Drones for Safety

No matter what time or on what network you turn into for your news there is an inevitable news thread that you are always going to see without fail. It usually goes something like this ‘such and such drone, inflicted, such and such, damage against such and such people. The bottom line is that there is always the reality that is going around is that the fact that drones are one in the same with death and breaking of lots of things in the world today. I know it you know it, the American people know it and its a reality that is that unless things are different that will be the legacy of an otherwise amazing technology.

drone2The reality is that as is the case with all new technology in the United States is that it comes through the military and if there is an amazing technology you can imagine that it had a military application prior to its civilian one. Today we are fortunate enough to bare witness to something in this regard that is coming primary as the result of a military application but in actuality is going to have the ability to actually save many lives, while not being able to inflict any damage against lives. Sounds a little to good to be a drone, broad horizon ahead that is coming on the wings of angels in drone form.

The way it is done is that the military acknowledged the reality that there are over 10 million submerged line mines in the crust of the earth just waiting to inflict damage against a civilian years after a conflict took place in the region. So every year there are hundreds if not thousands of people who fall victim to this reality every year and sadly lose their lives or are badly injured as a result of their interaction with the affected region. So what are we to do, because there has been up until now a catch 22 that was presented to anyone who wanted to remove these because they posed a threat to human lives no doubt, however in order to remove them you had to do so with the careful and close interaction with human lives. So what the drones of tomorrow are going to do is nothing short of a miracle. The way they work is pretty remarkable.

drone 3First, they determine what area is most likely to be affected by past armed conflicts and thus likely to have the presence of land mines. Next it runs a sensor array which sweeps the area and detects through metal detection where the presence of land mines are. Next what it does is it allows the drone to place a tennis ball sized explosive over the region and them blammy, its bye bye Mr.Landmine.

This is already having a huge impact on what it has already done and is only going to continue to save lives. The initial history of the drone story may be marred with violence and destruction, but hopefully this new tech can be the healing first step towards allowing for a more peaceful and prosperous world with this great innovation.


The Internet of Things in the World of Medicine

While the internet of things may posit both positive and negative contributions to the world of tech-savvy security, the medical realm is perhaps where this kind of technology can be the most helpful. After all, the United States is beginning the burdensome process of supporting its baby boomer generation, and the major rise in members of the 65-and-over club is driving new development in medical tech. Devices that connect patients with caregivers ad help machines get better at learning how to read sensors are more needed than ever.

connected medGrand View Research recently published a report stating that “high, unmet medical needs” of seniors are likely to trigger the increased use of remote patient monitoring by healthcare organizations. These organizations’ efforts to meet the needs of their patients will likely sustain the market for the “Internet of Medical Things” for the next decade. Considering 2022 is when the IoT sector is expected to explode (industry experts have predicted that the market will reach about $410 billion), it’s likely the market won’t be losing momentum anytime soon. The sector’s medical devices are projected to drive a compound annual growth rate of 28.3 percent between now and 2022.

What kind of devices can you expect to see gaining momentum? Think Fitbits and Apple Watches that can read your heart rate, activity levels, and sleep cycles. Google is even developing contact lenses that can read your glucose levels. mc10 is coming out with a biometric stamp the size of a band-aid that can report a person’s vitals to connected devices and doctors. Developers at the University of Buffalo are creating a pendant that can analyze chewing and swallowing sounds to determine what wearers are eating and alert them when they’ve started to overeat or eat unhealthily.

While these devices may be helpful for those hoping to maintain good health, Ian Shakil notes that it’s important to realize that these devices are only able to provide so much assistance.

“The Internet of Medical Things will continue to evolve and deliver value by getting the complexities of technology out of the way and connecting- or better yet, reconnecting- doctors with patients,” said Shakil, CEO of Audmedix.

jewman“Augmendix’s service is optimally designed to deliver the highest quality patient notes resulting in improved patient care and pay or reimbursement,” he explained.

Shakil’s company estimates that physicians spend at least 70 percent of their time reading documentation before they started sing their service. “This new ly reclaimed time that can be repurposed in-clinic for other administrative tasks or even to see more patients,” he explained.

According to Joel Cook, real-time location systems posit one of the original uses for the IoMT. Cook is a senior healthcare solutions manager at Stanley Healthcare.

“Using wireless RTLS devices, staff and family members can trace a patient’s entire journey through the hospital- from the waiting room to surgery to post-op, and how long they spend in each area,” Cook explained.

RTLS devices can be leveraged for asset management to locate equipment and monitor for temperature-sensitive substances as well.

Keith Cooper, CEO of Constant Therapy, explained that IoMT devices can also help in terms of collecting data about which medicines work for which kinds of people:

“By collecting anonymized data from every person’s interaction with our therapy programs, we can analyze what works ankd what doesn’t work for each type of individual,” he said.

future tech2

Industry Experts Offer Tech Predictions

Let’s face it: the technological revolution is upon us. Computers aren’t just in your pocket, they’re everywhere, and there’s plenty more to come. Not only that, but tech is infiltrating all other industries from food to agriculture to dynamic integrated business solutions to healthcare to military applications (autonomous killer robots are almost ready to be deployed by the Russian government.) In light of all of this unprecedented change, many industry analysts have come forward with their own ideas regarding what to expect from the tech explosion that is our modern world. So buckle up baby, because we are in for a wild ride full of ups and downs, robots and connectivity.

future techTake the predictions of industry insider Sanjay Ramendong for example. According to Ramendong, we can expect the distinction between “the tech industry” and “industry in general” to fade. Ramendong attributes this to “a massive price reduction in computing technologies and an upgrade in terms of portability of all widely used devices.”

“Although our capability is improving, we often neglect the ethical questions surrounding our advancements,” Ramendong continued. “Consider the issue of artificial intelligence; do we make the helpful robots cuter or capable of love? Should we purposefully limit their consciousness?”

Futurist and professor of integrated technologies at MIT Dr. Holly Sass has written a variety of books on the subject of new devices in a world where relationships between humans and technology are constantly forming and being rewritten:

“Virtual reality will change the experience of livestock in a way that most people haven’t considered. Assume a cow is wearing a virtual reality helmet; he will forget he is at a farm and can instead live a reality in which he is a swashbuckling pirate or an astronaut for all I know.”

“From an animal rights perspective, does it really matter how you treat an animal that’s wearing a virtual reality helmet?” she continued. “The answer to that question depends on a variety of factors, from how developed and compelling VR technology comes to how good the video is to the philosophical changes that occur in humankind in the time between VR helmets for people and VR helmets for cows.”

future tech3Industry analyst Ken Chambers writes for Technology Magazine and has spoken at multiple conferences regarding the nature of what he calls “Gaya” or technology-based natural solutions:

“There’s no reason to rule out smart dirt, perhaps called iDert or Dtech when the time comes for branding and market development. There are a variety of promising and well-funded startups devoted to making computers for trees. These computers will make it possible for trees to enter chat rooms, possibly giving a voice to the voiceless and fueling environmental discussions in the future.”

Whether or not these analysts are real, there is a high probability that computers will play a larger role in our lives and perhaps directly in our bodies. So let’s be honest, now is the time to ask ourselves not if but when and if when, but how will we prepare for these changes?

women who code

The Story Behind Women Who Code

More than 50,000 members strong, Women Who Code (WWC) is one of the largest non-profit organizations advocating for the inclusion of women in the technology sector. Unfortunately for female coders and developers, their career path represents an occurrence that “breaks the mold” in the tech industry, and that can cause problems that range from annoying to career-ending. WWC pushes for changes in policy and private business that support equality and fairness in terms of creating opportunities for women to successfully contribute to the tech realms, and organizes and supports numerous local chapters across the world.

womenThe organization wasn’t always the goliath public service advocate that it is today; it has grown tremendously quickly since it was founded in 2011. WWC is headquarted in San Francisco but has built a significant presence in Washington D.C. In an effort to combat companies waging an internal war to maintain that status quo in the tech arena, the WWC brings women in tech as well as others who are interested in the field together into a collusive group.

Together with Girls in Tech and Women Who Tech, WWC has joined the rank of non-profits committed to providing coding sessions, networking hours and other community-driven events that enable women to expand and strengthen their careers in the technology industry.

According to Women Who Code higher-up percival, “our members are Women Who Code’s greatest assets. By focusing on their needs as we can empower them to become leaders and even super stars in their field. They can then in turn help to inspire and support other women, and the process continues.”

rosy coderPercival went on to explain that chapter founders and leaders do not generally receive payment and instead work as volunteers that contribute their own time and expertise. This altruism is the underlying engine that powers WWC.

Another interesting aspect of the company’s foundation: each WWC chapter has little oversight and is free to become whatever is most helpful to the women in tech in its district. These chapters, which span from India to Seattle, are connected using a cloud-based communications platform called Slack. Slack, an two-year-old startup-superstar recently valued in the billions, has apparently served as the organization’s central nervous system.

Gibilterra oversees the approximately 3,500-person D.C. WWC chapter, and recently spoke about her experience leading the group and building it into what it currently is: “The size of the city, I think, really helps decide what sort of organization will be formed.” According to Gibilterra, her chapter of WWC actually started without the brand as an initiative to find a place and a community where Gibilterra and others could code after work.

When a causal coffee shop meeting slowly turned into something much larger, Gibilterra’s coding group mutated from casual encounter to MeetUp worthy, and after a few months transformed into its own WWC chapter.

“Members sharing their experiences and inviting friends and co-workers through social media and in conversation led to huge growth,” Gibilterra explains, admitting she didn’t make any real effort to market the female-led coding meetings as such.

At this point in time, there are roughly 140 WWC directors all around the world.

“The fact that we’ve been able to expand so rapidly shows that there is a real need for the support that Women Who Code offers. There are brilliant women around the world that are doing amazing things in the tech industry. Our job is to build a community that connects them to one another, creating a sense of belonging and community to support them on their career path,” Percival concluded.

lil flip

Flip Phone Making a Comeback

The Smartphone is something that is ubiquitous with the term phone today and they are assumed to be part and parcel of the same thing. However, smartphones are for a large class of cases beginning to lose their appeal in every case. Apple which is considered the king of the smart phone and really got the ball rolling a few years ago is now facing an upswing in flip phones. I’m not kidding this is actually happening in the market today.

Clearly, the market appears to be the next big question as to why this is occurring. There was a lot to love about your flip phone, I remember my first Razor phone and though how can it get any more high tech than this. There was a lot of love surrounding flip pones not doubt, but as we see in the fluid nature of the market all things change. Palm and RIM (now BlackBerry) took over the market from Motorola, and Apple went on to take the Market from Palm and BlackBerry, only to face its largely successful attack by Google.

Apple changed the game with the iPhone and no one will deny that claim. But as things got more and more technologically advanced so to did they become more expensive and the cost of having a phone went from having something that made calls, a fairly inexpensive ordeal to a ground breaking portable computer that has near constant WiFi connectivity. Which is not an easy or cheap pill to swallow. Not to mention the battery life for a smartphone is crap. I can plug in my iPhone 6s and go on the web for about a half hour, after that time its probably a quarter depleted. My old flip phones you could leave for days or weeks without charging and you were fine.

The flip phone also had many advantages such as it was smaller and more portable, it was far easier to put in your pocket or hold with you shoulder. It was also more robust and safe from damage given that it was protected by its defining characteristic, the flip.

Today people are beginning to consider where they can save money and equally as important time. One of the major drains of non essential spending we experience is though our cell phone and their data plans. Not to mention if you are in the smartphone trap you almost feel obligated to re-up and get the newest phone every 6 months which cost hundreds of dollars per go. 

In terms of time it is all to easy to open up the Facebook app or one of those dumb bubble pop games when you’re on the train on your way to work. Once you arrive at work you go right from that screen to your work computer, then its back onto the cell phone in between work and the commute home. We are trapped in a constant state of checking and rechecking our status on the web or click bait. Perhaps the rise of the flip phone may not be a step forward, for tech but it may very well be a step in the right direction for America.


Facebook Breaks the Mold

If there is a single company that can still make waves, effectively bucking off the recent earnings malaise in the tech industry, it would be a safe bet to think that Facebook is the one who can break the mold. There has been much for the company to be proud of in recent months. They grew quite a lot over the last fiscal quarter, especially in mobile platforms, which was unexpected to some industry insiders. It is also relevant to note that they have relatively untapped sources of revenue in terms of the messaging as well as virtual reality platforms. Unlike many other tech moguls, the company has even managed to avoid the condemning attention of Donald Trump.

All the while, Facebook has been coming up on its four-year anniversary as a publicly traded company, and there are reasons that we can assume that Facebook’s doing so well in terms of the stock market might help them push even higher. Many expect a joyous day when they announce the first quarter results this Friday. fjfjfjfdkfjasdlf

Theyanalysts that polled Faceset expect adjustments earnings of 63 cents a share, which is up 48% from the year prior, to $5.3 billion dollars. Facebook has thus exceeded its quarterly estimates all but one time since their initial public offering in the wee morning of 2012.

Facebook has gone through a revolution, nay a transformation in regards to its mobility and that revolution has been a meaningful one to say the least. To put this into perspective, about 80% of advertising money in the last quarter came from its mobile means. That is up from a year ago when it made up a mere 28%. When you think of Facebook’s average revenue per user, you think of a surge of about 33% during the last year. This is an upward trajectory, that made Facebook earn big green: more than $1 billion in net income in the fourth quarter alone. fasdfasfd

The stability of the Facebook economy is in direct correlation to the strength of the economy in general. They are not so much a generator, as they are a indicator of financial prosperity at a given time and place. What I mean is that, Facebook can only really make money through the sale of their ad space. They do not create, nor do they really provide a service other than a platform of which most of the people in our economy are members, and thus allows for the largest platform for anyone to reach their potential clients when the economy does well.

Facebook does well because when people’s companies do well; they want to advertise them and thus pour their excess revenues into the Facebook machine. You take the ad revenues, you take away the life blood of Facebook and Zuckerberg in general. So the valuation of Facebook and its meteoric rise is a troubling one to say the least, because when they do have a down turn and the shareholders say they want to sell, there will be nothing for Facebook to do. They don’t do anything and our entire economy is based around giving these useless tech services absurdly high valuations on the basis that they are worth something much more than actually are.



Trump’s iPhone Plan Widely Refuted

Donald Trump’s stump speech offers no surprises to his supporters or watchers. It’s a stump speech- it’s basically the same repetitive cues again and again- that said, a strange assertion by Trump has recently surfaced and been vehemently refuted, as tends to happen once a week or so.

trump2“We’re going to get Apple to built their damn computers and things in this country instead of in other countries,” he asserted in January in Liberty University. “Apple and all of these great companies will be making their products in the United States, not in China, Vietnam,” he continued in Mar-a-Lago earlier this month.

Similar to many of his other previous promises, this particular initiative of Trump’s offers some glaring issues, even if you look past the fact that Trump’s own companies manufacture thousands of items overseas.

The larger issue is this: To force Apple to make iPhones in the US would be as logistically impossible and economically disastrous for the company. Apple may make a point of being pro-human rights in America (just look into its recent political activism in North Carolina regarding the “religious freedom” laws being proposed in the state, but it simply cannot offer human rights to the workers responsible for the base functioning of its company. For example, the workers who mine cobalt in Borneo of the people actually responsible for the manufacturing of the phones, who are allegedly child workers.

Even the idea the Trump might have the potential to force Apple to move its manufacturing headquarters to the US is overreaching his actual power. After all, no president has the executive power to force an industry to follow his or her will to that extent. Trump could potentially attempt to force some tariffs through Congress with the intent to make it incredibly expensive for Apple to import electronics built overseas, but that entire potential would also assume that not only Trump becomes president, but that the political landscape had changed even more than would be assumed given Trump’s own ascent to power.

trump3Even in those circumstances, the idea that a tech giant like Apple, which just finished up taking on the FBI head on regarding being forced to create encryption software for the sake of hacking into terrorists’ iPhones, would succumb to Trump’s will is another major assumption in an unlikely political landscape. Apple has the best of the best lawyers and has created a power for itself that rivals the US government in its ability to reach and hire major resources. This power translates to a significantly competitive nature that surfaces when the tech giant is called out to compete.

And the United States economy actively thrives off of this economic success. To devastate Apple would be to devastate that much of the U.S. economy, a move that would never be considered by a decent U.S. president.

Jason Dedrick, a professor at Syracuse University, laid out exactly how Apple would nose dive with Trump’s proposal. According to him, the manufacturing equipment itself costs billions of dollars, and the expertise to run it pretty much only exists in those locations.


Things You Need to Know About Computer Numerical Controlled Routers

A computer numerical controlled router or CNC router works works within the same perameters on an CNC machine. That is to say that a computer that sues muerically controlled electronics to drive a mechanical system. Using this system you are able to achieve far more accuracy and precision than any human operation could ever do, just by operating from a computer monitor.

A conventional CNC router can cove and cut material in a three directional plane which are normally referred to the X,Y.and Z axis or directions, this schema is used for almost all computer or graphing systems. The X axis is normally although not always the longest of the three running front to back. The Y axis Runs from left to right most of the time although not always and the Z axis runs up and down. although it is possible to get the machine to violate these conventions through orienting the material differently or by changing the calibrations of material, but it is really adding way more work than you need and you’re not going to be doing yourself any favors by violating the norm in terms of learning from others put these conventions into your head and dont deviate you turkey. The machine is very effiecent in that they work in all three directions in a kind of perfect unison.

kkkkkThere are major componants now that need to be known if you are to progress in CNC routing. THey are the Y axis linear drive system which allows the routher to move along this plane traditionally from front to back of the machine. Next is the y axis gantry which is the differential space from the cutting bed or table. the cutting bed or table is what the material rests upon . the x axis linear drive system is a track that moves the y axis linear drive system and the system of them together allows the routher to move and hit any piont on that plane. the y axis gantyry allows for the z movement and cuts to take place by allowing the spindle to move and down from the ground to the top of the machine.
The CNC control and the computer as they relate to each other. The CNC control system of the computer is the heart of the machine. telling the motors to drive systems which allows the directional to move and how far to do so.

Setting up your cutting bed.

It is important that you use a thick, yet easily cut material for the base, because in calibration of the cut depth you are going to have a high degree of variance. therefore you want something such as a MDF or HDF particle board because your bit will pass over it easliy and not affect the future cuts in the sequence of the passes. another reason to use MDF is that its pretty cheap and you will need to change it out fairly regularly.

finally make sure every screw you use to attach the MDF to the base plate and the eventual material to the MDF it is extremeley important that you only ever use brass screwsgoshhardweeeeeare_1992_MISC-01.. the reason being they will not scatter and send shards like steel.


The Infamous Trick to Brick Your iPhone

This technique may be more fittingly called an anti-hack; turns out there’s a new iPhone bug that will render your device completely useless, and it’s as simple as setting your iPhone’s clock to January 1, 1970. It’s a strange thing to do for sure, and how exactly this was discovered and what that person’s intentions were in setting their phone to this doubt remains a mystery to me, but regardless, people have discovered that this can ruin a person’s expensive smartphone, and so of course, the internet is running rampant with this information.

Having first surfaced on 4Chan, fake Apple advertisements that encourage people to set their phone to that date have been all over the net and sent via email. The advertisement reads as follows:

ibrick“Blast from the past. The original Macintosh introduced the world to computers, forever changing the way people experience technology, and allowing people to do things that were never possible before. With this easter egg, warp back in time with a classic Macintosh theme to relive the magic on your iPhone Change the data on your iPhone to January 1, 1970, press and hold the power button to reboot your device, and prepare for a wild ride!”

Unfortunately for those hoping to enjoy the fruits of a retro theme, Apple wasn’t even founded until 1976 and your iPhone will turn into a completely useless piece of plastic and silicon. The only way to undo the damage once you’ve done this is to find a Genius Bar appointment, which will take a long, long time.

More tech savvy users will be dismayed to hear that you can’t restore the phone through iTunes, as actual physical fixes (or replacement phones) are necessary to get you back online.

Worried about your device being prone to the evils? The bug is only a problem for 64-bit iOS devices, which encompasses the iPhone 5S, iPad Air, and iPad Mini 2 and newer models down the line.

Experts don’t think that the hackers actually were able to slip this bug into the Apple’s design on purpose; instead, people believe it was likely a bug related to the same Unix glitch that caused Facebook to wish people a happy 46 years of service, if you remember that whole fiasco.

brick2What’s the uniting factor that would cause these glitches to arise in unrelated companies operating under different guidelines? Count 46 years ago… and there’s 1970 again. Turns out that the date January 1st, 1970 or 1/1/70 has an internal value of zero on a Unix system, which causes the software to malfunction.

Not sure exactly what the reason for that is because I’m not a computer programer and I don’t know binary code or how to make software, but it’s likely that any system using Unix may have some kind of issues revolving around that particular date and what happens if you set the device to that date. Luckily, most bugs would have likely already happened, but we’ll see what pops up in the future… Just in general, don’t take advice from poorly written ads like the one quoted above.


Security in the Technological Era

You’ve probably have heard of biometric systems, but you might not be sure how they work and what they have to offer someone like you. Whether or not you’re ready to make the transition from locks that need a key to locks that need the right human eyeball to open, airports, hospitals, hotels, grocery stores and even Disney theme parks are beginning to employ this technology. Let’s take a closer look.

Biometric systems use your physical or behavioral traits to identify you. That means your hand writing, finger print, voice prints, iris structure and even vein structure can be scanned by a computer for recognition. With a biometric security system, you don’t use something you have or know to open a lock; you can open it simply by being who you are. Many people believe that biometric locks are more secure because unlike a key or a password, personal appearances and mannerisms are extremely difficult to forget, and to illegally replicate.

Biometric systems function with three basic steps. The process begins with enrollment, meaning the owner of the biometric system must program into the system basic information about the user. This means your name or ID number. Then the user must record some specific trait of theirs, like a finger print, signature, or vocal password.

The second step involves storage of the information. The data is generally stored graphically or through a code.

The final step involves comparison; the next time you attempt to use or open the system, it will ask you for a new version of whatever you created and then compare what you offer to stored version.. It either accepts the two as coming from the same source (accepts that you’re you), or doesn’t.

Accordingly, a biometric system must make use of three different components: a sensor for detecting the identifying characteristic, a computer for reading and storing information, and software that enables the computer to analyze the characteristic and compare it to newer versions of the same input.

handwritingThe most widespread biometric security system is the fingerprint scanner available on smartphones and laptops. However, handwriting is also becoming a common form of biometrics. Your first reaction might be to think that handwriting would be one of the most easily copied forms of a security code, but in fact the recording process is much more complicated than that. When someone offers their signature, for example, the sensor of the biometric system not only takes note of the shapes of the letters, but the pressure used to press against the screen, the speed and rhythm at which the signature is written, and the sequence of events that is how you add dots and crosses to words.

voiceprint2Another common use? Vocal passwords. People’s vocal qualities are unique and stem from both the shape of their vocal cavities and the habitual way they move their mouth and throat when they speak. The computer records vocal inputs into a voiceprint using a sound spectrogram. Different speech sounds create different shapes on the graph.