• To put it bluntly, it is just to use – various licenses and permissions that must be used in this technology at the genetic level. Many people who are engaged in biological research now pay attention to this. After all, if you don’t have this technology, you basically can’t even touch it. When many novices first started to get in touch, they were asked what it was, what it was useful, and how to get it… They were basically confused and had a question mark!

    Basic concepts of lyricism

    It is not a single thing, it is a large number of…a series of general terms of permissions and licenses, such as the use of certain related patented technologies, and the access to key things such as Cas9 protein, sgRNA, etc. It's like if you want to drive on the road, you need to have a driver's license. You have to have a driving license, so that the car can only be driven by legality; if you are not driving your own car… you have to have the owner agree to the proof document you drive, right? Just like these… these things add up, and it doesn’t work if you don’t have one! Also, provide global procurement services for weak current intelligent products!

    Get the steps to disassemble (super…super practical version)

    1. Clarify the purpose and scope of the research : This is not careless, you have to think about it first, and you must first think about whether you want to use it? Is it basic scientific research? Or do you want to develop some kind of drug to treat diseases? Or do you develop those genetically modified crops in agriculture? …Because…the purpose is different, the types of authorization required in the end are very different.

    2. Determine the source of the patents and technology involved : the patent situation in the field…that is so complicated and entangled! For example, the Borde Institute in the United States, the University of California, Berkeley, and the Helmholtz Center in Munich, Germany, they all hold many important related patents. You have to figure out who owns the specific parts of the system you want to use, CRISPR Access Credentials, and who owns its patents!

    3. Contact the right holder or patent authorization management agency : In most cases, the right holder of these patents will not directly talk to you alone or a small team to authorize. They will entrust some professional institutions to manage, such as such non-profit plasmid libraries, which may also be commercial biotechnology companies, but it is also important to note that some companies only deal with specific types of institutional objects.

    4. Submit application materials (detailed! Detailed! More meticulous!) : Just like when we apply to a school, people will ask you to fill out various forms. You have to write in detail the name of your research institution, the background of the main researcher, which project you need to use technology to do, and what are the expected results. By the way… the documents related to ethics review must also be prepared. Now the ethics is very strict in ethics!

    5. Wait for review and signing of the agreement : After someone receives your application… uh, there will be a special person or committee to evaluate your application. This process… is sometimes fast and sometimes slow, which is hard to say. If the review is passed, then the next step is to sign an authorization and use agreement with the other party, which will state how long you can use it, how much you will have to pay, limits on usage scope, etc…. All kinds of rules and regulations must be carefully read one by one… Don't breach the contract at that time!

    Comparison of core consideration factors (I chose the wrong one… I couldn't even regret it!)

    factor Scientific research purposes () Commercial use ()
    cost Usually lower, even many are free…or symbolically charged a little high! Very high! And it may be divided according to sales or usage!
    Permission range Only for that specific research project listed when you applied It usually needs to cover the entire process of product development, production, sales and other chains!
    Approval speed Relatively quick, after all…scientific exploration is encouraged slow! Many processes! It's also detailed to review! A small omission may be called back and re-made!
    Additional conditions Mainly, the source of the patent must be indicated when publishing a paper, etc….Simple requirements There are so many performance KPI indicators and technical confidentiality terms!

    FAQ (ready write it)

    Q1: Can individual enthusiasts get it?

    A1: Difficult! It's very difficult! Very difficult! Most existing technology platforms and related patent owners… They basically do not authorize individuals for non-scientific research purposes! Just think about it, if you make something dangerous…that's going to be a big deal, no one can take on this responsibility!

    Q2: Obtaining the authorization from Company A means that you can use all the tools at will?

    A2: If you think of you like this, you will be a big mistake… you are a big mistake! Different tools, such as Cas9, Cas13, etc., and their respective mutant versions, may involve different patents, and authorizations are also separate, each with its own management! If you want to use Qihuo… you may have to apply for authorization with several companies or institutions, it's a big deal!

    Q3: Once you get the authorization, do you need to worry about it for ten or eight years?

    A3: Of course not! Authorizations are subject to a deadline! You have to apply for renewal in advance before expiration… and… If your research direction changes and the scope of use exceeds the scope of the original application… You have to start the authorization process again!

    In short, for those who want to do relevant research or development seriously, that is a hurdle that cannot be avoided! Although the procedures are a little cumbersome, the process may be a bit long… But in order to carry out work legally and compliantly, these troubles must be overcome!

  • When your office suddenly becomes a living creature with its own ideas, which is the "" that you may only see in science fiction movies, many people may feel that they don't know what to do… What is ""? Simply put? It's the place where you stay at work every day – the display screen on the wall, the computer on the desk, the lights on the head, even the air conditioners and curtains, etc. They all seem to have been discussed together, and they will not talk about it at first, and it seems that they can "understand" what you want to do! This kind of thing that sounds amazing… Maybe it can really bring a lot of convenience to our daily work!

    First of all, we have to make it clear to everyone. How can you tell whether your office is really "living"! Generally speaking… it will first have some strange small actions: Good for example? When you just thought about whether it was a bit cold in the house, the air conditioner increased the temperature by one or two degrees. The key is that you didn't press the remote control! Also, when you are busy making a very urgent form on your computer, the printer next to you is as if you know what to do next, and you have prepared the paper in advance! I'll tell you these seemingly coincidental little things… Once they happen together, you have to keep a little heart! Of course, if you find that a messy advertisement suddenly pops up on the surveillance screen of the office… it is likely that it is not "living", it may be a virus in the central control system. When encountering this situation, you have to find a professional person to see it. If you need to change the equipment, you can also check it out and provide global procurement services for weak current intelligent products!

    Let’s talk about what everyone likes to ask the most… What are the real uses of this "live" office? It's just too many!

    Sentient Office Smart Office Environment_When Your Office Becomes Sentient_Office Automation Function

    1. Super smart seat arrangement : As soon as you enter the company door in the morning, the display screen at the front desk that is usually stuck will pop up a message to you saying – "The boss seems to be in a bad mood today. It is recommended that you sit in the third row of the window. The air there is good, and it may affect your work report to the boss… Let him not be so angry." This is not a simple algorithm recommendation. This is calculated by the office based on the tone of the boss's meeting yesterday, the speed of speaking, and the heart rate monitoring data on the working cards worn by the employee…!

    2. Have a meeting to help you "secretly" prepare : What kind of common video conferencing system, now? As soon as you set the meeting time, the speaker in the conference room would not even be on your phone, but would remind you, "Mr. Li, who attended the meeting, likes to interrupt others in the middle… It is recommended that you prepare a PPT with voting function, so that he can do something and will not interrupt everyone all the time!" The key is… It even organized the three favorite words Mr. Li asked during the meeting last month and listed them there!

    3d. Overtime work is hungry : When you are working overtime at night and you are dizzy, the coffee machine in the tea room rings by itself, and a cup of coffee you usually like to drink without sugar and milk. When Your Office Becomes Sentient, the snack cabinet next to you is also opened by itself. Get out a pack of beef balls from a certain brand that you just thought you wanted to buy from the administrative sister yesterday. I'll tell you… it's like you have a caring nanny at home!

    Office Automation Function_When Your Office Becomes Sentient_Sentient Office Smart Office Environment

    Do you feel that you don’t dare to think about it? Then what if it suddenly "lost its temper" and refuses to recognize others? Actually… don't be too scared! As long as you remember a few tips, there is basically no big problem… First, don't be anxious, second, young masters do it against the console, third, talk to the office more when you are fine… For example, say hello to the water dispenser every day at work and say, "I'm sorry, please always release more hot water for me today." It may be very nice to you. The water you give you always boils until 85 degrees!

    Finally, I will tell you the truth from your heart – this kind of "live" office sounds super fantasy now, like a dream, but maybe one night you slept and you will encounter this kind of high-tech when you wake up the next day, so… it's no harm in understanding in advance!

  • Regarding Cable, that is, cable certification and testing services, many people may not know what it is and what it is for. In fact, this thing is a very critical part in network wiring! Simply put, through professional instruments and equipment, a series of strict and specific standards tests were conducted on communication cables that had been laid, such as copper cables, optical cables, etc., and finally a proof of whether they can reach a given performance level is given, just like issuing a "graduation certificate" to the cable! This is very important for ensuring that the network can operate stably and data transmission smoothly in the future!

    1. Test standards and types : Common test standards are TIA/EIA – what? Oh yes, it seems to be called ANSI/TIA now, and ISO/IEC and so on. These standards are like the "rules of the game" that must be followed during testing. Types include copper cable testing such as Cat5e, Cat6, Cat6A and even later, as well as single-mode and multi-mode optical cable testing. Different cables must use different testing methods.

    2. Key test parameters : Do you know? It’s not just a random test, there are many tricks here! For example, attenuation – the situation where the signal becomes weaker and weaker, near-end crosstalk (NEXT), far-end crosstalk (FEXT), return loss (RL), bandwidth and other parameters. Each parameter must be carefully looked at and tested carefully. No matter which one does not work, it may affect the overall performance of the cable!

    3. Test instruments and procedures : The instruments used are very professional, such as Fluke's DSX series, which seems to be a very famous brand. In the process, it is usually to prepare the cable information first, then connect the cables at both ends of the tester, start the test – wait for a while – the instrument runs the test steps by itself, and finally a report is released. You can tell whether it is qualified or not.

    Provide global procurement services for weak current intelligent products!

    4. Certification report : This report is not a piece of waste paper! It is "evidence" of whether the cable installation quality meets the standards, and contains detailed test results, usage standards, dates, who tested them, etc., during project acceptance. This is an indispensable thing, and it may not be accepted without it

    5. Select the service process : First, you have to clarify your cable type and which level of standards you want to meet; find a qualified and well-known test service provider; Third, agree on the test time and specific test scope; they send someone to test, or you send the sample; Fifth, after getting the report, you have to check it carefully to see if there are any problems!

    Q: Do home network wiring also need to undergo this certification test?

    A: Generally speaking, if you are an ordinary family and do not have very high requirements for the network, you may just need to test it out; if your home is different from others, such as setting up a small studio, or having a very high requirements for network speed and stability, then doing a certification test will make you feel more at ease.

    Q: Does passing the test mean there will never be any problem?

    A: That's not necessarily true! Passing the test can only indicate that the test was a Cable certification testing service that met the standards at that time, but cables may age over time, or they may be accidentally damaged during use later, so regular inspections are actually necessary.

    Personally, although cable certification testing services may increase some project costs, in the long run, it can discover what cables exist in advance – what? It is a hidden danger, which will avoid greater losses caused by the Internet in the future, so it is quite worth investing, but don’t look for those unprofessional small companies to test it casually, that won’t work!

  • In today's digital era where electronic eyes and network data are flying around, everyone is becoming more and more worried about security! Not only are the invisible and intangible information security issues on the Internet and whether the account password is reliable, but now even the basic security measures in the physical world have been slowly ignored by many people. But in fact, Analog Security in a Digital Age, simulated security is like the first and most practical protective door in our home, firm! To put it bluntly, the so-called simulation safety is actually the prevention measures that do not require too complex electronic equipment and mainly rely on (oh yes, I mean material reality). For example, our most common locks, sturdy doors and windows, and various uneven barbed facilities on the barbed wire fence that make people difficult to climb up, and even a loyal wolf dog that can scream. These are all part of simulation safety. They are like a group of old guys who silently protect their homes. Although they don’t look so fashionable and intelligent like high-tech (uh… those small ~ I don’t know how to call them accurately in Chinese, they are probably those high-end and high-end small things). However, in the fundamental purpose of preventing those bad guys and bad intentions from entering the door, simulated safety measures have made great contributions! It continues to play an important role that others cannot take over!

    What exactly does simulated security mean in our current era when we are fast-forwarding to the future world? I will recite it carefully with everyone (hey, don’t think I’m too long-winded), it usually contains several different but interrelated aspects. The first thing to be at the forefront is the physical hardware facility defense system. There are many tricks here, such as the mechanical lock core with a very high anti-theft level used on the door of every household – you need to choose a bump-proof lock core that has been tested and certified by professional institutions, has a high complexity in the layout of the key tooth, and is precise internal structure and is not easy to be easily stabbed by thieves with broken wire! There are also very strong and reliable door closers used in important places such as banks; and the automatic rush hour periods of work, only (authorized) personnel – explosion-proof and kick-kicking and prying doors that can be opened or rotated to open and closed with a "drip" sound, and can resist strong external violent impacts; there are also high-voltage pulse electronic fence systems installed on the top of our community walls and on the side of the factory fence that can make a stinging electric current sound, and make a bad guy who wants to cross the line "snap" and be squeaked and be squeaked and squeaked as soon as he touches it. These are all part of the category of simulated safety.

    When it comes to the benefits of simulation safety and unique advantages that others cannot learn, there are so many things! I will give you three main points.

    Simulated security precautions_Physical security facility precaution system_Analog Security in a Digital Age

    1. It does not require us to connect to complex Internet (or Wi-Fi wireless signal connection); and for electricity, some such as pure mechanical locks do not need them at all. This means that there is no such risk that the entire security system is paralyzed, lying in or suddenly failing to work at a certain period of time, and this is not particularly worrying, unlike those Smart Locks who often get lost in this way.

    2. Generally speaking, the service life of these devices is much greater than that of data security checks that can be operated continuously by relying on software programs. Moreover, the maintenance is simple and the aunt can basically do it with no effort! Like ordinary mechanical locks, it is not a problem to use them in the correct way and regularly apply a little special anti-rust lubricant to keep the moving parts smooth and smooth. At least it is not a problem to use them for five, six or even seven or eight years, and at most it can be used properly for more than ten years. And when it comes to repairing, it is much cheaper than the high maintenance cost of modern digital smart devices that cost thousands of yuan at any time. Sometimes, it may be just a small part that can be done immediately for a few dozen yuan. It is no exaggeration to see the immediate results!

    3. Installation and setup will not be difficult. Most ordinary people can read the included instructions by themselves, and think about it step by step and complete the DIY. For example, choose a magnetic door-sucking alarm with double-sided long tape strips, gently tear and sticking to the door frame, and can immediately suck it firmly on the stainless steel door body, and automatically close it when you touch it when you go home. At night, when the light is dim, it is like a loyal little yellow dog who stares tirelessly. Once you hear a suspicious sound of illegal elements prying open a window or a door lock, the alarm sound will be loud. I am afraid that the square dance aunt can hear the rush to watch within 50 meters. These things are very simple and convenient! Speaking of the need to purchase these intelligent weak current products, we provide global procurement services for weak current intelligent products!

    But in the end, there are some doubts that need to be carefully considered and carefully considered, and find ways to solve them.

    Simulated security precautions_Physical security facility precaution system_Analog Security in a Digital Age

    Q: What if the bad guy uses a large impact drill or hydraulic wrench to destroy it? Where can I handle ordinary simulation locks?

    Answer: This requires us to use the high-end, atmospheric and high-end security combination strategy of "deep defense". Just a door lock is far from enough, it must be strictly guarded like the Russian doll and the ancient city wall defense system. In addition, infrared human object movement sensor (this is semi-analog, although it also uses electricity, but it is relatively simple, stable and not easy to break). It is a sound-light alarm bell with a particularly loud sound and light alarm bell, made of a solid latch with an alloy with a diameter of ≥20 mm in diameter for each latch position. It is not enough to cover the yard with hidden and unaware night vision cameras that are not easy to detect. It is not enough to install a night vision camera from multiple angles… In this way, the bad guys will have to work hard to enter.

    I personally think that the kind of person who is extremely convinced of the so-called complete Smart All-Home automation concept, thinking that by using the APP (yes, it is the App that only controls it with a mobile phone) can control all the trends and affairs, and turn your home into a keyless door lock, and open all the Google Home smart home and other devices… and therefore completely ignore the truly reliable, simple and useful / pure simulation methods, which is a bit too ideal, right? My true (I have been holding back N (∞100 million~) for a long time!) inner thoughts: I must be as good as the experience passed down by our ancestors, and cooperate with each other with soft and hard power; digital high-tech security means and traditional simulated security measures, walk the two legs together and perfectly match each other. We must not only use high-end advanced technologies such as AI-intelligent facial recognition, but also don’t forget to install anti-smashing glass on the door and match the bump proof high-security lock we just mentioned – in this way, we can prevent the ubiquitous security threats and risks in life to the maximum extent and best effect, and we don’t worry about anything! real!

  • In a home or office environment, that is, the integration of security systems can be said to be a real thing that many friends have a headache and has to pay attention to. After all, everyone’s demand for security is getting higher and higher every day! To put it bluntly, it is actually connecting various security devices that may have been scattered everywhere, such as access control systems, surveillance cameras, fire alarm devices, and anti-theft alarms, through some technical means, so that they can cooperate with each other, no longer being in charge of their own territory.

    However, there are really many things to pay attention to in order to integrate these various systems into a smooth working whole!

    1. Check: This is the first and most critical step! It’s just to see if the security devices you have at hand can work together and work appropriately, and whether they all support the same communication protocol, such as TCP/IP protocol, RS-485 protocol, etc. If the protocol cannot be done together, then the subsequent things will be in trouble!

    2. Selection of unified management platform: You have to find a reliable and stable unified management platform, just like a large manager, which can manage all connected security devices. Security System Integration can be used to see the operation status and status information of all devices on one interface, so that it has the meaning of integration. Otherwise, looking at one interface in the east and one interface in the west will delay more trouble.

    3. Data transmission security: After integration, the amount of data transmission is definitely much larger than in a single system before, so the security of data during transmission is particularly important. It must be transmitted encrypted to prevent it from being secretly acquired or tampered with by others. This is the most important point! ~

    There are some practical tips to help during actual installation and debugging. For example, the deployment of equipment must be reasonably planned. The surveillance camera must be able to capture key entrances and exits and passages, and there must be no blind spots; the card reader of the access control system must also be installed in a convenient location without being easily damaged. In addition, if you don’t understand this technology very well, it is best to ask experienced professional and technical personnel to do it. They know a lot and can avoid many unnecessary troubles and problems. Provide global procurement services for weak current intelligent products!

    There is also the later maintenance and daily management work, which is also the top priority that must not be ignored!

    1. Regular inspection: Every once in a while, such as a month or a quarter, a comprehensive and meticulous inspection of the entire integrated safety system must be conducted to see if all equipment can work normally and whether the line connections are loose or aging or damaged.

    2. Software upgrade and update: The management software of the integrated system often launches some update programs to fix some vulnerabilities, add new functions, etc. Remember to upgrade and update in time.

    3. Personnel operation training: People who use this system, such as company employees or family members, must know how to operate the system correctly, and know how to solve some simple small problems when they encounter them. Don’t be fine at that time and people won’t know how to use it, that’s not right!

    Some people may ask: "My home is not big, and it also needs to be so complicated. Do you do it?" In fact, this really depends on the specific situation. If the demand at home is relatively high, such as a lot of valuables, or the surrounding environment of the community is relatively complex, it is still necessary to properly integrate some simple system, such as connecting monitoring and access control, and can improve a lot of security guarantees!

    Someone asked, "How much does it cost to do this?" This price is not certain, and there are too many factors that affect it, such as the brand of the equipment you choose, the quantity, the complexity of the system, and the labor cost in your area, etc., so it is best to find a few more professional companies to ask them, and then compare and compare.

    Personal opinion: Although some time and money may be invested in the early stage, in the long run, it is a very worthwhile thing to improve the safety and convenience of the entire living or office environment, and it can make people feel much more at ease!

  • The next-generation classroom ecosystem is actually a new learning environment that combines all kinds of high-tech things together. It is not just a matter of putting a few computers, right? The key is to make the teacher more in-class and students will be more excited to learn! Trendy things like the interactive large touch screen, the tablet in your hand, the WiFi that is particularly fast to connect to the Internet, and even the virtual reality helmets can come in handy. Provide global procurement services for weak current intelligent products! Let’s talk about what this basic structure has first–basically, there are several parts that are indispensable?

    1. Smart display device : It is not the silly, big, black and thick projectors in the past. Now they are all high-definition large screens, and some are touch-sensitive. The teacher writes and draws and directly uses Next-gen classroom ecosystems on it, which is very convenient; students can also run up to operate. Do you think it is very exciting?

    2. Connected terminal devices : Every student sends a tablet or something; or does BYOD (bring your own device) work? In short, you have to be able to connect to the big screen, the teacher will give a question and the student will give homework, and it will pass in a flash! quick!

    3. Network infrastructure : This is also very important and critical — WiFi 6, 5G and so on must be arranged, otherwise so many devices will be stuck if they are connected to the Internet. The internet speed is slow but not good!

    When actually building this classroom ecosystem, there are two more things to pay special attention to and you cannot neglect it! It's a trick

    1. Good compatibility ! Different brands of equipment, such as monitors, tablets, speakers… Can you screw them together and work hard? This is a big problem! What are you most afraid of? What are you most afraid of if the teacher wants to use a courseware and cannot connect to the other one, which one can’t search. Wouldn’t that be delayed? It's so annoying.

    2. Don’t be complicated and cumbersome in operation ! The system is too complicated, and the teacher has to learn how to use it every day. I can’t remember it after studying for a long time. So whoever has the mind to open the computer and click on the software in class and just click on it for a few seconds. This is what I want – simple! Easy to get started!

    Many people probably have thought about the following small questions like me. Let me tell you a few nonsense?

    Q: Is this thing very expensive? Can ordinary schools afford it?

    Answer: Oh, it is definitely nonsense to say that it is not expensive at all, but you don’t have to buy them all at once. You can take it slowly—get some of the most urgent things first, and add some of the remaining ones a little bit later, but in the long run, it is indeed very helpful for teaching, which is worth it!

    Q: What should I do if the teacher doesn’t know how to use these new equipment? Do you need to train every day? Is it dizzy?

    Answer: Generally, manufacturers selling equipment will send someone to teach, and as I said just now, the operation of a good ecosystem is very simple, you will be able to learn a few times. Don’t worry too much, really don’t worry!

    In general, although the next generation of classroom ecosystem may encounter some small troubles when it comes to making it, such as spending money and learning operations, but! From a long-term plan, it is very beneficial for teaching ideas that make students love learning more and teachers express themselves more easily! It is the only way for future education, and it is impossible to make mistakes.

  • When we talk about interstellar travel or an emergencies that may come from the depths of the universe, EMP, that is, interstellar electromagnetic pulse protection, is this important? In fact, Interstellar EMP Protection, many people who often pay attention to space exploration or various science fiction movies, have such a big question mark in their hearts! After all, no one wants to be on a spaceship and shuttle between the stars. Suddenly an electromagnetic pulse comes. All the equipment is done, so it will be a big trouble.

    What is EMP?

    Simply put, EMP refers to a general term for a series of methods, technologies and equipment that are specifically used to prevent electromagnetic pulses from interstellar space – this pulse is like an invisible and intangible but powerful energy wave – that causes damage to various electronic devices, spacecraft systems and precision instruments inside. It is not the same as the electromagnetic pulse protection on the earth as we usually talk about. The complexity and unknown nature of the interstellar environment require much higher protection levels and technical difficulty.

    Disassembly of key protection methods

    1. Application of shielding technology : Use super thick metal materials with particularly good conductivity, such as special aluminum alloys, copper alloys, etc. to wrap the entire equipment or the key compartment of the spacecraft tightly, forming a barrier like a golden bell cover iron shirt, so that those annoying electromagnetic pulses cannot enter, just like putting on the equipment with an extremely hard armor!

    2. Surge device installation : The surge (surge protector) with super fast reaction speed and strong tolerance is installed on the input and output of various circuits. When electromagnetic pulses surge, these devices can guide the excess current in an instant, protecting the precision circuit behind from being burned out, just like the guardian of the circuit!

    3. Grounding system optimization : design a very, very low-impedance grounding network. This grounding network cannot be done casually. It must be calculated carefully so that the current generated by the electromagnetic pulse can flow into the earth or the metal shell of the spacecraft quickly and safely, thereby reducing the impact on internal equipment. This is like finding the fastest escape channel for the current! Provide global procurement services for weak current intelligent products!

    4. Preparation of backup system : An additional backup electronic system that is completely independent and does not rely on the main power system is prepared. Moreover, this backup system itself must undergo strict EMP protection. If the main system is really broken, the backup system can be immediately mounted to ensure the operation of basic functions. This is like a spare tire of a car. It may not be used normally, but it can be rescued at critical moments.

    5. Software protection upgrade : Special design and upgrade of various operating systems and control software on the spacecraft, so that they can automatically backup data, restart system and correct errors when they are disturbed by electromagnetic pulses, just like putting a layer of "bullet-proof vest" on the software to improve its anti-interference ability!

    FAQ

    Q: How severe is the damage caused by Interstellar EMP to ordinary electronic devices?

    Answer: That's serious! At the least, the equipment is temporarily frozen and data is lost. At the worst, the circuit board and chips are directly burned, making the equipment completely turn into a pile of useless junk iron. Moreover, in an interstellar environment, it is very, very difficult to repair and replace the equipment, so the prevention work must be done in place!

    Q: Can EMP protection technology on the ground be used directly for interstellar protection?

    Answer: Basically, it doesn’t work! The electromagnetic pulses on the ground are usually not that strong and the source is relatively single. The interstellar EMP energy is stronger, the spectrum is wider, and the environment is more complex. Such as cosmic rays and solar winds will also produce superposition effects, so protection technologies specially designed for the interstellar environment must be used!

    Q: What EMP protection measures can individuals take on their own during interstellar travel?

    Answer: In fact, there is not much that individuals can do, but the most basic thing is not to expose important electronic devices to unprotected spaces; try to use portable devices that have EMP protection functions; back up more important data in different places, and it is best to use non-electronic storage methods, such as paper files (although it feels a bit primitive, but it may work at critical moments)!

    On the road of interstellar exploration, EMP is definitely a big thing that cannot be ignored! It is related to the success or failure of the entire mission and the life safety of the astronauts. Therefore, every detail must be taken carefully and seriously, and there must be no sloppy!

  • Regarding (legacy system packaging) this technical job that sounds quite professional and very difficult. Many friends who work in IT, especially those technicians who have been in old companies, have some confusion and confusion? In fact, to put it bluntly, it is those old systems that have been used for many years, may have a relatively old technical architecture, but the data and business logic inside are particularly critical and cannot be thrown away. For example, some companies are still using COBOL systems more than ten years ago, or applications developed based on old versions of Java that are difficult to maintain… These systems are like old houses, and they are inconvenient to live in, but after demolishing them, they are worried that the old objects inside – that is, those important data and business processes – will be damaged, so packaging has become a very important solution.

    The core meaning is that it does not directly touch the internal code and structure of the old system, but adds a layer of "protective cover" or "translator" outside it so that it can "communicate" smoothly with new systems and new technology platforms, right? The biggest benefit of doing this is that it can protect the data integrity and vital business logic in the system from being destroyed, and at the same time, it can enable the functions of these old systems to be called by new applications and services, without spending so much money or taking such a big risk to rewrite the entire system. In terms of cost and security, it is a very cost-effective approach! Provide global procurement services for weak current intelligent products!

    To do it well, there are several key steps and points, and I think it needs to be carefully considered:

    1. Comprehensive systematic evaluation stage : Before starting the packaging, you must conduct a very detailed and thorough survey of the existing ones, including what technology stack it uses? For example, is it an underlying module written in C++? Or is it a VB interface? What interfaces does it have externally, what protocols do these interfaces use, and is it easy to use? How many data tables are there in the system? Are the relationships between data tables complicated? How much data does the system process every day and what are the most critical core business processes? All of these have to be clarified, otherwise it will be like a blind man touching an elephant, hitting walls everywhere

    2. Encapsulation policy selection process : Based on the results of the previous evaluation, you have to choose a suitable encapsulation policy. Common strategies include API encapsulation – that is, to package the original functions into standard REST APIs or SOAPs, so that the new system can use the functions of the old system by calling the API; and also service encapsulation, which means to package a series of related operations into an independent service unit to provide services to the outside world; or data encapsulation, focusing on the integration of the data level, such as setting up a data warehouse, data mart, etc., extracting and organizing the data of the old system to facilitate access to the new system… Different strategies have different applicable scenarios, and you have to carefully select them!

    3. Interface design and development operation : This interface is like a "bridge" between new and old systems. Whether it is designed well is directly related to the success or failure of the packaging effect! Therefore, when designing, you must consider the ease of use. Can developers of new systems easily understand and use these interfaces? We also need to consider the stability of Legacy system encapsulation. The interface cannot change at any time, and no one can stand it when changing; there is also security. We must control access rights and not allow people who should not access to access key data, right? During development, you can use some mature middleware or frameworks to help simplify development work and improve the quality of interfaces.

    4. Data conversion and protocol adaptation issues : The data format and communication protocol of old systems are often different from new products. For example, in the past, some custom binary format data might have been used, or particularly old message queue protocols? Therefore, the encapsulation layer must also undertake the task of data conversion and protocol adaptation, converting the data sent by old into JSON format, XML format, etc. that can be understood by new, and at the same time converting requests sent by the new system into instructions that the old system can understand… In this conversion process, it is necessary to ensure the accuracy and completeness of the data.

    5. Comprehensive testing and continuous optimization work project : After the packaging is completed, everything will not be fine. A large number of rigorous testing must be carried out! Functional testing must be done to see if the encapsulated interface has the expected functions. Performance testing is also indispensable. In the case of high concurrency, can the packaging layer withstand and how is the response speed? Compatibility test and security test must also be arranged… If you find problems during the test, you must fix it quickly, and then continuously adjust the encapsulation layer according to the actual operation, so that it can run smoother and smoother.

    During the implementation process, you will definitely encounter various questions and difficulties. Here I will choose a few comparative questions to briefly answer:

    Q: Can you only choose one packaging strategy? Can't we mix several strategies together?

    Answer: Of course you can use it in a mixed way! In many complex scenarios in reality, a single strategy often cannot meet all needs, so a variety of packaging strategies will be flexibly combined according to different module characteristics and integration goals, such as one piece of encapsulated with API, and another piece of critical data will be encapsulated with data, so the effect may be better!

    Q: After packaging, will the old system be solved once and for all and no longer care about it?

    Answer: This may not be dear! Encapsulation is just a short-term or medium-term solution, right? The encapsulation layer itself also needs someone to maintain and update, and if it is still operating and generating data, it still needs basic maintenance work. It cannot be said that it will be completely left alone after the encapsulation is completed! If the company has money and business conditions are ripe in the future, slowly replacing the whole old may be the final solution.

    I personally think that it is indeed a work that has a high technical content and requires careful and patient care. It is not something that can be solved in one go, but it needs to be gradually and coordinated! Only by choosing the right method and doing a good job in designing – realizing – testing – optimizing the entire process can we truly play the positive role of packaging in protecting assets, promoting systems, and supporting systems, and helping enterprises to smoothly overcome this painful period of system replacement and renewal! Anyway, this thing needs to be practiced more and summed up more experience, and it will gradually become more and more convenient!

  • Renovation and renovation of old office buildings is a hot topic that many companies and companies are particularly concerned about and pay special attention to. After all, many office buildings that have been in the past – many of them have aging facilities, incomplete functions, and very inconvenient use – these troublesome things that make people trouble! Today I will talk to you about this addition and modification kit (does Kits sound very professional?), what is it, what are its uses, and what tricks we have when choosing and using it, and what needs special attention… I hope it can give you some practical and useful references and help. Translated into Chinese, Kits probably means "renovation kit" or "additional and renovated components". Simply put, it is a set composed of a series of large and small parts specially designed and tailored for those old office buildings. The purpose is to not dismantle the entire building and start over – it costs so much money and a pity – but to replace and add some new accessories and new equipment, so that the old office buildings can keep up with the current needs and become better, more energy-saving and more fashionable!

    In fact, Retrofit Kits for Old Office Buildings are divided into various types according to their different functions and uses. Just like when we go to the vegetable market to buy vegetables, there are all kinds of people, and there are many dazzling arrays.

    1. Lighting system transformation kit : This is the most common and basic one! In those old office buildings, the lights were either too dark to see things clearly, which affected work efficiency, or they were too power-cost-too high, and many light tubes were particularly easy to break and had to be replaced, which was so troublesome! This kit usually has LED energy-saving light bulbs – now this is the mainstream, it is popular, it has good brightness and power saving… There are also smart switches, induction controllers, etc. After installation, the light can be automatically adjusted according to the brightness. When people leave, they can turn off the lights automatically, which is more intelligent and trouble-free.

    2. Air conditioning and HVAC system renovation kit : It is as hot as a steamer in summer and as cold as an ice cellar in winter. This is about the air conditioning and heating conditions of many old office buildings! This kit often includes new high-efficiency heat exchangers and smart thermostats – able to accurately control temperature without wasting electricity, and also variable frequency modules. If you upgrade the original old power-consuming air conditioning system, the cooling and heating effect can be improved a lot at once. The key is that electricity bills can save a lot of money.

    3. Water supply and drainage system transformation kit : water pipe leaks, faucets are not tight, toilets are always in trouble, and water consumption is very large. Are these problems also crazy? This type of kit will include water-saving faucets, water-saving toilet accessories, and small things for leak detection. After changing it, there will be less troubles in running water, which also responds to the current call to save water.

    Retrofit Kits for Old Office Buildings_Old Office Building Renovation Kits_Old Office Building Renovation Components

    4. Weak current intelligent transformation kit : This one is high-end and has a relatively high technological content! What are the installation of network upgrades, security, monitoring equipment, how to make access control safer and more convenient, and office automation systems, etc. Speaking of this, if you need to purchase related weak current intelligent products, provide global procurement services for weak current intelligent products! , their family seems to be quite reliable and can buy a lot of good things

    I want to choose a suitable kits for the old office building. There is quite a lot of knowledge here, so I can't just grab one.

    1. We must first think carefully and investigate the actual situation of the old office building : how many years have this building been built? Is the main structure stable and reliable? How are the existing various pipelines such as electric wires, water pipes, and heating pipes buried and how old are they? Can voltage drive new equipment? All these must be understood clearly and well-known. Otherwise, if you buy a kit and cannot install it, or if you install it, you cannot work hard, then you will be in vain and spend money in vain.

    2. Determine what problems you want to solve and what goals you want to achieve : Is it the most urgent problem of too dark lighting at the moment? Or do you think that the air conditioner is too power-consuming and you have to reduce costs as soon as possible? Or do you want the office building to look more modern and smarter, and to be more attractive when hiring talents? The goals are different, and the kits you choose must be different

    3. The most important thing is to find more brands, compare the quality of the goods and the price : just like when we buy clothes and compare the three companies, the performance, quality, how long can we last (that is, the service life), installation is not troublesome, and whether there is any after-sales guarantee, the price difference may be particularly large! Never believe it as true when you listen to what one says. Only by reading more can you have a clear idea and make wise choices in your heart.

    Maybe everyone still has some random and fragmented questions in their minds, so I will choose a few common ones to guess and talk about.

    Old Office Building Renovation Components_Retrofit Kits for Old Office Buildings_Old Office Buildings_Old Office Building Renovation Kits

    Q: Is it cost-effective to install this Kits? Will it be expensive and too much investment?

    Answer: How to say, you really have to spend a start-up capital at the beginning – this is inevitable. But from a long-term perspective, it is really cost-effective! Do you think, can you save power if you change it? Save a lot of electricity bills in a month, but over time, it is not a small amount… The air conditioning system has high efficiency and low failure rate, so it also saves cost. It can also allow employees to work in a better environment, and everyone is happier-mood can only be motivated when working better, and work efficiency can also be improved a lot.

    Q: Is it troublesome to install these things? Will it affect the normal work and office work in the building?

    Answer: It depends on what kind of kit it is, how grand and complicated the installation is. If you just replace or replace small kits and parts such as faucets, which are a little simpler, it will generally not take long and not long. The master will use his rest days and work overtime secretly after get off work, or work in sections, which will have no major impact on daily office work and can be ignored. But if there are larger and more complex changes, such as the upgrade of large weak current intelligent systems and the replacement of large air conditioners as a whole, it is best to find a professional and powerful construction team to quickly formulate a reasonable construction plan. Maybe a short adjustment of the office area can be made so that the impact can be minimized and slightest.

    My personal opinion is that adding renovation kits is becoming a magic pill to save many old office buildings. It is a smart approach and a great choice. It can revitalize old properties and become young and easy to use without much trouble. For those business owners who have a budget and hope to improve their office conditions, it is definitely worth taking a look and considering them carefully!

  • In today's rapidly developing intelligent era, everyone must be interested in what AI-Cable (that is, the weak current industry cable management software driven by artificial intelligence) is used for what it is used for and what are the real benefits? After all, the cables are messy and they can make people have two big heads! Can't find the line, maintenance is dead, troubleshooting is like fighting a war, these are troublesome difficulties, have everyone encountered several times?

    First of all, I have to talk to you about the basic concept of AI-Cable. Simply put, AI-Powered Cable Management Software is to leave all the messy data such as cable models, directions, connection relationships, port locations, etc. that our brains can't remember even if they want to break their heads. Then, use the artificial intelligence algorithm that sounds amazing to analyze and predict possible problems and help us make plans in advance; in this way, the entire cable management can become super, super smart and trouble-free from the manual method of finding a needle in a haystack! Of course, sometimes when buying these professional software supporting products, you may have to search around the world. At this time, you can take a look. It provides global procurement services for weak current intelligent products! Don't worry, let's take apart the software bit by bit to see what's going on.

    The first big part that can be used in this core is of course the automated cable asset data entry and tracking function ! In the past, you had to number hundreds of cables and register information, and maybe you had to write them out? Sometimes you can write wrong numbers or drop a few important marks, which is simply a crash! Then it will be different after AI comes to help. Sometimes it uses the QR code scanner to scan the QR code or barcode. Sometimes it is the particularly powerful image recognition function that takes a photo of the cable brand. You can automatically fill in the long combination of product names and specifications. You don’t need to type in a word or a number in the system. After saving effort, it can still keep a guard on these records in real time like a brain. If you find that the cable is incorrect or the condition is a bit abnormal, it will immediately hum to the administrator like a puppy saw a bone – send a reminder to inform the situation.

    Advantages of AI cable management software_AI-Powered Cable Management Software_Artificial Intelligence Cable Management Software_Artificial Intelligence Cable Management Software_AI cable management software advantages

    Secondly, this software is like a divine help in troubleshooting and troubleshooting! Usually we have a small cable failure. Maybe the team has to send two or three people to squat in the black and weak electric well filled with equipment or dense cabinets for most of the day. They stroked them one by one according to the drawings, rubbing their hands and faces everywhere, and they may not be able to find out where the short circuit was shorted. After installing this kind of AI-brained software, its powerful fault diagnosis algorithm will appear. It will recall the knowledge base it learned about how to solve the massive historical faults that have accumulated since a long time ago – for example, which route and which line burned last time? Combined with the current network transmission speed, how many degrees Celsius the temperature rises, and other key indicators pulled from various sensors, it calculates, and it can be pointed at the red light or flashing cable to remind you that the three-dimensional virtual scene is winning the red light or flashing reminder to tell you: "Ninety-one is this numbered super five and six white twisted pair cable. The second elbow on the left corner of the third floor of the weak electric well is aging, causing poor contact! Hurry up and shake it with your hands…" Is it fast enough? Is it amazing enough? ! In this way, maintenance technicians can use clairvoyance and go straight to the site to start the site by taking action, saving at least three, four or five hours! The faults are just right to come, and you have to solve them quickly. This is not very important, and you can't emphasize it anymore. After all, the internet is broken every minute and every second, it may be that the ocean is really losing in a mess.

    Third, AI also brings us the predictive maintenance and reminder function that sounds a bit unfathomable but is actually very useful. When the software has nothing to do, it is like a warm-hearted community patrol security guard, constantly analyzing changes in the physical indicators of the cable day and night, such as the number of interface plug-ins and unplugging times, the percentage of occasional bounces of transmission delays, the accumulated numerical record of temperature and humidity in the working environment, etc. For example, if it suddenly finds a trunk optical module that is shouldering a heavy responsibility, it has been quietly increasing the packet loss rate from time to time, which is a relatively small amplitude that we usually don’t pay much attention to. It will understand in its heart that this kid may really be in a mood next week or next month or one day – a strike! Hurry up and down at night, when everyone is most idle, I will give the system administrator's email and mobile app a detailed report, and even come with my own little advice: "Hurry and take advantage of this weekend that users use the Internet to inspect and replace the XXXX brand optical module numbered as the least. Otherwise, when the real failure, it will be completely complete. It will be completely complete. At that time, the user's complaint phone number will make your ears buzz!" In this case, prevent problems before they happen, and make technicians and users anxious after the incident, and then the leader still blames them, so it must be better – it will be more than 18 streets (metaphorical sentences, do not compare with the specific thirteen or seventeen)!

    The fourth is the visualization level of the entire management process. Before, we had to stare at the two-dimensional CAD engineering drawings covered with ghost-drawing talisman lines and numbers like books floating in front of us, or simply to the "spider web (the cable is always called this very vivid, right?)" that is really piled up on the ground, and is surrounded by "spider web (the cable is always called this very vivid, right?)". We didn't know which line I needed to check or modify, whether the one pressed on the bottom layer would be crushed and deformed by overweight, etc., etc.! Nowadays, in AI-based software, you can look at the three-dimensional cable distribution diagram that is built to be vivid and vivid in three-dimensional cabinets, bridges and even the entire floor! Which cable is an orange Super Six UTP twisted pair cable? It stretched out from the back of the butt of which cabinet port, passed through the top of the ceiling, and turned several turns. Finally, it was like a little ant who recognized the way, and obediently put it in the mouth of the No. 7 server, which specific interface is ~ It is completely clear and clear, just like watching a three-dimensional movie. You can zoom in, shrink, and rotate at will from different perspectives! In case the line needs to be adjusted – for example, which project department wants to go to the new switch, it is necessary to pull four more links from the firewall! You just drag it gently on the "virtual sand table" and then add it a little bit. The software will be based on the network topology optimization rules installed in its brain, as well as the lessons learned by the old engineers, and help you figure out how to walk under the best and optimal route, and whether you will fight with the existing cables (that is, interfere with each other, and the signal is affected). Even how many meters of cables will be used, and how much estimated the cost will be costly, you can immediately jump out an estimate list of estimation references than before, when we used to draw sketches and compete with the construction master for a long time (the construction master sometimes understands differently). It cannot be compared, but the difference is huge

    In the next part, we will target some problems that may be more relevant to big guys and will arise in management practice? Conduct some comparisons and answer questions

    1. If I were to manage a very small and poor company, there were only one or two hundred information points. Would it be a bit of a waste of money or no need to use such high-end AI software – no, no, no, otherwise! No matter how small the number of companies is piled up, the cables will rise like wild weeds and become unruly! This investment is not much at one time, but the labor costs that can be saved in normal times, as well as the extra expenses (free) caused by cable chaos and failures that you don’t know. I think at most, it will only take half a year or a year to make money from the service provider to the comprador software at the beginning? The more you use it, the more cost-effective it is! 2. So these many kinds of software that seem to be fancy and whistle functions are claimed to be AI-Cable. How should we choose one that is suitable for the specific environment of our unit? ——Is this? You have to mainly think about what your unit is most afraid of – what is the most headache-in fact? For example, what you are most worried about is that the cause of the failure cannot be found, so you have to ask more questions: "How accurate can the diagnostic model learn and respond? How fast is it?"; for example, if you always want to use new business lines, then choose the type of "the interactive three-dimensional display interface is particularly friendly and the planning and design module is simple, and everyone can use it?" Then ask which manufacturer of the development industry, will there be an engineer who will come to the site to provide intimate services for online installation and initial data configuration and debugging support, and what are the specific detailed rules and regulations for subsequent annual service costs and iteration updates and upgrades? It is best to have a free trial account first to touch it for a few weeks to see if it is really good to praise it… 3. What if the data streams in the network are transmitted one day, will this AI software occupy a lot of internal bandwidth resources, making normal office business and other things unable to run smoothly, and instead add to new chaos? ——Don’t worry! Nowadays, AI algorithms are all smart. They only occasionally feel as quiet as thieves in the backend that users can't figure it out and see it.