SaaS- Software as a Service

You shall enjoy the fruit of your labor

You shall enjoy the fruit of your labor


We are migrating to an economy where more of our intellectual property is embodied in digital format. The practitioners who create this intellectual property are not second class people who are undeserving of the fruits of their labor. Even though the developers who created companies like Twitter were compensated, the venture capitalists who funded this style business model are running out of money. I am aware that many of these start-ups planned an advertising funded business model. However, the available total advertising dollars available means that less than 25% of them will survive. Since the first world nations elected to offshore their manufacturing, insuring that compensation is paid for intellectual property is even more important in reversing balance of trade deficits and eventual bankruptcy.
US trade balance

US trade balance


Enter the SaaS- Software as a Service business model. We are aware that most of the creation cost of intellectual property in digital form is spent making the first copy. Our modern communication and computer technology has reduced the cost of making duplicate copies to almost nothing. This has resulted in an elimination of more than 1/2 of the revenue stream in fields like music, motion pictures and pharmaceuticals. Having seen the fruits of the efforts to create intellectual property siphoned away, prudent planners choose to insure that they will retain the fruits of their effort. “Sometimes the questions are COMPLICATED and the answers are SIMPLE” Dr Seuss Geisel. People who need food on their table and roofs over their heads cannot afford to give away the effort that funds their life. New software will only be sold as SaaS. The development effort to create the first copy will be shared by all users because it will be the only copy. Unfortunately, SaaS is too late for Windows 95, Android, Office that already have generic copies in the marketplace. It is too late to close the barn door after the horses have left. Some of the first SaaS offerings will be in Internet Security. The current system of maintaining defenses on everyone’s computer will fade. The embedded back doors in the basic computer operating systems are the problem. Once the intruders use the back doors to gain control, the first action they perform disables the defenses. Users who wish to enjoy the benefits of secure data and reliable computer operation will discover that SaaS can deliver a service that isolates them from the web hackers and dangers using encrypted links. All communication to the unprotected web will be routed through the proxy server with a resident up to the date SaaS protection program. It is very possible that it will be necessary in the short term to add Wifi or internet dongles to circumvent the unsecured communication hardware that came with the users device. I can picture the entire industry migrating back to a new variation of its roots. In the very beginning, computer users used dumb telex machines to interact with time-sharing computers that housed all of the programs and data.
A Teletype Model ASR_32 by Jamie-Flickr

A Teletype Model ASR_32 by Jamie-Flickr

Industrial Demilitarized Zone

Korean DMZ -picture by Lim Yeongsik search operation Korean armed forces

Korean DMZ -picture by Lim Yeongsik search operation Korean armed forces


Just like the north Koreans are continuously trying to penetrate the demilitarized zone, there are hostile elements who use the world wide web as a corridor to attack. Since many historic IoT (Internet of Things) devices have very little protection, a browser program like Shodan can crawl the web and create map of connected devices. “Shodan’s been used to find webcams with security so low that you only needed to type an IP address into your browser to peer into people’s homes, security offices, hospital operating rooms, child care centers and drug dealer operations.”Kashmir Hill September 23, 2013 issue of Forbes. The real question is what do you do to protect your castle. it takes thinking in military terms to protect yourself from attack. I am not surprised that this picture of a turnstile was taken within a communist country. Their society has a lot more military control. It is curious that they think youth hostels are where the control is needed.
PERCo Turnstile Territory of student's hotel St Petersburg by Bestar

PERCo Turnstile Territory of student’s hotel St Petersburg by Bestar


Camouflage is a great military tactic. After you progress past having wide open door to your industrial control by implementing a second 10/100 gate with a guard post, it is helpful to hide your new entrance in plain sight. In programming terms it is called spoofing. The hackers who are using programs like Shodan ignore you if you appear to be an uninteresting application. A USB to 10/100 converter costs less than US $50. The USB driver programs can be configured such that the echo seen by the search engines looks like a baby monitor for example. The only other major requirement is to invent a quick staged authentication so that a DOS (denial of service) attack does not block the legitimate users from logging onto the system.
A simple USB to 10/100 converter can be programmed as a gate keeper

A simple USB to 10/100 converter can be programmed as a gate keeper

I can picture a time in the very near future when “lights out” manufacturing is IoT enabled. Current impediments such power outages can be remotely corrected if we can trust the remote access.

Display

In the future hologram displays will be commonplace

In the future hologram
displays will be commonplace

Indicator lights- The earliest computers borrowed from the machine control heritage and
included lots of indicator lights. These lights were mostly used to determine which vacuum tube had burned out and needed to be replaced. We are all familiar with the usefulness of indicator lights. The message displayed by these lights has become more sophisticated as we can afford more computing horsepower to embed decision logic behind the light

Indicator lights have been at the backbone of computers from the beginning Univac Buffer by Travellerva US Robotics Modem by Bortzmeyer

Indicator lights have been at the backbone of computers from the beginning
Univac Buffer by Travellerva
US Robotics Modem by Bortzmeyer

WYSIWYG- What you see is what you get- The first thing that you notice when you pick up a robot teach pendant is that there is no display screen. Once you are actually controlling the robot, there is no need to substitute a virtual display. Shigeo Shingo (Japanese manufacturing methods pioneer) would approve of the software that does use a screen display that allows preprogramming of robot tasks ahead of time without consuming robot operating time. Based on my experience, I can assure you that most pre-programmed routines will require touch up where the robot itself is the display.

The robot itself displays the command inputswidth=

The robot itself displays the command inputs


UX- user experience- Speedometers started as mechanical devices run by a rotating cable connecting to the drive shaft. A digital display was implemented when the dash was computerized. The automotive engineers wanted to advertise this conversion by creating a dash panel display that showed the speed as a digital number. This style of display was disliked by the buying public and a simulated bar style analog speed display emerged as the user preferred choice. Not every car design group has learned to utilize UX. You can make your own decision as to the sum of factors that resulted in the Fiat 500 flop in the marketplace. The digital speedometer shown is just one candidate. A joke applies. Two hikers in the woods hear a bear behind them. One opens his pack and puts on his tennis shoes. The other tells him “You can’t outrun a bear” He replies “I don’t have to. I only need to out run you” In true world class competitive fashion the pendulum will swing such that different auto manufacturers are the ones struggling to keep up. I remember when Lee Iacocca brought European front wheel drive back to America after test driving some Fiats.
Fiat 500X Speedometer by Karlis Dambrans

Fiat 500X Speedometer
by Karlis Dambrans


Trends – The embedded computers can inform you with 100% certainty that your car is having a problem when you are stranded at the side of the road. Not very helpful. Those of us who spent a chunk of our lives inventing the advance warning systems, wanted to have the voice reminder system say “I told you so” when the car stopped because the user ignored the warnings we created. Not very helpful either. Our ability to predict impending failure is the combination of big data analysis of all 200,000,000 cars that have on board diagnostics and the ability to watch data trends within the ¼ petabyte of data each car generates in real time. At the other end of the big data spectrum is a one-of-a-kind control like I just finished installing. As a one-of-a-kind there is not a pool of experience to predict failures. However, this does not stop us from displaying the trends in graphic overlay format to maximize the visibility of impending issues. This allows the user to simultaneously digest data that would occupy many table pages.
The best HMI displays like the Visi-trak shown can overlay process data in real time

The best HMI displays like the Visi-trak shown can overlay process data in real time


Context- Before we had modern CAD and Virtual reality, it was necessary to use sketches to communicate concepts. Having a better than average sketching ability, I occasionally got into trouble because I could make something that was impossible look like it would work. Many of the displays we use come to us from the game industry. Even though 3D CAD enables the average person to visualize the detail parts that we draw they lack the context of what they are used for. This is especially true for novel approaches. I use Carrara which is a video game software to combine my 3D equipment models with the surroundings so that it becomes possible to explain how they work.
Video game creation software can combine 3D model with a background to show context

Video game creation software can combine
3D model with a background to show context


Emerging displays. We are watching the evolution of even more powerful displays. Remote piloting of drones is even easier when the pilot has the same visual input as an on board pilot. This silicon valley driven technology will grow to even wider use when some of the flicker and headache causing instablity has been overcome by even more computing horsepower.
3D virtual reality glasses are an emerging display form.

3D virtual reality glasses are an emerging display form.

OBD II – On Board Diagnostics

Modern car repair is guided by IoT on board diagnostics

Modern car repair is guided by IoT on board diagnostics

It is not surprising that the general public is unaware of the user invisible computers running their vehicles. It is a testament to the skill of the automotive engineering community that computer controls were adopted with the care and testing which enabled them to remain hidden in the background. On Board Diagnostics were included within these controls due to the magnanimous donation of thousands of hours to industry committees who hammered out the standards. Access to the “big data” is just the starting point. Many iterations of testing and development are needed to weed out the “false positive” alarms that shake our confidence in the “code”. We evolved from OBD 1 through OBD 1.5 to the OBD II standard that came into effect in 1996. The upgrade to the standardization of OBD II was the result of emission requirements but the industry implementation included useful features such as common connection hardware, standardized diagnostic trouble codes, and access to the computers.
Vehicle computer controls are very sophisticated these days. Artificial intelligence in the form of mapping is used to keep up with the vehicle processes in real time and adjust the response to accomplish better outcomes like lower emissions, better fuel economy, traction control, straight line stopping and smoother ride.

Real time controls choose  their actions using a map like this NASA map which shows where people live.

Real time controls choose their actions using a map like this NASA map which shows where people live.

New values are continuously stored in a digital map which is used to avoid computing from scratch when the same conditions occur in the future.
The embedded On Board Diagnostics are able to spot failures which are above even my talent and vision. More important than that is that they continuously track simple failures
like disconnected wires. My college roomate electrical engineer, stated that there are no electrical failures. There are only mechanical failures. Electricity will flow if you give it a path. On Board Diagnostics is like having a mechanic who rides with you every mile of the way watching for even the simple failures. Nothing is more frustrating than having an intermittent problem that clears up every time you schedule an appointment with the mechanic.
As an automotive engineer and trained auto mechanic, I championed the display of the diagnostic trouble codes in addition to the “idiot light” on the dash panel. Now that I have seen this IoT application evolve, I realize that simply displaying the diagnostic trouble code number (some cars use the odometer display to do this currently) is of marginal usefulness compared to simultaneously providing the technical data and links like YouTube instructional video related to the indicated code. Applications such as my www.mileagetrakker.com grow in the marketplace because most car users also need lots of actionable related information, like the nearby location of appropriate repair shops.
Capture your full mileage deduction

Capture your full mileage deduction


The IoT has emerged into the marketplace in true “overnight success” fashion. Volkswagen brought out the first on board computer with scanning capability in 1968. The car repair industry was disrupted and gas stations with repair bays were replaced by convenience stores. In the 1940’s and 50’s tape driven digital servo motor controls were added to drive the motions of milling machines. CNC machining centers (and their intranet linked CAD and cutter path generation and management software) now dominate, displacing most Bridgeport milling machines. (And the Bridgeport company itself) In 1968 Bedford Associates brought out the first PLC (now Modicon) for GM. As a result, historic relay industrial controls have been replaced by PLC computer systems with their embedded intranet links.

Will we ever see the first disruptive Internet of Things success? Now that I have seen the security agencies complain that encryption is blocking interception of ISIS phone conversations, my prediction is that it will arrive as an extension of the Intranet of Things. Most IoT applications, like home security, require that any intranet extension onto the web includes the emerging communication encryption.

Kludge

Treasure is camouflaged in the digital jungle

Treasure is camouflaged in the digital jungle

kludge
[klooj]
noun – Computer Slang
1. a software or hardware configuration that, while inelegant, inefficient, clumsy, or patched together, succeeds in solving a specific problem or performing a particular task.

*definition from Dictionary.com

Whoever came up with this term must have been assigned to marry legacy IoT (Internet of Things) digital controls. Lots of ones and zeros show on the logic analyzer, with obscure or forgotten protocols for interpreting what they mean. In the arms race to stay ahead of the newest start-up, many of the companies who built the previous generation equipment with embedded internet communication no longer exist. However, even the first internet connected device is still a part of our IoT infrastructure. At the blinding communication speed of two bits per week, the transmitter shuts off the water feed pump every Sunday when the water tower is full.

We take running water out of our taps for granted

We take running water out of our taps for granted

I used to worry about terrorists gaining control of our infrastructure using the internet. It is theoretically possible to inflict some serious damage and injury. My concern was based on the fact that early IoT devices have very little access protection. Now that I have integrated some legacy systems I realize the lack of standardization will be our saving grace. It is next to impossible to apply experimentally the right combination of ones and zeros without a guide.
I was discussing the evolution of CNC position encoders with the technician who was upgrading the control on one of our CNC machining centers. In mold making, the cutter path software that converts 3D models (3D printing) into physical shapes, originally used a layer by layer contour line approach. We would like to use the more modern climb milling software because it eliminates the contour lines. (and the hours of hand draw polishing to remove them) The upgraded control will position X Y and Z at high speed instead of just X and Y which is all the contour line method requires. The embedded computer in each axis position encoder sends a high speed serial data stream including error correcting bits back to the control. This is a far cry from the first GE (now Fanuc) CNC control retrofitted to a Buffalo milling machine that I first programmed – yes, there is still a lot of legacy stuff in operation out there. This control also had position encoders without the local embedded computer. It only lost about 2500 count per shift (about 1/4 inch of position) and it came with a switch to shut off the Z axis so that you did not mill too deep. We evolved through resolvers and glass scales and back to a smart encoder. Don’t expect to do “big data” analysis of this type of IoT real time data stream. Bad things happen if the transmission of position is interrupted.
Who will bridge the genetation gap?

Who will bridge the genetation gap?


On the hardware side it is very convenient to connect the 10/100 port of my laptop to the ethernet switch. In my latest control I added ethernet cables so that it can be used in convenient locations without exposing it to the open internet. The generation gap became painfully obvious on the software side. The desire of the Windows operating system coders to download daily changes exceeds the ability of any custom low volume application software creator to keep up. We are finding that the latest version of custom application software is obsolete before it is sold. In the short term we will keep the systems synchronized by isolating them from the internet once we solve the inter-connectivity issues. This solution does not work for every IoT software mismatch issue. In my mileage trakker www.mileagetrakker.com IoT connected car application, it is necessary to have a staff who continuously monitors the functionality of the links and keeps up with interfacing with each model and car maker as they evolve. This becomes part of the monthly charge which enables our trakkers to obtain a couple thousand dollars in annual savings. Many of my mileage trakker competitors have gone out of business because they got caught continuously rewriting their cell phone based code in order to keep up with a rapidly changing software platform.
The IoT is evolving like the power grid. New IoT applications emerge based on the cost and performance drivers. Each implementer chooses a variation that matches the application without regard for the broader inter-connectivity issues. This will generate employment for the people with the STEM skills to link users to the vast data pool.