36 research outputs found

    Innovation, Entrepreneurialism, and Intellectual Property from a Technologist’s Point of View

    Get PDF
    The article of record as published may be located at http://dx.doi.org/10.2312/egve.20162028We will discuss the key elements of taking an idea from its conception to commercialized product, with a particular focus on how this happens (or more importantly doesn’t happen often enough) within universi- ties. Technology transfer is how a technical innovation is able to exit the laboratory in order to become a product. How does that work? Who is involved? We will then discuss the open innovation model whereby technical innovations are spun out via licensing or sale, and they are also brought in via the same means. Innovation has become a sociological phenomenon, but we have to understand how it works in practice, how we can and should protect our ideas, and thus put our innovations in the best possible position to suc- ceed. The discussion will conclude with thoughts on what universities can do to be a catalyst rather than a barrier to technical innovation and successful commercial ventures that have their roots in the university

    Rudy Darken reflects on the impact of Tom Richardson’s CHDS thesis, “First Responder: Weapons of Mass Destruction Training Using Massively Multiplayer On-Line Gaming”

    Get PDF
    The article record may be found at https://www.hsaj.org/articles/17568Sponsored the U. S. Department of Homeland Security’s National Preparedness Directorate, FEMA, CHDS is part of the Naval Postgraduate School (NPS)

    A study of navigation in virtual space

    Get PDF
    In the physical world, man has developed efficient methods for navigation and orientation. These methods are dependent on the high-fidelity stimuli presented by the environment. When placed in a virtual world which cannot offer stimuli of the same quality due to computing constraints and immature technology, tasks requiring the maintenance of position and orientation knowledge become laborious. In this paper, we present a representative set of techniques based on principles of navigation derived from real world analogs including human and avian navigation behavior and cartography. A preliminary classification of virtual worlds is presented based on the size of the world, the density of objects in the world, and the level of activity taking place in the world. We also summarize an informal study we performed to determine how the tools influenced the subjects' navigation strategies and behavior. We conclude that principles extracted from real world navigation aids such as maps can be seen to apply in virtual environments

    This Year in the MOVES Institute

    Get PDF
    in the Proceedings of IEEE Cyberworlds 2003, the International Conference on Cyberworlds, Singapore, 3 – 5 December 2003, pp. xxxiii-xl.An Invited Paper

    Compilation and critical analysis of thermodynamic data for ternary alloy systems

    No full text
    The thermodynamic approach in resolving industrial problems concerned with high temperature has led, in the two last decades, to a notable development of both theoretical and experimental studies on multicomponent system. Phase diagram determinations of metallic systems are still carried out very extensively because of their importance in the field of material science, mainly in steelmaking, non-ferrous metallurgy, crystal growth, electroslag- refining, nuclear materials, etc..

    Doing Research: Some Practical Advice

    Get PDF
    Thesis Writing DocumentApproved for public release; distribution is unlimited

    Potholes and detours in the road to critical infrastructure protection policy

    Get PDF
    The national strategy for the protection of critical infrastructure and key assets is not working due to a number of failed strategies, which this article examines in detail: federalism (separation of state and federal governmental controls) advocates that the first line of defense is local first responders; two years adter the creation of the Department of Homeland Security, and the consequent requirement that states perform vunerability and risk analysis on their critical infrastructures, DHS has yet to define basic terminology needed for states to perform meaningful analysis ("vunerability" "risk"), or precisely state the objectives of such analysis; private ownership of the majority of infrastructure assets has been used as an excuse to do nothing - a major myth that is not only wasteful of effort, but dangerous to the security of the nation; and finally, the notion that critical infrastructure sectors are so large and complex that only the highest-consequence, lowest-probability events can be prevented has led to further missteps in the road to crtical infrastructure protection policy. This article ends with recommendations for policy changes that address these issues
    corecore