Any time we take the initiative to create sustainability, we are intervening in a system. Systems are messy and resist being changed. Think capitalism (aka greed), or our weather (e.g., Climate Change), or local government (government of any size), or my daily routine (how dare you mess with that). What hubris, thinking that we as individuals can change these systems! Continue reading
#450 – HOW TRAFFIC ENGINEERS CREATE CRASHES – WESLEY MARSHALL PH.D.
Featured
“Can you name the truck with four-wheel drive, smells like a steak, and seats 35?”
Back in 1998, “The Simpsons” joked about the Canyonero, an SUV so big that they were obviously kidding. At that time, it was preposterous to think anyone would drive something that was “12 yards long, two lanes wide, 65 tons of American Pride.”
In 2024, that joke isn’t far from reality. Continue reading
#450 – POWER OF LESSNESS – MALCOLM PEART
Featured
In today’s so called “Modern Era” with more people on the planet than ever before we seem to have less and less time. Despite living in the “Information Age” where data and instant knowledge are readily available at the touch of a button, swipe on a touch screen, or even a voice command time fritters away. There’s the ubiquitous smart ‘phone, the Internet and related search engines, remote meeting media, self-help and self-improvement podcasts and now, AI with free ChatGPT which are all meant to help. Continue reading
#450 – FIVE STEPS TO CREATE A RELIABILITY PLAN – FRED SCHENKELBERG
Featured
A specific reliability plan may include any number of specific tasks. To build an effective plan you need the knowledge of the individual tools and techniques, plus how they may fit together to create an overall plan to achieve your goals. Continue reading
#449 – NSW Cyber Security Audit – James Kline Ph.D.
Featured
This is the first of two articles dealing with Cyber-Security and government. This article discusses the results of the New South Wales (NSW) Auditor-Generals Report on Cyber-Security in Local Government. The second will deal with the U.S. National Institute of Standards and Technology’s (NIST) Cyber-security Framework 2.0. Continue reading