http://www.navysbir.com/solicitations.htm
The above link will send you to Navy program offices for various key technologies and platforms that support the Fleet today and in the future. If one is seeking SBIR funding it is key to pursue the related PEO's in order to influence the wording of the SBIR announcement and increase your win
probability. I have had success in all aspects of Navy SBIR activity by following this approach in areas such as mine warfare , ASW , littoral conflict, C4ISR , airborne sensors to name a few.
Wednesday, November 7, 2012
Tuesday, October 30, 2012
Motion Control Survey For Surveillance and Security In An Asymmetrical Era
Many security and surveillance applications today have a requirement for Motion Control technology. Think about what it takes to move a camera , antenna or radar from side to side or up and down. Motion Control is playing an ever increasing role in situational awareness in today's asymmetrical era. Now is your big chance to not only get paid but also share your input in a key survey. Please follow the below instructions.
Please make sure you note you were referred to this survey by answering in the second to last question “How did you hear about our survey? http://www.falascoj.blogspot.com
L.E.K. Consulting is conducting a study on the motion control products market. We are testing a new product concept designed to help purchasers of motion control products dramatically improve sales and reduce costs. The survey will take approximately 20-25 minutes to complete and all responses will remain completely confidential.
All respondents who complete the survey will receive a $100 honorarium! If you are unable to accept an honorarium, we can donate this money to a charity of your choice. We will also provide you and your organization with high-level feedback from the survey! My suggestion for donation is the Wounded Warrior Organization who do so much to help the true champions or the asymmetrical era.
We have recently changed our qualification criteria, so if you tried to take this survey in the past and could not, please try again!
If you experience any problems with this survey, please contact us at c.gonzalez@lek.com
Friday, June 22, 2012
Stars In My Crown
A traditional old time movie shows what the world was like when asymmetrical activity only happened in the animal world. What has gone wrong?
The Real China
Several years ago while in China for business I took a weekend and went to the Great Wall with by local Beijing Sales team. The two associates that acted as my host had done so many times but never with anyone as knowledgeable in Chinese history as me. While leaving one of the museums we noticed dozens of military trucks pulling up. The local PLA base uses the Great Wall as the location of their weekly graduation ceremony. This would of course be akin to a USMC recruit class at Quantico going to the Washington
Monument to graduate. About 1,000 young Chinese got out of the trucks along with their drill instructors and marched in formation to the top of the Great Wall. Right behind them were their parents,boyfriends & girlfriends, (the graduating class was COED ) , "Don't Ask /Don't Tell Hasn't Reached the a PLA yet . The drill instructors lined the unit up and went into a typical pitch. Having only several months before watched my son graduate from his USAF basic training made me realize that drill instructors were the same all over the world. ( At least in organized provisional state oriented military groups vs. Jihad central). When the ceremony was over ---it strangely paralleled what I had seen a few months before with the top squad , top recruit ,etc. mentioned , the graduates embraced their family members and left to celebrate. As I looked at the feet of the graduates I noticed almost every ones pants had holes in the bottom and their dress shoes were falling apart. As we followed them back to their trucks I noticed the trucks so resembled Tonka Toys from the 60's I couldn't help but smile and wondered what an air to ground missile from an F-16 would do to them. What's the point for bringing this up. Simple. China isn't our enemy. They may be pushing us economically which we need . If anyone takes time to visit China they will find that it's becoming what we used to be. The biggest fights I saw were people trying to get onto the limited shuttle buses that were taking shoppers to the newly opened Walmart . At the Chinese McDonalds ,KFC,& Pizza Hut
while they speak Chinese vs. Spanish and you are better understood and your order is correct vs. here. So stop trying to stir up anti Chinese sentiment by harping on defense cuts and preparing to fight China. Yes we need to fund our forces at the highest amount ; but for technology that makes sense and can be used for both the next 100 year asymmetrical era as well as classical conflict via the Jihadist wave hick jacking nation states ( Egypt,Libya,and the already hijacked Iran thanks to a weak presidents understanding of global dynamics ).
For details on what types of technology can be used to secure ourselves with a solution in surveillance and security in an asymmetrical era please see posts at :
http://www.surveillanceandsecurityinanasymmetricalera.com
Constructive comments that can leverage anyone's product or position are welcome
Monument to graduate. About 1,000 young Chinese got out of the trucks along with their drill instructors and marched in formation to the top of the Great Wall. Right behind them were their parents,boyfriends & girlfriends, (the graduating class was COED ) , "Don't Ask /Don't Tell Hasn't Reached the a PLA yet . The drill instructors lined the unit up and went into a typical pitch. Having only several months before watched my son graduate from his USAF basic training made me realize that drill instructors were the same all over the world. ( At least in organized provisional state oriented military groups vs. Jihad central). When the ceremony was over ---it strangely paralleled what I had seen a few months before with the top squad , top recruit ,etc. mentioned , the graduates embraced their family members and left to celebrate. As I looked at the feet of the graduates I noticed almost every ones pants had holes in the bottom and their dress shoes were falling apart. As we followed them back to their trucks I noticed the trucks so resembled Tonka Toys from the 60's I couldn't help but smile and wondered what an air to ground missile from an F-16 would do to them. What's the point for bringing this up. Simple. China isn't our enemy. They may be pushing us economically which we need . If anyone takes time to visit China they will find that it's becoming what we used to be. The biggest fights I saw were people trying to get onto the limited shuttle buses that were taking shoppers to the newly opened Walmart . At the Chinese McDonalds ,KFC,& Pizza Hut
while they speak Chinese vs. Spanish and you are better understood and your order is correct vs. here. So stop trying to stir up anti Chinese sentiment by harping on defense cuts and preparing to fight China. Yes we need to fund our forces at the highest amount ; but for technology that makes sense and can be used for both the next 100 year asymmetrical era as well as classical conflict via the Jihadist wave hick jacking nation states ( Egypt,Libya,and the already hijacked Iran thanks to a weak presidents understanding of global dynamics ).
For details on what types of technology can be used to secure ourselves with a solution in surveillance and security in an asymmetrical era please see posts at :
http://www.surveillanceandsecurityinanasymmetricalera.com
Constructive comments that can leverage anyone's product or position are welcome
Saturday, June 2, 2012
Boeing's Private Space Taxi to Take Flight by 2016 | CST-100 Capsule : How Will Assets Like This Effect Surveillance and Security In An Asymmetrical Era?
With the end of shuttle operations the land rush or as it were space rush is on to be a supplier of transpiration systems to carry materials and people into space. The international space station will stay in operation and the stores and personal to man it will be transported by vehicles created and manufactured by private companies. The question then becomes how will this new paradigm effect the ability to conduct surveillance and security from space? The potential scenarios are endless with of course opportunities for any terror group or individual of that persuasion to have the ability to gain control of a platform and engage in activity that would emulate 9/11 space themed scenarios.
This publication serves as an extensive resource to review topics related to space and the associated areas potentially dealing with surveillance and security.
Friday, May 25, 2012
Stop Bashing China
Several years ago while in China for business I took a weekend and went to the Great Wall with by local Beijing Sales team. The two associates that acted as my host had done so many times but never with anyone as knowledgeable in Chinese history as me. While leaving one of the museums we noticed dozens of military trucks pulling up. The local PLA base uses the Great Wall as the location of their weekly graduation ceremony. This would of course be akin to a USMC recruit class at Quantico going to the Washington
Monument to graduate. About 1,000 young Chinese got out of the trucks along with their drill instructors and marched in formation to the top of the Great Wall. Right behind them were their parents,boyfriends & girlfriends, (the graduating class was COED ) , "Don't Ask /Don't Tell Hasn't Reached the a PLA yet . The drill instructors lined the unit up and went into a typical pitch. Having only several months before watched my son graduate from his USAF basic training made me realize that drill instructors were the same all over the world. ( At least in organized provisional state oriented military groups vs. ? Jihad central). When the ceremony was over ---it strangely parallel what I had seen a few months before with the top squad , top recruit ,etc. mentioned , the graduates embraced their family members and left to celebrate. As I looked at the feet of the graduates I noticed almost every ones pants had holes in the bottom and their dress shoes were falling apart. As we followed them back to their trucks I noticed the trucks so resembled Tonka Toys from the 60's I couldn't help but smile and wondered what an air to ground missile from an F-16 would do to them. What's the point for bringing this up. Simple China isn't our enemy. They may be pushing us economically which we need that. If anyone takes time to visit China they will find that it's becoming what we used to be. The biggest fights I saw were people trying to get onto the limited shuttle buses that were taking shoppers to the newly opened Walmart . At the Chinese McDonalds ,KFC,& Pizza Hut .while they speak Chinese vs. Spanish you are better understood and your order is correct vs. here. So stop trying to stir up anti Chinese sentiment by harping on defense cuts and preparing to fight China. Yes we need to fund our forces at the highest amount ; but for technology that makes sense and can be used for both the next 100 year asymmetrical era as well as classical conflict via the Jihadist wave hick jacking nation states ( Egypt,Libya,and the already hijacked Iran thanks to a weak presidents understanding of global dynamics ).
For details on what types of technology can be used to secure ourselves with a solution in surveillance and security in an asymmetrical era please see posts at : http://www.falascoj.blogspot.com/ Constructive comments that can leverage anyone's product or position are welcome.
Monument to graduate. About 1,000 young Chinese got out of the trucks along with their drill instructors and marched in formation to the top of the Great Wall. Right behind them were their parents,boyfriends & girlfriends, (the graduating class was COED ) , "Don't Ask /Don't Tell Hasn't Reached the a PLA yet . The drill instructors lined the unit up and went into a typical pitch. Having only several months before watched my son graduate from his USAF basic training made me realize that drill instructors were the same all over the world. ( At least in organized provisional state oriented military groups vs. ? Jihad central). When the ceremony was over ---it strangely parallel what I had seen a few months before with the top squad , top recruit ,etc. mentioned , the graduates embraced their family members and left to celebrate. As I looked at the feet of the graduates I noticed almost every ones pants had holes in the bottom and their dress shoes were falling apart. As we followed them back to their trucks I noticed the trucks so resembled Tonka Toys from the 60's I couldn't help but smile and wondered what an air to ground missile from an F-16 would do to them. What's the point for bringing this up. Simple China isn't our enemy. They may be pushing us economically which we need that. If anyone takes time to visit China they will find that it's becoming what we used to be. The biggest fights I saw were people trying to get onto the limited shuttle buses that were taking shoppers to the newly opened Walmart . At the Chinese McDonalds ,KFC,& Pizza Hut .while they speak Chinese vs. Spanish you are better understood and your order is correct vs. here. So stop trying to stir up anti Chinese sentiment by harping on defense cuts and preparing to fight China. Yes we need to fund our forces at the highest amount ; but for technology that makes sense and can be used for both the next 100 year asymmetrical era as well as classical conflict via the Jihadist wave hick jacking nation states ( Egypt,Libya,and the already hijacked Iran thanks to a weak presidents understanding of global dynamics ).
For details on what types of technology can be used to secure ourselves with a solution in surveillance and security in an asymmetrical era please see posts at : http://www.falascoj.blogspot.com/ Constructive comments that can leverage anyone's product or position are welcome.
Thursday, May 24, 2012
Matel Toys Win The West When Applied to Surveillance and Security In An Asymmetrical Era
http://www.youtube.com/watch?v=W8qXLxHi9_8&sns=emhttp://www.youtube.com/watch?v=W8qXLxHi9_8&sns=em
These were the days . Before the crush of political correctness when kids could play in their yards and streets in front of their houses and not be afraid of predators on two legs. Consider this concept . When cowboys rode off the television range we lost our moral compass. What data supports this ? Well how many school shootings, courthouse bombings,freeway snipers,Holloway ,et. al incidents were there in the golden era of the western. Zero !!! Case closed. Within several years without realizing it the forces of islamic revolution coalesced and with the aid of a weak presidential decision not to back the Shah of Iran was lost and we entered the asymmetrical era of terror politics. We now must be prepared to put into place solution sets that will preserve our infrastructure .
These were the days . Before the crush of political correctness when kids could play in their yards and streets in front of their houses and not be afraid of predators on two legs. Consider this concept . When cowboys rode off the television range we lost our moral compass. What data supports this ? Well how many school shootings, courthouse bombings,freeway snipers,Holloway ,et. al incidents were there in the golden era of the western. Zero !!! Case closed. Within several years without realizing it the forces of islamic revolution coalesced and with the aid of a weak presidential decision not to back the Shah of Iran was lost and we entered the asymmetrical era of terror politics. We now must be prepared to put into place solution sets that will preserve our infrastructure .
Thursday, May 10, 2012
The New Craft of Intelligence: Achieving Asymmetric Advantage in the Face of Nontraditional Threats
Great descriptions of various topics related to asymmetrical warfare and theories we are facing in the asymmetrical era we are now participating in.
https://www.strategicstudiesinstitute.army.mil/pdffiles/PUB217.pdf
The New Craft of Intelligence: Achieving Asymmetric Advantage in the Face of Nontraditional Threats
http://en.wikipedia.org/wiki/Assymetrical_warfare#Tactical_basis
https://www.strategicstudiesinstitute.army.mil/pdffiles/PUB217.pdf
The New Craft of Intelligence: Achieving Asymmetric Advantage in the Face of Nontraditional Threats
http://en.wikipedia.org/wiki/Assymetrical_warfare#Tactical_basis
Monday, May 7, 2012
Capturing a New Asymmetrical Era
As we continue to study the themes of asymmetrical activities against the western world by Islamic jihadists bent on destroying our "morally bankrupt" way of life I find several things very ironic.
If the Islamic Jihadist gets to see all the Virgins after he performs his suicidal act can anyone explain what Osama Bin Laden was doing with his vast pornographic collection. Was he using it as source material to make training videos for the previously mentioned Jihadists Virgin visit ?
I'm always curious as to what the Jihadists do before a one way mission? Certainly they don't have the lore and group cohesion that any western force would have as the suicidal culture of their acts don't exactly engender it. What would the Islamic version of this video look like for example?
http://www.youtube.com/watch?v=p_AIP_NLMbI&sns=em
These observations are not met to be disrespectful or sarcastic. It's just that the Islamic movement has so little to say that is constructive or informative as to their behavior and action . Now is your opportunity to inform us . What do you have to say ?
If the Islamic Jihadist gets to see all the Virgins after he performs his suicidal act can anyone explain what Osama Bin Laden was doing with his vast pornographic collection. Was he using it as source material to make training videos for the previously mentioned Jihadists Virgin visit ?
I'm always curious as to what the Jihadists do before a one way mission? Certainly they don't have the lore and group cohesion that any western force would have as the suicidal culture of their acts don't exactly engender it. What would the Islamic version of this video look like for example?
http://www.youtube.com/watch?v=p_AIP_NLMbI&sns=em
These observations are not met to be disrespectful or sarcastic. It's just that the Islamic movement has so little to say that is constructive or informative as to their behavior and action . Now is your opportunity to inform us . What do you have to say ?
Thursday, May 3, 2012
Ten Top Reasons Why The Robotics Market Is Hot Again
10.Pervasive Internet
With the all encompassing reach of the Internet old ideas resurface and morph into a reflection of the current environment . With all the attention paid to drones and other related technology people have rediscovered robotics and using the connectivity of the Internet building a worldwide community. This factor gives some glue to the movement that didn't exist when the last crazes hit.
9. Shortage of New Technical Ideas
With technology breakthroughs being reduced to seeing how one can develop an API for Facebook or come up with another name for Cloud Computing is it any wonder people have rediscovered hard science and the tough problems that surround autonomous robotic behavior.
8. Robots Have Always Been Interesting
Since the days of Jules Verne and the advent of science fiction movies we have always been drawn to the mystic of robotic creations and potentials. In reality the Science Fiction is becoming Science Fact and we still are looking for our personal Gort or Robbie.
7. Popularity of Roomba & Scooba
The success of I-Robots home devices encouraged the market and has given a whole new legitimate cache to robotics. In the past there was no monetary basis or justification for the market. The fact a company could actually make money in this space has pushed the market along further then anything else could have.
6. Transformer Generation Grows Up
When the first robotics craze hit in the fifties the mass toy merchandising approach was limited to black and white TV adds that were pretty dull ,no Walmart's,Target's or Toys or Us and no Internet and companion video games. With the era of the Transformers twenty years latter a whole new generation got immersed in the total ecosystem that gave birth to the idea of reconfigurable toy robots. This generation now has the ability and where with all to dream of real robotic solutions for today's problems.
5. Government Incentives To Push The Envelope For DOD Requirements
Over the past few years DARPA and other DOD agencies have been pushing the state of the art in all things robotic by providing plenty of opportunities through challenges , BAA's, & SBIR's to gain funding for your robotic concepts. Having participated in the first DARPA autonomous land vehicle program in the mid 80's it's very rewarding to see how far things have progressed both technically and acceptance wise.
4. New Social Media & Old Line Technical Press Are Creating Buzz To Make Money
With the evolution of the Internet the era of the big trade show is over. No longer to 50,000 people in one day attend events like the NCC,Compdex, and all the other mega and minor trade shows. In the hay day of the Oil Industry, mini skirted girls served whiskey and beer while the Charlie Daniels band played. Those events have disappeared off the landscape and the trade show mavens have been replaced by the social media traffickers and their web pages ,tweeting and hijacking of LinkedIn and other sites to hype what ever market they are trying to create a buzz around. It is my observation that to fill an economic void this community has picked up on the robotics concept and proceeding to hype it to create a revenue stream for themselves. This trend has manifested itself in the past around any number of niche technologies. In the end the only winners are the companies hosting the websites , trade shows and related advertising entourage. The robotics technology companies are left asking :
http://www.youtube.com/watch?v=EOyQfd7OqIY&sns=em
3. The Enabling Technology Really Has Arrived
Perhaps after 50 years of dreaming the market has really arrived or is just around the corner. With such a convergence of technology it's not possible the the era of actual sustainable revenue models being generated by robotics companies has finally arrived. I personally believe we are closer then we have ever been before but not quite there yet.
2. Everyone Wants To Cash In On Popularity Of UAV's
The wild success of UAV's in the asymmetrical encounters we now face has obviously helped keep robotics and all related enabling technology on the front pages of not only national non technical publications but technical ones as well. This buzz has undoubtedly helped push forward interest in all things robotic.
1. Naive Technical Founders With No Perspective of History
As mentioned before the robotics craze is not new , just coming back for the third time depending on how you count since the fifties. Each time a little different and of course with more technology around it . The difference is now more then ever there seem to be more companies involved. Many of course are hobby , life style groups run by people who really can't and don't want to learn from the past mistakes that has caused this market to really never bake. Consider for example placing the robotics market next to say the automotive and aerospace markets. The parallels are very similar in that when each started they were considered fads. Within a much shorter time frame each became viable industries while virtually over the same timeline the robotics market has lurched along.
Monday, April 23, 2012
Perfect Example of Islamic Terror Groups Taking Advantage of Our Kindeness As A Nation
http://www.islamist-watch.org/blog/2012/04/action-alert-best-buy-tvs-computers-hamas?goback=%2Egde_1934231_member_109053583
The above reflects how islamist terror groups hide in the U.S. Now it seems that corporate america is assisting them. Where is the public outcry? When U.S. companies did anything in South Africa a few years ago it was huge news. The left called for no nothing for any U.S. company involved. Even if Best Buy is going down for the count we should hurry their path along. I hope we all stop our dealings with this group and make this information known to all.
The above reflects how islamist terror groups hide in the U.S. Now it seems that corporate america is assisting them. Where is the public outcry? When U.S. companies did anything in South Africa a few years ago it was huge news. The left called for no nothing for any U.S. company involved. Even if Best Buy is going down for the count we should hurry their path along. I hope we all stop our dealings with this group and make this information known to all.
Thursday, April 12, 2012
Energy Market Development Experience
In the past I have been involved in the following projects:
Solar Power
Provided process control technology including PLC & wireless technology for NASA solar power farm .
Provided DSP and industrial computing servers for San Diego based manufacturer of solar turbines.
Wind Power
Provided perimeter security systems for wind power farms . Systems included sensors,cameras ,access control and situational awareness .
Oil & Gas/ Nuclear
Image processing systems for major oil exploration activity using remote sensing to Shell Oil,Chevron,Gulf,Mobil and numerous independents.
DSP hardware for geophysical workstations to Slumberger , Atlas, Western Geophysical and numerous smaller systems integrators.
DSP and data acquisition sensors to Fairfield Industries for marine seismic packages.
Perimeter security systems including cameras,sensors ,wireless radios for government research contract on pipeline security.
Oil refinery security systems integration for Petrobas and U.S. Oil Reserve through Cisco integrator and thermal camera manufacture.
Numerous projects in refineries involving SCADA hardware ,PLC's and industrial computers.
Rugged displays from GE sold into oil rig control applications.
Nuclear power plant protection via physical security systems integration and research on China Syndrome using video and image processing.
Wireless base station integration and radio infrastructure sales to oil storage
Facilities to monitor inventory.
Management and control of transportation of nuclear waste using wireless system,integrated with cameras , and satellite communications. Customer was EG&G through Los Alamos Labs.
WMD training facility integration using wireless , sensors,situational awareness and UAV's for ORNL.
Solar Power
Provided process control technology including PLC & wireless technology for NASA solar power farm .
Provided DSP and industrial computing servers for San Diego based manufacturer of solar turbines.
Wind Power
Provided perimeter security systems for wind power farms . Systems included sensors,cameras ,access control and situational awareness .
Oil & Gas/ Nuclear
Image processing systems for major oil exploration activity using remote sensing to Shell Oil,Chevron,Gulf,Mobil and numerous independents.
DSP hardware for geophysical workstations to Slumberger , Atlas, Western Geophysical and numerous smaller systems integrators.
DSP and data acquisition sensors to Fairfield Industries for marine seismic packages.
Perimeter security systems including cameras,sensors ,wireless radios for government research contract on pipeline security.
Oil refinery security systems integration for Petrobas and U.S. Oil Reserve through Cisco integrator and thermal camera manufacture.
Numerous projects in refineries involving SCADA hardware ,PLC's and industrial computers.
Rugged displays from GE sold into oil rig control applications.
Nuclear power plant protection via physical security systems integration and research on China Syndrome using video and image processing.
Wireless base station integration and radio infrastructure sales to oil storage
Facilities to monitor inventory.
Management and control of transportation of nuclear waste using wireless system,integrated with cameras , and satellite communications. Customer was EG&G through Los Alamos Labs.
WMD training facility integration using wireless , sensors,situational awareness and UAV's for ORNL.
Monday, April 9, 2012
Optix Targets Enhanced All Weather Needs
The IdentifieR sights are devices suitable to be used by the Special forces, Army and Police. They provide clear and sharp picture of the battlefield regardless of the weather, thereby increasing the operational efficiency and precision of the staff as its security.
They are designed to exceed expectations with the following tasks:
target acquisition;
target fire;
fire control;
tactical and strategical surveillance;
field reconnaissance.
Visit : www.optixco.com
They are designed to exceed expectations with the following tasks:
target acquisition;
target fire;
fire control;
tactical and strategical surveillance;
field reconnaissance.
Visit : www.optixco.com
Thursday, April 5, 2012
What Will The Major Aerospace Players Do?
Interested in what long term cold war contractors will do to adjust their technology to the ecosystem being devised below. The jury is still out as to if this group can gain any traction with the finer points of their concepts but it's a sure bet that the military communications systems of the near future will all revolve around commercial infrastructure and especially off the shelf handsets ,iPads ,iPhones ,droids of all types . No need for expensive software defined radios, or any other non COTS device. This truth is going to make most of the community that chase this space very nervous because they are not intellectually capable of understanding how to play in a fluid commercial game.
http://www.aaicorp.com/pdfs/AAI_FASTCOM%2010-18-10FINAL.pdf
http://www.marketwatch.com/story/aai-unmanned-aircraft-systems-and-viasat-enter-strategic-alliance-2012-01-23
http://www.aaicorp.com/pdfs/AAI_FASTCOM%2010-18-10FINAL.pdf
http://www.marketwatch.com/story/aai-unmanned-aircraft-systems-and-viasat-enter-strategic-alliance-2012-01-23
Labels:
AAI,
FASTCOM,
Sensors,
Situtational Awareness,
UAV
Saturday, March 24, 2012
Sensor Experience
Sensor Experience Reviewed
Sensor experience covers a variety of applications involving military,industrial,medical and geophysical. Core sensor technology covers all types of data acquisition systems including test and analysis. Familiar with component sensor technology through subsystems such as cameras of all varieties,radar,sonar,ultrasound,etc. Have an underlying background in the enabling technology of sensors that addresses DSP,Image Processing and real time software. Design wins have been generated worldwide through direct customer contact or through channels. Elaboration on specific markets and customers closed can be found on my blog dealing with Embedded Computing :
http://www.linkedin.com/osview/canvas?_ch_page_id=1&_ch_panel_id=1&_ch_app_id=36471380&_applicationId=1200&_ownerId=159104&osUrlHash=NBj6&trk=hb_side_apps
Sensor experience covers a variety of applications involving military,industrial,medical and geophysical. Core sensor technology covers all types of data acquisition systems including test and analysis. Familiar with component sensor technology through subsystems such as cameras of all varieties,radar,sonar,ultrasound,etc. Have an underlying background in the enabling technology of sensors that addresses DSP,Image Processing and real time software. Design wins have been generated worldwide through direct customer contact or through channels. Elaboration on specific markets and customers closed can be found on my blog dealing with Embedded Computing :
http://www.linkedin.com/osview/canvas?_ch_page_id=1&_ch_panel_id=1&_ch_app_id=36471380&_applicationId=1200&_ownerId=159104&osUrlHash=NBj6&trk=hb_side_apps
Sensor Case Studies
Design win with GE Embedded Computing for DSP hardware attached to data acquisition boards of various types to form sonar sensor processing system for ROK Navy. While at GE I participated in multiple design wins that encompassed applications in radar,(MEADS), signal intelligence ,(Global Hawk),and sensor simulators with the P8 program. In all situations I managed the sales process using a combination of direct sales and technical assets and third party partners.
Design win with Textron Defense System for large sensor test bed utilized by the DOE @ Oak Ridge National Lab to conduct tests on best practices for border surveillance and security. Sold integrated solution of seismic sensors,cameras and ground radar sensors communicating via data link and 1553 enabled control station to micro UAV. Sale was 100K and closed mostly via e mail and one sales call at the end of the cycle to gain final commitment.
Design win with GE for avionics upgrade of NATO AWACS Radar processing suite. Sold a combination of high performance computing,data acquisition and communications modules including 1553 and 429 cards to Telephonics who combined the cards with their radar sensor technology for total system . In addition to providing the rugged versions of this technology I sold consulting and integration services.
Design with with CSPI consisting of VME array processors combined with data acquisition I/O boards into major geophysical applications that utilized seismic sensors for reservoir modeling . Customers were Fairfield Industries, Schlumberger , & several international players.
Design win with CSPI in medical sensor data acquisition for non invasive imaging applications . Customers included Imatron,General Electric,Philipps Ultrasound & several leading research institutes .
Design win with GE Embedded Computing for DSP hardware attached to data acquisition boards of various types to form sonar sensor processing system for ROK Navy. While at GE I participated in multiple design wins that encompassed applications in radar,(MEADS), signal intelligence ,(Global Hawk),and sensor simulators with the P8 program. In all situations I managed the sales process using a combination of direct sales and technical assets and third party partners.
Design win with Textron Defense System for large sensor test bed utilized by the DOE @ Oak Ridge National Lab to conduct tests on best practices for border surveillance and security. Sold integrated solution of seismic sensors,cameras and ground radar sensors communicating via data link and 1553 enabled control station to micro UAV. Sale was 100K and closed mostly via e mail and one sales call at the end of the cycle to gain final commitment.
Design win with GE for avionics upgrade of NATO AWACS Radar processing suite. Sold a combination of high performance computing,data acquisition and communications modules including 1553 and 429 cards to Telephonics who combined the cards with their radar sensor technology for total system . In addition to providing the rugged versions of this technology I sold consulting and integration services.
Design with with CSPI consisting of VME array processors combined with data acquisition I/O boards into major geophysical applications that utilized seismic sensors for reservoir modeling . Customers were Fairfield Industries, Schlumberger , & several international players.
Design win with CSPI in medical sensor data acquisition for non invasive imaging applications . Customers included Imatron,General Electric,Philipps Ultrasound & several leading research institutes .
Sunday, March 18, 2012
Innovation From Optex Leverages IPad as Physical Security Layout Force Multiplier
Just as in the wild west the six gun was the force multipler. With it on ones hip anyone could be a person to be reckoned with.
http://m.youtube.com/watch?v=OntwwcBVe6o
Today the internet and the IPAD have taken it's place in maximiz business productivity. Optex has taken things a step further in terms of productivity associated with laying out video coverage regarding to a site you want to provide security for. Take it from one who has assisted the MOD in reviweing imagey of Argentinean airfields on the Falklands to preparing perimeter defense schemes for FOB's on the slopes of Mt. Tumbledown to helping domestic homeland security resources and county sherriffs keep drug cartels from ambushing them the My Optex tool is a tremedous force multipler in the specifications of FOV, coverage distance,etc.
Any individual can start to asses their physical security planning needs with this layout tool. Rather then provide an example of utilization or give you the details of how intuitive this package is I suggest you download the application yourself and start working with it. I have created several simulation and modeling packages in the past to attempt to show the details of sensor integration combined with the various aspects of situational awareness but none came close to My Optix.
http://www.optexamerica.com/page.aspx?id=324
Consider how one could incorporate other modalities such as HAZMAT sensor capability to this scenario. Since HAZMAT sensors cover a variety of Chem/Bio threats and have such a scalable amount of ranges of detection this aspect of simulation and modeling alone would more then justify such a practice.
http://m.youtube.com/watch?v=OntwwcBVe6o
Today the internet and the IPAD have taken it's place in maximiz business productivity. Optex has taken things a step further in terms of productivity associated with laying out video coverage regarding to a site you want to provide security for. Take it from one who has assisted the MOD in reviweing imagey of Argentinean airfields on the Falklands to preparing perimeter defense schemes for FOB's on the slopes of Mt. Tumbledown to helping domestic homeland security resources and county sherriffs keep drug cartels from ambushing them the My Optex tool is a tremedous force multipler in the specifications of FOV, coverage distance,etc.
Any individual can start to asses their physical security planning needs with this layout tool. Rather then provide an example of utilization or give you the details of how intuitive this package is I suggest you download the application yourself and start working with it. I have created several simulation and modeling packages in the past to attempt to show the details of sensor integration combined with the various aspects of situational awareness but none came close to My Optix.
http://www.optexamerica.com/page.aspx?id=324
Consider how one could incorporate other modalities such as HAZMAT sensor capability to this scenario. Since HAZMAT sensors cover a variety of Chem/Bio threats and have such a scalable amount of ranges of detection this aspect of simulation and modeling alone would more then justify such a practice.
Labels:
Chem/Bio,
hazmat,
Modeling,
Simulation,
situational awareness
Young Chinese Business People Should Listen To Sun Tzu
Know your enemy and know yourself; in a hundred battles, you will never be defeated. When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant both of your enemy and of yourself, you are sure to be defeated in every battle. Obviously this advice isn't being taken by the posters on Linkedin
The below post was placed on several well informed sites that have their pulse on business with China . The intention of the post isn't to belittle the attempts being made by Chinese surveillance business leaders to go offshore but assist them in understanding they are doing themselves no good with their approach. They need to face the reality that they need to establish a U.S. ally that understands both markets from a business and cultural perspective.
How to Win In China
Chinese Surveillance & Security Companies Attempting To Enter U.S. Market
The LinkedIn sites dealing with technology ; especially related to surveillance cameras and security devices are being overwhelmed with very badly written product announcements and attempts to position Asian , mainly Chinese companies efforts to establish U.S. Distribution. It seems the naive posters apparently believe that an alreadyChina phobic U.S. Will appreciate their poor grammar, bad spelling and lack of American culture and take on their products to sell. I believe we are witnessing the first sea change in the attempt at international market development. My assessment is that the posters are all young computer and Internet savvy individuals who believe that they can apply social networking to sell their technical products. While social networking has a place in high technology selling it can't be the only part of the approach. I've asked myself what is missing in the equation. It's simple. After probing some of these posters I've learned that they are representing underfunded companies that can't afford to penetrate the world market through the establishment of any type of offshore presence. Are these posters foolish enough to think that the world market won't see this?
The LinkedIn sites dealing with technology ; especially related to surveillance cameras and security devices are being overwhelmed with very badly written product announcements and attempts to position Asian , mainly Chinese companies efforts to establish U.S. Distribution. It seems the naive posters apparently believe that an already
It's one thing to buy bed sheets that come from
Monday, March 5, 2012
Security & Surveillance Channel Development
In 2006 I was leading the sales efforts of video, graphics, and embedded hardware and analytic / intelligent control software for General Electric's Intelligent Platform Group. In order to gain access to additional types of security and surveillance specifiers, consultants and systems integrators I developed an alliance with the GE Security Group that focused on access control,IP enabled CCTV, and video storage. Through my coordination efforts our Intelligent Platform Group had developed a layered approach to channel development by identifying systems integrators who addressed the vertical applications of law enforcement, tactical military, and border security. We now wanted to address the applications that revolved around critical infrastructure protection, event security/entertainment and government assets. I developed an article on utilizing FPGA processed video to view change detection via management by an intelligent software package with an open approach that focused on biometrics, graphical map integration, DVR storage and playback. In addition to becoming a paper we also packaged it as an application note and a slide presentation I used to train GE Security engineering, building and architectural consultants such as Kroll Security, CH2M, Accenture, and various Native American IT groups looking to start their separate architectural practices first leveraging the concept of Data Center Security. I followed up with each group and started to detect an interesting trend. With the fluid nature of the security and surveillance market and the many application niches it seemed that every organization I was cultivating as a specifying channel was seeking to get into someone else's business. IT specifiers and channels want to do security projects for data centers. Oil &Energy services companies want to expand from providing basic traditional "patch" services to doing specifications on pipeline and refinery protection. When I concluded by sessions with the GE partner architectural and engineering consultants and specifiers I started looking to develop a variety of channels that service and sell into all aspects of the surveillance and security market. Because this market segment is composed of so many specific applications it is quite diverse and no one channel can address all the applications and projects that exist. The below input is from an 8A (small disadvantaged business) that specializes in video and sensor integration of critical infrastructure. I have been assisting them for several years in proposal preparation and providing product guidance.
Hello Jim-
It is great to hear from you my friend. I was thinking of you last week and would love to re-engage with you. The area is moving ahead with UAV and all types of sensor activity; as such I would value your thoughts on the UGS. Is it dead? Is there a way forward teaming with you? Guided by you? Is it worth it anymore? I also have a proposed project that we wish to submit for possible grant funding. It is an exciting project we call U-VOE (Unattended Ground Sensor-Visual Optical Electromagnetic) detection. Let’s talk.
Mark
The references to UAV (unmanned Air Vehicle) and UGS (unmanned ground sensor) show how this market has become a combination of technologies that have come along way from card readers , low resolution cameras and pop up barriers.
My objective in channel development that addresses the security and surveillance market is to reach out to all levels of groups and individuals that can act as force multipliers to the technology I represent. The key goal I am seeking to gain is exposure to a project. Without a security project it is very hard to have more then a philosophical discussion about any product technology beyond its core features and benefits. The existence of the project allows the discussion to become framed and the presenter to demonstrate their grasp of a solution by being able to relate the technology to the application the client has.
In pursuing a strategy that includes an ecosystem that is populated by architectural and engineering specifiers and consultants, defense oriented channels who understand sensors, law enforcement resources who relate to how "cops" think and IT integrators that look at connecting all the data collection to the cloud I have focused on building relationships where I am viewed as brining the channel an opportunity to leverage what I offer via a product.
The proof that this approach pays off is demonstrated by the above request from the partner referenced to assist with his proposal. These types of relationships take years to develop and I have numerous ones that I can reach out to with anyone's product portfolio and develop sales strategies around. The efforts could come from research funding, product sales or service approaches.
One of the better sub channels I have developed stems from creating relationships with Cisco Partners that are focusing on the security market from the perspective of hardware resell coupled with various types of added value. These Channel VAR's are either A&E or IT subject matter experts who provide a variety of service and value add product into the security and surveillance sector. Currently I have established a personal relationship with three such groups. Each has unique subsets of capabilities & all represent great connectivity to projects that can pull in a variety of software and hardware products. Red River , (www.redriver.com) is a systems integrator that has as its core value the ability to place products onto a government buying contract that allows any government group to purchase quickly off of a catalog of products. I facilitated several sales in this fashion and cut the purchasing time from months to weeks. Red River also is involved with a number of projects such as the protection of the Port of Charleston, South Carolina and the U.S. Oil reserves, where security products are always being added on. Augusta Systems, (http://www.augustasystems.com), is the developer of scalable middleware that controls any sensor or camera from a remote operating environment. As a Cisco VAR they back ended their software environment with Cisco hardware that stored and managed the data collected. I sold them several sensor packages they integrated into a bigger system that managed various unmanned and manned assets as well as cameras to provide perimeter security for a variety of critical infrastructure. I utilized this group to target various border security and infrastructure protection projects. Prosis Network Systems, (http://prosishawaii.com), specializes in the video aspect of Cisco’s hardware portfolio. They used storage , routing and video hardware content from Cisco and integrate it with a variety of other technology. From the A&E side they focus on preparing site surveys and providing consulting services to groups looking to establish a security plan for their project. I developed them as a channel partner to pursue opportunities in data center protection, water treatment plant surveillance, military base protection, VIP security and other projects involving various high value infrastructures.
Other channel partners I have developed include a combination of manufacturers of cameras, UAV’s, UGV’s, biometric software and situational awareness software packages. The main theme in developing relationships is to gain access to projects and programs that could utilize my technology.
Labels:
Augusta Systems,
Channel Partners,
Prosis,
Red River Computer
Monday, February 13, 2012
How To Deal With The Somali Pirates Using New Era Surveillance & Security
When one views the asymmetric threat we now face and will continue to face one is struck by the stark differences in methods of engagement. All through history nation states have engaged in combative activities that have pitted nation state against nation state . The forces involved engaged through predictable and usual modes of assault and defense . The sides were identifiable and usually had long battle histories and honors associated with the units involved . It could have been the Roman Legion vs Hannibal or the Flower of France against Henry's bowmen at Agincourt . Each unit involved was well known and had distinguished themselves many times in the past. Our own military is rich in the traditions of different units and their battle honors. We have our famous airborne units , the 82nd and 101st. The 101st having been of "Band of Brothers" fame. Why is this of significance? Because the enemy we are engaged with today can site no such path. If we are to believe the BBC video first the Somali pirates became pirates because the western nations came and took their fish through organized commercial methods and then in a tremendous segway the video claims it was dumping of toxic waste that caused the Somalis to seek a new career path. Perhaps both these events were causes and to be sure many more. One potential solution that does not require nation state building as in trying to go into Somalia and actually make them a western style country would be for each country and specifically the ship transit companies to simply create a fund. This fund would then distibute money to the top three navies of the world. The USN,RN & third pick would then act as a "shield" . The technology techniques plus the art of professional naval warfare described in the website @ :http://surveillance-securityinanasymmetricalera.com/ would be applied.
Case closed .
Case closed .
Wednesday, February 8, 2012
IR Groups Beware: You Could Quickly Become Blacksmiths
Here is yet another example of exploitation of technology to drive costs lower and potentially open massive commercial space applications
Instead of relying on bulky helmets and goggles to provide vital battlefield data, the Defense Advanced Research Projects Agency is looking to make contact lenses with built-in systems that would allow soldiers to focus on distant targets and overlay their vision with tactical information.
A part of the agency’s Soldier Centric Imaging Via Computational Cameras (SCENICC) program, the goal of the effort is to provide individual soldiers with data from reconnaissance drones and battlefield sensors — a capability gap that the DOD is trying to remedy, DARPA officials said.
Researchers at Innovega iOptics are working with DARPA to develop the contact lenses, which would work by projecting digital images onto tiny full-color displays next to the wearer’s eyes. The lenses also will allow soldiers to focus on objects both near and at a great distance.
The goal of the SCENICC program is to develop new imaging and hardware capabilities that greatly enhance warfighters’ awareness, security and survivability, DARPA officials said in a statement.
Instead of relying on bulky helmets and goggles to provide vital battlefield data, the Defense Advanced Research Projects Agency is looking to make contact lenses with built-in systems that would allow soldiers to focus on distant targets and overlay their vision with tactical information.
A part of the agency’s Soldier Centric Imaging Via Computational Cameras (SCENICC) program, the goal of the effort is to provide individual soldiers with data from reconnaissance drones and battlefield sensors — a capability gap that the DOD is trying to remedy, DARPA officials said.
Researchers at Innovega iOptics are working with DARPA to develop the contact lenses, which would work by projecting digital images onto tiny full-color displays next to the wearer’s eyes. The lenses also will allow soldiers to focus on objects both near and at a great distance.
The goal of the SCENICC program is to develop new imaging and hardware capabilities that greatly enhance warfighters’ awareness, security and survivability, DARPA officials said in a statement.
Monday, February 6, 2012
Optix Inc. Flexible Uncooled Portable Surveillance Camera
Here is a review of a great approach to portable uncooled surveillance solutions
Minion: A portable uncooled thermal vision camera perfect for integration in observation CCTV systems. It allows 24-hours surveillance in total darkness and harsh weather conditions. The optical system and digital enhancement of the video signal provide high contrast, detailed and sharp pictures at any time in a completely passive mode. The reliable mechanical construction makes Minion suitable for any type of inside and outside mounting. Along with its accessories Minion includes user software for remote control and setup of the main functions. It is designed for versatile applications in the surveillance systems range, fire-precaution appliances, video observation of border areas and strategic zones. Other features include monitoring of the specified area to detect any abnormal behavior (intrusion attempt) caused by people or vehicles. Visual verification of the intruding object in the specified area under all weather conditions. Transfer of the alarm information including the image to a remote headquarters for further investigation in decision making process and also to mobile patrols. Monitoring of the technical state of the system and all of its components and transfer of status information (including information about any technical faults, power outages, sabotage attempts and others) to a remote Headquarters. Remote system and subsystem diagnostics from a remote Headquarters, in order to repair (fully or partially) or limit damages to the system with-out physical presence on site.
sales@optixco.com, http://www.optixco.com/
Labels:
security,
Sensors,
situational awareness,
uncooled CCTV
Sunday, January 29, 2012
MQ-1 Predator UAS: Aircraft profile
http://www.aviationspectator.com/resources/aircraft-profiles/mq-1-predator-uas-aircraft-profile
This is a fantastic link to the various configurations and payloads that make up the Predator UAV ecosystem . Having supported General Atomics in the early days of this program by selling them enabling DSP technology it has been very rewarding to what the successful evolution of this platform.
This is a fantastic link to the various configurations and payloads that make up the Predator UAV ecosystem . Having supported General Atomics in the early days of this program by selling them enabling DSP technology it has been very rewarding to what the successful evolution of this platform.
Wednesday, January 18, 2012
Surveillance & Security For Harbor & Port Applications Leveraging Infrared Technology
In today's asymmetric environment numerous soft spots exist along our extensive coastlines. With so much commerce coming into the existing U.S. Port infrastructure it becomes an inviting scenario for would be non nation state actors to plan 9/11 type attacks using a variety of potential platforms. While most U.S. Ports and Harbors have deployed defensive measures of various types most if not all do not provide a scalable approach to situational awareness and if they do depend on minimal sensor modalities and offer no analytic capability to measure or gauge intent, group affiliation or a host of related cultural and behavioral factors. One then asks why?
Background
In our post 9/11 world we quickly rushed to through up the best systems we could to defend against the obvious threat an attack on our multi coastal harbor infrastructure. The solution sets deployed included swimmer in the water detection, cameras, radars, water based barriers, patrol boats and lately several unmanned platforms. These solutions may but mostly are not integrated with other assets and often are stovepipe in nature. One can put it in the perspective of a pre 9/11 airport world where passengers showed up and walked to their gates without any security to our existing situation. In other words port security today is about equal to airport security after 9/11.
Today's Threat
Since 9/11 three separate and non related threats have manifested themselves as potentials to port and coastal security. Each is driven by a different ecosystem and requires different methods of detection and entry point control. A key design metric to any improved system would therefore be scalable and flexible to a threat that is always morphing and has been referenced comes in various categories. The port and coastal security systems of today don't have the granularity in sensor coverage and certainly not in the backend common operating picture and projected situational awareness to account for multiple types of threats or the adaptability of those threats to work around deployed security measures. We can almost view our currant deployed harbor and coastal security systems to be our version of the Maginot Line that was deployed byFrance in the 1930's to defend against another incursion by Germany . Just as the German blitzkrieg punctured this static defense so will the new threats to our existing system.
Background
In our post 9/11 world we quickly rushed to through up the best systems we could to defend against the obvious threat an attack on our multi coastal harbor infrastructure. The solution sets deployed included swimmer in the water detection, cameras, radars, water based barriers, patrol boats and lately several unmanned platforms. These solutions may but mostly are not integrated with other assets and often are stovepipe in nature. One can put it in the perspective of a pre 9/11 airport world where passengers showed up and walked to their gates without any security to our existing situation. In other words port security today is about equal to airport security after 9/11.
Today's Threat
Since 9/11 three separate and non related threats have manifested themselves as potentials to port and coastal security. Each is driven by a different ecosystem and requires different methods of detection and entry point control. A key design metric to any improved system would therefore be scalable and flexible to a threat that is always morphing and has been referenced comes in various categories. The port and coastal security systems of today don't have the granularity in sensor coverage and certainly not in the backend common operating picture and projected situational awareness to account for multiple types of threats or the adaptability of those threats to work around deployed security measures. We can almost view our currant deployed harbor and coastal security systems to be our version of the Maginot Line that was deployed by
Threat One: Contraband
Several items come to mind under this category. The first revolves around the escalating movement of illicit drugs. In the past several years since 9/11 his area has expanded exponentially due to the involvement of the organized drug cartels. The cartels have taken the place of the sporadic individual occurrences of the past. Today cartels have as much technology and funding as nation states. They have shown an amazing capability to morph in response to every government deterrence effort. The cartels first would use speed boats and ski do's to move product into harbors or land on isolated coastlines. Seeing these efforts somewhat compromised by government security efforts they have now moved to the utilization of small submarines,UAV's,and unmanned surface craft. Having the financial resources to seek out and utilize this technology is a chilling reality. Not only are these techniques being used to move drugs but they also have the potential to transport another even more dangerous set of threats to national security. The components of this threat could be any number of substances in the WMD category .The risk of nuclear, chemical or biological materials entering via a port or our coastline is real potential to consider.
Threat Two: Illegal Aliens
The entry of illegal aliens has always been an issue on our southern border and now with a renewed interest in organized international human trafficking cartels the threat has increased with regard to ports and coastal areas. We have seen all types of creative schemes being worked that have involved cargo containers, small craft of all types, swimmers and the use of ultra lights launched from off shore.
Threat Three: Terrorists
The potential for port entry by terrorists has always existed but today the threat has increased with the inclusion of groups affiliated with Hezbollah, Hamas, and al- Qaida. These groups are well funded and supplied with an impressive arsenal of technology to support all types of potential entry scenarios. The U.S. Customs & Border Patrol has indicated at least 2,000 individuals who are OTM, (other then Mexican), have crossed into theU.S. In the last 18 months. At least 200 remain at large. These incursions have been verified through multiple forms of forensic evidence found at camps,” safe houses", and entry points.
Strategy for Protecting against the New Threats
Given the above examples all having the recurring theme regarding today's threats are ever changing it then becomes important to provide a scalable surveillance and security infrastructure. This improved approach would revolve around integration of multiple sensor modalities, an intuitive and analytical situational awareness oriented common operating picture, clear crisp pictorial display, and the ability to manage resources such as UAV's & UGV's. A potential solution set end to end could include infrared panoramic cameras from HGH Infrared, passing information to a common operating environment being managed by neural net software from Natural Selection Inc. allowing cutting edge display on Aydin Displays monitors. The scenario could unfold as follows; an Ultra-wide 360-degree panoramic field of view (FOV) camera from a group such as HGH Infrared with continuous IR monitoring capabilities allowing for day or night data collection would be deployed in a strategic location near a harbor entrance or close to critical infrastructure such as an oil off loading facility . If potential blind spots are determined due to terrain or man made obstacles then multiple cameras may be required. This type of deployment will allow for 360 degree horizontal field of view (FOV) capturing infrared imagery in all directions simultaneously - unlike traditional cameras with limited horizontal FOVs . This 360-degree wide area coverage eliminates intruders' ability to predict traditional camera movement that causes breaches of perimeter into the harbor area or along the shoreline. The camera technology provides automatic intrusion detection and tracking allowing the user to quickly navigate the entire 360ยบ panoramic image to zoom in on areas of interest. The high-sensitivity infrared revolving camera head can detect a human from a distance of 1-3 kilometers, vehicles from 2-10 kilometers and vessels from 3-15 kilometers. This front end sensor would then be complimented by the capabilities of Natural Selection Inc.who have developed a flexible and scalable neural net based environment that when leveraged with a variety of sensor inputs & cloud based data will allow the user to create a situational awareness picture that can scale and adapt to the threat types indicated as they scale and morph over time. Consider how one could integrate pattern recognition, self learning and data mining into application modules addressing Threat Profiling, Modeling Adversary Behavior & Intent, Perimeter Security and links to managing and route planning for unmanned platforms on land, in the air or on the water. The collected sensor data along with deductive reasoning outcomes would then be projected into a combination of high resolution displays from groups such as Aydin who can deploy both in the field or a command and control center user oriented visuals. With the increasing dependence on unmanned systems to augment port and coastal security it would be very valuable to tie the sensor chain described into the control and management of those platforms. Unmanned systems and sensor payloads require highly reliable and repeatable inertial sensors for effective feedback in control navigation, and guidance. Moog Crossbow technology can be used in UAV’s,UUV’s and UGV’s to provide continuous orientation, position and heading information specially designed for the high dynamic and aggressive maneuvers. This control and guidance capability could be greatly aided by software modules and reasoning from Natural Selections that would register intent and plan potential routes these platforms could take to offer a greater degree of surveillance and security coverage to port or coastal deployment.
Several items come to mind under this category. The first revolves around the escalating movement of illicit drugs. In the past several years since 9/11 his area has expanded exponentially due to the involvement of the organized drug cartels. The cartels have taken the place of the sporadic individual occurrences of the past. Today cartels have as much technology and funding as nation states. They have shown an amazing capability to morph in response to every government deterrence effort. The cartels first would use speed boats and ski do's to move product into harbors or land on isolated coastlines. Seeing these efforts somewhat compromised by government security efforts they have now moved to the utilization of small submarines,UAV's,and unmanned surface craft. Having the financial resources to seek out and utilize this technology is a chilling reality. Not only are these techniques being used to move drugs but they also have the potential to transport another even more dangerous set of threats to national security. The components of this threat could be any number of substances in the WMD category .The risk of nuclear, chemical or biological materials entering via a port or our coastline is real potential to consider.
Threat Two: Illegal Aliens
The entry of illegal aliens has always been an issue on our southern border and now with a renewed interest in organized international human trafficking cartels the threat has increased with regard to ports and coastal areas. We have seen all types of creative schemes being worked that have involved cargo containers, small craft of all types, swimmers and the use of ultra lights launched from off shore.
Threat Three: Terrorists
The potential for port entry by terrorists has always existed but today the threat has increased with the inclusion of groups affiliated with Hezbollah, Hamas, and al- Qaida. These groups are well funded and supplied with an impressive arsenal of technology to support all types of potential entry scenarios. The U.S. Customs & Border Patrol has indicated at least 2,000 individuals who are OTM, (other then Mexican), have crossed into the
Strategy for Protecting against the New Threats
Given the above examples all having the recurring theme regarding today's threats are ever changing it then becomes important to provide a scalable surveillance and security infrastructure. This improved approach would revolve around integration of multiple sensor modalities, an intuitive and analytical situational awareness oriented common operating picture, clear crisp pictorial display, and the ability to manage resources such as UAV's & UGV's. A potential solution set end to end could include infrared panoramic cameras from HGH Infrared, passing information to a common operating environment being managed by neural net software from Natural Selection Inc. allowing cutting edge display on Aydin Displays monitors. The scenario could unfold as follows; an Ultra-wide 360-degree panoramic field of view (FOV) camera from a group such as HGH Infrared with continuous IR monitoring capabilities allowing for day or night data collection would be deployed in a strategic location near a harbor entrance or close to critical infrastructure such as an oil off loading facility . If potential blind spots are determined due to terrain or man made obstacles then multiple cameras may be required. This type of deployment will allow for 360 degree horizontal field of view (FOV) capturing infrared imagery in all directions simultaneously - unlike traditional cameras with limited horizontal FOVs . This 360-degree wide area coverage eliminates intruders' ability to predict traditional camera movement that causes breaches of perimeter into the harbor area or along the shoreline. The camera technology provides automatic intrusion detection and tracking allowing the user to quickly navigate the entire 360ยบ panoramic image to zoom in on areas of interest. The high-sensitivity infrared revolving camera head can detect a human from a distance of 1-3 kilometers, vehicles from 2-10 kilometers and vessels from 3-15 kilometers. This front end sensor would then be complimented by the capabilities of Natural Selection Inc.who have developed a flexible and scalable neural net based environment that when leveraged with a variety of sensor inputs & cloud based data will allow the user to create a situational awareness picture that can scale and adapt to the threat types indicated as they scale and morph over time. Consider how one could integrate pattern recognition, self learning and data mining into application modules addressing Threat Profiling, Modeling Adversary Behavior & Intent, Perimeter Security and links to managing and route planning for unmanned platforms on land, in the air or on the water. The collected sensor data along with deductive reasoning outcomes would then be projected into a combination of high resolution displays from groups such as Aydin who can deploy both in the field or a command and control center user oriented visuals. With the increasing dependence on unmanned systems to augment port and coastal security it would be very valuable to tie the sensor chain described into the control and management of those platforms. Unmanned systems and sensor payloads require highly reliable and repeatable inertial sensors for effective feedback in control navigation, and guidance. Moog Crossbow technology can be used in UAV’s,UUV’s and UGV’s to provide continuous orientation, position and heading information specially designed for the high dynamic and aggressive maneuvers. This control and guidance capability could be greatly aided by software modules and reasoning from Natural Selections that would register intent and plan potential routes these platforms could take to offer a greater degree of surveillance and security coverage to port or coastal deployment.
Saturday, January 7, 2012
Digital Sign Architecture
Digital Sign Architecture
Digital Sign Solutions can be created for various applications and utilizing a variety of enabling technology. It should be obvious to anyone who wants to communicate information today that the wired world is here and their message needs to be packaged and "seen" in a way that grabs the digitally aware masses. Consider how best to mix and match these components to best communicate your message.
LCD Display
The LCD is the visual connection to the digital signage audience. It goes without saying that the display must project a crisp picture that is clear and bright in all types of lighting situations. Internal to the LCD there may be embedded computing combined with FPGA resources to add additional enhancements such as graphics,biometric analysis , picture within picture,screen splits of multiple types and a variety of user dashboard capabilities. Two sites that provide potential high performance LCD displays and related technology with the latter focusing on some interesting applications are:
http://aydindisplays.com/
http://www.eyevis.de/index.php?article_id=193&clang=1
Frequently custom requirements will come into play for Digital SIgnage and seeking a supplier that can go beyond the mass production approach will be a vital requirement in operational benifits.
Wall Controller
Wall Controllers from Trenton Technologies ;http://www.trentontechnology.com/products/video-display-wall-systems
drive the LCD displays that can be configured in a variety of ways depending on the circumstances of the provider. Since Trenton Technologies and others offer flexible packages the digital signage could be configured as a kiosk , a wall of displays, clustered or simply hanging from the ceiling.
DVD Recorder
Having a robust DVD or media player integrated into your system will greatly enhance user attentiveness and potential interactive experiences depending on the application area. A group providing numerous solutions along with controlling software is: http://www.visix.com/digital-signage-media-players.html
Wireless Infrastructure
Inserting wireless technology features to the Digital Signage solution mix opens up a variety of flexible potentials including the ability too:
Update content wirelessly,never physically plugging into the installed Digital Signage Infrastructure
Constrained by space too small, or too hard to work with, but would be the perfect place to get your message across
Sit in your car and update content on your wireless digital signage network
A great many tips and innovative products that could leverage your wireless Digital Signage Solution can be found at :
http://www.wirelessdigitalsignage.com
Cloud Computing
As increased techniques in the evolving area of Cloud Computing are coming into play more and more organizations are integrating benefits into their Digital Signage strategy . The more intelligence there is in the LCD display the More opportunity there will be to gain:
Decreased operating costs
Improvements in message flexibility
Increased security compliance
Increased asset allocation
A great review can be found at :
http://www.digitalsignagetoday.com/whitepapers/4670/Four-Benefits-of-Cloud-Based-Computing-for-Digital-Signage-Networks
Software & Other value add
Lastly all the above hardware needs to be managed by a scalable and content interactive software environment that leaves room for expansion. Software and control approaches are the areas where integrators can offer the greatest amount of value add. There are multiple companies offering packages that address all types of scenarios but one that quickly caught my eye can be found at:
http://www.scala.com/digital-signage-products
Conclusion
All one has to do is go to a Barnes&Noble or a Toys R Us and observe small children at work on their Leap Frogs or other digital appliances to realize we are indeed entering a new era of communication and information management. How when children now are using Leap Frogs and other devices to communicate and learn will they ever be satisfied with the traditional signage and methods of advertisement of today. They world will demand more sophistication then ever before in how we communicate information and static signage just won't appeal to the new generation of consumers. Business will need to understand how to best leverage this phenomenon and gain the maximum amount of exposure for their message.
Digital Sign Architecture
Digital Sign Solutions can be created for various applications and utilizing a variety of enabling technology. It should be obvious to anyone who wants to communicate information today that the wired world is here and their message needs to be packaged and "seen" in a way that grabs the digitally aware masses. Consider how best to mix and match these components to best communicate your message.
LCD Display
The LCD is the visual connection to the digital signage audience. It goes without saying that the display must project a crisp picture that is clear and bright in all types of lighting situations. Internal to the LCD there may be embedded computing combined with FPGA resources to add additional enhancements such as graphics,biometric analysis , picture within picture,screen splits of multiple types and a variety of user dashboard capabilities. Two sites that provide potential high performance LCD displays and related technology with the latter focusing on some interesting applications are:
http://aydindisplays.com/
http://www.eyevis.de/index.php?article_id=193&clang=1
Frequently custom requirements will come into play for Digital SIgnage and seeking a supplier that can go beyond the mass production approach will be a vital requirement in operational benifits.
Wall Controller
Wall Controllers from Trenton Technologies ;http://www.trentontechnology.com/products/video-display-wall-systems
drive the LCD displays that can be configured in a variety of ways depending on the circumstances of the provider. Since Trenton Technologies and others offer flexible packages the digital signage could be configured as a kiosk , a wall of displays, clustered or simply hanging from the ceiling.
DVD Recorder
Having a robust DVD or media player integrated into your system will greatly enhance user attentiveness and potential interactive experiences depending on the application area. A group providing numerous solutions along with controlling software is: http://www.visix.com/digital-signage-media-players.html
Wireless Infrastructure
Inserting wireless technology features to the Digital Signage solution mix opens up a variety of flexible potentials including the ability too:
Update content wirelessly,never physically plugging into the installed Digital Signage Infrastructure
Constrained by space too small, or too hard to work with, but would be the perfect place to get your message across
Sit in your car and update content on your wireless digital signage network
A great many tips and innovative products that could leverage your wireless Digital Signage Solution can be found at :
http://www.wirelessdigitalsignage.com
Cloud Computing
As increased techniques in the evolving area of Cloud Computing are coming into play more and more organizations are integrating benefits into their Digital Signage strategy . The more intelligence there is in the LCD display the More opportunity there will be to gain:
Decreased operating costs
Improvements in message flexibility
Increased security compliance
Increased asset allocation
A great review can be found at :
http://www.digitalsignagetoday.com/whitepapers/4670/Four-Benefits-of-Cloud-Based-Computing-for-Digital-Signage-Networks
Software & Other value add
Lastly all the above hardware needs to be managed by a scalable and content interactive software environment that leaves room for expansion. Software and control approaches are the areas where integrators can offer the greatest amount of value add. There are multiple companies offering packages that address all types of scenarios but one that quickly caught my eye can be found at:
http://www.scala.com/digital-signage-products
Conclusion
All one has to do is go to a Barnes&Noble or a Toys R Us and observe small children at work on their Leap Frogs or other digital appliances to realize we are indeed entering a new era of communication and information management. How when children now are using Leap Frogs and other devices to communicate and learn will they ever be satisfied with the traditional signage and methods of advertisement of today. They world will demand more sophistication then ever before in how we communicate information and static signage just won't appeal to the new generation of consumers. Business will need to understand how to best leverage this phenomenon and gain the maximum amount of exposure for their message.
Digital Sign Solutions can be created for various applications and utilizing a variety of enabling technology. It should be obvious to anyone who wants to communicate information today that the wired world is here and their message needs to be packaged and "seen" in a way that grabs the digitally aware masses. Consider how best to mix and match these components to best communicate your message.
LCD Display
The LCD is the visual connection to the digital signage audience. It goes without saying that the display must project a crisp picture that is clear and bright in all types of lighting situations. Internal to the LCD there may be embedded computing combined with FPGA resources to add additional enhancements such as graphics,biometric analysis , picture within picture,screen splits of multiple types and a variety of user dashboard capabilities. Two sites that provide potential high performance LCD displays and related technology with the latter focusing on some interesting applications are:
http://aydindisplays.com/
http://www.eyevis.de/index.php?article_id=193&clang=1
Frequently custom requirements will come into play for Digital SIgnage and seeking a supplier that can go beyond the mass production approach will be a vital requirement in operational benifits.
Wall Controller
Wall Controllers from Trenton Technologies ;http://www.trentontechnology.com/products/video-display-wall-systems
drive the LCD displays that can be configured in a variety of ways depending on the circumstances of the provider. Since Trenton Technologies and others offer flexible packages the digital signage could be configured as a kiosk , a wall of displays, clustered or simply hanging from the ceiling.
DVD Recorder
Having a robust DVD or media player integrated into your system will greatly enhance user attentiveness and potential interactive experiences depending on the application area. A group providing numerous solutions along with controlling software is: http://www.visix.com/digital-signage-media-players.html
Wireless Infrastructure
Inserting wireless technology features to the Digital Signage solution mix opens up a variety of flexible potentials including the ability too:
Update content wirelessly,never physically plugging into the installed Digital Signage Infrastructure
Constrained by space too small, or too hard to work with, but would be the perfect place to get your message across
Sit in your car and update content on your wireless digital signage network
A great many tips and innovative products that could leverage your wireless Digital Signage Solution can be found at :
http://www.wirelessdigitalsignage.com
Cloud Computing
As increased techniques in the evolving area of Cloud Computing are coming into play more and more organizations are integrating benefits into their Digital Signage strategy . The more intelligence there is in the LCD display the More opportunity there will be to gain:
Decreased operating costs
Improvements in message flexibility
Increased security compliance
Increased asset allocation
A great review can be found at :
http://www.digitalsignagetoday.com/whitepapers/4670/Four-Benefits-of-Cloud-Based-Computing-for-Digital-Signage-Networks
Software & Other value add
Lastly all the above hardware needs to be managed by a scalable and content interactive software environment that leaves room for expansion. Software and control approaches are the areas where integrators can offer the greatest amount of value add. There are multiple companies offering packages that address all types of scenarios but one that quickly caught my eye can be found at:
http://www.scala.com/digital-signage-products
Conclusion
All one has to do is go to a Barnes&Noble or a Toys R Us and observe small children at work on their Leap Frogs or other digital appliances to realize we are indeed entering a new era of communication and information management. How when children now are using Leap Frogs and other devices to communicate and learn will they ever be satisfied with the traditional signage and methods of advertisement of today. They world will demand more sophistication then ever before in how we communicate information and static signage just won't appeal to the new generation of consumers. Business will need to understand how to best leverage this phenomenon and gain the maximum amount of exposure for their message.
Wednesday, January 4, 2012
Sensors & Packaging Required For The New Threat
In the mid 1980's it was the height of the Cold War & DARPA was seeking was to achieve a degree of force multiplication against Soviet quantity. The conceived solution was to create autonomous land power that could be projected in a number of ways. The perceived applications revolved around
combating ground vehicles, ISR, troop replenishment, and security. In order to create these application opportunities extensive work would be required in artificial intelligence ,navigation,video,display,& image processing .DARPA created an extensive ecosystem of over one hundred contractors in both industry and academia to develop algorithms that would guide a vehicle first on a road and then off road to accomplish a variety of prescribed applications. At the time Vicom Image Processors produced by Vicom Inc. offered a capability for stand alone image processing and display. These innovative systems were easy to program and compact which allowed for embedding them into the vehicle test beds. Vicom was started by Dr. William K. Pratt, http://sipi.usc.edu/about/ , and focused on image processing technology packaged so researchers and production OEM’s could leverage the technology. The driving force behind Vicom was a great mentor and I enjoyed making sales calls with him.
A number of groups in the Eco system were seeking this type of versatility to develop their algorithms, apply artificial reasoning to guidance capability and provide storage for road following data bases.
In this environment I sold systems to groups located across the Western U.S from the likes of Hughes Research, DELCO, University of Arizona, Sandia Labs, United Technology, LMCO,Martin Marietta, AI&D’s, & TACOM.
Subscribe to:
Posts (Atom)