Tuesday, December 29, 2015

Who Do Daylight Harvesting Projects Succeed or Fail?

Recently, the sustainable design movement has given daylighting a comeback in the mainstream construction industry. Daylighting, a practice that has been vital for energy conservation and easy illumination for centuries, can be defined as "the use of daylight as a primary source of illumination to support human activity in a space."

Examples of daylighting in architecture.
Source: http://bit.ly/1PxN13t
Daylighting is an extremely useful tool, as it promotes limited use of electricity and efficient design methods. Yet, some daylighting projects are not as successful as others. David Eijadi from The Weidt Group, an energy design consulting firm, highlights the main reasons why some daylighting projects may fail:

"
  • Lack of coordination or understanding between the different design disciplines concerning the daylighting control system.
  • Improper location of controls.
  • Inadequate specification of the controls systems, component parameters, and sequence of operations.
  • Shop drawings made by contractors that detail the system are not checked, or the lighting designer does not know what to check.
  • Field changes to tune a system are not documented and taken back to the designer to complete the feedback loop.
These problems result in common failure modes, such as:
  • Under-dimming, which results in less than expected energy savings.
  • Over-dimming, which results in user irritation.
  • Frequent cycling of dimming or switching, resulting in user irritation.
  • Lights left on at night, which results in less than expected energy savings.
"

Although these mistakes are common, they are preventable. Eijadi recommends these eight steps to combat failed daylighting projects:

"
  1. Conduct a daylight simulation, and use these plans when designing the lighting system and its controls.
  2. Prepare plans that document daylight zones, and establish independent control zones that work optimally with these patterns.
  3. Locate the photosensor on the reflected ceiling plans and interior elevations.
  4. Identify light fixtures that are controlled by individual sensors or controllers.
  5. Write a daylighting controls narrative.
  6. Require the contractor to submit shop drawings based on design documents and control narrative for review.
  7. Include the requirement for calibration of controls in the specifications, and require calibration logs to be submitted by the contractor. 
  8. Provision building operator training by the controls manufacturer.
"


Tuesday, December 22, 2015

Train Before Trucking: Industrial Truck Accident Prevention by Tom O'Connor

"Powered industrial trucks cause approximately 100 fatalities and more than 35,000 serious injuries every year. It is estimated that as many as 25 percent of all accidents involving this type of equipment can be attributed to lack of training. As a result, proper hazard awareness and recognition when operating powered industrial trucks can help drastically reduce these types of accidents. 

A few basic precautions apply to all powered industrial trucks, which are more commonly identified as forklifts or lift trucks. Defined as mobile, power-propelled trucks used to carry, push, pull, lift, stack or tier materials, they vary greatly depending on where they operate and the function they perform; options range from narrow aisle trucks to rough-terrain forklifts. They may be powered by electric or combustion engines. The first step of training is to become familiar with the equipment. 

Forklifts and lift trucks typically have short wheel bases and weigh as much as or more than many cars, which makes them potentially hazardous to use. Operators must be properly trained by a competent person prior to driving one. Once an individual is authorized and trained to use a powered industrial truck, the equipment still should be inspected prior to driving one. Once an individual is authorized and trained to use a powered industrial truck, the equipment still should be inspected prior to operation. The inspection should include testing the vehicle's brakes and controls to ensure they work properly. In the event something is not functioning correctly, a supervisor must be alerted and the equipment taken out of use until it is repaired and deemed safe. 

Only one person should be on a forklift or lift truck at any given time. This person must always wear a seat belt and adhere to manufacturer requirements, instructions and load limits. Failure to do so can have dire consequences.

Operators should position the forklift so that the forks are square with a load prior to picking it up. The forks should be placed underneath the load as far as possible. It is imperative that loads are never raised or lowered when traveling from one location to another and that they aren't swung or carried over people. Objects being moved with a forklift need to be securely fastened in place. This can be done by using a proper securing pin to secure movable or replaceable lift bars. It is important that a threaded bolt or pin is never used for this purpose. 

Whenever an industrial truck needs to cross an aisle or other area with obstructed views, the driver should move slowly and use the horn to alert others. The vehicle should always face the direction being traveled. Sudden stops or starts must be avoided. 

Lower the lift or forks of an unattended forklift or lift truck, neutralize all controls. and chock the wheels. When not carrying a load, the forks should always be kept in the lowest possible position without making contact with uneven surfaces.

The following examples demonstrate what can happen when training is not provided and basic precautions are not observed: 

  • A 37-year-old forklift salesman was killed when attempting to deliver an industrial truck to a job site. The equipment was driven onto a loading dock, and the parking brake was engaged with the power off; however, the wheels were not chocked. The industrial equipment fell off of the loading dock and fatally crushed the individual. 
  • A 44-year-old industrial truck operator died after falling approximately 30 feet to the ground from the upper tier of a handmade, wooden work platform. He was attached to a forklift at the time of the fall. Proper safety procedures were not in place at the time of the incident. 
  • A 51-year-old rigger was killed as a result of injuries sustained when he was pinned between a semi truck trailer bed floor and a lift truck. The accident occurred when he attempted to move a piece of metal framework that was not secured or on a pallet. 
All of these accidents could have been prevented with the mandatory training prescribed by the Occupational Safety and Health Administration (OSHA). The regulations require that employers provide both classroom and practical experience training in the use of a forklift before allowing an employee to use it on the job. As part if the training, the employee must physically demonstrate he or she can safely operate the lift. The employer must certify that the training and evaluation have been completed at least once every three years. Refresher training is required more frequently if the operator demonstrates a deficiency in the safe operation of the truck. 

If you would like more information on this topic, a number of online resources are available. They include the OSHA eTool for Powered Industrial Industrial Truck Safety and the OSHA Safety and Health Training Resource for Powered Industrial Truck Safety. In addition, OSHA has several regulatory requirements that promote safe operation of this type of equipment that are important to be familiar with. All can be found at www.osha.gov."

Source: http://www.ecmag.com/section/safety/train-trucking

Wednesday, December 9, 2015

Intrepid Electronic Systems is now promoting enGauge's Fire Extinguisher Monitoring System!




This image was excerpted from Intrepid's newsletter. To subscribe, send an email to munirah@intrepidelectronic.com with your name, email, company, and (optional) reason for subscribing.

Tuesday, December 8, 2015

MFR Home Fire Sprinkler/Flashover Demonstration 10-2015


Wednesday, December 2, 2015

"How Secure Is Your Security?" - from EC Mag's Deborah L. O'Mara

"Are your low-voltage and security customers concerned over 'hanging' security cameras on the enterprise network and opening it to potential vulnerabilities? Or are they looking at protecting other parts of their commercial facility that may be housing data and other privileged information? Manufacturers in the physical security industry have those same thoughts and are taking steps to prevent hacking, malicious takeovers, and even data center terrorism and sabotage.

There's good reason for these concerns. News surfaces daily of data theft, email leakage, gaming network circumvention and more, as hackers continue to find ways into communication infrastructures. For example, hackers recently set up a live-streaming website for more than 100 private webcams in New York.

As news of private and corporate network takeovers and incidents of malicious software ('malware') continue in epic proportion, the security industry has become extremely proactive, easing these fears with new partnerships, tactics and technologies.

'The bottom line is: Is your security system secure?' said Charlie Hare, Panasonic;s national category manager, Security and Mobile Video Solutions, Newark, N.J. 'Panasonic is taking proactive steps to secure data from networked video surveillance and camera streams.'

The company recently announced a partnership with Symantec, Mountain View, Calif., the world's largest provider of secure sockets layer (SSL) server certification, to develop more secure video-transmission solutions to prevent data takeover and malicious activity. Called Secure Communication, the company's recent launch of Norton Secured, powered by Symantec, is designed to provide secure data management in video surveillance and address cyber-security incidents that continue to occur, including hacking, data breach, password takeover and tampering.

Hare said Secure Communication is PC-level security for built-in devices such as video surveillance cameras and embedded video management systems (VMS). Secure Communication enables video streams with three pillars of protection: data encryption, communication encryption and verification to maintain evidence and safety of video streams. It specifically protects against spoofing (false data), altering (changing images) and snooping (stealing passwords) of protected surveillance communications. Because its end-points are connected to the network, IP camera installation can compromise that connection.

Panasonic continues to develop technology to put this type of protection on cameras and video surveillance servers. Secure Communication is available on its new Panasonic 3, 5 and 6 Series models.

It 'provides extra layers of protection for Panasonic IP devices,' Hare said. 'It encodes data and encrypts transmission.'

Protection at the appliance level

Security-industry appliances, sometimes referred to as embedded devices, may also be open to hacking or data loss. Razberi Technologies. Farmers Branch, Texas, recently introduced the LocBeri Cyber Security System to prevent unauthorized users from accessing network ports deployed for surveillance cameras.

'The potential costs and consequences of hackers getting through firewalls and onto the user's computer networks can be devastating,' said Rich Anderson, Razberi's chief marketing officer and chief technology officer. 'Whenever you install IP cameras, especially outside on a building, you're potentially opening the network up to others."

He gave an example where college students unplugged exterior cameras and connected their laptops instead to hop onto the network and alter test scores.

'For installers, LocBeri is easy to implement, and the graphical user interface of the VMS software program automatically populates the media access control [MAC] addresses of all ports through a utility software scan and locks down those ports with a single click,' he said. '[It] scans attached cameras and automatically configures the switch so only those cameras work on those ports. There is no major downtime or labor involved when undergoing system maintenance or changing a camera, because one push of a button unlocks all ports to allow for system changes and another push when finished relocks the system, saving the installer programming and installation costs.'

LocBeri is a standard feature on all Razberi ServerSwitch units.

'We're a big proponent of open systems and open architecture, but of course that does bring up concerns of cyber-security threats with everything residing on the network,' said Jack Cabasso, managing director of Aventura, a video management solutions, access control and VMS software manufacturer in Commack, N.Y. 'But, open systems are also more adaptable, and ways to secure the systems can be more readily addressed. It's an area where we need to educate the installation community and users on steps they need to take to secure their video and other environments.'

Creating layers of security, adding new technology and providing end-user education is helping the industry address possible network takeover or other unauthorized activity of surveillance cameras and video-transmission streams."

Source:  http://www.ecmag.com/section/systems/how-secure-your-security

Tuesday, December 1, 2015

Kudos, Kurt!

On November 24th, Intrepid's very own Kurt Brinkman was elected as NorCal NECA's President!

Tuesday, November 24, 2015

Preparing Workers for Cold Environments - Electrical Contractor Magazine

"With winter rapidly approaching, it is important to protect workers from the coming cold temperatures and potential extreme weather. Prolonged exposure to these conditions can result in serious health problems, including trench foot, hypothermia and frostbite. Extreme cases can even result in death. Although the Occupational Safety and Health Administration (OSHA) has no specific standards pertaining to work in cold environments, employers are obligated to provide a workplace free of recognized hazards, including those caused by winter weather.

In general, outdoor work requires preparation. However, in the winter months, it calls for additional planning. Employees should be trained on winter hazard recognition, identifying and monitoring themselves for signs of cold stress, and they should know actions to take if they exhibit these symptoms. It is important to note that people who are in poor physical condition or have predisposed medical conditions, such as hypertension, hypothyroidism and diabetes, are at a higher risk of sustaining an injury or illness as a result of cold stress. Emergency help should be sought immediately if someone is experiencing uncontrolled shivering, slurred speech, clumsy movements, fatigue, or confused behavior.

Encourage workers to protect themselves from cold, wet and windy conditions by dressing accordingly. OSHA suggests wearing multiple layers to provide better insulation and to help adjust to changing temperatures. OSHA's winter weather guide recommends, "An inner layer of wool, silk or synthetic (polypropylene) to keep moisture away from the body, a middle layer of wool or synthetic to provide insulation even when wet; and an outer wind and rain protection layer that allows some ventilation to prevent overheating."

OSHA also indicates that a knit hat should be worn along with insulated, waterproof boots and gloves. Of course, when working around energized lines or circuit parts, all winter clothing must also meet arc-resistant ratings.

When working in the cold, it is important to stay dry. Any moisture or dampness caused by sweat, snow or rain can increase the rate of body heat loss. Therefore, having an extra set of dry clothes is always a good idea when working in winter conditions. Tight clothing should be avoided because it can reduce blood flow and result in more rapid heat loss.

Outdoor work in the winter should be scheduled at the warmest time of the day. Employers and employees should pay attention to weather conditions during winter storms and have a reliable means of communications with each other. This can be helpful if a work stoppage or evacuation becomes necessary. Being aware of and monitoring severe weather indicators, such as outdoor sirens, radio and television, can be helpful, as well. In addition, workers can better monitor each other for cold stress symptoms if they work in pairs.

Employers should provide a warm, dry place for workers to take breaks from freezing temperatures. Exhaustion and fatigue in cold weather can result in a higher rate of body heat loss. Provide warm beverages and sports drinks for employees, and inform them that avoiding caffeine and alcohol can help them maintain a warmer body temperature. Employees should also consider eating warm, high-calorie foods, such as pasta, when preparing to work in cold environments.

Other measures an employer can take to protect workers include providing the right tools for the job, offering de-icing solutions for tools or equipment, shielding work areas from wind or providing radiant heaters.

Fuel-burning heaters should be used outdoors only because they emit carbon monoxide. Electricians should never use a fuel-burning heater indoors or in any enclosed area.

Linemen and wiremen attempting to restore power in winter conditions must use extra caution, as well.

OSHA's winter weather guide states, "Repairing and/or replacing damaged power lines in severe winter weather conditions are especially hazardous. A major hazard is snow, because the moisture can reduce the insulation value of protective equipment, and could cause electrocution. In these conditions de-energized work is safer, but if energized work must be done, qualified workers and supervisors must first do a hazard analysis that includes evaluating the weather conditions and identifying how to safely do the job."

Remember that de-energized lines should be treated as if they are energized, and you should never touch metal surfaces with your bare hands.

If you would like more information regarding cold and winter weather safety, OSHA's website (www.osha.gov) provides numerous resources, or you can check out the National Institute of Safety and Health cold stress guide (www.cdc.gov/niosh/topics/coldstress)."

Source: http://www.ecmag.com/section/youre-gonna-need-bigger-coat


Tuesday, November 10, 2015

"Why Remote Video Verification Makes All the Difference" - Xtralis

"Most people understand the basic premise of the intruder alarm system: detectors are strategically positioned in a building, with door contacts and a control panel that are usually connected to internal and external sirens on site, and then are connected via a standard telephone line to a Central Monitoring Station (CMS). Most customers are under the illusion that this protects their premises, but in reality it doesn't make the doors any stronger or the windows any tougher, they still break when struck. Nothing actually stops the intruder from getting into the building other than deterring them with the promise of a response. 

An intruder alarm system is really just designed to detect an intruder AFTER they have broken into the premises and at best will limit the time an intruder spends on the premises since they know the authorities have been notified. In a single sentence, an intruder alarm system is 'designed to limit loss.'

False alarms can and do happen, and oftentimes the primary causes of false alarms are actually quite simple. It boils down to poorly designed and installed security systems or human operating error. Even something as harmless as the positioning of an advertising module or display near a ventilation outlet may result in a false alarm when it moves in the air currents. A 'break-in' might actually be nothing more than a display that tips over and triggers the alarm. And while CCTV is great for recording what happens as evidence in the event of a break-in (or for things like parking lot surveillance), if the intruder is wearing a mask or a cap and their face cannot be identified all you really have is a recording of the loss.

However, remote video verification from a centralized monitoring location can help protect a building AND better account for real and false alarms. A remote off-site video verification system includes a detection device that covers the same field of view as the CCTV camera. The cameras and detectors are connected to an ADPRO transmitter. The ADPRO system is then connected to the customer's public address system or an amplifier with speakers sited eternally around the premises. On site the customer has complete control of the CCTV system as an onsite surveillance system. The difference is that when the customer vacates the premises and arms the intruder alarm they also arm the ADPRO system.

If an intruder approaches the building, when they enter the field of view of the camera, the ADPRO system 'grabs' three frames of video from that camera at 1-second intervals and dials through to the Central Monitoring System. In the Control Room the attending operator receives these three frames of video on a single Quad screen along with a fourth video image that replays all three frames of video in a video loop, to ensure that the operator can clearly determine what generated the alarm. This way the operator knows if the alarm is actually something that needs to be addressed, or if it's just a false alarm. The operator can then switch to live video from that camera of select any camera to view. The operator can observe someone on site, and simply use a microphone to challenge the intruder with a simple warning such as 'You in the grey jumper, you have activated a remote video alarm system please leave the site immediately!' This way the intruder knows they are being actively watched by someone!

The operator could operate any PTZ camera from the CMS and obtain a good image of the intruder prior to warning the intruder off. This may in turn be forwarded to the police for appropriate action. A customer can also control access to the site by motorizing the access gates, installing an intercom at the gates and connecting the remote outputs to the ADPRO system.

Having remote video verification allows businesses and organizations to save money. Many municipalities will issue fines for false alarms to cover the costs of dispatching police or other personnel. Video verification alerts the operator as if something that triggered the alarm is in fact an intruder, or if it is something due to human error. In some areas, having alarm verification is a requirement for a security system. Some city police departments will not respond to a building alarm unless the alarm has been verified as a 'true alarm' first. Without a verification of the alarm, the police may not respond which could leave the building vulnerable if an intruder is in-fact trying to get in. 

The success of video alarm verification has been clearly demonstrated by the installation of ADPRO products on tens of thousands of large scale commercial, industrial and government sites around the world. These installations are well-engineered, integrated solutions, comprising a variety of outdoor and/or indoor sensor technologies and a combination of CCTV and video transmission systems." 

Source: http://blog.xtralis.com/?p=120

Tuesday, November 3, 2015

Electrical engineer's work may signal better wireless connections. Exciting.

Dr. Aria Nosratinia, a University of Texas - Dallas electrical engineering professor, is currently investigating how to improve wireless connections.

The wireless space we have now may become too crowded in the future, which may interfere with efficiency and function. Nosratinia aims to "develop methods that break the wireless messages into microstreams, or smaller pieces, enabling them to be transmitted through -- rather than against -- other signals in the environment. We use this method together with liquid-metal antennas, which allows us to change radiation patterns effectively and reduce interference." 

This study is an expansion of a previous project in which Nosratinia discovered "a new dimension in the communication over multi-user wireless channels," providing "a new set of tools to address the challenges of transmission in a wireless medium, and therefore improves the quality of wireless communication."  

So far, the research has received a $608,000 award to support a collaboration with researchers from the University of Hawaii, a $421,000 grant to expand on the previously mentioned discovery regarding the behavior of wireless channels, and an approximately $1.13 million collaboration to investigate hardware Trojans with another University of Texas - Dallas electrical engineering professor, Dr. Yiorgos Makris. 
The professor earned his electrical and computer engineering PhD from the University of Illinois in 1996, and has gained an Erik Jonsson Distinguished Professorship along with a fellowship of IEEE for multimedia and wireless communications contributions. 

Thursday, October 22, 2015

Thursday, October 15, 2015

The Mystery of the Flickering Star

This development was just too cool to pass up. Recently, professional and citizen scientists in the Planet Hunter program using the Kepler Space Telescope picked up on a bizarre occurrence - a flickering star.  Located around 1,500 light years away, the star has been labeled KIC 8462852. Out of the approximately 150,000 stars that the telescope observes, this one star is somehow displaying unusual, irregular flashes light.

Theories as to what may have caused this phenomenon are varied. An astronomer at Yale University, Tabetha Boyajian, wrote that " the scenario most consistent with the data in hand is the passage of a family of exocomet fragments, all of which are associated with a single previous breakup event."

Others brought up the possibility that this event could be a confirmation of alien life, exploring that "the mysterious dips in light were due to massive structures built around the star by an advanced civilization."

Who really knows? The Kepler Space telescope was damaged in 2013 so researchers have less data to work with and unfortunately will have a hard time figuring out just what is happening 1,500 light years away.

Read more here: http://abcnews.go.com/Technology/kepler-space-telescope-mysterious-objects-raise-questions-bizarre/story?id=34494182
Tabetha Boyajian's Report in the Monthly Notes of the Royals Astronomical Society: http://arxiv.org/pdf/1509.03622v1.pdf


Wednesday, October 7, 2015

How portobello mushrooms are going to replace graphite in batteries.

"Can portabella mushrooms stop cell phone batteries from degrading over time?
Researchers at the University of California, Riverside Bourns College of Engineering think so.
They have created a new type of lithium-ion battery anode using portabella mushrooms, which are inexpensive, environmentally friendly and easy to produce. The current industry standard for rechargeable lithium-ion battery anodes is synthetic graphite, which comes with a high cost of manufacturing because it requires tedious purification and preparation processes that are also harmful to the environment.
With the anticipated increase in batteries needed for electric vehicles and electronics, a cheaper and sustainable source to replace graphite is needed. Using biomass, a biological material from living or recently living organisms, as a replacement for graphite, has drawn recent attention because of its high carbon content, low cost and environmental friendliness.
Diagram showing how mushrooms are turned into a material for battery anodes.
Diagram showing how mushrooms are turned into a material for battery anodes.
UC Riverside engineers were drawn to using mushrooms as a form of biomass because past research has established they are highly porous, meaning they have a lot of small spaces for liquid or air to pass through. That porosity is important for batteries because it creates more space for the storage and transfer of energy, a critical component to improving battery performance.
In addition, the high potassium salt concentration in mushrooms allows for increased electrolyte-active material over time by activating more pores, gradually increasing its capacity.
A conventional anode allows lithium to fully access most of the material during the first few cycles and capacity fades from electrode damage occurs from that point on. The mushroom carbon anode technology could, with optimization, replace graphite anodes. It also provides a binderless and current-collector free approach to anode fabrication.
“With battery materials like this, future cell phones may see an increase in run time after many uses, rather than a decrease, due to apparent activation of blind pores within the carbon architectures as the cell charges and discharges over time,” said Brennan Campbell, a graduate student in the Materials Science and Engineering program at UC Riverside.
The research findings were outlined in a paper, “Bio-Derived, Binderless, Hierarchically Porous Carbon Anodes for Li-ion Batteries,” published today (Sept. 29) in the journal Nature Scientific Reports. It was authored by Cengiz Ozkan and Mihri Ozkan, both professors in the Bourns College of Engineering, and three of their current or former graduate students: Campbell, Robert Ionescu and Zachary Favors.
Nanocarbon architectures derived from biological materials such as mushrooms can be considered a green and sustainable alternative to graphite-based anodes, said Cengiz Ozkan, a professor of mechanical engineering and materials science and engineering.
The nano-ribbon-like architectures transform upon heat treatment into an interconnected porous network architecture which is important for battery electrodes because such architectures possess a very large surface area for the storage of energy, a critical component to improving battery performance.
One of the problems with conventional carbons, such as graphite, is that they are typically prepared with chemicals such as acids and activated by bases that are not environmentally friendly, said Mihri Ozkan, a professor of electrical and computer engineering. Therefore, the UC Riverside team is focused on naturally-derived carbons, such as the skin of the caps of portabella mushrooms, for making batteries.
It is expected that nearly 900,000 tons of natural raw graphite would be needed for anode fabrication for nearly six million electric vehicle forecast to be built by 2020. This requires that the graphite be treated with harsh chemicals, including hydrofluoric and sulfuric acids, a process that creates large quantities of hazardous waste. The European Union projects this process will be unsustainable in the future.
The Ozkan’s research is supported by the University of California, Riverside.
This paper involving mushrooms is published just over a year after the Ozkan’s labs developed a lithium-ion battery anode based on nanosilicon via beach sand as the natural raw material. Ozkan’s team is currently working on the development of pouch prototype batteries based on nanosilicon anodes.
The UCR Office of Technology Commercialization has filed patents for the inventions above."

Tuesday, September 29, 2015

U.S. Green Building Council Study Says "Green Building is Outpacing Overall Construction Growth"

"The green building sector is outpacing overall construction growth in the U.S. and will account for more than 2.3 million American jobs this year, according to a new U.S. Green Building Council study from Booz Allen Hamilton.
The 2015 Green Building Economic Impact Study, released today by USGBC and prepared by Booz Allen, finds the green building industry contributes more than $134.3 billion in labor income to working Americans. The study also found that green construction's growth rate is rapidly outpacing that of conventional construction and will continue to rise.
By 2018, the study finds, green construction will account for more than 3.3 million U.S. jobs–more than one-third of the entire U.S. construction sector–and generate $190.3 billion in labor earnings. The industry's direct contribution to U.S. Gross Domestic Product  is also expected to reach $303.5 billion from 2015-2018.
"Green building is playing a massive role in the U.S. construction sector, the clean and efficient energy sector and the U.S. economy as a whole," said Rick Fedrizzi, CEO and founding chair, USGBC. "More than 2.3 million U.S. workers are taking home $134 billion annually in large part because of green building programs like LEED. Demand for green building will only continue to grow as individuals, businesses and institutions continue to prioritize sustainable approaches to the design, construction and operations of our built environment."
The new USGBC analysis also explores the multifaceted economic contribution of green construction to the U.S. economy and individual U.S. states, quantifying the economic impact of green building and LEED (Leadership in Energy and Environmental Design). 
"Our research shows that green building has created millions of jobs and contributed hundreds of billions of dollars to the U.S. economy, with the construction of LEED-certified buildings accounting for about 40 percent of green construction's overall contribution to GDP in 2015," said David Erne, a Senior Associate at Booz Allen. "This industry is certainly on the rise, and aggressive growth in the green building sector is anticipated over the next four years."
In addition to national jobs, GDP and labor earnings from green building, the study projects significant growth in green building's contribution to individual states' tax contributions and environmental asset indicators at both the national and state levels.
Total state earnings related to LEED building construction projects are estimated to total $8.4 billion by 2018. In Texas alone, almost 1.26 million jobs in the green building sector are projected between 2015 and 2018. As a result, green building will also contribute to significant savings across energy, trash, water and maintenance costs."

Thursday, September 24, 2015

How Electrical Stimulation to the Brain Can Be the Answer to Many Issues Facing Humans Today

Before the realization that deep brain stimulation, or "using mild electrical shocks to targeted parts of the brain with the purpose of affecting how they function," could be used to treat a multitude of neurological issues, doctors were lost. Now, as technological and medical innovations are increasing tenfold, scientists are testing to see if deep brain stimulation can transform mental health disorders and even behavior. 

The Smithsonian Magazine summarized recent brain stimulation research quite well:
"Slowing down Alzheimer’s: 
Alzheimer’s disease remains one of medicine’s most daunting challenges, both in terms of pinpointing a cause and developing a truly effective treatment. Now a team led by scientists at Johns Hopkins University is conducting a clinical trial to see if deep brain stimulation can slow memory loss and cognitive decline.
The research involves placing implants into the brains of about 40 patients with mild Alzheimer’s disease and measuring progression of the disease over an 18-month period. Specifically, the devices are being implanted in the patients’ fornix—a bundle of nerve fibers connecting the left and right sides of the hippocampus. That’s the region of brain associated with memory. The theory is that brain stimulation in this area could slow the rate of damage to the fornix and even create new brain cells in the hippocampus. 
The most recent phase of the trial, expected to last four years, focused on the safety of the implants in Alzheimer’s patients. So far, it has found no serious adverse effects.
So long to the big queasy?:  
Researchers at Imperial College London say that brain stimulation could even be used to ease motion sickness. Scientists aren’t absolutely certain what causes the queasy sensation, but they believe it has to do with the brain trying to process conflicting signals from our ears and our eyes when we’re in motion. Previous research has determined that a well-functioning vestibular system—that’s the part of the inner ear that senses movement—makes it more likely that someone will feel that nauseating sensation.
So, the researchers wondered what would happen if they used an electric current to mute the signals from the vestibular system to the brain. They worked with 10 men and 10 women volunteers who agreed to wear a cap fitted with electrodes and then, for 10 minutes, receive a mild electrical current designed to inhibit brain cell activity. That was followed by a ride on a chair that rotated and tilted at different speeds to make them feel sick.
It turned out that those who received stimulation that reduced brain cell activity were less likely to feel nauseous and recovered more quickly than people whose brains were stimulated to boost cell activity. Now, the researchers are talking with potential partners about developing a portable anti-nausea stimulation device you could pick up at the drug store. 
Memories are made of this:
 At a conference earlier this month, DARPA, the research arm of the Defense Department, announced that as part of a study it has funded, patients who were given brain implants scored better on memory tests. Traumatic brain injuries are a big issue for the U.S. military—almost 300,000 members of the service have been treated for one since 2000. So DARPA is leading research efforts into how electrical stimulation might be used to help people with damaged brains create and retrieve memories.
Scientists having been working with brain surgery patients who have volunteered to be part of the memory project. The goal is to more clearly identify the process for how the brain forms and recalls memories and then use mild shocks from implants to recreate that process. It’s only a year into the project, but DARPA says that based on the results so far, it appears possible to map and interpret the neural signals coming from a brain as it encodes or retrieves a memory, and then actually improve that recall by electrically stimulating targeted sections of the brain.
Put down that cigarette:
 Another project in the early stages is looking at how brain stimulation might help people fight cravings for cigarettes or unhealthy food. Caryn Lerman, senior deputy director of the University of Pennsylvania’s Abramson Cancer Center, recently received a grant to investigate whether applying electrical shocks to sections of the prefrontal cortex behind the forehead—a brain region tied to self-control—can help people resist urges to engage in unhealthy behavior.
The idea is that if targeted correctly, this stimulation could strengthen pathways being used to fight the desire to light up. Preliminary results of an experiment involving 25 smokers found that after a 20-minute session with electrical stimulators strapped to their foreheads, people were able to wait longer before they reached for a cigarette than those who received a placebo treatment.  They also smoked fewer cigarettes.
Stroke recovery:
 Scientists at the Cleveland Clinic have applied to the Food and Drug Administration (FDA) for permission to begin testing deep brain stimulation on human stroke victims. The treatment seemed to have worked with rats—it appeared to promote the growth of new neurons in the brain.
Not that anyone thinks that this can provide a cure for strokes. When they occur, the blood supply to the brain is cut off and some areas just shut down, while communication to other regions is disrupted. Electrical stimulation can’t bring dead neurons back to life. But it could help create new neural connections, particularly in the cerebellum, the part of the brain that controls voluntary movements. The hope is that parts of the brain that are still healthy would then be better able to compensate for damaged ones.
About 800,000 people in the U.S. suffer strokes every year. And, according to the National Stroke Association, about half of those who survive become severely debilitated.
Boosting empathy: 
But what about using brain stimulation to change how people feel?  Researchers at Harvard University and Vanderbilt University have ventured into that territory with an experiment related to the doling out of justice.
They presented 66 volunteers with stories about a fictitious person named John—specifically they related a range of crimes he had committed and his mental condition when he had committed them. Beforehand, some of the participants were given a form of brain stimulation that could disrupt activity in the prefrontal cortex, which plays a key role not just in self-control, but also decision-making. For others, the stimulation device was attached, but never turned on.
The volunteers were asked to decide how blameworthy John was and also to determine, on a scale of 0 to 9, how extreme his punishment should be. What the researchers found is that the people whose brain activity was disrupted chose less severe punishments." 
Read more: http://www.smithsonianmag.com/innovation/six-ways-electrical-brain-stimulation-could-be-used-future-180956690/?no-ist

Wednesday, September 23, 2015

Fire Protection Week, Coming October 4th through the 10th, 2015












The National Fire Protection Association's (NFPA) 2015 Fire Prevention Week is coming! From October 4th to the 10th, the NFPA is campaigning the theme "Hear the Beep Where You Sleep: Every Bedroom Needs a Working Fire Alarm". Started in 1922, Fire Prevention Week commemorates the Great Chicago Fire of 1871 which caused an astounding amount of damage: burning more than 2,000 acres, killing more than 250 people, leaving around 100,000 homeless, and destroying more than 17,400 structures.

In an online questionnaire distributed by the NFPA, 42 percent of the 36,000 respondents were not aware that smoke alarms are necessary inside every bedroom, outside each sleeping area, and on every level of a home (including the basement). The NFPA intends to fix these worrying statistics with tons of fun Fall activities, challenges, and facts that make learning about fire safety even more fun. Smoke alarms save lives and the more you know about protecting your home, the better.

Take the 2015 Fire Prevention Week Quiz after reading up on fire safety to test your knowledge on smoke alarm safety today! http://www.nfpa.org/safety-information/fire-prevention-week/fire-prevention-week-quiz

Thursday, September 17, 2015

NorCal NECA's 2015 Project Excellence Awards

Intrepid Electronic Systems would like to congratulate Collins Electrical Company for the Project Excellence Award they just won from the Northern California Chapter of NECA! Collins demonstrated contracting expertise in their "Mountain House High School Increment 2" project in Mountain House and their "Memorial Medical Center Emergency Department Remodel Phase I" in Modesto.


Using technologically advanced lighting control, communication, and safety system equipment, Collins created a progressive campus that included two classroom buildings, an administration building, a gymnasium, a multi-use food services building, a sports field, and a football stadium.

"The project shows very well as the use of the BIM system provided the exact layout, and the installation is spot on. Collins Senior Project Manager Wen Luu said that the Mountain House project was a 'successful coordinated effort to build multiple high-end buildings, classrooms, and the stadium. Had it not been for the teamwork of the owner and the design team, this would not have been possible.'"

Greg Armstrong, Executive Director of the Northern California Chapter, NECA, went on to comment that "NECA's Project Excellence Awards program allows our electrical contractors and the project team members to be recognized for excellence in construction. NECA contractors not only perform specialized electrical work, but also follow sustainable practices to ensure the highest level of energy efficiency in new construction and retrofitted projects. This prestigious recognition gives them an opportunity to market their achievements."

Along with Collins Electrical Company, these other marvelous NECA electrical contractors and their project team members received honors for construction excellence:

  • BECI Electric, Inc. (Oakland) for City of Berkeley Streetlighting LED Conversion (Berkeley)
  • Columbia Electric, Inc. (San Leandro) for Cayetano Park (Livermore)
  • Del Monte Electric Co., Inc. (Dublin) for Lawrence Berkeley National Laboratories, Flexlab (Berkeley)
  • Long Electric (Napa) for Genentech CCp-2 Return to Service (Vacaville)
  • Napa Electric Shop (Napa) for Hall Winery Phase 3B (St. Helena)
  • Ray's Electric (Oakland) for Automated License Plate Recognition (City of Piedmont)
  • Smith & Sons Electric, Inc. (Fremont) for Berkeley West Branch Library (Berkeley)
  • St. Francis Electric (San Leandro) for Downtown Napa Traffic Signal Modification (Napa)
  • Trinity EMCS, Inc. (Benicia) for City of Berkeley West Branch Library (Berkeley)   

Wednesday, September 16, 2015

"Cybersecurity Risk Management 101" - Electrical Construction & Maintenance Magazine

"The dangers of Internet hacking became all too evident when the theft of 1.2 billion usernames, passwords, and email addresses by a Russian gang was revealed late in the summer of 2014. Unfortunately, the risk of fraud and financial loss is not limited to this one incident, making it extremely important for owners of electrical contracting firms to protect all of their company’s data and any customer information they have in their systems.
Because the most valuable assets of every business now involve some form of Internet connection and data storage of customer lists, employee records, vendor receipts, and tax documents, every owner, manager, or executive should be able to recognize the security threats and risks inherent in living in today’s digital world.

The breach

Cyber hacking is big business, which is why it is becoming more and more likely that your electrical contracting firm could suffer from a cybersecurity breach. At first glance, the greatest risk might seem to lie with high-profile and high-risk businesses. However, small- to medium-sized businesses are increasingly finding themselves at risk. According to a recent study by the U.S. Secret Service and Verizon Communications, Inc., more than 72% of all data breaches occurred in small- or medium-sized businesses.
Think about your day-to-day work activities. You regularly correspond through e-mail, transfer information via the Internet, and conduct business meetings online. If you secure names, social security numbers, or any other sensitive customer information, you’re required by law to take all the necessary steps to protect this data from loss and theft. If a breach occurs, do you know what you’re required to do after such an event?
In the United States, most states have breach notification laws, and other countries are following suit. In other words, many laws mean written notification must be sent to the affected individuals. Even where such laws are not in place, your firm would be wise to provide breach notification if there’s ever an issue.
Losing the trust of customers can be much more damaging than the financial loss of repairing the effects of any breach. To make matters worse, your business can be held liable for the loss of third-party data. If there is a data breach, your operation could find itself facing expensive damage claims.

Do-it-yourself risk management

The increasing threat of data breaches makes it important for every business to reinforce security practices. How do you manage this risk?
Security experts agree that the easiest place to start is with strong password protection. That’s right, password protection. Believe it or not, this is something a surprising number of IT-sophisticated businesses often fail to master. Many recently exposed “hacking” cases have been traced back to weak passwords that were either not encrypted, “salted,” or not changed regularly.
If managing passwords for all of the operation’s servers, apps, cloud services, databases, tablets, and laptops seems daunting, there are affordable password management professionals and software that will do it for you — usually avoiding the often big price tag of cyber insurance. Other tips to help secure your operation’s data, reduce potential liability, and, in many cases, reduce the cost of insurance, include:
  • Get a firewall. There are hardware and software approaches that are both cheap and easy to use.
  • Conduct regular assessments of possible risks to reveal hardware, software, and individual site vulnerabilities.
  • Isolate computers that are used for sensitive applications, such as making electronic bank deposits, from the rest of your company’s network.
  • Control access to data, which often means limiting delivery and exchange of customer or client-related documents and information to secure channels.
  • Get antivirus software, and use it. There are a number of popular packages, most of which are relatively inexpensive. Although free updates are typically included, make sure to update the program regularly, or, better yet, allow the software to do so automatically.
  • When an employee who has had access to the system leaves the company, make sure his or her passwords are no longer valid. Many companies lock an employee out of the system just before or at the same time he or she is being terminated.
  • Create and implement a data security plan that includes immediate notification of all affected parties.
  • Share the liability by demanding similar protocols with vendors, and check for compliance.

Insurance to the rescue

It’s important to realize that the data in your electrical contracting firm is probably not protected because liability for loss of customer or employee data is not typically covered under many of today’s insurance policies. Some existing business insurance policies do offer general liability, while Directors and Officers (D&O) liability may provide a measure of coverage for these areas. However, as the risk escalates, most electrical professionals, business owners, managers, and executives are discovering significant gaps in what is and what isn’t covered after a hack attack. Unfortunately, by then it’s too late.
A business interruption insurance policy will rarely come to the rescue in the event of a system failure because of a malicious employee, computer virus, or a hack on a business. Identity theft, telephone hacking, and phishing scams are all very real possibilities rarely covered by traditional business interruption policies. While few “umbrella” policies or blanket liability insurance policies cover these types of losses, a new form of insurance, “cyber liability insurance,” has been available for approximately 10 years. Regrettably, it is rarely purchased.
Cyber liability insurance can cover hacker attacks, viruses, and worms that steal or destroy a business’s data. Even e-mail or social networking harassment and discrimination claims can be covered along with trademark and copyright infringement. Cyber liability insurance will often cover the loss of profits because of a system outage caused by a non-physical peril such as a virus or attack.
When looking into cyber insurance, common sense dictates that all potential risks should be covered, including laptops and mobile phones. Portable devices make it much easier to both store and lose information. For example, a missing USB stick, a stolen iPad, or a laptop left in a job-site trailer are all real possibilities — and ultimately a gold mine for hackers. There are even viruses being built today with the sole purpose of attacking mobile devices.
A good insurance company will ensure a policy holder has all the protection in place that is possible. It can make sure a firewall is in place to protect your network and help create social media policies that reduce your company’s risk. Even if data is stored in the cloud, your firm may still be liable for a breach. Although controlling how a cloud provider handles the operation’s data is almost impossible, cyber insurance can protect the operation from its mistakes.
Although large corporations often have risk management budgets, small businesses typically don’t. Unfortunately, most hack attacks target businesses with less than 250 employees — a group where few firms have the financial means to pay the fines and lawsuits that result from breaches or data losses or to stay afloat throughout the repair and reconstruction process.
The bottom line for small- to medium-sized electrical contracting firms is this: Hackers are getting more sophisticated every day, sometimes forming syndicates of like-minded criminals to share information and new techniques. Businesses, even small ones, are increasingly in their crosshairs and need to use every protection strategy available to combat this growing cyber threat.     

Battersby is a freelance writer in the suburban Philadelphia community of Ardmore, Pa. He can be reached at mebatt12@earthlink.net."

NorCal FPO 6th Annual Golf Tournament - "Driving Ahead for Prevention"

For the September 11th National Day of Remembrance, the Northern California Fire Prevention Officers (NorCal FPO) hosted their annual golf tournament at the Chardonnay Golf Club in Napa. The FPO's goal was to bring together "educators, enforcers and engineers to one place to network, share information, remember September 11th and raise funds for two charities; the Firefighters Burn Institute (FFBurn) and the Alisa Ann Ruch Burn Foundation (AARBF)." Intrepid Electronic Systems participated as a Gold Sponsor, donating $1,500 to the event's courageous cause. 

The following are pictures from the tournament. 

Here is Intrepid's very own Heather Lent (left) posing with Joel Brick (right) of the Fairfield Fire Department (FFD). 
The area for the marshmallow driving contest which was later won by Joel Brick of the FFD.
Intrepid's rad booth setup!
One of the holes at the tournament.
Intrepid's sponsorship picket.

Wednesday, September 9, 2015

KCET has "10 Things to Know About California Wildfires"

"There are two distinct wildfire seasons in California: ones driven by Santa Ana winds (usually October to April) and ones generally exacerbated by heat in the summer months (usually June to September). Santa Ana fires spread more quickly, while non-Santa Ana fires spread more slowly and are considered less intense, though they can burn longer.
Climate change will probably worsen wildfires, but wildfires can also make climate change worse. When undisturbed, forests and wildlands capture and store millions of tons of carbon from the atmosphere in California; wildfires release carbon back into the atmosphere, exacerbating climate change. An April 2015 study by the National Park Service and UC Berkeley, published in Forest Ecology and Management, showed that five to seven percent of carbon emissions between 2001 and 2010 came from wildfires.
Look forward to more burned-over landscapes in California. A September 2015 paper published in Environmental Research Letters by scientists from the University of California predicts that California land burned by wildfires will increase in the coming decades. By comparing temperature, wind, and relative humidity in the present climate with projections from five different global climate models, they are able to project that area burned by Santa Ana fires will increase by 64 percent; and the area burned by non-Santa Ana fires will increase by 77 percent. Factors that point to this increase: an increase in more intense Santa Ana winds and an increase in temperatures, both due to climate change.
Does it seem like there are more wildfires than in previous years? There are. 2014 saw 1,000 more wildfires than average. 2015 is already an above-average year for wildfires in California, with more than 100,000 acres already burned by August.
The current fire season has officials worried. In August 2015, California Governor Jerry Brown declared a state of emergency to help fight the current wildfires raging across the state.
You can track current fires online. CalFire's Ready For Wildfire website is a great place to start. CalFire also maintains a statewide Google map that shows you where wildfires are burning. And to check the spread of fires in progress and learn more detail than the maps make available, the inter-agency Inciweb site is an invaluable resource.
Few things are as destructive to property as wildfire. Since 1990, more than 17,000 homes and other structures have been damaged or destroyed by wildfires in California.
We pay a lot for firefighting. California's 2014 wildfire budget of $209 million ran out at the end of September last year.
Smoke from wildfires is a public health problem. In addition to causing burning eyes, a scratchy throat, and runny nose, particulate matter present in wildfire smoke can cause bronchitis and premature death for those with heart, respiratory, and lung conditions. Another cause for concern: the presence of carbon monoxide in smoke.
A new and unexpected challenge for firefighters: drones. Fire officials were forced to ground aircraft responding to the Lake Fire in San Bernardino County in July 2015 after drones entered the air space. The California Department of Forestry and Fire Protection responded with a public information video entitled "If You Fly, We Can't". They're calling on the public to report onlookers flying drones near wildfire and disaster areas (1-844-DRONE11)."