Posts Tagged ‘ISO 9001’

Prague Conference in 1987

October 30, 2018

In 1987, I presented a scientific paper at a conference
in Prague, Czechoslovakia.

At that time, Prague was a city in the territory under
control of the Soviet Union.

I have always performed my research on my own time and money.

I attended the conference on my vacation.

Needless to say, the other attendees were quite curious
about my personal research efforts.

During this time, I had an interesting conversation with
a Polish attendee while walking along the river:

POLISH ATTENDEE: We are not special.

MY RESPONSE: Being special is defined by what you do
to be the very best in your field.

POLISH ATTENDEE: We have no resources.

MY RESPONSE: Do you have a personal computer at your home?

POLISH ATTENDEE: Yes.

MY RESPONSE: Probably a better one than I have. My is
a Heathkit H89.

POLISH ATTENDEE: The bosses will not like it.

MY RESPONSE: Usually, the bosses don’t kill the goose
that lays the golden egg right away.

At this point he understood and I was effectively
“walking on water”.

You ask: why am I sharing this little bit of history
with you.

History is a great teacher and today we need to learn
this lesson.

Disaster Seminar 5 — Pick the best machine for disaster survival

October 29, 2018

It must function on its own without internet access.

It must have:

1. A Hard drive to contain your data and applications.

2. A Printer Port.

3. A DVD reader / writer.

4. A USB Port.

Desktop or Notebook Computers are good choices.

MORE IN THE NEXT MESSAGE

How I Protect My Proprietary Data

October 27, 2018

The original purpose of my blog was to provide me an easy
means of reporting my activity on my personally funded
research and development activities on error-free software
development methods.

My research and development activities produces a large
quantity of proprietary data. How do I protect this data?
Simple! I do not publish it on my blog or any other web-sites.

The purpose of “reporting my activity” involves establishing
the date at which a particular task was accomplished. The
task is sufficiently identified to enable me to identify
the associated proprietary data and daily log which is
stored on my machines, flash drives, and DVD’s.

Also, please let me remind you that when your machine is
not connected to the internet, hackers cannot access your
machine.

My Invitation To You

October 26, 2018

I became a software engineer in 1966 due to an experiment
that I had performed. I have never taken a course in
Software Engineering. Over the years, I have continued
to experiment on my own time and have greatly benefited
from this activity

In 1992, I became a home based software development business.
I developed a set of tools to aid me in my business activities.
These tools evolved over time and are now capable of helping
a software engineer to become a better, more competitive programmer.

I invite you to take a similar path. My tools can be downloaded
free-of-charge from my web-site, http://www.whatifwe.com and they are
well documented.

Monte-Carlo Test Method

October 23, 2018

A Number of years ago, I had a contract to build a hardware
control sub-system software product.

This hardware control sub-system was designed to control
legacy hardware shipped back from the Middle East.

This legacy hardware appeared to have not been well-maintained;
it needed a lot of service.

I was afraid that I might break this hardware when I tested my
hardware control sub-system software product.

I developed a Monte-Carlo Simulator/Stimulator Test System to
validate my hardware control sub-system product.

The Monte-Carlo technology is based on a pseudo-random generator.
It was originally used in the development of nuclear weapons.

The random nature of my Monte-Carlo Test System enabled me to
rapidly and thoroughly test the hardware control sub-system, both
from a user and hardware point-of-view.

The use of a Monte-Carlo Simulator/Stimulator Test System
enabled me to deliver an error-free software product.

WHATIFWE used Monte-Carlo software test methods for all software.
Would we get better products?

Disaster Seminar 4 — When Your Machine Breaks

October 22, 2018

When Your Machine Breaks, you will lose access to:

1. Your Data.

2. Your Applications and Programs,

3. Access to the Internet.

All Machines break, even the cloud based machines that
provide you with your computing capabilities.

How does one prepare for a machine failure?`

MORE IN THE NEXT MESSAGE

WhatifWe127 Blog — Web Browser Inquiries

October 20, 2018

There have been many comments and inquiries relative to Web
Browser and Display format problems relative to my blog and
website. I appreciate your comments but I do not have sufficient
time to individually respond to them. I have prepared this
post that will hopefully provide some answers.

Relative to the blog, I use the free Word Press blog site.
The only thing that I prepare is the text. I don’t have any
videos. I do attach pdf files containing my articles. I must
assume that WordPress is up-to-date relative to the various
Web Browsers and Displays. I have absolutely no control over
the format.

Relative to my website, I designed it a number of years ago
using Microsoft Front Page which is now obsolete. I would
assume that it would not behave properly on some of the newer
Web Browsers and Displays. I am currently redesigning it
using the CSS technology. I am using this need as a means of
building standard Web Site development kits and I cannot
at this time predict when this will be completed.

Limitation to My Response to Your Comments

October 19, 2018

Every day I receive between 50 and 100 comments. Many of these comments request information or advise from me.

I appreciate the honor of your request for information.

Unfortunately, there is only one of me managing and writing the blog. Consequently, I simply do not have enough time to reply to each of your questions.

There are many comments that ask the same question. In these situations where I have the information, I will provide my knowledge in a post, time permitting.

I will respond to any comment made by a person who is experimenting with my software development tools.

Thank You

The Role of the Media

October 17, 2018

Both the incompetent and the competent benefit from
media attention.

The competent leader requires community participation.
The media helps him to obtain the participants.

The incompetent needs 15 minutes of fame. The media
helps him to satisfy his greedy goals.

Unfortunately the entertainment associated with the
incompetent attracts a lot of media attention.

The competent pioneer finds new solutions to current
problems.

WHATIFWE were to provide the media attention needed
to develop hope from the new ideas of the competent
pioneers?

Disaster Seminar 3 — Computer Resource Failure Modes

October 16, 2018

Loss of Your Computer Resources results from:

1. Personal computer failure.

2. Remote computer service,

3. Power failure.

4. Internet failure.

5. Software failure.

6. Security failure.

MORE IN THE NEXT MESSAGE