Posts

Showing posts from July, 2021

3D Printing - A Leading Edge Technology

Image
  3D printing  is a manufacturing process to fabricate physical object of materials like polymers, metals, composites, bio-materials, edibles, etc. from the object’s  Computer-Aided-Design [CAD] Model  i.e., its digital model. There are two types of processes 1) Additive manufacturing processes 2) Subtractive manufacturing processes In additive manufacturing process, the material is added to form a product while in subtractive manufacturing process, the material is removed in order to create an object. 3D printing  comes in the category of  additive manufacturing processes  as it creates an object by layering method. It is possible to manufacture products with wide range of size, shape, colour, rigidity, and with variety of materials which are either in powdered or melted form. 3D printing technology:                                                      (The 3D Printing Machine Operation) Generally following steps are followed in 3D printing. I. 3D Modelling II. Slicing Operation III.

Fundamentals Of Cyber-Security

Image
  Introduction The internet is home to the biggest information sharing network ever created with billions of devices that communicate across the globe. In developed economies, the average person now owns multiple devices, which are essential to most aspects of daily life. In this digital landscape, everyone is susceptible to getting hacked. Cyber-attacks impact large technology companies, financial institutions, media organizations, dating websites, political parties, small companies, and individuals just like us. Cyber-security is important because of the unprecedented amounts of data that we as individuals and organizations collect, store, and process on our electronic devices. As the volume and sophistication of cyber attacks grow, we are all tasked with safeguarding this information. Think about what we need to protect now and in our future! What is cyber Security? cybersecurity is the practice of protecting and recovering networks, devices, and programs for many type of mali