Let me explain each box mentioned above
The ultimate goal of AI would be
- Thinking humanly
- Thinking rationally
- Acting humanly
- Acting rationally
Today, more devices are connected to the Internet than people. Cisco has predicted that 50 billion devices will be connected to the Internet by 2020 that's five times the expected population. The IoT helps these devices to connect to each other automatically, so the security issues also arise accordingly. We can take some simple steps to safeguard our self.
Bit by bit directions to offer security to IoT based systems
We should begin with the adsl/routers/switch/UTM: The routers/switch is said to be the 'front way' to your smart home, and this is what you need to check first. So it is urged to place assets into a firewall or UTM that goes with a more significant level of security, as standard.
Make a discretionary or guest user/group: You can make various frameworks on your Wi - Fi router/switch. Make frameworks with parental controls for kids, guest frameworks with potential controls, or guest frameworks for visitors. You can make additional frameworks at whatever point required. By doing this, one can shield potential crooked software engineers from finding a workable access, shared records, and diverse miscellaneous items from various contraptions.
Check your IoT contraptions' settings and keep them revived: Your IoT device undoubtedly goes with default settings and you may change them at whatever point required.
Enable two-factor approval: Two-factor check is an additional security layer over a contraption mystery express that requires discretionary affirmation. It is a one-time code sent by methods for email or SMS before find a workable access.
Stop UPnP features: IoT devices will by and large have Universal Plug in and Play (UPnP) features, enabling different devices to find and interface with one another. This may support aggressors who wants to get unauthorized access.
A step-by-step example is given below:1. #!/bin/bash2. set -euo pipefail3. IFS=$’\n\t’4. #Written By Arvind GK5. #Part 2 : To backup Second VM Disk6. This File name backup-vm-1st-disk.sh7. DOMAIN=”$1”8. UUID=$(sudo virsh dumpxml $DOMAIN | grep uuid | cut -d”>” -f2 | cut -d”<” -f1)9.10. DISK_LOCATION=$(sudo virsh domblklist “$DOMAIN” | grep hda | tr -s “ “ | cut -d” “ -f2-)11.12. DISK_LOCATION1=$(sudo virsh domblklist “$DOMAIN” | grep hdb| tr -s “ “ | cut -d” “ -f2-)13.14. # Export Borg encryption key , You can also modify this to using public and private key. Here I have user simple passphrase as example.15. export BORG_PASSPHRASE=”1234”16.17. # Export the rate-limited remote shell18. #export BORG_RSH=”/usr/local/bin/pv-wrapper ssh”19.20. Create the snapshot to a temp file on the Linux drive21.22. sudo virsh snapshot-create-as --domain $DOMAIN \23.24. tempsnap “Temporary snapshot used while backing up $DOMAIN” \ --disk-only --diskspec $DISK_LOCATION,file=”/img/$DOMAIN-tempsnap.qcow2” \ --atomic25.26. Commit the changes that took place in the Windows drive while27. Sync the virsh metadata with reality by deleting the metadata28. external image right now but that is not implemented yet)29.30. sudo virsh snapshot-delete “$DOMAIN” tempsnap --metadata31.32. (they have already been merged back into the original image) sudo rm -f “/img/$DOMAIN-tempsnap.qcow2” sudo rm -f “$DISK_LOCATION1”33.34. fi35. }36.37. Stupid hack: make a list of all the files we *don’t* want to save so we can exclude them from the backup38.39. find $(dirname “$DISK_LOCATION”) ! -type d ! -wholename “$DISK_LOCATION” | awk ‘{print “sh:” $0;}’ > iso-exclusions40. the --read-special flag tells borg to follow the symlink & read the block device directly41.42. Remove the temp file for the exclusions rm iso-exclusions || /bin/true43. if it already succeeded and this ensures all guest disk access is on44. Prune the backups on the server that are older than a certain date echo “Pruning old backups”45. borg prune -v --list /backup --prefix “$DOMAIN-” --keep-within=1m & wait || /bin/true46. echo “Done”
I was working for a Chemical Company, we had a boss, He was nothing less than a joke.
This is what happened once...
The storage system needed additional Storage, the Boss came and said we need to buy additional HDD, as usual, we found the best fit and said: "buy the same HDD model and specification for compatibility with the existing set of disks ie 350MB *6, 5500RPM ".
The Boss came back, after a few days and said, I have got a good deal on the HDD purchase and said, "I have purchased 1TB, 7500RPM *6, see how smart and intelligent I am, you guys should learn from me".
We said : "WoW, Boss you are smart, you got a super deal", but we were laughing our butts off.
Later the IBM storage engineer came to fix the new HDD and said: I can't use this HDD, it won't work here, Boss was perplexed and was very angry with the IBM engineer.. and started shouting at him, The engineer left the place and said please talk to my office on how to fix this HDD.
The technical issues is when you have a RAID storage system in place all the HDD has to be with the same specification for the system to function and this was not known to our him. The HDD was an expensive one and could not be used anywhere else, Now he had to give an explanation to the management why he spent Rs.3.5L for the HDD when it was not needed.
This is what happens when you think you are smart but in reality, you are dumb
This is a real story from my career