Do you want to explore the world of technology and its advancements? Want to explore the world's new trends in social networking or the latest defense mechanisms? Well, this wikia is for you. This wikia will tickle your fantasies as we will explore technology regarding culture and defense. Yep I will be exploring the terrains of the Evolution of Technology.
Main Topics Edit
History of Social Networking Edit
What’s your first memory of social media? Facebook, perhaps? Or maybe Instagram? If you’re of a certain age, you’ll likely remember when MySpace was very much numero uno amongst all social platforms.
Roll the years back a little further, and you could have been one of the few who were amongst the pioneers of modern social networking on Friendster. But here’s the thing the history of social media actually goes back a lot further, and its roots can be found in blogging, Google, AOL, ICQ etc. Long before it became the most popular commercialized mass information and entertainment medium it is today, long before it was accessible to the general public, and certainly many years before Al Gore claimed he “took the initiative in creating” it, the Internet – and its predecessors – were a focal point for social interactivity. Granted, computer networking was initially envisioned in the heyday of The Beatles as a military-centric command and control scheme. But as it expanded beyond just a privileged few hubs and nodes, so too did the idea that connected computers might also make a great forum for discussing mutual topics of interest, and perhaps even meeting or renewing acquaintances with other humans.
History of Culture Edit
Culture is defined as the characteristics and knowledge of a particular group of people, defined by everything from language, religion, cuisine, social habits, music and arts. First time, culture was what children learned from their family or people they interact with on a daily but with the dawn of the electronic devices and internet everything has changed.Since the internet and other media have been adopted and integrated into the daily lives of an increasing number of people in Western countries, scholars and commentators are debating the impact of these new media on the activities, social relationships, and worldviews. Controversies about whether technology shapes values, attitudes, and patterns of social behavior are not new. In the recent past, the rapid expansion of television stimulated similar discussions of its cultural and social effects.
History of Internet Security Edit
The information security industry has evolved through a complete cycle of innovation and stagnation over years, such as, firewalls, intrusion detection systems, vulnerability assessment tools, managed security services and many others. Still, there are forces at work that are inhibiting the current wave of security innovation that we must pay attention to and keep under control.
The 1970s was a time frame in information security history largely untouched by digital calamity, but marked more so by the exploration of emerging telecommunications technology. The first modern day hackers appeared as they attempted to circumvent the system and make free phone calls, a practice that became known as "phreaking." Perhaps the most publicly well know phreaker was John Draper, a.k.a. Captain Crunch, who helped pioneer the practice. Draper was later arrested and convicted on charges related to his nefarious phreaking activities multiple times.
The 1980s saw the birth of computer clubs. This decade subsequently ushered in the era of malware, marking the first virus, named "Brain", in 1986 as well as the infamous Morris Worm in 1988., The Computer Fraud and Abuse Act was instituted in 1986 and for the first time, a computer hacker, Kevin Poulsen, was featured on America's Most Wanted. Poulsen was finally arrested in 1991, after spending several years as a fugitive. Since his release from prison, however, he has reinvented himself as a journalist and at one point, regularly wrote for the online computer security news portal SecurityFocus, which was purchased by Symantec in 2002.
The 1990's brought with it the dawn of the modern information security industry. Notable threats witnessed during this decade included the Michelangelo virus, Melissa, and Concept. Distributed denial of service attacks and the bots that made them possible were also born, such as Trin00, Tribal Flood network and Stacheldracht. Beyond malware, AOL suffered through the first real phishing attacks as fraudsters aimed their efforts at stealing users' credentials. Privacy watchdogs called out in concern as tracking cookies were born, allowing ad networks to monitor user surfing behaviors in a rudimentary fashion.
The first decade of the 21st Century saw malicious Internet activity turn into a major criminal enterprise aimed at monetary gain. Adware and spyware entered the scene with such programs as Conducent TimeSink, Aureate/Radiate and Comet Cursor.Perhaps even more visible than adware and spyware, aggressively self-propagating malware also appeared. Big name threats such as Code Red, Nimda, Welchia, Slammer and Conficker all began taking advantage of unpatched machines. Phishing attacks also became mainstream; first heavily targeting online banking then moving onto social networking sites. Zero day attacks, rootkits, rogue antispyware, SPIM, clickfraud and other attacks also all made their mainstream debut in the current decade.
Family Security Edit
Everybody wants to know that when they go home they don't have anything to worry about such as their families' safety, or any appliances or furniture. Security is a very important aspect of our everyday lives, especially family security. Family security has been improving in every era. Home security systems range from a simple setup with a few cameras to a full, sophisticated setup with motion sensors for doors and windows, multiple camera configurations, smoke, water and fire detection alerts, and smartphone-enabled controls allowing home owners to turn the system on and off from miles away or even watch live video feeds.There's a lot of technology that goes into even the most basic security systems, all designed to improve the safety of you and your family.
Wireless Technology Adds Flexibility
It used to be so expensive to install a home security system that it wasn’t a realistic option for the average family. That’s because the earlier security systems had to be hard-wired, limiting the locations where equipment could be placed and requiring significant re-wiring in some cases. The cost of having a qualified installer spend the time required to get these systems installed properly led to high costs.
Now, wireless technology isn’t just an option for home security – it’s becoming the norm. It’s simply an easier installation and adds more flexibility to the system as a whole, allowing home owners to relocate cameras to different areas at any time without a serious reconfiguration.
Steps in Business Security Edit
Your current security level Edit
Take an inventory of the security features your network already has. This list will help identify gaps in your current protection methods.
- Does it offer firewalls, a virtual private network, intrusion prevention, virus protection, a secured wireless network, anomaly detection, and identity management and compliance validation?
- Do these features communicate with one another?
Your assets Edit
Make a "laundry list" of your assets to determine how many levels, or layers, of protection your system needs.
- Within your particular business, what assets are the most critical to your success?
- Is protecting your internal information most important; your customers' information; or both?
- How much are these assets worth?
- Where do these assets reside within you system?
Information transfer Edit
Assess how information is shared inside and outside of your company.
- Do your employees need quick access to internal information in order to do their jobs?
- Do you share data outside the four walls of your business?
- How do you control who has access to this information?
- Do you provide varying levels of access to different network users?
Plans for growth Edit
Is your company planning on adding advanced features to your system? How adaptable and flexible will your system need to be? Your security solution should be able to accommodate increased network traffic or advanced applications without disrupting service.
Risk assessment Edit
Determine if the consequences of a security breach extend beyond lost productivity or an interruption in service.
- How regulated is your business environment?
- What are the risks of non-compliance?
- How much downtime can your business tolerate before financial or reputation losses accrue?
Ease of use Edit
The best security technology will do you no good if it can't easily be installed or used. Make sure you have the resources to manage the system you install.
Evolution of Air Defense Edit
Well my folks, when we think of air defense, we think of missiles !!!!!!!!! BUT a world existed before this and let us traverse THE WORLD OF AIR FORCE TECHNOLOGY THROUGH THE CENTURIES.Let 's go !!!!!!!!!!!!!!!!!!!!!!!!!!!!The military funding of science has had a powerful transformative effect on the practice and products of scientific research since the early 20th century. Particularly since World War I, advanced science-based technologies have been viewed as essential elements of a successful military.
7 Technologies That Transformed Warfare
Nuclear bombs are humankind's most destructive weapons. These warheads draw their destructive force from nuclear reactions, which release enormous amounts of explosive energy. The world's first nuclear weapons, or atomic bombs, were developed by physicists working on the Manhattan Project during World War II.
The Manhattan Project, which began in 1939, has become one of the most well-known secret research programs. The first nuclear bomb was detonated on July 16, 1945, during the so-called Trinity test at the Alamogordo Air Base in New Mexico. The explosion created a massive mushroom cloud, and the bomb's explosive power was equivalent of more than 15,000 tons of TNT.
In August 1945, two atomic bombs were dropped on Hiroshima and Nagasaki in Japan. The bombings effectively ended World War II, but ushered in decades of global fear of nuclear annihilation. To date, the bombings of Hiroshima and Nagasaki remain the only uses of nuclear weapons in war.
Submarines revolutionized naval warfare by introducing underwater vessels capable of attacking enemy ships. The first successful submarine attack on a warship occurred during the American Civil War, which lasted from 1861 to 1865. In February 1864, the Confederate submarine CSS H.L. Hunley sank the USS Housatonic in the waters off South Carolina.
Today, the military uses submarines to carry missiles, conduct reconnaissance, support land attacks, and establish blockades.
Space weapons include a range of warheads that can attack targets on Earth from space, intercept and disable missiles traveling through space, or destroy space systems or satellites in orbit. During the Cold War, the U.S. and the former Soviet Union both developed space weapons, as political tensions escalated.
While the militarization of space remains controversial, the U.S., Russia and China have developed anti-satellite weapons. Several test firings of these warheads have been successful in destroying satellites in orbit, including a 2007 Chinese anti-satellite missile test that destroyed one of the country's defunct weather satellites.
Stealth aircraft, as their name suggests, help pilots evade detection in the sky. While planes cannot be completely invisible to radar detection, stealth planes use a range of advanced technologies to reduce the aircraft's reflection, radio frequency spectrum, and radar and infrared emissions. Stealth technology increases the odds of a successful attack, since enemies have a harder time finding, tracking and defending against these aircraft.
The development of stealth technology likely began in Germany during World War II, but some of the most well-known modern examples of American stealth aircraft include the F-35 Lightning II, the F-22 Raptor and the B-2 Spirit.