WeatherEgg Kids at the Hill AFB Airshow

WeatherEgg Kids at the Hill AFB Airshow

WeatherEgg Kids were at the  2018 Hill AFB Warriors over the Wasatch Utah Airshow with Haight Bey & Associates.

Haight Bey & Associates do weather stations.  Furthermore, they have a government contract to support and sustain the US Air Force Global Strike Command’s (AFGSC) Fixed Based Weather Observing System (FBWOS) and the AN/TMQ-53 Tactical Meteorological Observing System (TMOS).  As a result of their weather interest, they reached out to DynaGrace Enterprises to provide a few WeatherEgg Kids activities for the STEM building at the  What an excellent opportunity to have children build anemometers, color in pages from the WeatherEgg Kids: Weather from A-Z: Coloring Book and build some windsocks.

Linda Rawson, of DynaGrace Enterprises, has a saying she always says.  If kids are going to learn science, why not weather science?

There are many reasons why learning about climate and meteorology are essential.  Weather Science is a big part of the “S” in STEM education.  Weather is observable and measurable.  You still have to record and chart data.  Make graphs.  Find trends.  We are creating little scientists in our society, and a hands-on learning approach is the ultimate teaching method.

Haight Bey & Associates LLC is a small, veteran-owned and certified ISO 9001-2015 engineering service company. Most noteworthy about Haight Bey is that they are focused on delivering exceptional and cost-effective systems engineering solutions, including technical and logistics services.  They provide scheduled or unscheduled maintenance, field and depot electromechanical repair, and system lifecycle planning, including new product insertion and product obsolescence solutions.

Whether you know it or not, your organization is subject to cybersecurity requirements is the motto of Haight Bey and they have made a name for themselves in the Salt Lake City area for Cybersecurity.

 

Wherever Dust is Created, Particles Need to be Counted

Wherever Dust is Created, Particles Need to be Counted

DustCount 8899 – Respirable Dust Monitor

DustCount 8899 – Respirable Dust Monitor

Many industrial sites generate dust including Construction (Silica Dust), Fabrication (Metal, Wood, Silica Dust), Foundries (Metal Dust), Food Processing (Sugar, Flour, Chemical Dust), and Petroleum (Chemical Dust).

Engineered for timely, high-quality, dust exposure information, the DustCount 8899 – Respirable Dust Monitor, monitors dust exposure before the amount approaches regulatory limits.  The monitor helps ensure the industrial worker’s health is in good hands.

Sizes of Dust

Dust size Type Details
Above 50um Inhalable (Sinus) Immediate clearing is done with a sneeze or blow.
10-50um Micron Thoracic (Lung) Windpipe, Larynx, alternatively, bronchial Clearing can happen within a day or two by coughing or spitting.
1-10um Respirable (Lung). Particles penetrate the lungs. Lungs take years to remove this dust, and this amount of particles are a huge cancer risk.
Below 1um Respirable (Lung). Particles penetrate the lungs and can get into the bloodstream. Years to remove dust.  Cells mutate to form cancer.

What is the problem?

The Occupational Safety and Health Administration (OSHA) estimates that 2.3 million workers are exposed to the dust, including 2 million individuals who work in construction.

According to an article on health.com work-related lung problems are quite common, and 17% of adult asthma in the United States may be caused by work exposure.  Many adult workers see their asthma symptoms increase in their workplace.

The top 3 worker diseases according to the World Health Organization are:

  1. Cancer 53%
  2. Circulatory: 28%
  3. Respiratory: 6%

Dust causes all the diseases.

Also, another very interesting article completed by the European Commission discusses Limits on Exposure to Carcinogens and Mutagens at Work.

According to the Occupational Safety and Health Administration (OSHA) Fact Sheet,  2.3 million workers in the United States are exposed to the dust, including 2 million individuals who work in construction.

OSHA issued its final rule, §1926.1153 Respirable crystalline silica, with standards for both construction and general industry and maritime. Both standards went into effect in June 2016; however, general industry and maritime have until June 23, 2018, to comply except in the following areas:

  • Medical surveillance must be available by June 23, 2020, to employees who will be exposed to levels at or above the action level of 25 micrograms per cubic meter of air averaged during an 8-hour shift for 30 or more days a year.
  • Hydraulic fracturing operations in the oil and gas industry must institute by June 23, 2021, dust controls to limit exposures to the new PEL.

Main Causes of Worker Cancer

  1. Asbestos – particles
  2. Shift work
  3. Mineral oils
  4. Solar radiation
  5. Silica dust – particles
  6. Diesel exhaust – particles

Advantages of DustCount 8899 – Respirable Dust Monitor

  • Combination of small package, real-time, sample cassette – an easier job
  • Compact/light package – greater worker acceptance, ease of use
  • Real-time readings – can be used to track the location of problems,
  • Data from real-time – gives credibility and proof for IH in a corporate discussion
  • Graphical results – great for training, instantaneous graphical proof of danger
  • Real-time warning of danger.  Eliminate workers working without a mask and only putting on a monitor when the unit alarms and removing the monitor when alarm stops
  • Higher accuracy – The same dust read in real-time is collected in the cassette.
  • Comfort using this test instead of a standard method test
  • Easy to use – GUI, wireless and auto pump
  • Cost – purchase one unit for personal wearable real-time and standard
  • Method and sample analysis and use as portable.

Features/Benefits of DustCount 8899 – Respirable Dust Monitor

  • Small compact size – greater worker acceptance
  • Real-time – instantaneous results, correlation with the location, worker relief, lower sampling cost, data for credibility
  • Combination device – lower cost to do the job, higher accuracy
  • Standard Method – meet regulatory requirements, familiar SOPs
  • Graphical data – visual proof for training and discussion with corp
  • Sample Analysis – familiar material determinations (XRD, IR)
  • Wireless communication – ease of setup, ease of data capture
  • Automated operation
  • Particle Distribution – correlation with dust type
  • Particle Count – the future key to worker safety, new regulations
  • Pinpoint the location of problems, avoid costly ventilation expense
  • Save money and time by having IH only do the testing once
    • The standard method is done first then use a real-time test is done afterward
    • The worker does a complete test
  • Save money on time by not having to wait on labs

DynaGrace Enterprises is proud to be a distributor for the DustCount 8899 – Respirable Dust Monitor manufactured by Nanozen and is currently in final review to be available on GSA Schedule 66: Scientific Equipment and Services.

To purchase this item, please see the item in our shop -> https://dynagrace.com/product/nanozen-dustcount-8899/

 

Modernizing Government Technology (Mgt) Act

Modernizing Government Technology (Mgt) Act

The signing of the Modernizing Government Technology Act (MGT) was in December 2017. Federal security operations for several years have been using hardware and software that are needing to be more modern. Obsolete technology has posed challenges in protecting the nation cyberspace and vital national data from cyber-attacks.

Making Room for New Technology

What is the Modernizing Government Technology Act

The government spends about 75% allocation to information technology. This spending is maintaining and ensuring that these outdated information technology systems remain operational. The risks these systems pose are a result of their inability to utilize current security practices.  It includes multifactor authentication and data encryption. They are also expensive and always fail to fulfill the mission requirement and vulnerable to malicious software.

Against the backdrop, in a bid to address these issues, the Modernizing Government Technology (MGT) Act was passed by the legislatures. Through this

means, the government can empower federal agencies to effectively discharge their duties with regards to cybersecurity and information technology services.

The primary purposes of the Modernizing Government Technology (MGT) Act are to:

    Curtail current and operational risk of the information technology systems of federal agencies by ensuring that they are compliant with recent security technology.

    Assist the federal government in cutting cost with regards to information technology via modernization

  Hasten the acquisition and application of modernized information technology practices such as cloud computing, data encryption and lots more through the provision of stable funding and transparent acquisition procedures.

Benefits of the Modernizing Government Technology (MGT) Act

Federal IT experts in some quarters are of the opinion that the MGT Act is long overdue. Nevertheless, the law has lots of benefits with regards to operational ease, data security, and investment opportunities. The following are the significant benefits:

Access to capital funds that will boost the modernization of IT systems:

MGT Act gives room for heads of different agencies to access working capital funds. These funds can be used to update or replace existing IT systems with modern state-of-the-art information technology systems. Also to adopt and train their staff on new risk–inclined cybersecurity measures.

The Funds

The funds can be utilized by agencies to ensure a smooth transition from legacy IT systems to cloud. Or, a shared service to boost security and effectiveness in the discharge of their duties serving the American people.

This gesture will empower these agencies to reprogram or transfer funds. This includes those earmarked for the maintenance of obsolete IT systems for other variety of projects or investments which are within its mandate as a federal agency.

However, monitoring the utilization of these funds are required to submit comprehensive reports regarding the expenditures and balances every six months. These reports are made public for the sake of accountability.

Migration to cloud systems:

The MGT Act will hasten up the movement to a Cloud system. This migration is more cost-effective and has access to another realm of innovation that associated with cloud systems. It also offers a more secure means to handle data.

Expect that these agencies will, for the sake of providing better services, jettison the legacy system for more efficient digital technology. A good example is the network modernization that allows Chief Information Officers (CIO) to know what exactly happens in their operations.

Although there are critics of the MGT Act, who say that the Act is a misguided venture, the benefits will improve the lives of the American people.

Resources: https://www.fedscoop.com/trump-signs-mgt-act-law/https://www.whitehouse.gov/about-the-white-house/the-legislative-branch/https://www.investopedia.com/terms/c/capital-funding.asphttps://www.techopedia.com/definition/635/legacy-system

Images by: Business Technology – Cyber Security [www.bluecoat.com/https://www.flickr.com/photos/111692634@N04/]; US Capital https://pxhere.com/en/photo/738025

Cutting Edge Web Design Trends of 2018

Cutting Edge Web Design Trends of 2018

Website design is one of the most dynamic concepts in the digital world. As the year progresses, there is an increase in the technical challenges web designers face.

The numbers 2018

Made in Canva by Machelle L.

The Art of Web Designing

However, these challenges have been better with the advent of more creativity into the art of web designing. This creativity has given rise to more innovative websites.  Creating a more user-friendly interface, compatible with any digital device, high aesthetics and still compliant with corporate needs.

2017 witnessed lots of innovation about web designing and anticipates that more creativity will trend in the year 2018. Some of them have already begun manifesting the websites that have fantastic mobile functionalities. Some others are still in the process. The following are remarkable trends to grace the web designing landscape in the year 2018:

Animation, Motion graphics

In the year 2018, this will be one of the significant changes that we will experience. An animation is believed to make a lasting impression just as the famous quote says, ’a picture is worth a thousand words.’

Animations in web pages include particle backgrounds, animated thumbnails images, as well as virtual or augmented realities. These motion graphics are of a JavaScript design to move naturally in the web background without delay while loading. Some of them are used in the social media for different purposes already.

Web schemes with superb colors

Due to the advent of computer monitors and device screens with improved picture quality, web designers are becoming bolder in their color selections. Being bolder has led to websites with supersaturated colors, dominant shades, contrasting colors yet producing beautiful blends. These varieties ensure that web pages are looking good. This sort of improvement is to attract visitors’ attention and sell the brand or the idea on the websites. Web designers will go beyond the conventional, really think out of the box for high colors in 2018.

Asymmetric or Broken Layouts

An image of a web design layout

Made in Canva by Machelle L.

Asymmetric Layouts were first introduced in 2017 but will attract more attention in the web designing space in 2018. It is a shift from the conventional grid-based web layouts. Its attracting factor is that it provides a unique aesthetic experience for a web page visitor. Many brands may still want to stick to the conventional layouts because they consider this asymmetry a luxury. Others, especially more prominent companies, may find it a perfect means to sell their brand to the public.

Flexible fonts

The fonts of a web page are more than just a visual tool. It also plays a huge role in creating a lasting impression and provoking an emotional response. Also, fonts serve as a medium of communication on any website. In 2018 there will be devices with outstanding resolutions and screen characters that get sharper. There will also be a concomitant rise in different fonts used in web pages. This trend aims at creating a better user experience, ensuring that web users aren’t bored being on your websites.

Active gradients

In more recent times, developers are gradually adopting gradients for their web designs. An active gradient is already a trend that has come to stay as they are progressively replacing the flat designs. They are often used to make images on a web page more captivating with colors of various dimensions. Most web designers used this gradient as an alternative when there are a few images.  These alternatives are usually conspicuous and rich in color.

Priority of mobile devices

Websites designed in the year 2018 will have mobile devices that will have the utmost priority. Expect that Google will rank websites on mobile compatibility and user-friendly interface. Since almost everyone has a smartphone, the prioritization of mobile devices by web designers will be a priority. These devices will also trigger other mobile-friendly initiatives tools and apps shifting from desktops in 2018.

The concept of web designing is an ever-changing one that necessitates severe changes in our web designing approach. These trends trigger the need for new skills, newer ideas, and a different approach.

Linda Rawson is the CEO, and Founder of DynaGrace Enterprises, (http://DynaGrace.com) which is a Women-Owned, Small Business. She is also the author of The Minority and Women-Owned Small Business Guide to Government Contracts.

Resource: https://www.usability.gov/what-and-why/user-interface-design.htmlhttps://www.phrases.org.uk/meanings/a-picture-is-worth-a-thousand-words.htmlhttps://www.canva.com/learn/website-color-schemes/https://www.webdesignerdepot.com/2011/10/asymmetrical-balance-in-web-design/https://creativemarket.com/blog/types-of-fonts-for-professionalshttps://www.awwwards.com/gradients-in-web-design-elements.html

Image Resource: Canva creation by Machelle L.; https://pxhere.com/en/photo/750606

5 Tips to Stop Hackers in Their Tracks

5 Tips to Stop Hackers in Their Tracks

In recent times, online thievery has become so rampant cutting across every facet of human endeavors where data systems are in use.

The frequency of hacking has become very high that’s it is believed to occur every minute. This particular development has raised concern in several quarters on how exactly to be free from hacks, how can we stop the activities of hackers.

The following are trusted tips to prevent hackers from intruding into your files.

  • Keep your security software updated

Being safe entails being watchful.  Safety could mean making sure all routes viruses could take into your system is blocked and steadily watched over. All you need is to install capable anti-spy wares or antivirus and ensure they are always updated. To ensure your system has protection, you can also connect to a network firewall. Firewalls help scrutinize data going in and out of your system, identifying threats and neutralizing them as well.

  • Always change your passwords

Before now, all that would occur was changing the default passwords to words that we can easily remember. However, things have changed. Customizing passwords are no longer enough to protect you from hacking. Your passwords must be strong. It should be a mixture of different numbers, characters of both upper and lower cases alongside symbols.

The understanding that the only portal hackers have into your business systems is via your username and passwords. This info should encourage you to continuously change your username as well as passwords on a widespread basis. Though this approach may be stressful, it is a small price to pay to be secure online. Nevertheless, as these changes continue, care must be taken that the new passwords are secure from unlawful persons.

  • Restrict access to needless sites

Limiting visits to specific sites might be one of those giant strides you make to be safe online. Some sites, like pornographic web pages, can be harbors of different forms of malware or viruses. Viruses could render the entire business operating system vulnerable. Against this backdrop, it becomes vital to take serious measure to block sites of this sort.

  • Carefully chose your Internet Service Provider (ISP)

Different firms now provide internet services, not all of them can keep you protected. There is, one primary criterion to be considered while choosing an ISP, before cost and speed. It is built in security features. A perfect ISP should have all these features and save you worry while using the internet.

  • Invest in cybersecurity education

Continuous training in cybersecurity trends is vital for any organization that is serious about keeping its data way from hackers. Training can be carried out via workshops, videos, employee drills or any other method. This is vital to ensuring that they are not ignorant of matters that pertain to cybersecurity.

Knowing these tips and acting on them is another. However, the reality is that we live in a time where cyberattack is on the rampage threatening the very existence of a business. To efficiently stop these hackers is to be security conscious while using the internet and consistent implementation of these tips.

Linda Rawson is the CEO, and Founder of DynaGrace Enterprises, (http://DynaGrace.com) which is a Women-Owned, Small Business. She is also the author of The Minority and Women-Owned Small Business Guide to Government Contracts.

Resources: https://dynagrace.com/cybercrime-invisible-crime/ https://passwordsgenerator.net/ ; https://www.sans.org/cybersecurity/

Image Resources: https://pxhere.com/en/photo/1331118https://pxhere.com/en/photo/867306https://pxhere.com/en/photo/1366057

Ransomware: Recognizing the Signs

Ransomware: Recognizing the Signs

Ransomware is a kind of malware that blocks computer users from their systems. It does this either by locking some folders or locking the system’s screen until a ransom pays.

The history of this malicious software dates back to 1980. In 1980, the first ransomware identified to be PC Cyborg also known as AIDS began. This malware could encode files in the C: Directory after forcing the computer system to reboot up to 90 times. Its victims were forced to pay $189 ransom via mail. This ransomware was easy to decrypt by people who understand computer systems and therefore posed only a little threat

Pop-ups Everywhere

A woman at a desk working on her computer

Image by DynaGrace Enterprises

Real ransomware graced the scene in 2004 known as Gpcode. Gpcode also used an RSA encryption that encrypts files until paying a certain amount. The year 2007 had WinLock trending as ransomware. It displayed pornographic images, limiting users’ access to their screen and demanded payment via SMS. The next generation of ransomware are called the law enforcement ransomware, or Reveton was born in 2012. This malware was designed to show the logo or symbols of crime-fighting agencies like Interpol, FBI or local PDs. It accuses its victims of indulgence in different crimes ranging from child pornography to computer hacking.

Other vices include a download of classified files demanding ransom up to $300. As the years go by, ransomware is becoming more dangerous and ruthless, especially with the advent of CryptoLocker. CryptoLocker uses encryptions of military standards to WannaCry and Petya of May and June 2017 respectively. This ransomware with their complex encodings stifles business as well as limit cyber freedom all around the globe.

Types of Ransomware

Different types of ransomware exist based on the extent of their severity. The major ones are as follows.

Screen lockers

Screen lockers lock you out of your computer entirely by taking hold of your computer screen. Shutting down the system does you no good as it is starting. An FBI logo or that of the Justice Department appears claiming that illegal activity has been carried out on this system and they need to pay a fine. Victims often forget that these law enforcement agencies don’t collect penalties for unlawful activity forcefully via the computer. Agencies follow appropriate and legitimate routes.

Encrypting ransomware

These types of ransomware collect your files, encode them and then asks for a ransom before its release can take place. This ransomware is the most dangerous of all ransomware as your encrypted files may not be inaccessible until paying the money. Sometimes after paying the ransom, the data are still not returned by the cybercriminals, and this is the most painful part.

Scareware

Scareware involves tech support or rogue security scams. They tend to send a different kind of pop-up messages claiming malware has infected your system. They go further to explain that the only way to eradicate it is to pay a certain amount. This trend continues and sometimes becomes an online disturbance especially if you ignore these messages. Interestingly, most times these are mere scare tactics as the name implies, as your files may be safe.

Protecting yourself from ransomware

Though there are different types of ransomware, the mode of entry into their victims’ cyberspace is not much different. Also, the best way of protecting your cyberspace from ransomware is by understanding how this malware can infect your computer system.

Recently, one of the most popular ways computer systems become infected by malware is via malicious advertising also called mail advertising. Mail advertising uses the platform of online adverts to disburse ransomware with minimal user interactions.  They appear as pop-ups even on legitimate sites which are often not clicked and redirects users to criminal servers. This malware is linked to these servers to gather the victim’s system’ details and take advantage of them. All these happen without the knowledge of the victims.

Malicious spam

Malicious spam is another way systems get infected; they are unsolicited mail used to distribute malware. These emails contain attachments, word documents or even links to unsafe websites creating an access point for the ransomware.

Cyber Security

Image by DoDLive

If the mode of entrance of ransomware into the system is well understood and blocked, the following are steps to taken to ensure you are safe from ransomware;

  • Invest in cybersecurity. Get cyber software that can protect your computer from powerful ransomware attacks. Plus they should have features that shield vulnerable programs in your system
  • Always create secure backups for your systems files and data daily. The use of external storage devices that can be detached immediately after data backup is a good start. However most recommended is the use of cloud storage that utilizes powerful encryptions. As well as multiple factor authentication for security purposes.
  • Your system needs updating. Though it is not still easy to be up to date in a fast-changing tech world, recommending activating automatic updating.

Finally, be informed. Be abreast of the latest facts as regards cybersecurity. Avoid suspicious links and website. Be purposeful, exercise some discipline, discreetness and avoid wandering as you browse the internet.

Linda Rawson is the CEO, and Founder of DynaGrace Enterprises, (http://DynaGrace.com) which is a Women-Owned, Small Business. She is also the author of The Minority and Women-Owned Small Business Guide to Government Contracts.

Resource: https://en.wikipedia.org/wiki/AIDS_(Trojan_horse)https://en.wikipedia.org/wiki/PGPCoderhttps://www.us-cert.gov/ncas/alerts/TA13-309Ahttps://en.wikipedia.org/wiki/WannaCry_ransomware_attackhttps://www.symantec.com/blogs/threat-intelligence/petya-ransomware-wiper

Image Resource: DynaGrace Enterprises; http://www.dodlive.mil/2013/10/05/national-cyber-security-awareness-month/https://pxhere.com/en/photo/540556

Pin It on Pinterest