What Is Digital Twin Technology And Why It Is Important For Industry ?

A digital twin is a cross-domain digital model that precisely denotes a product or performance of a product in operation.The digital twin evolves and continuously updates to mirror any modification to the physical counterpart throughout the counterpart’s lifecycle, generating a closed-loop of reaction in a simulated environment that offers the right process design for their products and manufacturing processes.

Digital twins are generally used in entire product development to simulate, analyst, and improve the product and production system before financing in physical prototypes and assets. By combining multi-physics simulation, data analytics, and machine learning capabilities, digital twins can regulate the outcome of design changes, usage scenarios, environmental conditions, and other limitless variables – eliminating the need for physical prototypes, reducing development time, and improving quality of the finalized product or process.To accurate modelling over the entire lifecycle of a product, digital twins use data from sensors situated on physical part of system to regulate the object’s real-time performance, operated conditions, and changes in system over time. By use of this data, the digital twin continuously updates to update any alteration to the physical part throughout the product cycle, generating a closed-loop of feedback in a simulated environment that empowers companies to continuously enhance their products, production, and performance at nominal cost.

How Does Digital Twin Works ?

Capabilities for detecting key characteristics of the real asset’s state and behaviour. This typically implies sensors with corresponding processing capabilities for data quality improvement, such a tuning, filtering, time synchronization. Preserving the integrity of the specifications.
This can be specific end-to-end user applications for observing and control, it can be old applications for maintenance and asset management, or for pattern recognition and decision provision data flowing from twin feed to data analytics and machine learning models. The technology idea used in the sap predictive engineering insights is formed on the principle of annotations and stimulations. Observations are made by physical sensor measurements on a real structure. Actuator motions ruled by sensor measurement data are advantageous in a simulation model by stimulating the digital twin of the real system.Sensors attached to the physical product gather data and send it back to the digital twin, and their interaction helps optimise the product’s performance via a maintenance regime.

Why Is Digital Twin Technology Is Important ?

Digital twins are robust masterminds to drive innovation and performance. Imagine it as your most talented product technicians with the most advanced monitoring, analytical, and predictive abilities at their fingertips. There will be billions of things signified by digital twins within the next five years. These changes of the physical world will lead to new alliance opportunities among physical world product experts and data scientists whose jobs are to recognize what data tells us about operations.

Digital twin technology helps companies improve the customer experience by well understanding customer needs, advance enhancements to existing products, operations, and services, and can even help drive the innovation of new business. For example, GE’s “digital wind farm” opened up new ways to enhance productivity. GE uses the digital environment to inform the configuration of each wind turbine in advance of construction. Its goal is to produce 20% increases in efficiency by analysing the data from each turbine that is fed to its simulated equivalent. “For every physical asset in the world, we have a virtual copy running in the cloud that gets better off with every second of operative data,” says Ganesh Bell, chief digital officer and general manager of Software & Analytics at GE Power & Water.

Conclusion

Over the last decade, dramatic advances have been place in the capabilities and technologies of the data collection for the physical product as well as the design and presentation of the digital product. The connection between the two data sources has lagged far behind their development, which hinders the applicability of the digital twin to various activities in industry and manufacturing.

Gmail encryption: Everything you need to know

Sending an unencrypted email is often likened to a postcard, in that anyone who wants to read it just needs to look at it. Obviously this isn’t good, especially when you need to send personal information to someone else, such as your bank details.

What is Encryption?

Encryption is a modern form of cryptography that allows a user to hide information from others. Encryption uses a complex algorithm called a cipher in order to turn normalized data (plaintext) into a series of seemingly random characters (ciphertext) that is unreadable by those without a special key in which to decrypt it. Those that possess the key can decrypt the data in order to view the plaintext again rather than the random character string of ciphertext.

How Email Encryption Works in Gmail?

Google’s standard method of Gmail encryption is something called TLS, or Transport Layer Security. As long as the person with whom you’re emailing is also using a mail service that also supports TLS — which most major mail providers do — all messages you send through Gmail will be encrypted in this manner.

What that basically means is that it’ll be incredibly difficult for anyone to look at a message while it’s en route from point A to point B. It doesn’t, however, guarantee that the message will remain private or available only to the intended recipient once it reaches the destination mail server. Google itself, for instance, has the ability to see messages associated with your account, which is what allows the company to scan your email for potential spam and phishing attacks — and also to offer advanced features like Smart Reply, which suggests responses based on an email’s contents. (Google used to scan messages for ad targeting, too, but it stopped doing that last year.)

If the person with whom you’re corresponding is using a mail server that doesn’t support TLS, meanwhile, messages won’t be encrypted at all. (With paid G Suite accounts, administrators can opt to allow only messages with TLS encryption to be sent or received — though that’d obviously have its own set of likely undesirable consequences.)

Gmail encryption: A next-level option

Beyond that basic form of encryption, Gmail supports an enhanced standard known as S/MIME — or Secure/Multipurpose Internet Mail Extensions. It’s available only for paid G Suite Enterprise and G Suite Education accounts, so if you’re using a regular free Gmail account, it doesn’t apply to you.

For folks with G Suite setups, though, S/MIME (which may or may not have been invented by a mime) allows emails to be encrypted with user-specific keys so that they remain protected during delivery and can be decrypted only by the intended recipient.

Like TLS, S/MIME works only if both the sender and recipient are using a service that supports it — and, in an extra layer of complication, only if both parties have exchanged keys in advance so that the encryption can be properly configured. Like TLS, it also doesn’t do anything to keep a message secured once it’s reached its actual destination server (and so again, within Gmail, Google itself will be able to scan messages in its usual automated way).

Last but not least, S/MIME has to be enabled by a G Suite admin before it’ll work.

Gmail encryption: End-to-end encryption

Google’s been talking about adding end-to-end encryption into Gmail since 2014, but all of that talk hasn’t amounted to much so far (and may not ever, according to some analyses). The only way to get that level of protection in Gmail right now is to rely on a third-party service such as FlowCrypt, which is available as a Chrome or Firefox extension on the desktop. (An Android app is also available in a pre-release beta form.)

FlowCrypt adds a “Secure Compose” button into your regular Gmail interface, which allows you to send encrypted messages using the PGP (Pretty Good Privacy — yes, that’s actually what it’s called) standard. Your recipient will need to have FlowCrypt or another PGP system set up and will also need to have your personal PGP key in order to decrypt and view your messages. Alternatively, you can use the extension to encrypt a message with a password, which you’d then have to provide to the recipient in some way.

So, yeah: It isn’t exactly simple, and the third-party add-on implementation certainly isn’t ideal. But it can get the job done. And it’s free — to a degree: If you want to unlock the service’s full set of features and remove all of its restrictions, you’ll have to pony up $5 a month for a premium subscription.

Wait, what about Gmail’s Confidential Mode?

Yeah, don’t put much stock into that. Confidential Mode is a feature launched as part of the Gmail revamp earlier last year. The idea is that it lets you prevent someone from forwarding, copying, printing, and downloading anything you send them — and, if you want, lets you set an expiration date after which your message will no longer be accessible. You can also create a passcode, delivered via email or text message, that’s required in order to open the message.

That all sounds nice enough on the surface, but the problem is that it doesn’t really do a heck of a lot when it comes to actual security. Messages still aren’t encrypted in any end-to-end manner, meaning Google (and other mail services) are still able to view and store them. The “no forwarding, copying, printing, and downloading” bit doesn’t mean much, either, since anyone can still take a screenshot of a message if they’re so inclined. (Google has said the feature is less about that level of security and more about simply discouraging people from accidentallysharing sensitive info where they shouldn’t.)

The same applies to the message expiration dates — as does the fact that an “expired” message continues to exist in your own Gmail Sent folder. All in all, Confidential Mode has the potential to be useful for what it is, but it doesn’t involve encryption or any sort of meaningful, higher-level privacy. In fact, the Electronic Frontier Foundation has gone as far as to say the mode could create a false sense of security and discourage users from finding more serious solutions.

Gmail is still not truly end-to-end encrypted, where only the communicators can read the contents of the email. It only works when the encrypted email is sent to a Gmail address. It’s been three years and Google still has no updates for its end-to-end encryption tool.

So what other options are there?

So Gmail is definitely a secure option, but only if you’re recipient also uses Gmail. Here are a few alternatives to look into as Gmail builds its end-to-end encryption solution:

  • Snapmail – This tool is reminiscent of the mobile social networking app, Snapchat, from the name to the functionality. This Google Chrome extension adds a green “Snapmail” button next to the “Send” button in your emails. After your recipient accesses the email, it self-destructs after 60 seconds. No worries, and no trace of your conversation.
  • Tutanota – If you’re looking for a completely different email alternative (complete with an Android and Apple app), check out Tutanota. This is a completely open source email service with end-to-end encryption. It may not be as ubiquitous or supported as Gmail, but if security is your concern, this is your email solution.
  • ProtonMail – Want to take your security and privacy to the next level? Look into ProtonMail. This email service not only promises end-to-end encryption and open source code, but they also operate out of Switzerland and claim all your emails are protected under Swiss privacy laws. No personal information is required, ensuring your identity remains anonymous.

The 25 Worst Passwords of 2018.Is yours on this list?

Despite warnings by security experts and repeated breaches, it appears that some internet users have not updated their passwords to a more secure one. SplashData, the company that makes password manager SplashID,
studied more than 5 million leaked passwords from recent breaches and found that many of the commonly used passwords on the list are commonly used bad passwords from previous years, like “123456,” “password,” “admin,” and “abc123.”

Several of the 25 included passwords were repeats from previous years, but there were a handful of new ones. Some were more poignant for the hellish year (“666666” and “!@#$%^&*” and “donald”) compared to inexplicably optimistic-sounding ones (“sunshine” and “princess”).


Top Methods How Hackers Can Hack Facebook Accounts & How To Protect From Them ?


Here are the worst passwords of 2018. It’s probably fair to say people find simple numerical strings to be the easiest to remember.

1 – 123456

2 – password

3 – 123456789

4 – 12345678

5 – 12345

6 – 111111

7 – 1234567

8 – sunshine

9 – qwerty

10 – iloveyou

11 – princess

12 – admin

13 – welcome

14 – 666666

15 – abc123

16 – football

17 – 123123

18 – monkey

19 – 654321

20 – !@#$%^&*

21 – charlie

22 – aa123456

23 – donald

24 – password1

25 – qwerty123

SplashData estimates that no fewer than 10 percent of people “have used at least one of the 25 worst passwords on this year’s list”. In addition, almost 3 percent of people are estimated to have used the most common poor password, ‘123456’.

For starters, users can use a password manager to collect their passwords securely in one place. Some popular ones include SplashData’s SplashID, LastPass, and 1Password. In addition to securely storing your passwords, many password managers can also dynamically generate unique, strong passwords when you need to create a new site login or update an existing credential. With a unique password, if one site gets breached, your other credentials wouldn’t be affected.

For banking, social media profiles, and other important websites, you can also add multi-factor or two-factor authentication. In addition to requiring a username and password, an additional authentication factor, like a six- or eight-digit passcode, must be used to log in These codes are either sent to you via text message or can be obtained through an authentication app.

Another way to make your password great again is to use an inexpensive hardware-based security key. Prior to releasing its own Titan USB key, Google claimed that when it started internal testing by requiring its employees to use a hardware key in 2017, it saw zero incidents of phishing attacks. With multi-factor authentication, even if an attacker has your login credentials, they wouldn’t be able to access your account without having a hardware key, a passcode sent to your phone, or a unique code that’s generated with an authentication app. Once linked to your account, the hardware keys will work with Windows, Macs, and smartphone devices over USB, USB-C, Bluetooth, or NFC connections, depending on the variant of the key.

What is Overclocking, How It Works and What You Need to Know About It ?




Overclocking is the action of increasing a component’s clock rate, running it at a higher speed than it was designed to run. This is usually applies to the CPU or GPU, but other components can also be overclocked. CPU Overclocking will make any computer perform more set of operations per seconds, or in simple words, multitask with greater speed.

What Is Overclocking?

Your computer’s CPU comes from the factory set to run at a certain maximum speed. If you run your CPU at that speed with proper cooling, it should perform fine without giving you any problems.

Before you learn how to overclock your CPU, there’s a few basic principles to get your head around. The first one is heat. Inevitably, the more voltage you add to your components, the more heat that component is going to produce.

Second, the higher the clock speed you’re trying to achieve, the more voltage you will need to power that attempt. Makes enough sense.

And thirdly, there’s only so much voltage your PC part can take before you start to see detrimental effects. These could be a drop in frame rates for GPUs, corrupting processes on the CPU, or even a failure to boot at all.

These, essentially, are the basic limits of overclocking. All chips are born equal, but some are more equal than others. You’ll often hear overclockers talk of “The Silicon Lottery.” In short, this is to do with the manufacturing process with each and every processor.

When should you Overclock your Computer?

The advantages to overclocking are clear: You get a faster CPU that can perform more operations per second. However, overclocking has become less critical over time — where overclocking once offered a more responsive desktop and faster performance in Microsoft Office, computers have become powerful enough that most users probably won’t even notice the difference. Your computer is likely bottle-necked by other things — perhaps a mechanical hard drive, if you don’t have solid-state storage — so you may not see a noticeable performance difference most of the time.

Gamers or enthusiasts that want their hardware to run as fast as possible may still want to overclock. However, even gamers will find that modern CPUs are so fast and games are so limited by graphics cards that overclocking doesn’t work the magic it used to. Overclocking a GPU may get you a small increase in performance, though, depending on your system and the games you’re playing.

How to Overclock Your CPU

  • Ensure Your System Has Proper Cooling: Your CPU comes with a heat sink and fan from the factory, which are designed to handle the amount of heat produced at the CPU’s standard speed. Speed it up and it will produce more heat. This means that you’ll probably need additional cooling. This can be in the form of an aftermarket heat sink that can dissipate more heat and/or a more powerful CPU fan that can blow the hot air away. You’ll want to have a good amount of free space inside your computer’s case so the air can move around and eventually be blown out by the fan in your computer’s case, which may also need to be upgraded. Air flow is very important for handling heat, as just having a heat sink or CPU fan won’t help if all that hot air stays trapped inside your case.
  • Consider Water Cooling: Hardcore overclockers may want to use a water-cooling system, which is more expensive. Water-based coolant is pumped through tubes inside of the case, where it absorbs the heat. It’s then pumped out, where the radiator expels the heat into the air outside of the case. Water-cooling is much more efficient than air-cooling.
  • Overclock in the BIOS: You’ll need to go into your computer’s BIOS and increase the CPU clock rate and/or voltage. Increase it by a small amount, then boot your computer. See if the system is stable — run a demanding benchmark like Prime95 to simulate heavy use and monitor your computer’s temperature to make sure the cooling is good enough. If it’s stable, try increasing it a little bit more and then run another test to ensure the PC is stable. Increase the amount you’re overclocking by bit by bit until it becomes unstable or the heat is too much, then drop back down to a stable level. Overclock little by little to ensure it’s stable, don’t just increase your CPU’s speed by a large amount at once.

Can Overclocking be dangerous?

When you overclock your CPU, you’re doing something you weren’t supposed to do with it — this will often void your warranty. Your CPU’s heat will increase as you overclock. Without proper cooling — or if you just overclock too much — the CPU chip may become too hot and may become permanently damaged.

This complete hardware failure isn’t as common, but it is common for overclocking to result in an unstable system. The CPU may return incorrect results or become unstable, resulting in system errors and restarts.

If you’re overclocking, you should slowly increase the clock rate and test every new level to make sure it’s stable. You should also monitor the temperature of your CPU and ensure that you have proper cooling. The cooling that came with your CPU probably won’t cut if. If you’re using a laptop without much space for additional air flow, don’t try to overclock — there’s generally just not enough space in a laptop to handle the heat.

Overclocking is never a bad idea for PC enthusiasts and gamers provided the overclocker does proper research about the system, tools, and components. Remember every CPU model behaves differently even having the same model number.

Each component of the computer reacts uniquely to this process depending on the manufacturer. No two same models of CPU can tolerate the same amount of overclocking. One may have more endurance than the other if they are identical in their model numbers.

30 Million Facebook Accounts Were Hacked: Check If You’re One of Them

Late last month Facebook announced its worst-ever security breach that allowed an unknown group of hackers to steal secret access tokens for millions of accounts by taking advantage of a flaw in the ‘View As’ feature.

At the time of the initial disclosure, Facebook estimated that the number of users affected by the breach could have been around 50 million, though a new update published today by the social media giant downgraded this number to 30 million.

Out of those 30 million accounts, hackers successfully accessed personal information from 29 million Facebook users, though the company assured that the miscreants apparently didn’t manage to access any third-party app data

Here’s How Facebook Classified the Stolen Data:

hack facebook

Facebook vice president of product management Guy Rosen published a new blog post  to share further details on the massive security breach, informing that the hackers stole data from those affected accounts, as follows:

  • For about 15 million Facebook users, attackers accessed two sets of information: usernames and contact information including phone numbers, email addresses and other contact information depending on what users had on their profiles.
  • For about 14 million Facebook users, attackers accessed an even wider part of their personal data, including the same two sets of information mentioned above, along with other details users had on their profiles, like gender, language, relationship status, religion, hometown, current city, birthdate, device types used to access Facebook, education, work, the last 10 places they checked into or were tagged in, website, people or pages they follow, and the 15 most recent searches.
  • A remaining 1 million Facebook users did not have any personal data accessed by the attackers.

Besides this, Rosen also added that the attackers had no information to data from “Messenger, Messenger Kids, Instagram, WhatsApp, Oculus, Workplace, Pages, payments, third-party apps, or advertising or developer accounts.”

Moreover, hackers also were not able to access any private message content, with one notable exception—If a user is a Facebook page administrator who had received or exchanged messages from someone on Facebook, the content of those messages was exposed to the attackers.

Here’s How to Check If You Are One of 30 Million Affected Users

Facebook said users can check whether they were affected by the breach by visiting the social network’s Help Center.

Facebook also added that the company will directly inform those 30 million users affected to explain what information the attackers might have accessed, along with steps they can take to help protect themselves from any suspicious emails, text messages, or calls.

So far the identity of the hackers remains unclear, but Rosen said Facebook is working with the FBI, the US Federal Trade Commission, Irish Data Protection Commission, and other authorities to investigate who might be behind the breach or if they were targeting anyone in particular.