Saturday 6 May 2017

Benefits Of An Arc Flash Study

 
Having an arc flash study performed on your electrical system is a big step towards keeping you and your employees safe and staying in compliance with OSHA requirements. One of the biggest reasons to have an arc study performed is to stay in compliance and not get shut down while other reasons may include following corporate policy, certifications and insurance requirements. However, the main reason should always be to keep the working environment a safe one. An arc flash study is very labor intensive and includes many steps. Each of the steps build on top of each other to create an overall picture of the electrical distribution system. There are many benefits beyond safety that an arc flash study will provide.

Data Collection

The first step for the study includes a lot of data collection. This information contains data of each electrical device in the facility for the maintenance personnel and engineers to go through. Some of the electrical devices that will be looked at include the transformers, breakers, cables and fuses. In many cases, the maintenance teams never have enough resources or time to catalog this information themselves without outside help.

Arc Flash Drawings
After all of the data is collected and reviewed, an arc flash drawing is drawn up. The drawing will be a map of the electrical system starting at the main utility transformer and will go down to all of the mechanical disconnects and branch panel boards. This drawing ensures that any current problems can be addressed quickly and any future changes can be easily updated by following the map.

Arc Flash Calculations

This is the step where all of the data collection and map drawing is put to work to calculate any hazards in each electrical device. This step is very important because two key points of information are discovered. These two points include the PPE level necessary to work on each device and the incident energy. The benefits of this also includes providing information about the minimum required amount of protection needed to work safely. It also enables workers not to have to inconvenience themselves by being overprotective. Without the data collection, workers would constantly be overestimating risk factors and sometimes underestimating the risk factors.

Coordination And Mitigation

These steps are where the safety plans are set into place. The coordination involves identifying circuits in the electrical distribution system which aren't working properly. During the mitigation analysis, hazards are identified and plans to reduce them are set. In many cases, the coordination and mitigation hazards can be corrected with just a few simple changes to the upstream breaker system. In some cases, however, new equipment is necessary to get the hazards under control. In either way, these are done to make the electrical system more efficient and safe.

Installing Labels

The last step in an arc flash study is label installation. Each electrical device is labelled with a tag that identifies its hazard level. It will also indicate the shock and arc flash boundaries which are needed in order to determine if any work can be completed while the components are energized or not. Also, it will indicate what PPE and precautions should be taken into consideration.

Most arc flash studies will include some comprehensive arc flash training at the conclusion. This is essential for all employees and maintenance teams to be fully informed and knowledgeable about the electrical systems. The training and survey should always be conducted by a competent and reliable company such as with arcflashtraining. Their training is designed not just to raise an awareness about electrical system safety, but also to show the incentives of practicing safe electrical habits.

Friday 5 May 2017

This is Google Jump Next Generation VR Camera Rig

Google Jump
Yi Halo/Yi360 VT

Yi Technology the Chinese company in the last two years, had made a niche for itself through its amazing proficient GoPro competitors. Presently the Xiaomi supported Yi is attempting to grow in the world of VR together with 360-degree video having two cameras.

This was announced at the NAB conference in Las Vegas where one is said to be for professionals and is known as the Yi Halo which had been created in partnership with Google while the other happens to be a consumer spherical camera known as the Yi 360 VR. The Yi Halo a 17-camera monster with the potential of shooting stereoscopic vide in 8K resolution at 30 frames per second or 5.8K at 60 frames per second comes at a price of 16,999. It had been designed to function with Jump a high-end VR creation platform which had been launched by Google in 2015.

The basic notion of Jump is to encourage VR film-making by removal of some of the huge barriers. Google tends to offer the general blueprints for the ringed camera rig together with server space for edging all the high-resolution imagery together and thereafter getting to kick back when hardware firms as well as film makers tend to create content for filling its promising Daydream VR platform.

Yi – First In Action Camera 

Yi is said to be the second company who has built a ring for the platform and last year, GoPro released the 16-camera Odyssey. The company has been utilising a modified version of 4K action camera in making up the Halo. The Yi Halo also tends to have another camera than the Odyssey which is said to be placed above the rig for improved capture of 360-degree footage directly above the head of the viewer when seen through a VR headset.

Besides this it also tends to have a smartphone app, a touchscreen control panel with levels on the rig structure for filmmaker. Moreover it has a capability for these small though meaningful benefits over what GoPro tends to provide.

 For instance, Yi had been the first in making an action camera which tends to shoots 4K footage at 60 frames per second which professional GoPro users tend to cry for since the release of the Hero 4 cameras.

Yi 360 VR – Release in June 

The spherical camera which GoPro had announced recently is the Yi 360 priced at $399 which can capture 360-degree video at 30 frames per second in 5.7K resolution somewhat edging out the 5.2K resolution of Fusion. Yi had showed up at NAB complete with specs for its announcement while GoPro had been thin on details for the Fusion.

The Yi 360 VR utilises a couple of overlapping 220-degree lenses, two 12-megapixel Sony IMX377 sensors together with an Ambarella processing chip to close the footage collected in-camera. Besides this it also tends to stream 2.5K footage at 30 frames a second over Wi-Fi and user have an hour of battery life. The limited release of Yi 360 VR would be made available in June.

 In the meanwhile, both the cameras would come to the US before making it to its home base of Yi in China. Sean Da, Yi CEO had informed `The Verge’ that while he hopes Chinese VR viewership to boom in the forthcoming years, this is due to the majority of `high performance, high quality video creators who tend to be US or European creators’.

Thursday 4 May 2017

How Should I Protect My Windows PC from Malware and Viruses?

Protect windows pc

Bitcoin – Secured Way of Collecting Cash

Several anti-virus programs is said to be a vital element of Windows setup but Windows has been transformed and the threat scenario has been changed. Some may be more prone to threats while other may be less sensitive to them. Some may tend to take the risk while other may require protection of their important information and all this needs to be considered.

Maximum of the main AV products began when several viruses had been written by amateurs who were keen on being noticed. Presently the malware have been written by experts who are on a money making spree and are not interested in viruses which duplicate themselves, their delivery mechanisms are websites and emails.

 They are not keen on showing off but would prefer to have their malware hidden. Their interest lies in the collection of financial information together with passwords and much more though there are also some in ransomware. They are aware that they can threaten people in making payment for something of great value, such as their personal files, financial information family photos, etc. With the development of Bitcoin a secure way of collecting the cash has been implemented.

Security Against Ransomware – Offline Backup

The best security against ransomware is an offline backup of all the important data. Several of the main AV products began when Windows together with its major browsers had been uncertain which is not the same now. Bill Gates, Microsoft cofounder had launched the Trustworthy Computing Initiative in 2002 making security the uppermost priority of the company.

TCI methodologies and training had transformed the way Microsoft had designed and created software where the results had shown a dramatic reduction in infection rates in Windows PC. Windows 10 presently comprises of a huge display of security and threat mitigation technologies wherein the main threats to Windows user is from the third party programs like Oracle Java together with some Adobe software.

Besides this there has also been a great boost in the security of web browsers especially Google’s Chrome as well as Edge of Microsoft. Chrome is said to be strongly sandboxed that tends in assisting in protecting the underlying operating system from web-based threats. `Bug bounty’ program run by Google pays researchers around $100,000 for every exploitable hole they find in Chrome or Android and has paid last year, over $3 million thus making Chrome much more secure.

Safe Browsing Structures

Additional security developments are from `safe browsing’ structures that tend to blacklist websites hosting malware. Google Safe Browsing has now been part of Chrome, Firefox, Vivaldi and Apple’s Safari while on the other hand Windows 10 is said to have its own built-in SafeScreen filter.

In case of any doubt regarding a website the same can be manually checked at Google’s website. The outcome is that the users of Windows 10 are not like users of Windows XP as long as they have their software updated.

It comprises of updating browsers together with third-party software utilising a free tool like Flexera’s Personal Software Inspector – PSI, Patch My PC or Kaspersky software Updater. Anti-virus companies have begun protecting susceptible operating system together with browser code though we may have reached a stage where the weak anti-virus software tends to do more harm than good.

Problems in Back Rooms – Became Public

Last November, problems which had been debated in back rooms had become public when Justin Schuh, Google Chrome security expert had launched a tweet storm against well-known Bulgarian AV expert, Vesselin Bontchev. Schuh had tweeted that `you misunderstand your own ignorance. AV is my single biggest impediment to shipping a secure browser’.

The essence of the several complaints of Schuh was that AV programs messed the security of the other programs despite the fact that they had been written apprehensively. He had tweeted that `you ignore all security best practice, piling dodgy format parsing and other unsafe code in the kernel and expects it’s possible to make an AV that is not more harm than good, but none of you are even trying’. Robert O’Callahan, the former Firefox developer had sounded in with a positive blog post – Disable Your Antivirus Software (Except Microsoft’s).

Programmers usually don’t talk regarding these issues since they require the cooperation of the AV supplier when the AV tends to cripple or crashes the software. Users are informed to turn off their AV since they would be at fault should something corrupt should take place which leaves only one option.
 As Schuh tweeted later that `browser makers do not complain about Microsoft Defender since there is a huge amount of empirical data display which is the only well behaved AV’.For the purpose of security:

First Windows 10 with Windows Defender, the SmartScreen filter, cloud based heuristics as well as basic telemetry all of which are related to security, in turned position. With that you could possibly be secure.

Second  Windows as standard user and not as an administrator wherein running as a standard user could eliminate around 90% of threats.

Third  ensure that Windows together with all the software of the PCs are updated. Several of the malware tend to exploit security holes which have been patched already, sometimes many years ahead. For the purpose of extreme security purpose, you could run Google Chrome or a Chromium-based browser like Vivaldi.

Fourth ensure that you have good backup of all the important data. Besides this in addition to normal PC backups you could use FreeFileSync to copy main data folders to an external hard drive daily which get backed up later to a second EHD. Blu-rays are also another choice since they cannot be encrypted to ransomware.

Fifth, you could run periodic scan in ensuring that your anti-virus program has not overlooked anything. Microsoft tends to do this with its MSRT – Malicious Software Removal Tool, before the installing of main updates while Kaspersky provides a good substitute. Free online scanners are also available from several AV companies inclusive of Bitdefender, Trend Micro, ESET and F-Secure.

Sixth, one should be aware that Windows 10 offers good refresh, reset and recovery choices and if these don’t do as needed then it may wipe your hard drive and you may have to reinstall Windows 10 from the start from a DVD or a thumb drive.

Wednesday 3 May 2017

Swarms of Autonomous Aerial Vehicles Test New Dogfighting Skills

Hummingbirds, dragonflies, bats, bees, cockroaches - around the world, autonomous mini robots are being worked on, which are not only to perform specific tasks but also to interact in groups as far as possible. We can go through a lot of Technology News that buds over online and also through tech magazines.

Unmanned aerial vehicle is an important addition to manned aviation. Compared to the use of robots in the industry, which carry out dangerous or monotonous activities to assist the worker, the unmanned flying pilot relieves the crew of dangerous or monotonous missions. Possible scenarios are flying in disaster areas, inspection of supply lines (overhead power lines, oil pipelines), traffic monitoring (flying between high-rise buildings) or in bad environmental conditions (fog, storm).

Missions to be undertaken by unmanned aircraft in the future are typically complex and therefore require a wide range of capabilities. For this reason basic research is necessary on several subject areas. The Unmanned Aircraft Division of the DLR Institute of Flight Systems Technology meets this complexity by carrying out research in the following fields.

Flight control and mission control solutions with highly uncertain system and environmental characteristics, Sensorfusion and environmental awareness with camera and laser as a sensor in flight control, System solutions for extremely small footprint.

The goal is the simple and safe operation of an unmanned aircraft in unknown terrain. For this purpose, necessary intervention by the pilot is to be minimized by a high degree of automation of the overall system. In addition, the department is concerned with the simultaneous operation of manned and unmanned aircraft in a common airspace, hardware and software development as well as admissions aspects.

The applications and the associated methods are focused on modern aviation and spacecraft with the different subsystems and support processes. Research on the unmanned aerial vehicle continues to include areas that are located outside the traditional aerospace themes.

Their research results have resulted in development and evaluation capabilities that make the department an attractive partner for industry, government agencies and other research institutions outside the aerospace industry. A number of experimental unmanned aerial vehicle is available to the department to carry out the research. In addition to a fleet of unmanned helicopters of different sizes, it is also possible to use automatically controlled surface aircraft and parachute load-bearing systems for research purposes.

It is already impressive when Honda's humanoid robot Asimo slowly rises up a flight of stairs. But what fascinates the viewer is probably primarily due to the endeavour to construct a being in his own image. In fact, Asimo is dumb, is controlled from a distance, and if he does not recharge the after 40 minutes, he falls asleep.

But even if creatures such as Asimo still dominate the coverage, robotic researchers have long since found new models for their designs. For a long time, they did not have to search for it: After the principle of trial and error, Mother Nature finally produced enough successful creatures. And, by the way, has three important lessons.

  • Specialization is efficiency. 
  •  It does not depend on the size. 
  •  Intelligence is not a question of the brain volume.
Efficiency through specialization

Among other things in the world of social insects it is part of everyday life that the inhabitants of a colony share the work. Depending on the role a specimen is to fill, it often possesses an extremely deviant physique. Nor is science so far as the nature where workers and queens are born with the same genetic equipment.

In the EU-sponsored Swarmanoid project, which runs until spring 2020, more than 60 autonomous robots are to work together to fulfil different tasks. Foot bots roll on the ground and possess special sensory abilities. Hand bots can climb vertical surfaces and manipulate objects, while the camera-bearing eye bots are raised by four rotors.

The possibility to observe the world almost unrecognized from above, of course, makes the military of this world listen. And so the robotic bat, which the US Army has developed within the framework of the COM-BAT program of three US universities for tens of millions of dollars, specializes in this task: it is to look at the world in stereo, Serve as a flying hornpot, sniff out gases and detect radioactivity. The bat is about 15 centimetres long still quite large. As she sails through the air, she recharges her battery via a miniaturized wind turbine and solar cells.

Students Develop Products to Assist Disabled Veterans

 Assist Disabled
Sweet news for brothers and sisters who are physically challenged living with strong will to face the world of challenges. Daily we can able to go through lots of Technology news while we take a look on Google. The students from the Detroit University and Lawrence Technological University exhibited five innovative systems for addressing the necessities of physically challenged veteran in a staging before veterans at a well renowned Medical Center in Detroit. The students of LTU take a part in this great effort were BME majors. They have started this wonderful program functioning by VA hospital patients in 2009. LTU linked up in this program as a co-worker on the assistive projects in 2014. And this great project of LTU has been overseeing by Mansoon Nasir, the assistant professor of Biomedical engineering.

The students intended the devices as capstone senior design ventures and their exertions pencilled admiration from the veterans who were their clienteles. These students are planning to make those products in profit making production.

The presentations comprised of:

·
 The Under Pressure Bed:
A novel method to treat pressure ulcers (bedsores), this gadget is a pad that comprises of eight chambers that a individual in a wheel chair sits on. The chambers expand and devalue under a controlled program, altering the position of a person recurrently, and as a consequence averting pressure ulcers. The gadget is expected to cost a Grand.
·
StretchPro: 
This excellent product which is based on an automatic jack that supports an individual by means of limited leg agility bask his/ her legs, refining the agility. The group has having some plans to make the device more innovative so they are still continued to work on the gadget, making it weightless and cheap. The retail cost is estimated to be around $200.
·
Walk & Lift: 
The real boon for a multiple sclerosis patients: This gadget was designed for a multiple sclerosis patient who is having complications in lifting their feet off the ground o'er a few inches. The cane is having a cloth and latex foot support that pops out of the nethermost on the impetus of a knob, permitting a person to fit the strap round their foot and lift their leg – for instance, into a car, or on a chaise longue. The cane is made up of carbon fibre combined and the weight of this gadget is below a pound sterling, and is expected to retail for just $150.
·
Squeaky Kleen: 
It is a handy bath for an individual who lies in a wheelchair. This gadget can be located in any place, entails of a malleable or aluminium structure as well as bath draperies, as well as having a tiny electrically powered propel to clean up the water from the end of the bath. It’s expected to cost around $600. It as well having a heat sensing shower pate to avert scorches in parts of the body an individual in a wheelchair might not be capable to sense.
·
A fine Grip: 
It is an electronic glove that can help a physically challenged individual who is having the limited hand movement to hold things. It is having the combination of a glove, actuator, and sensors as well software.