Daily Archives: August 1, 2019

Optimizing for Human Well-Being

By Douglas Rushkoff – The economy needn’t be a war; it can be a commons. To get there, we must retrieve our innate good will.

The commons is a conscious implementation of reciprocal altruism. Reciprocal altruists, whether human or ape, reward those who cooperate with others and punish those who defect. A commons works the same way. A resource such as a lake or a field, or a monetary system, is understood as a shared asset. The pastures of medieval England were treated as a commons. It wasn’t a free-for-all, but a carefully negotiated and enforced system. People brought their flocks to graze in mutually agreed- upon schedules. Violation of the rules was punished, either with penalties or exclusion.

The commons is not a winner-takes-all economy, but an all-take-the-winnings economy. Shared ownership encourages shared responsibility, which in turn engenders a longer-term perspective on business practices. Nothing can be externalized to some “other” player, because everyone is part of the same trust, drinking from the same well.

If one’s business activities hurt any other market participant, they undermine the integrity of the marketplace itself.

For those entranced by the myth of capitalism, this can be hard to grasp. They’re still stuck thinking of the economy as a two-column ledger, where every credit is someone’s else’s debit. This zero-sum mentality is an artifact of monopoly central currency.

If money has to be borrowed into existence from a single, private treasury and paid back with interest, then this sad, competitive, scarcity model makes sense. I need to pay back more than I borrowed, so I need to get that extra money from someone else. That’s the very premise of zero-sum.

But that’s not how an economy has to work. more>

Your Job Will Be Automated—Here’s How to Figure Out When A.I. Could Take Over

By Gwen Moran – Automation is increasingly making its way into the workplace, raising concerns among employees about the ways technology will change their jobs—or eliminate them entirely. A June 2019 report by Oxford Economics predicts that 8.5% of the world’s manufacturing positions alone—some 20 million jobs—will be displaced by robots by 2030.

Some tasks aren’t easy to evaluate. A 2013 paper, “The Future of Employment: How Susceptible are Jobs to Computerisation?” found that roughly 47% of jobs were at high risk of being automated with advances in artificial intelligence.

Carl Benedikt Frey, Ph.D., co-author of that paper and author of The Technology Trap: Capital, Labor, and Power in the Age of Automation says predictions around automation’s impact have become very polarized: Either you believe that the robots are coming for many jobs—leaving many with no employment—or you believe it’s going to change the nature of work. more>

Updates from Siemens

Electronics manufacturer controls its production with plant simulation
Siemens Manufacturing Karlsruhe uses the Plant Simulation solution in the Tecnomatix portfolio within the framework of its continuous improvement process
Siemens – Electronics can be produced in Germany at competitive market prices only as long as the manufacturing process is continuously improved. For this reason, the Siemens Manufacturing-Karlsruhe (MF-K) plant introduced the Plant Simulation solution in the Tecnomatix® portfolio to support the company’s continuous improvement process. Today, not only are production lines simulated before they are built, but workers actually control daily production using the software.

“Our mission is 100 percent quality, 100 percent delivery performance and 100 percent waste-free,” says Bernd Schmid, plant manager at Siemens MF-K. “That means we want to manufacture our products with as few resources as possible. This requires that the manufacturing processes operate how we envision them to. Plant Simulation is a big help to that end.” For its consistent use of simulation software, Siemens MF-K was recently named one of the winners of “100 Places for Industry 4.0 in Baden-Wuerttemberg.” The jury of experts recognized the company for practical concepts that intelligently combined production and value chains.

Siemens MF-K is a prime example of the challenges that manufacturing companies are mastering with the help of Industry 4.0: a high degree of variance, continuously shrinking batch sizes and fluctuations in order volume that are increasingly difficult to predict.

For example, the plant manufactures 125,000 industrial personal computers (PCs) per year, but the average batch size per order is a mere 1.8. From 90 million different possible variations to choose from in the configurator, approximately 10,000 are actually used. The life of an industrial PC generation is 2.5 years − short compared to the proven SIMATIC controllers, but long compared to industrial communications where a new product has to be produced every two days. more>


Updates from Datacenter.com

What is a DDoS attack and how to mitigate it?
Datacenter.com – A Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the traffic of a targeted server, service or network by overwhelming it with a flood of internet traffic (Cloudflare, 2019).

DDoS attacks are much like traffic on a highway. Imagine regular traffic moving at a steady pace and cars on their way to their desired destination. If a flood of cars enters the highway at a particular point, it significantly delays or prevents the cars behind them from reaching their destination at the time they should.

In 2018, more than 400,000 DDoS attacks were reported worldwide (CALYPTIX, 2018). In 2018’s 4th quarter, Great Britain was responsible for 2.18% of these attacks, a staggering difference compared to 2019’s 1st quarter of 0.66% (Gutnikov, 2019).

The goal of this attack is to create congestion by consuming all available bandwidth utilized by the target to access the wider internet it wishes to interact with (Cloudflare, 2019). Large amounts of data are sent to the target by utilizing a form of amplification or another means of creating massive traffic, such as requests from a botnet (which is a group of devices infected with malware that an attacker has remote control over). more>