Assign ET
Assign ET
ID 422/14
DEPARTMENT PHARMACY SECTION B
• Objectivity
• Competence and Due care
• Confidentiality
• Professional behavior.
However, the emergence of new technologies raises some new challenges for the profession to
address.
The increasing use of big data, algorithmic decision-making, and artificial intelligence can enable
more consistent, evidence-based and accurate judgments or decisions, often more quickly and
efficiently.
Example
Outputs can be based on biased data, which could lead to discriminatory outcomes. Indeed, where
systems learn from real-world data, there is a significant risk that those systems simply recreate
the past and subsequently build in errors or systemic biases. Closely linked to discrimination is
personalization, and the impact of tailoring decisions very specifically to individuals, based on
preferences, activity and other feature.
2. Avoid harm.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate
5. Respect the work required to produce new ideas, inventions, creative works, and computing
artifacts.
1
6. Respect privacy.
7. Honor confidentiality
Professional responsibilities
1. Strive to achieve high quality in both the processes and products of professional work.
2. Maintain high standards of professional competence, conduct, and ethical practice.
3. Know and respect existing rules pertaining to professional work.
4. Accept and provide appropriate professional review.
5. Give comprehensive and thorough evaluations of computer systems and their impacts,
including analysis of possible risks.
8. Access computing and communication resources only when authorized or when compelled by
the public good.
9. Design and implement systems that are robustly and usably secure
Professional leadership principles
1. Ensure that the public good is the central concern during all professional computing work.
2. Articulate, encourage acceptance of and evaluate fulfillment of social responsibilities by
members of the organization or group.
4. Articulate, apply, and support policies and processes that reflect the principles of the Code.
work.
7. Recognize and take special care of systems that become integrated into the infrastructure of
society.
2
5. Discuss and describe the following terms.
A. Digital privacy
B. Information Privacy
In the context of digital privacy, information privacy is the notion that individuals should have
the freedom, or right, to determine how their digital information, mainly that pertaining to
personally identifiable information, is collected and used.
Every country has various laws that dictate how information may be collected and used by
companies. Some of those laws are written to give agency to the preferences of
individuals/consumers in how their data is used.
C. Communication Privacy
In the context of digital privacy, communication privacy is the notion that individuals should
have the freedom, or right, to communicate information digitally with the expectation that
their communications are secure; meaning that messages and communications will only be
accessible to the sender's original intended recipient.
Additionally, companies frequently have been known to lack transparency in how they use
information, this can be both intentional and unintentional. Discussion of communication
privacy necessarily requires consideration of technological methods of protecting
information/communication in digital mediums, the effectiveness, and ineffectiveness of such
methods/systems, and the development/advancement of new and current technologies.
D. Individual Privacy
3
In the context of digital privacy, individual privacy is the notion that individuals have a right
to exist freely on the internet, in that they can choose what types of information they are
exposed to, and more importantly that unwanted information should not interrupt them.
In such cases the individual, during that moment, doesn't exist digitally without interruption
from unwanted information; thus, their individual privacy has been infringed upon.
With Technology moving at a fast pace it is always been a challenge for Security. As security
professionals, we need to keep pace with ever-changing technology and be aware of the AI, IoT, Big
Data, Machine Learning, etc
2. Real-time horizon scanning and data mining for threats and information sharing
3. Automated cyber security and information assurance
4. Enhanced Surveillance (chemical and bio-detection sensors, cameras, drones, facial
recognition, license plate readers)
8. Situational awareness capabilities via GPS for disaster response and crisis response
scenarios
9. Biometrics: assured identity security screening solutions by bio-signature: (every aspect of
your physiology can be used as a bio-signature. Measure unique heart/pulse rates,
electrocardiogram sensor, blood oximetry, skin temperature)
4
10. Robotic Policing (already happening in Dubai!) B. Challenges in Using Artifical
Intelligence
AI is only as good as the data it is exposed to, which is where certain challenges may present
themselves. How a business teaches and develops its AI will be the major factor in its usefulness.
Humans could be the weak link here, as people are unlikely to want to input masses of data into a
system.
As robots learn to teach each other and themselves, there is the potential for much greater
productivity but this also raises ethical and cybersecurity concerns.
As more and more connected devices (such as smart watches and fitness trackers) join the Internet
of Things (IoT) the amount of data being generated is increasing. Companies will have to plan
carefully how this will affect the customer-facing application and how to best utilize the masses of
data being produced.
There are also severe security implications of mass connectivity that need to be addressed.
Almost all the technologies mentioned above have some relation to Big Data. The huge amount of
data being generated on a daily basis has the potential to provide businesses with better insight
into their customers as well as their own business operations.
Although data can be incredibly useful for spotting trends and analyzing impacts, surfacing all this
data to humans in a way that they can understand can be challenging. AI will play a role here.
5
7. Describe the following technology.
A. Nanotechnology How
it started?
The ideas and concepts behind nanoscience and nanotechnology started with a talk entitled
―There‘s plenty of room at the bottom‖ by physicist Richard Feynman at an American Physical
Society meeting at the California Institute of Technology (CalTech) on December 29, 1959, long.
It‘s hard to imagine just how small nanotechnology is. One nanometer is a billionth of a meter or 10-9 of
meters. Here are a few illustrative examples:
First, nanomaterial‘s have a relatively larger surface area when compared to the same mass of
material produced in a larger form
Second, quantum effects can begin to dominate the behavior of matter at the nanoscale
particularly at the lower end – affecting the optical, electrical and magnetic behavior of materials.
Applications of nanotechnology
Medicine: customized nanoparticles the size of molecules that can deliver drugs directly to
diseased cells in your body. When it's perfected, this method should greatly reduce the damage
treatment such as chemotherapy does to a patient's healthy cells.
Electronics: it has some answers for how we might increase the capabilities of electronics
devices while we reduce their weight and power consumption.
Food: it has an impact on several aspects of food science, from how food is grown to how it is
packaged. Companies are developing nanomaterials that will make a difference not only in the
taste of food but also in food safety and the health benefits that food delivery.
Agriculture: nanotechnology can possibly change the whole agriculture part and nourishment
industry anchor from generation to preservation, handling, bundling, transportation, and even
waste treatment.
6
Vehicle manufacturers: Much like aviation, lighter and stronger materials will be valuable
for making vehicles that are both quicker and more secure. Burning motors will likewise profit
from parts that are all the more hardwearing and higher temperature safe.
B. Biotechnology
It is the broad area of biology involving living systems and organisms to develop or make
products, or "any technological application that uses biological systems, living organisms, or
derivatives thereof, to make or modify products or processes for specific use".
Brewing and baking bread are examples of processes that fall within the concept of
biotechnology (use of yeast (= living organism) to produce the desired product). Such
traditional processes usually utilize the living organisms in their natural form (or further
developed by breeding), while the more modern form of biotechnology will generally involve
a more advanced modification of the biological system or organism.
B. Blockchain Technology
―Blocks‖ on the blockchain are made up of digital pieces of information. Specifically, they have three
parts:
1. Blocks store information about transactions like the date, time, and dollar amount of your most
recent purchase from Amazon. (NOTE: This Amazon example is for illustrative purchases;
Amazon retail does not work on a blockchain principle)
2. Blocks store information about who is participating in transactions. A block for your splurge
purchase from Amazon would record your name along with Amazon.com, Inc. Instead of using
your actual name, your purchase is recorded without any identifying information using a unique
3. Blocks store information that distinguishes them from other blocks. Much like you and I have
names to distinguish us from one another, each block stores a unique code called a ―hash‖ that
allows us to tell it apart from every other block. Let‘s say you made your splurge purchase on
Amazon, but while it‘s in transit, you decide you just can‘t resist and need a second one. Even
though the details of your new transaction would look nearly identical to your earlier purchase, we
can still tell the blocks apart because of their unique codes.
In order for a block to be added to the blockchain, however, four things must happen:
7
1. A transaction must occur. Let‘s continue with the example of your impulsive Amazon
purchase discussed in the introduction part of blockchain technology. After hastily clicking
through multiple checkouts prompt, you go against your better judgment and make a purchase.
2. That transaction must be verified. After making that purchase, your transaction must be
verified. With other public records of information, like the Securities Exchange Commission,
Wikipedia, or your local library, there‘s someone in charge of vetting new data entries. With
blockchain, however, that job is left up to a network of computers.
3. That transaction must be stored in a block. After your transaction has been verified as
accurate, it gets the green light. The transaction‘s dollar amount, your digital signature, and
Amazon‘s digital signature are all stored in a block. There, the transaction will likely join
hundreds, or thousands, of others like it.
4. That block must be given a hash. Not unlike an angel earning its wings, once all of a block‘s
transactions have been verified, it must be given a unique, identifying code called a hash. The
block is also given the hash of the most recent block added to the blockchain. Once hashed,
the block can be added to the blockchain.
Blockchain Explained
A blockchain carries no transaction cost. (An infrastructure cost yes, but no transaction
cost.) The blockchain is a simple yet ingenious way of passing information from A to B in a fully
automated and safe manner.
One party to a transaction initiates the process by creating a block. This block is verified
by thousands, perhaps millions of computers distributed around the net. The verified block is
added
to a chain, which is stored across the net, creating not just a unique record, but a unique record
with a unique history.
Falsifying a single record would mean falsifying the entire chain in millions of instances.
That is virtually impossible. Bitcoin uses this model for monetary transactions, but it can be
deployed in many other ways.
8
In a decentralized network, if you wanted to interact with your friend then you can do so directly
without going through a third party. That was the main ideology behind Bitcoins. You and only
you alone are in charge of your money. You can send your money to anyone you want without
2. Transparency
One of the most interesting and misunderstood concepts in blockchain technology is
―transparency.‖ Some people say that blockchain gives you privacy while some say that it is
transparent. Why do you think that happens?
A person‘s identity is hidden via complex cryptography and represented only by their public
address. So, if you were to look up a person‘s transaction history, you will not see ―Bob sent 1
BTC‖ instead you will see ―1MF1bhsFLkBzzz9vpFYEmvwT2TbyCt7NZJ sent 1 BTC‖.
So, while the person‘s real identity is secure, you will still see all the transactions that were done
by their public address. This level of transparency has never existed before within a financial
system. It adds that extra, and much needed level of accountability which is required by some of
these biggest institutions.
2. Immutability
Immutability, in the context of the blockchain, means that once something has been entered into
the blockchain, it cannot be tampered with.
The reason why the blockchain gets this property is that of the cryptographic hash function.
In simple terms, hashing means taking an input string of any length and giving out an output of a
fixed length. In the context of cryptocurrencies like bitcoin, the transactions are taken as input and
run through a hashing algorithm (Bitcoin uses SHA-256) which gives an output of a fixed length.
Let‘s see how the hashing process works. We are going to put in certain inputs. For this exercise,
we are going to use the SHA-256 .
How Blockchain Works
Imagine the number of legal documents that should be used that way. Instead of passing them to
each other, losing track of versions, and not being in sync with the other version, why can‘t all
business documents become shared instead of transferred back and forth? So many types of legal
contracts would be ideal for that kind of workflow. You don‘t need a blockchain to share
documents, but the shared documents analogy is a powerful one.‖
The reason why the blockchain has gained so much admiration is that:
• It is not owned by a single entity, hence it is decentralized
9
• The data is cryptographically stored inside
• The blockchain is immutable, so no one can tamper with the data that is inside the
blockchain
• The blockchain is transparent so one can track the data if they want to
Application of block chain
1. Crowdfunding
Crowdfunding initiatives like Kickstarter and GoFundMe are doing the advance work for the
emerging peer-to-peer economy. The popularity of these sites suggests people want to have a
direct say in product development. Blockchains take this interest to the next level, potentially
creating crowd-sourced venture capital funds.
1. Governance
By making the results fully transparent and publicly accessible, distributed database technology
could bring full transparency to elections or any other kind of poll taking. Ethereum-based smart
contracts help to automate the process.
10
The UK-based Provenance offers supply chain auditing for a range of consumer goods. Making
use of the Ethereum blockchain, a Provenance pilot project ensures that fish sold in Sushi
restaurants in Japan have been sustainably harvested by its suppliers in Indonesia.
1. File storage
Decentralizing file storage on the internet brings clear benefits. Distributing data throughout the
network protects files from getting hacked or lost.
Interplanetary File System (IPFS) makes it easy to conceptualize how a distributed web might
operate.
D. Cloud Computing
Cloud computing is a means of networking remote servers that are hosted on the Internet. Rather
than storing and processing data on a local server, or a PC's hard drive, one of the following three
types of cloud infrastructure is used.
The first type is a public cloud. Here a third-party provider manages the servers, applications, and
storage much like a public utility. Anyone can subscribe to the provider‘s cloud service, which is
usually operated through their own data center.
A business or organization would typically use a private cloud. This might be hosted on their
onsite data center, although some companies host through a third-party provider instead. Either
way, the computing infrastructure exists as a private network accessible over the Internet.
Well, much like with any utility -a business benefits from economy of scale, which means cheap
computing power. Because a cloud provider‘s hardware and software are shared, there‘s no need
for the initial costly capital investment. And it goes much further than that. Businesses save on the
electricity required 24/7 to power and cool that computing infrastructure. In effect, energy costs
are shared.
It gets better. Cloud providers have vast resources of computing power at their fingertips. They
can allocate these whenever required with just a few mouse clicks. Cloud providers source on a
global scale, so they can deliver the precise bandwidth, storage and power business needs when it
needs it.
E. Quantum Computing
Quantum computers truly do represent the next generation of computing. Unlike classic
computers, they derive their computing power by harnessing the power of quantum physics.
11
Because of the rather nebulous science behind it, a practical, working quantum computer still
remains a flight of fancy.
Give clients access to a quantum computer over the internet, and you have quantum cloud
computing. Currently, the only organization which provides a quantum computer in the cloud is
IBM. They allow free access to anyone who wishes to use their 5-qubit machine. Earlier this year
they installed a 17-qubit machine. So far over 40,000 users have taken advantage of their online
service to run experiments.
Not to be outdone, Google provided the fastest quantum computer with 53qubits and speed of 200
seconds computation while the supercomputer took 10000 years. So, what is qubit and how many
do you need?
An autonomic computing system would control the functioning of computer applications and
systems without input from the user, in the same way, that the autonomic nervous system regulates
body systems without conscious input from the individual.
The goal of autonomic computing is to create systems that run themselves, capable of high-level
functioning while keeping the system's complexity invisible to the user.
12
Autonomic systems/applications exhibit eight defining characteristics:-
Self-Awareness: An autonomic application/system ―knows itself‖ and is aware of its state and its
behaviors.
G. Computer Vision
13
The origins of computer vision go back to an MIT undergraduate summer project in 1966. It was
believed at the time that computer vision could be solved in one summer, but we now have a
50year old scientific field that is still far from being solved.
Early experiments in computer vision took place in the 1950s, using some of the first neural
networks to detect the edges of an object and to sort simple objects into categories like circles and
squares. In the 1970s, the first commercial use of computer vision interpreted typed or handwritten
text using optical character recognition. This advancement was used to interpret written text for
the blind.
H. Embedded Systems
It is a controller with a dedicated function within a larger mechanical or electrical system, often
with real-time computing constraints. It is embedded as part of a complete device often including
hardware and mechanical parts. Embedded systems control many devices in common use today.
Ninety-eight percent of all microprocessors manufactured are used in embedded systems.
Modern embedded systems are often based on microcontrollers (i.e. microprocessors with
integrated memory and peripheral interfaces), but ordinary microprocessors (using external chips
for memory and peripheral interface circuits) are also common, especially in more complex
systems. In either case, the processor(s) used may be types ranging from general-purpose to those
specialized in a certain class of computations or even custom designed for the application at hand.
A common standard class of dedicated processors is the digital signal processor (DSP).
Advantages of Embedded
• Easily Customizable
• Low power consumption
• Low cost
• Enhanced performance
Disadvantages of Embedded systems
14
Larger time to market
Sensor − It measures the physical quantity and converts it to an electrical signal which can be read
by an observer or by any electronic instrument like an A2D converter. A sensor stores the
measured quantity to the memory.
A-D Converter − an analog-to-digital converter converts the analog signal sent by the sensor into
a digital signal.
Processor & ASICs − Processors process the data to measure the output and store it to the
memory.
D-A Converter − A digital-to-analog converter converts the digital data fed by the processor to analog
data.
Actuator − An actuator compares the output given by the D-A Converter to the actual (expected)
output stored in it and stores the approved output.
I. Cybersecurity
Definition
It is the protection of computer systems from the theft of or damage to their hardware, software, or
electronic data, as well as from the disruption or misdirection of the services they provide.
The field is becoming more important due to increased reliance on computer systems, the Internet
and wireless network standards such as Bluetooth and Wi-Fi. Cyber security measures
• Application security: - Web application vulnerabilities are a common point of intrusion for
cybercriminals. As applications play an increasingly critical role in business, it is vital to focus
on web application security.
• Network security: - Network security is the process of protecting the usability and integrity
of your network and data. This is achieved by conducting a network penetration test, which
scans your network for vulnerabilities and security issues.
• Leadership commitment: - Leadership commitment is the key to cyber resilience. Without it,
it is very difficult to establish or enforce effective processes. Top management must be
prepared to invest in appropriate cybersecurity resources, such as awareness training.
Social engineering: - it is a tactic that adversaries use to trick you into revealing sensitive
information. They can solicit a monetary payment or gain access to your confidential data. Social
engineering can be combined with any of the threats listed above to make you more likely to click
on links, download malware, or trust a malicious source.
Phishing: - it is the practice of sending fraudulent emails that resemble emails from reputable
sources. The aim is to steal sensitive data like credit card numbers and login information. It‘s the
most common type of cyber-attack. You can help protect yourself through education or a
technology solution that filters malicious emails. Benefits of Cyber Security
16
• Prevention of unauthorized users.
• Improves recovery time after a breach.
• Protection for end-users.
• Improved confidence in the product for both developers and customers.
Vendors in cybersecurity fields will typically use endpoint, network and advanced threat
protection security as well as data loss prevention. Three commonly known cybersecurity vendors
include Cisco, McAfee, and Trend Micro.
Are ―3D printing‖ and ―additive manufacturing‖ (AM) the same thing? In general, we know that
terms stretch over time to include more than just their default meanings. Whatever the name, new
ways of fabricating directly from bytes to stuff are radically changing the what, where, how, and
when of making objects.
What roles, then, do the two terms ―additive manufacturing‖ and ―3D printing‖ play in
describing new ways of making?
Wikipedia says, ―Today, the precision, repeatability, and material range has increased to the
point that 3D printing is considered as industrial production technology, with the name of additive
manufacturing.‖
Author Deve Turbide puts it simply, suggesting that additive manufacturing is ―the industrial
version of 3D printing‖.
When MIT invented binder jet printing in the 1980s, they wrote: ―three-dimensional printing is a
process under development at MIT for the rapid and flexible production of prototype parts, enduse
parts, and tools directly from a CAD model.‖
Today our concept of ―3D printing‖ is much broader, but the term is often associated with
filament-based plastic printers, which are the pride and joy of many a hobbyist and self-described
17
maker. But there are also binder jet printers, laser metal 3D printers, as well as glass and clay 3D
printersmore about the manufacturing process transformed by 3D printing.
What is that transformation? AM changes the way we think about inventory and supply chain,
taking parts from the point of manufacture to the point of use?
AM is flexible in the time it takes to load a file, from anywhere in the world. It enables customized
parts, in volume, and involves stocking raw materials like filament and printing spare parts on
demand.
18