Search This Blog

Monday, July 8, 2019

Week 06 - New Technology Augmented Reality

TL:DR - Augmented Reality to fundamentally reshape how humans interact with the physical world


Augmented Reality (AR) and Virtual Reality (VR) are colossal technology trends to-date. AR is an “enhanced” version of reality using technology to superimposed computer-generated information like sounds, images, and text over a user’s physical real-world environment to provide assistance in everyday activities. Thus, enhances one’s perception of reality rather than replacing it. This technology shouldn’t be mistaken for VR where an entirely computer-generated environment is created for the user to inhabit and interact with.

Figure 1: Reality grading

Augmented reality is not a new technology, but some a form of it has been around for years. An example, the heads-up display in fighter aircraft show information about the attitude, direction and speed of the aircraft. The pivot point to bringing this technology to the general consumer started with Google Glass in 2013. Several categories of augmented reality technology exist, each with varying differences in their objectives and applicational use cases:

  • Marker-based (Image Recognition): The digital world is anchored to the real world objects. A camera and visual marker combined to produce a result only when the marker is sensed by a reader.
  • Markerless (location-based, position-based, or GPS): Uses a combination of camera systems, dedicated sensors (GPS, digital compass, velocity meter, or accelerometer), and complex math to accurately detect and map the real-world environment based on location.
  • Projection: Projects digital images with artificial light directly onto objects or surfaces in the real world. The light senses the human interaction (i.e. touch) of that projected light.
  • Superimposition: Uses object recognition either partially or fully replace an object within the user’s environment with a digital image.

Figure 2: Timeline

AR can be displayed on various devices and involves technologies such as simultaneous localization and mapping, depth tracking, and the following components:

Cameras and sensors to collecting data about user’s interactions for processing.
Processing similar to computers requiring a central processing unit, graphical processing unit, storage, memory, and other components to measure speed, angle, direction, orientation in space, etc.
Projection as a means to display the digital information data onto a surface for viewing.
Reflection mirror to assist human eyes with proper alignment.

Figure 3: AR components

Augmented reality devices come in multiple form factors:
  • Head-mounted
  • Eyeglasses
  • Contact lens
  • Virtual retinal displays
  • EyeTap
  • Handheld
  • Spatial

The use case for augmented reality are endless where the sky is the limit. This technology serves every industry here is a listing of only a small amount of use cases, https://uploadvr.com/augmented-reality-use-cases-list/. Currently I am assisting the organization I work for with bringing on Augmented Reality in a secure manner for Utility applications for Electrical Utility and Water Utility. Just imagine the ability of field workers not relying on 2D drawing or hardcopy drawings, but a visual overlay of the infrastructure that is underground overplayed to the physical space the user is occupied to make decision and work safely in the field.

Figure 4: Overlay example

The following are videos on how augmented reality change the world.

This video has humanistic discussion at a personal level that is quite inspiring. From 3:10 - 4:37 it provides excellent illustration of use cases.


This video is so revolutionary of augmented realities potential.


Augmented Reality has the ability to fundamentally reshape how humans interact with the physical world. As devices adapt to the new technology, the growth of Augmented Reality has no limitations.

Monday, July 1, 2019

Week 05 - Internet of Things

TL:DR - Cool is fun, but a balance between functionality and security needs to occur.


The Internet of Thing (IoT). Kevin Ashton, in a presentation of Procter & Gamble in 1999, coined the term “Internet of Things.” What is it? “The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network” thereby facilitating human to machine and machine to machine interactions.

The concept is that all the things in the world and connecting them to the Internet. The IoT is a network of connected things with built in sensors which integrates data from the different devices and applies analytics about the environment around them to share the most valuable information with applications built to learn and adjust itself accordingly to address specific needs.

  • Sensor and or device that may include a collection of sensors
  • Connectivity
  • Data processing
  • User interface
These sensors/devices vary in degrees of complexities and are far ranging like camera, accelerometer, GPS, temperature gauges, etc. The data collected is transmitted over mediums of communication and transports such as cellular, satellite, wireless (Wi-Fi), Bluetooth, wide-area networks (WAN), low power wide area network (LPWAN) or connecting directly to the internet via ethernet. Software then performs processing on the acquired data. Finally, the information is made available to the end-user that may have the ability to interact with the device or the device can perform actions automatically based on predefined rules.

Figure 1: Example of process from Data Flair


Imagine you wake up at 7am every day to go to work. Your alarm clock does the job of waking you just fine. That is, until something goes wrong. Your train’s cancelled and you have to drive to work instead. The only problem is that it takes longer to drive, and you would have needed to get up at 6.45am to avoid being late. Oh, and it’s pouring with rain, so you’ll need to drive slower than usual. A connected or IoT-enabled alarm clock would reset itself based on all these factors, to ensure you got to work on time. It could recognize that your usual train is cancelled, calculate the driving distance and travel time for your alternative route to work, check the weather and factor in slower traveling speed because of heavy rain, and calculate when it needs to wake you up so you’re not late. If it’s super-smart, if might even sync with your IoT-enabled coffee maker, to ensure your morning caffeine’s ready to go when you get up.

History

We are living connected lives filled with internet-enabled devices that learn our preferences and provide the experiences we want to make our lives more convenient. And the technology that makes it possible to connect our lives is expanding. There are several types of timelines like Industrial Internet of Things and variations of timelines. Many timelines indicated the point in time of inception is when the name was spoken in 1999 with a follow-up with the first Internet connected refrigerator by LG. The best and most informative timeline is at Tiki-Tiki.

Figure 2: IoT devices to people from Data Flair

There are already more connected things than people in the world with total spending on IoT endpoints and services to reach almost $2 trillion in 2017.

Security

The sins of the past for Industrial Control Systems regarding security have not been learned. Security is one the biggest issues with the IoT. These sensors are collecting sensitive data, what you say and do in your own home. Many IoT devices don’t include basics security. A well known botnet was dubbed Mirai. Mirai is IoT specialized malware that uses common default usernames and passwords (“admin” and “password”) to gain access to IoT devices. An individual IoT devices cannot perform much of an attack; however, the combination of millions of devices allows was used to perform distributed denial of service (DDoS) attacks on Dyn, a company that provides domain name services to major companies. There are other incident like hacking a Jeep by manipulating the air conditioner, able to steer the car, and turn the engine off.

In search of information regarding securing IoT, virtually every resource found on initial search concluded for end users to take action and not address at the root of the product (hardware, software, and configuration). Norton provided 9 measures a user can take:
  • Install reputable internet security software
  • Use strong and unique passwords
  • Read the privacy policy of the apps
  • Purchase reputable brands
  • Know what data the device or app wants to access
  • Use a VPN to transmit data
  • Patch the device
  • Use caution when using social sharing features
  • Never leave your smartphone unattended if you’re using it in a public space
The Internet of Things are components, sensors, and other everyday objects being combined with Internet connectivity and powerful data analytic capabilities that promise to transform the way we work, live, and play. However, the Internet of Things raises significant challenges that could stand in the way of realizing its potential benefits. Be responsible as a vendor and protect yourself as a user.