Information technology and social security is a rapidly growing field that take online security more seriously. Social media offers many types of business advantages to organizations and companies, but also has well known security risks. Every people needs accurate and true information in any fields in this world.
3D printing is also known a additive manufacturing, is the process of creating an object by “printing” or laying down material layers until the object is formed. Like an office printer that puts 2D digital files on a piece of paper, a 3D printer creates components by depositing thin layers of material one after another using a digital blueprint until the exact types of components required has been created. 3D printing has the potential to transform science and technology creating bespoke and low-cost appliances which have previously required dedicated facilities. The inception of 3D printing can be traced back to 1976, at that time inkjet printer also invented.
Current and possible technology:
1.Scaffold based approaches
Phase separated scaffolds
Knitting and braiding
3.Direct 3D printing technologies
Selective laser sintering
Three dimensional printing
Systems based on extrusion or direct writing
Indirect 3D printing
Parts of the 3D printer
Print base and print head
Bionik, extracellular matrix arranged in which cells are layer by layer arranged in particular manner
Extracellular matrix should have the same viscous properties as embryonic tissue
There are two types of techniques used
Selective Laser Sintering
The machine uses a computer controlled laser to draw the button cross section onto the surface of a bed coated with a powdered polymer that melts and fuses where struck by the laser. It consists of two pistons and a roller. The build piston moves upwards and the roller pushes the polymeric powder into the build piston. The build pistons is then lowered to depth corresponding to the section’s thickness. The feed piston is moves up again and the roller pushes some of more material. And the next cross section is drawn by directly on top of the previous one. This is repeated until the parts is finished.
2.Fusion Deposition Modeling
The FDM technology is works using a plastic filament or metal wire which is unwound from a coil and supplies materials to an heated extrusion nozzle which can move in any directions. The molten polymeric material is dropped in the form of beads. It instantly solidifies when it exits nozzle forming one layer.
3D Printing Process
Using a 3D digital CAD model as the Blueprint, successive layers of material are precisely deposited or fused by computer controlled print head into the desired 3 dimensional shape. No machining of the part is required, thus no raw material is wasted.
3D Cad Model –> STL file –> Slicing Software –>Layer Slices and Tool Path –> 3D Printer –> 3D Object
Diy 3D Printer
Control module – Controller and motor driver
Extruder module – Feed and melt filament
Router module – XYZ axis movement
Print Bed module- Printing bed
Draw – Tinkercad
Print – Repetier, Ponterface
3D Bioprinting Organs
Include growth factors in the scaffolds
Have biodegradable scaffolds rather than non-ones or bio active as well
Having nano-modification on the scaffolds for better cell in-growth
Needs to be included in the scaffold: extracellular matrix, growth factors, vascular network and different cell types
Living cells will be patterned into hydro-gel tissue scaffolds.
3D Printing the Future
Industries that apply 3DP today and will apply in future, in case the intended adoption is put into practice is in percentage %
Automotive and Aerospace = Current 29% In future 49%
Plastics = Current 38% In future 45%
Mechanical and plant engineering = Current 29% In future 44%
Electronics = Current 27% In future 43%
Pharma and Medical = Current 28% In future 38%
Consumer goods = Current 18% In future 26%
Energy = Current 14% In future 23%
Logistics and Transport = Current 10% In future 16%
Supporting Techniques :- Network Science, Complex system science, Algebraic graph theory
Data-driven :- Statistics, Machine learning, Big data analytics
First-principle :- Dynamical Systems, Statistical physics, Stochastic processes, Economic and human factors
Operation :- Algorithms, Control theory, Risk management, Game theory
How to Protect Yourself…
Always install software updates as soon as they’r available. Whether you’re updating the operating system or an application, the update will often includes fixes for critical security vulnerabilities.
Don’t click on links, or open any attachments, you receive in unsolicited e-mails or SMS. The links may leads to malicious website, and any attachments could be infected with malware.
Install Anti- Virus software on your PC and mobile devices, and keep it updated. Bear in mind that ransomware can often be picked up by visiting disreputable website including illegal movie streaming websites and some adult sites.
Create regular backups of your important files to an external HDD, memory or online storage provider. It’s important that the devices you backups to isn’t left connected to your computer as any malware infected could spread to that too.
Don’t pay extortion demands as this only feeds into criminals hands, and there’s no guarantee that access to your files will be restored if you do pay.
Top 10 Network Security Tips
Be aware of phishing attacks
Bio metrics identifications
Safeguard your data
Manage risks with the internet of things
Keep the operating system updated
Stay informed of current cyber attacks events and follow precaution measures
This post will discuss some different common types of social networks sites and the privacy issues of these social networking services and also share some general tips for using Facebook Security.
Social Media Safety Tips
Become familiar with the privacy setting available in any social network which is you use
Don’t share birthday, age, or place where you born
Do not post your address, E-mail and phone number on a social network
Don’t publicize vacation plans
Use caution when using third-party applications
Take additional precautions if you are the victim of stalking, domestic violence or harassment.
Be wary of requests for money for any reason
Regularly check your privacy setting to ensure that nothing has been altered and just don’t post anything that you are unsure about.
Social Media Developments
Free time : Communication with friends and family sharing photos news entertainment hobbies, doodle etc.
Internal Use : New working culture: Open, sharing, empowerment.
External use : With customers, not to customers and from people to people.
The Dangers of Social Media
When someone uses any social media site to bully someone else by sending them intuiting messages and threats. Young people are being bullied and all the time on social media.
2. Hacker or Predators
They can be anyone and people trying to hack your account. They could be someone trying to get you to do something illegal or bad.
You can delete a post but there are always ways to get it back and people who can see your posts can forward them to anyone. The social media company owns everything you post an once you’ve posted something online it is impossible to take it off.
Problems experienced on social networks
Received Spam –>92%
Received Phishing –>55%
Account Sent Spam –>20%
Received Malware –> 24%
Account Hijacked or Password Stolen–>13.5%
More than 86% of people that feel employee behavior on social networks can endanger company security and 1 in 5 people has been negatively affected by information that was exposed on the social networks.
Social Media Privacy Facts
Every minute of the day:
100,000 tweets are sent
2 million search queries are made on Google
Over 68,5000 pieces of content are shared on Facebook
Within a minute 48 hours of video are uploaded to you tube
Over 47,000 apps are downloaded from the app store
About 3,600 photos are shared on Instagram
600 website are created
Estimate of $272,000 is spent by consumers online
“Your biggest security risk could be you”. Are you making it easier for criminals to steal your valuable information ? Reports of massive data breaches and hacked accounts are flooding the airwaves. Always take a consideration that the internet is an open forum and which data may flow across networks with little or no security measures, and therefore such information may be accessed by people other than those you intended to access from it.
Relationships never work for when the other person uses social networks as a way to vent instead of addressing you. When it comes using their social media data they are even more sensitive.
just 1% are happy to share personal information across any social media network
Just 5% believe that their use of social media has made them more open to sharing personal data
31% say they restrict access to data depending on the social media site being used
50% say that their use of such social networks over the past 5 years has made the less open to sharing personal information
Tips to Stay Safe Online
Never post personal information online
Keep profiles private
Never share online credentials
Use safe search settings
Do not engage in chat with strangers
Have children use age appropriate
Never open E-mail attachments you didn’t ask for
Make sure you are using a https connection when using a credit card transaction
Never use a post it note for storing your passwords
Never Insert an Unknown USB stick in your computer
Don’t be a victim of a cyber heist
8 Social Media Trends
Generating Z will become top priority
Influencer marketing will become extremely popular
Instragram stories will continue to grow
Live video will become the social norm
Social messaging will dominate social support
Twitter is dying – they need a jump start
Ditch snapchat for good
Benefits of Social Media
It is fantastic way to learn
Social media can very empowering
Often teaches collaboration
Allows users to create a very positive images
Increasingly, teachers are leveraging student interest in social media tools for instructional purposes
Increased communication is beneficial for future
Build and grow social relationships
Allows people to network and communication
Allows people to stay in touch with each others
Social Media in Education
This title will introduce how to incorporate social media tools into learning activities.
When used properly, social media tools can:
Boost student engagement
links students to content experts
Find online classroom lesson
Help them establish an online body of work their brand.
Allows people to do deep research and come across things they may not have without looking at things their friends have shared.
Allows teacher to inform parents of important assignment and date if website is not practical
Create a group, share information and find resources
Easy sharing of events and information
Easy to stay connected with people
Studies have shown that it can make you happy
Reunite with people you haven’t seen in a long time
Post are private and you decide who you want to see them
The risk of cyber-bullying
The need for schools to research, understand and implement
Voice to negativity
Oversharing of personal information
Seeing exes and past loves may lead to affairs and cheating
Studies have shown that it can also make you unhappy
No need to reunite in person
Privacy can be breached and private information no longer remains private
Facebook Privacy Settings 2018
Don’t make random friends
Do not share unknown post
Avoid like unknown post and article
Don’t use the apps
Don’t use Facebook as your log-in any types of site
Use only burner profile
Properly adjust your settings
don’t post private pictures
Interesting Facts About Facebook
After 100 of years from now, the Facebook will have more than 500 million accounts of “Dead” people.
50% of all internet users are on Facebook where 53% of girls and 47% of boys.
4.8 billion likes are generated daily.
As of 2018, there are 6000,000,000 active Facebook users.
68% of 18 to 35 years old Facebook users.
868 million daily active users
150 average number of friends per Facebook user.
20 minute average spent on Facebook visit.
You can’t block Mark Zuckerberg on Facebook.
Several people have been murdered for unfriending some one on Facebook.
Facebook color is primarily blue because Mark Zuckerberg suffers Red-Green color Blindness.
4.6 billion updates are posted to Facebook/Week
Facebook is the no.1 website worldwide with more page views than Google.
100 million plus people have used Facebook to share, connect to know to see details other websites.
Visitor are 100% more likely to log in to your website using Facebook connect or any on site log in.
More than 700,000 hacking attempts made to Facebook accounts every day.
Adding the “4” number to the Facebook URL will directly lead you to Mark Zuckerberg’s Facebook page.
According to a study 1 in 3 people feel more dissatisfied with their lives after visiting Facebook .
20 Types of people on Facebook
The Lurker: Never Posts anything or comments. Just reads everything.
The Hyena: Never says anything interesting in a comment atall. Just LOL and LMAO at everything.
Mr./Mrs. popular: Has 4367 Friends for no reason and is always trying to obtain more.
The Game Requester: plays Mafia Wars and Words with friends all day and spams friends with requests.
The Prophet: Every Post has a reference to god.
The Thief. Every status update is stolen from another persons wall. Has no creativity.
The Cynic Hates their life and everything in it Proven with the somber tone in EVERY single status they post.
The Collector: Never posts anything. Just fans everything and becomes a member of every group.
The promoter: Spams your inbox with events from 9 States away. Clogs news feeds with video links and flyers.
The Liker: Runs around on Facebook clicking “like” on everything.
The Hater. Every post is only to argue or insult. They see a postive status update and have to hate on it some how.
The Anti-Proofreader: This person would benefit greatly from spellcheck. Are they typing fast or can’t spell?
Drama Queens/Kings: Posts stuff like “l can’t believe this!!” , or *They gonna make me snap today!”, in the hopes that you’ll ask them what’s wrong.. but then they never tell the whole story.
The Idiot This person consistently tries to be funny… but never is.
The News Reporter: Always updates you on their life, second to second, no matter how minuscule the update.
The Rooster: Feels that iVs their job to tell Facebook •good morning” every day.
The Camwhore: Takes ridiculous pictures of themselves in a million different poses and tags all their friends in them fishing for compliments.
The Creeper: Only uses Facebook to look at pictures of women. Adds them just to look at their •bikini at the beach” image folder. He knows where her birthmark is located, but doesn’t know where she works, because he has never once read her info section.
The Stalker: Only uses Facebook to stalk people. Whether it be an ex, a stranger, somebody who is dating someone you used to date, an old friend (to see how their lives are) and etc.
The Nobody: The person with the account that has 18 friends and no interests or info. Just has an account and never uses it.
To conclusion, social networks have it’s own good and bad impact for all layer of society. It has been prove based on a few reference that we studies. It’s a choice for someone whether they want to use it to a positive and negative thing. Good people will take this as advantage for them to get information and discuss about everything that suitable for them. That’s why, there are a good and bad things about social networks
Without the smart phones or device use policy, it is difficult to communicate the organization’s posture on the use of such device. This is a key for first step and usually involves IT and business. Securely manage any devices,application and data. Deploy your any corporate policies on mobile devices. Comply with regular laws. It is projected that iOS and Android will be the leading operating system for smart phone from 2011 on.Once it is known how the smart phones will be used an designing the supporting IT Architecture is the logical next step. Once the IT Architecture design and use policy is defined, then the security policy needs to be documented to determine how the smart phones will be secured to protect organization’s crown jewels.
Understand the smart device security features:
Verify that the password policy is meeting industry standards
Review the encryption requirements and how encryption is deployed
What procedure is in place for reporting of lost devices
Is there a requirement for port control on a devices ?
What is the device are monitored and tracked
What audit and monitoring features are turned on ?
What reports are being generated ?
There are mobile security challenge but also there are solution too
Endpoint management is a required components but not the only solution you will need
There are no one size fits all mobile solution
The mobile landscape continue to evolve – be flexible and embrace change
Plan Implement Manage methodology provides comprehensive approach to organization to secure and manage the smart phones or devices.
10 Steps of Implementation Methodology
Step 1 Plan : Usage Policy
Step 2 Plan : IT Architecture
Step 3 Plan : Security Policy
Step 4 Implement : IT Architecture
Step 5 Implement : Enable E-mail, Contact and calendar
Step 6 Implement : Enable Application Deployment
Step 7 Implement : Enable Network Connection
Step 8 : Regulatory Compliance Governance
Step 9 : Reports and Dashboard
Step 10 : Monitor and Audit
Top 5 Enterprise Mobile Security Concerns
Device data leakage
Primary Concern When Using Mobiles Apps
Privacy = 38%
Security = 26%
Sharing = 14%
Identity = 19%
None = 3%
Top 5 Commonly Used Apps
Social networking =92%
Messaging and chat = 75%
E- commerce = 70%
Mobile Banking =86%
Mobile Wallet = 65%
Average Smartphone Usage
How is the average person using their mobile device on a daily basis
Text Messaging =92% ->10 mins 13 secs
Taking Photos = 62% ->3 mins 30 secs
E-mailing = 86% ->12 mins 6 secs
Gaming = 65% ->16 mins 22 secs
Social networking = 66% ->26 mins 29 secs
Navigation = 50% -> 7 mins 12 secs
Watching Video =54% ->15 mins 9 secs
Research =58%-> 9 mins 22 secs
Phone calls =78% ->18 mins 6 secs
Internet = 98% ->30 mins 49 secs
Note: 96% people use their phone at home, 83% people use their phone at work and 72% people use their phone on the go
Price compare the same product online= 39%
Look up reviews on products or the store itself = 49%
Shop for the item online if they consider the wait time at the store too long =18%
Look up information on the product online right before buying it at the store = 26%
Search online for specific products = 56%
Begin their research about the product once they’re in the store = 36%
Order out of stock products elsewhere= 29%
Mobile phone are a part of our daily life engagement with our new technological world, whether through text messages, calls, e-mails or apps.
75% of smartphone users end up making a purchase where 78% in store, 57% online via a computer, 33% via a phone
72% use a smartphone while in the store
55% use a smartphone to find a retailer
50% use a smartphone to get promotions and coupons
52% use a smartphone to compare prices
48% use a smartphone to read reviews and product info
A cellular network is a radio network made up of a number of radio cells each served by at least one fixed-location transceiver known as a cell site or base station.
Geographic region subdivided in radio cells
Base station provides radio connectivity to the mobile station within cell
Handover to neighboring base station when it’s necessary
Base Station connected by some networking infrastructure
A mobile station in the cellular network service intended for use while in the motion at unspecified locations. They can be either hand-held personal units or installed on vehicles.
A base station in a mobile radio used for radio communication with the mobile stations. This station are locate at the center of a coverage region and consists of radio channels and receiver and transmitter antennas mounted on top of a tower.
How does it work
A telephone cellular or other device that can connect to a cellular network will be referred to a mobile station.
A network consists of both land and radio section. This types of network is commonly referred to as a Public land mobile network (PLMN).
Mobile Phone Networks
There is a number of different digital cellular technologies, including:
Global System for Mobile Communications=GSM
General Packet radio Service=GPRS
Code Division Multiple Access=CDMA
Enhanced Data Rates for GSM Evolution=EDGE
Digital Enhanced Cordless Telecommunication=DECT
Integrated Digital Enhanced Network=iDEN
Some common full form:
UMTS: Universal Mobile Telecommunication System
RAN: Radio Access Network
CN: Core Network
UTRAN: UMTS Terrestrial Radio Access Network
RNC: Radio Network Controller = BSC
node B: Special name of base station in 3GPP Specification= BTS
UE: User Equipment
SRNS: Serving Radio nework Subsystem = SRNS+node BS
DRNS: Drift Radio Network Subsystem = DRNC+ node BS
CRNS: Controlling Radio Network Subsystem= CRNC+node BS
Ambient Intelligence will radically change how people interact with technology and this devices will be able to locate and recognize objects and people, as well as people’s intentions. In Ambient Intelligence, people will surrounded by a multitude of interconnected embedded systems. Intelligence and Embedding is the two main key features of Ambient Intelligence vision.
Steps of ambient intelligence
Needed to provide responsiveness and adaptability
Interpret and recognize context and activity
Activity recognition, activity prediction
What is Intelligence?
The capacity to learn and solve problems, in particular :
The ability to solve novel problems
The ability to act rationally
The ability to act like humans
The Future…. Ambient Intelligence
Intelligent in Home and Building
Climate Control or automatic heating
Automatic communication redirection
Adaptive information services and help
Automatic lighting, kitchen etc
Technology disappear into the environment
Ambient Intelligence builds on three recent key technologies:
Ubiquitous Computing: It means integration of microprocessors into everyday objects like furniture, clothing, white goods, toys, even paint.
Ubiquitous Communication: It’s enables these objects to communicate with each other and the user by means of ad-hoc and wireless networking.
An Intelligent User Interface: it’s enables the inhabitants of the Aml environment to control to control and interact with the environment in a natural and personalized way.
Modern Ambient Intelligence
Before 1990, Classic Ambient Intelligence goals were to surpass human intelligence in Language, reasoning and abstract problem solving.
Some common goals are given below:
Natural language processing
Bio metric, face/fingerprint detection
Robotic and Machine Translation
Real world Modeling
A variety of technologies can be used to enable Ambient Intelligence environments such as :
Bluetooth low energy
Sensors Software agents
Many Ambient Intelligence applications relying upon wireless sensors are at the mercy of the battery life for the sensor.
Challenge is to model multiple residents in an environment.
Challenge for Ambient Intelligence researchers is to design self testing and self repairing Ambient Intelligence software.
Issues related to security and privacy for Ambient Intelligence system.
What is pervasive Computing?
Pervasive means “Existing Everywhere“, pervasive computing embodies the future of network computing enabling wireless communication between individuals and computing devices and between devices itself. This device are tiny and invisible microprocessors embedded in any type of objects like clothes, home, watches etc. It’s also known as Ubiquitous Computing.
Evolution of Pervasive Computing
One computer, Many people
PC : One computer , One person
Pervasive Computing : One person, many computers
Quantified Self technologies have opened up new avenues for big data
This does however race ethical issues for how to deal with personal data protection and privacy, which needs to be explored in greater depth.
Combined with the development of ambient intelligent technologies and Ubiquitous Computing, we now have the potential to design really compelling responsive space that can encourage healthier habits
Rising levels of physical inactivity in urban work space and office environments leads to health problems that are growing cause for concern that should be addressed in the design of these spaces
The principles found in colour theory can be used to enhance responsive ambient intelligence lighting systems, encouraging desirable behavior.