Welcome to the Global Systems Engineer Group Search

CyberCrime Solutions. We will trace, identify attackers, close holes and end vulnerabilities.

systemsengineer.ca Last modified: 2019-12-1213:04:57Z ~ Search ~ Contact
The tools most people look for here are: NsLookup (DNS) and Start of Authority Verification (SOA) (To check if your nameservers have synchronized.) More below. Have fun.

Hire a Geek
Solve CyberCrime, computer & network issues now.

We have good systems engineers just like Victor Frankenstein(1)!

  1. We offer sophisticated systems or simple units doing sophisticated things.
  2. Systems engineering is an interdisciplinary field of engineering and engineering management that focuses on how to design and manage complex systems over their life cycles. At its core, systems engineering utilizes systems thinking principles to organize this body of knowledge.
  3. Or we just fix your stuff.

 

Click diagram to enlarge

Systems Engineer Group [U-of-T] Canada  Est. 1986
Contact us.


Footnotes:

(1) This is 2019-12-12 but going way back to 1818 was Victor Frankenstein a good systems engineer by today's standards?

  • Yes!
  • He built a complex system with many components.
  • His system worked! Ours do as well.
  • We are like Victor. We get our top marks for being able to simply explain the complicated things we do well.
  • We like Victor get high marks for low cost, high performance, on schedule and great reusability.
  • Victor, however, gets low marks for risk analysis, total life cycle analysis & final system test. We would fix our predecessors' errors with little or no fuss.
  • The following discussion is based on Mary Shelley's 1818 novel, not on the movies. ->Note: Read the bold bullets to see how we engineer a new system to last forever.

Stating the problem: Frankenstein was depressed when his mother died. So he wanted to conquer death by infusing life into an inanimate body.

  1. Understanding customer needs: I think he blew it here, compassion and grief consoling might better fit the needs of his customer.
  2. Discovering system requirements: The only requirement he considered was creating life, so he did a poor job of discovering requirements.
  3. Validating requirements: How could he validate them if he had no requirements?
  4. Investigating alternatives: When the monster tracked down Frankenstein, the monster said that he was lonely and he wanted Frankenstein to build him a companion. In designing this companion Frankenstein considered a lot of alternatives.
  5. Defining quantitative measures: He had no measures of effectiveness.
  6. Modeling the system: He had mental models and sketches in his book, but no formal models. Consequently, Frankenstein was surprised at how hideous his creature turned out: thinking he was ugly [during construction]; but when those muscles and joints were rendered capable of motion, it became a thing such that even Dante could not have conceived.
  7. Functional analysis: He did a physical (not a functional) analysis.
  8. System design: He designed a very good system. And he gets high marks for reusability!
  9. Sensitivity analyses: He did not know about sensitivity analyses. They are modern tools.
  10. Risk management: He gets very poor marks for risk management. Indeed his monster ended up killing his brother, his best friend and his bride. But before Frankenstein finished his second monster, he considered the risks and destroyed his work.
  11. Reliability analysis: His monster was very robust. It overcame lack of food, freezing cold and bullet wounds all by itself.
  12. Integrating the system: This was his crowning achievement, he put all of the parts together and it worked.
  13. Launching the system: Frankenstein did not launch his monster into the world. In fact Frankenstein ran away when it first came to life.
  14. Configuration management: He couldn't do configuration management if he had no requirements.
  15. Project management: He did an excellent job of project management: his system had low cost, high performance and came in on schedule.
  16. Documentation: He kept a laboratory notebook. This notebook is what enabled the monster to track Frankenstein down a year and a half later in a different country.
  17. Leading teams: Frankenstein worked alone and never told anyone what he had done.
  18. Assessing performance, which includes prescribing tests, conducting reviews, verifying requirements and total system test. Frankenstein did not do any of these tasks.
  19. Re-evaluating and improving quality. The reason Frankenstein went to England was to consult with philosophers there, because he wanted his second monster to be better than the first. He never got around to describing the lessons that he learned while doing the project.

Our clients are gems: small or large, precious all.

At a moments notice we'll define the skill requirement and have a person inside your facilities ready to work to your requirements and fulfil your short-term or long-term needs.
Contact us.
©Copyright 2019-12-12, SystemsEngineer Group

.


Check out the lastest World News from our friends at FPMag


Headlines


• Headline: Release Meng Wenzhou or the Michaels die. [Editorial]

by Melissa Hemingway, Wed, 11 Dec 2019 14:41:27 GMT

Click to see enlarged image.

Espionage is punishable by death in China. The two Canadian Michaels and an Australian blogger named Yang Jun have been held in China for one year for espionnage. Their cases have now been advanced to the prosecution stage. The end … more →


• Headline: Ukraine, Russia meet for Normandy format summit. Agree to stabilization.

by Melissa Hemingway, Tue, 10 Dec 2019 20:07:54 GMT

Click to see enlarged image.

Good vibes began 6 December with OSCE In the wake of an Organization for Security and Cooperation in Europe (OSCE) conference on 6 December, the leaders of Russia and Ukraine joined the leaders of France and Germany for talks in … more →


• Headline: What happens if Jeremy Corbyn Wins? [Satire]

by Melissa Hemingway, Tue, 10 Dec 2019 10:58:17 GMT

Click to see enlarged image.

Get yourself a “commie hat”, quit smoking and pretend to like Sugar-Free Digestive Cookies. Yum. “Regardless of promises, the British Labour Party will suck away the wealth excesses of the former ruling class; give a little of the ruling class … more →


• Headline: Protocol for ISIS-member arrest & prosecution.

by Katie Alsop, Mon, 09 Dec 2019 04:53:51 GMT

Click to see enlarged image.

“Adherents to Islamic State doctrine deserve no tolerance and understanding. They represent a dangerous set of disordered personalities with morbidly violent predilections threatening all humankind,” says Dr. Buni, a Syrian born medical practitioner who has worked across the regions of … more →



Contact systemsengineer.ca ~ Read our Privacy Policy
‣ "Imagination is more important than knowledge." Albert Einstein (1879 - 1955)

©Copyright 2019-12-1213:04:57Z systemsengineer.ca

CyberCrime Solutions. We will trace, identify attackers, close holes and end vulnerabilities. was last modified: 2019-12-12 by systemsengineer.ca

Contact systemsengineer.ca ~ Read our Privacy Policy

Go to top of page