Panasonic Factory towards “Zero Carbon Emission”

Carbon dioxide (CO2) is an odorless gas that is vital to life on the planet. CO2 is also known as a greenhouse gas, because its presence in the atmosphere can disturb the natural regulation of temperature, resulting in global warming.

CO2 levels have risen dramatically as a result of the Industrial Revolution and the exponential growth of manufacturing activity all over the world. The primary sources of CO2 are deforestation, agriculture, and the use of fossil fuels. China, the United States, India, Russia, and Japan are the top five countries that produce the most CO2, according to the most recent data from the Global Carbon Project.

Investors, corporate customers, and consumers are pressuring large firms around the world to adopt comparable efforts to address their contributions to the greenhouse effect, with many making “net-zero” emissions pledges to cut and counter their emissions.

Panasonic, which, according to estimates from the firm and other experts, is one of the world’s largest corporate carbon emitters, is only getting started. To offset the roughly 2.2 million metric tons of greenhouse gas emissions linked with the company’s operations, it will have to repeat its Wuxi accomplishment 37 times.

Continue reading Panasonic Factory towards “Zero Carbon Emission”

Cyber-attack on ICRC

Server with personal information of above 500,000 people faced a complex Cyber security attack. That information is linked with data from Red Cross and Red Crescent Movement. This incident triggered the renowned organizations to re-check and test the security of their data.

The server containing various services and information that ICRC was working on to reconnect people separated by wars, violence, etc. was detected an anomaly. And when the deep investigation was conducted, it was found that hackers took over the system and can access the data. To reduce the damage and to ensure the security of accessed data ICRC was forced to shut the servers off. Further to estimate the loss and identify the loopholes in the system independent audit firm was hired. Still, the genuine and authentic information regarding the hosts of the attack has not been confirmed. No ransom has been demanded in exchange for data so even a random guess or illogical move would create a blunder. ICRC is willing to communicate directly and confidentially so the hackers would respect the humanitarian action and the principles of ICRC would be preserved. 

Continue reading Cyber-attack on ICRC

Artificial Intelligence for Cyber Security

AI is always known to be by learning. By digesting billions of data items, AI enhances its ability to “understand” cybersecurity dangers and risks. AI reasoning identifies risks more quickly. In seconds or minutes, AI evaluates correlations between risks such as malware files, strange IP addresses, or insiders.

Hackers can defeat security algorithms by targeting the data they train on and the warning flags they search for, thus machine learning and artificial intelligence can assist protect against cyber-attacks. According to internet statistics, the global market for artificial intelligence in cybersecurity is predicted to increase at a CAGR of 23.6 percent from 2020 to 2027, reaching $46.3 billion.

Because AI and machine learning can swiftly scan billions of data sets and hunt down a wide range of cyber dangers, from malware to shady behavior that could lead to a phishing attack, they are becoming increasingly crucial in cybersecurity.

Artificial intelligence aspires to mimic human intelligence. It has enormous potential in the field of cybersecurity. Artificial Intelligence (AI) systems can be trained to provide threat warnings, identify new types of malware, and protect critical data for enterprises if used correctly.

Continue reading Artificial Intelligence for Cyber Security

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) is a regulatory framework that establishes standards for the acquisition and processing of personal data among European Union citizens (EU). The General Data Protection Regulation (GDPR) is the world’s most stringent privacy and security law. Despite the fact that it was designed and passed by the European Union (EU), it imposes duties on organizations anywhere that target or collect data about EU citizens.

The GDPR major principles:

Continue reading General Data Protection Regulation (GDPR)

Intrusion Detection using Machine Learning

Telecom operators are currently using Artificial Intelligence (AI) technologies to improve their services. Cloud providers are beginning to provide AI as a service, making the technology available to all customers. Compromising an operator is valuable to the attacker, and using AI to increase their success rate is considered a technique to do so. Telecommunications providers are also under attack from two directions: direct attacks from cybercriminals attempting to compromise their organization and network operations, and indirect attacks from those attempting to steal their subscribers’ data. Many classic attack vectors are present among the top threats now attacking each of these frontlines, but with new twists in terms of complexity or size that place new demands on telecoms businesses. The following are some of the threats:

  1. Distributed Denial of Service (DDoS) attacks
  2. The exploitation of vulnerabilities in network and consumer devices
  3. Compromising subscribers with social engineering, phishing or malware
  4. Insider threat
Continue reading Intrusion Detection using Machine Learning

Vector and Raster Graphics

In a simple sense, Vector graphics are not pixelated (not based on pixel) on the other hand Raster graphics is based on pixels. Vector graphics are the form of digital art that is rendered using a mathematical formula, while raster uses pixels or tiny dots that works with colors to form or create an image.

So what is Pixel??? The pixel (“picture element”) is the basic unit of programmable color on a computer display or image. The size of a pixel varies according to the resolutions for the screen. Basically, pixel used RGB colors and different forms of their blend for the specific indication. The bitmap is the file that marks the color for each pixel.

Continue reading Vector and Raster Graphics

Tha Sun

Only about 15% of stars of the entire galaxy host planetary system one of those stars is our Sun. Sun hosts our solar system. According to NASA, Our Sun is named Sol, after the Latin word for Sun, “Solis,” and anything related to the Sun we call “solar.” Sun is in the Orion Spur of the milky-way galaxy. It is believed that the sun was born when the cloud of dust and gaseous particles (solar nebula) collapsed and in the center certain mass condensed into a burning ball of gases resulting from the formation of the sun. Sun is the center of our planetary system and everything around the system revolves within the gravitational force of the sun. The Sun is almost 4.5 billion-year-old a hot glowing ball of hydrogen and helium. Without the energy of the sun, life on earth can’t be imagined. The Sun is the largest known object in our solar system with about 865,000 miles (about 1.4 million kilometers) in diameter.

Continue reading Tha Sun

Data Warehouse

Data warehousing, also known as enterprise data warehousing, is an e-method of shaping, analyzing, and reporting data that are collected periodically having similar in nature. The ability to integrate multiple sources of data is critical in modern companies to make better-informed decisions. Data warehousing, for example, enables data mining, which aids firms in identifying data patterns that might lead to increased sales and profitability.

A data warehouse is a collection of databases that aggregates data from various sources. Data that are retrieved from separate sources are checked and outliers and unnecessary data are deleted to make structured into a query-able format for the processing.

Different Tools for Data Warehouse:

Continue reading Data Warehouse

Big Data

The use of information and communication technologies (ICT) is increasing every day around the world. As a result, the volume of data is rapidly expanding. Big Data refers to large volumes of data that are quickly complicated in nature and challenging to handle and analyze in a traditional manner. Data can come from a variety of places and be kept for analytics to produce relevant and informed findings. Big data, it is now assumed, will not only be a significant component of the world in the future but will also be the future itself. Evolutions in how we store, move, analyze, and comprehend data will continue to change how businesses, organizations, and the IT professionals that support them approach their goals.

To put it another way, big data is simply a large amount of data that has been collected over time from many sources and processed to produce actionable results and knowledge for the advancement and achievement of the organization’s goals. 

Big Data is classified in the following 3 Ways:

Continue reading Big Data

Brief : SOLAR SYSTEM

The Solar System is the gravitationally bound system of the Sun and the planets or cosmic objects that orbit it. In simple words, it is the collection of eight planets and their moons, together with smaller bodies in the form of asteroids, meteoroids, and comets.

Our planetary system is located in an outer spiral arm of the Milky Way galaxy. Our planetary system is called as “solar system” because Sun hosts the solar system and Sun is the center of our planetary system and everything around the system revolves within the gravitational force of the sun. According to NASA, Our Sun is named Sol, after the Latin word for Sun, “Solis,” and anything related to the Sun we call “solar.”

Continue reading Brief : SOLAR SYSTEM