This was my second patent I filed, back from 2001. I still love the idea, and not seen anyone do it. Just posting this since someone asked me about it from a post on 1,000 Ideas. This would have been a 'big' project to get funded, but for me, the premise is still sound. Amazon's 'buttons' are kind of like it for a different application, but this one still has no competition as far as I know. Just posting it as an example, the deck was still in rough draft form.
This is still a good idea, but there are some similar projects out now. Think this is 2002 or so. Very simple concept, make some basic alarms that can trigger a pre-stored alert via the cellphone network. Example, someone trips up a door in your remote cabin, device calls in with a code, that triggers a pre-written text or recorded voicemail by you and gets sent 'someone has opened your cabin's door'. You can decide to call police after that. I did a ton of research on this, as you can see in the deck. Dropped it as the dollars required would have been massive to get it off the ground.
Bill Hulsey Patent Lawyer - Intellectual Property - Reasons for ProtectionBill Hulsey Lawyer
Bill Hulsey Patent Lawyer outlines reasons for and benefits from identifying and protecting intellectual property with patents, trade secrets, trade marks, and company policies.
5 Myths of Cybersecurity That are Important to You and Your JobEvolver Inc.
Cybersecurity is every employee's responsibility and it is important to know the facts and myths of cyberesecurity. In this deck from Evolver, Inc., Chip Block explores the turths (and mistruths) surrounding this important of information technology and information security - and why and how they apply to the employee's job.
Getting your new webby project or business online is easier than ever. But what are some of the legal issues you should concern yourself with? Martin Glogier and Marc Comeau of muttarts law firm offer an overview of some of the legal landscape in New Media.
This is still a good idea, but there are some similar projects out now. Think this is 2002 or so. Very simple concept, make some basic alarms that can trigger a pre-stored alert via the cellphone network. Example, someone trips up a door in your remote cabin, device calls in with a code, that triggers a pre-written text or recorded voicemail by you and gets sent 'someone has opened your cabin's door'. You can decide to call police after that. I did a ton of research on this, as you can see in the deck. Dropped it as the dollars required would have been massive to get it off the ground.
Bill Hulsey Patent Lawyer - Intellectual Property - Reasons for ProtectionBill Hulsey Lawyer
Bill Hulsey Patent Lawyer outlines reasons for and benefits from identifying and protecting intellectual property with patents, trade secrets, trade marks, and company policies.
5 Myths of Cybersecurity That are Important to You and Your JobEvolver Inc.
Cybersecurity is every employee's responsibility and it is important to know the facts and myths of cyberesecurity. In this deck from Evolver, Inc., Chip Block explores the turths (and mistruths) surrounding this important of information technology and information security - and why and how they apply to the employee's job.
Getting your new webby project or business online is easier than ever. But what are some of the legal issues you should concern yourself with? Martin Glogier and Marc Comeau of muttarts law firm offer an overview of some of the legal landscape in New Media.
BYOD at bpost -
Tim Groenwals, Technology Innovation Manager at bpost will share his experiences with BYOD. With thousands of potential users, BYOD presents a great challenge for a company like bpost. Tim will explain why the company started with the project, how they approached it and will openly share challenges and successes along the way.
(2012)
Overview of advanced data exfiltration techniques mixing both physical as well as digital domains.
Presented at several BSides events, FIRST conference, and private venues.
Building the Next Big Thing from Barcelona - short presentation for IoT meet ...Claro Partners Inc.
see also video of the presentation: http://youtu.be/3zQ4wKxwMTQ
Curious? Do you want to build the next big thing?
Join us during Mobile World Congress 2014 for:
IoT Startups Panel with relayr, Smart Citizen, theThings.io and Lhings by Claro - Tue 25 Feb, 12:00, Agora.
Keynote: "Emerging business opportunities in the Internet of Things landscape" - Tue 25 Feb, 15:45, Agora
Mini IoT-lab: "Designing experiences through the Internet of Things" - Wed 26 Feb, 09:30, Workshop dome 3
Personal data Workshop: "Designing personalised experiences" – with guest Stephen Deadman, Chief Privacy Officer, Vodafone. Wed 26 Feb, 15:00, Workshop dome 3
All the above will be held at 4 Years from Now, 4yfn.com - the event for entrepreneurship and innovation, at Montjuic (Pl. Espanya)
Etika Profesi Perguruan tinggi, Penjelasan mengenai Etika Profesi tentang kekayaan intelektual dan macam macamnya diantarannya, Copyright, patent dan rahasia dagang
Poised to be the next great technological boom, the Internet of Things has been astronomically hyped. Unfortunately, when it comes to the Smart Home, today we've got more Jucero than Jetsons. To live up to it's name, the Smart Home needs to become invisible.
Here are a few dozen short case studies. This format works well when presenting multiple in general client situations. A number of them were done at past employers.
Federal Minimum Wage: The Case for Geographic IndexingChief Innovation
Back in mid-July, I wrote this out of frustration and then sent it to about a dozen 2016 Presidential candidates. I do not have any concerns or benefits, just wonder why such an obvious solution seems to be absent from both parties. And want to thank Ben Carson for finally saying the 'I' word at the 9/16 debate. My personal goal was to see if I could get ANY candidate of either party to actually mention Indexing. Not sure that he did it because of what I sent him, but really don't care how the conversation gets started. Thanks Dr. Carson.
This is a project management measuring tool that is one of the coolest things I've ever seen for how to look at a big project. They should do these for any government or Big IT project. It seems complicated at first, but I tried to explain exactly how it works in this. I did not create it, first saw it in 1994/1995. I made this file to try to explain it to others (still is confusing), but please comment if you know its origins.
Just a quick deck that was part of a Strategy assignment for a non-profit. Will post the Case Study, hopefully later this week, after I hear back from the client.
Product Development Process Improvement - A Post-MortemChief Innovation
The attached file is a brief summary of an offering we provide related to Product Development. It is very unique, in that it takes a recently completed project, works to map out what happened, reviews areas where errors or delays occured, and then re-maps the project to show the impacts. This is a 7 page file, and we also have a 40 page one showing exactly how it works. Feel free to contact us to discuss, or put comments in here and we will answer them as best we can.
Just something I quickly made for a company here in Dallas. It is generic so I can post it. Recently did 2 Long-Tail projects which I may post if I can time to scrub them.
This is for companies who are trying to decide how to trim their product selections, or get rid of materials or SKUs to reduce complexity.
United States Post Office (USPS) - New Ideas for 21st CenturyChief Innovation
Just had some ideas for the USPS, sending these to Gary Reblin and am going to post in their new ideas website. I really like the idea (doesn't have to be a hashtag, could be a number or something else) to make addressing envelopes easier. #USPS #Mail #PostOffice #Postal #Invention #Innovation #NewIdeas
Case Study: Strategy / Strategic Plan for Charity / Non-ProfitChief Innovation
This is a Case Study of a Strategic Plan we did for a Charity in the southwest U.S.. Posting this to show people an example of what this looks like, and to demonstrate that they can do it themselves instead of paying for a consultant. For larger charities, professional consultants may make sense, but for the smaller ones, a smart Board Member and some volunteers can probably do this. This is based off our own Strategy Methodology for Small Businesses.
Cybersecurity Risks In the Mobile EnvironmentHamilton Turner
Dr. Hamilton Turner of Silent Circle discusses real-world case studies of mobile security compromises and the current ecosystem of 2/3/4G mobile security with a focus on LTE. Silent Circle is a secure mobility provider of the world-class Silent Phone product. Dr. Turner holds a degree in mobile privacy and security and has 10 years of experience building and securing mobile devices as CTO of multiple companies.
BYOD at bpost -
Tim Groenwals, Technology Innovation Manager at bpost will share his experiences with BYOD. With thousands of potential users, BYOD presents a great challenge for a company like bpost. Tim will explain why the company started with the project, how they approached it and will openly share challenges and successes along the way.
(2012)
Overview of advanced data exfiltration techniques mixing both physical as well as digital domains.
Presented at several BSides events, FIRST conference, and private venues.
Building the Next Big Thing from Barcelona - short presentation for IoT meet ...Claro Partners Inc.
see also video of the presentation: http://youtu.be/3zQ4wKxwMTQ
Curious? Do you want to build the next big thing?
Join us during Mobile World Congress 2014 for:
IoT Startups Panel with relayr, Smart Citizen, theThings.io and Lhings by Claro - Tue 25 Feb, 12:00, Agora.
Keynote: "Emerging business opportunities in the Internet of Things landscape" - Tue 25 Feb, 15:45, Agora
Mini IoT-lab: "Designing experiences through the Internet of Things" - Wed 26 Feb, 09:30, Workshop dome 3
Personal data Workshop: "Designing personalised experiences" – with guest Stephen Deadman, Chief Privacy Officer, Vodafone. Wed 26 Feb, 15:00, Workshop dome 3
All the above will be held at 4 Years from Now, 4yfn.com - the event for entrepreneurship and innovation, at Montjuic (Pl. Espanya)
Etika Profesi Perguruan tinggi, Penjelasan mengenai Etika Profesi tentang kekayaan intelektual dan macam macamnya diantarannya, Copyright, patent dan rahasia dagang
Poised to be the next great technological boom, the Internet of Things has been astronomically hyped. Unfortunately, when it comes to the Smart Home, today we've got more Jucero than Jetsons. To live up to it's name, the Smart Home needs to become invisible.
Here are a few dozen short case studies. This format works well when presenting multiple in general client situations. A number of them were done at past employers.
Federal Minimum Wage: The Case for Geographic IndexingChief Innovation
Back in mid-July, I wrote this out of frustration and then sent it to about a dozen 2016 Presidential candidates. I do not have any concerns or benefits, just wonder why such an obvious solution seems to be absent from both parties. And want to thank Ben Carson for finally saying the 'I' word at the 9/16 debate. My personal goal was to see if I could get ANY candidate of either party to actually mention Indexing. Not sure that he did it because of what I sent him, but really don't care how the conversation gets started. Thanks Dr. Carson.
This is a project management measuring tool that is one of the coolest things I've ever seen for how to look at a big project. They should do these for any government or Big IT project. It seems complicated at first, but I tried to explain exactly how it works in this. I did not create it, first saw it in 1994/1995. I made this file to try to explain it to others (still is confusing), but please comment if you know its origins.
Just a quick deck that was part of a Strategy assignment for a non-profit. Will post the Case Study, hopefully later this week, after I hear back from the client.
Product Development Process Improvement - A Post-MortemChief Innovation
The attached file is a brief summary of an offering we provide related to Product Development. It is very unique, in that it takes a recently completed project, works to map out what happened, reviews areas where errors or delays occured, and then re-maps the project to show the impacts. This is a 7 page file, and we also have a 40 page one showing exactly how it works. Feel free to contact us to discuss, or put comments in here and we will answer them as best we can.
Just something I quickly made for a company here in Dallas. It is generic so I can post it. Recently did 2 Long-Tail projects which I may post if I can time to scrub them.
This is for companies who are trying to decide how to trim their product selections, or get rid of materials or SKUs to reduce complexity.
United States Post Office (USPS) - New Ideas for 21st CenturyChief Innovation
Just had some ideas for the USPS, sending these to Gary Reblin and am going to post in their new ideas website. I really like the idea (doesn't have to be a hashtag, could be a number or something else) to make addressing envelopes easier. #USPS #Mail #PostOffice #Postal #Invention #Innovation #NewIdeas
Case Study: Strategy / Strategic Plan for Charity / Non-ProfitChief Innovation
This is a Case Study of a Strategic Plan we did for a Charity in the southwest U.S.. Posting this to show people an example of what this looks like, and to demonstrate that they can do it themselves instead of paying for a consultant. For larger charities, professional consultants may make sense, but for the smaller ones, a smart Board Member and some volunteers can probably do this. This is based off our own Strategy Methodology for Small Businesses.
Cybersecurity Risks In the Mobile EnvironmentHamilton Turner
Dr. Hamilton Turner of Silent Circle discusses real-world case studies of mobile security compromises and the current ecosystem of 2/3/4G mobile security with a focus on LTE. Silent Circle is a secure mobility provider of the world-class Silent Phone product. Dr. Turner holds a degree in mobile privacy and security and has 10 years of experience building and securing mobile devices as CTO of multiple companies.
The New frontiers in Information SecurityVineet Sood
With New Dimensions getting Introduced @ Work every year this Presentation to Top CIO's in India showcases changing trends in Information Security
Trend 1 – Keeping the Bad Guys Out
Trend 2 – Letting the Good Guys In
Trend 3 – Keeping Good things In
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
Throughout history we've seen opposing forces skillfully pit strengths against weaknesses until, ultimately, one side succumbs. Holding a position takes considerably more effort than does a single, offensive surge, and attackers are counting on it. The very nature of the cybersecurity attacks we face today are in direct response to the shortcomings of the available tools, knowledge and approaches. The only problem is that we must evolve our defenses as fast as (or faster) than their offenses, and the odds are greatly in their favor. Imagine a football game – with no time limits – determined by your opponent’s first undefended scoring play. Game over. Hmmm…I wonder how that one ends?
Facing next-generation challenges requires a next-generation approach – preferably one that requires no change to your current production environment, never tires, continually evolves, doesn't rely on humans and is 99%+ accurate regardless of Internet connectivity. We'll discuss a solution that shifts the balance in your favor by leveraging artificial intelligence to predict and prevent against malware-born threats so you don't have to.
Examination of an attack and how to secure your environment against threats and bad actors. As delivered at Jamaica's 3rd National Cyber Security Conference, Nov 2015
Protecting Automotive Intellectual Property from Insider ThreatsChristina Lekati
In the automotive industry, intellectual property (IP) is the differentiator and asset that is often most critical to business success and continuity. Whether we look at R&D, product development, CAD/CAE designs, software development and more, IP is always the core DNA that represents most of the value. It is also very vulnerable to theft. Most of the times, intellectual property is stolen by insiders, who have authorized access to that information or have contributed to their creation. They typically steal it while at work, during normal business hours and while pretending to be conducting “business as usual”. Because of that, detection becomes challenging. It is very difficult to detect illicit access from legitimate access. In addition, there is generally no indication of suspicious activity until the IP is in the process of being stolen or has already been stolen. This allows only an exceedingly small window of opportunity for detection and response.
Due to current political, technological and other global developments that are causing sales to plummet, while forcing companies in the automotive industry to make tremendous investments into new technologies and products to keep up with the competition, it cannot be overlooked that the ever-present threat of targeting insiders for economic or industrial espionage is higher than ever. Insiders in key positions are either being recruited or targeted for theft during business travel, or other occasions when they are the most vulnerable.
This presentation aims to shed light on the challenging topic of insider theft of intellectual property in the automotive industry. It will discuss the motives that lead employees to theft and/or the facilitation of third-party access to organizational assets intentionally or unintentionally. Despite the challenges, there are measures that businesses in the automotive industry can take to protect their intellectual property. Research has repeatedly found a clear link between insider activity taking place and exploitable weaknesses in security and management processes. Therefore, this talk will go on discussing the organizational factors enabling insider threat operations as well as countermeasures against them, by combining the lessons learned on insider activity prevention from the fields of counterintelligence, psychology, and cyber-security.
When a Data Breach Happens, What's Your Plan?Edge Pereira
Ashley Madison, Sony, Kapersky Labs, LastPass, CentreLink, G20 event in Brisbane…What do they all have in common? They were victims of data breaches. And as you probably know by now, some were handled better than others. In this session we will talk about strategies, from mitigation to handling, used when a data breach happens (not “if”) and what controls do we have if you are using Office 365.
Presentation by Larry Clinton, President of the Internet Security Alliance (ISA) to the 66th Annual Fowler Seminar on Oct 12 2012 titled Evolution of the Cyber Threat - A Unified Systems Approach.
From “Connected” to “Smart” Home: the future is IoT and InsurtechAndrea Silvello
Our lives are starting to be ruled by devices, wearables and other items that are in one way or another connected to the internet and in some cases between each other. We are now at the beginning of a journey which is still to be shaped by technology, practical applications and privacy and security implications of the Internet of Things and interconnectivity. One of the sectors that has started to grow in these last years is connected insurance, in particular motor telematics insurance which uses black boxes in order to gather driving behavior data in order to offer customized insurance policies and better loyalty schemes to clients. This ongoing and successful experience in telematics has served as a benchmark for other areas of connected insurance like home.
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources
APT or not - does it make a difference if you are compromised?Thomas Malmberg
This is my presentation from the Cyber Security Summit held in Prague 2015 at the Boscolo Prague Spa Hotel. For the missing slides and further information, contact me directly.
Cybersecurity Strategies - time for the next generationHinne Hettema
In this talk, presented in June 2016 at KAIST, I argue that it is time for the next generation of cybersecurity strategies. These must have a governance focus, and be based on international laws, declarations and agreements, basic internet rights and public good provisions.
Chp 6 lect 6 - intellectual property rights and computer technology (shared...YUSRA FERNANDO
discusses the foundations of intellectual property rights and how computer technology has influenced and changed the traditional issues of property rights, in particular intellectual property rights.
Similar to Sigilo - Cellular Transmitter For Property Security (20)
Case Study - New Operations Plan & Design (Full version)Chief Innovation
This is the short version of a Case Study showing the creation of a plan for a new operation for an eCommerce fulfillment business in healthcare in Canada. There is a longer version twice its length (the actual plan was more than 100 pages). It primarily shows the overall project, and then this piece's details of what was done, and what some of the output looked like.
This is the short version of a Case Study showing the creation of a plan for a new operation for an eCommerce fulfillment business in healthcare in Canada. There is a longer version twice its length (the actual plan was more than 100 pages). It primarily shows the overall project, and then this piece's details of what was done, and what some of the output looked like.
Job Seeker - How / What to find to research a target companyChief Innovation
This file is a list of things to research and find out about a target employer. Instead of the generic 'look at the internet' and 'read their website', I built a detailed list of things that one could or should know before talking to a potential employer, or a contact at a company. Some may not be needed, while there may be other things worth learning. But this is a great list to start off with, and I intend to ask people to do this BEFORE I introduce them to senior level contacts at companies. Best of luck on your job search.
Case Studies are written descriptions of consulting engagements / projects that explain the issues, assignment, approach, analysis and results. Very useful for selling or training. This guide explains what they are, how to make them and what components make up a good Case Study from a consultant. We use our preference, which is a very detailed one, because from this you are usually able to easily create any other format or version.
Attached is a file where I made a long list of potential data requests when starting a Supply Chain or Operations project at a client. Forgive the list not being comprehensive or clean, just thought people might benefit from not having to start from nothing.
I had made this list as a comprehensive guide for all the things one should do when they leave a consulting assignment (finishing up or not), or also an interim role. Just left mine a few weeks ago, and already had a really good method to document and transfer key files back to the client. I added in all the other areas. Typically badges etc. are already covered in a general exit process, but this was more focused on transitioning the work.
Process Redesign or Improvement Approach OptionsChief Innovation
The attached is a file showing possible approaches to improving or redesigning a process. It is an overview and comparison of 6 different ways one could approach this or engage a consultant to do so.
Project was the due diligence for a private equity firm to evaluate an investment in a food company. The project was focused on the potential to improve the profitability of the company. The project was a quick assessment (3 weeks) and the findings on the EBITDA potential were above the PE firms threshold. We mapped out all the possible areas of improvement, and then consolidated them into 14 areas - primarily related to sourcing and labor.
This file has the Veterans section of the HeirList Knowledgebase that we are distributing to help support those who server and their families. This file is one of more than 60 that comprise the HeirList Knowledgebase that can be used with (or without) our mobile application. It covers 21 of the IDRS (Death.org) items.
This file is the veteran section (IDRS letter BN) from HeirList. IDRS Items 798 to 818. This file and 60 others are in the HeirList Knowledge Base. www.heirlist.com tinyurl.com/yutt4fc7
International Deceased Resolution Standards, list of the first set of 100 Questions related to the 941 Items in the initial release in May 2021. www.deathcenter.com tinyurl.com/yutt4fc7
International Deceased Resolution Standards 2021 initial release. This is the file showing the 941 Items for the IDRS along with the 100 Questions related to them. www.deathcenter.com tinyurl.com/yutt4fc7
This file describes the contents and structure of the files in the HeirList Knowledge Base folder, and how they can be used. www.heirlist.com tinyurl.com/yutt4fc7
This HeirList Report show all of the information related to the Deceased and also the User requesting it, along with additional Users on the Deceased account.
www.heirlist.com
tinyurl.com/yutt4fc7
This HeirList Report shows all of the General, Question and Item Notes submitted for a Deceased account by all Users.
www.heirlist.com
tinyurl.com/yutt4fc7
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. 2Jay Martin October 2001 Dimple Card.ppt
Terrorist attacks have been on everyone’s mind since September, and
concern has changed attitudes and priorities regarding security.
Sigilo Priority Shifts
• High degree of paranoia regarding
personal safety - everyone thinks
they could be a target
• Fear is forcing people to think and
spend more on security
• Security concerns while traveling,
away, in public, at home and in
office are driving many behaviors
• Feelings of helplessness
• Desire to ‘take matters into their
own hands’, cannot necessarily
depend on law enforcement to
prevent attacks
• There are valid concerns, but with
many times the paranoia added
New Realities
WTC
Planes
WTC
Planes
WTC
Planes
Though there are debates on long-term impacts, there have been real,
significant perception, behavioral and consumer expenditure changes.
3. 3Jay Martin October 2001 Dimple Card.ppt
Since September 2001, there has been substantial increase in the
demand for security and safety, for both personal and businesses.
Sigilo Quantitative Impacts
These recent changes all point towards renewed interest in this area,
which will be followed by investment and technological advances.
+50%
6 in 10
48%
5 times
1000%
+2000
$100
• Increase in gun sales in
multiple states
• Americans think they
could be terror victims
• Of Americans are less
inclined to fly
• Increase in resumes
received at the CIA
• Increase in business at a
NYC alarm firm
• New Explosive Detection
Systems for 2002
• Price of $15-30 gas mask
in New York City
36%
5,000
29%
22%
$141.0
9 - 21%
36%
• Have little faith in U.S.
airport security
• Guards Wackenhut
could use immediately
• Companies increased
security budgets
• Average amount of
their budget increases
• Million being allocated
for new Air Marshals
• Increase in FBI gun
background checks
• Will make changes in
their daily lives
Sources: Forrester, Gallup, Internet
4. 4Jay Martin October 2001 Dimple Card.ppt
The opportunities for theft, forced entry, trespass or vandalism at a
residence are numerous even without entry being achieved.
Sigilo Outside the Residence
Street
House
Garage
Pool
Shed
Patio &
Furniture
BBQ
Xmas
Decor
Bike
Car
Roses
Flag
Mail
Access to
2nd Story
Threats - theft, entrance or damage. Two stars indicates potential for forced entry, theft or theft of contents
Util
Pet
Lawn
Decor
5. 5Jay Martin October 2001 Dimple Card.ppt
Inside the home, even at times when you are there, you should have
concerns about theft or entry into rooms/cabinets (parties, guests).
Sigilo Inside the Residence
House
Garage
2nd Story
Access
Entry or Valuables
• Presence outside home entrances
• Opening or attempted entry through
exterior windows or doors
• Entrance or movement in garage
• Access to roof or movement on roof
• Presence inside the home
• Opening interior doors
• Movement within the house
• Opening cabinets or other (guns,
liquor, valuables, money) by kids,
guests, maids, repairmen or intruders
• Movement of furniture
• Theft of major electronics or art
• Unauthorized presence in interior
• Removal or disturbing of contents
• Entry into area, such as home office
Car
Family
Cash
Heirlooms
Guns
Jewelry
Electronics
Art and China
Information/Files
“Target Rich Environment”
Many people wish they could ‘booby-trap’
their entire home to protect their valuables.
6. 6Jay Martin October 2001 Dimple Card.ppt
In addition, the office and locations outside the home provide for
additional risk and little chance to augment existing site protection.
Sigilo Other Locations
Office
Hotel
Room
Safe
Table
Jacket
Files
Office
SuppliesPC Phone
Map
Wallet
Keys
Briefcase
Also, in these instances your car or the rental is under the same, if not
possibly greater threats, than when parked near your home.
Other ‘At Risk’ Locations*
• Boats (docked or in storage)
• Campers & Motor homes
• Restaurants (car & coats/furs)
• Stores (car & packages)
• School lockers (contents)
• Planes
Clothes Shopping
Purchases
Watch
PC
Bed
$
Suitcase
Work
Briefcase
Expensive
Rug
Petty
Cash
Printer
Art
* Our focus is on the contents and intrusion of these, not their theft.
7. 7Jay Martin October 2001 Dimple Card.ppt
To better represent the most prevalent threats, we will segment them
into the four categories shown below.
Sigilo Threat Segmentation
1 Invasion of property
Entering perimeter of home, office, other
site or car (includes trespassing, desire to
review private documents, casing)
2 Damage to property
Vandalism of property, initial facilitation
of a burglary or testing of defenses/
disabling protection (phone/lock/alarm)
3 Theft/Removal of Property
Removal or disturbance of belongings at
home, office, hotel room, in public or car.
4 Threats against individuals
Individual is at risk and is unable to use
normal phone or scream to alert of an
assault, hijacking, robbery, or accident.
Person
Property
4
2,32
11
Property
Person
4
2,3
Interior
Structure Exterior
Trespass
Vandalism
Vandalism
or Theft
Assault
8. 8Jay Martin October 2001 Dimple Card.ppt
Existing security systems leave many areas for improvement in future
developments, which also opens up opportunities for new technology.
Sigilo Weaknesses of Existing Systems
• Expensive to install, maintain and contract a service
• Needs for installation and modification to home
• Usually requires Monthly Fee from a local security company to monitor it
• Centralized control from ‘location’ (pad, center) inside residence
• Dependant on local power or telephone
• Maintenance, need service
• Lack portability, once installed, remain on premise regardless of owner
• Bulkiness
• False alarms - some wake entire neighborhood
• Intrusion perimeter and motion focused
• Permits from local police required in many cities and towns
• Focused on scaring, not identifying threat type and location
• Radio equipment can monitor, sometimes disturb, response and signals
• Most do not have a way to alert you while away from home or not near car
Every year people think of ways to eliminate some of these, and
technology continues to push down the overall costs.
9. 9Jay Martin October 2001 Dimple Card.ppt
In technology, people are normally looking forward, not backwards;
their objectives are making ‘breakthroughs’ and attracting attention.
Sigilo Focus of Technology Efforts
• Applying the new to the old, not solving the problem considering the new
• Specific objectives are usually for better, faster and cheaper, and focus is
on existing products or an obvious/predictable next generation
• Desire to find the ‘new-new thing’, look over the ‘simple & obvious’
• Applying to low-tech has more or less been ignored - it’s boring
• Many recent efforts were ‘what we can do to get into the internet boom.’
• Currently ‘paper electronics’ is being focused on cell phones, PDAs, and
computers - not new devices, just cheaper & smaller versions of the old
A recent development is paper electronics - laying circuits on a mylar-
like material. It is low cost, flexible, easily packaged and disposable.
We have a new idea - not technically exciting, but immense with
respect to its marketability, applications and profit potential.
10. 10Jay Martin October 2001 Dimple Card.ppt
Taking a new ‘disposable’ cellular phone, we first eliminate all user
interfaces - reducing cost, size, shape restrictions, rigidity, & weight.
Sigilo Eliminate Components (all user interfaces and support)
Not Required
User Interfaces
• Speaker
• Speaker port
• Microphone
• Dialing pad
• Other ‘buttons’
Support/Other Components
• Dialing support mechanism
• Voice processing & support
• Other ‘buttons’ support
• Battery to support voice traffic
We are left with a product which can send signals but has no way to
dial/select a number, no message to transmit, no input device, nothing
to display/receive a message and no power source; but…….
Source: Diceland Technology’s website and information on Randice-Lisa Altschul,
Patents 6,144,847, 5,965,848, 5,875,393 and others.
11. 11Jay Martin October 2001 Dimple Card.ppt
….it is very inexpensive, light, flexible and much smaller. Now we add
some components to create what we will call, the ‘Relay Device’.
Sigilo Adding Components
• Smaller & more flexible
• Volume of close to or less
than that of 2 credit cards
• Negligible weight added
• Many shapes permissible
• Input/trigger port for signal
• Preprogrammed number and
message/code are added
• Balanced power-weight-cost
• Cost close to $1 each
To Be Added
• Input port for a connector
• Small memory storage
• Indicator for operational status
• Phone number & code(s) (S/N) need to be
pre-programmed into a small memory
• Power Indicator confirming power available
• Long lasting small disposable battery
Optional features listed below
• Security or lock for activation
• On/Off indicator
• Cleat to wind connectors
• Extendable antenna (wire)
• Attachments to other surfaces
Now we have pre-programmed a number & message, an input port
and the right power source - but still no trigger to make a call!
+
The Results
12. 12Jay Martin October 2001 Dimple Card.ppt
Sensors exist to detect and measure just about every stimulus
imaginable, and their applications extend beyond security/safety.
Sigilo Sensors
They vary in complexity, size, cost and sophistication. Many of them
are based on very simple electro-mechanical devices.
Chemical Presence (Poisons, Explosives)
Electric Power (loss, surge, usage)
Fluid Levels
Flow Levels or Speeds
Fractures & Gap Propagation
Gas Concentrations (C0, C02..)
Intrusion
Light Levels
Metal Presence
Movement & Proximity
Noise Sensor & Acoustics
pH Levels
Pressure (pads, vessels, pipes)
Radiation
Shock (shock waves)
Smoke or Air Purity
Temperature (heat, freeze, changes, readings)
Trip Wires
Vibration
Weather
13. 13Jay Martin October 2001 Dimple Card.ppt
Sensors can be complex, but for many security needs they are simple
devices to permit or impede electric circuits - indicating a stimulus.
Sigilo Simple Sensor Examples & How They Work
Using these types of concepts, we can create a simple input device for
our input port. This provides the trigger to send the outbound call.
Pressure
This type of sensor operates by having a circuit
which is Normally Open with two opposing pads
position to close it. A given ‘pressure’ stimulus
pushes down the ‘ends’ and permits a current,
which can then activate a signal.*
Vibration
A Normally Closed (‘NC’) circuit is created with two
metal planes and a sphere in a ‘V’ shape. If there
is a vibration disturbance, the sphere rises and
breaks contact with either of the two planes and the
circuit is broken, thus detecting the vibration.
Lights Sensors
This type of sensor operate by having a circuit
which is Normally Open. A Light sensitive device
passes a signal if it receives a stimulus of sufficient
magnitude. The signal could permit or impede a
circuit, or convert the light into energy and act as
the signal itself.
Intrusion & Trip Wire
This Normally Open (‘NO’) circuit has a feature
which completes the circuit when an element is
‘pulled’ (could be Normally Closed also). There are
many ways to apply the same basic principal, and
below is an example where the circuit is not
completed until the small part is ‘pulled’ through.
Current
Vibration
* Another option - single wire and a piezoelectric which would send a small charge after pressure was applied.
14. 14Jay Martin October 2001 Dimple Card.ppt
Now we have a trigger, from a Sensor to detect a desired stimulus, and
the outbound call - the last and key component is the Control System
Sigilo Control System - Final Major Component
Relay
Actuation
Device(s)
Output
Contact Mode(s)
Telephone
Email
PDA
Instant messaging
Beeper/Pager
Radio
Other
Recipient(s)
User
Neighbors
Co-workers
Police
Security Company
Fire Department
Other
User action
required
This refers to a host of devices in the field who are either
attached to security enhancements (horns, sirens, lights…)
which can also be commanded to be activated upon the
occurrence of a stimulus or manual request by the User.
Control
System
OutboundCall
Relay
Device(s)
Enter data via
internet/phone
• Who(m)
(Recipient(s))
• Mode (phone
number, email)
• What alert is
(message in text
or voicemail to
be played to
Recipient after
an alert)
Mixing & Multiple Contacts Permitted
* User completes these tasks after purchase and before arming. Example: Enters text messages or records voicemails
and destinations he wants for each one. He can monitor all of his and decide whether he wants to notify Police.
User Input
15. 15Jay Martin October 2001 Dimple Card.ppt
To better clarify our proposal, we will answer some additional issues
that we believe may not have been adequately explained.
Sigilo Additional Information
Question Explanation
What are the sensors and the
connectors going to look like?
Our intent is to have universal standard sensor connections, with small,
inexpensive, consumable sensors whose cost is to be minimal.
How will one arm or disarm these?
There can be a manual switch on the Relay Device, and we also
envision a remote control type device which uses the Control System to
turn them on and off, and which also can be used to group into ‘arrays’.
How will a user input his information
or create an ‘array’ of these devices?
Product to have serial number and activation codes, permit user to call
in response information, enter on internet or mail in. Can create and
manage his arrays and allocate remotes to them as he sees fit.
How can you stop intruders if not
always using a security company?
Expect for home use one of the responses is to call the house phone to
scare intruders, as well as contacting neighbors. Security companies
will be an option, but not the only option (already introduced by others).
How can these devices be used in
unison to best prevent burglaries?
User can create a logic structure that changes his response (example: if
exterior alarm is tripped, then interior, contact security company. If only
exterior is tripped, alert user then wait an hour and watch for others)
Why is lower cost so important - more
expensive usually means superior?
Devices can be deployed, activated, used, deactivated and abandoned
(low cost makes this viable option if chosen). Consumable & portable.
How will they be sold?
We imagine a number of versions, some with pre-paid alerts, others
where you will register to Control System and be charged if used. The
goal is to move away from monthly security service payments - pay/use.
What if I want to call the Police?
Control System serves as a buffer between user and police, patent
covers the ‘direct to police’ alert option, but onus is left on user to decide
to call. You can monitor and call if you like, but not automatic.
How will Sigilo reduce
‘False Alarms’?
You could still request to be contacted or have option to cancel if there
is a False Alarm, and could also have any type of response requested
or have Control System’s managers take appropriate action as needed.
16. 16Jay Martin October 2001 Dimple Card.ppt
This is Sigilo, which over time will get both smaller & less expensive. It
will enable protection of almost anything, anywhere for a few dollars.
Sigilo The Entire System
Relay
Device
Recipient(s)
Stimulus
Sensor
(Wireless)
Communications
Infrastructure
Relay
Actuation
Device
Stimulus occurs
Sensor mechanism closes or opens circuit
Impulse through Connector to Relay Device
Impulse activates Outbound call
Outbound call connects and passes message
Outbound Call matched to user’s request
Outgoing messages sent to Recipients
Relay Actuation Devices in field triggered
1
1
7
2
3
4
5
6
8
Its cost, ease of installation and flexibility will make it a ubiquitous
option for use by the general public, business and the government.
2 3 4
5
Control
System
6
8
7
Remote Control for
individual or an array of
Relay Devices can be used
to control all of the units
deployed at a single site and
that can be activated or
deactivated with a single
touch of a button.
* Note: Estimate of $1 cost was extrapolated from public statements and material costs given expected production quantities.
17. 17Jay Martin October 2001 Dimple Card.ppt
The Relay Devices will be made into different shapes depending on the
application and needs for concealment by the users. Some examples:
Sigilo Device Shape - Multiple Options for Multiple Applications
Very flat will permit them to be hidden underneath rugs, mats,
beneath TVs/VCRs (or other electronics or valuables), hide along
sides of furniture so as to reduce the chance that it will be identified
by an intruder. This configuration is expected to be very popular.
These could be made to appear like small disks (ant traps, …) or
other objects, but also would reduce the total surface size as
compared to flat so as to be hidden in small spaces. Features such
as sticky backs, Velcro and nail slots could be added to facilitate
securing on sides/backs of furniture or other objects nearby.
Small small cubes (theoretically this would be the shape that if the
goal was to limit every dimension to its minimum within a permitted
volume), would have the highest yield, but both manufacturing issues
and questions of its utility for this application bring it into doubt.
Some application may find this configuration most beneficial.
The objective here would be to have it appear like a pencil or pen, or
like a common wire. The picture depicts what is thought to be a
‘mine’ type pressure device for deployment on/in the ground for
intrusion detection. New manufacturing techniques regarding
lithography on mylar for electrical components make this a possibility.
To better support the ‘hidden’ feature of this component, it is possible
that we may find different common objects to locate it inside of.
Some examples of this are rocks or garden objects, jewelry, pencils &
notepads, plugs, Mezuzahs and money (rolls or stacks of bills).
Sensor
Relay Device
Flat & as
thin as
possible
Small
cylinders
or disks
Small
cube or
polygon
Thin
cylinder or
wire/tube
Disguised
as small
objects
18. 18Jay Martin October 2001 Dimple Card.ppt
The benefits for the user will make this the dominant choice in security,
and will also have additional benefits for other groups and society.
Sigilo Benefits and Beneficiaries
Reduced cost to purchase, install, and maintain
Unchallenged versatility in:
Deployment and applications/uses
Sensing (for safety & research)
Alerting (parties & methods)
Increase scope, can protect individual objects
Elimination of central arming station & pad
Low maintenance
Permits affordable security in remote locations
Will support almost any type of sensor
Portable, can be moved or reused
Not dependent on local power or phone lines
Harder to disrupt or render ‘disarmed’
Flexible in response – calling ‘police/security’ not
only option, will reduce costs
More easily hidden/concealed, not bulky
Easier to set-up, can be done by user
Monitoring company payment not required
Physical modifications to home/site not required
Decentralized detection
Object protection for non-intruders (maids, kids)
Disposable or can be deployed and forgotten
Increased need for services
Reduced barriers for purchasing alarm systems
Less maintenance
More accurate information from alarms
User responsible for more, less confusion
Higher utilization of patrols and security officers
Provides income to police and law enforcement if
they choose to ‘require’ registration
Reduced alarms calling Police
Better information from alarms and 911 callers
Ability to ‘patrol’ remote and rural sites
Ability to eliminate/reduce patrol routines
Reduction in crime
Absorbs excess cellular capacity
Reduction in insurance losses/premiums
Reduced research and monitoring expenses
Reduced false alarms & their impacts
Users Security Industry
Law Enforcement
Society
19. 19Jay Martin October 2001 Dimple Card.ppt
We intend to produce, distribute for sale and support these devices in
the field (via the Control System). Multiple revenue opportunities exist.
Sigilo Our Business
Submit newer versions of
Patent to include more details
Seal up Intellectual Property
Rights for our Patents
Identify and resolve all potential
infringement issues on other
Patents or Licenses required
License or Partner with those of
significant contribution to Sigilo
Confirm through Due Diligence
viability of Sigilo and market
Develop the Control System
Build or Contract Manufacturing
Coordinate Alarm Companies,
Cellular Phone Providers and
Law Enforcement
Activities Required
Make and sell field components
Charge ‘by use’ for alerts and
communications
Could charge to ‘register’ or
‘activate’ a device
License ‘response’ charges to
Security Companies and Law
Enforcement, obtain a
percentage for administrative
Contract manufacture devices
for large purchasers, such as
Government Agencies and
Security Companies wanting to
set-up proprietary Control
Systems
Sell ‘Trademark’ signs for display
with devices to ward off intruders
License or partner overseas
Sources of Revenue
20. 20Jay Martin October 2001 Dimple Card.ppt
Below are four examples showing its versatility, reach and power.
Sigilo Market Analysis and Revenue Potential
Home valuables
(intruder, guests,
children or maids)
Application Response requestedSensor type
Trip wire or
pressure
beneath the
object or
attached
For this application, you can have
yourself be the recipient via cell phone
or pager, and regardless of whether
you are home or not, any disturbance
of this by anyone will be identified.
Park or
Monument
(intrusion or
vandalism)
‘Mine’ pressure
sensors,
vibration or trip
wires near
gates or doors.
For parks, they could be deployed in
areas known for intruders or where
concerns of vandalism or theft are
prevalent. Pager messages to police
regarding alert and site could be input.
Office valuables
(wallet, keys,
lap-tops, petty
cash or other)
Trip wire or
pressure pad
beneath or
attached to
object
The object could be set on sensor
which would trigger if it was lifted up or
have a trip wire if pulled away. The
response could be an instant message
to rest of the office to go to your desk.
Cabin*
(intrusion, forced
entry or
vandalism)
Vibration or trip
wire on door,
pressure pads
on mats outside
and inside
With this set-up, you would know when
someone was at the door, trying to
open it (shaking knob) and then if they
gained entry. You, neighbors (of cabin)
& local police could be contacts.
* Outside normal cellular area, if application justified increased cost, satellite networks can be used.
21. 21Jay Martin October 2001 Dimple Card.ppt
The applications are almost limitless. It will both replace expensive
competition and provide security where high costs had prevented it.
Sigilo Market Analysis and Revenue Potential
There are places this is not effective - underground & submarines. Even at sites
which have sophisticated security, Sigilo can serve as an inexpensive back-up.
Hotel Rooms
Portable
belongings
Remote
structures
Apartments
Cars
Planes
Boats
Parks and
monuments
Houses
Animal Traps
Cemeteries
Golf Courses
Construction
Sites
Schools
Enclosed
Property
Lockers/
Storage
Office
Buildings
Pools & other
Recreation Centers
22. 22Jay Martin October 2001 Dimple Card.ppt
The market and needs are best shown by the relevant statistics.
Sigilo Market Analysis and Revenue Potential
• 2.43 Million burglaries in 1997 in United States
• 13.4% of burglary cases solved nationwide
• Homes without alarms 2.2 times more likely to be broken into
• $11.5 Billion in property was burglarized in 1997
• Average loss nationwide is $1381
• $100 Billion yearly spent on security, 30 for IT
• $19 Billion spent last year on residential and commercial alarm systems
• 3 Million new systems installed, bring U.S. total to around $30.1 Million
• $1200 spent on average installation, $27 monthly fee average
• 20% of homes are estimated to have systems - 80% do not
• Approximately 12-16,000 companies involved in the alarm business
• Products are very price sensitive, most people would like them regardless
of real need just for the peace of mind and security.
Using simple estimates, multiply expected United States market by
2 or 3 to arrive at the total potential for Sigilo throughout the world.
Sources: Security Sales Magazine Factbook, NBFAA, Internet
23. 23Jay Martin October 2001 Dimple Card.ppt
Our proposal has both Strengths and Weaknesses, but we feel that the
choice becomes obvious when their impacts/potential are compared.
Sigilo Strengths and Weaknesses
Costs of everything, from equipment, to
installation to maintenance
User control
Increased applications
Harder to identify and defeat
Power of responses
Different modes and people
Multiple responses
Better information
Security without a service to wake
entire neighborhood
Simplicity of sensors
Non-security applications
Strengths
If Relay Device is found before sensor,
signal could be blocked
Users have to set it up, more likely to make
mistakes and need support
Cellular infrastructure is required, if not,
need to go to satellites
Delay in picking up line of a second or two
Simplicity of sensors
Weaknesses
24. 24Jay Martin October 2001 Dimple Card.ppt
Competitive Products and Service are very high cost to obtain, install
and have monitored. Less expensive items are sensor-based sirens.
Sigilo Competitive Options
Alarm
Systems
Requiring
Installation
Services
Available or
Required
‘Do It Yourself’
Retailed Sold
Security
Options
•Average installation in United States costs $1200
•Low price ones ($100-300) required 3 year service
•Primarily perimeter and motion detector focused
•Door/window contacts cost $75-125 each
•Monthly monitoring fees, average is $27
•Some charges for Monitoring, Alarms & Re-setting
•Installation of back-ups can run $100-1000
•Many companies require multi-year contracts
•Sold by very few retailers (Lowe’s, Radio Shack)
•Comprehensive systems are $200-400 range
•Inexpensive ‘stand-alone’s (siren based) are $8-40
and utilize circuit breaks or motion sensors
•Most systems are easy to defeat or disable
Sources: APB News, Sigilo Research
25. 25Jay Martin October 2001 Dimple Card.ppt
When comparing Sigilo to exiting options, we see begin to understand
it could open the ‘flood gates’ of inexpensive security expenditures.
Sigilo Competitive Assessment
Attribute SigiloExisting
Cost(s) Lower in all aspects
More expensive equipment,
install and monitoring fee
Ease of install
Far simpler, but
user’s responsibility
Complicated/costly
Detection abilities
(function of sensors)
Basic, but more accurate
than motion-based systems
More cost buys better
detection
Ease of use (arm/disarming)
One button or call,
computerized coding
Code entering requiring user
to remember, could forget
Difficulty of defeat
Usually too late,
independent devices
Intruder is looking for it,
known centralized systems
Breadth of responses Can be sameCan be same
Risk of false alarms
Same, but
mitigated
Same
Applications
Versatile, can use
where never before
Installed to fixed points,
most systems focused
We believe our option is better and less expensive, though large
monthly fees paid to security companies provide some value.
Tie
Tie
Tie
Tie
26. 26Jay Martin October 2001 Dimple Card.ppt
Consumer
Acceptance
Our proposal has a variety of risks, and to better communicate them,
we will present them in terms of the five categories below.
Sigilo Major Risk Areas
OperationsPriceFabrication
Intellectual
Property
Issues
A1) Do not get a any
patent at all
A2) IP is not strong
enough for
protection
A3) Licensing other
Patents becomes
too expensive to
continue or
impossible task of
getting all to agree
A4) Someone patents
around it
A5) Refusal of
licensing
A6) Someone already
has filed for same
idea
B1) Cannot
produce them
B2) Too costly to
produce
B3) Cannot get
them to work
B4) Quality issues
C1) Less expensive
alternative is
found
C2) Costs are much
higher than
anticipated
(related to B2)
D1) Do not
function
adequately in
field
D2) Cause too
many
problems, like
false alarms
D3) Can be
disabled or
interfered with
too easily
D4) Police, FCC
or Cell Phone
Companies
stop proposal
E1) Customers
are not
interested in
them
E2) Market is too
small to justify
investment
E3) Consumers
do not like the
‘do-it-yourself’
work involved
E4) Better options
introduced
A B C D E
27. 27Jay Martin October 2001 Dimple Card.ppt
There are seven risks that concern us most, and they will be better
understood or resolved during the early stages of this project.
Sigilo Detailed Risk Assessment
AnalysisNumber ProbabilityRisk
Using the ‘new, useful and not obvious’ rule, we expect
to get a patent on at least a part. We do not
underestimate the IP coordination challenges of this.
A1 Low/Medium
Do not get any
patent at all
To execute this, one needs to be able to license or
partner with Prior Art holders in Manufacturing, the
Physical Devices and Operations - a lot of work ahead.
A3 Medium/High
Licensing too
expensive or lack of
agreements
It is possible that a key patent or technology holder
could ‘block’ this proposal, just to prevent it or do it
themselves. They would have to settle/fight us also.
A5 MediumRefusal of licensing
We will find this out the hard way, but Diceland
Technologies will be the enabler. They are the key to
this venture, and will be able to ‘refuse’ any partner.
A6 Medium
Someone already has
filed for same idea
With the advent of new technology, areas such as
MEMs and Nanotechnology will open up many new
options. Patent covers these, but remains worrisome.
C1 High
Less expensive
alternative is found
User errors in both setting up and in operation is
expected to cause difficulties, but the move to
‘physical’, and not motion sensors should mitigate this.
D2 Low/Medium
Cause too many
problems, like false
alarms
We expect this will be a market issue. Many people
will prefer the control and ability to take actions
themselves a lower cost. Worst case, smaller market.
E3 Low
Consumers do not like
the ‘do-it-yourself’
work involved
28. 28Jay Martin October 2001 Dimple Card.ppt
One can use the chart below to calculate expected yearly revenue and
profits just from unit sales. This excludes ‘alerts’ & licensing revenue.
Sigilo Revenue and Profit
25
Though we are not at the stage to present realistic expectations, we
believe that we can exceed $3 Billion in revenue within a 5 year period.
75 100 150 200 300 400 500 750 1,000 1,500 2,000$
100 300 400 600 800 1,200 1,600 2,000 3,000 4,000 6,000 8,000
943.75 281 375 563 750 1,125 1,500 1,875 2,813 3,750 5,625 7,500
883.50 263 350 525 700 1,050 1,400 1,750 2,625 3,500 5,250 7,000
813.25 244 325 488 650 975 1,300 1,625 2,438 3,250 4,875 6,500
4.00
Units (Millions)
753.00 225 300 450 600 900 1,200 1,500 2,250 3,000 4,500 6,000
692.75 206 275 413 550 825 1,100 1,375 2,063 2,750 4,125 5,500
632.50 188 250 375 500 750 1,000 1,250 1,875 2,500 3,750 5,000
562.25 169 225 338 450 675 900 1,125 1,688 2,250 3,375 4,500
50 150 200 300 400 600 800 1,000 1,500 2,000 3,000 4,000
441.75 131 175 263 350 525 700 875 1,313 1,750 2,625 3,500
381.50 113 150 225 300 450 600 750 1,125 1,500 2,250 3,000
311.25 94 125 188 250 375 500 625 938 1,250 1,875 2,500
2.00
251.00 75 100 150 200 300 400 500 750 1,000 1,500 2,000
20.80 60 80 120 160 240 320 400 600 800 1,200 1,600
15.60 45 60 90 120 180 240 300 450 600 900 1,200
10.40 30 40 60 80 120 160 200 300 400 600 800
29. 29Jay Martin October 2001 Dimple Card.ppt
Currently we are pursuing this as a Due Diligence to best determine
viability. Its complexity and immense potential warrant resources.
Sigilo Closing
• The Patent author Jay Martin (Edward J. Martin, Jr.) is the only person
working on this full-time.
• Schief & Stone will most likely lead Patent and Licensing efforts. Much
additional legal work will be required, particularly at the front-end.
• In addition to understanding other patents, we also require assistance in
improving the patent which has already been filed.
• Sigilo is a placeholder name, and we are pursuing more attractive ones
which have been Trademarked. Can easily create a new name also.
• Our interim objective is to speak to Diceland or its patent holders
regarding our options. Their technology will be of great help.
We are searching for resource partners, and prefer to find ones who
could, if this warrants, provide multiple rounds of funding.