ceid100-pahulsandhar
CEID 100 Blog | Pahul Sandhar
8 posts
Don't wanna be here? Send us removal request.
ceid100-pahulsandhar · 11 months ago
Text
CEID 100 Final Assignment
Website created by Zubair Ahmed and Pahul Sandhar.
0 notes
ceid100-pahulsandhar · 1 year ago
Text
References for Module 11 Post
21, May, et al. “How Quantum Computing Is Already Changing the World.” Nasdaq, www.nasdaq.com/articles/how-quantum-computing-is-already-changing-the-world. Accessed 29 Nov. 2023.
“5G Technology and Networks (Speed, Use Cases, Rollout).” Thales Group, www.thalesgroup.com/en/markets/digital-identity-and-security/mobile/inspired/5G. Accessed 29 Nov. 2023.
Domingo, Mari Carmen. “An Overview of Machine Learning and 5G for People with Disabilities.” Sensors (Basel, Switzerland), U.S. National Library of Medicine, 14 Nov. 2021, www.ncbi.nlm.nih.gov/pmc/articles/PMC8622934/.
Dr Mark van Rijmenam, CSP. “How Quantum Computing Will Change the World.” Dr Mark van Rijmenam, CSP | Strategic Futurist Speaker, Dr Mark van Rijmenam, CSP | Strategic Futurist Speaker, 7 Apr. 2023, www.thedigitalspeaker.com/quantum-computing-change-world/.
“How Can 5G Make a Difference to Education?” World Bank Blogs, blogs.worldbank.org/digital-development/how-can-5g-make-difference-education. Accessed 29 Nov. 2023.
Kobza, Eszter. “IOT’s Role in Sustainability: Smart Applications for a Greener Planet.” Soracom, 16 Aug. 2023, www.soracom.io/blog/iots-role-in-sustainability-smart-applications-for-a-greener-planet/.
Mack, Janine. “7 Ways the IOT Can Contribute to Sustainability.” SmartMakers, 19 Sept. 2023, smartmakers.io/en/7-wege-wie-iot-zur-nachhaltigkeit-beitragen-kann/#:~:text=IoT%20technologies%20enable%20governments%2C%20businesses,achieve%20long%2Dterm%20environmental%20sustainability.
0 notes
ceid100-pahulsandhar · 1 year ago
Text
Embracing Emerging Technology For a More Positive Digital Future
I believe in harnessing the power of emerging technology to sculpt a future where innovation and humanity intertwine, making way for a more inclusive, sustainable, and empowered world. Here are three pivotal ways in which emerging technology can shape this positive digital future:
Empowerment Through Accessibility
I envision a future where emerging technologies aren't just designed for a select few but for everyone, regardless of background or ability. Accessibility must be a priority, this means pushing for user-friendly designs and accessibility features that cater to diverse needs, which can be done with the help of 5G technology. 5G will offer faster speeds and lower latency compared to previous generations of mobile networks. This enhanced connectivity allows for smoother and more reliable communication, benefiting individuals who rely on real-time interactions, such as people with disabilities who use video calls for sign language communication or those who require immediate access to healthcare services remotely. 5G's ability to handle a larger number of connected devices simultaneously can advance the development of IoT solutions tailored for accessibility.
Sustainability Through Innovation
Emerging technologies offer a plethora of opportunities to address pressing environmental challenges such as the Internet of Things. IoT devices are much more energy efficient by monitoring and optimizing energy consumption in homes, buildings, and industries. IoT sensors can gather data on air quality, water quality, and environmental conditions. This information helps in the early detection of pollution and aids in protecting the environment by alerting authorities to potential environmental hazards. Transportation and logistics can utilize the IoT to create systems that optimize routes, reduce congestion, and improve fuel efficiency by providing real-time traffic data. Additionally, IoT devices in logistics monitor cargo conditions, ensuring proper handling of sensitive goods and minimizing spoilage.
Innovation At Unfathomable Speed
Over the past few decades, we have had a rapid development in the processing power of our technology. This has helped us to solve many complex problems, address global issues, and accelerate scientific discovery. Quantum computing holds immense potential to revolutionize these various aspects of technology. Quantum computing's unparalleled processing speed enables tackling complex problems in fields like drug discovery, climate modeling, and optimization faster and more efficiently than classical computers, potentially driving groundbreaking advancements. Quantum computing also has the potential to revolutionize cybersecurity through quantum-resistant cryptography, while also facilitating the development of secure communication channels.
In hopes of making this vision a reality, I call out to individuals, industries, and policymakers to collaborate, innovate responsibly, and prioritize the improvement of our quality of life through technological advancement. By administering an ecosystem where innovation is coupled with empathy, sustainability, and accessibility, I aim to build a positive digital future where emerging technology becomes a driver for societal progress and the improvement of human life.
0 notes
ceid100-pahulsandhar · 1 year ago
Text
Tumblr media
CEID 100 Module 10
0 notes
ceid100-pahulsandhar · 1 year ago
Text
Leveraging AI to Combat Scarcity
As the chief technology officer of a startup committed to social impact, I am deeply invested in applying the power of AI to address pressing societal challenges. Among these, one of the most important issues we've set our sights on is food insecurity. The intersection of artificial intelligence and this humanitarian concern presents an incredible opportunity for innovation and meaningful change.
AI technology offers a lot of solutions in the battle against food insecurity. At our startup, we've developed a sophisticated AI-powered platform that tackles this problem head-on. By leveraging machine learning algorithms, data analytics, and predictive modeling, we're revolutionizing the way food distribution networks operate.
Our AI-driven platform optimizes the allocation of surplus food from restaurants, grocery stores, and other sources to local food banks and community organizations. Through predictive analytics, we forecast demand patterns and identify areas with the greatest need, ensuring that excess food reaches those who need it most before it goes to waste.
Furthermore, we've incorporated natural language processing (NLP) capabilities into our system to enhance communication and coordination between organization members. This streamlined approach facilitates real-time updates, enabling food banks to efficiently manage inventory, volunteers, and distribution.
Additionally, our AI algorithms continuously learn and adapt, refining their predictions and optimizing resource allocation based on changing socio-economic factors and demand changes. This adaptive intelligence ensures a more responsive and effective system in addressing the dynamic nature of malnutrition.
The integration of AI into our mission to alleviate food insecurity represents not just a technological advancement, but a commitment to creating a more equitable and sustainable society. By harnessing the potential of artificial intelligence, we're trying to create a future where no one goes hungry, where surplus food becomes a lifeline for those in need, and where technology serves as a base for positive social change.
Together, we can leverage AI not just for profit but for the betterment of humanity.
0 notes
ceid100-pahulsandhar · 1 year ago
Text
Tumblr media
Nova Cybersecurity Lab Game
Overall, the game covered a number of points that we discussed in this week's module. The first that I thought to be most important is malware and the range of implications that malicious software can have. Of all the malware we covered the game mainly covered viruses and their effects on the company in terms of losing users. Another topic covered was passwords and how using numbers, uppercase letters and symbols can increase the strength of a password adding complexity. In terms of the combination of characters we use, they should not be the same as passwords for all other accounts and should use random sequences of numbers, letters, and symbols. It also discusses cybersecurity and the subtopics within that like antivirus, identifying phishing emails, and protecting user information. An activity within cybersecurity was identifying potentially dangerous emails, websites, etc. This was done through the use of many different tips like checking the web address, checking the incoming email address, or ensuring the site is secure. These were among the tips that we are able to utilize to ensure safety. Overall an important step is to have reliable anti-virus and malware protection.
0 notes
ceid100-pahulsandhar · 1 year ago
Text
CEID 100 Module 6
youtube
0 notes
ceid100-pahulsandhar · 1 year ago
Text
CEID 100 Module 5
Disinformation, Misinformation and Malinformation
As the issues listed above continue to grow in significance, I have chosen three pieces of content that correlate to the terms.
The first term that I'd like to discuss is disinformation. Although the source title reads misinformation, the article actually uses great examples of disinformation, which is false information that is disseminated with the intent of doing harm. An example that I am using is climate change. Over the past few decades, it has been a prominent term that has brought much-needed attention to an important issue. Although it seems over the last 7-8 years there has been a lot of contradictory information to what has been well established. An example discussed in this article is "climate change does not exist and has been made up in order to distract people from the real issues that this country faces" (Kathie M. d'I Treen, Hywel T. P. Williams, Saffron J. O'Neill 2020). This is a message that has been used by many politicians, most generally those with conservative views. This concept that climate change does not exist has been disproven consistently and its effects can be seen all over the globe with the polar ice caps, rising sea levels, and increasing global temperatures as proof. Yet still this message that it does not exist is spread and can be classified as disinformation. In this case, one of the simplest ways that a reader is able to recognize disinformation would be to check the source and previous information that they released.
Tumblr media
I've used this Twitter post that was included in a BBC article as an example of misinformation. The topic of the coronavirus was another topic that was very controversial at its height and there was a lot of both misinformation and disinformation. This post discusses a possible remedy that is not verified or corroborated. Although the post was spread in good faith, it is still not correct information. This can be identified as such by corroborating this with information that was released by the CHC and Health Canada.
Tumblr media
For malinformation, I have used the example above which is a tweet from Bill Gates's account requesting people to send money via cryptocurrency. This account was one of the many influential people that was hijacked during the infamous crypto scandal at its peak. This is an example of malinformation as it is information that is disseminated with the intent of doing harm. Although it can be apparent to many that this is not something that Bill Gates would tweet, it affects his reputation and character. In order to detect malinformation there are a few evaluations that may be carried out. We can ask ourselves does this provoke an emotional response or make a controversial statement? Is it an extraordinary claim or contains clickbait? (https://www.cyber.gc.ca/en/guidance/how-identify-misinformation-disinformation-and-malinformation-itsap00300). These among a few others are questions that can allow us to distinguish between malinformation and fact.
0 notes