Industries 1.0, 2.0 (and most of) 3.0, saw manufacturing and construction using natural materials readily extracted, refined, amalgamated, machined, and molded. In general, these exhibited fixed mechanical, electrical, and chemical properties. However, the latter stages of Industry 3.0 embraced synthetics exhibiting superior properties to afford new degrees of freedom in the design of structures and products.
Today Industry 4.0 sees further advances with metamaterials, dynamic coatings, controllable properties, and additive manufacturing. Embedded smarts have also made communication between components, products and structures possible under the guise of the IoT. Adaptable materials with a degree of self-repair are also opening the door to further freedoms and less material use. In combination, these represent a big step toward sustainable societies with highly efficient ReUse, RePurposing, and Recycling (3R).
At the leading edge, we are now realising active surfaces that can reflect, absorb, or amplify wireless signals, offer programmable colour, and integral energy storage. But amongst a growing list of possibilities, it is integral sensing & communication that may define this new era. In this presentation, we look at these advances in the context of smart design, cities & societies.
In this lecture is the final session of an extensive wireless course delivered over several weeks at the University of Suffolk. So, by way of ‘rounding-off’ the series, we chart the progression of wireless/radio communication from the first spark transmitters through Carrier -Wave Morse, AM, FM, DSSC, SSB to digital systems along with the use of LW, MW, SW, VHF, UHF and Microwaves. Whilst we focus on Electro-Magnetic-Waves from 30kHz through 300GHz, we also mention optical, ultrasonic, and chemical communication as additional modes.
Our examinations detail the distinct genetic trails of 1, 2, 3G, and 4, 5G, the approximate development cycles/timeline along with distinctive changes in design thinking. We then postulate that 6 and 7G are likely to form a new line of development with 6G probably realised without any towers or any conventional cellular structure. In this context we also point out that there are no digital radios today, only traditional analogue designs with ‘strap-on-modems’ at the transmitter and receiver. Perhaps more radically, we suggest that it is time to adapt fully digital designs that allow for the eradication of the established bands and channels mode of operation.
We also chart the energy hungry progression of systems from 1 through 5G where tower installations are now consuming in excess of 10kW due to the extensive signal processing employed. This immediately debunks any notion of another step in the direction of more bandwidth, lower latency, greater coverage with >20x more towers (than 4G) and >250Bn power hungry smart devices. In short: we propose that 5G is the last of the line and the realisation of 6G demands new thinking and new modes that lead us away from W and mW to µW and nW wireless designs.
Whilst most of the technology required for 6G is available up to 300GHz, there remains one big channel in respect of the growing number of antennas per device and platform. Even for 3 - 5G + WiFi + BlueTooth space is at a premium in mobile devices and fractal antennas have not lived up to their promise too integrate all of these into one wideband structure. However, at 100GHz and above, antennas/dipoles become less than chip size and can see 10s included as phased arrays. But this all needs further work!
Throughout this lecture, we provide examples, demonstrations, and mind-experiments to support our assertions.
We are living through an extraordinary pandemic (CV-19) that has changed all the network norms including the way we work and communicate. An invisible consequence has been the transformation of internet and telecoms traffic promoted by people working from home, restrictions on all travel and a paralysis of almost all social norms. Living and working in isolation for 3 - 5 months has become the new mode for many, and even the most technophobic have had to turned to video conferencing and on-line purchases to ‘survive’
From a network point of view the transition has seen the concentrations of traffic in major cities and towns mutate to the dispersed and disparate working, social and entertainment activities that have found the last mile wanting. Insufficient bandwidth connectivity and resilience have quickly become a prime concern with the overloading of core networks a lesser concern.
Installing new optical links and making the core (undersea and overland long-lines) networks more robust is relatively easy as they are by far the most resilient and secure of our infrastructures. It is the local loop, our last mile, that poses the hard to fix problem. In this session we present tested model solutions based on direct ‘dark-fibre’ to home and office with no electronics, splitters or access points in the field. This is augmented by Mesh-Nets and 4/5G providing temporary bridges for random fibre breaks and cable damage.
Throughout our education and life we are mostly given a ‘soda-straw’ view of Maths, Physics, Chemistry, Biology, HealthCare, Business and Commerce that conditions us to ‘one concept at a time’ thinking. This is rife in Government and Politics, Industry and Health, and it has been extremely powerful in a now past slow paced and disconnected world. In fact, the speciation of disciplines, topics and problems has largely been responsible for the acceleration and prominence of human progress.
However; in a connected/networked, highly mobile, and tech driven world this simple and narrow minded view is insufficient and dangerous. In common parlance we refer to ‘unintended consequences’ whilst in complex system theory would use the term ‘emergent behaviours’. In brief; education, health, crime, productivity, GDP creation, social cohesion and stability cannot be considered independent variables/properties. They are all related and interdependent. For example; when politicians decide to starve the education system of funds for very young children the impact shows up in health, crime and the economy some 10 - 30 years later!
By analogy; all of this is true of our technologies, industries, lives, and the prospect of sustainable societies. Robots, AI, AL, and Quantum Computing do not stand alone in isolation, they have complementary roles. In this Public Lecture we devote an hour to thinking more holistically what these technologies bring to the party in the context of industry, health, society, sustainable societies and global warming. We then devote a further hour to discussion and debate.
In the context of Global Warming we make the following overriding observations:
“Panic is a poor substitute for thinking”
“Tech is the only exponential capability we enjoy”
“Technology is never a threat, but humans always are”
“Uncertainty always prescribes the precautionary principle”
It has been estimated that the global earnings of Cyber Criminals will equal or exceed the GDP of the UK sometime in the 2022/23 window. If this was the capability of a country they would be joining the G8! Clearly, we are losing the Cyber War hands down, and the time has long passed when we might ignore the threat scenarios surrounding us.
In this lecture we examine global networks from home and office through the ‘last mile,’ and on to national and international networks to identify the key vulnerabilities and points of potential ingress. We identify the cyber risks as escalating as we approach the periphery of all forms of network. For the most part, the core/carrier networks are virtually unassailable physically as they are dominated by terrestrial and undersea optical fibre cables.
Throughout the ‘carrier’ network levels the difficulty of physical interception, encryption, routing, and path diversity employed renders them secure in the extreme. Attackers, therefore, tend to focus on the exploitation of people, devices, services, home, and office appliances, and latterly, a poorly engineered IoT.
In reality, we are expanding the attack surface of the planet exponentially without due caution or care in the most exposed sectors and locations. And so, we explore potential tech and operational solutions for the future.
NOTE: This lecture is one of a series that has examined technology design and deployment, devices and the IoT, people fallibility, deviousness, internal and external threats.
In class; RED and BLUE Team Exercises have also been conducted in support of the complete Cyber Security Package to date.
The migration of the fundamentally analogue telephone from a circuit switched network to one essential designed for machine communications based on packet switching has not been entirely comfortable. It was not at all obvious that it might work, or indeed, that it might even be possible given the sensitivity of the human ear and mind to artificiality, noise and latency.
After serving humanity for well over 100 years the analogue telephone network and devices have been overtaken by mobile computing devices offering far more facilities and power. So, despite the detailed testing, and charactering of human speech, the design and modelling of device and network abilities, we are saying goodbye to this past.
During to past 40 years a new world has emerge with intelligence and computing power at the edge of networks and not at the core. Layering speech and video on this new ‘internet’ has been a challenge, but now the performance and economics are more than viable. So, in this lecture we trace this history of development and illustrate the tech challenges with a series of audio demonstrations.
In short, we highlight the nature and impact of bandwidth, signal-to-noise ratio, latency, and packet loss through the old analogue to the new digital eras. We also present some ‘off piste’ examples of military and aircraft communications. Throughout we also highlight the key design directions designs, failures and flaws.
From the begging of the industrial revolution, we have built systems and machines on the basis that people will just have to learn about the interface and adjust accordingly. And so the skill of the individual craftsman was overtaken and subverted by the expertise of the ‘operator,’ production line, and mass production enabling us all to do more-and-more with less-and-less, to raise living standards, the health and wealth of individuals and nations.
In effect, we bent humanity into technology to meet the specific needs (and will) of the machines, but to the greater benefit of humanity! But now we stand at the cusp of a new era with AI and Robotics are able to adapt to our individual and most specific needs. That is: machines bend to meet our needs; to empower us as individuals and organisations to do and achieve ever more.
But their remains one last bastion of inconvenience centered on ID and security - often referred to as ‘Password Hell’. We are all awash with multiple Cards, Licences, Visas, Passports, Badges, Codes, PINs, Passwords, User Names, IDs, Log-On, Log-In, Entry, and Exit Protocols! And so it is time to get all of this out of the domain of the human and into the realm of our machines! Today we are in the process of migrating from a nightmare past of our own design, into a biometric world where machines will recognise us and grant us access automatically. And at the fringe some young populations are already being chipped exactly in the same way our pets have been chipped for the past decades.
Apart from the obvious advantage of not having to carry any money or ID of any kind, there is the assurance of extra safety, security and health support wherever we happen to be. It is not available right now, but beyond an ID Chip, we can easily embed, or provide links to, our medical record into the same technology. We, and not just our devices and possessions, also become a part of the IoT!
Of course, for many, they see the threat of a looming dystopian future aka Hollywood! But this will be a choice between convenience and greater security versus what we have today - but that choice has to remain ours! In this presentation we look at the widening spectrum of technologies available and the need to concatenate widely different techniques to exceed the accuracy of DNA and other human/biological parameters
For millennia we have crafted artifacts from bulk materials that we have progressively refined to produce ever more precision tools and products. Latterly, we have crossed a critical threshold where our abilities now eclipse Mother Nature. For example; the smallest transistors in production today have feature sizes down to 2nm which is smaller than a biological virus ~20 - 200nm. The implications for ITC, AI, Robotics, and Production are ever more profound as we approach, and most likely undercut, the scale of the atom ~ 0.1-0.4nm. Not only does this open the door to new technologies, it sees new and remarkable capabilities. So, in this presentation we look at this new Tech Horizon spanning robotics to quantum computing and sensory technologies, and how they will help us realise sustainable futures germane to Industry 4.0, 5.0, and beyond.
The past 25 years have seen a move toward the convergence of telephone and computer onto a single network. Whilst the telephone network enjoyed a unique and isolated development (and growth) of dedicated circuit switching for near 200 years, computing more naturally ventured into ethernet (packet switching) and on to the internet in just 55years.
So different are these networking concepts that it was originally thought they could never converge. But as the internet grew to outgun the old fixed telephone network and new mobile working, it became economically and technologically clear that convergence (VOIP) was possible and most likely would be transformational.
Having ‘fixed’ the conundrum of real-time communication using uncontrolled packets that introduce variable latency, a new ‘monster’ reared - cybersecurity! Telephone and mobile nets never suffered ‘hacker attacks’ to the same degree as the PC dominated world and so new provisions had to be made. These came in the form of end-to-end packet encryption and layered link encryption with constraints on the number of end-to-end and node-to-node hops.
Today, telephone calls mostly pass through a portion of the internet, PN, PVN, with a shrinking number still originating and terminating at old analog and digital local loops with circuit switches. By and large, the core network is ‘super secure’ and it is in the new digital and old analogue periphery where the major risks reside. Within the next decade the full transformation to all-digital, packet switching, should be complete.
As per the internet; people, insider, malware, Denial of Service (DoS and DDoS) and other forms of attack persist, but the defences developed to combat these are formidable. In this lecture we address the attack scenarios and the defences to date and highlight some of the lesser-known/advertised approaches of both the defenders and the attackers.
In this lecture is the final session of an extensive wireless course delivered over several weeks at the University of Suffolk. So, by way of ‘rounding-off’ the series, we chart the progression of wireless/radio communication from the first spark transmitters through Carrier -Wave Morse, AM, FM, DSSC, SSB to digital systems along with the use of LW, MW, SW, VHF, UHF and Microwaves. Whilst we focus on Electro-Magnetic-Waves from 30kHz through 300GHz, we also mention optical, ultrasonic, and chemical communication as additional modes.
Our examinations detail the distinct genetic trails of 1, 2, 3G, and 4, 5G, the approximate development cycles/timeline along with distinctive changes in design thinking. We then postulate that 6 and 7G are likely to form a new line of development with 6G probably realised without any towers or any conventional cellular structure. In this context we also point out that there are no digital radios today, only traditional analogue designs with ‘strap-on-modems’ at the transmitter and receiver. Perhaps more radically, we suggest that it is time to adapt fully digital designs that allow for the eradication of the established bands and channels mode of operation.
We also chart the energy hungry progression of systems from 1 through 5G where tower installations are now consuming in excess of 10kW due to the extensive signal processing employed. This immediately debunks any notion of another step in the direction of more bandwidth, lower latency, greater coverage with >20x more towers (than 4G) and >250Bn power hungry smart devices. In short: we propose that 5G is the last of the line and the realisation of 6G demands new thinking and new modes that lead us away from W and mW to µW and nW wireless designs.
Whilst most of the technology required for 6G is available up to 300GHz, there remains one big channel in respect of the growing number of antennas per device and platform. Even for 3 - 5G + WiFi + BlueTooth space is at a premium in mobile devices and fractal antennas have not lived up to their promise too integrate all of these into one wideband structure. However, at 100GHz and above, antennas/dipoles become less than chip size and can see 10s included as phased arrays. But this all needs further work!
Throughout this lecture, we provide examples, demonstrations, and mind-experiments to support our assertions.
We are living through an extraordinary pandemic (CV-19) that has changed all the network norms including the way we work and communicate. An invisible consequence has been the transformation of internet and telecoms traffic promoted by people working from home, restrictions on all travel and a paralysis of almost all social norms. Living and working in isolation for 3 - 5 months has become the new mode for many, and even the most technophobic have had to turned to video conferencing and on-line purchases to ‘survive’
From a network point of view the transition has seen the concentrations of traffic in major cities and towns mutate to the dispersed and disparate working, social and entertainment activities that have found the last mile wanting. Insufficient bandwidth connectivity and resilience have quickly become a prime concern with the overloading of core networks a lesser concern.
Installing new optical links and making the core (undersea and overland long-lines) networks more robust is relatively easy as they are by far the most resilient and secure of our infrastructures. It is the local loop, our last mile, that poses the hard to fix problem. In this session we present tested model solutions based on direct ‘dark-fibre’ to home and office with no electronics, splitters or access points in the field. This is augmented by Mesh-Nets and 4/5G providing temporary bridges for random fibre breaks and cable damage.
Throughout our education and life we are mostly given a ‘soda-straw’ view of Maths, Physics, Chemistry, Biology, HealthCare, Business and Commerce that conditions us to ‘one concept at a time’ thinking. This is rife in Government and Politics, Industry and Health, and it has been extremely powerful in a now past slow paced and disconnected world. In fact, the speciation of disciplines, topics and problems has largely been responsible for the acceleration and prominence of human progress.
However; in a connected/networked, highly mobile, and tech driven world this simple and narrow minded view is insufficient and dangerous. In common parlance we refer to ‘unintended consequences’ whilst in complex system theory would use the term ‘emergent behaviours’. In brief; education, health, crime, productivity, GDP creation, social cohesion and stability cannot be considered independent variables/properties. They are all related and interdependent. For example; when politicians decide to starve the education system of funds for very young children the impact shows up in health, crime and the economy some 10 - 30 years later!
By analogy; all of this is true of our technologies, industries, lives, and the prospect of sustainable societies. Robots, AI, AL, and Quantum Computing do not stand alone in isolation, they have complementary roles. In this Public Lecture we devote an hour to thinking more holistically what these technologies bring to the party in the context of industry, health, society, sustainable societies and global warming. We then devote a further hour to discussion and debate.
In the context of Global Warming we make the following overriding observations:
“Panic is a poor substitute for thinking”
“Tech is the only exponential capability we enjoy”
“Technology is never a threat, but humans always are”
“Uncertainty always prescribes the precautionary principle”
It has been estimated that the global earnings of Cyber Criminals will equal or exceed the GDP of the UK sometime in the 2022/23 window. If this was the capability of a country they would be joining the G8! Clearly, we are losing the Cyber War hands down, and the time has long passed when we might ignore the threat scenarios surrounding us.
In this lecture we examine global networks from home and office through the ‘last mile,’ and on to national and international networks to identify the key vulnerabilities and points of potential ingress. We identify the cyber risks as escalating as we approach the periphery of all forms of network. For the most part, the core/carrier networks are virtually unassailable physically as they are dominated by terrestrial and undersea optical fibre cables.
Throughout the ‘carrier’ network levels the difficulty of physical interception, encryption, routing, and path diversity employed renders them secure in the extreme. Attackers, therefore, tend to focus on the exploitation of people, devices, services, home, and office appliances, and latterly, a poorly engineered IoT.
In reality, we are expanding the attack surface of the planet exponentially without due caution or care in the most exposed sectors and locations. And so, we explore potential tech and operational solutions for the future.
NOTE: This lecture is one of a series that has examined technology design and deployment, devices and the IoT, people fallibility, deviousness, internal and external threats.
In class; RED and BLUE Team Exercises have also been conducted in support of the complete Cyber Security Package to date.
The migration of the fundamentally analogue telephone from a circuit switched network to one essential designed for machine communications based on packet switching has not been entirely comfortable. It was not at all obvious that it might work, or indeed, that it might even be possible given the sensitivity of the human ear and mind to artificiality, noise and latency.
After serving humanity for well over 100 years the analogue telephone network and devices have been overtaken by mobile computing devices offering far more facilities and power. So, despite the detailed testing, and charactering of human speech, the design and modelling of device and network abilities, we are saying goodbye to this past.
During to past 40 years a new world has emerge with intelligence and computing power at the edge of networks and not at the core. Layering speech and video on this new ‘internet’ has been a challenge, but now the performance and economics are more than viable. So, in this lecture we trace this history of development and illustrate the tech challenges with a series of audio demonstrations.
In short, we highlight the nature and impact of bandwidth, signal-to-noise ratio, latency, and packet loss through the old analogue to the new digital eras. We also present some ‘off piste’ examples of military and aircraft communications. Throughout we also highlight the key design directions designs, failures and flaws.
From the begging of the industrial revolution, we have built systems and machines on the basis that people will just have to learn about the interface and adjust accordingly. And so the skill of the individual craftsman was overtaken and subverted by the expertise of the ‘operator,’ production line, and mass production enabling us all to do more-and-more with less-and-less, to raise living standards, the health and wealth of individuals and nations.
In effect, we bent humanity into technology to meet the specific needs (and will) of the machines, but to the greater benefit of humanity! But now we stand at the cusp of a new era with AI and Robotics are able to adapt to our individual and most specific needs. That is: machines bend to meet our needs; to empower us as individuals and organisations to do and achieve ever more.
But their remains one last bastion of inconvenience centered on ID and security - often referred to as ‘Password Hell’. We are all awash with multiple Cards, Licences, Visas, Passports, Badges, Codes, PINs, Passwords, User Names, IDs, Log-On, Log-In, Entry, and Exit Protocols! And so it is time to get all of this out of the domain of the human and into the realm of our machines! Today we are in the process of migrating from a nightmare past of our own design, into a biometric world where machines will recognise us and grant us access automatically. And at the fringe some young populations are already being chipped exactly in the same way our pets have been chipped for the past decades.
Apart from the obvious advantage of not having to carry any money or ID of any kind, there is the assurance of extra safety, security and health support wherever we happen to be. It is not available right now, but beyond an ID Chip, we can easily embed, or provide links to, our medical record into the same technology. We, and not just our devices and possessions, also become a part of the IoT!
Of course, for many, they see the threat of a looming dystopian future aka Hollywood! But this will be a choice between convenience and greater security versus what we have today - but that choice has to remain ours! In this presentation we look at the widening spectrum of technologies available and the need to concatenate widely different techniques to exceed the accuracy of DNA and other human/biological parameters
For millennia we have crafted artifacts from bulk materials that we have progressively refined to produce ever more precision tools and products. Latterly, we have crossed a critical threshold where our abilities now eclipse Mother Nature. For example; the smallest transistors in production today have feature sizes down to 2nm which is smaller than a biological virus ~20 - 200nm. The implications for ITC, AI, Robotics, and Production are ever more profound as we approach, and most likely undercut, the scale of the atom ~ 0.1-0.4nm. Not only does this open the door to new technologies, it sees new and remarkable capabilities. So, in this presentation we look at this new Tech Horizon spanning robotics to quantum computing and sensory technologies, and how they will help us realise sustainable futures germane to Industry 4.0, 5.0, and beyond.
The past 25 years have seen a move toward the convergence of telephone and computer onto a single network. Whilst the telephone network enjoyed a unique and isolated development (and growth) of dedicated circuit switching for near 200 years, computing more naturally ventured into ethernet (packet switching) and on to the internet in just 55years.
So different are these networking concepts that it was originally thought they could never converge. But as the internet grew to outgun the old fixed telephone network and new mobile working, it became economically and technologically clear that convergence (VOIP) was possible and most likely would be transformational.
Having ‘fixed’ the conundrum of real-time communication using uncontrolled packets that introduce variable latency, a new ‘monster’ reared - cybersecurity! Telephone and mobile nets never suffered ‘hacker attacks’ to the same degree as the PC dominated world and so new provisions had to be made. These came in the form of end-to-end packet encryption and layered link encryption with constraints on the number of end-to-end and node-to-node hops.
Today, telephone calls mostly pass through a portion of the internet, PN, PVN, with a shrinking number still originating and terminating at old analog and digital local loops with circuit switches. By and large, the core network is ‘super secure’ and it is in the new digital and old analogue periphery where the major risks reside. Within the next decade the full transformation to all-digital, packet switching, should be complete.
As per the internet; people, insider, malware, Denial of Service (DoS and DDoS) and other forms of attack persist, but the defences developed to combat these are formidable. In this lecture we address the attack scenarios and the defences to date and highlight some of the lesser-known/advertised approaches of both the defenders and the attackers.
(Beyond simplistic thinking and models)
This lecture is one of a series ‘Grand Challenge Subjects’ designed to make students think beyond, and challenge, the status quo; to question what they have been taught and the established industry wisdoms; to look beyond the tech media and journal papers; to think, be original, and be creative in the widest sense. This all culminates in a design and build/project program spread over several weeks.
The notion that the IoT will see everything connecting via the internet using a wireless domain dominated by 5G is not only simplistic, it is fundamentally impossible. A moments thought and a few simple calculations reveal that there is not enough energy on the planet to power 50 - 250Bn or more IoT devices operating in such a mode. So how are we really going to design and engineer the IoT to become a workable proposition? Here are some clues:
3/4G: Carries <5% of all internet traffic; WiFi ~55%; Wired LANs @ 45%
Mobile Network coverage is sadly lacking @ <90% by geography
Mobile Device batteries and charging are major limitations
The internet consumes ~12% of all our energy
Mobile Devices consume ~ 1% and rising
Mobile Nets consume ~ 10%
None of the above takes into account the cost of raw materials, production, distribution, delivery, support, disposal and the ecological impact of civil engineering, equipments, and people.
During this lecture the following surprising conclusions quickly emerge:
Most IoT devices will talk to each other and never connect to the internet
IoT devices will require a range of bandwidths and not just low bit rates
The majority of IoT devices will communicate over very short distance
Our current wireless architectures are outmoded by the IoT
We will most likely need something beyond UWB
The power per IoT device has to be <<1mW
Security will demand auto-immunity
This then is the starting point; from here we can design and engineer solutions for an, as yet, unspecified and dimensioned IoT fit for this century.
Education systems across the West have degenerated into a series of memory tests and the quest to hit abstract performance targets and measures. So students that appear well qualified are often unable to apply the most basic of mathematical, scientific, engineering or logical principles, and nor do they have a good appreciation of history or design. This does not bode well for a future of faster change and greater complexity.
“At the most basic level our society it is about the survival of the most adaptable”
For sure; today’s education and learning methodologies have to move toward more experimental and experiential working in order to reinforce the basics whilst engendering far greater understanding. Early specialism has also to be reversed with all students studying a broader range of topics through school and on into college and/or university.
“Education isn’t something you have to get done and dusted - it is a lifelong pursuit”
There is a further need to recognize that the (so-called) academic and practical streams are afforded equal importance! To get the best out of teams/groups all members have to share a common base of understanding and appreciation. In turn, this can be enabled and supported by Just-in-Time education and training-on-line. But there is much more….
Every Industrial revolution has seen the progression from people dominated design, build and production to a higher degrees of automation that has gone hand-in-hand with shortening timescales enabled by ever-more powerful technologies. However, at a fundamental level the process has remained the same, but it is now edging toward a continuum of evolution as opposed to a series of discrete jumps that often trigger company reorganizations. In concert, there is a realization abroad that it is no longer about the biggest, the strongest, the best, or the fittest, it is now all about the survival of the most adaptable.
By and large it is relatively easy to predict when and where tech change will occur and the likely outcomes, in terms of existing and future products and services, but how people, customers, companies and societies will react is an unsolved puzzle. On another plane, competition and threats may well occur outside the sector, from a direction managers are not looking, by entirely new mechanisms, and at a most critical time. These are all challenges indeed!
How to adapt to, and cope with these collective challenges is the focus of this presentation which is illustrated and supported by past and present industrial cases along with the experiences and methodologies of those who have driven/weathered this storm as well as those who failed. Many of the illustrations are automated and there are exemplar movies and segue inserts throughout.
We are engaged in a war the like of which we have never seen or experienced before. Our enemies are invisible and relentless; with globally dispersed forces working at all levels and in all sectors of our societies. They are better organised, resourced, motivated, and adaptive than any of our organisations or institutions, and they are winning. This war is also one of paradox!
“The cost to many nations is now on a par with their GDP”
“No previous war has seen so many suffer so much to (almost) never retaliate”
“We are up against attackers who operate as a virtual (ghost-like) guerrilla army”
“No state can defend its population and organisations, and they stand alone - isolated and exposed”
“A real army/defence force would rehearse and play all day and very occasionally engage in warfare. We, on the other hand, are at war every day but never play, war-game, or anticipate new forms of attack”
To turn this situation around we need to understand our enemies and adopt their tactics and tools as a part of our defence strategy. We also have to be united, and organised so the no one, and no organisation, stands alone. We also have to engage in sharing attack data, experiences and solutions.
All this has to be supported by wargaming, and anticipatory solutions creation.
The good news is; we have better, and more, people, machines, networks, facilities, and expertise than our enemies. All it requires is the embracing of advanced R&D, leadership, sharing, and orchestration on a global scale.
Part 1 of this two-part serious was about rethinking and reeducation: ‘Attack Scenarios’ approached the transformation process by getting students to think as if they are attacker so that in Part 2; ‘Defence Scenarios’ they are challenged to get ahead of the game; to anticipate and respond ahead of an attack, by recalling what they did in RED Team mode which gave them the opportunity to design their own criminal empire on screen!
In both Part 1 and Part 2 the detailed discussions occurred in camera and are not for publication or open public access.
"Demystifying a world of the weird and unexpected"
In just over 100 years our understanding of reality, nature, and the world about us has transited from the simple, linear and causal, to the complex, non-linear, and confounding. As a species, we now understand something of the scale of the problems we face and the limitations of our innate abilities. In addition, our mathematical and digital computing frameworks do not scale to match the challenges of climate change, global warming, or the economics of sustainability.
‘Quantum Computing is analogue/probabilistic and not digital’
The stark reality is; We will never understand the human brain, the true nature of cancer, chemistry, biology, life, and the complexities of the environment using today’s tools. Building bigger and better digital computers does not scale to meet these challenges, and is untenable in the longer term! For sure, AI can help us formulate new enlightenments, but it still isn’t enough. We occupy a quantum universe that cannot be decoded and understood by us or our linear machines, no matter how many or how big! A Quantum universe demands Quantum Computers to realize deep understandings.
‘Quantum Computers will not replace our digital computers
In this multi-media talk we open the ‘quantum kimono of reality’ to explain the what, how, and when, of Quantum Machines and the implications for the future.
No doubt Aldous Huxley and George Orwell would be pleased to see cameras and surveillance devices everywhere, just as they predicted, but they would then be amazed to find that we buy and install them and become upset if no one is watching! So the Dystopian futures they both predicted and feared are not here yet, but they might just be in the pipeline, and being built a device at a time by us!
Only 70 years ago close observation and surveillance was difficult and very expensive. Today, it is so very cheap, efficient, and everywhere: in our pockets; on our wrists; in our homes, offices, cars, trains, planes; in the streets and on the highways and major roads.
To some degree every country has embraced all the possibilities presented by the technology to make their societies safer and more progressive as organisms, but now here comes AI. Automatic voice, face, finger, eye, action, movement and habit recognition writ large along with all our messages, entertainment, work and recreation patterns monitored 24x7, so inference engines can check if we are good, bad, dangerous, safe, under threat and so on!
Some countries are now employing such technology to judge, sentence, and commit people for criminal acts and ant-social behaviours etc. At this point we have to proceed with care in the recognition that data errors ‘happen’ and human biases can be built in at the birth of such AI systems. Nothing is ever perfect - not people, and certainly not our machines, and we have to progressively drive out bias snd error…
CyberCrime represents one of the biggest threats to society and human progress to be encountered in the past 70 years. As a business, it is by far the biggest on the planet with a balance sheet that would see it joining the G8 within the next 3 years given its continued exponential growth. With these criminal activities only attracting sensational reporting in the context of stolen passwords and account details, society soldiers on not understanding the detail and not understanding the growing threat. Attacks are tolerated in much the same way as a snowstorm!
Military, national defense, and security organizations, along with police and government can no longer cope and are in large part unable to defend and protect their citizens. The IT industry and those engaged in Cyber Defence are struggling too and remain in a reactive defense mode - mostly responding after the fact/act! The Dark Side not only enjoy the first-mover advantage, they are unbounded by the Law, Ethics, or indeed any constraints!
There are also rogue states and terrorists plus many other groups also leveraging the openness of societies to attack, and often straying into/exploiting criminal resources! At the same time the defenders tend to be far and few on the ground, generally underfunded and resourced, and often unappreciated and poorly paid/rewarded. For sure, it is time to rethink this arena and change our thinking on how we approach defense.
This lecture is Part 1 of a rethink/reeducation process: ‘Attack Scenarios’ approaches the transformation process by getting students to think as if they are attacker so that in Part 2; ‘Defence Scenarios’ they can get ahead of the game to anticipate and respond ahead of an attack. This they do in RED Team mode with an opportunity to design their own criminal empire on screen!
Despite a security landscape now embracing: People; Companies; Governments; Devices; Networks; Services; Vehicles; Properties; LAND; SEA; AIR; SPACE; CYBER and INFORMATION, people and organisations still tend to see all this as someone else problem. In reality, it concerns all of us. Governments can no longer protect their citizens and nor can any company IT/Security Dept!
“In an ideal world: responses to Cyber and Terror would be automated and immediate”
The Dark Side has grown rich and powerful by investing in R&D and the latest technology; adopting distributed team working and a global market for talent and resources; and they are winning this war with an estimated $1.5Tn income in 2019. We have to adopt the same strategies to survive let alone win. Global sharing and cooperation are key along with people, staff, management, board, NED and Chairman education/training/involvement. At this time it is rare to find a ‘Cyber Seat’ on the main board of any organization, but it is a new and critical essential!
For the vast majority of history the progress of our species and civilisation was limited by a very few artisans - the workers of metal, wood, leather and cloth along with famers and distribution networks. Specifically, the number of skilled blacksmiths determined the rate of sword, knife, lance and armour production, and ultimately the size of empires.
The turning point came in the eaten 1700s when the Royal Navy was expanding to explore and colonies the planer. Nails were the problem with more than 20k required per ship! So this was the first item to be mad automatically, followed by wooden blocks for the rigging. The water mills constructed to power the production therefore mark the start of Industry 1.0 and the growth of the British Empire.
The spread of automation through Industry 2, 3 and 4 accelerated and empowered us to do more and more using less and less people, power and materials. Without it we could not support the population of the planet or the lifestyle we enjoy. Remarkably, at no time during this process have we seen mass unemployment, and consistently, more and more jobs have been created. In brief, better production capabilities have seen the creation of better tools, which in turn has led to better productivity and better quality.
The process has been evident in everything hardware, and much of entertainment ,design, and software, with services perhaps the last bastion of human based delivery and support. However; the on-line world and rise of AI are now changing the balance across retail, banking, insurance, accountancy, and services in general.
Seventy years on from AI appearing on the public scene and all the optimistic projections have been largely overtaken with systems outgunning humans at all board, card and computer games including Chess, Poker and GO. Of course; general knowledge, medical diagnosis, genetics and proteomics, image and pattern recognition are now all firmly in the grasp of AI.
Interestingly, AI is treading a similar path to computing in that it began with single purpose/task machines that could only deal with a company payroll calculations or banking transactions and nothing more! General purpose computing emerged over further decades to give us the PCs and devices we now enjoy. So, AI currently runs as task specific applications on these general purpose platforms, and no doubt, general purpose AI will also become tractable in a few decades too!
Recent progress has promoted a deal of debate and discussion along with hundreds of published papers and definitions that attempt to characterise biological and artificial intelligence. But they all suffer the same futility and fail! Without reference to any formal characterisation, all discussion and debate remains relatively meaningless.
Somewhat ironically, it was the defence industry that triggered the analysis work here. Two of key steps to success were: the abandonment of all performance comparisons between biological and machine entities; and the avoidance of using the human brain as some ‘golden’ intelligence reference.
This presentation is suitable for professionals and public alike, and comes fully illustrated by high quality graphics, animations and movies. Inevitably, it contains (engineering) mathematics that non-practitioners will have to take on trust, whilst professionals may wish challenge on the basis that the focus on getting a solution rather than the purity of the process!
Every profession, along with education courses, has now been parsed into specialisms - as series of ‘soda straws’ or pipes giving a narrow view and focus with little chance of ‘cross-pollination’. Even IT and Systems Security is now sliced into many different facets spanning coding and encryption through to malware; electronic and physical attacks; technology and people.
Covering all of these specialisms in a single course can be difficult let alone a single lecture. But this lecture attempts to do just that (or at least a large slice of it) in a 3-hour session of two 90min sessions. It is done so against the backdrop of an established set of Security Laws.
The primary objective is to give the student a broad view of the wider threats and how they are perpetrated and linked together. Some technical aspects are not explicitly included, but they are reserved for other detailed sessions.
An analysis of Cyber Security publications sees >99% devoted to the technology of attack and defence, with <1% examining the biggest risk of all - People. But every Cyber hack, attack or failure involving technology, starts with some human indiscretion, error, fallibility, stupidity, revenge, malice, or act of vandalism.
This near exclusive focus on the technology is analogous to bolting the stable door after the horse has bolted, and it results in a vast redirection and waste of resources. In complete contrast, our adversaries (The Dark Side) are more cunning. It really is time to reconsider our strategy if we are to stem the growing tide of attacks.
For sure, people cannot ‘do’ security! And why should they? It really is the responsibility of industry who ought to be designing and supplying inherently secure products that defend users against themselves and The Dark Side. To engineer this would mean the deployment of systems to monitor the behaviours of people, devices, systems, applications and networks.
We have to establish patterns of behaviour at all levels if we are to detect and combat the exceptions that might constitute an attack. And whilst our knowledge of human behaviours and sociology are extensive, we know almost nothing about devices, systems, applications and networks. Perhaps even more threatening is our total lack of knowledge about Things: aka the IoT.
In this presentation we illustrate the fallibilities of people as well as some of their devious activities and propose some solutions.
Pundits and experts alike are predicting the demise of Call and Contact Centres at the hand of rapidly advancing AI systems, and it is easy to see why. Google have recently demonstrated remarkable gains in conversational AI used as a booking engine. At the same time, IBM Watson has demonstrated an encyclopedic knowledge and a reasonably sophisticated ability to debate. But could they all be wrong? For sure, Call/Contact Centres are far from ideal, but they replace other (older) modes that were even worse and we should take care not to throw the baby out with the bathwater!
A Green Agenda cannot be fully realised by polishing our established industries and processes, or indeed minimalistic changes to manufacturing, production, and supply. We have to be far more holistic and radical! New materials and processes will get us part way there, but we also need the greater data oversight, analysis and management, provided by a fully deployed Internet of Things (IoT). In turn, this will require the application of Artificial Intelligence, Computer Modelling and War Gaming to provide the necessary guidance and decision support for machines and people.
Energy and material waste are definitely key components, but so are hyper-efficient Re-Use, Re-Purposing, and Re-Cycling with maximal material recovery at very low loss. And so, access to and analysis of, the Big and Small Data collected by networks and the IoT components is vital. For obvious reasons of unrealisable energy demands and network node densities, mobile networks and network technologies (such as 5G) cannot support such a vision and we can expect to see a migration to new network regimes where our machines, appliances, devices, vehicles, sea going containers, pallets, boxes, products and components communicate directly over very short distances in preference to using 3/4/5G and WiFi networks.
Many IoT components include sensors and access to information about their hosts; and this is vital to performance monitoring, timely maintenance and repair. Real time location, production, supply, use and ownership information will change the way we design, manufacture, supply and meet the needs of society at all levels from health, welfare, employment, education, industry, commerce, defence, and government. Many elements exist today, and more are under development, and in this presentation we bring together these core components.
We are engaged in an exponentially growing cyber war that we are visibly losing. Within the next 3 years it has been estimated that the global cost will equal, or overtake, the UK GDP, and it is clear that our defences are inadequate and often ineffective. Malware and ransomer-ware continue to extort more money, and cause damage and inconvenience to individuals, organisations and society, whilst hacker groups, criminals and rogue states continue to innovate and maintain their advantage. At the same time, our defences are subverted and rendered ineffective as we operate in a reactive and prescriptive, after the fact, mode with no foresight or anticipation.
In any war it is essential to know and understand as much about the enemy as possible, it is also necessary to establish the truth and validity of any situation or development. Doing this in the cyber domain is orders of magnitude more difficult than the real world, but some of the relevant tools are now available or at an advanced stage of development. For example; fully automated fact checkers and truth engines have been demonstrated, whilst situational awareness technologies are commercially available. However, what is missing is some level of context assessment on a continual basis. Without this we will continue to be ‘blind-sided’ by the actions and developments of the attackers as they maintain their element of surprise along every line of innovation.
What do we need? In short ; a Context Engine that continually monitors networks, servers, routers, machines, devices and people for anomalous behaviours that flag pending attacks as behavioural deviations that are generally easy to detect. In the case of attacker groups we have observed precursor events and trends in network activity days ahead of some big offensive. However, this requires a shift in the defenders thinking and operations away for the reactive and short term, to the long term continual monitoring, data collection and analysis in order to establish threat assessments on a real time.
The behavioural analysis of people, networks and ITC, is at the core of our ‘Context Engine’ solution which completes the triangle of: Truth; Situation; Context Awareness to provide defenders with a fuller and transformative picture. Most of the known precursor elements of this undertaken have been studied in some depth, with some behavioural elements identified on real networks and some physical situations. The unknown can only add more accuracy!
In a world that appears riven by social media, ill-informed opinion, rumour, and conspiracy theories in preference to facts and established truths, it can be alarming to see scientists, doctors, and engineers challenged by vacuous statements that often hold sway over the hard-won truths of science. Moreover, large numbers of people do not understand the ‘scientific method’ and what makes it so powerful.
Paradoxically, those challenging science and scientists based on their belief systems do so using technologies that can only be furnished by scientific methodologies. For sure; no religion, belief system, great political mind, anarchist, professional protester, or social commentator will produce a TV set, mobile phone, laptop, tablet, supercomputer, MRI Scanner, AI system, or vaccine! But they will criticise, challenge, and be abusive based on their ignorance and inability.
So, this is the world that now influences the minds of young aspiring students, and this presentation is designed to go beyond the simple exposition and statement of the scientific principles and method, to provide an ancient, modern, and forward-looking perspective. It also includes a complex ‘worked example’ to highlight the rigour that must be applied to establish any truth!
Until relatively recently our world was disconnected, stable, and slow to change. We saw linear innovation and commerce mostly resulting in well behaved and predictable outcomes. But all that has changed! Non-linearities introduced by networked technologies, people and organisations accelerated innovation, markets & change with emergent behaviours rapidly becoming the new norm. In turn, management, market & economic practices have seen adaptability adopted as a vital tool.
So rapid has been the rate of progress; no country, no matter how big, has all the materials, facilities, people, and innovation skills to meet demand. Our future therefore relies on the globalisation of everything including AI, robotics, production and innovation including human intellect and skills.
Our communications history is dominated by fixed networks of bounded linear predictability. These were based on precise engineering design giving assured information security, and measured operation. However, mobile devices, internet, social networks, IP, and Apps changed all that! Internets are inherently non-linear, unbounded, and essentially designoid — that is, mostly shaped by evolution, steered by demand/rapid innovation - highly adaptive and ‘learning’ in real time.
So, those who suppose we can control such networks to fully guard and protect the information of institutions and individuals are sadly mistaken. And further confounded by Industry 4.0 and the Internet of Things (IoT). Here, a mix of the information of individuals and things, is distributed across the planet on a scale far larger than ever conceived in the past, to become essential components in the survival of our species in realising sustainable societies.
Not surprising then, Privacy and Data protection are big issues for regulators, governments and civil liberties organisations. But so far, nothing has worked, and we see the UK Data Protection Act, EU-GDPR, EU-USA Shield, and Copyright Laws often ignored or worked around. These are largely derivatives of a paper based world and a pre-computing world are now largely unfit for purpose.
Throughout my career in science, engineering and management I attended numerous meeting where many misconceptions and misinterpretations were evident. Perhaps the most expansive and expensive were the probabilities assumed and calculated for system reliability and/or product manufacturing quality. Eventually, I began to refer to this as ‘five nines’ problem!
Not fully understanding the origins of the reliability measures, it is so easy to demand a 99.999% instead of 99.99% up time for an electronic system. What could be easier? At face value it appears to be trivial and straightforward! Likewise, taking a 5s manufacturing plant up to a 6s defect level turns out to be a monumental engineering challenge! And at the time of writing 6s has never been achieved!
It appears that to few engineering and management courses address this topic, and if they do, it is as a scant reference of insufficient depth. So, we see far too many students understand in any depth, if at all! And when they become managers they just ‘don’t get it’!
This presentation and the associated lecture have been specifically created to address this problem with relevance to BSc, BA, MSc and MBA students along with anyone needing a refresher or explicit introduction to the topic. In addition to the graphics, animations and movies, the lecture is also littered with practical examples and the outcomes of case studies.
Connecting Everything Vital to Sustainability
Mobile network evolution has followed a reasonably predictable path almost entirely focused on the needs of human communication. The transition from 1 to 2G was dictated by the economics of reliability, performance, and scale, whilst 3, 4, and 5G saw the transition to mobile computing with full internet access, AI and an ever-expanding plethora of applications. But 5G could be the end of the line as cell-site energy demands have become excessive at ~10kW.
Midway between the migration from 4G to 5G, M2M and the IoT machines overtook the human population of 8Bn people with near (estimated) 20Bn devices. Current IoT growth rates suggest a 40 - 60Bn population by 2030 to 2050. However, we present evidence that it could be far more ~ 1,000Bn ‘Things’. This is based on the observation of the number of IoT components populating modern vehicles, homes, offices, factories and plants, along with smart ‘human implants’ and ‘smart bolts’ plus the instrumentation of civil; structures.
The bold assumption that 5G would be a dominant player in the IoT is now patently one of naivety and the world has become far more complex with over 10 wireless standards currently in use. So, this poses the question; will 6G rise to the challenge? We see this as highly unlikely as the diversity of need is extremely broad, and we propose that it could be the end of tower based networks for a lot of applications. A migration to mesh-nets, UWB and (Hyper Wide Band) for the IoT at frequencies above 100GHz seems the most obvious engineering choice as it allows for far simpler designs with extremely low power at sub $0.01/device cost. 5G is already on the margins of being sustainable, and a ‘more-of-the-same’ thinking 6G can lonely be far worse!
Telecom customer services appear to be stuck in the early 20th Century with the telephone call the primary channel for service provision that can take days to affect. Compare that to Google, Amazon, IBM, Apple and other modern companies where customers control service provision by the minute or second.
Modem business is driven by the accumulation of customer data, but the Telecom Industry sees vast amounts of customer-related data dormant and untapped. As a result, many new opportunities are lost. For example, the behavior of people, devices, systems, and networks give the earliest indicators of potential security problems.
OTT operators exploit networks and make far greater profits than any other sector and this might be further amplified by the roll-out of 5G. But without a fundamental rethink of FTTP, 5G will fail to deliver sufficient coverage and the advertised data rates. This pending failure is already seeing alternative solutions from outside the industry along with the realization that most ‘things’ on the IoT will never connect to the internet!
(Beyond simplistic thinking and models)
This lecture is one of a series ‘Grand Challenge Subjects’ designed to make students think beyond, and challenge, the status quo; to question what they have been taught and the established industry wisdoms; to look beyond the tech media and journal papers; to think, be original, and be creative in the widest sense. This all culminates in a design and build/project program spread over several weeks.
The notion that the IoT will see everything connecting via the internet using a wireless domain dominated by 5G is not only simplistic, it is fundamentally impossible. A moments thought and a few simple calculations reveal that there is not enough energy on the planet to power 50 - 250Bn or more IoT devices operating in such a mode. So how are we really going to design and engineer the IoT to become a workable proposition? Here are some clues:
3/4G: Carries <5% of all internet traffic; WiFi ~55%; Wired LANs @ 45%
Mobile Network coverage is sadly lacking @ <90% by geography
Mobile Device batteries and charging are major limitations
The internet consumes ~12% of all our energy
Mobile Devices consume ~ 1% and rising
Mobile Nets consume ~ 10%
None of the above takes into account the cost of raw materials, production, distribution, delivery, support, disposal and the ecological impact of civil engineering, equipments, and people.
During this lecture the following surprising conclusions quickly emerge:
Most IoT devices will talk to each other and never connect to the internet
IoT devices will require a range of bandwidths and not just low bit rates
The majority of IoT devices will communicate over very short distance
Our current wireless architectures are outmoded by the IoT
We will most likely need something beyond UWB
The power per IoT device has to be <<1mW
Security will demand auto-immunity
This then is the starting point; from here we can design and engineer solutions for an, as yet, unspecified and dimensioned IoT fit for this century.
Education systems across the West have degenerated into a series of memory tests and the quest to hit abstract performance targets and measures. So students that appear well qualified are often unable to apply the most basic of mathematical, scientific, engineering or logical principles, and nor do they have a good appreciation of history or design. This does not bode well for a future of faster change and greater complexity.
“At the most basic level our society it is about the survival of the most adaptable”
For sure; today’s education and learning methodologies have to move toward more experimental and experiential working in order to reinforce the basics whilst engendering far greater understanding. Early specialism has also to be reversed with all students studying a broader range of topics through school and on into college and/or university.
“Education isn’t something you have to get done and dusted - it is a lifelong pursuit”
There is a further need to recognize that the (so-called) academic and practical streams are afforded equal importance! To get the best out of teams/groups all members have to share a common base of understanding and appreciation. In turn, this can be enabled and supported by Just-in-Time education and training-on-line. But there is much more….
Every Industrial revolution has seen the progression from people dominated design, build and production to a higher degrees of automation that has gone hand-in-hand with shortening timescales enabled by ever-more powerful technologies. However, at a fundamental level the process has remained the same, but it is now edging toward a continuum of evolution as opposed to a series of discrete jumps that often trigger company reorganizations. In concert, there is a realization abroad that it is no longer about the biggest, the strongest, the best, or the fittest, it is now all about the survival of the most adaptable.
By and large it is relatively easy to predict when and where tech change will occur and the likely outcomes, in terms of existing and future products and services, but how people, customers, companies and societies will react is an unsolved puzzle. On another plane, competition and threats may well occur outside the sector, from a direction managers are not looking, by entirely new mechanisms, and at a most critical time. These are all challenges indeed!
How to adapt to, and cope with these collective challenges is the focus of this presentation which is illustrated and supported by past and present industrial cases along with the experiences and methodologies of those who have driven/weathered this storm as well as those who failed. Many of the illustrations are automated and there are exemplar movies and segue inserts throughout.
We are engaged in a war the like of which we have never seen or experienced before. Our enemies are invisible and relentless; with globally dispersed forces working at all levels and in all sectors of our societies. They are better organised, resourced, motivated, and adaptive than any of our organisations or institutions, and they are winning. This war is also one of paradox!
“The cost to many nations is now on a par with their GDP”
“No previous war has seen so many suffer so much to (almost) never retaliate”
“We are up against attackers who operate as a virtual (ghost-like) guerrilla army”
“No state can defend its population and organisations, and they stand alone - isolated and exposed”
“A real army/defence force would rehearse and play all day and very occasionally engage in warfare. We, on the other hand, are at war every day but never play, war-game, or anticipate new forms of attack”
To turn this situation around we need to understand our enemies and adopt their tactics and tools as a part of our defence strategy. We also have to be united, and organised so the no one, and no organisation, stands alone. We also have to engage in sharing attack data, experiences and solutions.
All this has to be supported by wargaming, and anticipatory solutions creation.
The good news is; we have better, and more, people, machines, networks, facilities, and expertise than our enemies. All it requires is the embracing of advanced R&D, leadership, sharing, and orchestration on a global scale.
Part 1 of this two-part serious was about rethinking and reeducation: ‘Attack Scenarios’ approached the transformation process by getting students to think as if they are attacker so that in Part 2; ‘Defence Scenarios’ they are challenged to get ahead of the game; to anticipate and respond ahead of an attack, by recalling what they did in RED Team mode which gave them the opportunity to design their own criminal empire on screen!
In both Part 1 and Part 2 the detailed discussions occurred in camera and are not for publication or open public access.
"Demystifying a world of the weird and unexpected"
In just over 100 years our understanding of reality, nature, and the world about us has transited from the simple, linear and causal, to the complex, non-linear, and confounding. As a species, we now understand something of the scale of the problems we face and the limitations of our innate abilities. In addition, our mathematical and digital computing frameworks do not scale to match the challenges of climate change, global warming, or the economics of sustainability.
‘Quantum Computing is analogue/probabilistic and not digital’
The stark reality is; We will never understand the human brain, the true nature of cancer, chemistry, biology, life, and the complexities of the environment using today’s tools. Building bigger and better digital computers does not scale to meet these challenges, and is untenable in the longer term! For sure, AI can help us formulate new enlightenments, but it still isn’t enough. We occupy a quantum universe that cannot be decoded and understood by us or our linear machines, no matter how many or how big! A Quantum universe demands Quantum Computers to realize deep understandings.
‘Quantum Computers will not replace our digital computers
In this multi-media talk we open the ‘quantum kimono of reality’ to explain the what, how, and when, of Quantum Machines and the implications for the future.
No doubt Aldous Huxley and George Orwell would be pleased to see cameras and surveillance devices everywhere, just as they predicted, but they would then be amazed to find that we buy and install them and become upset if no one is watching! So the Dystopian futures they both predicted and feared are not here yet, but they might just be in the pipeline, and being built a device at a time by us!
Only 70 years ago close observation and surveillance was difficult and very expensive. Today, it is so very cheap, efficient, and everywhere: in our pockets; on our wrists; in our homes, offices, cars, trains, planes; in the streets and on the highways and major roads.
To some degree every country has embraced all the possibilities presented by the technology to make their societies safer and more progressive as organisms, but now here comes AI. Automatic voice, face, finger, eye, action, movement and habit recognition writ large along with all our messages, entertainment, work and recreation patterns monitored 24x7, so inference engines can check if we are good, bad, dangerous, safe, under threat and so on!
Some countries are now employing such technology to judge, sentence, and commit people for criminal acts and ant-social behaviours etc. At this point we have to proceed with care in the recognition that data errors ‘happen’ and human biases can be built in at the birth of such AI systems. Nothing is ever perfect - not people, and certainly not our machines, and we have to progressively drive out bias snd error…
CyberCrime represents one of the biggest threats to society and human progress to be encountered in the past 70 years. As a business, it is by far the biggest on the planet with a balance sheet that would see it joining the G8 within the next 3 years given its continued exponential growth. With these criminal activities only attracting sensational reporting in the context of stolen passwords and account details, society soldiers on not understanding the detail and not understanding the growing threat. Attacks are tolerated in much the same way as a snowstorm!
Military, national defense, and security organizations, along with police and government can no longer cope and are in large part unable to defend and protect their citizens. The IT industry and those engaged in Cyber Defence are struggling too and remain in a reactive defense mode - mostly responding after the fact/act! The Dark Side not only enjoy the first-mover advantage, they are unbounded by the Law, Ethics, or indeed any constraints!
There are also rogue states and terrorists plus many other groups also leveraging the openness of societies to attack, and often straying into/exploiting criminal resources! At the same time the defenders tend to be far and few on the ground, generally underfunded and resourced, and often unappreciated and poorly paid/rewarded. For sure, it is time to rethink this arena and change our thinking on how we approach defense.
This lecture is Part 1 of a rethink/reeducation process: ‘Attack Scenarios’ approaches the transformation process by getting students to think as if they are attacker so that in Part 2; ‘Defence Scenarios’ they can get ahead of the game to anticipate and respond ahead of an attack. This they do in RED Team mode with an opportunity to design their own criminal empire on screen!
Despite a security landscape now embracing: People; Companies; Governments; Devices; Networks; Services; Vehicles; Properties; LAND; SEA; AIR; SPACE; CYBER and INFORMATION, people and organisations still tend to see all this as someone else problem. In reality, it concerns all of us. Governments can no longer protect their citizens and nor can any company IT/Security Dept!
“In an ideal world: responses to Cyber and Terror would be automated and immediate”
The Dark Side has grown rich and powerful by investing in R&D and the latest technology; adopting distributed team working and a global market for talent and resources; and they are winning this war with an estimated $1.5Tn income in 2019. We have to adopt the same strategies to survive let alone win. Global sharing and cooperation are key along with people, staff, management, board, NED and Chairman education/training/involvement. At this time it is rare to find a ‘Cyber Seat’ on the main board of any organization, but it is a new and critical essential!
For the vast majority of history the progress of our species and civilisation was limited by a very few artisans - the workers of metal, wood, leather and cloth along with famers and distribution networks. Specifically, the number of skilled blacksmiths determined the rate of sword, knife, lance and armour production, and ultimately the size of empires.
The turning point came in the eaten 1700s when the Royal Navy was expanding to explore and colonies the planer. Nails were the problem with more than 20k required per ship! So this was the first item to be mad automatically, followed by wooden blocks for the rigging. The water mills constructed to power the production therefore mark the start of Industry 1.0 and the growth of the British Empire.
The spread of automation through Industry 2, 3 and 4 accelerated and empowered us to do more and more using less and less people, power and materials. Without it we could not support the population of the planet or the lifestyle we enjoy. Remarkably, at no time during this process have we seen mass unemployment, and consistently, more and more jobs have been created. In brief, better production capabilities have seen the creation of better tools, which in turn has led to better productivity and better quality.
The process has been evident in everything hardware, and much of entertainment ,design, and software, with services perhaps the last bastion of human based delivery and support. However; the on-line world and rise of AI are now changing the balance across retail, banking, insurance, accountancy, and services in general.
Seventy years on from AI appearing on the public scene and all the optimistic projections have been largely overtaken with systems outgunning humans at all board, card and computer games including Chess, Poker and GO. Of course; general knowledge, medical diagnosis, genetics and proteomics, image and pattern recognition are now all firmly in the grasp of AI.
Interestingly, AI is treading a similar path to computing in that it began with single purpose/task machines that could only deal with a company payroll calculations or banking transactions and nothing more! General purpose computing emerged over further decades to give us the PCs and devices we now enjoy. So, AI currently runs as task specific applications on these general purpose platforms, and no doubt, general purpose AI will also become tractable in a few decades too!
Recent progress has promoted a deal of debate and discussion along with hundreds of published papers and definitions that attempt to characterise biological and artificial intelligence. But they all suffer the same futility and fail! Without reference to any formal characterisation, all discussion and debate remains relatively meaningless.
Somewhat ironically, it was the defence industry that triggered the analysis work here. Two of key steps to success were: the abandonment of all performance comparisons between biological and machine entities; and the avoidance of using the human brain as some ‘golden’ intelligence reference.
This presentation is suitable for professionals and public alike, and comes fully illustrated by high quality graphics, animations and movies. Inevitably, it contains (engineering) mathematics that non-practitioners will have to take on trust, whilst professionals may wish challenge on the basis that the focus on getting a solution rather than the purity of the process!
Every profession, along with education courses, has now been parsed into specialisms - as series of ‘soda straws’ or pipes giving a narrow view and focus with little chance of ‘cross-pollination’. Even IT and Systems Security is now sliced into many different facets spanning coding and encryption through to malware; electronic and physical attacks; technology and people.
Covering all of these specialisms in a single course can be difficult let alone a single lecture. But this lecture attempts to do just that (or at least a large slice of it) in a 3-hour session of two 90min sessions. It is done so against the backdrop of an established set of Security Laws.
The primary objective is to give the student a broad view of the wider threats and how they are perpetrated and linked together. Some technical aspects are not explicitly included, but they are reserved for other detailed sessions.
An analysis of Cyber Security publications sees >99% devoted to the technology of attack and defence, with <1% examining the biggest risk of all - People. But every Cyber hack, attack or failure involving technology, starts with some human indiscretion, error, fallibility, stupidity, revenge, malice, or act of vandalism.
This near exclusive focus on the technology is analogous to bolting the stable door after the horse has bolted, and it results in a vast redirection and waste of resources. In complete contrast, our adversaries (The Dark Side) are more cunning. It really is time to reconsider our strategy if we are to stem the growing tide of attacks.
For sure, people cannot ‘do’ security! And why should they? It really is the responsibility of industry who ought to be designing and supplying inherently secure products that defend users against themselves and The Dark Side. To engineer this would mean the deployment of systems to monitor the behaviours of people, devices, systems, applications and networks.
We have to establish patterns of behaviour at all levels if we are to detect and combat the exceptions that might constitute an attack. And whilst our knowledge of human behaviours and sociology are extensive, we know almost nothing about devices, systems, applications and networks. Perhaps even more threatening is our total lack of knowledge about Things: aka the IoT.
In this presentation we illustrate the fallibilities of people as well as some of their devious activities and propose some solutions.
Pundits and experts alike are predicting the demise of Call and Contact Centres at the hand of rapidly advancing AI systems, and it is easy to see why. Google have recently demonstrated remarkable gains in conversational AI used as a booking engine. At the same time, IBM Watson has demonstrated an encyclopedic knowledge and a reasonably sophisticated ability to debate. But could they all be wrong? For sure, Call/Contact Centres are far from ideal, but they replace other (older) modes that were even worse and we should take care not to throw the baby out with the bathwater!
A Green Agenda cannot be fully realised by polishing our established industries and processes, or indeed minimalistic changes to manufacturing, production, and supply. We have to be far more holistic and radical! New materials and processes will get us part way there, but we also need the greater data oversight, analysis and management, provided by a fully deployed Internet of Things (IoT). In turn, this will require the application of Artificial Intelligence, Computer Modelling and War Gaming to provide the necessary guidance and decision support for machines and people.
Energy and material waste are definitely key components, but so are hyper-efficient Re-Use, Re-Purposing, and Re-Cycling with maximal material recovery at very low loss. And so, access to and analysis of, the Big and Small Data collected by networks and the IoT components is vital. For obvious reasons of unrealisable energy demands and network node densities, mobile networks and network technologies (such as 5G) cannot support such a vision and we can expect to see a migration to new network regimes where our machines, appliances, devices, vehicles, sea going containers, pallets, boxes, products and components communicate directly over very short distances in preference to using 3/4/5G and WiFi networks.
Many IoT components include sensors and access to information about their hosts; and this is vital to performance monitoring, timely maintenance and repair. Real time location, production, supply, use and ownership information will change the way we design, manufacture, supply and meet the needs of society at all levels from health, welfare, employment, education, industry, commerce, defence, and government. Many elements exist today, and more are under development, and in this presentation we bring together these core components.
We are engaged in an exponentially growing cyber war that we are visibly losing. Within the next 3 years it has been estimated that the global cost will equal, or overtake, the UK GDP, and it is clear that our defences are inadequate and often ineffective. Malware and ransomer-ware continue to extort more money, and cause damage and inconvenience to individuals, organisations and society, whilst hacker groups, criminals and rogue states continue to innovate and maintain their advantage. At the same time, our defences are subverted and rendered ineffective as we operate in a reactive and prescriptive, after the fact, mode with no foresight or anticipation.
In any war it is essential to know and understand as much about the enemy as possible, it is also necessary to establish the truth and validity of any situation or development. Doing this in the cyber domain is orders of magnitude more difficult than the real world, but some of the relevant tools are now available or at an advanced stage of development. For example; fully automated fact checkers and truth engines have been demonstrated, whilst situational awareness technologies are commercially available. However, what is missing is some level of context assessment on a continual basis. Without this we will continue to be ‘blind-sided’ by the actions and developments of the attackers as they maintain their element of surprise along every line of innovation.
What do we need? In short ; a Context Engine that continually monitors networks, servers, routers, machines, devices and people for anomalous behaviours that flag pending attacks as behavioural deviations that are generally easy to detect. In the case of attacker groups we have observed precursor events and trends in network activity days ahead of some big offensive. However, this requires a shift in the defenders thinking and operations away for the reactive and short term, to the long term continual monitoring, data collection and analysis in order to establish threat assessments on a real time.
The behavioural analysis of people, networks and ITC, is at the core of our ‘Context Engine’ solution which completes the triangle of: Truth; Situation; Context Awareness to provide defenders with a fuller and transformative picture. Most of the known precursor elements of this undertaken have been studied in some depth, with some behavioural elements identified on real networks and some physical situations. The unknown can only add more accuracy!
In a world that appears riven by social media, ill-informed opinion, rumour, and conspiracy theories in preference to facts and established truths, it can be alarming to see scientists, doctors, and engineers challenged by vacuous statements that often hold sway over the hard-won truths of science. Moreover, large numbers of people do not understand the ‘scientific method’ and what makes it so powerful.
Paradoxically, those challenging science and scientists based on their belief systems do so using technologies that can only be furnished by scientific methodologies. For sure; no religion, belief system, great political mind, anarchist, professional protester, or social commentator will produce a TV set, mobile phone, laptop, tablet, supercomputer, MRI Scanner, AI system, or vaccine! But they will criticise, challenge, and be abusive based on their ignorance and inability.
So, this is the world that now influences the minds of young aspiring students, and this presentation is designed to go beyond the simple exposition and statement of the scientific principles and method, to provide an ancient, modern, and forward-looking perspective. It also includes a complex ‘worked example’ to highlight the rigour that must be applied to establish any truth!
Until relatively recently our world was disconnected, stable, and slow to change. We saw linear innovation and commerce mostly resulting in well behaved and predictable outcomes. But all that has changed! Non-linearities introduced by networked technologies, people and organisations accelerated innovation, markets & change with emergent behaviours rapidly becoming the new norm. In turn, management, market & economic practices have seen adaptability adopted as a vital tool.
So rapid has been the rate of progress; no country, no matter how big, has all the materials, facilities, people, and innovation skills to meet demand. Our future therefore relies on the globalisation of everything including AI, robotics, production and innovation including human intellect and skills.
Our communications history is dominated by fixed networks of bounded linear predictability. These were based on precise engineering design giving assured information security, and measured operation. However, mobile devices, internet, social networks, IP, and Apps changed all that! Internets are inherently non-linear, unbounded, and essentially designoid — that is, mostly shaped by evolution, steered by demand/rapid innovation - highly adaptive and ‘learning’ in real time.
So, those who suppose we can control such networks to fully guard and protect the information of institutions and individuals are sadly mistaken. And further confounded by Industry 4.0 and the Internet of Things (IoT). Here, a mix of the information of individuals and things, is distributed across the planet on a scale far larger than ever conceived in the past, to become essential components in the survival of our species in realising sustainable societies.
Not surprising then, Privacy and Data protection are big issues for regulators, governments and civil liberties organisations. But so far, nothing has worked, and we see the UK Data Protection Act, EU-GDPR, EU-USA Shield, and Copyright Laws often ignored or worked around. These are largely derivatives of a paper based world and a pre-computing world are now largely unfit for purpose.
Throughout my career in science, engineering and management I attended numerous meeting where many misconceptions and misinterpretations were evident. Perhaps the most expansive and expensive were the probabilities assumed and calculated for system reliability and/or product manufacturing quality. Eventually, I began to refer to this as ‘five nines’ problem!
Not fully understanding the origins of the reliability measures, it is so easy to demand a 99.999% instead of 99.99% up time for an electronic system. What could be easier? At face value it appears to be trivial and straightforward! Likewise, taking a 5s manufacturing plant up to a 6s defect level turns out to be a monumental engineering challenge! And at the time of writing 6s has never been achieved!
It appears that to few engineering and management courses address this topic, and if they do, it is as a scant reference of insufficient depth. So, we see far too many students understand in any depth, if at all! And when they become managers they just ‘don’t get it’!
This presentation and the associated lecture have been specifically created to address this problem with relevance to BSc, BA, MSc and MBA students along with anyone needing a refresher or explicit introduction to the topic. In addition to the graphics, animations and movies, the lecture is also littered with practical examples and the outcomes of case studies.
Connecting Everything Vital to Sustainability
Mobile network evolution has followed a reasonably predictable path almost entirely focused on the needs of human communication. The transition from 1 to 2G was dictated by the economics of reliability, performance, and scale, whilst 3, 4, and 5G saw the transition to mobile computing with full internet access, AI and an ever-expanding plethora of applications. But 5G could be the end of the line as cell-site energy demands have become excessive at ~10kW.
Midway between the migration from 4G to 5G, M2M and the IoT machines overtook the human population of 8Bn people with near (estimated) 20Bn devices. Current IoT growth rates suggest a 40 - 60Bn population by 2030 to 2050. However, we present evidence that it could be far more ~ 1,000Bn ‘Things’. This is based on the observation of the number of IoT components populating modern vehicles, homes, offices, factories and plants, along with smart ‘human implants’ and ‘smart bolts’ plus the instrumentation of civil; structures.
The bold assumption that 5G would be a dominant player in the IoT is now patently one of naivety and the world has become far more complex with over 10 wireless standards currently in use. So, this poses the question; will 6G rise to the challenge? We see this as highly unlikely as the diversity of need is extremely broad, and we propose that it could be the end of tower based networks for a lot of applications. A migration to mesh-nets, UWB and (Hyper Wide Band) for the IoT at frequencies above 100GHz seems the most obvious engineering choice as it allows for far simpler designs with extremely low power at sub $0.01/device cost. 5G is already on the margins of being sustainable, and a ‘more-of-the-same’ thinking 6G can lonely be far worse!
Telecom customer services appear to be stuck in the early 20th Century with the telephone call the primary channel for service provision that can take days to affect. Compare that to Google, Amazon, IBM, Apple and other modern companies where customers control service provision by the minute or second.
Modem business is driven by the accumulation of customer data, but the Telecom Industry sees vast amounts of customer-related data dormant and untapped. As a result, many new opportunities are lost. For example, the behavior of people, devices, systems, and networks give the earliest indicators of potential security problems.
OTT operators exploit networks and make far greater profits than any other sector and this might be further amplified by the roll-out of 5G. But without a fundamental rethink of FTTP, 5G will fail to deliver sufficient coverage and the advertised data rates. This pending failure is already seeing alternative solutions from outside the industry along with the realization that most ‘things’ on the IoT will never connect to the internet!
Data mining and analysis has been dominated by the big looking at the small. Businesses, institutions and governments examine our habits with an eye to commercial opportunities, welfare, and security. However, big data is migrating analysis into the arena of networking and association to enhance services: advertising, ‘pre-selling,’ healthcare, security and tax avoidance reduction. But this leaves the critical arena of Small Data unaddressed - the small looking at the small - individuals and things examining and exploiting their own data.
Here we consider a future of ubiquitous tagging, sensors, measuring and networked monitoring powered by the IoT. Key conclusions see many devices talking to each other at close range with little (or no) need of internet connection, and more network connections generated between things than those on the net.
The precise definition and understanding of Industry 4.0, and how the vital elements are chosen varies widely by industry and country along with a deal of vagueness on the operational detail. This is particularly true of sustainability, new materials, security, IoT, recycling, logistics, integration, and interdependencies. In this short presentation, we highlight how many of the components are critically interdependent.
工业4.0的精确定义和理解以及关键要素的选择方式因行业和国家而异,并且在操作细节上含糊不清。 对于可持续性,新材料,安全性,物联网,回收,物流,集成和相互依存关系尤其如此。 在这个简短的演讲中,我们重点介绍了有多少个组件是相互依赖的。
在此处可以找到支持范围更广的I4.0演示/治疗方法:
A supporting and far broader I4.0 presentation/treatment can be found here:
https://www.slideshare.net/PeterCochrane/why-industry-40
在这里有更多关于物联网的信息:
With more on the IoT here:
https://www.slideshare.net/PeterCochrane/the-iot-for-real
还提供了支持书:
A supporting book is also available:
https://www.springer.com/gp/book/9783030129521
IoT growth forecasts currently tend to span 30 – 60 Bn ‘Things’ by 2030. However, this ignores the central IoT role in realising sustainable societies where raw materials and component use have to see very high levels of reuse, repurposing, and recycling. In such a world almost everything we possess and use will have to be tagged and be electronically addressable as a part of the IoT. Such a need immediately sees growth estimates of 2Tn or more over the span of Industry 4 and 5. On the basis of energy demands alone, it is inconceivable that the technologies of BlueTooth, WiFi, 4, 5, and 6G could support such demand, and nor are the signaling and security protocols viable on such a scale.
The evolution of the IoT will therefore most likely see a new form of dynamic network requiring new lightweight protocols employing very little signal processing, together with very low energy wireless technologies (in the micro-Watt range) operating over extremely short distances (~10m). This need might be best satisfied by a new form of ‘Zero Infrastructure Mesh Networks’ that engage in active resource sharing, lossy probabilistic routing, and cyber security realised through an integrated ‘auto-immunity’ system. Ultimately, we might also envisage data amalgamation at key nodes that have a direct connection into the internet along with an additional layer of cyber checks and protection.
We justify the above assertions by illustrating the energy and network limitations of today’s 5G networks and those already obvious in current 6G proposals. We then go on to detail how a suitable IoT MeshNet might be configured and realised, along with a few solutions and emergent outcomes on the way.
Summary
There has never been a time in the history of our species that has seen such innovation and rapid progress; and we have never been so confounded by the world we have realized! For sure, we have crossed the Rubicon from a linear past to a non-linear future and find ourselves lacking many of the basic tools we need to fully address the major problems confronting us.
In such an environment we have to prepared to be ‘unreasonable’, to challenge established wisdom, conventions and practices. So in this session, I present three challenging cases that do just that:
1) Wireless Spectrum: It is infinite and there is no bandwidth crisis!
2) Cyber Security: We need auto-immune systems aka biology
3) Information War: The biggest threat to the survival of our species
Create an IoT Gateway and Establish a Data Pipeline to AWS IoT with Intel - I...Amazon Web Services
In this session, learn how to create a complete Gateway-based IoT framework – from the edge to the cloud and back. By using an IoT Gateway as a central data collection, processing, and communication hub, you can create IoT connectivity without having to replace legacy hardware. We show you how to use an Intel NUC gateway and Arduino 101 sensor hub to gather environmental data, and step you through establishing a data pipeline to AWS IoT. We use AWS Lambda to create a rules engine for your data, and then send a control signal back down the Intel Gateway. Bring your laptop and your AWS account for this workshop.
Predicting digital futures a sector at a time is relatively easy, but in a networked world driven by accelerating technologies this is insufficient. Sectors do not operate in isolation, they are connected, and as technology advances the boundaries morph, with whole industries overtaken and pushed aside. At the same time old jobs lose relevance and new skills are required, but in aggregate ever more people are employed. Today there is no country, no matter how big or rich, that has all the raw materials and people required to power its industries, healthcare systems, farming and food production, or indeed educational institutions. Insourcing, outsourcing, and globalisation are the result, and they are about to be augmented by global networking of facilities, skills and abilities
We have never known or understood so much about our world, and nor have we enjoyed the capabilities bestowed by modern technology. But keeping up to date, acquiring the right knowledge and skills is a growing challenge as ‘the world of the simple’ evaporates and complexity takes over.
“There are plenty of simple solutions to complex problems, but they are all wrong”
Preparing for change whilst coping with the status quo now presents many new challenges way beyond human ability and we have to partner with machines to aid our decisions. For organisations it is essential to find and employ the right people, and for people it is necessary to become ever more flexible and adaptable whilst continually acquiring pertinent capabilities.
“AI and robots are not going to push us aside, but they will change everything”
No man is an island, and neither is any country, company or institution. A digital and connected global interdependency now governs the fortunes of our species as technology empowers us at every level. In this presentation we highlight a small sample of the technologies on the horizon, the jobs they will destroy, enhance and create.
Implementation of Network-Enabled GPS Tracking Units in Wildfire Operations. ...Joaquin Ramirez Cisneros
Use of GPS tracking devices capable of near real-time information relay to dispatching systems and incident management personnel are becoming more common. This technology offers opportunities for improving fireline personnel situational awareness, supporting operational decisions, and expediting planning unit functions. More detailed and accurate post-incident analyses can also be conducted with these data. However, challenges still exist with the implementation of this technology in the field and with the integration of this information into incident response decision making processes. This presentation will discuss several challenges and opportunities of deploying network-enabled GPS tracking devices during wildland fire response efforts. Several use cases, example implementations, and lessons learned will be provided from Technosylva’s fiResponse and Tactical Analyst software – used by US and European wildland fire agencies – demonstrating the capabilities of radio, cell, and satellite technologies for improving wildfire situational awareness and tracking personnel and equipment.
www.firesponse.com
www.tactical-analyst.com
Openbar Leuven // Edge-Computing: On-device AI // Nick DestryckerOpenbar
AI is increasingly being implemented on-device instead of an implementation in the cloud. What is edge computing, Edge AI, why should we care and how to benefit from it? Expect an in-dept explanation, possible technical solutions and use cases to the current edge computing trend in the AI landscape.
It was scientifically established in the 1970s that we are stressing the planet beyond the point where it can naturally recover. Today we are using about 50% more natural resources than can be extracted sustainably. The long history of industrialisation and population growth is now seeing climate change, extreme weather, and perhaps it is human overpopulation and terraforming that is now giving way to pandemics as we increasingly challenge and stress ecosystems.
Stressed systems react and fail in a variety of ways, and there is increasing evidence that CV-19 might just be the surprising product of human abuse of nature. What we can be certain of is that without action we will see more unpleasant and unwelcome surprises.
The Green Agenda is our biggest hope, but much of it is driven by emotion rather than deep thought, evidence, and scientific analysis. For example; recycling is mostly a fallacy and we need to think again! In reality Industry 4.0 is the first major program vested in the basics of long term sustainability.
In this presentation we give a brief overview of what I4.0 brings to the party by a focus on one major sector that is ripe for transformation. A much broader and wider treatment has been presented at previous events and numerous additional, associative, and supportive slide sets in this series are available on the web site.
On My Own Technology (OMOTEC) established in June 2016 is a dynamic research
and innovation centre that promotes STREAM with children from age 6 to 21.
• On My Own Technology (OMOTEC) identified one learning gap
▪ practical applicability of their learnings – EXPERIENTIAL LEARNING
▪ Turning conceptual ideas to implementable designs and follow it through
business model, execution and sustenance of their ideas.
• Our Education Model encourages young minds to identify problems, ideate
solutions, create and innovate implementable solutions through practical
applicability, tools, and research to solve real-world problems.
• We empower children and get them to believe in SELF-MADE Technology vs buying READY-MADE Technology.
The biggest force for social change since the first industrial revolution has been adjusting to, and taking advantage of, the new and accelerating capabilities of our advancing technologies. And in our entire history, the dominant technology driver has been silicon-based electronics. It has prompted revolutions in Computing, Telecoms, Automation, AI, and Robotics that radically changed the human condition. Today, that same exponential revolution is accelerating us into Industry 4.0 and onto Industry 5.0.
The consequential transformation of medicine, industrial design and production, farming, food, processing, supply and demand has seen living standards improve and life expectancy widen. Many of our institutions have also seen tech-driven transformations in line with industry. If there has been a down-side to this progression, it has been our inability to transform the workforce ahead of new demands. Unemployment has persisted whilst reeducation and retraining have been on the back foot, whilst, the net creation of new jobs has always exceeded the demise of the old. As a result, leading countries in the first world now have labour shortages at all levels right across the spectrum.
Recently, COVID-19 has demonstrated that we have the technology and we can rapidly reorganise and change society if we have to. So in this presentation, we examine ‘the force functions’ and changes engineered to date, and then peer over the horizon to sample what is to come in terms of technologies and working practices…
Touch Drive - A touch-based multi-function controller for autonomous drivingJuntima Nawilaijaroen
Msc. Interaction Design and Technologies Master Thesis Presentation
A design solution is proposed in this thesis, which aims to establish a convenient way for controlling autonomous cars and at the same time enables the user to control tertiary features unrelated with the driving task.
It should be no surprise that AI is treading a similar path to computing which began with single-purpose machines tasked for payroll calculations, banking transactions, or weapons targeting et al, but nothing more! It took decades for General Purpose Computing to emerge in the form of the now ubiquitous PC. Today, AI is still in a single-purpose/task-specific phase, and we have no general-purpose platforms, but their emergence is only a matter of time!
Recent AI progress has seen a repeat of the media debate and alarmist warnings for our computing past, compounded by consequential advances in robotics. In turn, this has promoted numerous attempts to draw biological equivalences defining the time when machines will overtake humans. But without any workable definitions or framework that tend to little more than un/educated guesses. Recourse to IQ measures and the Touring test have proved to be irrelevant, and without a reference framework or formal characterisation, continued discussion and debate remain futile
We therefore approach this AI problem from the bottom up by defining the simplest of machines and lifeforms to derive clues, pointers and basic boundary conditions . This sees a fundamental Entropic description emerge that is applicable to both machine and lifeforms.
This presentation is suitable for professionals and the public alike, and is fully illustrated by high-quality graphics, animations and, movies. Inevitably, it contains some mathematics that non-practitioners will have to take on trust, but the focus is on defining the key characteristics, parameters, and important features of AI, our total dependence, and the future!
Note: A 40 min session for a predominantly ley audience and not all the slides presented here were used on the day. Their inclusion here is in response to those audience members requesting more detail at the end of/during the event.
Past civilisations have nurtured small populations of those trying to understand and manipulate nature to some advantage in materials, tools, weapons, food, and wealth. However, they never formed communities and lacked the means of recording, communicating, and sharing successes and failures. They also lacked a common framework/philosophy to qualify them as scientists, but that all began to change in the 16th Century. In this lecture we consider the progression to a philosophy of science, and the underlying principles and assumptions that now guide scientific inquiry.We also examines the nature of scientific knowledge, the methods of acquisition, evolution, and significance over past centuries, and reflect on the value to society.
In the struggle to solve problems, deliver understanding, and reveal the truth about our universe, science had to suffer and survive: ignorance, bigotry, established superstitions, and the ‘diktats’ of religions and politics, and latterly, falling education standards mired by social media. We chart that ‘scientific’ journey emphasising the importance of observation, experimentation, and the search for universal laws. Ultimately, this essentially Aristotelian perspective was challenged and overtaken by the rise of empiricism, which emphasised the importance of sensory experience and the limitations of human knowledge.
Science continues to evolve and provide us with the best truths attainable with our leading edge technologies of observation and experimentation. Today, it stands as the greatest and richest contributor to human knowledge, understanding, progress, and wellbeing. In turn, debates and controversies are ongoing, shaping the field and philosophy which remains essential for understanding the nature of scientific knowledge and the models it creates. But unlike any belief system, the answers and models furnishers by science are not certain and invariant, they tend to be stochastic and incomplete - ‘the best we can do’ at a given time.
In this workshop session we identify aging technology design concepts, old business and operating models, plus energy supply limits as the prime constraints of 6G and beyond. We also identify the notion of an erroneous spectrum shortage born of the bands and channel mode of operation which is fundamentally unsuited to 6G and IoT demands in the near and far future.
We strongly link optical fibre in the local loop with future wireless systems and the need for very low-energy ‘tower-less’ systems. We also postulate a future demanding UWB and HWB (Hyper) with transmission energies ~𝛍W and signals below the ambient noise level. This will be necessary to power an IoT of >2.4Tn Things which we estimate to be necessary for Industry 4/5 and sustainable societies.
It is hard to understate the importance of ‘Thermodynamics’ in providing an almost complete (Grand Unified Theory) picture of the inner physics of energy transfer spanning machines and chemistry thro information.
Apparently, Einstein had two favourite theories: General Relativity and Thermodynamics! He championed both because of their ‘beauty’, completeness, and emergent properties purely derived from the fundamental consideration of how the universe works.
The origins of this topic mainly reside in the Industrial revolution and the realisation that the early machinery was grossly inefficient. E.G. Engines were only converting the energy consumed to ~2% of useful work output. This drew the attention of Savery (1698), Newcomen (1712), Carnot (1769), and for the next 200 years the conundrum of lost energy occupied many of the greatest scientific minds. This culminated in Rudolf Clausius (~1850)publishing his theory of Thermodynamics with further refinement by Boltzmann (1872).
Why was all this so important? In the 1700s a ‘beam engine’ weighing in at >20 tons consumed vast amounts of coal, to deliver an output ~10hp. Today a Turbofan jet Engine can deliver >30k hp at a weight of ~6 tons. This is the difference between working with little understanding, and today where our knowledge is far more complete. Our latest challenges tend around non-linear loss mechanisms associated with turbulent air and fuel flow.. And like many other fields we have to step beyond our generalise mathematical models and turn to the power of our computers for deeper insights.
Ultimately all machines, mechanisms, computing processes and information itself, involve the transformation of matter and/or bits, and thus they are Entropic and subject to the theory of Thermodynamics. This lecture therefore presents a foundation spanning the history and progress to date in preparation for the embracing other science and engineering disciplines.
Engineering might be defined as the judicial application of science and scientific knowledge, but with the rider that unlike science and scientific studies, engineering always has to deliver a solution and a result. There are therefore aspects of engineering that stretch and challenge, the accepted, wisdom and knowledge of science. To purists, this might appear outrageous, but it is no more so than the works of Erwin Schrödinger or Leonhard Euler et al
In this lecture we examine many of the established engineering basics whilst being mindful that most of our education, techniques, and working solutions are founded on the assumption of well behave linear environments. As our entire universe, and everything in it, is inherently complex and non-linear, we have to salute the powers of approximation and iteration for our many engineering success to date. However, we are increasingly being challenged by complexities of the fundamental non-linear nature of the problems confronting us. ( E.G. Politics, Conflict, Global Warming, Sustainability, Medicine, Fusion Power, Logistics, Networks, Depletion of Resources, Accelerating Tech Driven Change +++)
We start by tracing history from the foundations up to the present day, including modern analytical nomenclature and techniques, system reliability, resilience and costs, we highlight the the basic human limitations that necessitate multi-disciplinary teams that include AI and vast computing power.
The overall treatment includes our analogue past, digital today, and analogue/digital hybrid future of computing, robots, networks and systems of all kinds. It also includes animations, movies and sound files to demonstrate the realities of modern system design including the inherent complexities. To further highlight, and exemplify this projected future, we examine a real engineering project concerned with acoustic sniper spotting under battlefield conditions and extreme noise. Here a combination of digital modelling sees the use of analogue acoustic filter arrays, analogue signal amplification, and digital signal processing doubling the range of sniper detection and location.
Recently, it has become increasingly evident that we have engineers and scientists reaching a professional level of practice without a clear understanding of the scientific method, its origins, and its fundamental workings. There also appears to be a lack of appreciation of our total dependence on the truths that science continually reveals. How this situation ensued appears to vary from country to country, and the flavour of education system encountered by students. But a common complaint is the progressive dumbing down of the science curriculum along with a dire shortage of qualified teachers. This also seems to be compounded with the increasing speciation of science and engineering into narrower and narrower disciplines. So this situation (crisis?) prompted a request for a corrective series of foundation lectures focussed on healing these educational flaws across relevant disciplines, graduating and practicing levels. This then is the first in this foundation series.
Uncanny Valley addresses our reactions to humanoid objects, such as robots, a video game characters, or dolls, and how they look and act ‘almost’ like a real human. Feeling of uneasiness or disgust in the observer are addressed directly, rather than familiarity or attraction. The theory was proposed by Japanese roboticist Masahiro Mori in 1970 and has been explored by many researchers and artists since. It has application in AI, robotics, MMI, and human-computer interaction, and helps designers to create more appealing devices that can interact with people in various domains, such as industry, education, entertainment, defence, health care, et al.
In this lecture we explain and demonstrate the fundamentals before extending the principle to sound, motion, actions, and eyes as an output mechanism. We also note that all this poses some challenges and risks in the potential for reduced the emotional connections, empathy, acceptance, and trust between humans and machines. On a further dimension the potential to create threat and terror can be useful opportunity in the military domain. It is thus important to understand the causes and effects of the uncanny valley in the wider sense in order to meet the needs of each application space
Only 40 years ago, the rate of technologically driven change was such that companies could re-organize efficiently and economically over considerable periods of time, but about 30 years ago this changed as the arrival of new technologies accelerated. We effectively moved from a world of slow periodic changes to one where change became a continuum. The leading-edge sectors were fast to recognize and adopt this new mode of continual adaptation driven by new technologies. This saw these ever more efficient and expansive companies dominating some sectors. For the majority, however, it seems that this transition was not recognized until relatively recently, and a so new movement was born under the banner of digitalization. This not only impacts the way people work, it affects company operations and changes markets, and it does so suddenly!.
Perhaps the most impactive and recent driver of change in this regard has been COVID which saw the adoption of video conferencing and working as a survival imperative in much less than a month. This now stands as a beacon of proof that companies, organizations, and society, can indeed change and adapt to the new at a rate previously considered impossible. The big danger for digitalization programmes now is the simple-minded view that there are singular (magic) solutions that fit every company and organization, but this is not the case. The reality is that the needs and culture of an organization are not the same and may not be uniform from top to bottom.
Manufacturing necessitates very steep hierarchical management structures and tight control to ensure the consistency of the quality of products. On the other hand, a research laboratory or design company requires a low flat management hierarchy and an apparently relaxed level of control. This is absolutely necessary to foster creativity, innovation, and invention. This presentation gives practical examples of management and organizational, extremes. We then go on to highlight the need to embrace AI and Quantum Computing over the coming decade to deal with future technologies, operating
and market complexity.
The aspirational visions of Society 5.0 coined by many nations around 2015/16 have now been eclipsed by technological progress and world events including another European war, global warming, climate change and resource shortages. In this new context, the published 5.0 documents now seem naive and simplistic, high on aspiration, and very short on ‘the how’. The stark reality is that the present situation has been induced by our species and our inability to understand and cope with complexity.
“There are no simple solutions to complex problems”
What is now clear is that our route to survival and Society 5.0 will be born of Industry 4.0/5.0 and a symbiosis between Mother Nature, Machines, and Mankind. Today we consume and destroy near 50% more resources than the planet might reasonably support, and merely improving the efficiency of all our processes and what we do will only delay the end point. And so I4.0 is founded on new materials and new processes that are far less damaging, inherently sustainable, and most importantly, readily dispensable across the planet.
“Reversing global warming will not see a climatic reversal to some previously stable state”
In this presentation, we start with the nature of climate change, move on to the technology changes that might save the day, the impact of Industry 4.0/5.0, and then postulate what Society 5.0 might actually look like.
In a world of accelerating innovation and increasingly complex digital services, applications, appliances, and devices, it seems unreasonable to expect customers to understand and maintain their own cyber security. We are way past the point where even the well educated can cope with the compounded complexity of an ‘on-line-life’. The reality is, today's products and services are incomplete and sport wholly inadequate cyber defence applications.
Perhaps the single biggest problem is that defenders have never been professional attackers - and they don’t share the same level of thinking and deviousness, or indeed, the inventiveness of their enemies. Apart from an education embracing the attack techniques, and in some cases, engaging in war games, the defenders remain on the back foot However, there a number of new, an potentially significant, approaches yet to be addressed, and we care to look at the problem from a new direction.
In the maintenance of high-tech equipment and systems across many industries, identifiable precursors are employed to flag impending outages and failures. This realisation prompted a series of experiments to see if it was possible to presage pending cyber attacks. And indeed it was found to be the case!
In this presentation we give an overview of our early experimental and observational results, long with our current thinking spanning networks through to individual hackers, and inside actors.
When people are exposed to the new for the first time their reaction, quite rightly, is generally one of caution and perhaps a degree of suspicion. And, when that ‘new born’ is a novel technology, reactions can quickly become amplified and biased toward the dystopian by the sensationalism of media and mis-information of social networks. In this modern era I think we can also safely assume that Hollywood has more than a ‘bit part’ in nurturing extreme reactions with movies such as Terminator, AI and Ex-Machina.
Our purpose here is to dispel the modern myth that technology is, or can be, inherently evil and a direct threat to humanity. We do so by positing three basic axioms:
“Without technology we would know and understand
almost nothing”
“The greatest threat to humanity is humanity”
“If technology progress and societal advance stall, then civilisations collapse”
Having briefly establishing these in the context of our wider history, we focus on the Industrial Revolutions and their beneficial upside and consequential negatives. We then move on to examine Robotics, Artificial Intelligence, Artificial Life, and Quantum Computing in the context of our current needs and realising sustainable futures, and the survival of our civilisation.
In 2015/16 a number of bodies/nations set about defining societies they would aspire to in the near future. Each vision document similarly described some idealistic, egalitarian, super-smart, human centred, state providing a near uniformity of living conditions, and opportunity. At the same time, each society would be free of adversity, with economic development guided by ecological and human need. Of course, economic growth was defined to continue in line with the past. Very nice, but a product of old linear thinking and modelling!
It is now approaching 2022 and in the past 5/7 years our base silicon technology has advanced to enjoy a >30 fold increase in computing power. Our top end mobile devices would now challenge a super computer of 1996/7 era, whist AI systems now pervade our homes, offices, vehicles, professions and all our on-line services. At the same time, information overload has started to rival some medical conditions!
All of this has also been compounded by two years of COVID-19 lockdowns and restrictions that have seen the normalisation of social isolation, limited travel, working and eduction from home, virtualised medicine and care, support services, shopping and meetings. In turn, this has resulted in empty offices, towns and cities. Concurently, climate change, global warming, pollution, finite resources, a stressed planetary system, and social unrest have suddenly become urgent issues. Against this backdrop it really seems to be time to revisit those Society 5.0 Visions and the limited linear thinking that contrived them!
In this presentation we examine many of the core parameters and assumptions to highlight existing, or soon to be realised, solutions and remedies. In doing so, a different picture of Society 5.0 emerges.
This presentation was created in support of a short keynote for ICGS3-21 (14-15 Jan21) UK to purposely highlight the reasons why we are losing the cyber war and what we have to do to win. The approach adopted quantifies the key weakness and shortcomings of our current defence strategies to give pointers to a more secure future.
In postulating remedies, we purposely fall back on the wisdoms of Sun Tzu and The Art of War to highlight and explain the meaning and implications of quoted insights (below) and their pertinence to modern cyber wars/security.
“To know your Enemy, you must become your Enemy”
In this way, we go beyond opinion and suspicion by quantifying the scale of the individual elements of the cyber security equation using a variant of Drake’s Equation. This gives us a good estimate of the scale of the problems we face. Beyond this we highlight some cultural and political issues that need urgent attention.
Finally, we link to comprehensive presentations going back to 2016 that detail specific Red and Blue team exercises thinking and preparation. These themes were invoked to widen the awareness and thinking in the student body @ The UoS.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
2. Tech LandscapeS
Why are materials ‘always’ missing ?
VR & AR
small
data
AI
Quantum
Computing
Mobile Nets
Sensors
Actuators
Processing
Memory
3. Industry 4.0 Vision
Again materials are always missing?
At a fundamental level, human
progress is de
fi
ned by the
way we exploit, process, use,
and synthesise materials -
and yet they are almost never
included in descriptors of the
essentials or the future!
“New Materials are not only
core to our future progress,
they are essential in the
creation of sustainability”!
5. HUMan e xploitatio n
Finite resources & exponential demand
Sustainable
Provision
Excessive
Exploitation
“We have damaged our planet,
and now she is fighting back”
6. N e w M at e r i a l s
& s t r u c t u r e s
Provide us with ‘infinite’ energy
Our much bigger need is energy storage
7. N e w M at e r i a l s
& s t r u c t u r e s
Provide us with ‘infinite’ energy
Our much bigger need is energy storage
Todays technologies fall far short of
being sufficient/sustainable and we
need breakthroughs in thinking:
structures, materials, & basic
operating modes…probably
based on bio/nano tech
combinations to realise
a > 5x energy density
improvement!
8. T H I S I S N O T W A S T E
I t i s a s q u a n d e r e d l a t e n t r e s o u r c e
“ N o l i f e f o r m c a n s u r v i v e
i n i t ’ s o w n w a s t e
m a t e r i a l ”
“ R e p u r p o s i n g , R e u s i n g , R e c y c l i n g
i s n o t w o r k i n g - i t i s a
f u n d a m e n t a l f a i l u r e ”
9. I 4 . 0 : K e r n e l
Any sustainable future has
to embrace new materials,
s c i e n c e s , t e c h n o l o g i e s ,
e n g i n e e r i n g, p ro c e s s e s ,
a u t o m a t i o n , r o b o t i c s ,
organisational, operating,
and management modes,
intelligences and thinking…
and this centres on Nano/Bio
Tech, AI, Robotics, and most
likely, Quantum Computing!
BIO-TECH nano-TECH
Lower energ
y
Lower wast
e
Less friction
New material
s
New industrie
s
New processe
s
New capabilities
Multi-Disciplinar
y
hot spot for the 21C
AI
Robotics
Quantum
Computing
The first transformation step
The Io
T
Wrapper
10. M at e r i a l s d e f i n e
F O R M & F U N C T I O N
“Beyond global warming, pollution, and the denuding of material supplies
- we should remember that entire societies and civilisations rise and fall by
there mastery of materials and their manipulation/manufacture”
Stone
Wood
Metal
Woods
Metals
M e t a l
Rubber
M e t a l
A l l o y
Rubber
12. N E W F O R M ( s )
& FUNCTION(s)
From printed muscles stronger than
biology to sensors more capable than
a cats whiskers or a dogs nose!
From printed muscles stronger than
biology to sensors more capable than
a cats whiskers or a dogs nose!
13. HUMAN SUR VIVAL
Hinges on our ingenuity alone
“We have to limit population growth whilst realising
a sustainable living & working environment
symbiotic with nature”
“We have to stop producing more
and more for the few, and start
providing su
ffi
cient for the many”
14. SMART Materials
Tr a n s f o r m a t i o n a t a b a s e l e v e l
• Lower energy of extraction, re
fi
nement, shaping and forming
• Greater durability, application and utility per item produced
• Higher levels of Repurposing, Reusing, Recovery, Recycling
• Greater operating, distribution, delivery and operational e
ffi
ciency
New Properties: Mechanical, Electrical, Thermal, Chemical, Function…
• Conductivity
• Corrosion
• Density
• Malleability
• Elasticity
• Sti
ff
ness
• Hardness
• Plasticity
• Fracture
• Hardness
• Plasticity
• Memory
• Communication
• Networking
• Intelligence
• Adaptability
• Sensory
• ++++++
15. SMART CONCRETE
E n e r g y s t o r a g e + s e l f r e p a i r
+ i n t e g r a t e d s e n s o r s o n l i n e
16. SMART CONCRETE
O r g a n i c s e l f r e p a i r i n g
Integrated sensors can detect load
bearing distribution and detect any
precursors to failures
17. NO integrated sensors or utilities to record
wind and snow loading along with detecting
any precursors to failures et al
18. NO integrated sensors or utilities to record
wind and snow loading along with detecting
any precursors to failures et al
19. MULTI-LAYERED
S T R U C T U R E S
For all forms of panel and device
interface at a far lower cost
20. Rigid Mobile
Carry
Flexi Mobile
Pocket
Printed Mobile
Semi-Flex
Wearable
Printed Circuit Board
Soldered Components
Flexible Film Circuit
Surface Mount
Components
Printed Circuit Film
Welded/Deposited
Components
PRINTED MOBILES
The next phase of device evolution
23. O i l r i g s & A i r c r a f t
C o n t i n u a l v i b r a t i o n / p e r f o r m a n c e /
m a i n t e n a n c e & a n a l y s i s r e p o r t i n g
Integrated sensors can detect operating condition of all
key components - precursors to failures - and failures
24. O i l r i g s & A i r c r a f t
C o n t i n u a l v i b r a t i o n / p e r f o r m a n c e /
m a i n t e n a n c e & a n a l y s i s r e p o r t i n g
Integrated sensors can detect operating condition of all
key components - precursors to failures - and failures
Tim
e
Frequency
Signal
Level
25. M Y F U T U R E C A R ? All components printed & smart ?
Entirely assembled by robots?
Always on-line?
Self driving ?
Body panels:
Energy storing
Colour programmable
Self repairing to a degree
Self cleaning - hydrophobic
100% recoverable materials
Components:
All IoT connected
Performance monitored
Highly recoverable materials
Windows/Glass:
PhotoChromatic
Self healing cracks/scratches
26. D U M B t o S M A R T
Wired and wireless vehicle IoT
D o z e n s o f s e n s o r s ,
r e c o r d e r s , c o n t r o l
u n i t s , a g g r e g a t e d b y
o n - b o a rd a n a l y s i s w i t h
s p o r a d i c I o T / I n t e r n e t
c o n n e c t v i a m u l t i p l e
channels
WiFi,3, 4, 5G Direct
to Service Centre
Communication
Direct Car-to-Car
Avoiding 3, 4, 5G Congestion
27. D U M B t o S M A R T
- Materials inventory & suppliers
- Production process detail
- Vehicle compatibilities
- Full logistics record
- Storage histories
- Handling details
- History of use
- Temperature
- Humidity
- Stress
- Failures
- Repairs
- Disposal
- Recycle
- Reuse
- +++
- Dynamic element of a vehicle
- Performance optimisation
- Parameter adjustment
- Pressure adaptation
- Suspension trim
- +++
- Reuse
- Repair
- Recycle
- Recover
- Replace
- Repurpose
28. W h e e l F u t u r e s
Pa ss i v e - A c t i v e
A ss e m b l e d ? ?
P r i n t e d ? ?
29. I oT E M B E D D E D C H I P S
I n e v e r y p r o d u c t & c o m m o d i t y i t e m
A u d i t
T r a i l s
H i s t o r y
D e s i g n D e t a i l s
M a t e r i a l S o u r c e s
E l e m e n t C r e a t i o n
C o m p o n e n t A s s e m b l y
P r o d u c t i o n P r o c e s s
P r o d u c t Te s t i n g
S u p p l y C h a i n
O w n e r D e t a i l s
R e p u r p o s i n g ?
R e c y c l i n g ?
R e u s e ?
31. Users a part of
design loop for
decades!
“In many ways the IT industry is
is an exemplary pre-cursor of
what is too come”
32. 1.0
2.0
3.0
4.0
5.0
Water + Steam
Power
Mechanisation
Electrical Power
Mass Production
Computer
Control
Automation
Customisation Smart Factories
Efficient Additive
Production
INDUSTRY Evolves
A n e x p o n e n t i a l c y c l e
Smart Materials
Programable
Production
3R Greening
More & More
from
less and less
33. B I G C H A L L E N G E S
LIFETIME PERFORMANCE
W i l l t h e s e p ro p e r t i e s
remain stable for the
l i f e - t i m e o f t h e
p ro d u c t ?
34. Opportunity SPACE
I B M 2nm
Transistors
2 nm IBM
Transistors
C a r b o n
NanoTubes
V L S I
B i o
Tech
N a n o
Te c h
A huge amount of unexplored territory with potential
for combining/integrating proteins into plastics +++
35. O p p o r t u n i t y S P A C E
P r i n t e d a c t i v e / p a s s i v e m e t a - m a t e r i a l s
D i a p o l e L a y e r
R e f l e c t i v e L a y e r
R e f l e c t i v e
L a y e r
D i e l e c t r i c L a y e r s
36. P h a s e d A R R AY S
T r a c k i n g m u l t i p l e t a r g e t s
M e t a m a t e r i a l p a n e l s a l l o w
1 - 3 0 G H z r a d a r a p p s a n d
p r o v i d e a l o w r a d a r p r o f i l e
1 G H z = > ℷ = 3 3 c m
3 0 G H z = > ℷ = 1 c m
T h e b a s i c c o n c e p t s g o b a c k t o
W W I I , b u t r e a l i s a t i o n s i n f l a t
p a n e l f o r m h a v e o n l y b e e n w i t h u s
f o r ~ 5 0 y e a r s . O r i g i n s g o b a c k t o
t h e c o l d w a r a n d t h e n e e d t o
t r a c k m u l t i p l e b a l l i s t i c m i s s i l e s
T h e f i r s t ‘ t h i n ’ ( n e a r p r i n t e d )
l i g h t w e i g h t f l e x i b l e t e c h w a s
a p p l i e d t o a i r c r a f t s u r f a c e s i n
t h e l a t e 8 0 s a n d e a r l y 9 0 s
37. 1 2 x 2 4 x 4 1000 x 1000
+6dB
Gain over
single element
+9dB +60dB
ON
Equivalent Circuit
OFF
𝛌/2
f = 300GHz
𝛌 = 1mm
P r i n t e d A r r ay s
T h e b a s i c r a d i a t o r g e o m e t r y
38. B e a m S H A P I N G
M u l t i - b e a m s t e e r i n g
W o r k i n g w i t h M o t h e r N a t u r e
s e e s b e t t e r p e r f o r m a n c e a s
f r e q u e n c i e s i n c r e a s e r i g h t u p
t o o p t i c s a n d b e y o n d !
40. B I G G E S T C H A L L E N G E
EMERGENT B E H AV I O U R S
T h e I o T / S o c i a l N e t s
a re ’ m i n d f u l ’ a n d we
a re u n a b l e t o p re d i c t
t h e a c t u a l o u t c o m e s !
41. Humans ARE NOW
A PRIME LIMITTER
Our in ab ilit y t o cope, ad ap t , a nd
u n d e r s t a n d f a s t c h a n g i n g n o n -
lin ear envi ro nm en ts m a kes us th e
‘c e n t re s t a g e’ p ro b l e m !
42. T h a n k Y o u
www.petercochrane.com
“Things that Think want to Link
and
Things that Link want to Think”