SYSPRO's architecture allows companies to deploy the ERP software in the optimum way, depending on the type of infrastructure, size of business, and cost constraints. In addition, SYSPRO is available through the cloud using infrastructure such as the Microsoft Windows Azure platform.
Saudi Arabia IoT in Manufacturing Market Forecast 2025 | TechSci ResearchTechSci Research
According to www.techsciresearch.com latest report- Saudi Arabia IoT in Manufacturing Market, By Component (Solutions, Platforms and Services), By Application Area (Predictive Maintenance, Business Process Optimization, etc.), By Vertical (Energy & Utilities, Automotive, Food & Beverages, Aerospace & Defence, etc.) By Company, Competition, Forecast & Opportunities, 2025.
Report URL- https://www.techsciresearch.com/report/saudi-arabia-iot-in-manufacturing-market/2052.html
SYSPRO's architecture allows companies to deploy the ERP software in the optimum way, depending on the type of infrastructure, size of business, and cost constraints. In addition, SYSPRO is available through the cloud using infrastructure such as the Microsoft Windows Azure platform.
Saudi Arabia IoT in Manufacturing Market Forecast 2025 | TechSci ResearchTechSci Research
According to www.techsciresearch.com latest report- Saudi Arabia IoT in Manufacturing Market, By Component (Solutions, Platforms and Services), By Application Area (Predictive Maintenance, Business Process Optimization, etc.), By Vertical (Energy & Utilities, Automotive, Food & Beverages, Aerospace & Defence, etc.) By Company, Competition, Forecast & Opportunities, 2025.
Report URL- https://www.techsciresearch.com/report/saudi-arabia-iot-in-manufacturing-market/2052.html
The Drives and Controls technology landscape is changing rapidly. Industries and technologies that were once largely segregated are now converging towards each other. Mechanical, electric and fluid systems will increasingly need to be looked at as a single Drives & Controls technology landscape in the future. The reason for this disruptive shift lies in four key trends: electrification, system solutions, digitization and automation.
Find out what ERP is, the standard packaged ERP features and functionality, how SYSPRO can be tailored to suite your business needs and what SYSPRO technology delivers
A next-gen maintenance solution should bring a digital transformation to the plant and should feature a user-friendly interface so each team member is eager to work with it. The industry 4.0 CMMS can be easily integrated in the context of the IoT, cloud and cognitive computing to become an indispensable part of the smart factory.
Cloud Changed The Way Technology is ConsumedAutotask
Clients increasingly buy solutions as a service, to grow their businesses, innovate and optimize their cost structures. Clients look to service providers to run (their) applications in the cloud and reduce the day-to-day responsibility of keeping their IT infrastructures up and running. As a result, traditional IT-partners’ skills and service delivery capabilities must transform. This session will provide real insights and examples of how you can capture the cloud opportunity - one that is expected to be worth $75 billion by 2015.
[Presenter: Simon Porter, IBM]
Industry 4.0 promises great increase in productivity and profitability. This presentation covers the basics of this new manufacturing approach and it separates facts from fiction.
Presenting at the Lanner predictive simulation conference, 2016, Richard Evans from AECOM explores the trends and funding surrounding Industry 4.0, including 'vision', 'cyber-physical' and 'embedded systems' .
Square Foot Gardening (SFG) for raising vegitable garden. You could produce your requirement of vegitables etc. suing very little space and effort/inputs.
The Drives and Controls technology landscape is changing rapidly. Industries and technologies that were once largely segregated are now converging towards each other. Mechanical, electric and fluid systems will increasingly need to be looked at as a single Drives & Controls technology landscape in the future. The reason for this disruptive shift lies in four key trends: electrification, system solutions, digitization and automation.
Find out what ERP is, the standard packaged ERP features and functionality, how SYSPRO can be tailored to suite your business needs and what SYSPRO technology delivers
A next-gen maintenance solution should bring a digital transformation to the plant and should feature a user-friendly interface so each team member is eager to work with it. The industry 4.0 CMMS can be easily integrated in the context of the IoT, cloud and cognitive computing to become an indispensable part of the smart factory.
Cloud Changed The Way Technology is ConsumedAutotask
Clients increasingly buy solutions as a service, to grow their businesses, innovate and optimize their cost structures. Clients look to service providers to run (their) applications in the cloud and reduce the day-to-day responsibility of keeping their IT infrastructures up and running. As a result, traditional IT-partners’ skills and service delivery capabilities must transform. This session will provide real insights and examples of how you can capture the cloud opportunity - one that is expected to be worth $75 billion by 2015.
[Presenter: Simon Porter, IBM]
Industry 4.0 promises great increase in productivity and profitability. This presentation covers the basics of this new manufacturing approach and it separates facts from fiction.
Presenting at the Lanner predictive simulation conference, 2016, Richard Evans from AECOM explores the trends and funding surrounding Industry 4.0, including 'vision', 'cyber-physical' and 'embedded systems' .
Square Foot Gardening (SFG) for raising vegitable garden. You could produce your requirement of vegitables etc. suing very little space and effort/inputs.
Managing stakeholders as critical success factor in operational excellenceThe Jamilah H
Knowing stakeholders is the key thing in any transformational or continuous improvement initiatives, The presentation covers both high level and inter personal level of stake holders management techniques.
Among key contents are 7 Prevention Steps of Stakeholders misalignment and tools for Stakeholders Planning, Stakeholders Mapping, and Stakeholders Support Level.
SPICEsim is unique within the Engineering Services Outsourcing (ESO) industry with more than 25 years experience in turning customer\'s concepts into world-class products through our unique set of value-added CAD or CAE solutions. These solutions include electronic and mechanical design, printed circuit board development, electronic circuit simulation and modeling, signal integrity analysis and finally, mechanical simulation.
Embedded software validation best practices with NI and RQMPaul Urban
Embedded control software is growing exponentially in mechanical systems, which forces test methods to evolve even faster. This presentation was part of the Rational Quality Manager enlightenment series describing how National Instruments and IBM provide end-to-end traceability and test component reuse for superior system quality and validation by enabling consistent testing, results analysis, and traceability throughout the development process.
Tracking the Solutions Powering the Next Generation of Embedded Systems in Q4...VDC Research Group
The embedded software and solutions market remains highly competitive as software and systems manufacturers continue to require new solutions that help them create, test and manage the designs necessary to power the next generation of embedded systems. During this webcast, Steve Balacco, Director of VDC Research’s Embedded Software & Tools practice will provide an update and 2011 outlook for embedded device & systems manufacturers and their embedded solutions providers. Specifically, the webcast will address: The state of the embedded software solution market, what the competitive landscape looks like, how multi-core requirements are impacting embedded software development, embedded engineering trends and what suppliers and solution providers should prepare for in 2011.
This presentation gives an overview of Microsoft & SAP Solution for Manufacturing O365 in MII 14 which helps you to manage complexity, rapidly develop/deploy, real-time and provides consistent User Experience. It also shows demo screen shots, information to the people who need it, mobile architecture for SAP manufacturing and more.
Building high volume software factories is all about combining workflow and automation functionality to ensure that each application development team is able to repeatedly deliver secure, high quality, feature rich iterations and operate them on scalable, highly available cloud infrastructure.
Attendees will learn how GitLab and Amazon Web Services (AWS) integrate together to provide best of breed development workflows and rock solid cloud application infrastructure.
Overview:
Hard lessons for CI / CD from how Ford automated automobile manufacturing.
GitLab CI / CD is a factory toolkit for software manufacturing.
GitLab CI/CD accelerates time to automation maturity with premade assembly lines and components.
GitLab CI/CD accelerates AppSec (DevSecOps) time to maturity with premade Security assembly lines.
How to have a tortured transformation to software manufacturing.
GitLab rich CI / CD workflows ensure cross-team (Dev, Ops, Sec) collaborative engagement and compliance with change gating controls with auditability.
GitLab CI / CD integrates with AWS infrastructure with multiple possible points of integration.
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentAntonio Rolle
This presentation focuses on the significance of the CMDB to your organization and offers practical guidelines for successful population of the CMDB utilizing the Tivoli Netcool suite of products. Specific products discussed include Precision for IP Networks, Tivoli Application Dependency Discovery Manager (TADDM), Tivoli Business Service Manager (TBSM) and Maximo.
Be sure to visit the following exhibitors at the v-FS3 conference! Without their support, there would be no conference. In addition to demonstrating their solutions and services in the exhibit area, Without their support, there would be no conference. Silver, Gold and Platinum sponsors will be offering on demand breakout sessions that you can attend at your leisure.
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...Precisely
As organizations today try to ensure that their digital transformation is executed as efficiently as possible, IT teams are tasked with delivering an ever-increasing number of services to the business. To effectively manage these mission-critical services, IT needs to know how they work—which infrastructure components and applications deliver a service and how they interact. Without this service visibility, there’s no easy way to resolve service outages, optimize service architectures, or assess the service impact of infrastructure changes. This is even more challenging when the business relies on siloed legacy systems like the mainframe and IBM i.
ServiceNow® Discovery builds on discovered infrastructure data to identify all the Configuration Items (CIs) that support a service, along with their service-specific relationships. It works hand-in-hand with ServiceNow® Service Mapping, which automates the service mapping process — creating a complete, up-to-date, and accurate record of your digital services in the ServiceNow® Configuration Management Database (CMDB). IT organizations with mainframe and IBM i can get more value out of these vital ServiceNow® Workflows by leveraging Precisely Ironstream to bring in mission-critical machine and log data from these previously siloed systems.
Watch this Ask the Experts Panel as they explore customer success stories and discuss how organizations are using ServiceNow and Ironstream to deliver a comprehensive, real-time view of their IT landscape. Our experts will discuss:
• How Discovery and Service Mapping Workflows allow customers to optimize their IT infrastructure
• Why mainframe and IBM i machine and log data vital to IT Ops teams
• How Ironstream enhances Service Mapping and Discovery to strengthen IT operations
IBM Detailed ALM/ELM for Aerospace & Defence overviewImran Hashmi
Check out more info at https://hashmi.ca
IBM Detailed ALM/ELM for Aerospace & Defence overview
Challenges & Trends in Aerospace/Defense industry
IBM Engineering platform for Aerospace/Defense
The A&D demonstrator
Engineering Lifecycle Management Solution for A&D capabilities
Deeper Dive: Accelerating Industry Compliance for Aerospace:
ARP4754 and DO178C
Summary and additional resources
https://hashmi.ca
Universal business operating system QOTEQ is the new generation of business management software that integrates all existing business applications, allowing customers to maintain and forecast their business easier, using one software system. QOTEQ allows employees to “code” with business terms without programming skills .
Time series databases provide new capabilities to replace the inefficiencies of legacy systems. With a time series database, developers can deploy modern applications without limitations in time, geography, and scale. The possibilities are endless.
These slides—based on the webinar from leading IT research firm EMA and InfluxData—cover how modern applications create value and competitive advantage.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Basics to Beyond Belief
1. Sobczak, the first 25 years Learning, Doing, Improving, Creating, Teaching, and Consulting to Defense, Commercial & Manufacturing Organizations
2. Sobczak learned to optimize Business Systems Such as: Order Entry Inventory --- Manufacturing Systems Shipping Accounts Receivable Accounts Payable General Ledger Personnel & Union Relations Advertising Public Relations
3. Inventory needs required integrating Manufacturing Systems such as: Production Planning Optimizing Factory Technologies Group Technology / Significant Numbering Systems Shop Floor Controls Work in Process Stocking Line Balancing Shop Floor Automation Training Factory Workers
4. Advising Company Owners & Managers Improving & Developing New Systems and Applications Sharing Achievements Counseling Personnel to gain confidence Consulting to Government & Industry Teaching new skills to Peers Documenting experiences
5. Sobczak, the next 25 years Implementing creativity outside the Box by building systems beyond the expected basics Advancing the state of the art
6. The World is deluged by New Technologies Planning Systems Bar Coding Security Automated Business Systems Technology Transfer Competitive Intelligence & Secrets
7. Planning Systems Block schedules PERT CPM PERT/COST Work Flow Analysis Line Balancing Feed Back Systems
8. Bar Coding Sobczak assembled the first glossary of Bar Code Technologies Sobczak applied Bar Codes to Inventory & Shop Floor for SME Sobczak prepared the SME Bar Code Textbook Sobczak teaches Bar Code Applications for the SME, CAMI, & the American Management Association Sobczak consults to DOD LOGMARS
9. Security Sobczak defines Virus based aggression Sobczak develops Enterprise Security Assured Private Entry, V-Phage, Detekt Network V-Phage, SDI security without human interface Sobczak writes monthly column for Security Intelligence Report Sobczak teaches Security at the National Security Conference in New York City
10. Sobczak shifts his focus SIID – Segment Indexed Integrated Databases A unique extension of the USAF WAL CAM-I MMCM program Sobczak locates & applies information here-to-fore thought lost to create new solutions
11. Technology Identification SIID is used to locate appropriate technologies that when integrated with state-of-the-art equipments solve production problems in a cost effective manner Examples: Exotic metal cutting and trimming for USAF B1-B Heads-up displays for the USAF F-35 aircraft New tin-zinc coating for commercial aircraft Production Integration for Loral Electronics Corp
12. Technology Transfer Located results are applied to create new yet to be conceived products and systems for the USAF, Navy, Army, Defense Contractors, and, General Industry. A SIID created management control tool reduced the computer equipment requirement for a fighter aircraft program management with integration system by duplicating large scale computer systems on a mid-range computer with links to desk & laptop computers. Reduced operating costs by 60-70%.
13. SIID organizes and structures data Organizing datum causes competitive intelligence information to jump off the page. Sobczak uses data structures to focus commercial off-the-shelf components to duplicate proprietary & secure systems. Using SIID Sobczak produced the glossary of terms used in Computer Integrated Manufacturing, Configuration Management and Logistics Management.
14. Home grown weapons abound in the ether Sobczak has cataloged several weapons as part of his research concerning the span of control and potential of SIID. Read his Data Mining (DM) articles and unpublished books available to all at: http://sobczaksays.org Feel free to address your questions to: tvsconsult@sobczaksays.org He can help you to reduce your costs of doing business Check the web site frequently as it is constantly updated.
15. Sobczak has credentials Fellow, Society of Manufacturing Engineers Fellow, Institute for the Advancement of Engineering Fellow, Institution of Production Engineers Author six (6) texts Author 600+ technical articles and presentations Retired Director, Plans for US Dept of Commerce NDER