleon Hill.
  • The best way to make your dreams come true is to wake up—Paul Valery.
  • Nothing is so frightening as ignorance in action—Johann Wolfgang von Goethe.
  • Two men working as a team will produce more than three men working as individuals—Charles P. McCormick.
  • Darkness cannot drive out darkness: only light can do that. Hate cannot drive out hate, only love can do that—Dr. Martin Luther King Jr.
  • Nothing is more dangerous than an idea, when you only have one idea—Emile-Auguste Chartier.
  • An ambitions man can never know peace—J. Krishnamurti.
  • Never leave well enough alone—Raymond Loewy.
  • You may be disappointed if you fail, but you are doomed if you don’t try—Beverly Sills.
  • Where would the gardener be if there were no weeds? —Chuang Tsu.
  • Success is not final, failure is not fatal: it is the courage to continue that counts—Winston Churchill.
  • We see things not as they are but as we are—H. M. Tomlinson.
  • Getting along with others is the essence of getting ahead, success being linked with cooperation—William Feather
  • Ability may get you to the top, but it takes character to keep you there—John Wooden.
  • I’m not one of those whom expressing opinion confine themselves to facts—Mark Twain.
  • In great matters, men show themselves as they wish to be seen; in small matters, as they are—Gamaliel Bradford.
  • Work like you don’t need the money; love like you’ve never been hurt; dance like nobody’s watching—Satchel Paige.
  • The only true wisdom is in knowing you know nothing—Socrates.
  • If what you did yesterday seems big; you haven’t done anything today—Lou Holtz.
  • To conquer without risk is to triumph without glory—Pierre Corneille.
  • The trouble with having an open mind, of course, is that people will insist on coming along and trying to put things in it—Terry Pratchett.
  • The strength of a nation derives from the integrity of the home—Confucius.

As you can see, we are a long way from wisdom relative to our three branches of government.

COMPUTER SIMULATION

January 20, 2019


More and more engineers, systems analysist, biochemists, city planners, medical practitioners, individuals in entertainment fields are moving towards computer simulation.  Let’s take a quick look at simulation then we will discover several examples of how very powerful this technology can be.

WHAT IS COMPUTER SIMULATION?

Simulation modelling is an excellent tool for analyzing and optimizing dynamic processes. Specifically, when mathematical optimization of complex systems becomes infeasible, and when conducting experiments within real systems is too expensive, time consuming, or dangerous, simulation becomes a powerful tool. The aim of simulation is to support objective decision making by means of dynamic analysis, to enable managers to safely plan their operations, and to save costs.

A computer simulation or a computer model is a computer program that attempts to simulate an abstract model of a particular system. … Computer simulations build on and are useful adjuncts to purely mathematical models in science, technology and entertainment.

Computer simulations have become a useful part of mathematical modelling of many natural systems in physics, chemistry and biology, human systems in economics, psychology, and social science and in the process of engineering new technology, to gain insight into the operation of those systems. They are also widely used in the entertainment fields.

Traditionally, the formal modeling of systems has been possible using mathematical models, which attempts to find analytical solutions to problems enabling the prediction of behavior of the system from a set of parameters and initial conditions.  The word prediction is a very important word in the overall process. One very critical part of the predictive process is designating the parameters properly.  Not only the upper and lower specifications but parameters that define intermediate processes.

The reliability and the trust people put in computer simulations depends on the validity of the simulation model.  The degree of trust is directly related to the software itself and the reputation of the company producing the software. There will considerably more in this course regarding vendors providing software to companies wishing to simulate processes and solve complex problems.

Computer simulations find use in the study of dynamic behavior in an environment that may be difficult or dangerous to implement in real life. Say, a nuclear blast may be represented with a mathematical model that takes into consideration various elements such as velocity, heat and radioactive emissions. Additionally, one may implement changes to the equation by changing certain other variables, like the amount of fissionable material used in the blast.  Another application involves predictive efforts relative to weather systems.  Mathematics involving these determinations are significantly complex and usually involve a branch of math called “chaos theory”.

Simulations largely help in determining behaviors when individual components of a system are altered. Simulations can also be used in engineering to determine potential effects, such as that of river systems for the construction of dams.  Some companies call these behaviors “what-if” scenarios because they allow the engineer or scientist to apply differing parameters to discern cause-effect interaction.

One great advantage a computer simulation has over a mathematical model is allowing a visual representation of events and time line. You can actually see the action and chain of events with simulation and investigate the parameters for acceptance.  You can examine the limits of acceptability using simulation.   All components and assemblies have upper and lower specification limits a and must perform within those limits.

Computer simulation is the discipline of designing a model of an actual or theoretical physical system, executing the model on a digital computer, and analyzing the execution output. Simulation embodies the principle of “learning by doing” — to learn about the system we must first build a model of some sort and then operate the model. The use of simulation is an activity that is as natural as a child who role plays. Children understand the world around them by simulating (with toys and figurines) most of their interactions with other people, animals and objects. As adults, we lose some of this childlike behavior but recapture it later on through computer simulation. To understand reality and all of its complexity, we must build artificial objects and dynamically act out roles with them. Computer simulation is the electronic equivalent of this type of role playing and it serves to drive synthetic environments and virtual worlds. Within the overall task of simulation, there are three primary sub-fields: model design, model execution and model analysis.

REAL-WORLD SIMULATION:

The following examples are taken from computer screen representing real-world situations and/or problems that need solutions.  As mentioned earlier, “what-ifs” may be realized by animating the computer model providing cause-effect and responses to desired inputs. Let’s take a look.

A great host of mechanical and structural problems may be solved by using computer simulation. The example above shows how the diameter of two matching holes may be affected by applying heat to the bracket

 

The Newtonian and non-Newtonian flow of fluids, i.e. liquids and gases, has always been a subject of concern within piping systems.  Flow related to pressure and temperature may be approximated by simulation.

 

The Newtonian and non-Newtonian flow of fluids, i.e. liquids and gases, has always been a subject of concern within piping systems.  Flow related to pressure and temperature may be approximated by simulation.

Electromagnetics is an extremely complex field. The digital above strives to show how a magnetic field reacts to applied voltage.

Chemical engineers are very concerned with reaction time when chemicals are mixed.  One example might be the ignition time when an oxidizer comes in contact with fuel.

Acoustics or how sound propagates through a physical device or structure.

The transfer of heat from a colder surface to a warmer surface has always come into question. Simulation programs are extremely valuable in visualizing this transfer.

 

Equation-based modeling can be simulated showing how a structure, in this case a metal plate, can be affected when forces are applied.

In addition to computer simulation, we have AR or augmented reality and VR virtual reality.  Those subjects are fascinating but will require another post for another day.  Hope you enjoy this one.

 

 

WEARABLE TECHNOLOGY

January 12, 2019


Wearable technology’s evolution is not about the gadget on the wrist or the arm but what is done with the data these devices collect, say most computational biologist. I think before we go on, let’s define wearable technology as:

“Wearable technology (also called wearable gadgets) is a category of technology devices that can be worn by a consumer and often include tracking information related to health and fitness. Other wearable tech gadgets include devices that have small motion sensors to take photos and sync with your mobile devices.”

Several examples of wearable technology may be seen by the following digital photographs.

You can all recognize the “watches” shown above. I have one on right now.  For Christmas this year, my wife gave me a Fitbit Charge 3.  I can monitor: 1.) Number of steps per day, 2.) Pulse rate, 3.) Calories burned during the day, 4.) Time of day, 5.) Number of stairs climbed per day, 6.) Miles walked or run per day, and 7.) Several items I can program in from the app on my digital phone.  It is truly a marvelous device.

Other wearables provide very different information and accomplish data of much greater import.

The device above is manufactured by a company called Lumus.  This company focusses on products that provide new dimensions for the human visual experience. It offers cutting-edge eyewear displays that can be used in various applications including gaming, movie watching, text reading, web browsing, and interaction with the interface of wearable computers. Lumus does not aim to produce self-branded products. Instead, the company wants to work with various original equipment manufacturers (OEMs) to enable the wider use of its technologies.  This is truly ground-breaking technology being used today on a limited basis.

Wearable technology is aiding individuals of decreasing eyesight to see as most people see.  The methodology is explained with the following digital.

Glucose levels may be monitored by the device shown above. No longer is it necessary to prick your finger to draw a small droplet of blood to determine glucose levels.  The device below can do that on a continuous basis and without a cumbersome test device.

There are many over the world suffering from “A-fib”.  Periodic monitoring becomes a necessity and one of the best methods of accomplishing that is shown by the devices below. A watch monitors pulse rate and sends that information via blue tooth to an app downloaded on your cell phone.

Four Benefits of Wearable Health Technology are as follows:

  • Real Time Data collection. Wearables can already collect an array of data like activity levels, sleep and heart rate, among others. …
  • Continuous Monitoring. …
  • Predict and alerting. …
  • Empowering patients.

Major advances in sensor and micro-electromechanical systems (MEMS) technologies are allowing much more accurate measurements and facilitating believable data that can be used to track movements and health conditions on any one given day.  In many cases, the data captured can be downloaded into a computer and transmitted to a medical practitioner for documentation.

Sensor miniaturization is a key driver for space-constrained wearable design.  Motion sensors are now available in tiny packages measuring 2 x 2 millimeters.  As mentioned, specific medical sensors can be used to track 1.) Heart rate variability, 2.) Oxygen levels, 3.) Cardiac health, 4.) Blood pressure, 5.) Hemoglobin, 6.) Glucose levels and 7.) Body temperature.  These medical devices represent a growing market due to their higher accuracy and greater performance.  These facts make them less prone to price pressures that designers commonly face with designing consumer wearables.

One great advantage for these devices now is the ability to hold a charge for a much longer period of time.  My Fitbit has a battery life of seven (7) days.  That’s really unheard of relative to times past.

CONCLUSION:  Wearable designs are building a whole new industry one gadget at a time.  MEMS sensors represent an intrinsic part of this design movement. Wearable designs have come a long way from counting steps in fitness trackers, and they are already applying machine-learning algorithms to classify and analyze data.


My posts are not necessarily aimed to provide public service announcements but I just could not pass this one up.  Take a look.

On November first of 2018, Honeywell released a study founding that forty-four percent (44%) of the USB drives scanned by their software at fifty (50) customer locations contained at least one unsecured file.  In twenty-six percent (26%) of those cases, the detected fire was capable of causing what company officials called “a serious disruption by causing individuals to lose visibility or control of their operations”.  Honeywell began talking up its SMX (Secure Media Exchange) technology at its North American user group meeting in 2016, when removable media like flash drives were already a top pathway for attackers to gain access to a network. SMX, launched officially in 2018  is designed to manage USB security by giving users a place to plug in and check devices for approved use. The SMX Intelligence Gateway is used to analyze files in conjunction with the Advanced Threat Intelligence Exchange ( Exchange (ATIX), Honeywell’s threat intelligence cloud. Not only has SMX made USB use safer, but Honeywell has gained access to a significant amount of information about the methodology of attacks being attempted through these devices.

“The data showed much more serious threats than we expected,” said Eric Knapp, director of strategic innovation for Honeywell Industrial Cyber Security. “And taken together, the results indicate that a number of these threats were targeted and intentional.” Though Honeywell has long suspected the very real USB threats for industrial operators, the data confirmed a surprising scope and severity of threats, Knapp said, adding. “Many of which can lead to serious and dangerous situations at sites that handle industrial processes.”

The threats targeted a range of industrial sites, including refineries, chemical plants and pulp and paper facilities around the world. About one in six of the threats specifically targeted industrial control systems (ICSs) or Internet of Things (IoT) devices. (DEFINITION OF IoT: The Internet of Things (IoT) refers to the use of intelligently connected devices and systems to leverage data gathered by embedded sensors and actuators in machines and other physical objects. In other words, the IoT (Internet of Things) can be called to any of the physical objects connected with network.)

Among the threats detected, fifteen percent (15%) were high-profile, well-known issues such as Triton, Mirai and WannaCry, as well as variants of Stuxnet. Though these threats have been known to be in the wild, what the Honeywell Industry Cyber Security team considered worrisome was the fact that these threats were trying to get into industrial control facilities through removable storage devices in a relatively high density.

“That high-potency threats were at all prevalent on USB drives bound for industrial control facility use is the first concern. As ICS security experts are well aware, it only takes one instance of malware bypassing security defenses to rapidly execute a successful, widespread attack,” Honeywell’s report noted. “Second, the findings also confirm that such threats do exist in the wild, as the high-potency malware was detected among day-to-day routine traffic, not pure research labs or test environments. Finally, as historical trends have shown, newly emerging threat techniques such as Triton, which target safety instrumented systems, can provoke copycat attackers. Although more difficult and sophisticated to accomplish, such newer threat approaches can indicate the beginnings of a new wave of derivative or copycat attacks.”

In comparative tests, up to eleven percent (11%) of the threats discovered were not reliably detected by more traditional anti-malware technology. Although the type and behavior of the malware detected varied considerably, trojans—which can be spread very effectively through USB devices—accounted for fifty-five percent (55%) of the malicious files. Other malware types discovered included bots (eleven percent), hack-tools (six percent) and potentially unwanted applications (five percent).

“Customers already know these threats exist, but many believe they aren’t the targets of these high-profile attacks,” Knapp said. “This data shows otherwise and underscores the need for advanced systems to detect these threats.”

CONCLUSION:  Some companies and organizations have outlawed USB drives entirely for obvious reasons.  Also, there is some indication that companies, generally off-shore, have purposely embedded malware within USB drives to access information on a random level.  It becomes imperative that we take great care in choosing vendors providing USB drives and other external means of capturing data.  You can never be too safe.

DECISION PARALYSIS

January 5, 2019


The idea for this post came from “Plant Engineering Magazine”, December 2018.

OK, now what do I do?  Have you ever heard yourself muttering those words?  Well, I’ve been there—done that—got the “Tee shirt”.  We all have at one time been placed or have placed ourselves in the decision-making process with a certain degree of paralysis.  If you have P and L responsibilities, own a house, contemplate the purchase of any item that will impact your checkbook or finances, you’ve been there. Let’s take a look at eight (8) factors that may cause decision paralysis.

  1. RAPID CHANGE: The manner in which we conduct our daily lives has changed dramatically over the past few years. Digitalization is sweeping across the domestic and commercial world changing the way we do just about everything. The way we shop, bank, and travel can be accomplished on-line with delivery systems reacting accordingly.  Everyone, including the
    “ baby-boomers” need to get on-board with the changes.
  2. COMPLEX PROCESSES: Old-school processes are inadequate for managing today’s very complex issues. Our three sons and all of our grandchildren have probably never purchased a stamp.  Everything is accomplished on line including paying the bills.  There will come a time when every acquisition will start online.  One of the most fascinating web sites if U-tube.com.  I have never been faced with a “fix-it” problem that is not described on U-tube. It is a valuable resource.  Get ready for digitization now—its coming.
  3. DEMANDING CUSTOMERS: Today’s consumers have high expectations for attentive service, high value, and timely communication. It is no longer enough to be content with trusting the process will deliver value for the customer.  My greatest complaint with COMCAST is customer service.  The product itself is adequate but their customer service is one of the most pitiful on the planet.
  4. PHYSICAL THREATS: I do NOT mean burglars and home invasion.  Aging infrastructure systems, including our power grid, air traffic control, bridges, railways, pose significant threats to reliable communication, transportation and safety in general.  In-house and in-store equipment may not be sophisticated enough to handle growing demands brought on by our “digital world”.  Upgrades to physical equipment and programs driving that equipment become more frequent as we try to make decisions and choices.
  5. TOO MANY CHOICES: While choices are really nice, too many options can present a real burden for the decision maker.  We should and must prioritize the growing list of choices and choose the most viable options.  This includes possible vendors and companies offering choices.
  6. CYBER THREATS: We MUST incorporate systems to protect digital infrastructure.   If you read the literature, you find we are losing that battle. It’s almost to the point that every household needs an IT guy.
  7. DATA OVERLOAD: “Big data” is swamping us with information at an ever-growing rate due to an endless list of features and functionality relative to digital devices. As you well know, CDs and DVDs can now be purchased with terabyte capabilities.  Necessity is the mother of invention and this need will only grow.
  8. TIGHT BUDGETS AND FINANCES: In most cases, making the proper and correct decision will require some cost. Once again, this can cause delays in trying to choose the best options with the maximum payback in time, money and effort.

There may be others factors depending upon the situation or the decision you must make on a personal basis.    Let us now consider steps that just might ease the pain of decision-making.

  • EARLY DETECTION OF A PROBLEM: There probably are early warning signs that a problem is coming necessitating a solution. It is a great help if you can stay attuned to warnings that present themselves.  It gives you time to consider a possible solution.
  • SCHEDULE AND CONSIDER YOUR “FIX” EARLY: If at all possible, solve the problem before it becomes a panic situation. Have a solution or solutions ready to incorporate by becoming pro-active.
  • MONITOR THE FIX: Make sure you are solving the problem and not a manifestation of the problem.  We call this “root-cause-analysis”.
  • TRACK YOUR COSTS: Know what it costs to resolve the problem.
  • MAINTAIN RECORDS AND CREATE A PAPER TRAIL: Some times the only way you know where you are is to look back to see where you have been!