Wednesday, April 4, 2012

Design of Design: 19-20

pg 232: Great designs do not come from traditional product processes
pg 233: Product processes encourage conservative implementations and predictability; both are enemies of design
pg 234: Product processes are veto-oriented;  Much of the designers time is taken up by blocking bad ideas and catching oversights rather than fostering creativity.
pg 235: "The trick is to hold [product] "process"off long enough for design to occur, so that lesser issues can be debated once the great design is on the table."
pg 236: product processes are properly designed for follow on products, not for innovation
pg 237: Process is important to design, but it would be advantageous to insulate the design team from them
pg 238: Talented designers need to be fostered.
pg 239: To maintain conceptual integrity, assign design to a chief designer
pg244: What ids the best way to develop great designers.
pg 245:  Traditional education with the addition of critique is important to design brilliance development.
pg 246: Fostering design creativity must be done purposefully and planned for.
pg 247: Compensate designers appropriately and plan for furthering education.
pg 248: Give designers varied work environments.
pg 249: The John Cocke-Ralph Gomopry Story.
pg 250: Protect the designers from distractions of the traditional business process.
pg 251: Protect the designers from managers and keep them out of managing positions to foster creativity
pg 252: to grow yourself as a designer, sketch your designs constantly and get critiques of them.
pg 253 Study the designers  and exemplars that came before you.
pg 254: The Self education project:  design a 1000 sqaure foot house.

Monday, April 2, 2012

People I might hire


The following are links to resumes of individuals I may hire if I had a business:

http://www.ruscelli.com/resume_computer_science.htm
http://ocweekly.backpage.com/JobWanted/recent-it-graduate-pc-technician-help-desk/21674558
http://www.sqlservercentral.com/Forums/Topic16511-68-1.aspx#bm80382

Jane is a well rounded Computer Science major with a lot of experience in customer support.  She is a good candidate because customer support is a necessary skill in any position.  Her experience in support also makes he a good candidate for a technical writing position.

The second candidate, no name provided, would have a similar skill set to Jane.

Michael has extensive experience in programming.  This would be useful to any project as he is versatile and can be trusted to be able to contribute to any project my imaginary company would be working on.  In addition, he has several years of military service indicating that he is most likely competent at working in a team.  This would make him a  good leader and would lend well to a software development environment.  This also means he would meet deadlines.

Sunday, April 1, 2012

Design of Design: 17-18

pg 204: A vision of a user interface for a design system
pg 205:  Progressive truthfulness is the method of starting with an earlier conceived model and then to refine the model into the new design.
pg 206:  The model library contains all the objects and their properties.  Instances of the objects are named by knowledge of their exemplars.
pg 207: There is the hazard of restricting creativity through expansion of the model library too much and restricting the user to only exemplars within their knowledge base
pg 208: the noun and verb rhythm in the english language can be used as a model for computer human interaction
pg 209: Specifying verbs, commands, can be done through traditional computer input methods but is most easily facilitated by voice command.
pg 210: Specifying nouns, object representations, can be done through traditional methods of naming them, or a selection though pointing to a representation of the object.
pg 211: Other methods for specifying objects are by sketching them or a combination of pointing to them and sketching them
pg 212: Text specification will be through keyboard input because it is fastest.  Adverbs, descriptions of the commands given, will be quantitative.
pg 213:  The eyeball is a mouse-like input device that allows the navigation of the architectural design.
pg 214: Description of the eyeball device.
pg 215: description of the toothpick device for exterior viewpoints of the architectural design.
pg 220: Visual displays for the system will be multiple and concurrent.
pg 221: The 2-d context view will be one of the concurrent views.
pg 222: The 3-d view will be the next concurrent view, followed by the exterior views.
pg 223: The workbook view will hold the designers notes and ideas and will be the next concurrent view
pg 224: The specification view will hold all textual descriptions of the structure that is designed.
pg 225:  Although this system is an architectural design system, adding an audio interface/display is important for the selling of the design.
pg 226: The Dream system now can conceivably be built.


Wednesday, March 28, 2012

The Problem with end users: Disclaimers and Warnings

PAHU security is not without hazards.  The device could be misused and could cause harm to the user.  The number one hazard would be using the device without observing local, state and federal laws that controlled when, where, and how a person may be videotaped.  This could result in legal action against the user and possible incarceration.  As with any electrical device, PAHU security poses a risk of electrical shock.

Other Minor hazards include improper use of the system.  These include improper installation and setup, improper analysis of results from the camera, possible wireless frequency interference, and inappropriate use of the system, such as use of the client software while driving.  These minor hazards can be easily avoided by instruction on proper use of the camera through user documentation.

The following are links to possible warning images to use in the instructional booklet:

https://upload.wikimedia.org/wikipedia/commons/2/2d/Warning_for_police_brutality.svg
http://images.cryhavok.org/d/2411-1/Warning+Ubiquitous+Surveillance.jpg
http://jaypgreene.files.wordpress.com/2009/05/shock-warning-logo.jpg?w=450
http://www.diy-alarms.co.uk/catalog/images/haydon_warning_sign.jpg
http://image.shutterstock.com/display_pic_with_logo/251239/251239,1235344621,8/stock-vector-caution-high-voltage-25439188.jpg

The following is a disclaimer and warning sheet, which could be useful in manufacturing a disclaimer and warning sheet to package with the PAHU security system, provided by FLIR for one of its cameras:

http://www.che.utah.edu/department_equipment/Projects_Lab/A_IR_Camera/MAN_Important_Information.pdf

The following is a user manual, which also may be useful in compiling a disclaimer and user packet for PAHU, provided with Trailer Eyes, a wireless camera system for use in mobile animal trailers:

http://www.batterybarn.com/te0811%20manual%20s%20.pdf

Possible sample disclaimers for PAHU would look as follows:

Safety Disclaimer

This product should not be used by the driver of a motor vehicle while driving. Always keep your hands free to operate a vehicle while driving. Obey all local laws. Your first consideration while driving should be safety. Follow all instructions provided with the camera system. To the maximum extent permitted by applicable law, PAHU Security, its subsidiaries and licensors hereby disclaim all liability arising out of any use of this product and its contents.

Safety Warning

·         This product should not be used by the driver of a motor vehicle while driving.

·         Electrical Shock can occur while using this device.  Do not open camera housing or tamper with camera.  Follow instructions provided in section X on powering the camera carefully.

·         Before installation and use ensure all local, state, and federal laws governing the video taping of individuals are understood and followed.  Failure to follow these laws could result in legal action and incarceration.

·         This equipment generates, uses, and can radiate radio frequency energy and if not installed and used in accordance with the instruction manual may cause interference to radio communications.

·         Do not disassemble or modify the battery pack or power source on the camera.  This could cause damage to the camera and could result in explosion or exposure to hazardous chemicals.  In the event there is exposure to liquids from the battery pack wash the exposed area thoroughly with water and seek medical attention immediately.
Additional disclaimers:

·         PAHU Security Systems reserves the right to gather anonymous usage statistics to help maintain and improve the quality of our software systems.

Wednesday, February 29, 2012

Remote user interface updates using difference and motion encoding

http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.htm&r=24&f=G&l=50&d=PTXT&p=1&S1=graphic&OS=graphic&RS=graphic

The abstract for US patent 8,127,233, application number 11/860,008, reads:

"Frames of user interface graphical data can be remotely rendered at a client during a remote session with a server by providing graphical data commands to the client. The commands include motion commands derived from objects that change position between a current frame and a new frame and delta commands derived from differences between the frames. The delta commands can be generated from a frame update after applying motion commands or without applying motion commands. A server identifies moving objects having a first position in the current frame and a second position in the new frame, generates motion hints for the moving objects, and reduces the motion hints based on collision detection, motion verification and other factors. Motion commands are generated for the reduced set of motion hints and applied to a copy of the current frame at the server. Differences between the modified current frame and the new frame are then encoded as delta commands. The server then sends the motion commands and delta commands to the client. The client receives and applies the commands to the current frame to render the new frame."

This relates to our senior design project because it uses similar pixel differencing methods that we have envisioned using to determine when activity has taken place in our security videos.

Wednesday, February 22, 2012

Optimization for Engineering Design; Introduction Summarry


Engineers see optimization as an esoteric technique use only in mathematics and research related activities.  An optimization algorithm is a procedure which is executed iteratively by comparing various solutions till the optimum or satisfactory result is found.  There are deterministic and stochastic optimization algorithms. 

Optimization algorithms are used in engineering design activities that emphasize maximizing or minimizing a certain goal.  Only the designer can formulate the optimization problem for the design they are designing. 

The purpose of the formulation procedure is to create a mathematical model of the optimal design problem, which can then be solved using an optimization algorithm.  This formulation begins with identifying design variables.  The speed and efficiency of the optimization algorithm depends on how many design variables are chosen.  The first rule of optimization is to choose as few design variables as possible. Constraints are then chosen.  These identify functional relationships between the design variables.  Constraints can be of an equality type or an inequality type.  Equality constraints should be avoided whenever possible because they are difficult to handle.  The objective function, which defines what should be minimized or maximized, is the next task in the optimization formulation procedure.  The final task is to set the variable bounds, minimum and maximum for each design variable.

After formulation the optimization problem can be written out in nonlinear programming format.

Monday, February 20, 2012

Maker Faire: Inovative designers show their stuff . . .


Strait Power:
http://www.youtube.com/watch?v=99ohs1fD-gQ&t=40s

Very cool bio-inspired hydro-electric turbine.  Based on the biology and behavior of the basking shark to put in the river in the Downriver Detroit area and hopefully restore industry in the area.  Anthony Reale, the designer, estimates that there is equivalent energy to a 120 mph wind flowing through the river.
Little Bits:
http://www.youtube.com/watch?v=1ITIng-ksQg

Fast electronic prototyping parts for school children and non-engineers.  Made to inspire electronic engineering for the lay-person.
Beatjazz Controllers:

Onyx Ashanti designed motion controllers that integrate with a 3-way wireless network to control his musical synthesizers he uses to create his music.  This allows him to control all his instruments through one convenient interface.

Reconfigured Elmo-TMX:
http://www.youtube.com/watch?v=bYoVQZXDCw8

Adrianne Wortzel reconfigures Tickle-Me-Elmo-TMX to a swarm-bot configuration.  She uses the robot swarm to reenact historic battles.
Lasersaur:
http://www.youtube.com/watch?v=9wWTw4B7v9I

Neat open source laser cutter.  For the individuals who just need a laser cutter, but don’t have the money of a large corporation.  Targeted to artists and hobby engineers.