What is Jailbreaking
A Beautiful Mind (2001 film)
How many of you have heard about Game theory ? I am sure very few know about it. Game theory has a wide range of applications, including psychology, evolutionary biology, war, politics, economics, and business. Despite its many advances, game theory is still a young and developing science. John Forbes Nash Jr. (June 13, 1928 – May 23, 2015) was an American mathematician who made fundamental contributions to game theory. John Nash is the only person to be awarded both the Nobel Memorial Prize in Economic Sciences and the Abel Prize.
So most of you will wonder how is this relevant to you ? Well, you may not realize this but your life is influenced heavily by the concepts of Game Theory. John Nash, has therefore made a significant contribution to your daily life. If you want to know about John Nash, then simply watch the movie made in the year 2001, A Beautiful Mind. This movie grossed over $313 million worldwide and won four Academy Awards.
In 1947, John Nash arrives at Princeton University for studying mathematics. He meets fellow math and science graduate students. Determined to publish his own original idea, Nash is inspired when he and his classmates discuss how to approach a group of women at a bar. Nash argues that a cooperative approach would lead to better chances of success, and develops a new concept of governing dynamics. He publishes an article on his theory, earning him an appointment at MIT (Massachusetts Institute of Technology).
In 1953, Nash is invited to the Pentagon to crack encrypted enemy telecommunications, which he manages to decipher mentally. Bored with his regular duties at MIT, including teaching, he is recruited by the mysterious William Parcher of the United States Department of Defense with a classified assignment: to look for hidden patterns in magazines and newspapers to thwart a Soviet plot. Nash becomes increasingly obsessive in his search for these patterns, delivering his results to a secret mailbox, and comes to believe he is being followed.
One of his students, Alicia Larde, asks him to dinner, and they fall in love. On a return visit to Princeton, Nash runs into Charles and his niece, Marcee. With Charles' encouragement, he proposes to Alicia and they marry. Nash fears for his life after surviving a shootout between Parcher and Soviet agents, and learns Alicia is pregnant, but Parcher forces him to continue his assignment. While delivering a guest lecture at Harvard University, Nash tries to flee from people he thinks are Soviet agents, led by psychiatrist Dr. Rosen, but is forcibly sedated and committed to a psychiatric facility.
Dr. Rosen tells Alicia that Nash has schizophrenia and that Charles, Marcee, and Parcher exist only in his imagination. Alicia backs up the doctor, telling Nash that no "William Parcher" is in the Defense Department and takes out the unopened documents he delivered to the secret mailbox. Nash is given a course of insulin shock therapy and eventually released. Frustrated with the side effects of his antipsychotic medication, he secretly stops taking it and starts seeing Parcher and Charles again.
In 1956, Alicia discovers Nash has resumed his "assignment" in a shed near their home. Realizing he has relapsed, Alicia rushes to the house to find Nash had left their infant son in the running bathtub, believing "Charles" was watching the baby. Alicia calls Dr. Rosen, but Nash accidentally knocks her and the baby to the ground, believing he's fighting Parcher. As Alicia flees with the baby, Nash stops her car and tells her he realizes that "Marcee" isn't real because she doesn't age, finally accepting that Parcher and other figures are hallucinations. Against Dr. Rosen's advice, Nash chooses not to restart his medication, believing he can deal with his symptoms himself, and Alicia decides to stay and support him.
Nash returns to Princeton, approaching his old rival Hansen, now head of the mathematics department, who allows him to work out of the library and audit classes. Over the next two decades, Nash learns to ignore his hallucinations and, by the late 1970s, is allowed to teach again. In 1994, Nash wins the Nobel Prize for his revolutionary work on game theory, and is honored by his fellow professors. At the ceremony, he dedicates the prize to his wife.
The movie is a marvel to watch as it depicts the life of a great mathematician struggling with his mental health and still managing to sustain his genius talent. There are moments where you feel that John Nash must simply wind up and retire permanently to live a peaceful life with his family. His problems due to schizophrenia are so immense that you feel sorry for him and his family. His wife stands by him determinedly and ultimately John Nash comes out of his mental illness. With some support from his colleague, he slowly crawls back to normal life and sees super success. He is awarded the Nobel Prize in the end. It is almost unbelievable to see him come out as winner in spite of the severe mental illness. The movie gives us hope and reassurance that nothing is impossible to achieve if one is determined for it. The other dimension of the movie is that it shows you the world of research, academics in big universities and how professionals work in such areas. Focus and dedication is required to succeed in the field of research.
This movie is meant for family view and I encourage it to show it to your school and college going children.
Click here to join WhatsApp Group of Jupiter Knowledge
What is Quantum Computer ?
Ransomware Protection Tools for Business
- Symantec Endpoint Protection Cloud: Symantec Endpoint Protection Cloud (SEP Cloud) is an easy to use security-as-a-service that protects and manages PC, Mac, mobile devices and servers from a single console, making it the ideal solution for organizations with limited IT security resources. SEP Cloud effectively stops today’s ransomware, zero-day threats and other sophisticated attacks using advanced multi-layered technologies including advanced machine learning and behavior analysis. Utilizing SEP Cloud’s, default security settings and user self-enrollment capabilities, this solution quickly protects your endpoints.
- Bitdefender GravityZone Elite: Bitdefender GravityZone Elite suite is designed to protect enterprises against the full spectrum of sophisticated cyber threats with speed and accuracy. Elite provides high-level performance and protection for all endpoints across the enterprise environment: desktops, laptops, mobiles, physical and virtual servers. It ensures a consistent level of security for the entire IT environment, limiting poorly protected endpoints that could serve as starting points for malicious actions against the organization. It relies on a simple, integrated architecture with centralized management for both endpoints and data center. Cloud and on-premise console options fit both cloud-ready and strictly regulated environments.
- Panda Security Adaptive Defense 360: Panda Security Adaptive Defense 360 is the company's flagship entry into the business-grade hosted endpoint protection space. While it delivers a great selection of capabilities, you'll need to be careful when purchasing as the company's website isn't all that clear about which features are included in which tiers. Still, once setup, this platform offers solid protection capabilities across multiple operating system platforms with full management available over the cloud. On the downside, some weaknesses in the user experience and overall threat protection keep it behind our current business security Editors' Choice winners, Bitdefender GravityZone Elite and ESET Endpoint Protection Standard.
- Avast Business Antivirus Pro Plus: Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-500 employees). It works on PCs, Macs and Windows servers. It is enhanced with cutting - edge features to keep your company's life fully secure. It includes powerful antivirus, server, email and network security, CyberCapture, firewall and much more. It can be used either with cloud console or without. A very easy to install protection against virus and malware, Avast Business Antivirus Pro Plus is a Must-Have software for not only businesses but also every computer user. Avast is compatible with most Operating Systems, making it for every person. The software is cheap to purchase and very easy to maintain. The user can install the software without the help of an expert, making installation cost zero. Using the software is as easy as clicking on the "Run-Check" button, leaving the software to check any problems in the system, and clicking "Fix" button once the checking is done. Further, the software is very reliable in detecting issues not only in the PC storage space but also threats that can be picked up from the internet, as it has a powerful firewall feature. With the firewall, the user can connect and browse files via a network connection without any worry. When using external storage facilities and devices, the software is able to run an auto-check on these devices to ensure they do not infect the computer. If any threats are found, the software auto-corrects them. It is a very reliable, convenient and efficient antivirus for both online and offline files.
- McAfee Endpoint Protection Essential for SMB: McAfee Endpoint Protection Essential is a multi-featured security suite, designed for small and midsize businesses (SMBs).The solution offers businesses with a wide array of functionality. A firewall helps keep hackers out of company networks, while anti-malware protection, device control and Web security all defend against multiple security threats. Mcafee Endpoint Protection Essential also features an access protection tool that, in the event of a cyber attack, restricts access to folders designated as “confidential." It comes with a central control panel, available on-premise or in the cloud, which enables a single administrator to manage and monitor the company network, making sure company security is up-to-date. McAfee, a subsidiary of Intel, has clients ranging from government agencies to at-home users. Support is available via phone.
- ESET Endpoint Protection Standard: ESET Endpoint Antivirus is an on-premise antivirus solution that provides businesses protection against malware and a remote management tool. Antivirus and antispyware protections utilize ESET’s Threat Sense technology to defend against both known and emerging threats. Scanning and detection occur can be scheduled and carried out when the system is idle. ESET Endpoint Antivirus also features device control, which scans USB sticks, CDs, DVDs and other removable media for hidden threats. Administrators can configure the system to block unauthorized media from accessing the network, thus protecting against data loss. ESET Endpoint Antivirus also comes with a remote administration tool which enables an administrator to manage the security of thousands of workstations from a single console. Accessible from any computer connected to the network, the remote administrator enables the individual managing company security to schedule or initiate scans, enforce policies and rules and manage configuration. Support is offered via phone, email and through other online resources.
Email Security Tips for Companies
- Have a multiple security system: Most of the companies use only one security scanning system for their emails. Always have a strategy to have more than one security system. Relying on only one system could be unsafe as not always any single system is immune to all kinds of attacks. Just one vulnerability in the security system will cause your email system to crash or exposed to data theft. Additional layer of a security will prevent this kind of attack.
- Configure your email server: Your company should correctly configure email by setting up DMARC ( Domain Based Message Authentication). This protocol checks incoming mails for ensuring messages are legitimate. If senders impersonate as a company person, this will be warded off by DMARC.
- Encrypt Emails: Encryption of mails will protect your company in case someone manages to steal your email data. An encrypted mail cannot be deciphered by unauthorized person. For example, you can use TLS (Transport Layer Security) protocol to encrypt emails. It sets up a secure channel to communicate so that only sender and receiver can access the email contents.
- Guard against spoofing attacks: Hackers often assume a false identity and send you email to steal data or money or spread malware. Beware ! This has to be warded off through wisdom. For example, if the boss is out of town, and a spoof attacker sends email to his colleagues as the boss being in a dire situation and needs money. The attacker's mail will persuade the colleague to immediately transfer money to the boss. This panic creating situation easily tricks innocent employees in sending money or sensitive information to the attacker.
- Filter Email: Use spam filters, firewalls and detection engines to protect spurious emails, By routing email through a gateway, you can enable deep inspection of email. A cloud platform keeps security patches up to date. When an email gateway identifies an attachment as potentially harmful, the platform can place the attachment in a sandbox environment to test how it behaves.
- Avoid phishing attacks: Phishing is a cyber-crime in which a target is contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. Train your employees periodically to be cautious about such emails. An essential part of the training is learning not to open attachments unless you are expecting one. If you didn't expect an attachment, confirm with the senders that they intended to send it.
Don't post your pictures on Social Media
Almost all of us are active on social media nowadays. Facebook, Instagram, Whatsapp, Linkedin etc, there are so many social media sites. Most of you are not aware of a big danger about using these. One of the dangers is misuse of your pictures posted on social media by you. Yes, it can be very dangerous for you if you post your pictures on social media. Here's why......
- Criminals can use your pictures to gain access to sites and locations protected by facial recognition systems. Big companies use data such as pictures on social media to do research for their software development or other systems. They do this WITHOUT taking your consent for using your pictures.
- There have been cases where pictures confidentially shared on social media for private use, have been stolen and made public to humiliate or blackmail the person or misused for fraud and identity theft.
- Your pictures from social media can be used to unlock smartphones. This will mean disaster for you as you not only will lose your smartphone but also lot of personal information will get accessible to someone else.
- When you post your picture on social media, there is a metadata automatically created of the picture. The meta data is the information about the picture i.e GPS coordinates of the place of picture, date and time. Hackers can easily uncover this metadata and come to know where exactly you are. This information can be used to plan out certain things against you.
- Photos of children on social media have been used for cyber bullying, stalking and kidnapping. It is very easy to know from the school uniform about the school details of your kid. Kidnappers can use this information to their advantage.
- Your pictures can be used for identity theft. Information about your lifestyle, habits are unintentionally given out. If you look rich and wealthy, you might probably come on the radar of a criminal looking for right targets.
- You simply CANNOT trust ANY social media tool, no matter how reputed they are. When you post your pictures on social medial believing that the media is renowned and safe, then you are mistaken. Any social media can be hacked. Mistakes too can occur and the social media tool can reveal your pictures publicly due to some technical error or oversight.
- An employee was fired from his job as he had posted his picture on social media partying with his friends while he had reported sick and taken leave from office. His employer saw this picture and immediately fired him.
- Editing software can easily put your face picture on someone else's body. This can be used to make embarrassing pictures or videos of yours which can cause severe distress and humiliation.
- When you post your family pictures, you are revealing a lot of information about your family details which can be used by fraudsters to take advantage of you. For example, a criminal comes to know through your picture on social media that you are mother of a new born baby. Probably you will be at home attending to your baby while your husband is at office and he can exploit your vulnerability to rob your house.
- A lady posted her picture with her house in background. A criminal studied the house from the pic on how to gain access inside. He also collected lot of information about the lady through the picture. He successfully used this information to rob the house.
Beware of Robotexts and Spam Messages
A Robotext is the act of making autodialed calls/texts to cell phones. This includes text messages from text messaging apps and Internet-to-phone text messaging. If you receive such calls or texts on your mobile phone, then please exercise caution. Do not ever respond to them. These calls or texts will ask you to send some details in response which could be your confidential data. This personal data of yours will be used by them to hack into your bank and credit card accounts to make purchases and defraud you. Though there are various laws existing to curb Robotext companies, they are too powerless to check your vulnerable reaction to the Robotext. So it is your responsibility to be alert and prevent any kind of fraud with you. Same applies to spam messages in your email folder. These emails will seek response to unsubscribe if you are not interested. When you press "unsubscribe" link, it will only make them understand you are an active user. They will send you more such messages through different email. There are many ways to counter the nuisance of Robotext and Spam mails. In an Android based mobile phone, you can simply block that number. The caller from that number will never be able to connect with you. You should also report these spammers to your network provider. There are various mobile apps such as Nomorobo, Robokiller to check Robotext. These apps can analyse and identify if the text message is genuine or not. Also avoid downloading unnecessary apps on your mobile. They may be secretly sending your entire data on mobile such as SMS, pictures, stored files, passwords, your internet activity to the fraudsters. These fraudsters can play havoc with your privacy and easily make monetary transfers through your bank accounts. Moreover, your private pictures can be used by them to their advantage. Often you may get lured by Robotext and Spam Emails to submit some data to claim free coupons or discounts on purchases of clothes, food etc. DO NOT ever respond to them and never submit any kind of data, no matter how attractive their offer is. Also they may promise you some commission if you help them in some rescue situation or victimisation problem. These are always baits to exploit your emotions so that they can steal your data and defraud you later. No helpless person will send emails and texts to strangers like this in clear, crisp language. So exercise your common sense and do not fall in the trap. Same applies for dating sites, facebook requests. Attractive appearance of the friend requesting person combined with sweet language is an alluring trap for people seeking companionship. Thoroughly check and proceed. The unknown stranger making sweet talks with you on facebook could be just interested in your money. He/she will seek some money transfer after building up some rapport with you. Immediately stop and block the user. Most importantly, never share any confidential information with such people. The world of mobile and internet is huge and intimidating at times. Always remember, your common sense and alertness will help you overcome the above challenges effectively.
Click here to join WhatsApp Group of Jupiter Knowledge
Work Smarter with 7 Cloud Tools
- Workplace by Facebook: Workplace combines next-generation technology and easy-to-use features to transform communications, culture and workflows inside organisations of all shapes, sizes and industries. It enables seamless top-down communication and knowledge sharing. It gets real-time feedback via likes, comments and reactions.You can use live video for more immediate, direct and authentic sharing. Also it is a global communicator with auto-translate. Workplace promotes openness, feedback and diversity to engage employees and drive cultural change. You can run polls in Groups to get a quick pulse on company issues. an use Workplace Chat bots to make payroll, benefits or onboarding processes quicker and easier. It is easy to deploy with one-click provisioning and single sign on.
- Microsoft Teams: It is a unified communications platform that combines persistent workplace chat, video meetings, file storage (including collaboration on files), and application integration. The service integrates with the company's Office 365 subscription office productivity suite and features extensions that can integrate with non-Microsoft products. Microsoft Teams is a competitor to services such as Slack.
- Trello: It has a variety of work and personal uses including real estate management, software project management, school bulletin boards, lesson planning, accounting, web design, gaming and law office case management. A rich API as well as email-in capability enables integration with enterprise systems, or with cloud-based integration services like IFTTT and Zapier.
- Wrike: The Wrike project management software is a Software-as-a-Service (SaaS) product that enables its users to manage and track projects, deadlines, schedules, and other workflow processes. It also allows users to collaborate with one another. The application is available in English, French, Spanish, German, Portuguese, Italian, Japanese and Russian. The primary goal of the software is to help streamline workflow and allow companies to focus on core tasks. As of 2016, it was used by over 12,000 companies.
- Slack: Slack is an American cloud-based set of proprietary team collaboration tools and services. It offers many IRC-like features, including persistent chat rooms (channels) organized by topic, private groups and direct messaging.All content inside Slack is searchable, including files, conversations, and people. On the free plan, only the 10,000 most recent messages can be viewed and searched. Users can add emoji buttons to their messages, which other users can then click on to express their reactions to messages.
- PBWorks: A number of businesses and corporations use PBworks to create private wikis for employees. PBworks is hosted on an all-Linux cluster and uses its own proprietary software. It has WYSIWYG editing and limited HTML source editing. Users can create free basic wiki workspaces or upgrade to a premium plan to access additional features, such as enhanced security features, customization through CSS, and more storage space. Workspaces can be configured as either public or private (only viewable by those who have been invited to join the workspace).
- Airtable: Airtable is a cloud collaboration service. It is a spreadsheet-database hybrid, with the features of a database but applied to a spreadsheet. The fields in an Airtable table are similar to cells in a spreadsheet, but have types such as 'checkbox', 'phone number', and 'drop-down list', and can reference file attachments like images. Users can create a database, set up column types, add records, link tables to one another, collaborate, sort records and publish views to external websites.
Internet of Things (IoT)
The Witch Doctors of Digital Transformation
Author : Suhas is co-founder, Partner at 3nayan, a niche consulting firm which uses Process Engineering, Robotic Process Automation and Digital Transformation for Strategy Re-Energization, Growth Enablement and Organizational Effectiveness of organizations.
******************
Maybe this article points the muzzle towards my foot somewhat, and towards some of my professional ilk. Will let you be the judge of that. But, the point really is that 84% of Digital Transformation (DX) programs fail.
As we speak with various client business folk, CDOs, CIOs, potential clients and others, it is becoming clear that people who really understand DX are few and far between. People who have planned or done some … even fewer. There are plenty who have done bits of automation, done a cloud migration here, designed an application architecture there, are following someone else’s plan or have executed a piece of the puzzle. People who understand this type of transformation from a business view (enabled by technology), or from an enterprise architecture (business and technology) impact point of view do seem like a rare breed.
There are product companies (and pretend cloud providers) who are happy to divert a client organization’s path by just scaring them and providing them a rather expedient solution. Organizations who get enthused because a competitor has a glitzy solution (however irrelevant to the former’s context). IT services companies which get gullible traditional organizations excited with a one-page customer journey slide. In addition, there are consulting companies and even research companies which have jumped on to the bus and end up dropping their price by 50% during a proposal process for DX implementation. People who can spell “d-i-g-i-t-a-l”, of course I am exaggerating to make the point, are getting CDO jobs. Sad part is that organizations often do not know what a CDO should be like.
The situation reminds me of this book from the late 90s, The Witchdoctors written by two (the) Economist staff writers (Mickelthwait, and Wooldridge). The book traces the journey of management gurus, management theories and consulting companies and talks about how they have spun the business world in the past; not always with integrity.
The current situation, doesn’t seem much different to us. Very often, while trying to sell or convince a client about a certain concept or a solution, we are posed with “Who else in the industry has done this?”. The Fear of Missing Out is what sells most for Digital, DX, Automation, RPA etc. rather than the actual need of the business to find new ways of reaching out to the customer.
In essence, till the time that DX (and related areas) proliferate enough, stabilize and become the normal, the above type of behavior will continue. Meanwhile, the organizations which get their act together are the ones who will succeed in this type of transformation. Getting their act together implies the following:
- Up-skilling themselves, and a number of their core team members who will work the transformation.
- Paying peanuts will get you a monkey. So, spending as an investment to get a real CDO.
- Leadership needs to stand up, be counted and be responsible for removing hindrances (yes, even the human ones).
- Trusting their people and help build a culture of innovation. Supporting constructive criticism is a good place to start.
- Understanding that Digital Transformation is really about business, and a mindset of Customer Centricity and not about technology.
But right now, the gold rush is on. There are people panning, people selling the shovels, and there are folk getting waylaid. The question, to some extent is, how many large failures will it take for organizations to make coherent plans and comprehend Digital Transformation somewhat differently.
Currently, Forbes says, (I repeat) only about 16% such transformation efforts succeed. Just sayin’!
#opinionsmyown
Click here to join WhatsApp Group of Jupiter Knowledge
Free, Useful Software Applications
Information Technology is indispensable for today's world. With a plethora of software applications available, one feels lost with the cost associated with buying licensed software applications for business and personal use. However, few people are aware of wonderful software applications are available absolutely FREE ! Yes, you heard it right. Here is a list of the same;
- GIMP
- Photo & Image Editor
- www.gimp.org
- Inkscape
- Image Editor (Vector Graphics)
- www.inkscape.org
- Scribus
- Desktop Publishing
- www.scribus.net
- LibreOffice
- Office Suite
- www.libreoffice.org
- Wordweb
- English Dictionary
- www.wordweb.info
- Blender
- 3D Creation Suite, animation, game creation
- www.blender.org
- Simplenote
- Keep notes across all your devices
- www.simplenote.com
- R
- Statistical Computing
- www.cran.r-project.org
- QGIS
- Geospatial information editor
- www.qgis.org
- yED Graph Editor
- Flowcharts, Diagrams
- www.yworks.com/products/yed
- Veusz
- Scientific plotting & Graphing
- www.veusz.github.io
- ImageJ
- Image Processing & Analysis
- www.image.nih.gov/ij
- LyX
- Book and Thesis Creation
- www.lyx.org
- Grammarly
- Grammar Checker
- www.grammarly.com
- Mendeley
- PDF Library
- www.mendeley.com
- Calibre
- E-Book Management
- www.calibre-ebook.com
- PicPick
- Screen Capture Tool
- www.calibre-ebook.com
- Google Drive
- 15 GB og online storage
- www.google.com/drive
- CCleaner
- Speed up your PC
- www.ccleaner.com
Click here to join WhatsApp Group of Jupiter Knowledge
Potential Blockchain in Indian Health Insurance
In an industry attempted to be governed by a somewhat confused regulator, completely fragmented provider side, health insurance companies in India struggle to make real straight through claims processing a reality. A small number of claims passing through limited expanse rules-engines don’t count.
Complete lack of trust among payer and provider, as many data formats as entities, half completed ICD codes, data being transported through emails in PDF files and images, multiple insurance company portals are just a few among the problems which prevent quick processing or detection of fraud. The payer side is an industry plagued with almost non-existent underwriting profit, but high investment profit from float money finally aided with low cost labour. The insured ends up paying for the inefficiencies.
This is not an unsolvable problem. Sounds like a Blockchain based solution, doesn’t it? But, there is no blockchain instance (in this industry) around.
The problem isn’t really a technology one, it is of people, of organizations. .....Click here to read full article
About the Author: Suhas is co-founder, Partner at 3nayan, a niche consulting firm which uses Process Engineering, Robotic Process Automation and Digital Transformation for Strategy Re-Energization, Growth Enablement and Organizational Effectiveness of organizations.
Click here to join WhatsApp Group of Jupiter Knowledge
Blockchain Technology- "The New Internet"
Blockchain technology is seen as "The New Internet" by businessmen and entrepreneurs. It is a secure way for transaction. Also for career aspirants, it is an important career option too. Many job roles for blockchain professionals will open such as developers, designers and project managers. These jobs will be in high demand in future.
Blockchain allows digital information to be distributed but not copied. Information exists as a shared and a continuously reconciled database. This type of network gives various benefits. The blockchain database is not stored in any single location. The records it keeps are truly public and easily verifiable. Since there is no centralized version of this information , a hacker simply cannot corrupt it. The data is hosted by millions of computers simultaneously and anyone can access it on internet.
Blockchain stores blocks of information that are identical across its network. So it cannot be controlled by any single entity and therefore has no single point of failure. It is a type of self-auditing ecosystem of a digital value. Its network reconciles every transaction that happens in ten-minute intervals. Each group of these transactions is referred to as a “block”. This imparts it 2 properties
- Embedding of transparent data in the public network.
- Incorruptibility of data as alteration of information on the blockchain is not possible
Blockchain technology imparts a new layer of functionality to the web.
Uses of Blockchain Technology
- Management of database that records Bitcoin transactions
- International remittances
- Direct transactions of users with one another.
- Secured blockchain boosts new internet business to unbundle the traditional institutions of finance.
- Blockchain technology holds great potential to optimize clearing and settlements, and could represent global savings of up to $6bn per year.
- Smart contracts can be executed using distributed ledgers
- By enabling peer-to-peer payments, the blockchain opens the door to direct interaction between parties — a truly decentralized sharing economy results. e.g Uber, Ola, Airbnb
- Blockchains take funding to the next level, potentially creating crowd-sourced venture capital funds.
- Transparency of election and polls can be effectively maintained by making the results fully transparent and publicly accessible
- Distributed ledgers provide an easy way to certify that the backstories of the things we buy are genuine.
- Decentralizing file storage on protects files from getting hacked or lost
- Smart contracts can protect copyright and automate the sale of creative works online, eliminating the risk of file copying and redistribution
- Distributed ledgers offer enhanced methods for proving who you are, along with the possibility to digitize personal documents.
- Anti-money laundering (AML) and know your customer (KYC) practices have a strong potential for being adapted to the blockchain
- Future users will have the ability to manage and sell the data their online activity generates.
- Property titles tend to be susceptible to fraud. Also it costly and labour intensive to administer. As Publicly-accessible ledgers, blockchains can make all kinds of record-keeping more efficient.
- Share settlement process will become much more efficient on using blockchains in stock trading
Click here to join WhatsApp Group of Jupiter Knowledge
Lucy (2014 film)
- Ability to suppress pain
- Acquire telekinetic powers
- Feel even littlest vibrations
- Understand supersonic frequencies.
- See light at broader spectrum
- Can hear radio frequencies with ears
- Can manipulate speed and flow of time
TRIZ (Theory of Inventive Problem Solving)
TRIZ is the Russian acronym for the "Theory of Inventive Problem Solving," an international system of creativity developed in Russia.
One can think of TRIZ as another way of Lateral Thinking. TRIZ is either jumping to solutions OR starting from scratch. According to TRIZ, universal principles of creativity form the basis of innovation. TRIZ identifies and codifies these principles, and uses them to make the creative process more predictable. TRIZ is most useful in roles such as product development, design engineering, and process management.
TRIZ is based on two basic principles
- Somebody, sometime, somewhere has already solved your problem or one similar to it. Creativity means finding that solution and adapting it to the current problem.
- Don’t accept contradictions. Resolve them
TRIZ provides a range of strategies and tools for finding inventive solutions. It provides a structured way of doing innovations and changes the way a engineer would approach a problem. TRIZ is developed by analyzing patents . Thus when TRIZ is applied to solve a problem it brings the vast knowledge available in patents database.
TRIZ is a set of systematic thinking tools and uses a distillation of all recorded solutions in 4 simple lists:
- 40 inventive principles
- 8 trends of technical evolution
- 76 standard solutions
- 2500+ engineering & scientific concepts arranged as questions and answers
TRIZ offers 4 ways to resolve physical contradictions by separating contradictory requirement
- Time (Try to schedule the process so that conflicting requirements, functions, or operations take
effect at different times.)e.g. Reviews in a team can be conducted at a separate fixed time - Space (Separate contradictory requirements, functions or conditions by assigning each one to a different location.) e.g. There can be a separate space to perform a specialized functions
- Condition (Look for a parameter or condition that can change so the system can meet one
requirement under one condition and the opposite requirement under another condition.) - Alternative Ways/Structure (Try to separate contradictory requirements, functions or conditions between different structural elements of the system.)
These are the 40 inventive principles that have been used in hundreds of thousands of patents. You can use them via TRIZ Contradiction Analysis or standalone, as stimuli to prod your thinking forward.
- Segmentation
- Extraction
- Local Quality
- Asymmetry
- Combination
- Universality
- Nesting
- Counterweight
- Prior Counteraction
- Prior Action
- Cushion in Advance
- Equipotentiality
- Inversion
- Spheroidality
- Dynamicity
- Partial, overdone or excessive action
- Moving to a new dimension
- Mechanical vibration
- Periodic action
- Continuity of useful action
- Rushing through
- Convert harm into benefit
- Feedback
- Mediator
- Self-service
- Copying
- Inexpensive short life
- Replacement of a mechanical system
- Use pneumatic or hydraulic systems
- Flexible film or thin membranes
- Use of porous materials
- Changing the colour
- Homogeneity
- Rejecting and regenerating parts
- Transforming physical or chemical states
- Phase transition
- Thermal expansion
- Use strong oxidisers
- Inert environment
- Composite materials
Although TRIZ was developed from the analysis of technical systems, it has been used widely as a method for understanding and solving complex management problems.
- Samsung uses TRIZ heavily. In 2003 TRIZ led to 50 new patents for Samsung .
- Rolls-Royce, BAE Systems and GE are all documented users of TRIZ.
- Mars has documented how applying TRIZ led to a new patent for chocolate packaging.
- TRIZ has also been used successfully by Leafield Engineering, Smart Stabilizer Systems and Buro Happold to solve problems and generate new patents.
- Rolls-Royce, Ford, and Daimler-Chrysler, Johnson & Johnson, Boeing, NASA, Hewlett Packard, Motorola, General Electric, Xerox, IBM, LG, Samsung, Intel, Procter and Gamble, Expedia and Kodak have used TRIZ methods in some projects.
- The application of TRIZ tools in numerous German industrial companies in the recent decade has followed the principles of the Advanced Innovation Design Approach, which recommends application of the selected TRIZ tools in the early stage of the innovation process for the identification of customer needs, comprehensive problem definition and ideation, new concept development and optimization.
Note: Condensed from Wiki Link
Click here to join WhatsApp Group of Jupiter Knowledge
Alvin Toffler - (Writer, Futurist, Businessman)
Alvin Toffler (October 4, 1928 – June 27, 2016) was an American writer, futurist, and businessman. He is called futurist because he quite accurately predicted what kind of technologies will emerge over the years and how society will change because of that. Toffler predicted a number of geopolitical events, such as the collapse of the Soviet Union, the fall of the Berlin Wall and the future economic growth in the Asia-Pacific region.
We strongly recommend to read all his books as it will give you a certain direction, insight and guidance on how to plan your personal and professional goals in the fast changing world.
In 1970 his first book about the future, Future Shock, became a best-seller and has sold over 6 million copies. It mentions about " too much change in too short a period of time" that society has to start handling.
His second book, The Third Wave in 1980 was a bestseller too. In this book he made predictions on technological advances as cloning, personal computers, the Internet, cable television and mobile communication. Due to technological advances there are three types of societies, based on the concept of "waves" — each wave pushes the older societies and cultures aside.
- First Wave: Society after agriculture revolution replaced the first hunter-gatherer cultures.
- Second Wave: Society during the Industrial Revolution , saw the increase of urban industrial populations which had started destroying the traditional nuclear family, and initiated a factory-like education system, and the growth of the corporation.
- Third Wave: Post-industrial society in Information Age, Space Age, Electronic Era, Global Village with a scientific-technological revolution where society moves towards individualism instead of being family oriented.
His third book , Powershift, (1990), was on the increasing power of 21st-century military hardware and the proliferation of new technologies.
He founded Toffler Associates, a management consulting company, and was a visiting scholar at many prestigious universities. Toffler's ideas and writings were a significant influence on the thinking of business and government leaders worldwide. Among a few of his opinions, he said that "Society needs people who take care of the elderly and who know how to be compassionate and honest. Society needs people who work in hospitals. Society needs all kinds of skills that are not just cognitive; they're emotional, they're affectional. You can't run the society on data and computers alone."
Toffler often visited with dignitaries in Asia such as Zhao Ziyang (China), Lee Kuan Yew (Singapore) and Kim Dae Jung (South Korea). All of these leaders were influenced by his views as Asia's emerging markets increased in global significance during the 1980s and 1990s.
Recognition of Toffler by Academia and Industry:
- Accenture, the management consultancy firm, identified Toffler in 2002 as being among the most influential voices in business leaders, along with Bill Gates and Peter Drucker.
- Financial Times described him as the "world's most famous futurologist".
- People's Daily classed him among the 50 foreigners who shaped modern China.
- Prime Minister Zhao Ziyang of China convened conferences to discuss The Third Wave in the early 1980s.
- Author Mark Satin characterizes Toffler as an important early influence on radical centrist political thought.
- Won prestigious prizes awards, such as the McKinsey Foundation Book Award for Contributions to Management Literature, Officier de L'Ordre des Arts et Lettres, and appointments, including Fellow of the American Association for the Advancement of Science and the International Institute for Strategic Studies,Brown University's Independent Award.
Note: Article condensed from Wiki Link
Click here to join WhatsApp Group of Jupiter Knowledge
How To Make a Three Bottle Heron's Fountain
Heron's fountain is a hydraulic machine invented by the 1st century AD inventor, mathematician, and physicist Heron of Alexandria. Various versions of Heron's fountain are used today in physics classes as a demonstration of principles of hydraulics and pneumatics. Here is a video to make Heron's fountain at home using 3 plastic bottles, straws and basic tools. This is a non-stop fountain that runs on its own without any pump or support. A very educative and enjoyable activity for all ! Strongly recommended for students !
Note: Article condensed from Wikipedia. Link
Click here for video to make Heron's Fountain
Click here to join WhatsApp Group of Jupiter Knowledge
https://www.youtube.com/watch?v=k5pEc6DlVj0
Forest Bath (Shinrin-Yoku)
Japanese practice a wonderful healing technique called "Forest Bath". In Japanese it is called "Shirin-Yoku" which literally means "Forest Bath".
It is a very simple methodology. You just have to go in a forest and be with the trees ! Yes, that's it. There is no walking, jogging or special exercise or breathing technique required. Just be with the trees. Feel the atmosphere and connect with the trees around you through your senses of sight, hearing, taste, smell and touch. This will connect you internally with Mother Nature. People living in urban areas live in an artificial environment surrounded by glass/ concrete walls, air conditioners, electronic gadgets and they consume unhealthy food. This creates a strong disconnect between man and Mother Nature. The average American spends 93% of his or her time indoors. But spending time with Nature can greatly improve your physical and mental health.
How to do Forest Bathing:
- Leave behind all your gadgets like mobile, camera, etc.
- Wear loose comfortable clothing made of natural fibre like cotton.
- Go to a nearby densely green area covered with lot of trees.
- Relax and walk amongst the trees. Walk slowly or stand if you wish.
- Feel the forest through your five senses.
- Experience nature through your ears, eyes, nose, mouth, hands and feet.
- Listen to the birds singing and the breeze rustling in the leaves of the trees.
- Enjoy the variety of trees and their green color.
- Feel the sunlight on your skin.
- Trees emit various odours. Inhale and smell these odors.
- Feel the air against your skin.
- Place your hands on the trunk of a tree and tell the tree to fill you up with positive energy.
- Talk to the tree and feel connected with it.
- Lie down on your back on the ground and stare at the blue sky, green trees, birds and butterflies.
- Listen to the chirping of birds
- Connect with the forest and feel a sense of joy and calm.
- When you are doing all of the above and enjoying it, suddenly a connection will be built with the "spirit of forest" and you will feel deep inner joy, happiness and relaxation. You will feel energised and healed.
- Savour this feeling as much as you can
You can use a guide to explore a dense forest if you wish. While in the forest, you can do many things like meditation, yoga, walking, mantra chanting, breathing exercises, aromatherapy etc. But simply avoid electronic gadgets and external aids. Look for a place where there are trees, and go for Forest Bath periodically.
Click here to watch video on Forest Bath
Click here to join WhatsApp Group of Jupiter Knowledge
https://www.youtube.com/watch?v=stuZaKB9j7I
Sense of Sex
- Author: Kalyan Sarkar
- About the Author: Kalyan, the founder of PSYsolution is a veteran (1997-2012) from Indian Air Force (IAF), having a background in Mechanical Engineering. He holds a Postgraduate degree in Mathematics. He is also an MSc in Applied Psychology (Clinical) followed by an intense research in Meditation and Stress coping skills at MPhil level. Kalyan has worked with WizIQ.com, a leading online education platform, for almost 5 years (2012-2016). At WizIQ, he led the Solution team as Director, Solutions. With his keen interest in the use of technology in education, Kalyan headed a number of projects* successfully. Kalyan holds his deepest interests in the field of pure Nature Cure, Health and Holistic Education. Click here for details
- All rights reserved
- © PSYsolution, 2018
- STATEMENT BY THE PUBLISHER
- The opinions expressed in this material are based on Nature Cure science of health and do not coincide with medicinal theories. PSYsolution does not claim that any advice given, represents a "cure" for diseases. If anyone has doubts regarding his or her health, it is the responsibility of the individual to consult a competent health practitioner. These materials are not aimed at hurting anybody’s belief or philosophy. PSYsolution believes that the true health does not need treatment, it needs education. It is an endeavour to educate that “The cure is from within”!