Custom Search
----------------------------------------------- Blogger Template Style Name: Awesome Inc. Designer: Tina Chen URL: tinachen.org ----------------------------------------------- */ /* Variable definitions ==================== */ /* Content ----------------------------------------------- */ body { font: normal normal 13px Arial, Tahoma, Helvetica, FreeSans, sans-serif; color: #ffffff; background: #000000 url(http://www.blogblog.com/1kt/awesomeinc/body_background_dark.png) repeat scroll top left; } html body .content-outer { min-width: 0; max-width: 100%; width: 100%; } a:link { text-decoration: none; color: #888888; } a:visited { text-decoration: none; color: #444444; } a:hover { text-decoration: underline; color: #cccccc; } .body-fauxcolumn-outer .cap-top { position: absolute; z-index: 1; height: 276px; width: 100%; background: transparent url(http://www.blogblog.com/1kt/awesomeinc/body_gradient_dark.png) repeat-x scroll top left; _background-image: none; } /* Columns ----------------------------------------------- */ .content-inner { padding: 0; } .header-inner .section { margin: 0 16px; } .tabs-inner .section { margin: 0 16px; } .main-inner { padding-top: 30px; } .main-inner .column-center-inner, .main-inner .column-left-inner, .main-inner .column-right-inner { padding: 0 5px; } *+html body .main-inner .column-center-inner { margin-top: -30px; } #layout .main-inner .column-center-inner { margin-top: 0; } /* Header ----------------------------------------------- */ .header-outer { margin: 0 0 0 0; background: transparent none repeat scroll 0 0; } .Header h1 { font: normal bold 40px Arial, Tahoma, Helvetica, FreeSans, sans-serif; color: #ffffff; text-shadow: 0 0 -1px #000000; } .Header h1 a { color: #ffffff; } .Header .description { font: normal normal 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif; color: #ffffff; } .header-inner .Header .titlewrapper, .header-inner .Header .descriptionwrapper { padding-left: 0; padding-right: 0; margin-bottom: 0; } .header-inner .Header .titlewrapper { padding-top: 22px; } /* Tabs ----------------------------------------------- */ .tabs-outer { overflow: hidden; position: relative; background: #141414 none repeat scroll 0 0; } #layout .tabs-outer { overflow: visible; } .tabs-cap-top, .tabs-cap-bottom { position: absolute; width: 100%; border-top: 1px solid #222222; } .tabs-cap-bottom { bottom: 0; } .tabs-inner .widget li a { display: inline-block; margin: 0; padding: .6em 1.5em; font: normal bold 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif; color: #ffffff; border-top: 1px solid #222222; border-bottom: 1px solid #222222; border-left: 1px solid #222222; } .tabs-inner .widget li:last-child a { border-right: 1px solid #222222; } .tabs-inner .widget li.selected a, .tabs-inner .widget li a:hover { background: #444444 none repeat-x scroll 0 -100px; color: #ffffff; } /* Headings ----------------------------------------------- */ h2 { font: normal bold 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif; color: #ffffff; } /* Widgets ----------------------------------------------- */ .main-inner .section { margin: 0 27px; padding: 0; } .main-inner .column-left-outer, .main-inner .column-right-outer { margin-top: 0; } #layout .main-inner .column-left-outer, #layout .main-inner .column-right-outer { margin-top: 0; } .main-inner .column-left-inner, .main-inner .column-right-inner { background: transparent none repeat 0 0; -moz-box-shadow: 0 0 0 rgba(0, 0, 0, .2); -webkit-box-shadow: 0 0 0 rgba(0, 0, 0, .2); -goog-ms-box-shadow: 0 0 0 rgba(0, 0, 0, .2); box-shadow: 0 0 0 rgba(0, 0, 0, .2); -moz-border-radius: 0; -webkit-border-radius: 0; -goog-ms-border-radius: 0; border-radius: 0; } #layout .main-inner .column-left-inner, #layout .main-inner .column-right-inner { margin-top: 0; } .sidebar .widget { font: normal normal 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif; color: #ffffff; } .sidebar .widget a:link { color: #888888; } .sidebar .widget a:visited { color: #444444; } .sidebar .widget a:hover { color: #cccccc; } .sidebar .widget h2 { text-shadow: 0 0 -1px #000000; } .main-inner .widget { background-color: #141414; border: 1px solid #222222; padding: 0 15px 15px; margin: 20px -16px; -moz-box-shadow: 0 0 0 rgba(0, 0, 0, .2); -webkit-box-shadow: 0 0 0 rgba(0, 0, 0, .2); -goog-ms-box-shadow: 0 0 0 rgba(0, 0, 0, .2); box-shadow: 0 0 0 rgba(0, 0, 0, .2); -moz-border-radius: 0; -webkit-border-radius: 0; -goog-ms-border-radius: 0; border-radius: 0; } .main-inner .widget h2 { margin: 0 -15px; padding: .6em 15px .5em; border-bottom: 1px solid #000000; } .footer-inner .widget h2 { padding: 0 0 .4em; border-bottom: 1px solid #000000; } .main-inner .widget h2 + div, .footer-inner .widget h2 + div { border-top: 1px solid #222222; padding-top: 8px; } .main-inner .widget .widget-content { margin: 0 -15px; padding: 7px 15px 0; } .main-inner .widget ul, .main-inner .widget #ArchiveList ul.flat { margin: -8px -15px 0; padding: 0; list-style: none; } .main-inner .widget #ArchiveList { margin: -8px 0 0; } .main-inner .widget ul li, .main-inner .widget #ArchiveList ul.flat li { padding: .5em 15px; text-indent: 0; color: #666666; border-top: 1px solid #222222; border-bottom: 1px solid #000000; } .main-inner .widget #ArchiveList ul li { padding-top: .25em; padding-bottom: .25em; } .main-inner .widget ul li:first-child, .main-inner .widget #ArchiveList ul.flat li:first-child { border-top: none; } .main-inner .widget ul li:last-child, .main-inner .widget #ArchiveList ul.flat li:last-child { border-bottom: none; } .post-body { position: relative; } .main-inner .widget .post-body ul { padding: 0 2.5em; margin: .5em 0; list-style: disc; } .main-inner .widget .post-body ul li { padding: 0.25em 0; margin-bottom: .25em; color: #ffffff; border: none; } .footer-inner .widget ul { padding: 0; list-style: none; } .widget .zippy { color: #666666; } /* Posts ----------------------------------------------- */ body .main-inner .Blog { padding: 0; margin-bottom: 1em; background-color: transparent; border: none; -moz-box-shadow: 0 0 0 rgba(0, 0, 0, 0); -webkit-box-shadow: 0 0 0 rgba(0, 0, 0, 0); -goog-ms-box-shadow: 0 0 0 rgba(0, 0, 0, 0); box-shadow: 0 0 0 rgba(0, 0, 0, 0); } .main-inner .section:last-child .Blog:last-child { padding: 0; margin-bottom: 1em; } .main-inner .widget h2.date-header { margin: 0 -15px 1px; padding: 0 0 0 0; font: normal normal 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif; color: #666666; background: transparent none no-repeat scroll top left; border-top: 0 solid #222222; border-bottom: 1px solid #000000; -moz-border-radius-topleft: 0; -moz-border-radius-topright: 0; -webkit-border-top-left-radius: 0; -webkit-border-top-right-radius: 0; border-top-left-radius: 0; border-top-right-radius: 0; position: static; bottom: 100%; right: 15px; text-shadow: 0 0 -1px #000000; } .main-inner .widget h2.date-header span { font: normal normal 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif; display: block; padding: .5em 15px; border-left: 0 solid #222222; border-right: 0 solid #222222; } .date-outer { position: relative; margin: 30px 0 20px; padding: 0 15px; background-color: #141414; border: 1px solid #222222; -moz-box-shadow: 0 0 0 rgba(0, 0, 0, .2); -webkit-box-shadow: 0 0 0 rgba(0, 0, 0, .2); -goog-ms-box-shadow: 0 0 0 rgba(0, 0, 0, .2); box-shadow: 0 0 0 rgba(0, 0, 0, .2); -moz-border-radius: 0; -webkit-border-radius: 0; -goog-ms-border-radius: 0; border-radius: 0; } .date-outer:first-child { margin-top: 0; } .date-outer:last-child { margin-bottom: 20px; -moz-border-radius-bottomleft: 0; -moz-border-radius-bottomright: 0; -webkit-border-bottom-left-radius: 0; -webkit-border-bottom-right-radius: 0; -goog-ms-border-bottom-left-radius: 0; -goog-ms-border-bottom-right-radius: 0; border-bottom-left-radius: 0; border-bottom-right-radius: 0; } .date-posts { margin: 0 -15px; padding: 0 15px; clear: both; } .post-outer, .inline-ad { border-top: 1px solid #222222; margin: 0 -15px; padding: 15px 15px; } .post-outer { padding-bottom: 10px; } .post-outer:first-child { padding-top: 0; border-top: none; } .post-outer:last-child, .inline-ad:last-child { border-bottom: none; } .post-body { position: relative; } .post-body img { padding: 8px; background: #222222; border: 1px solid transparent; -moz-box-shadow: 0 0 0 rgba(0, 0, 0, .2); -webkit-box-shadow: 0 0 0 rgba(0, 0, 0, .2); box-shadow: 0 0 0 rgba(0, 0, 0, .2); -moz-border-radius: 0; -webkit-border-radius: 0; border-radius: 0; } h3.post-title, h4 { font: normal bold 22px Arial, Tahoma, Helvetica, FreeSans, sans-serif; color: #ffffff; } h3.post-title a { font: normal bold 22px Arial, Tahoma, Helvetica, FreeSans, sans-serif; color: #ffffff; } h3.post-title a:hover { color: #cccccc; text-decoration: underline; } .post-header { margin: 0 0 1em; } .post-body { line-height: 1.4; } .post-outer h2 { color: #ffffff; } .post-footer { margin: 1.5em 0 0; } #blog-pager { padding: 15px; font-size: 120%; background-color: #141414; border: 1px solid #222222; -moz-box-shadow: 0 0 0 rgba(0, 0, 0, .2); -webkit-box-shadow: 0 0 0 rgba(0, 0, 0, .2); -goog-ms-box-shadow: 0 0 0 rgba(0, 0, 0, .2); box-shadow: 0 0 0 rgba(0, 0, 0, .2); -moz-border-radius: 0; -webkit-border-radius: 0; -goog-ms-border-radius: 0; border-radius: 0; -moz-border-radius-topleft: 0; -moz-border-radius-topright: 0; -webkit-border-top-left-radius: 0; -webkit-border-top-right-radius: 0; -goog-ms-border-top-left-radius: 0; -goog-ms-border-top-right-radius: 0; border-top-left-radius: 0; border-top-right-radius-topright: 0; margin-top: 1em; } .blog-feeds, .post-feeds { margin: 1em 0; text-align: center; color: #ffffff; } .blog-feeds a, .post-feeds a { color: #888888; } .blog-feeds a:visited, .post-feeds a:visited { color: #444444; } .blog-feeds a:hover, .post-feeds a:hover { color: #cccccc; } .post-outer .comments { margin-top: 2em; } /* Footer ----------------------------------------------- */ .footer-outer { margin: -0 0 -1px; padding: 0 0 0; color: #ffffff; overflow: hidden; } .footer-fauxborder-left { border-top: 1px solid #222222; background: #141414 none repeat scroll 0 0; -moz-box-shadow: 0 0 0 rgba(0, 0, 0, .2); -webkit-box-shadow: 0 0 0 rgba(0, 0, 0, .2); -goog-ms-box-shadow: 0 0 0 rgba(0, 0, 0, .2); box-shadow: 0 0 0 rgba(0, 0, 0, .2); margin: 0 -0; } /* Mobile ----------------------------------------------- */ *+html body.mobile .main-inner .column-center-inner { margin-top: 0; } .mobile .main-inner { padding-top: 0; } .mobile .main-inner .widget { padding: 0 0 15px; } .mobile .main-inner .widget h2 + div, .mobile .footer-inner .widget h2 + div { border-top: none; padding-top: 0; } .mobile .footer-inner .widget h2 { padding: 0.5em 0; border-bottom: none; } .mobile .main-inner .widget .widget-content { margin: 0; padding: 7px 0 0; } .mobile .main-inner .widget ul, .mobile .main-inner .widget #ArchiveList ul.flat { margin: 0 -15px 0; } .mobile .main-inner .widget h2.date-header { right: 0; } .mobile .date-header span { padding: 0.4em 0; } .mobile .date-outer:first-child { margin-bottom: 0; border: 1px solid #222222; -moz-border-radius-topleft: 0; -moz-border-radius-topright: 0; -webkit-border-top-left-radius: 0; -webkit-border-top-right-radius: 0; -goog-ms-border-top-left-radius: 0; -goog-ms-border-top-right-radius: 0; border-top-left-radius: 0; border-top-right-radius: 0; } .mobile .date-outer { border-color: #222222; border-width: 0 1px 1px; } .mobile .date-outer:last-child { margin-bottom: 0; } .mobile .main-inner { padding: 20px 10px; } .mobile .header-inner .section { margin: 0; } .mobile .post-outer, .mobile .inline-ad { padding: 5px 0; } .mobile .tabs-inner .section { margin: 0 10px; } .mobile .main-inner .section { margin: 0; } .mobile .main-inner .widget h2 { margin: 0; padding: 0; } .mobile .main-inner .widget h2.date-header span { padding: 0; } .mobile .main-inner .widget .widget-content { margin: 0; padding: 7px 0 0; } .mobile .main-inner .column-center-inner, .mobile .main-inner .column-left-inner, .mobile .main-inner .column-right-inner { padding: 0; } .mobile .main-inner .column-left-inner, .mobile .main-inner .column-right-inner { background: transparent none repeat 0 0; -moz-box-shadow: none; -webkit-box-shadow: none; -goog-ms-box-shadow: none; box-shadow: none; } .mobile .date-posts { margin: 0; padding: 0; } .mobile .footer-fauxborder-left { margin: 0; } .mobile .main-inner .section:last-child .Blog:last-child { margin-bottom: 0; } .mobile .mobile-link-button { background: #444444 none repeat-x scroll 0 -100px; } .mobile-link-button a:link, .mobile-link-button a:visited { color: #ffffff; } -->

Wednesday, November 7, 2012

Seeking Navy SBIR Funding

http://www.navysbir.com/solicitations.htm

The above link will send you to Navy program offices for various key technologies and platforms that support the Fleet today and in the future. If one is seeking SBIR funding it is key to pursue the related PEO's in order to influence the wording of the SBIR announcement and increase your win
probability. I have had success in all aspects of Navy SBIR activity by following this approach in areas such as mine warfare , ASW , littoral conflict, C4ISR , airborne sensors to name a few.

Tuesday, October 30, 2012

Motion Control Survey For Surveillance and Security In An Asymmetrical Era

Many security and surveillance applications today have a requirement for Motion Control technology. Think about what it takes to move a camera , antenna or radar from side to side or up and down. Motion Control is playing an ever increasing role in situational awareness in today's asymmetrical era. Now is your big chance to not only get paid but also share your input in a key  survey. Please follow the below instructions.

L.E.K. Consulting is conducting a study on the motion control products market. We are testing a new product concept designed to help purchasers of motion control products dramatically improve sales and reduce costs. The survey will take approximately 20-25 minutes to complete and all responses will remain completely confidential.

All respondents who complete the survey will receive a $100 honorarium! If you are unable to accept an honorarium, we can donate this money to a charity of your choice. We will also provide you and your organization with high-level feedback from the survey!  My suggestion for donation is the Wounded Warrior Organization who do so much to help the true champions or the asymmetrical era.

We have recently changed our qualification criteria, so if you tried to take this survey in the past and could not, please try again!


If you experience any problems with this survey, please contact us at c.gonzalez@lek.com

Please make sure you note you were referred to this survey by answering in the second to last question  “How did you hear about our survey?  http://www.falascoj.blogspot.com

Friday, June 22, 2012

Stars In My Crown

 
A traditional old time movie shows what the world was like when asymmetrical activity only happened in the animal world. What has gone wrong?

The Real China

Several years ago while in China for business I took a weekend and went to the Great Wall with by local Beijing Sales team. The two associates that acted as my host had done so many times but never with anyone as knowledgeable in Chinese history as me. While leaving one of the museums we noticed dozens of military trucks pulling up. The local PLA base uses the Great Wall as the location of their weekly graduation ceremony. This would of course be akin to a USMC  recruit class at Quantico going to the Washington 
Monument to graduate. About 1,000 young Chinese got out of the trucks along with their drill instructors and marched in formation to the top of the Great Wall. Right  behind them were their parents,boyfriends & girlfriends, (the graduating class was COED ) , "Don't Ask /Don't Tell Hasn't Reached the a PLA yet .  The drill instructors lined the unit up and went into a typical pitch. Having only several months before watched my son graduate from his USAF basic training made me realize that drill instructors were the same all over the world. ( At least in organized provisional state oriented military groups vs.  Jihad central). When the ceremony was over ---it strangely paralleled what I had seen a few months before with the top squad , top recruit ,etc. mentioned , the graduates embraced their family members and left to celebrate. As I looked at the feet of the graduates I noticed almost every ones pants had holes in the bottom and their dress shoes were falling apart. As we followed them back to their trucks I noticed the trucks so resembled Tonka Toys from the 60's I couldn't help but smile and wondered what an air to ground missile from an F-16 would do to them. What's the point for bringing this up. Simple. China isn't our enemy. They may be pushing us economically which we need  . If anyone takes time to visit China they will find that it's becoming what we used to be. The biggest fights I saw were people trying to get onto the limited shuttle buses that were taking shoppers to the newly opened Walmart . At the Chinese McDonalds ,KFC,& Pizza Hut
while they speak Chinese vs. Spanish and  you are better understood and your order is correct vs. here. So stop trying to stir up anti Chinese sentiment by harping on defense cuts and preparing to fight China. Yes we need to fund our forces at the highest amount ; but for technology that makes sense and can be used for both the next 100 year asymmetrical era as well as classical conflict via the Jihadist wave hick jacking nation states ( Egypt,Libya,and the already hijacked Iran thanks to a weak presidents understanding of global dynamics ).

For details on what types of technology can be used to secure ourselves with a solution in surveillance and security in an asymmetrical era please see posts at :

http://www.surveillanceandsecurityinanasymmetricalera.com 

Constructive comments that can leverage anyone's product or position are welcome

Saturday, June 2, 2012

Boeing's Private Space Taxi to Take Flight by 2016 | CST-100 Capsule : How Will Assets Like This Effect Surveillance and Security In An Asymmetrical Era?

With the end of shuttle operations the land rush or as it were space rush is on to be a supplier of transpiration systems to carry materials and people into space. The international space station will stay in operation and the stores and personal to man it will be transported by vehicles created and manufactured by private companies. The question then becomes how will this new paradigm effect the ability to conduct surveillance and security from space? The potential scenarios are endless with of course opportunities for any terror group or individual of that persuasion to have the ability to gain control of a platform and engage in activity that would emulate 9/11 space themed scenarios.

This publication serves as an extensive resource to review topics related to space and the associated areas potentially dealing with surveillance and security. 

Friday, May 25, 2012

Stop Bashing China

Several years ago while in China for business I took a weekend and went to the Great Wall with by local Beijing Sales team. The two associates that acted as my host had done so many times but never with anyone as knowledgeable in Chinese history as me. While leaving one of the museums we noticed dozens of military trucks pulling up. The local PLA base uses the Great Wall as the location of their weekly graduation ceremony. This would of course be akin to a USMC  recruit class at Quantico going to the Washington 
Monument to graduate. About 1,000 young Chinese got out of the trucks along with their drill instructors and marched in formation to the top of the Great Wall. Right  behind them were their parents,boyfriends & girlfriends, (the graduating class was COED ) , "Don't Ask /Don't Tell Hasn't Reached the a PLA yet .  The drill instructors lined the unit up and went into a typical pitch. Having only several months before watched my son graduate from his USAF basic training made me realize that drill instructors were the same all over the world. ( At least in organized provisional state oriented military groups vs. ? Jihad central). When the ceremony was over ---it strangely parallel what I had seen a few months before with the top squad , top recruit ,etc. mentioned , the graduates embraced their family members and left to celebrate. As I looked at the feet of the graduates I noticed almost every ones pants had holes in the bottom and their dress shoes were falling apart. As we followed them back to their trucks I noticed the trucks so resembled Tonka Toys from the 60's I couldn't help but smile and wondered what an air to ground missile from an F-16 would do to them. What's the point for bringing this up. Simple China isn't our enemy. They may be pushing us economically which we need that. If anyone takes time to visit China they will find that it's becoming what we used to be. The biggest fights I saw were people trying to get onto the limited shuttle buses that were taking shoppers to the newly opened Walmart . At the Chinese McDonalds ,KFC,& Pizza Hut .while they speak Chinese vs. Spanish you are better understood and your order is correct vs. here. So stop trying to stir up anti Chinese sentiment by harping on defense cuts and preparing to fight China. Yes we need to fund our forces at the highest amount ; but for technology that makes sense and can be used for both the next 100 year asymmetrical era as well as classical conflict via the Jihadist wave hick jacking nation states ( Egypt,Libya,and the already hijacked Iran thanks to a weak presidents understanding of global dynamics ).

For details on what types of technology can be used to secure ourselves with a solution in surveillance and security in an asymmetrical era please see posts at : http://www.falascoj.blogspot.com/  Constructive comments that can leverage anyone's product or position are welcome.

Thursday, May 24, 2012

Matel Toys Win The West When Applied to Surveillance and Security In An Asymmetrical Era

http://www.youtube.com/watch?v=W8qXLxHi9_8&sns=emhttp://www.youtube.com/watch?v=W8qXLxHi9_8&sns=em

These were the days . Before the crush of political correctness when kids could play in their yards and streets in front of their houses and not be afraid  of predators on two legs. Consider this concept . When cowboys rode off the television range we lost our moral compass. What data supports this ? Well how many school shootings, courthouse bombings,freeway snipers,Holloway ,et. al incidents were there in the golden era of the western.  Zero !!!  Case closed. Within several years without realizing it the forces of islamic revolution coalesced and with the aid of a weak presidential decision not to back the Shah of Iran was lost and we entered the asymmetrical era of terror politics. We now must be prepared to put into place solution sets that will preserve our infrastructure .

Thursday, May 10, 2012

The New Craft of Intelligence: Achieving Asymmetric Advantage in the Face of Nontraditional Threats

Great descriptions of various topics related to asymmetrical warfare and theories we are facing in the asymmetrical era we are now participating in.

https://www.strategicstudiesinstitute.army.mil/pdffiles/PUB217.pdf


The New Craft of Intelligence: Achieving Asymmetric Advantage in the Face of Nontraditional Threats


http://en.wikipedia.org/wiki/Assymetrical_warfare#Tactical_basis

Monday, May 7, 2012

Capturing a New Asymmetrical Era

As we continue to study the themes of asymmetrical activities against the western world by Islamic  jihadists bent on destroying our "morally bankrupt" way of life I find several things very ironic.

If the Islamic Jihadist gets to see all the Virgins after he performs his suicidal act can anyone explain what Osama Bin Laden was doing with his vast pornographic collection. Was he using it as source material to make training videos for the previously mentioned Jihadists Virgin visit ?

I'm always curious as to  what the Jihadists do before a one way mission? Certainly they don't have the lore and group cohesion that any western force would have as the suicidal culture of their acts don't exactly engender it. What would the Islamic version of this video look like for example?

http://www.youtube.com/watch?v=p_AIP_NLMbI&sns=em

These observations are not met to be disrespectful or sarcastic. It's just that the Islamic movement has so little to say that is constructive or informative as to their behavior and action . Now is your opportunity to inform us . What do you have to say ?

Thursday, May 3, 2012

Ten Top Reasons Why The Robotics Market Is Hot Again

 

Monday, April 23, 2012

Perfect Example of Islamic Terror Groups Taking Advantage of Our Kindeness As A Nation

 http://www.islamist-watch.org/blog/2012/04/action-alert-best-buy-tvs-computers-hamas?goback=%2Egde_1934231_member_109053583
The above reflects how islamist terror groups hide in the U.S. Now it seems that corporate america is assisting them. Where is the public outcry? When U.S. companies did anything in South Africa a few years ago it was huge news. The left called for no nothing for any U.S. company involved. Even if Best Buy is going down for the count we should hurry their path along. I hope we all stop our dealings with this group and make this information known to all.

Thursday, April 12, 2012

Energy Market Development Experience

In the past I have been involved in the following projects:

Solar Power
Provided process control technology including PLC & wireless technology for NASA solar power farm .

Provided DSP and industrial computing servers for San Diego based manufacturer of solar turbines.

Wind Power
Provided perimeter security systems for wind power farms . Systems included sensors,cameras ,access control and situational awareness .

Oil & Gas/ Nuclear
Image processing systems for major oil exploration activity using remote sensing to Shell Oil,Chevron,Gulf,Mobil and numerous independents.

DSP hardware for geophysical workstations to Slumberger  , Atlas, Western Geophysical and numerous smaller systems integrators.

DSP and data acquisition sensors to Fairfield Industries for marine seismic packages. 

Perimeter security systems including cameras,sensors ,wireless radios for government research contract on pipeline security.

Oil refinery security systems integration for Petrobas and U.S. Oil Reserve through Cisco integrator and thermal camera manufacture.

Numerous projects in refineries involving SCADA hardware ,PLC's and industrial computers.

Rugged displays from GE sold into oil rig control applications.

Nuclear power plant protection via physical security systems integration and research on China Syndrome using video and image processing.

Wireless base station integration and radio infrastructure sales to oil storage 
Facilities to monitor inventory.

Management and control of transportation of nuclear waste using wireless system,integrated with cameras , and satellite communications. Customer was EG&G through Los Alamos Labs.

WMD training facility integration using wireless , sensors,situational awareness and UAV's for ORNL.
 

Monday, April 9, 2012

Optix Targets Enhanced All Weather Needs

The IdentifieR sights are devices suitable to be used by the Special forces, Army and Police. They provide clear and sharp picture of the battlefield regardless of the weather, thereby increasing the operational efficiency and precision of the staff as its security.
They are designed to exceed expectations with the following tasks:

target acquisition;
target fire;
fire control;
tactical and strategical surveillance;
field reconnaissance.

Visit :  www.optixco.com

Thursday, April 5, 2012

What Will The Major Aerospace Players Do?

Interested in what long term cold war contractors will do to adjust their technology to the ecosystem being devised below. The jury is still out as to if this group can gain any traction with the finer points of their concepts but it's a sure bet that the military communications systems of the near future will all revolve around commercial infrastructure and especially off the shelf handsets ,iPads ,iPhones ,droids of all types . No need for expensive software defined radios, or any other non COTS device. This truth is going to make most of the community that chase this space very nervous because they are not intellectually capable of understanding how to play in a fluid commercial game. 


http://www.aaicorp.com/pdfs/AAI_FASTCOM%2010-18-10FINAL.pdf

http://www.marketwatch.com/story/aai-unmanned-aircraft-systems-and-viasat-enter-strategic-alliance-2012-01-23

Saturday, March 24, 2012

Sensor Experience

 

Sunday, March 18, 2012

Innovation From Optex Leverages IPad as Physical Security Layout Force Multiplier

Just as in the wild west the six gun was the force multipler. With it on ones hip anyone could be a person to be reckoned with.

http://m.youtube.com/watch?v=OntwwcBVe6o

Today the internet and the IPAD have taken it's place in maximiz business productivity. Optex has taken things a step further in terms of productivity associated with laying out video coverage regarding to a site you want to provide security for. Take it from one who has assisted the MOD in reviweing imagey of Argentinean airfields on the Falklands to preparing perimeter defense schemes for FOB's on the slopes of Mt. Tumbledown to helping domestic  homeland security resources and county sherriffs keep drug cartels from ambushing them the My Optex tool is a tremedous force multipler in the specifications of FOV, coverage distance,etc.

Any individual can start to asses their physical security planning needs with this layout tool. Rather then provide an example of utilization or give you  the details of how intuitive this package is I suggest you download the application yourself and start working with it. I have created several simulation and modeling packages in the past to attempt to show the details of sensor integration combined with the various aspects of situational awareness but none came close to My Optix.

http://www.optexamerica.com/page.aspx?id=324

Consider how one could incorporate other modalities such as HAZMAT sensor capability to  this scenario. Since HAZMAT sensors cover a variety of Chem/Bio threats and have such a scalable amount of ranges of detection this aspect of simulation and modeling alone would more then justify such a practice.

Young Chinese Business People Should Listen To Sun Tzu

Know your enemy and know yourself; in a hundred battles, you will never be defeated. When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant both of your enemy and of yourself, you are sure to be defeated in every battle. Obviously this advice isn't being taken by the posters on Linkedin

The below post was placed on several well informed sites that have their pulse on business with China. The intention of the post isn't to belittle the attempts being made by Chinese surveillance  business leaders to go offshore but assist them in understanding they are doing themselves no good with their approach. They need to face the reality that they need to establish a U.S. ally that understands both markets from a business and cultural perspective.

How to Win In China

 China Global Talent

Chinese Surveillance & Security Companies Attempting To Enter U.S. Market

The LinkedIn sites dealing with technology ; especially related to surveillance cameras and security devices are being overwhelmed with very badly written product announcements and attempts to position Asian , mainly Chinese companies efforts to establish U.S. Distribution. It seems the naive posters apparently believe that an already China phobic U.S. Will appreciate their poor grammar, bad spelling and lack of American culture and take on their products to sell.  I believe we are witnessing the first sea change in the attempt at international market development. My assessment is that the posters are all young computer and Internet savvy individuals who believe that they can apply social networking to sell their technical products. While social networking has a place in high technology selling it can't be the only part of the approach. I've asked myself what is missing in the equation. It's simple. After probing some of these posters I've learned that they are representing underfunded companies that can't afford to penetrate the world market through the establishment of any type of offshore presence. Are these posters foolish enough to think that the world market won't see this?

It's one thing to buy bed sheets that come from China via distribution. However I can see anyone wanting a $600.00 surveillance camera that is pictured with a combination of English and Chinese characters. Does the audience of this site see this as an opportunity to educate the young Chinese business community? Perhaps leveraging several concepts to grow a trade cartel or other approaches to establish channels to private equity funds that could then establish links with U.S. Groups that would coordinate with their Chinese counterparts. I'm interested in feedback here as I thought this was one of the sites goals vs. just reposting news events or comments on the larger political picture. In realty this is the political picture as the current approach only lends itself to the China bashing/barrier element.

Monday, March 5, 2012

Security & Surveillance Channel Development

In 2006 I was leading the sales efforts of video, graphics, and embedded hardware and analytic / intelligent control software for General Electric's Intelligent Platform Group. In order to gain access to additional types of security and surveillance specifiers, consultants and systems integrators I developed an alliance with the GE Security Group that focused on access control,IP enabled CCTV, and video storage. Through my coordination efforts our Intelligent Platform Group had developed a layered approach to channel development by identifying systems integrators who addressed the vertical applications of law enforcement, tactical military, and border security.  We now wanted to address the applications that revolved around critical infrastructure protection, event security/entertainment and government assets. I developed an article on utilizing FPGA processed video to view change detection via management by an intelligent software package with an open approach that focused on biometrics, graphical map integration, DVR storage and playback. In addition to becoming a paper we also packaged it as an application note and a slide presentation I used to train GE Security engineering, building and architectural consultants such as Kroll Security, CH2M, Accenture, and various Native American IT groups looking to start their separate architectural practices first leveraging the concept of Data Center Security. I followed up with each group and started to detect an interesting trend. With the fluid nature of the security and surveillance market and the many application niches it seemed that every organization I was cultivating as a specifying channel was seeking to get into someone else's business. IT specifiers and channels want to do security projects for data centers. Oil &Energy services companies want to expand from providing basic traditional "patch" services to doing specifications on pipeline and refinery protection. When I concluded by sessions with the GE partner architectural and engineering consultants and specifiers I started looking to develop a variety of channels that service and sell into all aspects of the surveillance and security market. Because this market segment is composed of so many specific applications it is quite diverse and no one channel can address all the applications and projects that exist. The below input is from an 8A (small disadvantaged business) that specializes in video and sensor integration of critical infrastructure. I have been assisting them for several years in proposal preparation and providing product guidance.

Hello Jim-

It is great to hear from you my friend. I was thinking of you last week and would love to re-engage with you. The area is moving ahead with UAV and all types of sensor activity; as such I would value your thoughts on the UGS. Is it dead? Is there a way forward teaming with you? Guided by you? Is it worth it anymore? I also have a proposed project that we wish to submit for possible grant funding. It is an exciting project we call U-VOE (Unattended Ground Sensor-Visual Optical Electromagnetic) detection. Let’s talk.

Mark

The references to UAV (unmanned Air Vehicle) and UGS (unmanned ground sensor) show how this market has become a combination of technologies that have come along way from card readers , low resolution cameras and pop up barriers.

My objective in channel development that addresses the security and surveillance market is to reach out to all levels of groups and individuals that can act as force multipliers to the technology I represent. The key goal I am seeking to gain is exposure to a project. Without a security project it is very hard to have more then a philosophical discussion about any product technology beyond its core features and benefits. The existence of the project allows the discussion to become framed and the presenter to demonstrate their grasp of a solution by being able to relate the technology to the application the client has.
In pursuing a strategy that includes an ecosystem that is populated by architectural and engineering specifiers and consultants, defense oriented channels who understand sensors, law enforcement resources who relate to how "cops" think and IT integrators that look at connecting all the data collection to the cloud I have focused on building relationships where I am viewed as brining the channel an opportunity to leverage what I offer via a product.
The proof that this approach pays off is demonstrated by the above request from the partner referenced to assist with his proposal. These types of relationships take years to develop and I have numerous ones that I can reach out to with anyone's product portfolio and develop sales strategies around. The efforts could come from research funding, product sales or service approaches.
One of the better sub channels I have developed stems from creating relationships with Cisco Partners that are focusing on the security market from the perspective of hardware resell coupled with various types of added value. These Channel VAR's are either A&E or IT subject matter experts who provide a variety of service and value add product into the security and surveillance sector. Currently I have established a personal relationship with three such groups. Each has unique subsets of capabilities & all represent great connectivity to projects that can pull in a variety of software and hardware products. Red River, (
www.redriver.com) is a systems integrator that has as its core value the ability to place products onto a government buying contract that allows any government group to purchase quickly off of a catalog of products. I facilitated several sales in this fashion and cut the purchasing time from months to weeks. Red River also is involved with a number of projects such as the protection of the Port of Charleston, South Carolina and the U.S. Oil reserves, where security products are always being added on. Augusta Systems, (http://www.augustasystems.com), is the developer of scalable middleware that controls any sensor or camera from a remote operating environment. As a Cisco VAR they back ended their software environment with Cisco hardware that stored and managed the data collected. I sold them several sensor packages they integrated into a bigger system that managed various unmanned and manned assets as well as cameras to provide perimeter security for a variety of critical infrastructure. I utilized this group to target various border security and infrastructure protection projects.  Prosis Network Systems, (http://prosishawaii.com), specializes in the video aspect of Cisco’s hardware portfolio. They used storage , routing and video hardware content from Cisco and integrate it with a variety of other technology. From the A&E side they focus on preparing site surveys and providing consulting services to groups looking to establish a security plan for their project. I developed them as a channel partner to pursue opportunities in data center protection, water treatment plant surveillance, military base protection, VIP security and other projects involving various high value infrastructures.

Other channel partners I have developed include a combination of manufacturers of cameras, UAV’s, UGV’s, biometric software and situational awareness software packages. The main theme in developing relationships is to gain access to projects and programs that could utilize my technology.


Security & Surveillance Channel Development

Monday, February 13, 2012

How To Deal With The Somali Pirates Using New Era Surveillance & Security

When one views the asymmetric threat we now face and will continue to face one is struck by the stark differences in methods of engagement. All through history nation states have engaged in combative activities that have pitted nation state against nation state . The forces involved engaged through predictable and usual modes of assault and defense . The sides were identifiable and usually had long battle histories and honors associated with the units involved . It could have been the Roman Legion vs Hannibal or the Flower of France against Henry's bowmen at Agincourt .  Each unit involved was well known and had distinguished themselves many times in the past. Our own military is rich in the traditions of different units and their battle honors. We have our famous airborne units , the 82nd and 101st. The 101st having been of "Band of Brothers" fame. Why is this of significance?  Because the enemy we are engaged with today can site no such path.  If we are to believe the BBC video first the Somali pirates became pirates because the western nations came and took their fish through organized commercial methods and then in a tremendous segway the video claims it was dumping of toxic waste that caused the Somalis to seek a new career path. Perhaps both these events were causes and to be sure many more. One potential solution that does not require nation state building as in trying to go into Somalia and actually make them a western style country would be for each country and specifically the ship transit companies to simply create a fund. This fund would then distibute money to the top three navies of the world. The USN,RN & third pick would then act as a "shield" . The technology  techniques plus the art of professional naval warfare described in the website @ :http://surveillance-securityinanasymmetricalera.com/  would be applied.
Case closed .

Wednesday, February 8, 2012

IR Groups Beware: You Could Quickly Become Blacksmiths

Here is yet another example of exploitation of technology to drive costs lower and potentially open massive commercial space applications

Instead of relying on bulky helmets and goggles to provide vital battlefield data, the Defense Advanced Research Projects Agency is looking to make contact lenses with built-in systems that would allow soldiers to focus on distant targets and overlay their vision with tactical information.
A part of the agency’s Soldier Centric Imaging Via Computational Cameras (SCENICC) program, the goal of the effort is to provide individual soldiers with data from reconnaissance drones and battlefield sensors — a capability gap that the DOD is trying to remedy, DARPA officials said.
Researchers at Innovega iOptics are working with DARPA to develop the contact lenses, which would work by projecting digital images onto tiny full-color displays next to the wearer’s eyes. The lenses also will allow soldiers to focus on objects both near and at a great distance.
The goal of the SCENICC program is to develop new imaging and hardware capabilities that greatly enhance warfighters’ awareness, security and survivability, DARPA officials said in a statement.

Monday, February 6, 2012

Optix Inc. Flexible Uncooled Portable Surveillance Camera


Here is a review of a great approach to portable uncooled surveillance solutions

Minion: A portable uncooled thermal vision camera perfect for integration in observation CCTV systems. It allows 24-hours surveillance in total darkness and harsh weather conditions. The optical system and digital enhancement of the video signal provide high contrast, detailed and sharp pictures at any time in a completely passive mode. The reliable mechanical construction makes Minion suitable for any type of inside and outside mounting. Along with its accessories Minion includes user software for remote control and setup of the main functions. It is designed for versatile applications in the surveillance systems range, fire-precaution appliances, video observation of border areas and strategic zones. Other features include monitoring of the specified area to detect any abnormal behavior (intrusion attempt) caused by people or vehicles. Visual verification of the intruding object in the specified area under all weather conditions.  Transfer of the alarm information including the image to a remote headquarters for further investigation in decision making process and also to mobile patrols. Monitoring of the technical state of the system and all of its components and transfer of status information (including information about any technical faults, power outages, sabotage attempts and others) to a remote Headquarters.  Remote system and subsystem diagnostics from a remote Headquarters, in order to repair (fully or partially) or limit damages to the system with-out physical presence on site.

sales@optixco.com, http://www.optixco.com/


New Website Dedicated To Surveillance & Security

See:



Sunday, January 29, 2012

MQ-1 Predator UAS: Aircraft profile

http://www.aviationspectator.com/resources/aircraft-profiles/mq-1-predator-uas-aircraft-profile

This is a fantastic link to the various configurations and payloads that make up the Predator UAV ecosystem . Having supported General Atomics in the early days of this program by selling them enabling DSP technology it has been very rewarding to what the successful evolution of this platform.

Wednesday, January 18, 2012

Surveillance & Security For Harbor & Port Applications Leveraging Infrared Technology

In today's asymmetric environment numerous soft spots exist along our extensive coastlines. With so much commerce coming into the existing U.S. Port infrastructure it becomes an inviting scenario for would be non nation state actors to plan 9/11 type attacks using a variety of potential platforms. While most U.S. Ports and Harbors have deployed defensive measures of various types most if not all do not provide a scalable approach to situational awareness and if they do depend on minimal sensor modalities and offer no analytic capability to measure or gauge intent, group affiliation or a host of related cultural and behavioral factors.  One then asks why? 


Background


In our post 9/11 world we quickly rushed to through up the best systems we could to defend against the obvious threat an attack on our multi coastal harbor infrastructure. The solution sets deployed included swimmer in the water detection, cameras, radars, water based barriers, patrol boats and lately several unmanned platforms. These solutions may but mostly are not integrated with other assets and often are stovepipe in nature. One can put it in the perspective of a pre 9/11 airport world where passengers showed up and walked to their gates without any security to our existing situation. In other words port security today is about equal to airport security after 9/11.


Today's Threat


Since 9/11 three separate and non related threats have manifested themselves as potentials to port and coastal security. Each is driven by a different ecosystem and requires different methods of detection and entry point control. A key design metric to any improved system would therefore be scalable and flexible to a threat that is always morphing and has been referenced comes in various categories. The port and coastal security systems of today don't have the granularity in sensor coverage and certainly not in the backend common operating picture and projected situational awareness to account for multiple types of threats or the adaptability of those threats to work around deployed security measures.  We can almost view our currant deployed harbor and coastal security systems to be our version of the Maginot Line that was deployed by France in the 1930's to defend against another incursion by Germany. Just as the German blitzkrieg punctured this static defense so will the new threats to our existing system.

Threat One: Contraband

Several items come to mind under this category. The first revolves around the escalating movement of illicit drugs. In the past several years since 9/11 his area has expanded exponentially due to the involvement of the organized drug cartels. The cartels have taken the place of the sporadic individual occurrences of the past. Today cartels have as much technology and funding as nation states. They have shown an amazing capability to morph in response to every government deterrence effort. The cartels first would use speed boats and ski do's to move product into harbors or land on isolated coastlines. Seeing these efforts somewhat compromised by government security efforts they have now moved to the utilization of small submarines,UAV's,and unmanned surface craft. Having the financial resources to seek out and utilize this technology is a chilling reality. Not only are these techniques being used to move drugs but they also have the potential to transport another even more dangerous set of threats to national security. The components of this threat could be any number of substances in the WMD category .The risk of nuclear, chemical or biological materials entering via a port or our coastline is real potential to consider.

Threat Two: Illegal Aliens

The entry of illegal aliens has always been an issue on our southern border and now with a renewed interest in organized international human trafficking cartels the threat has increased with regard to ports and coastal areas. We have seen all types of creative schemes being worked that have involved cargo containers, small craft of all types, swimmers and the use of ultra lights launched from off shore.

Threat Three: Terrorists

The potential for port entry by terrorists has always existed but today the threat has increased with the inclusion of groups affiliated with Hezbollah, Hamas, and al- Qaida. These groups are well funded and supplied with an impressive arsenal of technology to support all types of potential entry scenarios. The U.S. Customs & Border Patrol has indicated at least 2,000 individuals who are OTM, (other then Mexican), have crossed into the U.S. In the last 18 months. At least 200 remain at large. These incursions have been verified through multiple forms of forensic evidence found at camps,” safe houses", and entry points.

Strategy for Protecting against the New Threats

Given the above examples all having the recurring theme regarding today's threats are ever changing it then becomes important to provide a scalable surveillance and security infrastructure. This improved approach would revolve around integration of multiple sensor modalities, an intuitive and analytical situational awareness oriented common operating picture, clear crisp pictorial display, and the ability to manage resources such as UAV's & UGV's.  A potential solution set end to end could include infrared panoramic cameras from HGH Infrared, passing information to a common operating environment being managed by neural net software from Natural Selection Inc. allowing cutting edge display on Aydin Displays monitors. The scenario could unfold as follows; an Ultra-wide 360-degree panoramic field of view (FOV) camera from a group such as HGH Infrared with continuous IR monitoring capabilities allowing for  day or night data collection would be deployed in a strategic location near a harbor entrance or close to critical infrastructure such as an oil off loading facility . If potential blind spots are determined due to terrain or man made obstacles then multiple cameras may be required. This type of deployment will allow for 360 degree horizontal field of view (FOV) capturing infrared imagery in all directions simultaneously - unlike traditional cameras with limited horizontal FOVs . This 360-degree wide area coverage eliminates intruders' ability to predict traditional camera movement that causes breaches of perimeter into the harbor area or along the shoreline. The camera technology provides automatic intrusion detection and tracking allowing the user to quickly navigate the entire 360ยบ panoramic image to zoom in on areas of interest. The high-sensitivity infrared revolving camera head can detect a human from a distance of 1-3 kilometers, vehicles from 2-10 kilometers and vessels from 3-15 kilometers. This front end sensor would then be complimented by the capabilities of Natural Selection Inc.who have developed a flexible and scalable neural net based environment that when leveraged with a variety of sensor inputs & cloud based data will allow the user to create a situational awareness picture that can scale and adapt to the threat types indicated as they scale and morph over time. Consider how one could integrate pattern recognition, self learning and data mining into application modules addressing Threat Profiling, Modeling Adversary Behavior & Intent, Perimeter Security and links to managing and route planning for unmanned platforms on land, in the air or on the water. The collected sensor data along with deductive reasoning outcomes would then be projected into a combination of high resolution displays from groups such as Aydin who can deploy both in the field or a command and control center user oriented visuals. With the increasing dependence on unmanned systems to augment port and coastal security it would be very valuable to tie the sensor chain described into the control and management of those platforms. Unmanned systems and sensor payloads require highly reliable and repeatable inertial sensors for effective feedback in control navigation, and guidance. Moog Crossbow technology can be used in UAV’s,UUV’s and UGV’s to provide continuous orientation, position and heading information specially designed for the high dynamic and aggressive maneuvers. This control and guidance capability could be greatly aided by software modules and reasoning from Natural Selections that would register intent and plan potential routes these platforms could take to offer a greater degree of  surveillance and security coverage to port or coastal deployment.



Saturday, January 7, 2012

Digital Sign Architecture

Digital Sign Architecture

Digital Sign Solutions can be created for various applications and utilizing a variety of enabling technology. It should be obvious to anyone who wants to communicate information today that the wired world is here and their message needs to be packaged and "seen" in a way that grabs the digitally aware masses. Consider how best to mix and match these components to best communicate your message.

LCD Display

The LCD is the visual connection to the digital signage audience. It goes without saying that the display must project a crisp picture that is clear and bright in all types of lighting situations. Internal to the LCD there may be embedded computing combined with FPGA resources to add additional enhancements such as graphics,biometric analysis , picture within picture,screen splits of multiple types and a variety of user dashboard capabilities. Two sites that provide potential high performance LCD displays and related technology with the latter focusing on some interesting applications are:

http://aydindisplays.com/

http://www.eyevis.de/index.php?article_id=193&clang=1

Frequently custom requirements will come into play for Digital SIgnage and  seeking a supplier that can go beyond the mass production approach will be a vital requirement in operational benifits.

Wall Controller

Wall Controllers from  Trenton Technologies ;http://www.trentontechnology.com/products/video-display-wall-systems
 drive the LCD displays  that can be configured in a variety of ways depending on the circumstances of the provider. Since Trenton Technologies and others offer flexible packages the digital signage could be configured as a kiosk , a wall of displays, clustered or simply hanging from the ceiling.

DVD Recorder

Having a robust DVD or media player integrated into your system will greatly enhance user attentiveness and potential interactive experiences depending on the application area. A group providing numerous solutions along with controlling software is: http://www.visix.com/digital-signage-media-players.html

Wireless Infrastructure

Inserting wireless technology features to the Digital Signage solution mix opens up a variety of flexible potentials including the ability too:

Update content wirelessly,never physically plugging into the installed  Digital Signage Infrastructure

Constrained by space too small, or too hard to work with, but would be the perfect place to get your message across

Sit in your car and update content on your wireless digital signage network

A great many tips and innovative products that could leverage your wireless Digital Signage Solution can be found at :

http://www.wirelessdigitalsignage.com

Cloud  Computing

As increased techniques in the evolving area of Cloud Computing are coming into play more and more organizations are integrating benefits into their Digital Signage strategy . The more intelligence there is in the LCD display the    More opportunity there will be to gain:

Decreased operating costs
Improvements in message flexibility
Increased security compliance
Increased asset allocation

A great review can be found at :

http://www.digitalsignagetoday.com/whitepapers/4670/Four-Benefits-of-Cloud-Based-Computing-for-Digital-Signage-Networks

Software & Other value add

Lastly all the above hardware needs to be managed by a scalable and content interactive software environment that leaves room for expansion. Software and control approaches are the areas where integrators can offer the greatest amount of value add. There are multiple companies offering packages that address all types of scenarios but one that quickly caught my eye can be found at:
http://www.scala.com/digital-signage-products

Conclusion

All one has to do is go to a Barnes&Noble or a Toys R Us and observe small children at work on their Leap Frogs or other digital appliances to realize we are indeed entering a new era of communication and information management. How when children now are using Leap Frogs and other devices to communicate and learn will they ever be satisfied with the traditional signage and methods of advertisement of today. They world will demand more sophistication then ever before in how we communicate information and static signage just won't appeal to the new generation of consumers. Business will need to understand how to best leverage this phenomenon and gain the maximum amount of exposure for their message.


Wednesday, January 4, 2012

Sensors & Packaging Required For The New Threat

In the mid 1980's it was the height of the Cold War & DARPA was seeking was to achieve a degree of force multiplication against Soviet quantity. The conceived solution was to create autonomous land power that could be projected in a number of ways. The perceived applications revolved around
combating ground vehicles, ISR, troop replenishment, and security. In  order to create these application opportunities extensive work would be required in artificial intelligence ,navigation,video,display,& image processing .DARPA created an extensive ecosystem of over one hundred contractors in both industry and academia to develop algorithms that would guide a vehicle first on a road and then off road to accomplish a variety of prescribed applications. At the time Vicom Image Processors produced by Vicom Inc. offered a capability for stand alone image processing and display. These innovative systems were easy to program and compact which allowed for embedding them into the vehicle test beds. Vicom was started by Dr. William K. Pratt, http://sipi.usc.edu/about/ , and focused on image processing technology packaged so researchers and production OEM’s could leverage the technology. The driving force behind Vicom was a great mentor and I enjoyed making sales calls with him.


A number of groups in the Eco system were seeking this type of versatility to develop their algorithms, apply artificial reasoning to guidance capability and provide storage for road following data bases.

In this environment I sold systems to groups located across the Western U.S from the likes of Hughes Research, DELCO, University of Arizona, Sandia Labs, United Technology, LMCO,Martin Marietta, AI&D’s, & TACOM.