pg 232: Great designs do not come from traditional product processes
pg 233: Product processes encourage conservative implementations and predictability; both are enemies of design
pg 234: Product processes are veto-oriented; Much of the designers time is taken up by blocking bad ideas and catching oversights rather than fostering creativity.
pg 235: "The trick is to hold [product] "process"off long enough for design to occur, so that lesser issues can be debated once the great design is on the table."
pg 236: product processes are properly designed for follow on products, not for innovation
pg 237: Process is important to design, but it would be advantageous to insulate the design team from them
pg 238: Talented designers need to be fostered.
pg 239: To maintain conceptual integrity, assign design to a chief designer
pg244: What ids the best way to develop great designers.
pg 245: Traditional education with the addition of critique is important to design brilliance development.
pg 246: Fostering design creativity must be done purposefully and planned for.
pg 247: Compensate designers appropriately and plan for furthering education.
pg 248: Give designers varied work environments.
pg 249: The John Cocke-Ralph Gomopry Story.
pg 250: Protect the designers from distractions of the traditional business process.
pg 251: Protect the designers from managers and keep them out of managing positions to foster creativity
pg 252: to grow yourself as a designer, sketch your designs constantly and get critiques of them.
pg 253 Study the designers and exemplars that came before you.
pg 254: The Self education project: design a 1000 sqaure foot house.
Wednesday, April 4, 2012
Monday, April 2, 2012
People I might hire
The following are links to resumes of individuals I may hire if I had a business:
http://www.ruscelli.com/resume_computer_science.htm
http://ocweekly.backpage.com/JobWanted/recent-it-graduate-pc-technician-help-desk/21674558
http://www.sqlservercentral.com/Forums/Topic16511-68-1.aspx#bm80382
Jane is a well rounded Computer Science major with a lot of experience in customer support. She is a good candidate because customer support is a necessary skill in any position. Her experience in support also makes he a good candidate for a technical writing position.
The second candidate, no name provided, would have a similar skill set to Jane.
Michael has extensive experience in programming. This would be useful to any project as he is versatile and can be trusted to be able to contribute to any project my imaginary company would be working on. In addition, he has several years of military service indicating that he is most likely competent at working in a team. This would make him a good leader and would lend well to a software development environment. This also means he would meet deadlines.
Sunday, April 1, 2012
Design of Design: 17-18
pg 204: A vision of a user interface for a design system
pg 205: Progressive truthfulness is the method of starting with an earlier conceived model and then to refine the model into the new design.
pg 206: The model library contains all the objects and their properties. Instances of the objects are named by knowledge of their exemplars.
pg 207: There is the hazard of restricting creativity through expansion of the model library too much and restricting the user to only exemplars within their knowledge base
pg 208: the noun and verb rhythm in the english language can be used as a model for computer human interaction
pg 209: Specifying verbs, commands, can be done through traditional computer input methods but is most easily facilitated by voice command.
pg 210: Specifying nouns, object representations, can be done through traditional methods of naming them, or a selection though pointing to a representation of the object.
pg 211: Other methods for specifying objects are by sketching them or a combination of pointing to them and sketching them
pg 212: Text specification will be through keyboard input because it is fastest. Adverbs, descriptions of the commands given, will be quantitative.
pg 213: The eyeball is a mouse-like input device that allows the navigation of the architectural design.
pg 214: Description of the eyeball device.
pg 215: description of the toothpick device for exterior viewpoints of the architectural design.
pg 220: Visual displays for the system will be multiple and concurrent.
pg 221: The 2-d context view will be one of the concurrent views.
pg 222: The 3-d view will be the next concurrent view, followed by the exterior views.
pg 223: The workbook view will hold the designers notes and ideas and will be the next concurrent view
pg 224: The specification view will hold all textual descriptions of the structure that is designed.
pg 225: Although this system is an architectural design system, adding an audio interface/display is important for the selling of the design.
pg 226: The Dream system now can conceivably be built.
pg 205: Progressive truthfulness is the method of starting with an earlier conceived model and then to refine the model into the new design.
pg 206: The model library contains all the objects and their properties. Instances of the objects are named by knowledge of their exemplars.
pg 207: There is the hazard of restricting creativity through expansion of the model library too much and restricting the user to only exemplars within their knowledge base
pg 208: the noun and verb rhythm in the english language can be used as a model for computer human interaction
pg 209: Specifying verbs, commands, can be done through traditional computer input methods but is most easily facilitated by voice command.
pg 210: Specifying nouns, object representations, can be done through traditional methods of naming them, or a selection though pointing to a representation of the object.
pg 211: Other methods for specifying objects are by sketching them or a combination of pointing to them and sketching them
pg 212: Text specification will be through keyboard input because it is fastest. Adverbs, descriptions of the commands given, will be quantitative.
pg 213: The eyeball is a mouse-like input device that allows the navigation of the architectural design.
pg 214: Description of the eyeball device.
pg 215: description of the toothpick device for exterior viewpoints of the architectural design.
pg 220: Visual displays for the system will be multiple and concurrent.
pg 221: The 2-d context view will be one of the concurrent views.
pg 222: The 3-d view will be the next concurrent view, followed by the exterior views.
pg 223: The workbook view will hold the designers notes and ideas and will be the next concurrent view
pg 224: The specification view will hold all textual descriptions of the structure that is designed.
pg 225: Although this system is an architectural design system, adding an audio interface/display is important for the selling of the design.
pg 226: The Dream system now can conceivably be built.
Wednesday, March 28, 2012
The Problem with end users: Disclaimers and Warnings
PAHU security is not without hazards. The device could be misused and could cause
harm to the user. The number one hazard
would be using the device without observing local, state and federal laws that controlled
when, where, and how a person may be videotaped. This could result in legal action against the
user and possible incarceration. As with
any electrical device, PAHU security poses a risk of electrical shock.
Other Minor hazards include improper use of the system. These include improper installation and setup, improper analysis of results from the camera, possible wireless frequency interference, and inappropriate use of the system, such as use of the client software while driving. These minor hazards can be easily avoided by instruction on proper use of the camera through user documentation.
The following are links to possible warning images to use in the instructional booklet:
https://upload.wikimedia.org/wikipedia/commons/2/2d/Warning_for_police_brutality.svg
http://images.cryhavok.org/d/2411-1/Warning+Ubiquitous+Surveillance.jpg
http://jaypgreene.files.wordpress.com/2009/05/shock-warning-logo.jpg?w=450
http://www.diy-alarms.co.uk/catalog/images/haydon_warning_sign.jpg
http://image.shutterstock.com/display_pic_with_logo/251239/251239,1235344621,8/stock-vector-caution-high-voltage-25439188.jpg
The following is a disclaimer and warning sheet, which could be useful in manufacturing a disclaimer and warning sheet to package with the PAHU security system, provided by FLIR for one of its cameras:
http://www.che.utah.edu/department_equipment/Projects_Lab/A_IR_Camera/MAN_Important_Information.pdf
The following is a user manual, which also may be useful in compiling a disclaimer and user packet for PAHU, provided with Trailer Eyes, a wireless camera system for use in mobile animal trailers:
http://www.batterybarn.com/te0811%20manual%20s%20.pdf
Possible sample disclaimers for PAHU would look as follows:
Safety Disclaimer
This product should not be used by the driver of a motor vehicle while driving. Always keep your hands free to operate a vehicle while driving. Obey all local laws. Your first consideration while driving should be safety. Follow all instructions provided with the camera system. To the maximum extent permitted by applicable law, PAHU Security, its subsidiaries and licensors hereby disclaim all liability arising out of any use of this product and its contents.
Safety Warning
Other Minor hazards include improper use of the system. These include improper installation and setup, improper analysis of results from the camera, possible wireless frequency interference, and inappropriate use of the system, such as use of the client software while driving. These minor hazards can be easily avoided by instruction on proper use of the camera through user documentation.
The following are links to possible warning images to use in the instructional booklet:
https://upload.wikimedia.org/wikipedia/commons/2/2d/Warning_for_police_brutality.svg
http://images.cryhavok.org/d/2411-1/Warning+Ubiquitous+Surveillance.jpg
http://jaypgreene.files.wordpress.com/2009/05/shock-warning-logo.jpg?w=450
http://www.diy-alarms.co.uk/catalog/images/haydon_warning_sign.jpg
http://image.shutterstock.com/display_pic_with_logo/251239/251239,1235344621,8/stock-vector-caution-high-voltage-25439188.jpg
The following is a disclaimer and warning sheet, which could be useful in manufacturing a disclaimer and warning sheet to package with the PAHU security system, provided by FLIR for one of its cameras:
http://www.che.utah.edu/department_equipment/Projects_Lab/A_IR_Camera/MAN_Important_Information.pdf
The following is a user manual, which also may be useful in compiling a disclaimer and user packet for PAHU, provided with Trailer Eyes, a wireless camera system for use in mobile animal trailers:
http://www.batterybarn.com/te0811%20manual%20s%20.pdf
Possible sample disclaimers for PAHU would look as follows:
Safety Disclaimer
This product should not be used by the driver of a motor vehicle while driving. Always keep your hands free to operate a vehicle while driving. Obey all local laws. Your first consideration while driving should be safety. Follow all instructions provided with the camera system. To the maximum extent permitted by applicable law, PAHU Security, its subsidiaries and licensors hereby disclaim all liability arising out of any use of this product and its contents.
Safety Warning
·
This product should not be used by the driver of
a motor vehicle while driving.
·
Electrical Shock can occur while using this
device. Do not open camera housing or
tamper with camera. Follow instructions provided
in section X on powering the camera carefully.
·
Before installation and use ensure all local,
state, and federal laws governing the video taping of individuals are
understood and followed. Failure to
follow these laws could result in legal action and incarceration.
·
This equipment generates, uses, and can radiate
radio frequency energy and if not installed and used in accordance with the
instruction manual may cause interference to radio communications.
·
Do not disassemble or modify the battery pack or
power source on the camera. This could
cause damage to the camera and could result in explosion or exposure to
hazardous chemicals. In the event there
is exposure to liquids from the battery pack wash the exposed area thoroughly with
water and seek medical attention immediately.
Additional disclaimers:
·
PAHU Security Systems reserves the right to
gather anonymous usage statistics to help maintain and improve the quality of
our software systems.
Wednesday, February 29, 2012
Remote user interface updates using difference and motion encoding
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.htm&r=24&f=G&l=50&d=PTXT&p=1&S1=graphic&OS=graphic&RS=graphic
The abstract for US patent 8,127,233, application number 11/860,008, reads:
"Frames of user interface graphical data can be remotely rendered at a client during a remote session with a server by providing graphical data commands to the client. The commands include motion commands derived from objects that change position between a current frame and a new frame and delta commands derived from differences between the frames. The delta commands can be generated from a frame update after applying motion commands or without applying motion commands. A server identifies moving objects having a first position in the current frame and a second position in the new frame, generates motion hints for the moving objects, and reduces the motion hints based on collision detection, motion verification and other factors. Motion commands are generated for the reduced set of motion hints and applied to a copy of the current frame at the server. Differences between the modified current frame and the new frame are then encoded as delta commands. The server then sends the motion commands and delta commands to the client. The client receives and applies the commands to the current frame to render the new frame."
This relates to our senior design project because it uses similar pixel differencing methods that we have envisioned using to determine when activity has taken place in our security videos.
The abstract for US patent 8,127,233, application number 11/860,008, reads:
"Frames of user interface graphical data can be remotely rendered at a client during a remote session with a server by providing graphical data commands to the client. The commands include motion commands derived from objects that change position between a current frame and a new frame and delta commands derived from differences between the frames. The delta commands can be generated from a frame update after applying motion commands or without applying motion commands. A server identifies moving objects having a first position in the current frame and a second position in the new frame, generates motion hints for the moving objects, and reduces the motion hints based on collision detection, motion verification and other factors. Motion commands are generated for the reduced set of motion hints and applied to a copy of the current frame at the server. Differences between the modified current frame and the new frame are then encoded as delta commands. The server then sends the motion commands and delta commands to the client. The client receives and applies the commands to the current frame to render the new frame."
This relates to our senior design project because it uses similar pixel differencing methods that we have envisioned using to determine when activity has taken place in our security videos.
Wednesday, February 22, 2012
Optimization for Engineering Design; Introduction Summarry
Engineers see optimization as an esoteric technique use only
in mathematics and research related activities.
An optimization algorithm is a procedure which is executed iteratively
by comparing various solutions till the optimum or satisfactory result is
found. There are deterministic and stochastic
optimization algorithms.
Optimization algorithms are used in engineering design
activities that emphasize maximizing or minimizing a certain goal. Only the designer can formulate the
optimization problem for the design they are designing.
The purpose of the formulation procedure is to create a
mathematical model of the optimal design problem, which can then be solved
using an optimization algorithm. This
formulation begins with identifying design variables. The speed and efficiency of the optimization
algorithm depends on how many design variables are chosen. The first rule of optimization is to choose
as few design variables as possible. Constraints are then chosen. These identify functional relationships
between the design variables.
Constraints can be of an equality type or an inequality type. Equality constraints should be avoided
whenever possible because they are difficult to handle. The objective function, which defines what
should be minimized or maximized, is the next task in the optimization
formulation procedure. The final task is
to set the variable bounds, minimum and maximum for each design variable.
After formulation the optimization problem can be written out
in nonlinear programming format.
Monday, February 20, 2012
Maker Faire: Inovative designers show their stuff . . .
Strait Power:
http://www.youtube.com/watch?v=99ohs1fD-gQ&t=40s
Very cool bio-inspired hydro-electric turbine. Based on the biology and behavior of the
basking shark to put in the river in the Downriver Detroit area and hopefully
restore industry in the area. Anthony
Reale, the designer, estimates that there is equivalent energy to a 120 mph
wind flowing through the river.
Little Bits:http://www.youtube.com/watch?v=1ITIng-ksQg
Fast electronic prototyping parts for school children and
non-engineers. Made to inspire
electronic engineering for the lay-person.
Beatjazz Controllers:Onyx Ashanti designed motion controllers that integrate with a 3-way wireless network to control his musical synthesizers he uses to create his music. This allows him to control all his instruments through one convenient interface.
Reconfigured Elmo-TMX:
http://www.youtube.com/watch?v=bYoVQZXDCw8
Adrianne Wortzel reconfigures Tickle-Me-Elmo-TMX to a
swarm-bot configuration. She uses the
robot swarm to reenact historic battles.
Lasersaur:
http://www.youtube.com/watch?v=9wWTw4B7v9I
Neat open source laser cutter. For the individuals who just need a laser
cutter, but don’t have the money of a large corporation. Targeted to artists and hobby engineers.
Wednesday, February 8, 2012
The ACTA dilema
The Anti-Counterfeiting Trade Agreement (ACTA) is a European
document that attempts to combat the proliferation of counterfeit and pirated
goods and the infringement of intellectual property. This is causing outrage among European
citizens as many of them see it as outlawing certain everyday activities they
believe they have the right to engage in.
One of the possible contentions is that the document allows the right holder to hold third party participants in the infringements accountable for the infringement. These third parties may only be factory workers who did not know they were counterfeiting goods or infringing on intellectual property. ACTA states, “Such information may include information regarding any person involved in any aspect of the infringement or alleged infringement and regarding the means of production or the channels of distribution of the infringing or allegedly infringing goods or services, including the identification of third persons alleged to be involved in the production and distribution of such goods or services and of their channels of distribution . . . Each Party shall provide that its judicial authorities have the authority to order prompt and effective provisional measures:
Finnally, ACTA imposes its regulation on those who are not party to the agreement making it applicable to those countries who reject the agreement. ACTA states, “Each Party shall endeavour to work closely with other Parties and, where appropriate, non-Parties to this Agreement for the purpose of implementing the provisions of paragraph 1,” however, those not party to the agreement will not have representation in the ACTA Committee, “The Parties hereby establish the ACTA Committee. Each Party shall be represented on the Committee.” This makes individuals in non-party nations unwittingly subject to ACTA.
One of the possible contentions is that the document allows the right holder to hold third party participants in the infringements accountable for the infringement. These third parties may only be factory workers who did not know they were counterfeiting goods or infringing on intellectual property. ACTA states, “Such information may include information regarding any person involved in any aspect of the infringement or alleged infringement and regarding the means of production or the channels of distribution of the infringing or allegedly infringing goods or services, including the identification of third persons alleged to be involved in the production and distribution of such goods or services and of their channels of distribution . . . Each Party shall provide that its judicial authorities have the authority to order prompt and effective provisional measures:
(a)
against a party or, where appropriate, a third party over whom the relevant
judicial authority exercises
jurisdiction, to prevent an infringement of any intellectual property right from
occurring, and in particular, to prevent
goods that involve the infringement of an intellectual property right from entering into the channels of commerce;
(b) to preserve relevant evidence in regard to the alleged infringement.”
A second objection may be that the provision allows for
criminal procedures against those individuals who use a trademark that is
similar to an existing trademark. ACTA
states, “Each Party shall provide for criminal procedures and penalties to be
applied in cases of wilful importation 10 and domestic use, in the course of
trade and on a commercial scale, of labels or packaging: to which a mark has
been applied without authorization which is identical to, or cannot be
distinguished from, a trademark registered in its territory.”(b) to preserve relevant evidence in regard to the alleged infringement.”
Third, a taping of a school play that uses similar scene choreography
to a copyrighted movie and then is posted on YouTube may create criminal
liability under ACTA. ACTA states, “A
Party may provide criminal procedures and penalties in appropriate cases for the
unauthorized copying of cinematographic works from a performance in a motion picture
exhibition facility generally open to the public.”
Fourth, sharing content that includes a trademark,
copyrighted material, or reproduction of intellectual property on a social
media site by a private individual may create criminal liability. ACTA states, “Further to paragraph 1, each
Party’s enforcement procedures shall apply to infringement of copyright or
related rights over digital networks, which may include the unlawful use of
means of widespread distribution for infringing purposes.”Finnally, ACTA imposes its regulation on those who are not party to the agreement making it applicable to those countries who reject the agreement. ACTA states, “Each Party shall endeavour to work closely with other Parties and, where appropriate, non-Parties to this Agreement for the purpose of implementing the provisions of paragraph 1,” however, those not party to the agreement will not have representation in the ACTA Committee, “The Parties hereby establish the ACTA Committee. Each Party shall be represented on the Committee.” This makes individuals in non-party nations unwittingly subject to ACTA.
Anderson Center
The Anderson Center for Entrepreneurship and Innovation
works with the College of Business Administration at the University of
Tennessee to encourage entrepreneurship and technological innovation in the
nearby regions by working with college students about to enter the
workforce. They sponsor VolCourt which
is a workshop and competition for business planning and design. The following is from the College of Business
Administration website:
“The Anderson Center for Entrepreneurship and Innovation
will offer the chance for students, faculty and the community to learn from
entrepreneurs and business experts about the essentials of getting a company
off the ground.
The Vol Court spring 2012 session begins Jan. 31 and runs
through March 13. Workshop presenters are from various organizations throughout
Tennessee, and all have experience with entrepreneurial companies.
The seven-part series will be held Tuesdays at 5:15 p.m. in
Room 701 of the Stokely Management Center.”
The Anderson Center also hosts an undergraduate business
plan competition.
The VolCourt prize for the “Pitch Competition” is $1000 for
first place and $500 for second. The prize
for the business plan competition is up to $20,000 that may be distributed to
one or many of the winning pitches depending on 3 criteria; need for capital,
viability of the business concept, and growth potential.
The most recent winners of the VolCourt pitch competition
were Cedric Brown and Jake Rheude for their pitch on a new supermarket item,
Buffalo Chicken Dip, which is non-existent in Knoxville supermarkets. The winner of the inaugural VolCourt
competition, in the spring of 2010, was Danny Smith who won for pitching a
product to protect rock climbing shoes and extend the life of the shoe. Other winning pitches included an online
community that allows students to leave feedback on host families, residence
halls, apartments and other living arrangements during the school year, and a collapsible
water bottle.
Monday, January 30, 2012
Amazing Technologies
SH Coatings:
SHC produces super hydrophilic coatings to protect power lines form inclement weather:
SHC produces super hydrophilic coatings to protect power lines form inclement weather:
TrakLok:
TrakLok makes security devices that track the location of cargo and other shipments. It also allows the user to set ‘fences’ that prevent the courier from opening shipments and cargo containers outside of the specified locations:
NELL:
The Never Ending Language Learning Project is a semantic language learning machine developed at Carnegie Mellon supported by grants from DARPA, Google and the NSF. Its goal is to be able to answer questions posed in a natural language. T achieve this goal NELL sifts through web pages attempting to create semantic relationships between data found on the web:
Ampakines:
A class of compounds that show promise in enhancing attention span, learning, and memory without great adverse side effects:
Google Driverless Car:
A car that operates without a human driver and won 2 competitions posed by DARPA; The 2005 DARPA Grand Challenge and the DARPA Grand Urban Challenge:
ABET Definition of Design, and the Design Challenges
The ABET definition of design is as follows:
Engineering design is the process of devising a system, component, or process to meet desired needs. It is a decision-making process (often iterative), in which the basic science and mathematics and engineering sciences are applied to convert resources optimally to meet a stated objective. Among the fundamental elements of the design process are the establishment of objectives and criteria, synthesis, analysis, construction, testing and evaluation. The engineering design component of a curriculum must include most of the following features: development of student creativity, use of open-ended problems, development and use of modern design theory and methodology, formulation of design problem statements and specification, consideration of alternative solutions, feasibility considerations, production processes, concurrent engineering design, and detailed system description. Further it is essential to include a variety of realistic constraints, such as economic factors, safety, reliability, aesthetics, ethics and social impact." Elsewhere in the ABET criteria for accreditation; they stress the use of teams in solving problems and performing designs.
During the two challenges in class we followed various parts of this definition. Both design challenges included creativity, use of open-ended problems, consideration of alternative solutions, feasibility considerations, productions processes, and concurrent engineering design.
For the marshmallow challenge we were tasked to design a system that met the need of holding a marshmallow aloft at the greatest height. It included an iterative decision making processes in order to perfect the design that was optimal. Evaluation of the design was simply to see if the structure would hold the marshmallow and which design was the tallest.
The paperclip challenge included designing a system or component to meet desired needs; however, those needs were abstractly defined. The design only needed to “do something useful.” The definition of useful was left up to the design team. It included iterative decision making and creative process through the requirement that the request for design be given with no direction on the process of production, thus creating 3-4 separate designs that fulfilled the desired result. The metrics for evaluation of success were much more complicated than the marshmallow challenge and included testing of several designs by one design team rather than one design by each design team.
Setback Requirements in Knoxville, TN
The setback requirements for a residential house in Knoxville TN require that the house be positioned a minimum distance from the street on all sides. The various minimum distances are as follows:
Front Yard – 35 feet, no addition to the house can extend into this area
Side Yard – 8 feet for single story homes, 12 feet for two story homes, and additions may not extend into the minimum 8 feet from the street.
Rear Yard – 10 feet for main buildings and unattached accessory buildings may not be closer than 5 feet from the street.
Front Yard – 35 feet, no addition to the house can extend into this area
Side Yard – 8 feet for single story homes, 12 feet for two story homes, and additions may not extend into the minimum 8 feet from the street.
Rear Yard – 10 feet for main buildings and unattached accessory buildings may not be closer than 5 feet from the street.
Who is Min Kao?
http://en.wikipedia.org/wiki/Min_Kao
Min Kao is one of the co-founders of Garmin. He earned his M.S. and Ph.D. in electrical engineering at the University of Tennessee. The Min Kao building that recently opened on the UT campus is named for him due to the $17.5 million transformational gift by Min Kao to the University as thanks for his education.
Min Kao is one of the co-founders of Garmin. He earned his M.S. and Ph.D. in electrical engineering at the University of Tennessee. The Min Kao building that recently opened on the UT campus is named for him due to the $17.5 million transformational gift by Min Kao to the University as thanks for his education.
Wednesday, January 25, 2012
New Technologies
Memristors:
A circuit that can remember electrical states even when turned off in developement by HP:
http://en.wikipedia.org/wiki/Memristor
Quantum Dots:
Tiny semiconductors under investigation for many purposes, notably quantum computing:
http://en.wikipedia.org/wiki/Quantum_dot
Magnetic Soap:
Magnatized soap that could easily be collected after used to clean up hazardous spills:
http://www.theverge.com/2012/1/25/2731244/magnetic-soap-oil-cleanups-bristol-university
Spintronics:
A solid state technology that exploits the spin of the electron and it's magnetic moment. Applications are various:
http://en.wikipedia.org/wiki/Spintronics
High-temperature superconductivity:
Useful in creating no loss conductors, frictionless bearings, magnetic levitation, and various other applications.
http://en.wikipedia.org/wiki/High-temperature_superconductivity
A circuit that can remember electrical states even when turned off in developement by HP:
http://en.wikipedia.org/wiki/Memristor
Quantum Dots:
Tiny semiconductors under investigation for many purposes, notably quantum computing:
http://en.wikipedia.org/wiki/Quantum_dot
Magnetic Soap:
Magnatized soap that could easily be collected after used to clean up hazardous spills:
http://www.theverge.com/2012/1/25/2731244/magnetic-soap-oil-cleanups-bristol-university
Spintronics:
A solid state technology that exploits the spin of the electron and it's magnetic moment. Applications are various:
http://en.wikipedia.org/wiki/Spintronics
High-temperature superconductivity:
Useful in creating no loss conductors, frictionless bearings, magnetic levitation, and various other applications.
http://en.wikipedia.org/wiki/High-temperature_superconductivity
Monday, January 23, 2012
H.R. 2930
House Resolution 2930, named the "Entrepreneur Access to Capital Act," is a federal bill currently under review that would affect crowdfunded businesses and projects. It allows an exemption for registration with the SEC as long as these projects meet certain requirements based on the projects income and the amount of ‘equity’ sold within a 12-month period. The resolution also sets up requirements for intermediaries to crowdfunding, such as websites or applications, which include warnings, actions to reduce fraud, production of information, background checks on entities using the intermediary, and access to the intermediary by the SEC. The requirements for projects not using an intermediary for crowdfunding are similar to those requirements placed on intermediaries. Information and access to information must be provided in all situations.
Using Social Media for Raising Funds
An excellent article describing how social media can be used to raise funds can be found here:
Using Social Media for Raising Funds
This includes many sites and tools to help someone get started on raising funds. My favorite sites/tools, in no particular order, are:
http://en.wikipedia.org/wiki/Crowd_funding
Another top ten list for crowdfunding can be found here:
http://cashtostart.com/10-crowdfunding-websites-entrepreneurs/
Using Social Media for Raising Funds
This includes many sites and tools to help someone get started on raising funds. My favorite sites/tools, in no particular order, are:
- Kickstarter
- Chipin
- Razoo
- Artez
- Care2
- Convio
- Piryx
- Profounder
- IndieGoGo
- AppBackr
http://en.wikipedia.org/wiki/Crowd_funding
Another top ten list for crowdfunding can be found here:
http://cashtostart.com/10-crowdfunding-websites-entrepreneurs/
What is a Corporation? What is Equity?
Wikipedia (http://en.wikipedia.org/wiki/Corporation) defines a corporation as:
"A corporation is created under the laws of a state as a separate legal entity that has privileges and liabilities that are distinct from those of its members.[1] There are many different forms of corporations, most of which are used to conduct business. Early corporations were established by charter (i.e. by an ad hoc act passed by a parliament or legislature). Most jurisdictions now allow the creation of new corporations through registration.
An important (but not universal) contemporary feature of a corporation is limited liability. If a corporation fails, shareholders may lose their investments, and employees may lose their jobs, but neither will be liable for debts to the corporation's creditors.
Despite not being natural persons, corporations are recognized by the law to have rights and responsibilities like natural persons ("people"). Corporations can exercise human rights against real individuals and the state,[2] and they can themselves be responsible for human rights violations.[3] Corporations are conceptually immortal but they can "die" when they are "dissolved" either by statutory operation, order of court, or voluntary action on the part of shareholders. Insolvency may result in a form of corporate 'death', when creditors force the liquidation and dissolution of the corporation under court order,[4] but it most often results in a restructuring of corporate holdings. Corporations can even be convicted of criminal offenses, such as fraud and manslaughter. However corporations are not living entities in the way that humans are. [5]
Although corporate law varies in different jurisdictions, there are four characteristics of the business corporation"
And equity as:
"In accounting and finance, equity is the residual claim or interest of the most junior class of investors in assets, after all liabilities are paid. If liability exceeds assets, negative equity exists. In an accounting context, Shareholders' equity (or stockholders' equity, shareholders' funds, shareholders' capital or similar terms) represents the remaining interest in assets of a company, spread among individual shareholders of common or preferred stock.
At the start of a business, owners put some funding into the business to finance operations. This creates a liability on the business in the shape of capital as the business is a separate entity from its owners. Businesses can be considered, for accounting purposes, sums of liabilities and assets; this is the accounting equation. After liabilities have been accounted for the positive remainder is deemed the owner's interest in the business.
This definition is helpful in understanding the liquidation process in case of bankruptcy. At first, all the secured creditors are paid against proceeds from assets. Afterward, a series of creditors, ranked in priority sequence, have the next claim/right on the residual proceeds. Ownership equity is the last or residual claim against assets, paid only after all other creditors are paid. In such cases where even creditors could not get enough money to pay their bills, nothing is left over to reimburse owners' equity. Thus owners' equity is reduced to zero. Ownership equity is also known as risk capital or liable capital."
In order to create a Corporation or a Limited Liability Company, one must follow the State laws that dictate how to form one of these entities. The method for setting up either is similar with the only difference being the paperwork that must be submitted for approval. The steps are as follows:
There are 3 options for dissolving a corporation in Tennessee; voluntarily (described in Tennessee code sections 48-24-101 through 48-24-108), administratively (described in Tennessee code sections 48-24-201 through 48-24-25), and judicially (described in Tennessee code sections 48-24-301 through 48-24-304). For voluntary dissolution all that is necessary is to file the proper paperwork and then proceed to the "winding up" process. The winding up process includes the following steps:
The steps for dissolving an LLC in Tennessee are similar to dissolving a corporation, again, only differing in the required paperwork.
The cost of creating a corporation or LLC in Tennessee is minimal and should only be about $200, not including any proprietary licenses necessary to the running of a specifice business (i.e. a tobacco license or an alcohol license ).
The required forms for forming or dissolving a corporation or LLC in Tennessee can be found here:
http://www.tn.gov/sos/bus_svc/forms.htm
"A corporation is created under the laws of a state as a separate legal entity that has privileges and liabilities that are distinct from those of its members.[1] There are many different forms of corporations, most of which are used to conduct business. Early corporations were established by charter (i.e. by an ad hoc act passed by a parliament or legislature). Most jurisdictions now allow the creation of new corporations through registration.
An important (but not universal) contemporary feature of a corporation is limited liability. If a corporation fails, shareholders may lose their investments, and employees may lose their jobs, but neither will be liable for debts to the corporation's creditors.
Despite not being natural persons, corporations are recognized by the law to have rights and responsibilities like natural persons ("people"). Corporations can exercise human rights against real individuals and the state,[2] and they can themselves be responsible for human rights violations.[3] Corporations are conceptually immortal but they can "die" when they are "dissolved" either by statutory operation, order of court, or voluntary action on the part of shareholders. Insolvency may result in a form of corporate 'death', when creditors force the liquidation and dissolution of the corporation under court order,[4] but it most often results in a restructuring of corporate holdings. Corporations can even be convicted of criminal offenses, such as fraud and manslaughter. However corporations are not living entities in the way that humans are. [5]
Although corporate law varies in different jurisdictions, there are four characteristics of the business corporation"
And equity as:
"In accounting and finance, equity is the residual claim or interest of the most junior class of investors in assets, after all liabilities are paid. If liability exceeds assets, negative equity exists. In an accounting context, Shareholders' equity (or stockholders' equity, shareholders' funds, shareholders' capital or similar terms) represents the remaining interest in assets of a company, spread among individual shareholders of common or preferred stock.
At the start of a business, owners put some funding into the business to finance operations. This creates a liability on the business in the shape of capital as the business is a separate entity from its owners. Businesses can be considered, for accounting purposes, sums of liabilities and assets; this is the accounting equation. After liabilities have been accounted for the positive remainder is deemed the owner's interest in the business.
This definition is helpful in understanding the liquidation process in case of bankruptcy. At first, all the secured creditors are paid against proceeds from assets. Afterward, a series of creditors, ranked in priority sequence, have the next claim/right on the residual proceeds. Ownership equity is the last or residual claim against assets, paid only after all other creditors are paid. In such cases where even creditors could not get enough money to pay their bills, nothing is left over to reimburse owners' equity. Thus owners' equity is reduced to zero. Ownership equity is also known as risk capital or liable capital."
In order to create a Corporation or a Limited Liability Company, one must follow the State laws that dictate how to form one of these entities. The method for setting up either is similar with the only difference being the paperwork that must be submitted for approval. The steps are as follows:
- Determing that the name for your Corporation or LLC is available and in accordance with the laws requiring "Corporation," "Incorporated," or "LLC" to be a part of it.
- File the "Articles of Incorporation" to create a corporate entity or "Articles of Organization" to create and LLC.
- Hold the "Organizational Meeting" and adopt bylaws for a corporation or operating agreements for an LLC.
- Obtain a Federal Employer Identification Number and open a bank account for the company.
- Get a local business license from the city or county where the company will be located.
There are 3 options for dissolving a corporation in Tennessee; voluntarily (described in Tennessee code sections 48-24-101 through 48-24-108), administratively (described in Tennessee code sections 48-24-201 through 48-24-25), and judicially (described in Tennessee code sections 48-24-301 through 48-24-304). For voluntary dissolution all that is necessary is to file the proper paperwork and then proceed to the "winding up" process. The winding up process includes the following steps:
- Collecting corporate assets.
- Disposing of property that will not be distributed to shareholders.
- Paying off or making provisions to pay off corporate liabilities.
- Distributing assets to shareholders.
- Doing any other act necessary to wind up corporate affairs.
The steps for dissolving an LLC in Tennessee are similar to dissolving a corporation, again, only differing in the required paperwork.
The cost of creating a corporation or LLC in Tennessee is minimal and should only be about $200, not including any proprietary licenses necessary to the running of a specifice business (i.e. a tobacco license or an alcohol license ).
The required forms for forming or dissolving a corporation or LLC in Tennessee can be found here:
http://www.tn.gov/sos/bus_svc/forms.htm
Wednesday, January 11, 2012
Meet and greet:
I am a computer science major. I chose this major after many years working on an IT support call line while pursuing a finance major. The opportunity to be a computer science major at UT and have access to the super computers at Oak Ridge National Lab was what helped me decide on switching schools and majors.
On completing my degree, I hope to get a job in software development or seek further education so that I can get a job in cyber security. To achieve this I plan to finish out my internship with ORNL in good standing so that I will have a noteworthy resume when I graduate.
The employment rate for college graduates is about 60% and they carry a debt of $25,000 on average. The top employers of college graduates can be found here: http://images.businessweek.com/slideshows/20110509/50-top-employers-for-college-grads/.
Here are the descriptions of a few classmates:
T.P. COSC major-
Has designed computer games before.
Likes working with and writing compilers.
Interested in possibly writing a tutorial application for this class.
Sleeps 6-8 hours a night.
Is taking 12 credit hours this semester.
Knows C++, HTML, CSS, C, SQL
Would like to learn PHP.
L.H. ECE: EE major-
Is interested in Software design.
Good at management, was an R.A. for a period of time.
Has done a good amount of fundraising before.
Sleeps 6-8 hours a night.
Is taking 18 credit hours this semester.
Has 5 room mates that are business majors.
Know C++.
Interested in doing a facial recognition system for this class.
M.B. -
Knows Java, Objective C
Interested in doing some sort of application for this class.
K.D. ECE:EE major-
Has worked with power systems, both consumer and industrial applications.
Not very good at programming.
Works in retail sales with computers at the Student Center.
Has mainly built power supplies for past jobs.
What is design:
According to http://atschool.eduweb.co.uk/trinity/watdes.html, Design is the following:
The nature of design is equally as complex as that of technology. Archer wrote that:
“Design is that area of human experience, skill and knowledge which is concerned with man’s ability to mould his environment to suit his material and spiritual needs.”
Design is essentially a rational, logical, sequential process intended to solve problems or, as Jones put it:
“initiate change in man-made things”
For the term “design process,” we can also read “problem-solving process”, which in all but its abstract forms works by consultation and consensus. The process begins with the identification and analysis of a problem or need and proceeds through a structured sequence in which information is researched and ideas explored and evaluated until the optimum solution to the problem or need is devised.
Yet, design has not always been a rational process; up until the Great War design was often a chaotic affair in that consultation and consensus were barely evident. Design was not a total process. The work of participants in the process was often compartmentalised, each having little if any input in matters which fell outside the boundaries of their specific expertise. Thus, participants explored their ideas unilaterally, with one or another participant, through virtue of their “expertise”, imposing constraints upon all others. In this way, the craftsman has a veto on matters to do with skill or availability of materials, the engineer had a veto on technological considerations, and the patron alone could impose considerations of taste and finance.
During the inter-war years the Bauhaus movement attempted to knit the design process into a coherent whole in that students were encouraged to study design in a way that was both total and detailed. That is, designers were expected to balance all the considerations that came to bear upon the design of particular artifacts, systems and environments. In this way, though, design quickly evolved into a closed activity - an activity in which all but the designers themselves has little if any valid input to make on questions of materials, taste . . . and so on. Designers came to exist within a social bubble, consulting no-one but other designers. The result was that many designs conceived particularly during the immediate post-Second World War period did little to satisfy the needs of users. Such designs were exemplified by the disastrous housing policies adopted by many local authorities in the UK who built residential tower block after residential tower block. These were essentially realizations of dreamy design concepts rather than solutions to the social, cultural and environmental needs of the local populations.
Recent years have marked a sharp reaction against the design movement, which has perhaps been personified by Prince Charles and has crusade against architectural “carbuncles”. Likewise, individuals within society have sought to express their own tastes, their own individuality, personal style and personal self-image through what they use and purchase. Thus it is that design is not an activity solely for engineers and designers but is a shared activity between those who design artefacts, systems and environments, those who make them and those who use them.
On completing my degree, I hope to get a job in software development or seek further education so that I can get a job in cyber security. To achieve this I plan to finish out my internship with ORNL in good standing so that I will have a noteworthy resume when I graduate.
The employment rate for college graduates is about 60% and they carry a debt of $25,000 on average. The top employers of college graduates can be found here: http://images.businessweek.com/slideshows/20110509/50-top-employers-for-college-grads/.
Here are the descriptions of a few classmates:
T.P. COSC major-
Has designed computer games before.
Likes working with and writing compilers.
Interested in possibly writing a tutorial application for this class.
Sleeps 6-8 hours a night.
Is taking 12 credit hours this semester.
Knows C++, HTML, CSS, C, SQL
Would like to learn PHP.
L.H. ECE: EE major-
Is interested in Software design.
Good at management, was an R.A. for a period of time.
Has done a good amount of fundraising before.
Sleeps 6-8 hours a night.
Is taking 18 credit hours this semester.
Has 5 room mates that are business majors.
Know C++.
Interested in doing a facial recognition system for this class.
M.B. -
Knows Java, Objective C
Interested in doing some sort of application for this class.
K.D. ECE:EE major-
Has worked with power systems, both consumer and industrial applications.
Not very good at programming.
Works in retail sales with computers at the Student Center.
Has mainly built power supplies for past jobs.
What is design:
According to http://atschool.eduweb.co.uk/trinity/watdes.html, Design is the following:
The nature of design is equally as complex as that of technology. Archer wrote that:
“Design is that area of human experience, skill and knowledge which is concerned with man’s ability to mould his environment to suit his material and spiritual needs.”
Design is essentially a rational, logical, sequential process intended to solve problems or, as Jones put it:
“initiate change in man-made things”
For the term “design process,” we can also read “problem-solving process”, which in all but its abstract forms works by consultation and consensus. The process begins with the identification and analysis of a problem or need and proceeds through a structured sequence in which information is researched and ideas explored and evaluated until the optimum solution to the problem or need is devised.
Yet, design has not always been a rational process; up until the Great War design was often a chaotic affair in that consultation and consensus were barely evident. Design was not a total process. The work of participants in the process was often compartmentalised, each having little if any input in matters which fell outside the boundaries of their specific expertise. Thus, participants explored their ideas unilaterally, with one or another participant, through virtue of their “expertise”, imposing constraints upon all others. In this way, the craftsman has a veto on matters to do with skill or availability of materials, the engineer had a veto on technological considerations, and the patron alone could impose considerations of taste and finance.
During the inter-war years the Bauhaus movement attempted to knit the design process into a coherent whole in that students were encouraged to study design in a way that was both total and detailed. That is, designers were expected to balance all the considerations that came to bear upon the design of particular artifacts, systems and environments. In this way, though, design quickly evolved into a closed activity - an activity in which all but the designers themselves has little if any valid input to make on questions of materials, taste . . . and so on. Designers came to exist within a social bubble, consulting no-one but other designers. The result was that many designs conceived particularly during the immediate post-Second World War period did little to satisfy the needs of users. Such designs were exemplified by the disastrous housing policies adopted by many local authorities in the UK who built residential tower block after residential tower block. These were essentially realizations of dreamy design concepts rather than solutions to the social, cultural and environmental needs of the local populations.
Recent years have marked a sharp reaction against the design movement, which has perhaps been personified by Prince Charles and has crusade against architectural “carbuncles”. Likewise, individuals within society have sought to express their own tastes, their own individuality, personal style and personal self-image through what they use and purchase. Thus it is that design is not an activity solely for engineers and designers but is a shared activity between those who design artefacts, systems and environments, those who make them and those who use them.
Subscribe to:
Posts (Atom)