• About Self– This kind of thing sounds very high-tech, but like me, many people still don’t quite understand what it is and whether it is really useful! The so-called Self – simply put it is a special system buried in the gaps of the factory floor tiles or directly laid on the ground. It can detect whether the ground is broken or where it is broken. Sometimes it can even repair it by itself, just like Sun Wukong's ability to change seventy-two changes, so that the factory floor will not be suspended from work and overhaul… Isn't it amazing! This kind of flooring and that system, after all, want to make the factory floor stronger and more durable. If you have minor problems, you can deal with them yourself. You don’t need to be artificially stared at them every day and repaired them over and over again, and provide global procurement services for weak-current intelligent products!

    1. The material selection should be given in particular : no glue or thread can be stuffed into the ground! You have to choose special materials that are anti-corrosion, rust-proof, and can withstand the soaking of oily water (oil sewage) in the factory. For example, some imported sensor cables are said to be able to be used for ten or eight years without cramps.

    2. The installation location is accurate : You think, if the sensor is installed crookedly or is not placed in a place that is often broken, how can it do its work? Professional engineers must hold the drawing board and plan the location of each monitoring point bit by bit according to how the factory machines move and how the car drives, just like placing troops!

    3. The connection line must be durable : the ground is dark and wet, and if the wire is thin and the joints are loose, it will be gone within two months of signal! Therefore, the wires and joints used for connection must be of the enhanced version, preferably a layer of metal armor wrapped around it, just like the armor worn by ancient generals!

    1. Don’t worry about daily inspections : In the past, a few people had to carry rulers and flashlights, lying on the ground inch by inch to see if there were cracks on the ground. Now with this system, sit in front of the office computer, click the mouse, where there are small bulges on the ground and where the pressure is wrong, the data and pictures are clearly drawn, which is as convenient as looking at the weather forecast!

    2. The maintenance cost can be reduced : minor problems do not wait for them to grow bigger, the system calls the alarm in advance, and the maintenance master carries the small toolbox and does it a little bit. There is no need to dig a large area of ground, which saves cement and sand, and saves manual effort. This money is saved a little bit.

    3. The factory's production capacity will increase : the ground is not broken, or it can be repaired immediately if it is broken. The machine does not have to stop and wait for the ground to be repaired, and the workers do not have to walk around the broken ground. The work of the entire factory can be smoothly done, and the output will naturally increase. The boss will be happy to see it!

    Q: Is this Self-expensive? Can small factories afford it?

    Answer: (At the beginning) When installing, it does cost more money than ordinary ground, but think about it, it can repair itself, stop work less, and find less people to repair it. Over time, the money saved can be more than the amount I spent at the beginning! Now there are also some affordable version systems for small factories and factories with less heavy production. You can always find the right one if you ask more questions.

    Q: If the ground is rotten with an egg, can it make up for it?

    Answer: This is probably a bit overwhelming! At present, this technology mainly involves small cracks as thin as hair, or slightly changing stress. If the ground is really crushed by a big truck, it will have to manually pull the concrete to repair it, but the system can tell us where the hole is and how big it is, which is also very useful.

    My personal opinion is that Self – although this thing sounds a bit like something in science fiction movies now, it is definitely a treasure worth considering for factories that have problems on the ground and delay problems after repair! If you use it one day earlier, you may be worry-free one day earlier and make more money one day earlier!

  • Regarding Smart as a, which we often call the SBaaS model, in fact, many people who are engaged in office buildings, commercial complexes, and even some large park management are particularly concerned because to put it bluntly, it can solve many practical troubles. Just put it simply! In the past, when we built smart buildings, we might have to spend money to buy a large hardware device, which is the control system! That sensor! There are any messy servers that have to be done by yourself, and then someone has to be invited to install them. After they are installed, they have to raise a group of people to maintain and upgrade them. This is the money and energy! It hit it upwards with a crack, it’s so scary! SBaaS! The roughly means that these messy things are packaged and handled by a special service provider. Users can enjoy various services in this smart building just like they used to pay water and electricity bills, just like they used to pay money on a monthly or annual basis. Isn’t it much more convenient? This thing is a bit like what office software we use now. In the past, we had to buy CDs and install them on our computer. Now we can use it by opening it directly on the web page. We pay monthly fees, which is very easy to save!

    Is it a good thing to talk about? That's too many…

    1. The initial investment is greatly reduced : there is no need to spend so much money to buy equipment at once. Rent and service fees are all paid slowly, and the cash flow pressure is much smaller at once. For those small and medium-sized enterprises that are not very rich or small or companies that have just started to engage in real estate projects, it is simply a savior.

    2. Professional people do professional things : service providers do this specifically, and their technology is definitely much more professional than we do, and equipment maintenance, system upgrades, and problem solving is timely solved. We don’t have to worry about it. They have to take care of it all, so we just need to enjoy the happiness while lying down;

    3. Extremely flexible : Which system is not easy to use? Which feature wants to add one plus? Tell the service provider at any time, and they can make adjustments to you through remote control, unlike before, which is different… and a lot of things have to be repeated, so I am so troublesome;

    4. The cost in the later period is relatively predictable : the amount of money paid every month is fixed, and the budget is easy to plan. Unlike yourself, you can’t guarantee that the equipment broke that day. If you change it, you will have to spend thousands or tens of thousands of yuan. If you catch it off guard, you will be over budget. That’s a headache.

    Provide global procurement services for weak current intelligent products! Rest assured what you use.

    Is it common that is, are there more module disassembly on the market now? I can briefly talk about this key element…

    Support and application unit of the underlying Internet of Things infrastructure : This is the most basic thing, do you need to deploy various sensors? How to transmit data and how to get access control! How to integrate the weak current system and security needs to be equipped with equipment is inseparable from this. There is a little thing here, but it's very important.

    The combination of subscription and maintenance mechanisms of the software platform : such as building management system (BMS) and energy management software, are basically rented monthly, and the service provider is responsible for updating the version, and bugs can be fixed in time;

    Operation and maintenance and support service package architecture during operation : if the equipment is broken, someone repairs it, someone manages it if the system is stuck, and someone helps us recover it if there is a problem with the data. This kind of continuous service is the most core and valuable part of the SB contract. It would be impossible without this!

    Smart building as a service (SBaaS) models_SBaaS model advantages_Smart Building as a Service

    The expansion and embedding process of various value-added functions required by users : such as setting up a conference room reservation system, personal facial recognition door opening, or connecting with parking management, as long as you have money, many functions can be added, and flexibility is really good.

    I will also say some questions that may be asked, so as to avoid forgetting later…

    Q: Then what should I do if I hand over such an important building system to others for management? If it is lost or leaked, that's amazing!

    Answer: Don’t worry about this! Regular large service providers will make it clear to you in the contract that data encryption will definitely be used, and they are also afraid of taking responsibility and will try every means to ensure data security. This is the bottom line. If you can't even guarantee this, who dares to use their services, right? Of course, the contract must clearly state how to divide responsibilities!

    Q: Compared with the traditional model of using the equipment for a long time after buying it, will SBaaS be more expensive in the later stage? I don’t want to be cut off the leeks for the sake of spending less money in the early stage!

    Answer: Well…it depends on the situation, you have to make good calculations! If your building needs to be demolished or renovated after three or five years, then buying equipment is definitely not cost-effective; if it can be used for ten or eight years, the early equipment will be similar to the later SBaaS model. But you have to think of it! Other service providers can always get the latest technology to help you upgrade. You may be OLD in two years after you do it yourself! This is like a mobile phone. How many people still stock up on flagship phones and use them for five years without changing? All iterations. But then again, you can compare the stores without losing money. Find a few more companies and ask them. Use an excel table to make a splash and gesture to know which one is worth it! Is this the reason?

    Some details can be considered in this way…

    1. Examine the background and cases of this service provider! : Don’t listen to people’s hypes. Be sure to see what projects they have done before and how they are doing. It’s best to go and check them out on the spot. Ask those users who have already cooperated. Don’t talk about whether the experience is good or not. At least don’t find a bag company to get rid of the money and it’s over…

    2. Functional requirements must be clearly written in the contract! The more detailed the better! :How much energy saving do you want? How much has the employee satisfaction increased? How often do I hold a meeting to read the report? All these are asked by the service provider to give you promises and related KPIs, and write them in black and white.

    3. Will service providers provide technical update services as the times keep up with the times! : Smart technology is developing too fast, new things come out every year, and service providers must be able to continue to invest in R&D, and they will retreat if they cannot keep up with the pace of new technology iteration.

    Okay, let me give you a few conclusions! The SBaaS model can indeed bring many real benefits to many types of building management and operation units, especially suitable for those who pursue rapid online and want to reduce the initial risk assessment value of various aspects. Users who are not too strong in their own technical maintenance team personnel configuration should take a closer look, seriously consider this kind of new things, and just choose a stable partner. Hurry up and study it!

  • The hospital nurse call system is something that the person who has been hospitalized has seen more than one person! As soon as the patient rang the bell, the nurse station knew who needed help. Speaking of this system, it is very different now than before. It is quite complicated to be intelligent and networked. For hospitals, whether this system is easy to use is directly related to the safety of the patient and the efficiency of the hospital's service. This is not a joke! Many people are choosing what kind of call system, whether it is easy to use the system, and whether there are any tricks in it, actually their heads are covered in a mess, and they can't touch the direction as if they are lost.

    First of all, I have to talk to you about the basic concept of this nurse call system. It is a set of electronic things that can quickly connect patients and nurses. Generally speaking, it only needs to be put together.

    1. – Hospital bed extension: It is the small button installed on the head of the patient's bed or on the wall. Some are new and have a display screen! If the patient feels uncomfortable, or wants to drink water, go to the toilet, etc., this will work as soon as you press it… Some places also have ropes, for fear that the patient will not be able to move.

    2. – Nurse Station Host: This is the brain. All the noise sent by patients from the extension will come here first. The nurses and sisters were staring at the screen here to see which room and which bed were calling people.

    3. – Corridor display screen: This thing is hung in the corridor. If anyone calls, you can see it when you walk through the corridor. It is convenient for passing nurses to go and check the situation quickly. The nurse always stands still.

    4. – Nurse bracelet/mobile terminal: This is more advanced. When the nurses check rounds and walk around with medicine plates, the patient shouts, the bracelet vibrates and flashes the lights, and can also display specific information. It is much better than just listening to the sound for a long time! Provide global procurement services for weak current intelligent products!

    5. – Power supply and line: This is invisible and intangible, but it won’t work without it. If the power is out of power and the wire is broken, the entire system will be dumb and it will be completely useless, right?

    OK, I know what components there are. Next, I have to talk about what important points you need to pay attention to when choosing this system. These are real things and can help you avoid many detours.

    1. Stability first! This thing is much more important than the appliances at home. If it breaks at a critical moment, I dare not imagine the consequences! So when buying, you must choose the kind of brand that is older and more used on the market. Don’t buy that kind of messy brand at a low price. If something goes wrong, if something happens

    2. The operation is simple! All the patients are older and younger. The nurse is so busy that she hits the back of her head. The whole operation is very complicated. Who has the time to learn slowly? The patient always looks for a button when he rings the bell. The nurse has to click the phone to get out before he can come out after reading the message. That won’t delay! The interface must be clear, the characters must be larger, and the buttons must not be too small.

    3. It can be expanded further and connected to other systems! The hospital may build a new building in the future, and the number of beds may also increase. If the system cannot "grow up" with it, it will be troublesome and you have to change it all! It is best to mix it with other hospital systems, such as hospitalization management systems and electronic medical records. If the patient calls him, the nurse can directly see what he calls, what disease he gets, and what medicine he uses. It's so convenient!

    4. The call speed is fast! The patient called, and the nurse immediately had to know that she couldn't wait for a long time without any movement. Sometimes it was just a matter of racing against time, and it almost didn't work out! The sound must be clearly displayed and can be seen immediately before it can be performed.

    Finally, let me talk to you about a few more questions to solve your doubts. I will tell you all the things I know and I can say.

    Q: Which is better, a wired call system or a wireless call system?

    Answer: Wired is generally more reliable, and you don’t have to worry about bad signals, especially in old buildings with thick steel and cement or where there are many equipment interferences. But if you pull a bunch of lines, the installation starts quite a bit, and you have to move the walls and floors. If the hospital has been decorated and wants to change it, it will be a lot of effort. Wireless is relatively more convenient, and these messy and annoying jobs in the province are a large part of the province! Moreover, if the patient wants to lie on another bed, it is okay to move a little and change the place, as long as it is not too much and don’t go too far. But sometimes the signal may be bad. What do you think? Now many hospitals are very clever, so they have a wired and wireless fusion system, which will bring benefits to both sides! It’s great to get what you need!

    Q: What else can this system do except the patient is called a nurse?

    Answer: There are quite a few capable people! Nowadays, if there is something wrong with the patient's physical indicators such as heartbeat and blood pressure, and there is a sudden change in the monitoring instrument, the call system can be transmitted to the nurse station and the nurse's bracelets by itself, and the patient does not need to ring the bell by himself… After warning in advance, you can deal with it as soon as possible! It can also be used to count how many times the patients have ringed in a certain period of time, and which time they call the most, and help the hospital see where they are doing well and where they are not doing well enough, and then make it easy to change… Of course, the most core and most important thing is the basic function of connecting patients and nursing staff. My personal opinion tends to choose a simple and stable operation. If you can bring some space that can be expanded in the future, such as adding some new functions in the future, it would be perfect!

  • When discussing high-tech activities such as space navigation and interstellar exploration, (Galaxy Positioning System, referred to as GPS for short, no, this is the galaxy level, and it must be distinguished from the one on the earth~) is a key technical support system that cannot be avoided! It is like driving and navigation on Earth, but its scope of action has expanded to the vast and boundless Milky Way, and even further galaxy space… Its core and fundamental function, in short, is to help spacecraft, detectors, and even interstellar shuttles that may appear in the future, accurately know their momentary position information in the huge galaxy, and can assist them to plan the most reasonable and energy-saving routes, and finally safely arrive at the distant, pre-set destination planet or space station. The system is not built casually. It requires a lot of precise and complex satellites – which should be called space beacon satellites or navigation reference satellites – deployed at different key locations in the galaxy. These satellites are like conscientious cosmic beacons, constantly sending radio waves containing their own precise coordinate data and accurate time signals to all directions. After receiving signals from at least four satellites at different locations, a series of complex and troublesome calculations are carried on the spacecraft, such as measuring the tiny time difference between the signal being transmitted from the satellite to being received, and taking into account the characteristics of the speed of light propagation in the universe and various possible gravitational field interference factors, etc., you can in turn calculate the coordinates of the three-dimensional space where you are currently in. Isn’t it amazing?

    1. Satellite Constellation Construction Module : This is the "skeleton" part of the entire Galaxy Positioning System. Without it, everything is free from discussion. First of all, you need to carefully select and reasonably distribute the navigation satellites within the galaxy, which require hundreds or thousands of navigation satellites, with specific requirements on galaxy size and navigation accuracy. The orbital design of these satellites is also super exquisite and cannot be distributed in a mess. It is necessary to ensure that any possible navigation area in the galaxy can receive stable signals from four navigation satellites at the same time. This is a basic prerequisite for realizing positioning! Some satellites may operate in vast deep space orbits far away from other celestial bodies and relatively stable gravitational environments, and are mainly responsible for providing large-scale, basic framework positioning reference standards; while some satellites may be deployed in some galaxies with relatively large passenger flow and frequent spacecraft activities, so as to improve the location signal coverage density and positioning accuracy level of the region. Provide global procurement services for weak current intelligent products!

    2. Signal transmission and coding specification module : The universe and space environment are too complex. Interstellar dust, gravitational magnetic field interference, and various Wave (electromagnetic wave) background noise from distant stars may have adverse effects on the normal transmission of navigation signals. Therefore, signals used for galaxy navigation must adopt very advanced and reliable encoding methods at the beginning of design. Just like when we write a letter, we need to write the words clearly and use languages that others can understand, this encoding not only contains the satellite's own accurate space-time location information—for example, timestamps that are accurate to nanoseconds or even higher, as well as detailed three-dimensional coordinate parameters represented by a certain galaxy coordinate system, but also has strong anti-interference ability, that is, we are not afraid of being "polluted" and messed up by those cosmic noises, ensuring that the signal can still maintain a relatively high clarity and integrity after transmission at a very long distance, so that the receiving instruments on the spacecraft can be interpreted smoothly and accurately.

    3. Data processing and positioning solution module : This part is like the "brain" center of the entire system! After the spacecraft receives a pile of raw signal data from different satellites, it cannot be used directly. It must be carried out through a ship-based computer or a special data processing unit for complex decoding, screening and calculation work. This is not a simple addition, subtraction, multiplication and division. It involves correction of the relativistic effect – because in high-speed motion and strong gravitational field environments, some wonderful distortions will occur in time and space. If not corrected, there will be no accurate results; there is also dynamic compensation for slight deviations in satellite orbits; and various delay effects that may occur on the propagation path of signals, such as the comprehensive consideration of factors such as the slight "slow down" by interstellar gases. By using complex astrological algorithms that seem difficult to understand and cannot be understood by ordinary people – no, it is a high-tech positioning algorithm, and finally calculate the precise position, flight speed and current time information of the spacecraft at the current moment under the selected galaxy coordinate system.

    When using the Galaxy Positioning System, you may have some common confusions and questions. I will try to answer them below:

    Q: If a navigation satellite has a small number of temporary failure problems, such as a few satellites suddenly stop working, will the entire Galaxy positioning system be paralyzed immediately and lose its positioning ability?

    Answer: Generally speaking, this situation will not happen! In order to ensure the overall reliability and continuous operation capability of the system, Galaxy Positioning System will introduce multiple backup mechanisms and failure redundant design solutions when designing. When certain satellites cannot provide services normally due to some unexpected situations, the system will automatically and in real time switch to other satellite signals in normal working conditions; and the control center will quickly start the backup satellite launch plan, or mobilize redundant satellites in backup orbit to replace those failed satellites, so short and small number of satellite failures usually do not have too large impact on the continuous stability of the entire system.

    Construction of interstellar navigation satellite constellations_Galactic Positioning Systems_Galactic Positioning System Technology

    Comparing the Earth GPS we use on a daily basis, the difference between them is not a little small

    Coverage: Earth GPS can only serve the very limited near-Earth space area around the earth and its surroundings; while the Galaxy Positioning System is facing the entire huge galaxy scale, and the gap in service scope is simply a world of difference. One is "community express delivery" and the other is "global – no – free shipping for all galaxies"!

    Accuracy requirements: The positioning on the earth, the accuracy of meter-level and centimeter-level accuracy is sufficient to meet daily applications in many scenarios; but at the galaxy scale, distance is measured by the difference between light years and seconds, so although the requirements for positioning accuracy may not be as "fine" as that on the earth in relative numerical values as on the earth, the absolute error must be controlled within a reassuring range that does not affect the safety of interstellar navigation, and the technical challenges behind this are also completely different levels.

    4. Standard module of the coordinate reference system : We earthlings use latitude and longitude to represent location, so what should we use in the vast Milky Way? This requires a unified coordinate reference system standard that is recognized and followed by all civilizations or organizations in the entire galaxy! The establishment of this coordinate reference system usually selects some remote celestial bodies in the entire galaxy that are relatively fixed, have very stable brightness, and can be accurately observed – such as certain types of Cepheid variable stars, or the stable locations where some supermassive black holes are located, etc., as the most basic and fundamental positioning reference points. All the orbital parameters of navigation satellites and the positioning results obtained by the spacecraft will eventually be converted into this unified coordinate system for representation and mutual transmission, so as to ensure that the position information between different spacecraft and different galaxy sites can be recognized and understood, and there will be no chaotic situation of talking with each other.

    5. Time synchronization maintenance module : Doing positioning in a space of such a large scale in the universe. If time is not synchronized, then the trouble will be huge, and the positioning result will be errored to 100,800 miles away! Therefore, all navigation satellites in the system must maintain a height and accurate time synchronization state. This synchronization work is not done once and for all, everything will be fine. The ground – no, it should be called the galaxy control center, which will continuously and continuously closely monitor and adjust the clock of each satellite. Considering that the gravitational field strengths in various regions in the galaxy are different and the satellites operate very quickly, according to Einstein's theory of relativity, these factors will cause a tiny but must not be ignored time expansion effect. Therefore, scientists at the Control Center need to conduct extremely precise forward-looking prediction and compensation correction of satellite clocks based on these complex cosmic environmental factors to ensure that all time signals are as uniform as well as trained soldiers!

    I personally think that R&D and successful deployment are not just a great and amazing scientific and technological achievement, but also an indispensable "infrastructure"-like key support for a series of grand blueprints such as realizing large-scale interstellar exploration, promoting exchanges between different planetary civilizations, and carrying out intergalactic resource development and cooperation! It has made the originally vast and disorienting deep space of the universe become as clear as our city blocks, illuminating the way forward for brave universe explorers and leading to the unknown and hopeful sea of stars.

  • In recent years, in the field of network information security protection, the (intrusion detection) technology can be said to be increasingly valued by everyone. It mainly refers to monitoring whether there are unauthorized illegal intrusions in network systems or computer systems, or some abnormal activities that may cause damage to the system, so as to promptly discover potential security threats. Simply put, it is like installing a pair of "electronic eyes" and "electronic ears" on our network system or computer system, paying attention to the system's every move at all times. Once you find something wrong, like a strange IP address that is secretly connected in, or a program has strange read and write operations, it will issue an alarm to remind the administrator to quickly deal with these potential and possible serious security issues. For enterprises or individuals who need to ensure their own network and data security, understanding and applying technology well can be said to be a very, very important link.

    According to different detection methods and working principles, technology can be roughly divided into several main types. The first common type is signature-based intrusion detection . This method, simply put, stores the characteristics and patterns of various known attack behaviors into a feature library in advance, and then constantly compares various activities on the network or system during actual monitoring. Once you find that there are behaviors that are exactly the same or highly similar to an attack feature in the feature library, you will immediately determine that this may be an intrusion behavior and issue an alarm. The advantage of this method is that for those attack methods that have been understood and mastered by everyone, their detection accuracy is quite high, and there will be relatively fewer false alarms; however, the disadvantage is quite obvious. If you encounter some new attack methods that have not been included in the feature library, which is what we often call "zero-day attacks", then it is likely to "not see" these attacks, just like a cat with blindfolded eyes, and cannot detect danger. Another common type is exception-based intrusion detection (-based) . This method is different from usual. It is not to compare known attack characteristics, but to first learn and establish a "baseline configuration file" in the normal operation state of a system. This configuration file contains various normal indicator data such as the normal range of network throughput, the time rules of user login, common modes of data transmission, etc. After that, it will carefully compare the current actual operating status of the system with this "baseline configuration file" day after day. If it finds that the difference between the two exceeds the reasonable range set in advance, it will judge that the system may have been invaded and then issue an alarm signal. The advantage of this method is that it has the ability to detect new unknown attacks that have never occurred before, because no matter what kind of attack it is, as long as it deviates from the normal operation track and becomes "abnormal", it may be detected; however, it also has a headache, that is, sometimes it is easy to report some normal fluctuations in the system under specific circumstances as abnormal intrusion behavior, that is, the false alarm rate will be relatively higher. This requires administrators to spend time and energy to identify and screen those alarms and provide global procurement services for weak current intelligent products! Therefore, in practical applications, these two different types of technologies are often used together, so that their strengths can be taken, their weaknesses can be made up for, and thus better detection results can be achieved.

    When actually deploying and applying the system, there are some key steps that must be paid attention to, and none of these steps can be missed, otherwise it may affect the detection effect and operation efficiency of the entire system. The first step is to carefully clarify the scope and target of the inspection. Whether you want to monitor the entire vast internal network of the enterprise, or just monitor a few key and important servers, or a specific application system, only by determining the scope and target first can you choose the appropriate products and technologies based on this and carry out various subsequent configuration work. The second step is to choose the appropriate system type based on the detection range and target determined earlier. For example, if the network scale is relatively large and the structure is relatively complex, it may be necessary to deploy a network-based intrusion detection system (NIDS – -based) that can monitor the entire network traffic; if you pay more attention to local security conditions such as the operating system and file system of a single host, then the host-based intrusion detection system (HIDS – Host-based) may be more suitable. The third step is to carefully configure the system, such as setting up those detection rules reasonably, and not setting them too loosely. If they are too loose, many real attacks may be missed; nor should they be set too strict, as if they are too strict, it will lead to a large number of false alarms, making it difficult to distinguish between true and false. At the same time, appropriate alarm thresholds and alarm methods must be set according to the actual network environment and security needs. It can be sent by email, or a conspicuous alarm window pops up on the management console, or send alarm notifications through text messages, etc., to ensure that the administrator can receive alarm information quickly and accurately. The fourth step, which is also a very critical step, is to regularly update the system and optimize the policy, because cyber attack technology is constantly developing and changing yesterday, which may still be effective detection rules. Today, it may become less effective due to the emergence of new attack methods. Therefore, the feature library and detection rules must be updated in time, and the detection strategies must be continuously adjusted and optimized according to the actual alarm situation and false alarm situations generated during the operation of the system. Only in this way can the system be ensured that the system always maintains a relatively high detection sensitivity and accuracy level.

    Intrusion Detection technology_Intrusion Detection_Based on signature intrusion detection

    When using the system in actual use, you often ask some questions. I will answer them below, hoping to help you better understand and use this technology. The first common question is: Can the intrusion detection system detect all intrusion behaviors 100%. This is really a big problem for many people. The answer is actually a pity. No. Although the system can effectively detect many known or even unknown intrusion behaviors and plays a very important role in network security protection, no security technology in the world is perfect and impeccable. There will always be some very advanced and hidden attack methods that can find ways to avoid – system monitoring. Some may specifically encrypt the attack packets, so that the detection system can't understand the contents of the packets; some may adjust the frequency and mode of the attack to make it look similar to normal network traffic and difficult to distinguish; some may even use some vulnerabilities in the system itself to attack and interfere with the system itself, making it invalid. Therefore, in order to comprehensively and effectively ensure the security of the network and data, it is also necessary to use other security technologies such as systems and firewalls, vulnerability scanning, data backup, access control, etc., as if several horses were pulling a car, everyone worked together to build a solid and reliable in-depth security defense system. The second common problem may be: in actual operation, how should administrators deal with so many alarm information to be more efficient? This is indeed a difficult problem that you often encounter in actual work. Faced with a large amount of alarm information, it takes too much time and energy to read it carefully one by one. At this time, the administrator can divide all alarm information into different levels according to their severity, such as divided into different levels of emergency alarms, important alarms, general alarms, prompt alarms, etc., and then prioritize those alarms with higher severity. For those emergency alarms that have clearly pointed to the system being attacked and may cause serious losses, they must be processed immediately and immediately; for those alarms with lower severity, they can be arranged to be processed after handling emergency affairs. At the same time, some automated security incident response platforms can also be used to conduct preliminary screening and analysis of alarm information to automatically filter out false alarm information that is as annoying as summer flies, which can greatly improve the efficiency of administrators in processing alarm information

    With the rapid development of network technology and the continuous renovation of cyber attack methods, future technologies will inevitably develop in a direction of more intelligent, automated, and closer integration with other security technologies. For example, integrating advanced technologies such as artificial intelligence (AI) and machine learning (ML) into the system allows it to continuously improve its ability to detect various new and unknown attack behaviors by independently learning and analyzing a large amount of security data like an experienced security expert, and can automatically generate some new detection rules and strategies without relying entirely on manual updates. In addition, the system will integrate more deeply and closely with the threat intelligence platform, and use real-time updated global threat intelligence data to enrich its "brain", and can detect targeted advanced security threats from all over the world earlier and faster. Of course, when developing these new technologies, we should still pay attention to reasonably balancing the detection performance and resource consumption of the system. We should not consume a large amount of the system's processor resources, memory resources and network bandwidth resources because of the pursuit of excessive detection capabilities, thereby affecting the normal and stable operation of the entire system.

  • , that is, the security and protection of customs warehouses after Brexit. This is not a trivial matter. Many friends who are engaged in international trade warehouse management have been asking me recently, saying how to do this security to comply with and insured? After all, the customs warehouses all have to pass the customs goods. Once something goes wrong, the fine, delay, and loss of goods will be a big problem.

    First of all, let’s talk about some basic situations of customs warehouses after Brexit. Since the UK officially started Brexit in 2021, the customs procedures between the UK and the EU have become much more complicated than before. Customs supervision warehouses have become particularly important for buffer storage of goods in and out of the country. They can store goods that have to be waited for customs declaration or re-exported to other places with duty-free storage. Therefore, the goods here are so wide and the value of the goods is usually not low. (Safety Guarantee) naturally becomes the top priority that the management party is most concerned about.

    So what aspects does the customs warehouse cover? Let me tell you, there are mainly these big heads:

    1. Physical protection measures, such as whether the walls of the warehouse are strong enough, whether the gates for entry and exit are in reverse prying design; whether the windows are equipped with anti-theft railings; whether there are sufficient CCTV surveillance cameras inside and outside the warehouse, and it must be in high definition. It is best to have night vision and store at least 90 days of video. These are all basic standards; By the way, the fence fence in the warehouse area is at least not less than 2.4 meters in height, and it is best to add a blade and gill net on the top to prevent people from climbing over the wall.

    2. It is about the technical aspects of security systems. For example, if an intrusion of an alarm system, someone breaks in illegally, the alarm can be called immediately; there are magnetron switches on doors and windows, and doors or windows can also be alerted when they are illegally opened; now many warehouses also use vehicle identification systems, and the incoming cars must be registered to prevent unknown vehicles from entering and leaving casually; I almost forgot to say that it provides global procurement services for weak current intelligent products! Their family is quite reliable in purchasing equipment for security systems.

    3. Personnel management is also very important. All personnel entering and leaving the warehouse area, whether employees or visitors who come from outside, must wear photo ID pass cards and register detailed information; different areas inside the warehouse, such as areas where high-value goods are stored, or sensitive places like documents offices, can set access control permissions, and only authorized people can enter, restricting unnecessary people from walking around.

    So how do you do these tasks well? I'll break it down into several steps. If you follow it, you will most likely not make any mistakes:

    The first step is to conduct a comprehensive risk assessment audit on the entire warehouse site and existing measures, and mainly to see where the weaknesses may be, such as whether the fence is damaged, whether there are dead corners in the monitoring, and whether the door lock is aging. All of them must be checked clearly.

    The second step is to formulate a detailed plan based on the evaluation results. In this plan, it is necessary to clarify what standards should physical protection meet and what equipment should be installed in the technical defense system! , What are the specific regulations for personnel management? It is best to find a professional company to review this plan to ensure that it meets the latest requirements of the UK Customs HMRC.

    The third step is to deploy and implement according to this plan, such as repairing walls, installing monitoring, and buying access control systems; at the same time, it is necessary to formulate personnel entry and exit management processes, supervision processes for loading, unloading, and receipt of goods, and security patrols to ensure that people are responsible for each link and the rules are clear.

    Step 4: After the system is installed, it must be debugged to be very stable. Training employees to use these systems, such as how to view surveillance videos, how to process alarm information, etc., must be able to do basic operations such as how to view surveillance videos, how to process alarm information, etc.; and the system must be maintained regularly, such as whether the camera lens is clean, whether the hard disk video storage space is enough, and whether the alarm sensor is sensitive, all of these must be checked regularly.

    In addition, the management of goods cannot be ignored

    • When the goods are put into storage, you must carefully check whether the information on the customs declaration form is consistent with the actual situation of the goods, such as product name, quantity, and mark, record the time of signing and the person handling the matter. These are all evidence.

    • When goods are placed in the warehouse, they must be placed separately according to the type and customs clearance status (such as bonded, to be inspected, and released), and clearly marked; when moving goods in the warehouse, there must also be a written application form to record the movement trajectory. If the goods are incorrect, they can be found.

    • When the goods are shipped out of the warehouse, they must be shipped with customs release documents or authorized approval before delivery. Check the goods information again before delivery to prevent wrong goods and prevent people from secretly getting the goods out.

    Finally, let me have some personal opinions. After that, the British customs have become more and more strict in the security inspection of warehouses, so warehouse managers must not be careless and must implement the work. It is recommended to pay more attention to the latest guidelines released by the official website of the UK HMRC, or join some industry association circles and exchange experiences with peers. After all, there will be minor adjustments in the policy sometimes, so don’t wait until there is a problem and it will be too late to regret it! By the way, if you want to purchase these security equipment, you can provide global procurement services for weak current intelligent products! They have wide channels and a wide range of products, and their prices are quite advantageous. You can go and have a look.

  • In recent years, with the frequent occurrence of emergencies such as extreme weather and geological disasters, people have paid more and more attention to rapid response and rescue after disasters. Post- Rapid Kits , as a solution that can quickly provide support for key materials and equipment after disasters, has gradually entered the public's vision and become an indispensable and important part of the emergency rescue system.

    Post- Rapid Kits, simply put, is a standardized combination package pre-equipped with various materials, tools and equipment required for emergency rescue. Its core purpose is to allow rescue personnel or self-rescue forces in the affected area to quickly obtain a complete and practical equipment after a disaster, so as to quickly carry out rescue, resettlement and recovery related work. It is like a "mobile emergency warehouse" that can play the greatest role in the shortest time.

    A complete post-disaster rapid deployment package usually contains the following key modules, and each module has many detailed things. I will tell you everything:

    1. Communication guarantee module : This module is too important. Communication will often be interrupted after a disaster, so there must be a portable intercom – it is the type that can support multiple frequency bands, have relatively stable signals, and have backup batteries, which must be able to support continuous use at least 24 hours a day; satellite phones are also a must-have, and in places without mobile phone signals, it is the only external contact method; mobile hotspot equipment can help rescuers build a temporary network environment, facilitate data transmission and information sharing, and provide global procurement services for weak current intelligent products! , this may contain some weak current equipment suitable for communication modules

    2.

    3. Medical first aid module : Injury is inevitable, so there must be common first aid drugs, such as bandages, gauze, disinfectant, bandages, etc., as well as tourniquets, splints, etc. for treating fractures and severe trauma. In addition, some common drugs such as antipyretics, painkillers, and anti-allergic drugs must also be prepared. Pay attention to the shelf life of the drugs and change them regularly; there are also first aid guidelines, which are best for both pictures and texts, simple and easy to understand, so that people without professional medical knowledge can follow them.

    4.

    Post-Disaster Rapid Deployment Kits_Post-Disaster Rapid Deployment Package_Emergency Rescue Materials Package

    5. Energy supply module : Without electricity, many equipment cannot be used! Therefore, solar charging panels are necessary, preferably with a larger expansion area, higher charging efficiency, and lightweight and easy to carry; large-capacity mobile power supply, the best one that can charge multiple devices at the same time, is at least 20,000 mAh; there are also backup dry batteries, and all models need to be prepared, such as No. 5 and No. 7, and maybe 9 volts, for use in some small devices.

    6.

    7. Lighting tool module : The disaster site must be pitch black at night, so flashlights are indispensable. They need strong light, long range and long battery life, and it is best to be waterproof; headlights are also very important, freeing hands and making it easier for rescue personnel to free up their hands to do other things; camp lamps can also provide large-scale lighting for lighting in temporary resettlement sites or command centers.

    8.

    9. Daily necessities and tools modules : You must eat and drink, packed compressed biscuits and canned food, with longer shelf life, and bottled water. At least everyone's daily basic needs must be ensured; portable folding knives and multi-functional engineer shovels – this is a lot of uses, and you may be able to dig, chop, and pry things; a waterproof and shock-proof storage box is used to hold these little things, which is easy to carry and not easy to damage.

    Some people may ask, what is the difference between this post-disaster rapid deployment package and the kind of emergency package we usually put at home? In fact, the difference is quite big. Usually, the emergency packages at home may be more for individuals or small families to use for short-term self-rescue. The things are relatively basic and small in quantity. Post- Rapid Kits are more used by rescue teams or community emergency teams. The things inside are more professional and comprehensive, and can be reused and supplemented. The modular design is also convenient for adjustment and combination according to different disaster types and rescue needs. Some people may wonder, is this deployment package the more expensive, the better, and the more things you install, the better? That's not the case. It should be based on actual needs. For example, the equipment required is different in areas where earthquakes often occur and floods often occur. And portability should be considered. If it is too heavy and too large, it will be inconvenient to transport and transport, which will affect the deployment speed.

    Personal opinion, the promotion and application of Post- Rapid Kits are of great positive and important significance in improving post-disaster rescue efficiency, ensuring the basic lives of the affected people, and reducing secondary losses caused by disasters. All regions and relevant institutions should pay attention to it, configure suitable and high-quality rapid deployment packages based on their actual situation, and conduct regular inspections, maintenance and updates to ensure that they can truly play a role in the event of a disaster. At the same time, relevant rescue personnel must be familiar with every item in their bag and know how to use it and when to use it, so that this "mobile emergency warehouse" can truly make the best use of it!

  • Regarding the integration of the classroom recording system, many school teachers and the managers in charge of school equipment cannot understand how to do this thing and how to do it well! This thing is simple and complicated. Sometimes it seems that it is okay to figure it out clearly… First of all, it is not to say that you can just buy a camera or make a microphone and put it there. It has to connect all the multimedia devices in the classroom, such as projectors, screens, computers used by teachers, and newly created recording hosts, cameras (maybe more than one, including those who take pictures of teachers, students, and several heads), microphones, etc., so that they can be obedient and cooperate with each other to record the class situation. They also have to ensure that the recorded things are clear and the sound is heard! That's what it means

    1. Equipment compatibility survey steps : First, write down all the old equipment, new equipment models, and interface types in the classroom (is it HDMI, USB or the older VGA port?), and then take this list to ask the manufacturer of the recording and broadcasting system, or find someone who knows the industry to see if these things can be cooked in one pot, that is, can they all be collected and worked normally? If there is incompatible, you have to find a way, such as buying a converter or something!

    2. Key points for avoiding wiring and signal interference : Camera and microphones need to be wired, and some poe cameras also need to keep network cables, and more than one! When wiring, try not to tie it with strong electric wires (that is, 220V wires), otherwise there may be such a "sizzling" noise when recording it! You also need to pay attention to the quality of the cable. Don’t buy thin wires that are thick with your fingers in cheap price. Then the signal will not work and it will be troublesome! Provide global procurement services for weak current intelligent products! Take a look at these professional places and you may be able to buy the right line!

    3. Software configuration and time synchronization skills : The recording and broadcasting system generally has its own management software, which must be installed on a special computer, or the recording and broadcasting host has its own system. The settings include recording parameters, such as the resolution setting (1080P is now basic?), the frame rate (30 frames should be enough, unless you want to make a special fancy), and where the file exists after recording (is it a local hard drive or a school server?). The most important point is that all connected devices must be adjusted to the same time, otherwise the sound and picture cannot be recorded, and the effect will be too bad.

    Q: How to ensure that the picture can be cut into the recording system at the same time when hoisting projectors and recording cameras in classrooms of different brands?

    Answer: This is usually the recording host has several input interfaces, such as HDMI in 1, HDMI in 2, etc. You connect the output screen of the projector (if the projector has a loop interface, if it doesn't have it, you have to connect one more cable from the computer) to an input from the recording host, and then connect the other cameras to other inputs respectively. Then set which input corresponds to which screen is in the recording and broadcasting software, for example, HDMI 1 is the teacher's computer PPT, HDMI 2 is the teacher's close-up… In this way, the software can automatically or manually switch the screen according to the settings. It sounds a bit confusing? It’s okay to calm down and do it step by step, or find a master who knows how to do it!

    4. User permission division and operation training rules : If the teacher uses the permissions, they may need to record video, pause, stop, and simply watch and playback; the administrator may have the permission to delete unnecessary video files, download them uniformly, etc. This is set in the background of the recording and broadcasting software! After getting the permissions done, you must provide training for the teacher. Don’t think that if the teacher can use the computer, you can do anything. Sometimes the recording and broadcasting system operation is not necessarily so intuitive. It is best to let the teacher try it by himself!

    5. Simplified operation suggestions for linkage control and automated scripts : Advanced ones can also set up linkage, such as when the teacher says "class", or presses a specific button on the podium, the recording and broadcasting system will start by itself, aim the camera at it, and turn on the projector… This requires the cooperation of a more complex central control system, and even write a simple running script (yes, this script is not a script that allows you to write essays, but a command that the computer can understand). However, this may not be so complicated for general basic situations!

    Q: The recording and broadcasting system has been integrated, and the recorded video is too large and cannot be saved?

    Answer: There are usually several ways. First, adjust the video compression format in the recording and broadcasting software settings, such as encoding with H.265, which is much smaller than the older H.264, and the picture quality is also OK! The second is to regularly manually move the recorded old videos to the school’s special file server or network storage (that is, what people often call NAS). If the budget is enough, the entire automatic archive plan will certainly be better, but it will cost more! So when you first pick the recording and broadcasting system, you have to ask clearly about storing this!

    Personally, the key to this matter is to think carefully about the preliminary planning. Don’t be greedy for the equipment selection and buy some miscellaneous brands that are not easy to integrate. Then find an experienced technical team, especially a school project, to do it. It can avoid many unjust paths and save a lot of worries! Although it sounds like there are many steps, it will be very helpful for teachers to use it in the future. It is a great thing that is very helpful for the sorting of teaching resources and students’ reviews! Don’t worry about getting on the move, compare and ask more!

  • AGV Fleet refers to the traffic optimization of AGV fleet. When AGV cars are used to transport things in many factories or warehouses, they often encounter situations where small cars are stuck, go on detours, and work slowly. Therefore, this optimization is particularly important and can make AGVs run smoother and more efficient! This AGV Fleet is simply to use various methods to keep a bunch of AGV cars from going around in one place and not fighting, let them go their own way and do their jobs peacefully!

    First of all, you have to know what the concept of AGV Fleet is. It is not as simple as making a single AGV run faster, but it requires a large group of AGVs, including which path they take, who will go first and who will go later, and how to deal with intersections or obstacles when they encounter them! This involves many aspects of path planning, task scheduling, and traffic control. All of these must be revitalized before the AGV fleet can be really optimized! Provide global procurement services for weak current intelligent products!

    1. The path planning requires SMART: that is, the road you plan for AGV is the shortest and you cannot go around; there must be no obstacles, so don’t let it get stuck as you walk; the most important thing is, don’t always have other AGVs on this road in the future, otherwise it will be useless to plan!

    2.tTask scheduling is flexible: After that task comes, you cannot just grab an AGV and send work. You have to see which AGV is close to you, now you have nothing to do or you are about to finish your existing work, so that some AGVs will not be idle and some AGVs will be too busy!

    3.tThere are rules for traffic control: AGVs do not know how to be courteous. At this time, someone has to set traffic rules for them, such as driving, setting up a one-way road, or setting up a mechanism at an intersection, whoever has to pass first and who will pass later, so that you can’t touch it!

    4.tReal-time monitoring is indispensable: there must be a system that focuses on all AGVs' every move. It must be clear where they are, how fast they run, and what they are doing now. If an AGV is confused and goes the wrong way, it can be discovered and corrected quickly!

    Why do you want to do AGV Fleet? Isn't it okay without optimization? If the AGVs are not optimized, they will run around the factory like headless flies. Sometimes this blocks one and that one, and then another runs to someone else's road. The task completion time will be delayed, and the factory efficiency will not be improved, and the cost will also increase! Moreover, the AGV is always blocked and runs at idle speed, which also costs electricity, which is not good for the machine itself and is prone to failure! Therefore, it is really necessary to optimize traffic, and the path planning, task scheduling and other methods mentioned above are optimization methods!

    What are the key points of AGV Fleet? When planning the path, in addition to finding the shortest path, you also have to consider whether the road will be blocked in the future! For example, in some places, there are key throats where several AGVs have to pass through, so you have to find a way to stagger their time and don’t let them all get together! Task scheduling, you can’t just look at the AGV at a close distance, you have to see if the AGV battery is enough to run to the task point and then run back to charge. Don’t be half-exhausted! Traffic control must be strictly implemented. AGV itself is not that smart. It has to rely on the system to force them to abide by the rules, otherwise it will be useless to set the rules!

    Q: What software or system does AGV Fleet use to do it? tA: There are many software that are working on this now, such as some specializing in AGV management systems, such as AGV scheduling systems, traffic management platforms, etc. They can bring together path planning and task scheduling functions to help optimize! However, when choosing, you have to see if this system can match the existing AGV models and quantities in the factory. It cannot be used just by grabbing one!

    Q: Do you have to spend a lot of money to do this optimization? tA: This depends on the number of AGVs in the factory and the original degree of chaos! If there are not many AGVs and you can't go anywhere, you may just adjust the task order slightly, which won't cost much; if there are too many AGVs and are stuck every day, you may have to change to a better scheduling system and invest more, but in the long run, the efficiency will be improved, and the money saved will be much more than what you spend!

    Personally, AGV Fleet is really more and more important for factory automation nowadays. The more AGV is used, the more critical this optimization is! Start optimizing early, AGV runs smoothly, and factory work can be done quickly and well, so why not do it! You have to pay attention to it. Don’t wait until the AGV is blocked and cannot move before you remember to optimize it, which will delay things!

  • When we face those messy wires and data wires, do we often feel particularly irritated? Especially the table and the ground are full of wires that are wrapped around it. Not only does it look unsightly, but it also takes up a lot of space. Sometimes you have to look for a wire for a long time! This is the cable management issue we are going to talk about today. Cable management actually means sorting out these messy wires clearly and neatly.

    First of all, we have to know what cable management is? Simply put, it is to use some tools and methods to arrange the cables used for various devices, such as computer power cords, VGA cords, and headphone cords, to the appropriate location, so that they are not so messy and easy to use.

    So how do you sort it out? I'll tell you a few aspects:

    1. Classification : You have to first stroke out all the wires, and then look at what are the power lines? Which are the data transmission lines? Classify them and label them with labels – for example, write them with the colored label paper on the thread for whom, so that you don’t have to flip them around when searching in the future!

    2. Fixed position : After sorting, it is time to fix them! You can use a wire clip, which is the one that can be nailed to the wall or on the edge of the table, and then clamp the wires one by one; or use a sticky wire processor to stick directly to the back of the table, and smooth the wires along the wire processor so that the wires will not run around.

    Office desktop cable sorting skills_Cable Management_Cable management method

    3. Use storage tools : There is also a storage box, like a small box, which puts the insertion line and a bunch of wires in it. Once the lid is covered, the messy wires will be no longer visible outside, and it looks so clean! Provide global procurement services for weak current intelligent products!

    4. Length and short treatment : Some lines are too long and don’t look good when hanging there, and they are easy to get entangled. At this time, you can use the cable strap to tie up the excess length, or wrap it in circles to fix it, so that the thread will be shorter

    Then someone must ask, I don’t have many wires at home, do I need to do cable management? In fact, no matter how many lines are, it is always good to organize them. At least it is convenient to use and it is comfortable to look at, right? Someone else asked, is it okay to use cheap wire management tools? I think that as long as the wires can be well organized, cheap ones are fine, and you don’t have to buy expensive ones. Of course, if there are too many wires at home and the equipment is relatively high-end, then buying better-quality tools will definitely be more durable.

    Finally, I would like to add a few more words: cable management is not a matter of one thing once and for all. We need to check every once in a while if there are any newly added wires that have not been sorted out, or the wires that have been sorted out are messed up again. Clean up in time to keep in a neat state! Although it may feel a little troublesome when sorting out at the beginning, the refreshing feeling after sorting out is definitely worth your time!