Category Archives: Hardware


Drones for Safety

No matter what time or on what network you turn into for your news there is an inevitable news thread that you are always going to see without fail. It usually goes something like this ‘such and such drone, inflicted, such and such, damage against such and such people. The bottom line is that there is always the reality that is going around is that the fact that drones are one in the same with death and breaking of lots of things in the world today. I know it you know it, the American people know it and its a reality that is that unless things are different that will be the legacy of an otherwise amazing technology.

drone2The reality is that as is the case with all new technology in the United States is that it comes through the military and if there is an amazing technology you can imagine that it had a military application prior to its civilian one. Today we are fortunate enough to bare witness to something in this regard that is coming primary as the result of a military application but in actuality is going to have the ability to actually save many lives, while not being able to inflict any damage against lives. Sounds a little to good to be a drone, broad horizon ahead that is coming on the wings of angels in drone form.

The way it is done is that the military acknowledged the reality that there are over 10 million submerged line mines in the crust of the earth just waiting to inflict damage against a civilian years after a conflict took place in the region. So every year there are hundreds if not thousands of people who fall victim to this reality every year and sadly lose their lives or are badly injured as a result of their interaction with the affected region. So what are we to do, because there has been up until now a catch 22 that was presented to anyone who wanted to remove these because they posed a threat to human lives no doubt, however in order to remove them you had to do so with the careful and close interaction with human lives. So what the drones of tomorrow are going to do is nothing short of a miracle. The way they work is pretty remarkable.

drone 3First, they determine what area is most likely to be affected by past armed conflicts and thus likely to have the presence of land mines. Next it runs a sensor array which sweeps the area and detects through metal detection where the presence of land mines are. Next what it does is it allows the drone to place a tennis ball sized explosive over the region and them blammy, its bye bye Mr.Landmine.

This is already having a huge impact on what it has already done and is only going to continue to save lives. The initial history of the drone story may be marred with violence and destruction, but hopefully this new tech can be the healing first step towards allowing for a more peaceful and prosperous world with this great innovation.


The Internet of Things in the World of Medicine

While the internet of things may posit both positive and negative contributions to the world of tech-savvy security, the medical realm is perhaps where this kind of technology can be the most helpful. After all, the United States is beginning the burdensome process of supporting its baby boomer generation, and the major rise in members of the 65-and-over club is driving new development in medical tech. Devices that connect patients with caregivers ad help machines get better at learning how to read sensors are more needed than ever.

connected medGrand View Research recently published a report stating that “high, unmet medical needs” of seniors are likely to trigger the increased use of remote patient monitoring by healthcare organizations. These organizations’ efforts to meet the needs of their patients will likely sustain the market for the “Internet of Medical Things” for the next decade. Considering 2022 is when the IoT sector is expected to explode (industry experts have predicted that the market will reach about $410 billion), it’s likely the market won’t be losing momentum anytime soon. The sector’s medical devices are projected to drive a compound annual growth rate of 28.3 percent between now and 2022.

What kind of devices can you expect to see gaining momentum? Think Fitbits and Apple Watches that can read your heart rate, activity levels, and sleep cycles. Google is even developing contact lenses that can read your glucose levels. mc10 is coming out with a biometric stamp the size of a band-aid that can report a person’s vitals to connected devices and doctors. Developers at the University of Buffalo are creating a pendant that can analyze chewing and swallowing sounds to determine what wearers are eating and alert them when they’ve started to overeat or eat unhealthily.

While these devices may be helpful for those hoping to maintain good health, Ian Shakil notes that it’s important to realize that these devices are only able to provide so much assistance.

“The Internet of Medical Things will continue to evolve and deliver value by getting the complexities of technology out of the way and connecting- or better yet, reconnecting- doctors with patients,” said Shakil, CEO of Audmedix.

jewman“Augmendix’s service is optimally designed to deliver the highest quality patient notes resulting in improved patient care and pay or reimbursement,” he explained.

Shakil’s company estimates that physicians spend at least 70 percent of their time reading documentation before they started sing their service. “This new ly reclaimed time that can be repurposed in-clinic for other administrative tasks or even to see more patients,” he explained.

According to Joel Cook, real-time location systems posit one of the original uses for the IoMT. Cook is a senior healthcare solutions manager at Stanley Healthcare.

“Using wireless RTLS devices, staff and family members can trace a patient’s entire journey through the hospital- from the waiting room to surgery to post-op, and how long they spend in each area,” Cook explained.

RTLS devices can be leveraged for asset management to locate equipment and monitor for temperature-sensitive substances as well.

Keith Cooper, CEO of Constant Therapy, explained that IoMT devices can also help in terms of collecting data about which medicines work for which kinds of people:

“By collecting anonymized data from every person’s interaction with our therapy programs, we can analyze what works ankd what doesn’t work for each type of individual,” he said.

future tech2

Industry Experts Offer Tech Predictions

Let’s face it: the technological revolution is upon us. Computers aren’t just in your pocket, they’re everywhere, and there’s plenty more to come. Not only that, but tech is infiltrating all other industries from food to agriculture to dynamic integrated business solutions to healthcare to military applications (autonomous killer robots are almost ready to be deployed by the Russian government.) In light of all of this unprecedented change, many industry analysts have come forward with their own ideas regarding what to expect from the tech explosion that is our modern world. So buckle up baby, because we are in for a wild ride full of ups and downs, robots and connectivity.

future techTake the predictions of industry insider Sanjay Ramendong for example. According to Ramendong, we can expect the distinction between “the tech industry” and “industry in general” to fade. Ramendong attributes this to “a massive price reduction in computing technologies and an upgrade in terms of portability of all widely used devices.”

“Although our capability is improving, we often neglect the ethical questions surrounding our advancements,” Ramendong continued. “Consider the issue of artificial intelligence; do we make the helpful robots cuter or capable of love? Should we purposefully limit their consciousness?”

Futurist and professor of integrated technologies at MIT Dr. Holly Sass has written a variety of books on the subject of new devices in a world where relationships between humans and technology are constantly forming and being rewritten:

“Virtual reality will change the experience of livestock in a way that most people haven’t considered. Assume a cow is wearing a virtual reality helmet; he will forget he is at a farm and can instead live a reality in which he is a swashbuckling pirate or an astronaut for all I know.”

“From an animal rights perspective, does it really matter how you treat an animal that’s wearing a virtual reality helmet?” she continued. “The answer to that question depends on a variety of factors, from how developed and compelling VR technology comes to how good the video is to the philosophical changes that occur in humankind in the time between VR helmets for people and VR helmets for cows.”

future tech3Industry analyst Ken Chambers writes for Technology Magazine and has spoken at multiple conferences regarding the nature of what he calls “Gaya” or technology-based natural solutions:

“There’s no reason to rule out smart dirt, perhaps called iDert or Dtech when the time comes for branding and market development. There are a variety of promising and well-funded startups devoted to making computers for trees. These computers will make it possible for trees to enter chat rooms, possibly giving a voice to the voiceless and fueling environmental discussions in the future.”

Whether or not these analysts are real, there is a high probability that computers will play a larger role in our lives and perhaps directly in our bodies. So let’s be honest, now is the time to ask ourselves not if but when and if when, but how will we prepare for these changes?


Trump’s iPhone Plan Widely Refuted

Donald Trump’s stump speech offers no surprises to his supporters or watchers. It’s a stump speech- it’s basically the same repetitive cues again and again- that said, a strange assertion by Trump has recently surfaced and been vehemently refuted, as tends to happen once a week or so.

trump2“We’re going to get Apple to built their damn computers and things in this country instead of in other countries,” he asserted in January in Liberty University. “Apple and all of these great companies will be making their products in the United States, not in China, Vietnam,” he continued in Mar-a-Lago earlier this month.

Similar to many of his other previous promises, this particular initiative of Trump’s offers some glaring issues, even if you look past the fact that Trump’s own companies manufacture thousands of items overseas.

The larger issue is this: To force Apple to make iPhones in the US would be as logistically impossible and economically disastrous for the company. Apple may make a point of being pro-human rights in America (just look into its recent political activism in North Carolina regarding the “religious freedom” laws being proposed in the state, but it simply cannot offer human rights to the workers responsible for the base functioning of its company. For example, the workers who mine cobalt in Borneo of the people actually responsible for the manufacturing of the phones, who are allegedly child workers.

Even the idea the Trump might have the potential to force Apple to move its manufacturing headquarters to the US is overreaching his actual power. After all, no president has the executive power to force an industry to follow his or her will to that extent. Trump could potentially attempt to force some tariffs through Congress with the intent to make it incredibly expensive for Apple to import electronics built overseas, but that entire potential would also assume that not only Trump becomes president, but that the political landscape had changed even more than would be assumed given Trump’s own ascent to power.

trump3Even in those circumstances, the idea that a tech giant like Apple, which just finished up taking on the FBI head on regarding being forced to create encryption software for the sake of hacking into terrorists’ iPhones, would succumb to Trump’s will is another major assumption in an unlikely political landscape. Apple has the best of the best lawyers and has created a power for itself that rivals the US government in its ability to reach and hire major resources. This power translates to a significantly competitive nature that surfaces when the tech giant is called out to compete.

And the United States economy actively thrives off of this economic success. To devastate Apple would be to devastate that much of the U.S. economy, a move that would never be considered by a decent U.S. president.

Jason Dedrick, a professor at Syracuse University, laid out exactly how Apple would nose dive with Trump’s proposal. According to him, the manufacturing equipment itself costs billions of dollars, and the expertise to run it pretty much only exists in those locations.


Things You Need to Know About Computer Numerical Controlled Routers

A computer numerical controlled router or CNC router works works within the same perameters on an CNC machine. That is to say that a computer that sues muerically controlled electronics to drive a mechanical system. Using this system you are able to achieve far more accuracy and precision than any human operation could ever do, just by operating from a computer monitor.

A conventional CNC router can cove and cut material in a three directional plane which are normally referred to the X,Y.and Z axis or directions, this schema is used for almost all computer or graphing systems. The X axis is normally although not always the longest of the three running front to back. The Y axis Runs from left to right most of the time although not always and the Z axis runs up and down. although it is possible to get the machine to violate these conventions through orienting the material differently or by changing the calibrations of material, but it is really adding way more work than you need and you’re not going to be doing yourself any favors by violating the norm in terms of learning from others put these conventions into your head and dont deviate you turkey. The machine is very effiecent in that they work in all three directions in a kind of perfect unison.

kkkkkThere are major componants now that need to be known if you are to progress in CNC routing. THey are the Y axis linear drive system which allows the routher to move along this plane traditionally from front to back of the machine. Next is the y axis gantry which is the differential space from the cutting bed or table. the cutting bed or table is what the material rests upon . the x axis linear drive system is a track that moves the y axis linear drive system and the system of them together allows the routher to move and hit any piont on that plane. the y axis gantyry allows for the z movement and cuts to take place by allowing the spindle to move and down from the ground to the top of the machine.
The CNC control and the computer as they relate to each other. The CNC control system of the computer is the heart of the machine. telling the motors to drive systems which allows the directional to move and how far to do so.

Setting up your cutting bed.

It is important that you use a thick, yet easily cut material for the base, because in calibration of the cut depth you are going to have a high degree of variance. therefore you want something such as a MDF or HDF particle board because your bit will pass over it easliy and not affect the future cuts in the sequence of the passes. another reason to use MDF is that its pretty cheap and you will need to change it out fairly regularly.

finally make sure every screw you use to attach the MDF to the base plate and the eventual material to the MDF it is extremeley important that you only ever use brass screwsgoshhardweeeeeare_1992_MISC-01.. the reason being they will not scatter and send shards like steel.


The Infamous Trick to Brick Your iPhone

This technique may be more fittingly called an anti-hack; turns out there’s a new iPhone bug that will render your device completely useless, and it’s as simple as setting your iPhone’s clock to January 1, 1970. It’s a strange thing to do for sure, and how exactly this was discovered and what that person’s intentions were in setting their phone to this doubt remains a mystery to me, but regardless, people have discovered that this can ruin a person’s expensive smartphone, and so of course, the internet is running rampant with this information.

Having first surfaced on 4Chan, fake Apple advertisements that encourage people to set their phone to that date have been all over the net and sent via email. The advertisement reads as follows:

ibrick“Blast from the past. The original Macintosh introduced the world to computers, forever changing the way people experience technology, and allowing people to do things that were never possible before. With this easter egg, warp back in time with a classic Macintosh theme to relive the magic on your iPhone Change the data on your iPhone to January 1, 1970, press and hold the power button to reboot your device, and prepare for a wild ride!”

Unfortunately for those hoping to enjoy the fruits of a retro theme, Apple wasn’t even founded until 1976 and your iPhone will turn into a completely useless piece of plastic and silicon. The only way to undo the damage once you’ve done this is to find a Genius Bar appointment, which will take a long, long time.

More tech savvy users will be dismayed to hear that you can’t restore the phone through iTunes, as actual physical fixes (or replacement phones) are necessary to get you back online.

Worried about your device being prone to the evils? The bug is only a problem for 64-bit iOS devices, which encompasses the iPhone 5S, iPad Air, and iPad Mini 2 and newer models down the line.

Experts don’t think that the hackers actually were able to slip this bug into the Apple’s design on purpose; instead, people believe it was likely a bug related to the same Unix glitch that caused Facebook to wish people a happy 46 years of service, if you remember that whole fiasco.

brick2What’s the uniting factor that would cause these glitches to arise in unrelated companies operating under different guidelines? Count 46 years ago… and there’s 1970 again. Turns out that the date January 1st, 1970 or 1/1/70 has an internal value of zero on a Unix system, which causes the software to malfunction.

Not sure exactly what the reason for that is because I’m not a computer programer and I don’t know binary code or how to make software, but it’s likely that any system using Unix may have some kind of issues revolving around that particular date and what happens if you set the device to that date. Luckily, most bugs would have likely already happened, but we’ll see what pops up in the future… Just in general, don’t take advice from poorly written ads like the one quoted above.


Security in the Technological Era

You’ve probably have heard of biometric systems, but you might not be sure how they work and what they have to offer someone like you. Whether or not you’re ready to make the transition from locks that need a key to locks that need the right human eyeball to open, airports, hospitals, hotels, grocery stores and even Disney theme parks are beginning to employ this technology. Let’s take a closer look.

Biometric systems use your physical or behavioral traits to identify you. That means your hand writing, finger print, voice prints, iris structure and even vein structure can be scanned by a computer for recognition. With a biometric security system, you don’t use something you have or know to open a lock; you can open it simply by being who you are. Many people believe that biometric locks are more secure because unlike a key or a password, personal appearances and mannerisms are extremely difficult to forget, and to illegally replicate.

Biometric systems function with three basic steps. The process begins with enrollment, meaning the owner of the biometric system must program into the system basic information about the user. This means your name or ID number. Then the user must record some specific trait of theirs, like a finger print, signature, or vocal password.

The second step involves storage of the information. The data is generally stored graphically or through a code.

The final step involves comparison; the next time you attempt to use or open the system, it will ask you for a new version of whatever you created and then compare what you offer to stored version.. It either accepts the two as coming from the same source (accepts that you’re you), or doesn’t.

Accordingly, a biometric system must make use of three different components: a sensor for detecting the identifying characteristic, a computer for reading and storing information, and software that enables the computer to analyze the characteristic and compare it to newer versions of the same input.

handwritingThe most widespread biometric security system is the fingerprint scanner available on smartphones and laptops. However, handwriting is also becoming a common form of biometrics. Your first reaction might be to think that handwriting would be one of the most easily copied forms of a security code, but in fact the recording process is much more complicated than that. When someone offers their signature, for example, the sensor of the biometric system not only takes note of the shapes of the letters, but the pressure used to press against the screen, the speed and rhythm at which the signature is written, and the sequence of events that is how you add dots and crosses to words.

voiceprint2Another common use? Vocal passwords. People’s vocal qualities are unique and stem from both the shape of their vocal cavities and the habitual way they move their mouth and throat when they speak. The computer records vocal inputs into a voiceprint using a sound spectrogram. Different speech sounds create different shapes on the graph.

quantum computing

Quantum Computers

You may have heard of them, but it’s safe to say you don’t understand how they work. No one does, and they don’t exist yet except in extremely basic forms. If you’re wondering what they will be, or at least what scientists hope they will be, and why, here’s a little overview on the concept.

The further engineers get in creating powerful computers, the more uses emerge for incredible processing power and speeds. The human race’s ability to explore space, cure disease, and solve the larger questions of the universe seems to be pretty contingent on their ability to use computers to collect and process data.

gordon mooreThis isn’t a horrible predicament to be in; Gordon Moore was mostly right when he predicted that the number of transistors that engineers can fit onto a computer’s microprocessor would double every two years or so. In fact, it’s been doubling every 18 months for decades.

So where does that leave us in 2020 or 2030? If Moore’s Law holds up, scientists should be able to create a quantum computer within the next decade.

But what is a quantum computer? A quantum computer is a computer that harnesses atoms and molecules to perform processing tasks and read and write memory. Currently these tasks are performed by microscopic silicon-based transistors, but these have their own drawbacks in size and efficiency that scientists hope to improve on by using even smaller particles for the job.

The concept originated when Argonne National Laboratory physicist Paul Benioff applied quantum theory to computers in 1981. He believed that it would be possible to create a quantum Turing machine.

(FILES) This file handout picture releasA Turing machine, which was invented by Alan Turing in the 1930’s, is a theoretical device that consists of a tape of unlimited length that has been categorized into little squares. These squares can either hold a 1, a 0, or be left blank. A read-write device then reads these symbols and blanks, which gives the machine its instructions to perform a certain program.

You may recognize this process as a warped version of the one responsible for storing data and running programs on your personal computer or mobile device.

According to Benioff, in a quantum Turing machine, the tape exists in a quantum state, as does the read-write head. Instead of only reading and writing the 0, 1, or space state, quantum computers would encode information as quantum bits (called qubits) which can exist in superposition. A qubit could be an atom, an ion, a photon or an electron and their respective control devices that allow them to work as computer memory and as a processor. Because a quantum computer would be able to work with these multiple states simultaneously, it would have the potential to be millions of times more powerful than the best of the best of today’s computers. The superposition of its qubits would allow for it to work millions of computations while your laptop works one.

Quantum computers would also utilize an aspect of quantum mechanics known as entanglement. Recall that simply giving attention to subatomic particles can change them. That means simply looking at a qubit in superposition could knock it down to a value of either 0 or 1, making it on the same level as your laptop computer. Luckily, the principal of entanglement implies that the application of an outside force to two atoms can cause them to become entangled so that the second atom can take on the properties of the first atom. If left alone, an atom will spin in all directions, but if another atom is added to the company, the entangled atom will spin the opposite direction of the first atom. Scientists can follow this pattern to know the value of the qubits without actually looking at them.

caching stuff

What is Caching?

You hear the word all the time but you’re not quite sure what it means. Let’s see what this article can do to help:

cpu v memoryLet’s start out by explaining a developing problem in system design: at our present moment, scientists have found ways to greatly increase CPU (computer processing unit) clockspeed and performance, but the technology regarding equally speedy memory remains a bun in the oven. That leaves scientists scrambling to find a way to make sure their CPU speeds make a difference in overall computer function.

A common analogy used to explain the problem and solution involves a downtown furniture workshop and a lumberyard that keeps moving further and further out of the city and into rural land. That movement represents the increasing divide between the speeds of the CPU and of the memory (the memory is the lumberyard). No matter what size the trucks are that ship lumber from the lumberyard to the furniture shop, they’re going to take longer and longer to arrive after the furniture shop files its order.

Ok, conflict understood. Possible solution: rent out a smaller warehouse in the city and have it act as a cache for the workshop; it could have a driver on-hand who could drive out and get whatever the furniture shop needs whenever a need springs up. The bigger the cache, the better, because it will store more of all the raw materials that the furniture shop could possibly need.

Now think of that city warehouse as the level 1 (L1) cache. The L1 cache can be accessed extremely easily by the CPU, so it’s a sensible place to store of all the most relevant and predictably necessary data. The L1 is able to be so quick because it’s made of the fastest and most expensive type of static random-access memory (SRAM). The 4 to 6 transistors that make up every SRAM trump the one-transistor-per-cell of dynamic random-access memory (DRAM), but they also cost quite a lot more, so engineers generally want to be conservative with them.

When the processor reaches for data that isn’t in the L1, it’s called a cache miss. This is definitely a situation worth avoiding seeing as people that pay for an ultra-high-clockrate processor like the P4 don’ expect to be forced to wait for the time it takes for data to load from the main memory (it’s not a simple matter of waiting for something to load; the time that that takes may keep a program from functioning properly).

lumberThe solution is to build a second cache. Expanding L1 is only an option so much as you’re willing to pay for more and more of those expensive transistors. If you want faster access to memory but don’t want to foot the bill, you can build an L2 cache that sits between L1 and the main memory. Hence the cache (or memory) hierarchy begins to form. The L2 isn’t as fast as the L1, and the L3 isn’t as fast as the L2, but each slower tier also holds less relevant information. At the end of the day, data is still transferred more efficiently with the tiers than without them.

All about Hardware Vs Software

Hardware is the visible part of a computer that has a physical structure, such as keyboard, mouse or the monitor. Software is the set of programmed instructions that are given to the hardware to perform a particular task, thus acting as a guide to the hardware. For eg: MS Word

hardware1Types of Hardware problems:

Before one can address hardware issues, it is imperative to understand how hardware problems manifest. Weird error messages that flash out can be addressed with ease.

1. Dead Hardware – Simply put any unused or dead piece of hardware. A faulty audio card, a non functional memory stick, which prompt the operating system to flash error messages concerning their malfunction.

2. Hardware Functional Defects – Being the most difficult type of problem, an occasional error message from a hardware component will not help the user to address the problem in its totality as he is helpless with pertinent information to troubleshoot. This is because of occasional faults. Some errors do not lead to a functionality issue but cause data to corrupt or sometimes hamper the performance of hardware.

3. Driver issues – Usually similar to hardware malfunctions, these are much more consistent in their error messages. Bad drivers which do not correspond with the hardware sometimes can lead to serious issues like kernel crashes, blank screens, white and black screens, not to mention many more such weird effects.

The following tips help identify and trouble shoot a computer hardware issue with regard to the specific hardware components.

1. Power Supply – Computer booting (starting) problems can easily be traced to power supply connections. Identified as the most important piece of hardware that can fail in a computer, the power supply is the first to be checked for random lockups, spontaneous reboots and some serious error messages. Power supply can be tested manually using a multi meter or using a power supply tester, both of which are effective ways.

2. Hard Drive – Failure of hard drive causes files to go corrupt. Prolonged delay in accessing files or during saving a file to the hard drive are the notable manifestations. Another evident instance witnesses a complete non-booting of windows.

3. CPU – Problems with the CPU result in the computer not booting at all. An overheated CPU leads to a blue-screen when it is being used to play a game.

4. RAM – Failure on part of the short term storage RAM will lead to application crashes, blue screens, and file corruption.

hardware25. Graphics Card – Graphical errors are evident when the graphics card fails. Situations causing the graphics card to overheat will lead to crashing of the graphics driver. This may also result in computer freezing under load.

6. Fans – Failure of even one of the computer fans leads to components getting overheated manifested in the form of CPU or graphics card problems.

7. Motherboard – Problems with motherboard are believed to very tough to diagnose. Occasional blue screens or similar problems of display can sometimes be attributed to faulty motherboards.

This bird’s eye view of hardware malfunctions will aid in diagnosing and addressing hardware issues, which are at times overwhelming to the common user.