Sunday, July 24, 2005

Pea Soup Smoke Machine

Car / Van Security Smoke Screen

Signature Security Group - Smoke Shield

Signature - Smoke Shield

Martin Security Smoke

SmokeCloak
IPA125 Acoustic protection
IPL3000 Security Lighting - stobing with SmokeCloak

BS 7939:1999 Smoke security devices. Code of practice for manufacture, installation and maintenance

BS 7939:1999 Smoke security devices. Code of practice for manufacture, installation and maintenance

Devices that generate smoke are not a recent innovation; they have been used for a wide number of applications for many years. They are, however, a recent addition to the security industry, where they play an important role in reducing the risk of property loss. This is achieved by providing protection to the premises in the time between an alarm activation and attendance at site by a keyholder. The smoke security devices are designed to fill the protected area with a dense cloud of smoke in order to reduce visibility to typically less than arm's length.

This code of practice has been drawn up to enable manufacturers, suppliers and installers of smoke
security devices to meet minimum standards required for the safety of personnel and the prevention of damage to furniture and equipment in the protected premises. It is intended to be applied in addition to any relevant statutory requirements.

It is hoped that this code of practice will encourage and assist the good management of the manufacture, installation and maintenance of such devices, and that insurers, police, fire authorities and clients wishing to use smoke security devices will insist that manufacturers and installers of the devices comply with the recommendations of this code of practice.

ISBN 0 580 28252 X

Concept Smoke Screen

Thieves can't steal what they can't see

Tuesday, July 12, 2005

Six Sigma Tutorial

It was started in Motorola, in its manufacturing division, where millions of parts are made using the same process repeatedly. It allows for only 3.4 defects per million opportunities for each product or service transaction. Six Sigma relies heavily on statistical techniques to reduce defects and measure quality.

It allows for only 3.4 defects per million opportunities for each product or service transaction. Six Sigma relies heavily on statistical techniques to reduce defects and measure quality.

Effectively applying the Six Sigma techniques is difficult compared to actually learning the techniques in a class.

Many assume that that Six Sigma works for bigger companies only as they produce in volumes and have thousands of employees. This notion is not true and Six Sigma can be effectively applied for small businesses and even companies with fewer than 10 employees.

Six Sigma methodology improves any existing business process by constantly reviewing and re-tuning the process. To achieve this, Six Sigma uses a methodology known as DMAIC (Define opportunities, Measure performance, Analyze opportunity, Improve performance, Control performance).

Six Sigma methodology can also be used to create a brand new business process from ground up using DFSS (Design For Six Sigma) principles. Six Sigma Strives for perfection.

Six Sigma experts (Green Belts and Black Belts) evaluate a business process and determine ways to improve upon the existing process. Six Sigma experts can also design a brand new business process using DFSS (Design For Six Sigma) principles. Typically its easier to define a new process with DFSS principles than refining an existing process to reduce the defects.

Free downloadable Six Sigma eBook in PDF format

This Six Sigma Confidence Intervals eBook is free download for everyone who registers. You will learn about Six Sigma Methodology, confidence intervals and other Six Sigma concepts.


If you refer us one or more friends, we will make you a premier member. Premier members get preference in receiving future Six Sigma study material. Registration will also enable you to get information on updates to our content. We will create a free account for you and send the id and password by e-mail within a week. Once you receive your id and password, you will be able to login to Six Sigma Tutorial and download.

Tuesday, July 05, 2005

Predixis Music Search

The MusicMagic™ button acoustically finds music based on computer analysis of the sounds in the music.

A MusicMagic™ search can help you discover artists, albums, and songs that complement the sounds of music you know and like.

Saturday, July 02, 2005

RF Micro Devices - Bluetooth

Wireless Interference Challenge

Bluetooth® wireless technology
shares the same 2.4GHz ISM (Industrial, Scientific & Medical)
band as other technologies and products such as Wi-Fi® (IEEE
802.11b), cordless phones and microwave ovens. Serious interference
issues can occur when more than one of these products is in
use at the same time - negatively impacting the performance
of the devices (i.e. static, dropped connections, etc.).

Bluetooth® & 802.11
Issues

The interference issues are even more severe when antennas
for both Bluetooth and 802.11 wireless technologies
are located within a meter of each other (for example, in
a notebook PC). The diagram below illustrates the Bluetooth
and 802.11 wireless interference issues.



Delivering Coexistence Solutions

Working with the Bluetooth Special Interest Group
(SIG) and other industry-leaders, RFMD has developed coexistence
solutions that allow users to operate Bluetooth and
other 2.4GHz wireless technologies simultaneously while maintaining
optimal system throughput, range and responsiveness. In office
environments this enables Bluetooth applications such
as mouse, keyboard, printing, file transfer and portable device
synchronization to run at the same time the user is connected
a network using 802.11. At home this means that mobile phones
and headsets enabled with Bluetooth technology can
operate efficiently even when microwave ovens, cordless phones,
and Wi-Fi® access points are in use.



RFMD supports a wide range of coexistence solutions to help
overcome the inherent interference challenges in today's wireless
world:



Adaptive Frequency
Hopping


RFMD played a leading role in
the Bluetooth SIG's efforts to respond to the growing
issue of interference in the 2.4GHz wireless space by helping
to develop Adaptive Frequency Hopping (AFH).



AFH works within the 2.4 GHz spectrum to take advantage of
the available frequencies without limiting the Bluetooth
transmission to a set of frequencies occupied by other technologies
(such as cordless telephones, microwave ovens and certain
Wireless Local Area Networking technologies, including IEEE
802.11b and IEEE 802.11g). This "adaptive hopping"
allows for more efficient transmission within the spectrum,
thereby providing the user with greater performance, even
if using other technologies along with Bluetooth wireless
technology.



Adaptive Frequency Hopping (AFH) is one of the key new features
of the recently released Bluetooth Version 1.2 Specification.




All of RFMD's UltimateBlue™
single-chip
solutions are Bluetooth Specification
Version 1.2 compliant and support AFH.


UltimateBlue™
Coexistence Technology

RFMD has developed UltimateBlue
Coexistence Technology, a coexistence solution specifically
designed to address the unique interference issues when Bluetooth
and 802.11 wireless technologies are collocated in the same
device (such as a notebook PC).






› Minimizes the interference between Bluetooth
  wireless technology and 802.11, while   maximizing
the data throughput of both   technologies when
they are used   simultaneously.


› Enhances the Adaptive Frequency
Hopping   (AFH) feature of Bluetooth V1.2
and also   improves the performance of previous
  generations of Bluetooth V1.1 devices.




› UltimateBlue Coexistence Technology
is a free   feature that can be enabled on any of
RFMD's   UltimateBlue
single-chip
solutions.




Key features of UltimateBlue Coexistence Technology include:


Works
with virtually all 802.11b/g chipsets


No hardware
design restrictions




802.11 solution can be any form factor
(mini PCI, PC Card, etc.)



No interface signals between 802.11 and
Bluetooth ICs required



No impact
to certification




Complaint with WECA, BQB, FCC and WHQL


No impact
to system software or drivers




Compliant to existing software and device
drivers



Forward
and backward compatible




Provides interface protection for Bluetooth
V1.1 devices



Packet Traffic Arbitration

Packet Traffic Arbitration (PTA) is part of the 802.15.2
recommended practices. PTA is a collaborative Time Division
Duplex (TDD) mechanism that minimizes the Bluetooth/802.11
coexistence challenges when both wireless technologies are
collocated in the same device, are located in very close proximity
to one another, and may share an antenna. PTA is designed
with quality of service in mind and is essential for ensuring
that Bluetooth audio runs seamlessly with data transfers
over 802.11 This makes PTA an ideal coexistence solution for
use in mobile phones and PDAs.


PTA is a recommended practice for Wireless
LAN applications, and although it is not part of the Bluetooth
specification, RFMD will be supporting it in future chips.
RFMD's Packet Traffic Arbitration solution is designed to
be flexible enough to use with any Wireless LAN chipset.




Packet Traffic Arbitration Block Diagram


Intel® Wireless
Coexistence System

RFMD has collaborated with Intel to develop a Bluetooth
+ 802.11 wireless coexistence solution for Intel's
Centrino™ mobile technology
. The Intel Wireless Coexistence
System (WCS) is based on RFMD's UltimateBlue
single-chip
solutions and enables simultaneous operation
of both Bluetooth and 802.11 wireless technologies.


Contact your local Intel FAE/TME for more
information on the Intel Wireless Coexistence System.


Already have an Intel Wireless Coexistence
platform? Contact
RFMD
for Bluetooth firmware updates.


Mobile
Computing Information for Developers
- Intel Website


Intel
Wireless Coexistence System
- Intel Website