Pink Glitter

Sunday, November 24, 2013

8. Computer-Aided Design

Computer-Aided Design, or CAD, is a combination of hardware and software that enables engineers, animators, and architects to design anything they would like.  This programs allows creation of 2D and 3D graphical representations of physical objects.  In addition to the software, CAD systems also require a high quality graphics monitor, a light pen or drawing tablet, and a special printer or plotter for printing the design specifications.  CAD systems allow the user to view their design from any angle as well as zoom in and out on any specified point, allowing for better visualization of whatever the final product my be.  The computer also keeps track of any dependencies, so that when one value is changed, all other values that depend on it are also automatically changed.  This creates greater accuracy and therefore reduction of error.  CAD software is also less expensive in the long run, and allows high productivity and higher product quality because of how easy it is to edit and re-use designs.
There are several different types of CAD software.  Fiberism is a program that allows for design of innovative, durable, and lightweight products made from advanced composite materials.  Seat Design Environment is a program that utilizes 3D CAD systems for designing and manufacturing innovative transportation seat systems and interior components.  Solid Edge is a combination of 2D and 3D systems that allows for accelerated design, change, and re-use of designs.  Lastly, Parasolid is a 3D geometric modeling component software that is used as the geometry engine in many different CAD applications.  There are many more different types of CAD software, but these are just a few.  

References:

http://www.webopedia.com/TERM/C/CAD.html

http://www.plm.automation.siemens.com/en_us/plm/cad.shtml

7. Wireless Networking Precautions

Because free Wi-Fi is now being offered in several hotspots such as airports, libraries, and cafes, there are some risks that people are taking by using it.  Other people in the same area may be able to gain access to unencrypted messages.  This could lead to identity theft and hacking.  Hackers can set up free Wi-Fi networks, wait for users to sign in, and begin stealing personal information and passwords.  These fake wireless networks are saved onto one's computer after joining so that the PC may automatically log in to them in the future, allowing for further hacking.  To avoid this, there are a few precautions that should be taken.
The best way to protect a computer is to download anti-virus software.  This will automatically scan the computer for any threats, which can help keep out any intruders who may attempt to install a virus.  Another precaution to be taken is to install a firewall.  This will reduce the chances of someone being able to hack into the computer.  When using public Wi-Fi, it is a good idea not to put out any personal information, such as buying something online with a credit card.  If someone is attempting to hack the computer and steal such information, this would just be making it easy for them.  By taking such precautions, the computer will have a much lower chance of being hacked.

References:

http://www.support.com/blog/post/7-simple-precautions-you-should-take-when-using-public-wi-fi

http://www.itlist.com/security-precautions-for-wireless-internet-users/

6. Cloud Computing

Cloud computing is a type of computing that relies on sharing computer resources rather than having local sources or personal devices handle applications.  The word cloud is supposed to be a metaphor for the Internet.  Different services are delivered to computers and devices through the Internet.  Cloud computing applies supercomputing to perform trillions of computations per second in a variety of areas.  These areas include delivering personal information, providing data storage, or powering computer games.  To do this, cloud computing uses networks of large groups of servers to spread data-processing evenly among them.
There are a few ways that businesses can utilize cloud computing.  First, it can be used in free and paid for e-mail services, such as Gmail.  It is also used for backup and file sharing.  This allows files to be accessed by logging in from any location and on any computer, such as with Dropbox.  Cloud computing has also been used to make customer relationship management system less expensive, because now one can just log in and use it rather than downloading it themselves.  It also allows people to rent servers, rather than buying a server that they may only use for a short amount of time.  Lastly, cloud computing can be used by businesses to edit documents.  For example, people can access Google Docs for word processing any time and on any computer.

References:

http://www.webopedia.com/TERM/C/cloud_computing.html

http://www.itdonut.co.uk/it/networking/how-do-businesses-use-cloud-computing-

5. Internet Filters and Parental Control Software

Internet filters can help monitor what is being viewed on a particular computer.  These filters are most commonly used in parental control software, which can help parents manage who their children are talking to and how long they can use the computer.  Setting internet filters can help keep kids from viewing inappropriate content and it can identity which websites are okay to visit.  Businesses can also use Internet filters to block websites that they do not want their employees to visit while working.  There are also phishing filters, which warns the user and blocks them from viewing websites that may be fraudulent.  Another type of Internet filter is a spam filter, which keeps spam e-mails from getting into one's inbox.
As previously stated, parental control software is the most commonly used Internet filter.  This is very useful because today's children have a better understanding of the Internet than their parents do, so simply downloading this software can help protect them from various online threats.  This software will keep children from viewing inappropriate content as well as block them from talking to strangers who could potentially be dangerous.  It can also prevent kids from sharing important personal information, such as their phone number and address.  The software also sets a time limit on Internet use, preventing kids from wasting their entire day online.  Lastly, it could block social media websites that are typically venues for cyber bullying.  All in all, parental control software is there to protect children.

References:

http://www.microsoft.com/security/resources/internetfilters-whatis.aspx

http://www.pcmag.com/article2/0,2817,2346997,00.asp

4. Radio Frequency Identification

Radio Frequency Identification, or RFID, is a system that transmits the identity of an object or person wirelessly using radio waves.  It is a type of automatic identification technology, which are designed to reduce the amount of time and labor needed to manually input data and to improve data accuracy. RFID enables readers to capture data on tags and transmit it to a computer.  The tag consists of a microchip attached to a radio antenna.  These chips can store up to 2 kilobytes of data, including date of manufacture, destination and sell-by date.  To retrieve the data, a reader is needed.  The reader has antennas that emit radio waves and receive signals back from the tag.  The reader then passes the information to a computer where it can be stored.
Companies have been using RFID technology for about a decade now, and there are several different applications for the service.  The most common application is asset tracking.  Companies can put tags on assets that are lost or stolen often, or are just hard to locate.  RFID can also be used in manufacturing plants to track parts and works in process in order to reduce defects and manage production.  Another use for the technology is supply-chain management to track shipments and monitor the condition of products in transit.  Lastly, RFID can be used as a payment system.  For example, it is used in the EZ Pass system for paying tolls.  It can also be used to make paying for train or subway rides faster and more convenient.  These are just a few examples of the uses for RFID technology.

References:

http://www.rfidjournal.com/articles/view?1339

http://www.rfidjournal.com/articles/view?1334/3


Thursday, November 21, 2013

3. Digital Image Steganography

Steganography is the art of hiding the fact that communication is taking place.  This is done by hiding the original information inside something called a carrier file.  Many different carrier files can be used, but digital images are the most popular because they occur most frequently.  Basically, a secret message is being hidden within an image.  These images can be a big threat to security, because they look harmless but could actually contain company secrets.  The use of digital images make use of weaknesses in the human visual system, which has a low sensitivity to small random pattern changes and luminance.  Because of this, small text can be inserted into an image without the viewer noticing.

There are a few different applications of image steganography.  Of course, the most used one is confidential communication and data storage.  The existence of confidential data can be hidden and it can also be made impossible to uncover it.  It can also be used to protect data alteration. There is also an application that does not focus on hiding data, but focuses on unifying two types of data.  For example, a photo could have an association to some other data such as the date or time.  This makes it easier to transfer.  All of these applications are just some of the reasons why image steganography use is so widespread.

References:

http://prateekvjoshi.com/2013/03/20/image-steganography/

http://www.datahide.com/BPCSe/applications-e.html

2. Computer Forensics

Computer forensics is the use of investigation and analysis to gather and preserve evidence from a computer in such a way that it can be presented in court.  The goal is to perform an investigation while also having a documented chain of evidence in order to discovered exactly what happened on a particular computer and who did it.  The investigator isolates the device to make sure that it cannot be contaminated, then makes a digital copy of the computer's storage media.  Once it has been copied, it is locked in a secure facility to maintain the condition.  Therefore, all of the investigation is done on the digital copy, not on the actual computer.  The investigator will use a variety of techniques to examine the copy.  They will search for hidden folders and encrypted files, among other things.  Any evidence found in the copy is documented in a findings report and verified against the original in preparation for any legal proceedings.
Computer forensics has been increasingly used in legal cases, so much so that it has become its own special field of study.  It can be used to prove that something happened, such as finding e-mail evidence of fraud or theft of intellectual property.  It can also be used to someone did not do something, such as someone downloading illegal content onto another person's computer like a form of sabotage.  Finally, computer forensics can also figure out what the facts prove or demonstrate, such as an e-mail that may discuss illegal activities.

References:

http://searchsecurity.techtarget.com/definition/computer-forensics

http://www.dummies.com/how-to/content/how-computer-forensics-is-used-in-legal-cases.html