Smart watches give users access to notifications and data on the go. While powerful alone, their capabilities increase when paired with other devices like phones. However, there are few explorations of watch-centric interactions between devices. The document introduces WatchConnect, a prototyping toolkit that emulates a smart watch with input/output capabilities to rapidly prototype watch interfaces and cross-device applications.
The document discusses paper batteries, which are flexible, ultra-thin energy storage devices made by combining carbon nanotubes with paper. A paper battery acts as both a battery and supercapacitor. It has advantages over traditional lithium-ion batteries such as being thinner, more flexible, and operating over a wider temperature range. Paper batteries are constructed by coating carbon nanotube films onto substrates and sandwiching them between electrolyte layers and paper. They work by producing electrons through the interaction of electrolytes during charging and discharging. Potential applications include powering small electronics and medical devices.
This document discusses the evolution of wireless technologies from 1G to 5G. It provides details on each generation including the technologies used, speed capabilities, and features. 1G allowed for analog voice calls with speeds up to 2.4 kbps. 2G introduced digital networks and SMS with speeds up to 64 kbps. 3G enabled broadband internet access on mobile devices with speeds from 144-384 kbps. 4G saw the rise of LTE networks offering speeds from 100 Mbps to 1 Gbps. 5G is expected to offer speeds over 1 Gbps along with low latency and support for new applications. The document compares the key aspects of each generation and concludes that 5G will revolutionize wireless connectivity.
The document discusses the manufacturing process of a missile component at Bharat Dynamics Limited. It describes the sequence of CNC turning operations performed to produce the required frame component, including facing, turning, parting, and step turning. The component consists of several important parts for the missile. The project aims to develop an optimal production process that reduces costs while maintaining quality.
This white paper discusses opportunities for improving the energy efficiency of 5G networks. It outlines how 5G networks can achieve a massive capacity boost while keeping energy consumption flat through various techniques, such as:
1) Implementing base station sleep modes to reduce energy consumption during low traffic periods.
2) Improving small cell energy efficiency through lower transmission power and switching off unused small cells.
3) Achieving network-level energy efficiency gains through solutions like sleep modes and improved power amplifier efficiency.
Wearable technology refers to electronic devices incorporated into clothing or accessories. While the market potential is large, current wearable devices face challenges like inaccuracy, unappealing designs, and overwhelming data. Collaboration across industries will be needed to address these issues and push wearables into the next generation, where invisibility, seamless connectivity, and personalization could help them gain widespread appeal. Wearable technology is forecasted to continue evolving and integrating into people's lives in a way that significantly impacts society and business.
This document discusses wireless charging of mobile phones using microwaves. It begins with an introduction to electromagnetic spectrum and the microwave region. It then discusses how wireless power transmission works using magnetic induction. The key components of a wireless power transmission system are a microwave generator, transmitting antenna, and receiving antenna called a rectenna. The system design section explains the transmitter and receiver design, including the use of a magnetron as the microwave generator. It also discusses the rectification process and inclusion of a sensor circuitry to allow charging when the phone is in use.
Smart watches give users access to notifications and data on the go. While powerful alone, their capabilities increase when paired with other devices like phones. However, there are few explorations of watch-centric interactions between devices. The document introduces WatchConnect, a prototyping toolkit that emulates a smart watch with input/output capabilities to rapidly prototype watch interfaces and cross-device applications.
The document discusses paper batteries, which are flexible, ultra-thin energy storage devices made by combining carbon nanotubes with paper. A paper battery acts as both a battery and supercapacitor. It has advantages over traditional lithium-ion batteries such as being thinner, more flexible, and operating over a wider temperature range. Paper batteries are constructed by coating carbon nanotube films onto substrates and sandwiching them between electrolyte layers and paper. They work by producing electrons through the interaction of electrolytes during charging and discharging. Potential applications include powering small electronics and medical devices.
This document discusses the evolution of wireless technologies from 1G to 5G. It provides details on each generation including the technologies used, speed capabilities, and features. 1G allowed for analog voice calls with speeds up to 2.4 kbps. 2G introduced digital networks and SMS with speeds up to 64 kbps. 3G enabled broadband internet access on mobile devices with speeds from 144-384 kbps. 4G saw the rise of LTE networks offering speeds from 100 Mbps to 1 Gbps. 5G is expected to offer speeds over 1 Gbps along with low latency and support for new applications. The document compares the key aspects of each generation and concludes that 5G will revolutionize wireless connectivity.
The document discusses the manufacturing process of a missile component at Bharat Dynamics Limited. It describes the sequence of CNC turning operations performed to produce the required frame component, including facing, turning, parting, and step turning. The component consists of several important parts for the missile. The project aims to develop an optimal production process that reduces costs while maintaining quality.
This white paper discusses opportunities for improving the energy efficiency of 5G networks. It outlines how 5G networks can achieve a massive capacity boost while keeping energy consumption flat through various techniques, such as:
1) Implementing base station sleep modes to reduce energy consumption during low traffic periods.
2) Improving small cell energy efficiency through lower transmission power and switching off unused small cells.
3) Achieving network-level energy efficiency gains through solutions like sleep modes and improved power amplifier efficiency.
Wearable technology refers to electronic devices incorporated into clothing or accessories. While the market potential is large, current wearable devices face challenges like inaccuracy, unappealing designs, and overwhelming data. Collaboration across industries will be needed to address these issues and push wearables into the next generation, where invisibility, seamless connectivity, and personalization could help them gain widespread appeal. Wearable technology is forecasted to continue evolving and integrating into people's lives in a way that significantly impacts society and business.
This document discusses wireless charging of mobile phones using microwaves. It begins with an introduction to electromagnetic spectrum and the microwave region. It then discusses how wireless power transmission works using magnetic induction. The key components of a wireless power transmission system are a microwave generator, transmitting antenna, and receiving antenna called a rectenna. The system design section explains the transmitter and receiver design, including the use of a magnetron as the microwave generator. It also discusses the rectification process and inclusion of a sensor circuitry to allow charging when the phone is in use.
The i'm Watch is a smartwatch developed by Blue Sky that was demoed at ARM TechCon 2011. It has a 1.54" color display with 240x240 pixel resolution, 64-128MB of RAM, 4GB of flash storage, and runs Android. The i'm Watch is compatible with Android, BlackBerry, iOS, Symbian, and Windows Phone smartphones, and has features like an address book, multitasking, music playback, news, photos, and video calling. It can operate for up to 48 hours on standby or 3 hours of talk time on a single charge.
A smartwatch is a computerized wristwatch with enhanced functionality beyond timekeeping. Modern smartwatches effectively function as wearable computers, running mobile apps or full mobile operating systems. Early models performed basic tasks while modern smartwatches allow access to notifications, calls, messages, mobile apps, and some function as mobile phones. Smartwatch developers include Sony, Samsung, and Pebble. Advantages include faster access to information and social media, while disadvantages include potential distractions and reliance on a connected smartphone. Future smartwatches may have more innovative features, varying functionality, and be even smaller and more portable.
5G mobile technology aims to provide faster download speeds, lower latency, and more bandwidth than previous generations. It is expected to be fully implemented by 2020. 5G will offer super fast and efficient mobile networks through bidirectional large bandwidth and connectivity anywhere in the world. Download and upload speeds may reach 3.77 Gbps. Applications of 5G include mobile devices that can sense natural disasters, self-cleaning phones, and health monitoring through suggested medications. 5G networks will utilize unified IP and seamless combinations of technologies to dynamically access information through various connected devices.
The document discusses the evolution of mobile technologies from 1G to 5G. It describes the key features of each generation including their development timelines and speed capabilities. 5G is presented as the next major phase that will offer speeds up to 1 Gbps, more capacity than previous generations, and make wireless communication almost limitless with incredible transmission speeds. The hardware and software requirements for 5G are outlined as using ultra wide band networks and smart antennas to achieve speeds 400 times faster than today's networks.
This presentation is about quantum computing.which going to be new technological concept for computer operating system.In this subject the research is going on.
Wearable technology refers to incorporating computer and electronic technologies into clothing and accessories. Smart garments can respond to body movement through integrated textiles and technology to provide new solutions for healthcare and social issues. Key drivers of wearable technology growth include faster, smaller, and cheaper hardware, as well as cloud storage and data. Examples discussed include Google Glass, Drum Pants 2.0 that turn the body into a music instrument, and future smart clothes that can change color, charge other devices, and control temperature. The future of wearable technology is predicted to involve technology becoming a "second skin" through skin-embedded technologies, 3D printed biological materials, and garments that respond to the environment with head-to-toe
This document discusses technologies for future generations of wireless mobile communication networks. It describes 1st, 2nd, 3rd and 4th generation networks and their characteristics. It then focuses on technologies being developed for 5th generation networks, including OFDM, MIMO, software defined radio, and cognitive radio. It proposes a hierarchical network structure using macro cells, micro cells and pico cells. Key technologies discussed that could enable 5G networks include reconfigurable systems, distributed collaboration, and nanotechnology.
The document discusses the evolution of wireless technologies from 1G to 5G. It describes the key concepts and architecture of 5G, including its hardware, software, and features. 5G is expected to offer speeds up to 1 Gbps, make wireless communication almost limitless, and enable new applications through its high connectivity and capabilities. It concludes that 5G will be more user-centric and available at lower costs than previous generations of wireless technology.
The document discusses wireless electricity or witricity. It explains that witricity involves the transmission of electrical energy from one object to another without wires. This is achieved through resonant magnetic coupling between a power source and receiver. The power source and receiver contain specially designed magnetic resonators that efficiently transfer power over mid-range distances through magnetic near fields in a safe, non-radiative manner. Potential applications include wireless charging of mobile electronics, electric vehicles, medical devices, and more.
Cell phones have evolved greatly since their origins in the mid-20th century. Early research into mobile phones in the 1940s used large vehicle-based phones, but the first handheld mobile phone call was made in 1973. Mass adoption of cellular technology was slow at first due to regulatory hurdles, but the introduction of digital networks in the 1980s and 1990s helped popularize cell phones. Modern cell phones are on their third generation of technology and support features like live streaming media, demonstrating how far the technology has progressed from its beginnings in car-based radios.
‘Bubble Power’-the revolutionary new energy source. It is working under the principle of Sonofusion.Sonofusion involves tiny bubbles imploded by sound waves that can make hydrogen nuclei fuse and may one day become a revolutionary new energy source.
Smart note taker is a pen that can write in air and store the information in an internal memory chip. It uses displacement sensors to sense the pen's movement and compare the handwriting to letters in its database to store what is written. Notes can then be uploaded and edited on a PC by docking the pen. The smart note taker allows paperless note taking anywhere and saves time over traditional notetaking. However, it has a very high cost which limits its accessibility. It finds applications in presentations, document editing and signatures.
The document discusses liquid electricity and vanadium redox batteries (VRBs). VRBs use liquid electrolytes containing vanadium ions that can reversibly shift between oxidation states, allowing the battery to be "recharged" by replacing the spent electrolyte with freshly charged electrolyte rather than conventional recharging. This overcomes limitations of traditional batteries for electric vehicles. VRBs were pioneered in the 1980s and have since been demonstrated on large scales for applications like grid energy storage. The document outlines the concept, history, operation, advantages and applications of VRB technology.
This document summarizes a seminar presentation on plastic solar cells. It begins with an introduction to plastic solar cells, which were first introduced in 1986 and use conducting plastics and flexible substrates. It then describes conventional solar cells made from semiconductors, which have high efficiency but are expensive to produce. The working principle of a basic p-n junction solar cell is explained. The document then discusses the device architectures, working principles, advantages and drawbacks of plastic solar cells, which use organic semiconductors and conjugated polymers. It concludes by stating that while plastic solar cells are more compact and effective than conventional cells, their current high cost is a major drawback that may be solved in the future.
This document provides an overview of robotics and embedded systems topics, including definitions of key concepts. It discusses embedded systems, robotics, advanced robotics involving various sensors and modules. It also introduces the ATmega16 microcontroller and programming in Arduino. Finally, it covers interfacing technologies like Bluetooth, Zigbee, GPS and ultrasonic sensors with microcontrollers.
This document provides an overview of mobile phone jammers, including: how they work by transmitting signals on the same frequencies used by cell phones to disrupt communication; the history of their development for law enforcement and military use; and the different types of jammer devices (types A through E). It also discusses applications of jammers like maintaining silence in libraries, preventing cell phone use in exams, and providing security in certain settings.
Automatic speed controller in real time vehicles.Jinto George
One third of the number of fatal or serious accidents are associated with excessive or inappropriate speed, as well as changes in the roadway. So to overcome this problem we are introducing a automatic speed controller in vehicles at schools, hospitals and danger zones. In this zones, the vehicles are not possible to move above the predefined speed limit. It is basically a Mechatronics system. Ie it is a combination of both mechanical and electronics system.
A quantum computer performs calculations using quantum mechanics and quantum properties like superposition and entanglement. It uses quantum bits (qubits) that can exist in superpositions of states unlike classical computer bits. A quantum computer could solve some problems, like factoring large numbers, much faster than classical computers. The document discusses the history of computing generations and quantum computing, how quantum computers work using qubits, superpositions and entanglement, and potential applications like encryption cracking and simulation.
The i'm Watch is a smartwatch developed by Blue Sky that was demoed at ARM TechCon 2011. It has a 1.54" color display with 240x240 pixel resolution, 64-128MB of RAM, 4GB of flash storage, and runs Android. The i'm Watch is compatible with Android, BlackBerry, iOS, Symbian, and Windows Phone smartphones, and has features like an address book, multitasking, music playback, news, photos, and video calling. It can operate for up to 48 hours on standby or 3 hours of talk time on a single charge.
A smartwatch is a computerized wristwatch with enhanced functionality beyond timekeeping. Modern smartwatches effectively function as wearable computers, running mobile apps or full mobile operating systems. Early models performed basic tasks while modern smartwatches allow access to notifications, calls, messages, mobile apps, and some function as mobile phones. Smartwatch developers include Sony, Samsung, and Pebble. Advantages include faster access to information and social media, while disadvantages include potential distractions and reliance on a connected smartphone. Future smartwatches may have more innovative features, varying functionality, and be even smaller and more portable.
5G mobile technology aims to provide faster download speeds, lower latency, and more bandwidth than previous generations. It is expected to be fully implemented by 2020. 5G will offer super fast and efficient mobile networks through bidirectional large bandwidth and connectivity anywhere in the world. Download and upload speeds may reach 3.77 Gbps. Applications of 5G include mobile devices that can sense natural disasters, self-cleaning phones, and health monitoring through suggested medications. 5G networks will utilize unified IP and seamless combinations of technologies to dynamically access information through various connected devices.
The document discusses the evolution of mobile technologies from 1G to 5G. It describes the key features of each generation including their development timelines and speed capabilities. 5G is presented as the next major phase that will offer speeds up to 1 Gbps, more capacity than previous generations, and make wireless communication almost limitless with incredible transmission speeds. The hardware and software requirements for 5G are outlined as using ultra wide band networks and smart antennas to achieve speeds 400 times faster than today's networks.
This presentation is about quantum computing.which going to be new technological concept for computer operating system.In this subject the research is going on.
Wearable technology refers to incorporating computer and electronic technologies into clothing and accessories. Smart garments can respond to body movement through integrated textiles and technology to provide new solutions for healthcare and social issues. Key drivers of wearable technology growth include faster, smaller, and cheaper hardware, as well as cloud storage and data. Examples discussed include Google Glass, Drum Pants 2.0 that turn the body into a music instrument, and future smart clothes that can change color, charge other devices, and control temperature. The future of wearable technology is predicted to involve technology becoming a "second skin" through skin-embedded technologies, 3D printed biological materials, and garments that respond to the environment with head-to-toe
This document discusses technologies for future generations of wireless mobile communication networks. It describes 1st, 2nd, 3rd and 4th generation networks and their characteristics. It then focuses on technologies being developed for 5th generation networks, including OFDM, MIMO, software defined radio, and cognitive radio. It proposes a hierarchical network structure using macro cells, micro cells and pico cells. Key technologies discussed that could enable 5G networks include reconfigurable systems, distributed collaboration, and nanotechnology.
The document discusses the evolution of wireless technologies from 1G to 5G. It describes the key concepts and architecture of 5G, including its hardware, software, and features. 5G is expected to offer speeds up to 1 Gbps, make wireless communication almost limitless, and enable new applications through its high connectivity and capabilities. It concludes that 5G will be more user-centric and available at lower costs than previous generations of wireless technology.
The document discusses wireless electricity or witricity. It explains that witricity involves the transmission of electrical energy from one object to another without wires. This is achieved through resonant magnetic coupling between a power source and receiver. The power source and receiver contain specially designed magnetic resonators that efficiently transfer power over mid-range distances through magnetic near fields in a safe, non-radiative manner. Potential applications include wireless charging of mobile electronics, electric vehicles, medical devices, and more.
Cell phones have evolved greatly since their origins in the mid-20th century. Early research into mobile phones in the 1940s used large vehicle-based phones, but the first handheld mobile phone call was made in 1973. Mass adoption of cellular technology was slow at first due to regulatory hurdles, but the introduction of digital networks in the 1980s and 1990s helped popularize cell phones. Modern cell phones are on their third generation of technology and support features like live streaming media, demonstrating how far the technology has progressed from its beginnings in car-based radios.
‘Bubble Power’-the revolutionary new energy source. It is working under the principle of Sonofusion.Sonofusion involves tiny bubbles imploded by sound waves that can make hydrogen nuclei fuse and may one day become a revolutionary new energy source.
Smart note taker is a pen that can write in air and store the information in an internal memory chip. It uses displacement sensors to sense the pen's movement and compare the handwriting to letters in its database to store what is written. Notes can then be uploaded and edited on a PC by docking the pen. The smart note taker allows paperless note taking anywhere and saves time over traditional notetaking. However, it has a very high cost which limits its accessibility. It finds applications in presentations, document editing and signatures.
The document discusses liquid electricity and vanadium redox batteries (VRBs). VRBs use liquid electrolytes containing vanadium ions that can reversibly shift between oxidation states, allowing the battery to be "recharged" by replacing the spent electrolyte with freshly charged electrolyte rather than conventional recharging. This overcomes limitations of traditional batteries for electric vehicles. VRBs were pioneered in the 1980s and have since been demonstrated on large scales for applications like grid energy storage. The document outlines the concept, history, operation, advantages and applications of VRB technology.
This document summarizes a seminar presentation on plastic solar cells. It begins with an introduction to plastic solar cells, which were first introduced in 1986 and use conducting plastics and flexible substrates. It then describes conventional solar cells made from semiconductors, which have high efficiency but are expensive to produce. The working principle of a basic p-n junction solar cell is explained. The document then discusses the device architectures, working principles, advantages and drawbacks of plastic solar cells, which use organic semiconductors and conjugated polymers. It concludes by stating that while plastic solar cells are more compact and effective than conventional cells, their current high cost is a major drawback that may be solved in the future.
This document provides an overview of robotics and embedded systems topics, including definitions of key concepts. It discusses embedded systems, robotics, advanced robotics involving various sensors and modules. It also introduces the ATmega16 microcontroller and programming in Arduino. Finally, it covers interfacing technologies like Bluetooth, Zigbee, GPS and ultrasonic sensors with microcontrollers.
This document provides an overview of mobile phone jammers, including: how they work by transmitting signals on the same frequencies used by cell phones to disrupt communication; the history of their development for law enforcement and military use; and the different types of jammer devices (types A through E). It also discusses applications of jammers like maintaining silence in libraries, preventing cell phone use in exams, and providing security in certain settings.
Automatic speed controller in real time vehicles.Jinto George
One third of the number of fatal or serious accidents are associated with excessive or inappropriate speed, as well as changes in the roadway. So to overcome this problem we are introducing a automatic speed controller in vehicles at schools, hospitals and danger zones. In this zones, the vehicles are not possible to move above the predefined speed limit. It is basically a Mechatronics system. Ie it is a combination of both mechanical and electronics system.
A quantum computer performs calculations using quantum mechanics and quantum properties like superposition and entanglement. It uses quantum bits (qubits) that can exist in superpositions of states unlike classical computer bits. A quantum computer could solve some problems, like factoring large numbers, much faster than classical computers. The document discusses the history of computing generations and quantum computing, how quantum computers work using qubits, superpositions and entanglement, and potential applications like encryption cracking and simulation.
Obiee111170 software only installation win7 64 bitRavi Kumar Lanke
The document is a 43 page report prepared by Ravi Kumar Lanke. Each page is attributed to Ravi Kumar Lanke and provides information on an unspecified topic. The document covers 43 sequentially numbered pages with consistent attribution and formatting.
Vortrag 'Servicialisierung' beim itSMF-RF Rhein-Main 2014-01-23 V03.00.00servicEvolution
Das generische & universell anwendbare Leitkonzept der Servicialisierung für standardisierte & rationalisierte, automatisierte & optimierte sowie verlässliche & spezifikationsgemäße, rationelle & rentable Service/Dienst-Erbringung (= Servuktion)
- wird hergeleitet, erläutert & illustriert in dem Konzeptpapier 'Servicialisierung - Service-Erbringung & Methodik'
https://www.slideshare.net/PaulGHz/konzeptpapier-servicialisierung-serviceerbringung-und-methodik-v060300pdf
- wird kompakt dargestellt in der Strukturmatrix 01 'Servicialisierung & Methoden'
https://www.slideshare.net/PaulGHz/strukturmatrix-01-servicialisierung-methoden-v060100pdf
- enthält die grundlegenden Methoden
-- Service-Identifizierung - Service-Typ & Wesensmerkmale
https://www.slideshare.net/PaulGHz/konzeptpapier-serviceidentifizierung-servicetyp-wesensmerkmale-v060200pdf
-- Service-Spezifizierung - Service-Typ & Service-Erbringungsqualität
https://www.slideshare.net/PaulGHz/konzeptpapier-servicespezifizierung-servicetyp-und-serviceerbringungsqualitt-v060100pdf
-- Service-Katalog - Service-Typen & Servuktionsangebote
https://www.slideshare.net/PaulGHz/konzeptpapier-servicekatalog-servicetypen-und-servuktionsangebote-v060200pdf
- ist der Kern & das zweite der 3 Hauptelemente der generischen Geschäftsmodells für rechenschaftsfähige Service Provider/Dienstleister
s. Konzeptpapier 'Service Provider - Service-Trilemma & Geschäftsmodell'
https://www.slideshare.net/PaulGHz/konzeptpapier-service-provider-servicetrilemma-geschftsmodell-v060200pdf
- wird interaktiv vermittelt in den Seminaren & Seminar-Duos der Ausbildungsreihe 'ServicEducation'
https://www.slideshare.net/PaulGHz/ausbildungsreihe-serviceducation-2022-gesamtbeschreibung-v060000pdf
- wird einführend bzw. begleitend vorgestellt in der 14-teiligen Online-Seminarreihe 'service@ducation' bei & mit der Firma smile2 GmbH
s. Online-Seminarreihe 'service@ducation' - Gesamtbeschreibung
https://www.slideshare.net/PaulGHz/onlineseminarreihe-serviceducation-2022-gesamtbeschreibung-v060000pdf
s. Ausschreibungen bei der smile2 GmbH
https://my.smile2.de/eventsuche?search=Paul%20G.%20Huppertz
- beruht auf der konsistenten & kohärenten Service/Dienst-Terminologie, deren Grundstein die allgemeingültige & vollständige, eindeutige & konsistente Definition für den elementaren Grundbegriff 'Service (= Dienst)' ist.
s. Konzeptpapier 'Service-Definition - Herleitung & Anwendung'
https://www.slideshare.net/PaulGHz/konzeptpapier-servicedefinition-herleitung-und-anwendung-v060200pdf
s. Glossar Service-Terminologie
https://www.slideshare.net/PaulGHz/servicialisierung-glossar-serviceterminologie-v070000
- wurde erstmals öffentlich vorgestellt beim itSMF-Jahreskongress 2010 in dem Vortrag 'Servicialisierung - Serviceerbringung unter Industrialisierungsbedingungen'
https://www.slideshare.net/PaulGHz/it-smf-kongress-2010-vortrag-servicialisierung-v030000
Vorlesung Servicemanagement I - Blockvorlesung 05 - 2013-01-08 V02.01.00servicEvolution
Die Präsentationsunterlagen enthalten das Vorlesungsskript
- zur Blockvorlesung 05 zu 'Servicemanagement I'
- am 08.01.2013
- an der DHBW Mannheim
mit der folgenden Agenda
- Vorlesung - Themenstruktur, Themenfolge & Themenblöcke
- Einstieg - Service-Angebote, Service-Kataloge & Service-Vertrag
- Service-Konzipierung - Service-Spezifikation, Service Map & Service-Drehbuch
- Service-Orchestrierung - Service-Konzept, Service Supplier & Service Supply Chain
Die Vorlesung 'Servicemanagement I' wird durchgeführt
- an der DHBW Mannheim in der Fakultät Wirtschaft
- im Studiengang Wirtschaftsinformatik
- zur Studienrichtung Sales & Consulting
http://www.sc.dhbw-mannheim.de/
- in der Zeit vom 13.11.2012 - 29.01.2013, jeweils 09:00 - 13:00 Uhr
Die universell anwendbare Methode für die durchgängige & konsistente Konzipierung der verlässlichen & spezifikationsgemäßen Service/Dienst-Erbringung (= Servuktion) wird erläutert & illustriert in dem Konzeptpapier 'Service-Konzept - Service-Beitragstypen & Service-Drehbuch'.
https://www.slideshare.net/PaulGHz/konzeptpapier-servicekonzept-servicebeitragstypen-servicedrehbuch-v060200pdf
Die universell anwendbare Methode für die rationelle & stringente Orchestrierung von qualifiziert beauftragten Service Contribution Feedern wird erläutert & illustriert in dem Konzeptpapier 'Service-Orchestrierung - Service-Beitragstypen & Service-Beitragszubringer'.
https://www.slideshare.net/PaulGHz/konzeptpapier-serviceorchestrierung-servicebeitragstypen-servicebeitragszubringer-v060200pdf
https://www.slideshare.net/PaulGHz/konzeptpapier-servicetriathlon-auslser-adressaten-v060100pdf
Die universell anwendbare & durchgängige Methodik für verlässliche & spezifikationsgemäße, rationelle & rentable sowie standardisierte & rationalisierte, automatisierte & optimierte Service/Dienst-Erbringung (= Servuktion) wird
- hergeleitet & erläutert in dem Konzeptpapier 'Servicialisierung - Service-Erbringung & Methodik
https://www.slideshare.net/PaulGHz/konzeptpapier-servicialisierung-serviceerbringung-und-methodik-v060300pdf
- mit ihren Grundlagen & Zusammenhängen dargestellt in der Strukturmatrix 01 'Servicialisierung & Methoden'.
https://www.slideshare.net/PaulGHz/strukturmatrix-01-servicialisierung-methoden-v060100pdf
s. Diskussionspapiere
- Servicemanagement versus Service-Erbringung
https://www.slideshare.net/PaulGHz/diskussionspapier-servicemanagement-versus-serviceerbringung-v010000
- Serviceorganisation versus Service Provider
https://www.slideshare.net/PaulGHz/diskussionspapier-serviceorganisation-versus-service-provider-v010000pdf
- Managed Services Provider versus ICTility Service Provider
https://www.slideshare.net/PaulGHz/diskussionspapier-managed-services-provider-versus-ictility-service-provider-v010300pdf
- Serviceorientierung versus Servicialisierung
https://www.slideshare.net/PaulGHz/diskussionspapier-serviceorientierung-versus-servicialisierung-v010000pdf
CMS-Forum 2009: Vortrag 'Der Service-Advokat zur CMDB' 2009-01-21 V03.00.01servicEvolution
In dem Vortrag wird dargestellt, durchleuchtet & diskutiert
- ob CMDB und Service zusammenpassen
- wie CMDBs service-gerecht gestaltet werden
- was mit "Service Assets" gemeint ist
- was im Service-Katalog verzeichnet wird & was woanders
- wovon IT-basierte Services und deren verlässliche Erbringung abhängen
- ob Services als Configuration Items taugen
CMDB und Service passen nicht zusammen, denn einen Service als solchen kann man nicht dokumentieren, da er per se intangibel & immateriell, substanzlos & flüchtig ist. Die unausweichlichen & unabänderlichen Service-Charakteristika werden umfassend & durchgängig berücksichtigt in der allgemeingültigen & vollständigen, eindeutigen & konsistenten Definition für den elementaren Grundbegriff 'Service (= Dienst)', die prägnant abgegrenzt ist gegen die gleichartig beschaffene Definition für den elementaren Grundbegriff 'Produkt (= Erzeugnis)'.
s. Konzeptpapier 'Service-Definition - Herleitung & Anwendung'
https://www.slideshare.net/PaulGHz/konzeptpapier-servicedefinition-herleitung-und-anwendung-v060200pdf
s. Diskussionspapier 'Workshop 'Service-Definition''
https://www.slideshare.net/PaulGHz/diskussionspapier-workshop-servicedefinition-v090000
Die nachvollziehbar hergeleitete & plausibel erklärte Service/Dienst-Definition ist der robuste & belastbare Grundstein der Service/Dienst-Terminologie mit in sich schlüssigen sowie untereinander konsistenten Definitionen aller anderen Service/Dienst-Termini & ihrer Synonyme.
s. Glossar Service-Terminologie
https://www.slideshare.net/PaulGHz/servicialisierung-glossar-serviceterminologie-v070000
Die konsistente & kohärente Service/Dienst-Terminologie ist das solide & selbsttragende Fundament
- der universell anwendbaren Methoden für standardisierte & rationalisierte, automatisierte & optimierte Service/Dienst-Erbringung (= Servuktion), die zusammengefasst sind im Leitkonzept der Servicialisierung.
s. Konzeptpapier 'Servicialisierung - Service-Erbringung & Methodik'
https://www.slideshare.net/PaulGHz/konzeptpapier-servicialisierung-serviceerbringung-und-methodik-v060300pdf
s. Strukturmatrix 01 'Servicialisierung & Methoden'
https://www.slideshare.net/PaulGHz/strukturmatrix-01-servicialisierung-methoden-v060100pdf
- der Serviciologie, der Wissenschaft & Lehre von der Logik der Services/Dienste & von der Logik der Service/Dienst-Erbringung (= Servuktion)
https://www.slideshare.net/PaulGHz/serviciologie-serviceterminologie-und-servicetaxonomie-v010000
Ein rechenschaftsfähiger ICTility Service Provider/Dienst-Leister erstellt kompakte & aussagekräftige ICTility Service/Dienst-Kataloge für erforderliche ICTility Service/Dienst-Typen.
s. Konzeptpapier 'ICTility Service-Katalog - ICTility Service-Typen & Servuktionsangebote'
https://www.slideshare.net/PaulGHz/konzeptpapier-ictility-servicekatalog-ictility-servicetypen-servuktionsangebote-v060200pdf
In Brüssel denken einige Experten darüber nach, dass nur die kritischen Komponenten von klinischen Informationssystemen konform mit den Normen (z.B. IEC 62304) entwickelt werden müssen.
Diese Präsentation ist ein Plädoyer dagegen.
6. Definition Maschine 1 Was ist eine Maschine? (1 von 5) § „Eine mit einem anderen Antriebssystem als der unmittelbar eingesetzten menschlichen oder tierischen Kraft ausgestattete oder dafür vorgesehene Gesamtheit miteinander verbundener Teile oder Vorrichtungen, von denen mindestens eines bzw. eine beweglich ist und die für eine bestimmte Anwendung zusammengefügt sind.“
7. Definition Maschine 2 Was ist eine Maschine? (2 von 5) § „Eine Gesamtheit im Sinne des ersten Gedankenstrichs, der lediglich die Teile fehlen, die sie mit ihrem Einsatzort oder mit ihren Energie- und Antriebsquellen verbinden.“
8. Definition Maschine 3 Was ist eine Maschine? (3 von 5) § „Eine einbaufertige Gesamtheit im Sinne des ersten und zweiten Gedankenstrichs, die erst nach Anbringung auf einem Beförderungsmittel oder Installation in einem Gebäude oder Bauwerk funktioniert.“
9. Definition Maschine 4 Was ist eine Maschine? (4 von 5) § „Eine Gesamtheit von Maschinen … oder von unvollständigen Maschinen …, die, damit sie zusammenwirken, so angeordnet sind und betätigt werden, dass sie als Gesamtheit funktionieren.“
10. Definition Maschine 5 Was ist eine Maschine? (5 von 5) § „Eine Gesamtheit miteinander verbundener Teile und Vorrichtungen, von denen mindestens eines bzw. eine beweglich ist und die für Hebevorgänge zusammengefügt sind und deren einzige Antriebsquelle die unmittelbar eingesetzte menschliche Kraft ist.“
11. Definition Anlage Was ist eine Anlage (Maschinenanlage)? Komponenten sind als Gesamtheit in einer Weise angeordnet, dass sie als Einheit anzusehen sind UND Komponenten wirken als Gesamtheit zusammen (gemeinsamer Materialfluss) UND Komponenten werden als Gesamtheit betätigt (gemeinsame Steuerung) UND Komponenten funktionieren sicherheitstechnisch als Gesamtheit (gemeinsame Sicherheitsfunktionen)
12. Definition Unvollständige Maschine Was ist eine unvollständige Maschine? Eine unvollständige Maschine ist eine Gesamtheit, die fast eine Maschine bildet. UND Die unvollständige Maschine hat für sich betrachtet keine bestimmte Funktion (… cannot in itself perform a specific application …) UND Sie ist nur dazu bestimmt, mit anderen unvollständigen Maschinen, Maschinen oder Ausrüstungen zu einer funktionsfähigen Maschine zusammengefügt zu werden.
18. Maschinenrichtlinie Integration der Sicherheit § „Die Maschine ist so zu konstruieren und zu bauen, dass sie ihrer Funktion gerecht wird und unter den vorgesehenen Bedingungen – aber auch unter Berücksichtigung einer vernünftigerweise vorhersehbaren Fehlanwendung der Maschine – Betrieb, Einrichtung und Wartung erfolgen kann, ohne dass Personen einer Gefährdung ausgesetzt sind.“
19. Maschinenrichtlinie Allgemeine Grundsätze – Anhang I der MRL § „Der Hersteller … hat dafür zu sorgen, dass eine Risikobeurteilung vorgenommen wird, um die für die Maschine geltenden Sicherheits- und Gesundheitsschutzanforderungen zu ermitteln. Die Maschine muss dann unter Berücksichtigung der Ergebnisse der Risikobeurteilung konstruiert und gebaut werden.“
20.
21. Ergebnisse müssen in der Betriebsanleitung bzw. Montageanleitung berücksichtigt werden
28. Gefährdung - Risiko Entstehung eines Schadensereignisses Gefahrensituation oder Person tritt in Gefahrenbereich Gefahr wird aktiv
29. Gefährdung - Risiko Entstehung eines Schadensereignisses Gefährdungsereignis Gefahr wird aktiv bzw. Person betritt aktiven Gefahrenbereich
30. EN ISO 14121 Begriffsdefinitionen Schaden „physische Verletzung oder Schädigung der Gesundheit“ Gefährdung „eine potenzielle Quelle von Verletzungen und Gesundheitsschäden“
31. EN ISO 14121 Begriffsdefinitionen Gefährdungsbereich „jeder Bereich in einer Maschine und/oder um eine Maschine herum, in dem eine Person einer Gefährdung ausgesetzt sein kann“ Gefährdungssituation „Sachlage, bei der eine Person mindestens einer Gefährdung ausgesetzt ist“
32. EN ISO 14121 Begriffsdefinitionen Risiko „Kombination aus Wahrscheinlichkeit des Eintritts eines Schadens und seines Schadensausmaßes“ Restrisiko „Risiko, das nach der Anwendung von Schutzmaßnahmen verbleibt “
33. Maschinenrichtlinie Begriffsdefinitionen § Vernünftigerweise vorhersehbare Fehlanwendung „die Verwendung einer Maschine in einer laut Betriebsanleitung nicht beabsichtigten Weise, die sich jedoch aus leicht absehbarem menschlichem Verhalten ergeben kann “ In der Praxis: Technische Anpassungen infolge von Reklamationen, durch die Fehlverhaltensweisen bekannt werden
34. Schadensereignisse Ursachen von Schadensereignissen Mangelhafte Verwendungs-vorschriften Mangelhafte Produkt- eigenschaften Nicht bestimmungsgemäße Produktverwendung Konstruktion Produktion Anwender Entsorger Verantwortung nicht können Selbstüber- schätzung, Zeitdruck Mangelnde Herstell- und Montageverfahren Körpergröße, Konzentration, Reflexe Mangelnde Ausrüstung nicht wissen Mangelnde Ausbildung Mangelnde Materialkenntnis Mangelndes Produktwissen Mangelndes Produktwissen nicht wollen Spardruck Spardruck Missachtung der Betriebsanleitung Bequemlichkeit, Spardruck Lebensphasen Entwicklung Bau Verwendung Entsorgung
35. Risikobeurteilung Wann muss die Risikobeurteilung durchgeführt werden? Iteratives Verfahren der Risikobeurteilung und Risikominderung Planung/Entwicklung Konstruktion Bau Risikobeurteilung
36. Risikobeurteilung Iterativer Prozess zur Risikominderung START Wurde das Risiko hinreichend vermindert? Festlegung der Grenzen der Maschine Ja Identifizierung der Gefährdungen Risikoanalyse ENDE Nein Risikoeinschätzung Risikobewertung Risikobeurteilung Risikominderung (ISO 12100-1:2003)
59. Risikoeinschätzung Risikoeinschätzung Risiko Bezogen auf die betrachtete Gefährdung Schadens-ausmaß Das aus der betrachteten Gefährdung verursacht werden kann Eintritts-wahrscheinlichkeit Gefährdungsexposition einer Person/von Personen ist eine Funktion von und Eintritt eines Gefährdungsereignisses Möglichkeit zur Vermeidung oder Begrenzung des Schadens
73. Es werden Maßnahmen ausgewählt, die zur Erreichung der Schutzziele ergriffen werden
74.
75. Risikobewertung Erreichen einer hinreichenden Risikominderung Unfallrisiko < Grenzrisiko Eine gesetzliche Definition des Grenzrisikos existiert nicht!
76. Risikobewertung Risikoakzeptanz Risiko- akzeptanz erheblich klein Grad der Selbstbestimmung Berufliches Umfeld Maß der Freiwilligkeit Ursache Einflüsse auf das akzeptierbare Risiko benutzer- unabhängig benutzer- abhängig klein groß Büro Baustelle Beruf Freizeit
77. Risikobewertung Risikoeinstufung Risiko ohne Schutzmaßnahme Eintrittswahrscheinlichkeit Bereich des nicht akzeptierten Risikos häufig gelegentlich Risikoakzeptanzgrenze selten unwahrscheinlich Bereich des akzeptierten Risikos praktisch unmöglich Schadensausmaß Tod heilbare Verletzungen ohne Arbeitsausfall heilbare Verletzungen mit Arbeitsausfall leichter bleibender Gesundheitsschaden schwerer bleibender Gesundheitsschaden
79. Risikobewertung Risikoeinstufung Risiko mit Schutzmaßnahme Eintrittswahrscheinlichkeit Bereich des nicht akzeptierten Risikos häufig gelegentlich Risikoakzeptanzgrenze selten unwahrscheinlich Bereich des akzeptierten Risikos praktisch unmöglich Schadensausmaß Tod heilbare Verletzungen ohne Arbeitsausfall heilbare Verletzungen mit Arbeitsausfall leichter bleibender Gesundheitsschaden schwerer bleibender Gesundheitsschaden
84. Risikobewertung Kategorien nach EN 954-1 B: Basismaßnahmen sind zu berücksichtigen 1: Bewährte Bauelemente und bewährte Komponenten sind einzusetzen 2: Ein regelmäßiger Test der Sicherheitsfunktion muss durchgeführt werden 3: Die Technik muss fehlertolerant ausgelegt sein 4: Auch wenn mehrere Fehler in der Technik auftreten, darf die Sicherheit nicht versagen
85. Risikobewertung Risikograph nach ISO 13849 Erforderlicher Performance Level a Niedriger Beitrag zur Risikoreduzierung P1 F1 P2 S1 b P1 F2 Start P2 c P1 F1 P2 S2 d P1 F2 P2 e Hoher Beitrag zur Risikoreduzierung
88. ISB Information und Kommunikation GmbH & Co KG Vielen Dank für Ihre Aufmerksamkeit ISB Information und Kommunikation GmbH & Co. KG Lindberghring 6b 33142 Büren www.isb-ik.de