DISCLAIMER - NIKZAFRI.BLOGSPOT.COM


Today, Knowledge Management today are not limited merely to : (A) 'knowing' or 'reading lots of books/scholarly articles' or (B) data mining, analysis, decision making, preventive actions, or (C) some Human Resources Management issue or (D) some ICT issue. Knowledge Management is about putting your knowledge, skills and competency into practice and most important IT WORKS! For you and your company or your business (Nik Zafri) Can I still offer consultancy or training? Who claims otherwise? Absolutely, I can.

The information comprised in this section is not, nor is it held out to be, a solicitation of any person to take any form of investment decision. The content of the nikzafri.blogspot.com does not constitute advice or a recommendation by nikzafri.blogspot.com and should not be relied upon in making (or refraining from making) any decision relating to investments or any other matter. You should consult your own independent financial adviser and obtain professional advice before exercising any investment decisions or choices based on information featured in this nikzafri.blogspot.com can not be held liable or responsible in any way for any opinions, suggestions, recommendations or comments made by any of the contributors to the various columns on nikzafri.blogspot.com nor do opinions of contributors necessarily reflect those of http://www. nikzafri.blogspot.com

In no event shall nikzafri.blogspot.com be liable for any damages whatsoever, including, without limitation, direct, special, indirect, consequential, or incidental damages, or damages for lost profits, loss of revenue, or loss of use, arising out of or related to the nikzafri.blogspot.com or the information contained in it, whether such damages arise in contract, negligence, tort, under statute, in equity, at law or otherwise.


MY EMPLOYERS AND CLIENTELLES



BIODATA - NIK ZAFRI


 



NIK ZAFRI BIN ABDUL MAJID,
CONSULTANT/TRAINER
Email: nikzafri@yahoo.com, nikzafri@gmail.com
https://nikzafri.wixsite.com/nikzafri

Kelantanese, Alumni of Sultan Ismail College Kelantan (SICA), IT Competency Cert, Certified Written English Professional US. Has participated in many seminars/conferences (local/ international) in the capacity of trainer/lecturer and participant.

Affiliations :- Network Member of Gerson Lehrman Group, Institute of Quality Malaysia, Auditor ISO 9000 IRCAUK, Auditor OHSMS (SIRIM and STS) /EMS ISO 14000 and Construction Quality Assessment System CONQUAS, CIDB (Now BCA) Singapore),

* Possesses almost 30 years of experience/hands-on in the multi-modern management & technical disciplines (systems & methodologies) such as Knowledge Management (Hi-Impact Management/ICT Solutions), Quality (TQM/ISO), Safety Health Environment, Civil & Building (Construction), Manufacturing, Motivation & Team Building, HR, Marketing/Branding, Business Process Reengineering, Economy/Stock Market, Contracts/Project Management, Finance & Banking, etc. He was employed to international bluechips involving in national/international megaprojects such as Balfour Beatty Construction/Knight Piesold & Partners UK, MMI Insurance Group Australia, Hazama Corporation (Hazamagumi) Japan (with Mitsubishi Corporation, JA Jones US, MMCE and Ho-Hup) and Sunway Construction Berhad (The Sunway Group of Companies). Among major projects undertaken : Pergau Hydro Electric Project, KLCC Petronas Twin Towers, LRT Tunnelling, KLIA, Petronas Refineries Melaka, Putrajaya Government Complex, Sistem Lingkaran Lebuhraya Kajang (SILK), Mex Highway, KLIA1, KLIA2 etc. Once serviced SMPD Management Consultants as Associate Consultant cum Lecturer for Diploma in Management, Institute of Supervisory Management UK/SMPD JV. Currently – Associate/Visiting Consultants/Facilitators, Advisors for leading consulting firms (local and international) including project management. To name a few – Noma SWO Consult, Amiosh Resources, Timur West Consultant Sdn. Bhd., TIJ Consultants Group (Malaysia and Singapore) and many others.

* Ex-Resident Weekly Columnist of Utusan Malaysia (1995-1998) and have produced more than 100 articles related to ISO-9000– Management System and Documentation Models, TQM Strategic Management, Occupational Safety and Health (now OHSAS 18000) and Environmental Management Systems ISO 14000. His write-ups/experience has assisted many students/researchers alike in module developments based on competency or academics and completion of many theses. Once commended by the then Chief Secretary to the Government of Malaysia for his diligence in promoting and training the civil services (government sector) based on “Total Quality Management and Quality Management System ISO-9000 in Malaysian Civil Service – Paradigm Shift Scalar for Assessment System”

Among Nik Zafri’s clients : Adabi Consumer Industries Sdn. Bhd, (MRP II, Accounts/Credit Control) The HQ of Royal Customs and Excise Malaysia (ISO 9000), Veterinary Services Dept. Negeri Sembilan (ISO 9000), The Institution of Engineers Malaysia (Aspects of Project Management – KLCC construction), Corporate HQ of RHB (Peter Drucker's MBO/KRA), NEC Semiconductor - Klang Selangor (Productivity Management), Prime Minister’s Department Malaysia (ISO 9000), State Secretarial Office Negeri Sembilan (ISO 9000), Hidrological Department KL (ISO 9000), Asahi Kluang Johor(System Audit, Management/Supervisory Development), Tunku Mahmood (2) Primary School Kluang Johor (ISO 9000), Consortium PANZANA (HSSE 3rd Party Audit), Lecturer for Information Technology Training Centre (ITTC) – Authorised Training Center (ATC) – University of Technology Malaysia (UTM) Kluang Branch Johor, Kluang General Hospital Johor (Management/Supervision Development, Office Technology/Administration, ISO 9000 & Construction Management), Kahang Timur Secondary School Johor (ISO 9000), Sultan Abdul Jalil Secondary School Kluang Johor (Islamic Motivation and Team Building), Guocera Tiles Industries Kluang Johor (EMS ISO 14000), MNE Construction (M) Sdn. Bhd. Kota Tinggi Johor (ISO 9000 – Construction), UITM Shah Alam Selangor (Knowledge Management/Knowledge Based Economy /TQM), Telesystem Electronics/Digico Cable(ODM/OEM for Astro – ISO 9000), Sungai Long Industries Sdn. Bhd. (Bina Puri Group) - ISO 9000 Construction), Secura Security Printing Sdn. Bhd,(ISO 9000 – Security Printing) ROTOL AMS Bumi Sdn. Bhd & ROTOL Architectural Services Sdn. Bhd. (ROTOL Group) – ISO 9000 –Architecture, Bond M & E (KL) Sdn. Bhd. (ISO 9000 – Construction/M & E), Skyline Telco (M) Sdn. Bhd. (Knowledge Management),Technochase Sdn. Bhd JB (ISO 9000 – Construction), Institut Kefahaman Islam Malaysia (IKIM – ISO 9000 & Internal Audit Refresher), Shinryo/Steamline Consortium (Petronas/OGP Power Co-Generation Plant Melaka – Construction Management and Safety, Health, Environment), Hospital Universiti Kebangsaan Malaysia (Negotiation Skills), Association for Retired Intelligence Operatives of Malaysia (Cyber Security – Arpa/NSFUsenet, Cobit, Till, ISO/IEC ISMS 27000 for Law/Enforcement/Military), T.Yamaichi Corp. (M) Sdn. Bhd. (EMS ISO 14000) LSB Manufacturing Solutions Sdn. Bhd., (Lean Scoreboard (including a full development of System-Software-Application - MSC Malaysia & Six Sigma) PJZ Marine Services Sdn. Bhd., (Safety Management Systems and Internal Audit based on International Marine Organization Standards) UNITAR/UNTEC (Degree in Accountacy – Career Path/Roadmap) Cobrain Holdings Sdn. Bhd.(Managing Construction Safety & Health), Speaker for International Finance & Management Strategy (Closed Conference), Pembinaan Jaya Zira Sdn. Bhd. (ISO 9001:2008-Internal Audit for Construction Industry & Overview of version 2015), Straits Consulting Engineers Sdn. Bhd. (Full Integrated Management System – ISO 9000, OHSAS 18000 (ISO 45000) and EMS ISO 14000 for Civil/Structural/Geotechnical Consulting), Malaysia Management & Science University (MSU – (Managing Business in an Organization), Innoseven Sdn. Bhd. (KVMRT Line 1 MSPR8 – Awareness and Internal Audit (Construction), ISO 9001:2008 and 2015 overview for the Construction Industry), Kemakmuran Sdn. Bhd. (KVMRT Line 1 - Signages/Wayfinding - Project Quality Plan and Construction Method Statement ), Lembaga Tabung Haji - Flood ERP, WNA Consultants - DID/JPS -Flood Risk Assessment and Management Plan - Prelim, Conceptual Design, Interim and Final Report etc., Tunnel Fire Safety - Fire Risk Assessment Report - Design Fire Scenario), Safety, Health and Environmental Management Plans leading construction/property companies/corporations in Malaysia, Timur West Consultant : Business Methodology and System, Information Security Management Systems (ISMS) ISO/IEC 27001:2013 for Majlis Bandaraya Petaling Jaya ISMS/Audit/Risk/ITP Technical Team, MPDT Capital Berhad - ISO 9001: 2015 - Consultancy, Construction, Project Rehabilitation, Desalination (first one in Malaysia to receive certification on trades such as Reverse Osmosis Seawater Desalination and Project Recovery/Rehabilitation)

* Has appeared for 10 consecutive series in “Good Morning Malaysia RTM TV1’ Corporate Talk Segment discussing on ISO 9000/14000 in various industries. For ICT, his inputs garnered from his expertise have successfully led to development of work-process e-enabling systems in the environments of intranet, portal and interactive web design especially for the construction and manufacturing. Some of the end products have won various competitions of innovativeness, quality, continual-improvements and construction industry award at national level. He has also in advisory capacity – involved in development and moderation of websites, portals and e-profiles for mainly corporate and private sectors, public figures etc. He is also one of the recipients for MOSTE Innovation for RFID use in Electronic Toll Collection in Malaysia.

Note :


TO SEE ALL ARTICLES

ON THE"LABEL" SECTION BELOW (RIGHT SIDE COLUMN), YOU CAN CLICK ON ANY TAG - TO READ ALL ARTICLES ACCORDING TO ITS CATEGORY (E.G. LABEL : CONSTRUCTION) OR GO TO THE VERY END OF THIS BLOG AND CLICK "Older Posts"


 

Saturday, December 02, 2023

I DON'T DO NAMES DROPPING

 



I prefer not to mention specific names, but due to the numerous inquiries on this topic, I felt compelled to address it. Indeed, many cousins, 2nd cousins or relatives of mine have connections to various fields such as law, engineering, medical, accountancy, construction, entertainment and project management.

However, I've worked independently to reach my current position and prefer to be recognized for my own achievements. If you're interested in knowing more about my close relatives, I encourage you to reach out to them directly.


Friday, December 01, 2023

DATA PRIVACY, IS IT REALLY SAFE? - NIK ZAFRI



Data Privacy must be the most important topic for the day.

Organization should have a clear policy outlining how they collect, use, store and protect personal information of individual.  Policy; in this context; must be deemed as a legal statement not simply a written policy pasted on the wall. It must be something that inform users about their rights regarding their personal data.

Data Privacy should take into account :

a) Information collected - details on types of data collected from users/customers - such as names, email, addresses, phone numbers, addresses, even birthdays etc. As such any typical CRM system that collects such data MUST BE protected at the front office level or quality assurance level or public relation level (do not overlap one another)

Three examples :

i) if birthdays are revealed to third parties, it may pave to way to corruption. Or;

ii) like what's happening today; phone numbers are being collected by scammers and conners. There are rumours that these information are being sold internally to 3rd parties - what is the top management action on this issue?

iii) How secure is the protection of the collection system? How good is the firewall or other anti-hacking facilities?

b) Purpose of Data Collection - There should be jsutifications of why the data is being collected especially when being asked by users/customers. This can range from processing orders to improving services or marketing purposes.

c) How will the Data be Used - Information on how the collected data will be utilized by the organization.

d) Data Sharing - Disclosure about whether the organization shares user data with third parties and the reasons for doing so.

e) User Rights - Explanation of users' rights regarding their data, such as the right to access, rectify, or delete their information.

f) Data Security Measure - Details about the security measures in place to protect the collected data from unauthorized access or breaches.

g) Contact Information - Information on how users can contact the organization regarding their data privacy concerns or requests.

h) If there is a breach, exposure, or hacking of the collected data, will there be a specific investigation or special enquiry? What penalties might the organization face if found responsible for such a breach?

(Are our strategies for witness protection, anti-corruption, and governance/transparency proving effective?)

Data Privacy Policies are important for transparency and compliance with data protection laws (such as GDPR in Europe or CCPA in California). They help users understand how their personal information is handled and provide them with a level of assurance about its protection.

Thursday, November 30, 2023

DSP # 7 Public-Private Partnerships: Key Component to Creating A Mature Data Ecosystem - (in my view - Nik Zafri)


It was an incredibly enriching and valuable discussion. Both the speaker and moderator were exceptional. The Q&A segment was especially captivating, allowing for a fantastic exchange between myself, the moderator, and the passionate, deeply knowledgeable speaker, Mr. Ivan Mortimer-Schutts, showcasing his extensive experience in the field through thorough and passionate discussions on various topics.

I am particularly interested in the topics such as :

Fostering collaborations between governmental bodies and the public (with universities also playing a significant part) to promote conscientious data sharing involves multiple facets: creating awareness and educating the public. This effort necessitates establishing collaborative structures. Additional factors to consider encompass privacy and security concerns, policy formulation, engagement strategies, feedback mechanisms, ethical frameworks, incentivizing responsible data sharing, addressing challenges, and harnessing expertise to implement responsible data-sharing practices.

I observed the impending necessity for Malaysia to establish a civic society-focused entity dedicated to enhancing awareness regarding data, which would play a pivotal role in promoting responsible data practices. This organization would engage in educational and advocacy efforts, regulatory framework establishment, guideline formulation, governance, fostering data literacy, and providing legal support, especially for marginalized groups. Such an entity has the potential to empower individuals, foster trust, encourage dialogue, wield influence, stimulate economic growth, prevent misuse, and ultimately cultivate a culture of responsibility. However, there is a need for further research into successful models and case studies from other nations to adapt and tailor them to suit the Malaysian context.

Common concerns have also been addressed but suffice it to say, you can refer to this article of mine to know more.

Good job Malaysia Digital Economy Corporation (MDEC), Malaysiakini BM , Digital News Asia and the Government of Malaysia.

PENANG WAREHOUSE COLLAPSE - POSSIBLE CAUSES


(Photo Source : The Star)
The perspectives shared below are to be considered as strictly personal and unofficial opinions concerning the recent Penang Warehouse collapse, which tragically may have resulted in the loss of 4-5 workers' lives. It's a distressing event, especially given the recurrence of such incidents elsewhere in Malaysia. These viewpoints stem from my individual experience and are not intended to sway or impact any ongoing investigations conducted by the authorities in any manner
Beams under construction can collapse due to various reasons, including:
Design Flaws?
Since the project has been going on for quite some time, I do not think it is relevant to the design flaws. Possibly, the original plan or method statement of installation were not being adhered to leading to weak points or inadequate load-bearing capacities in the beams.
Material Deficiencies?
I also feel that it has little relation to substandard or faulty construction material but of course, you can never tell - low-quality steel or concrete can compromise the structural integrity of the beams.
Construction Errors?
Can also be the possible cause where mistakes made during the construction process, like inaccurate measurements, improper installation of reinforcements, or poor welding, can weaken the beams.

Excessive Loads?
Can be another possible cause. Beams may collapse if they're subjected to loads beyond their intended capacity, either due to unexpected heavy weights, construction equipment errors, or overloading (workers, materials or machines placed on the beam) during the construction phase.
Environmental Factors?
It was said that heavy rains are occurring during the time of construction. Extreme weather conditions like strong winds, heavy rains, (possibly ponding areas can also soften the ground) - can stress beams beyond their limits, causing them to fail.
Lack of Maintenance?
I am unsure whether this is the case but insufficient or improper maintenance during the construction phase could lead to deterioration of materials over time, weakening the beams.
Foundation Issues?
This can also be a cause where problems with the foundation or support structures at the said location can compromise the stability of the beams and eventually cause them to collapse.

Human Error?
This is a common problem. Where there is accident, the question of inadequate supervision will always arise. Others can include workers negligence or lack of adherence to safety protocols can contribute to mistakes that lead to beam collapse. All these comes back to supervision - either Safety or Construction.
Understanding these potential causes is crucial in ensuring proper precautions are taken during construction to prevent such collapses and maintain safety standards. Quality control, adherence to building codes, regular inspections, and employing skilled professionals are essential to mitigate these risks.

VISIT TO JABATAN KERJA RAYA WILAYAH PERSEKUTUAN PUTRAJAYA

2:40 PM, 30 NOVEMBER, 2023

As with my previous visits to other JKR locations, I continue to be consistently impressed by the quality of services and information provided. The front office/reception staff is notably resourceful and well-versed in the subject matter, showcasing the professionalism of JKR




Tuesday, November 28, 2023

CORRUPTION AND MONEY LAUNDERING TODAY

 I'd sincerely advise those involved in money laundering or corruption: attempting to outwit authorities is not a viable strategy. Eventually, regardless of your cunning, the risk of being caught is high, leading to severe penalties and imprisonment.


Corruption and money laundering constantly evolve as people find new ways to exploit systems.

Cryptocurrency is one of them. Its decentralized and pseudo-anonymous nature makes it attractive for illicit activities. Criminals are hiding behind cryptocurrencies to launder money by converting it into various cryptocurrencies and moving it through multiple accounts.

The good old trick still lives -  - establishing shell companies and trusts in countries with lax regulations allows individuals to obscure their identities and the origins of funds.

Trade-Based Money Laundering is done by manipulating trade invoices or falsify goods and services to move money across borders without detection.

Another old trick is via real estate where launderers invest illicit funds in high-value real estate, which can be sold later, legitimizing the money.

What is on the rise now are online gaming and gambling. These too are using platforms or sites to launder money by placing bets and cashing out with "clean" money.

The authorities should also look into those providing "the so-called" "professional services" hiding behind legal or accounting firms to legitimize illegal funds through transactions or complex financial structures.

Other which has posed so much risk is what I know as Cyber-Enabled Financial Crimes. Techniques like phishing, ransomware, and hacking can generate illicit funds that are then laundered through various means, including cryptocurrency.


Authorities and financial institutions should continuously adapting their strategies to combat these evolving methods. Technologies like AI and machine learning must be employed to detect patterns and anomalies in financial transactions, aiding in the fight against money laundering and corruption.

Monday, November 27, 2023

CONCERNS ON THE NATIONAL DATA SHARING POLICY




The National Data Sharing Policy may raise several concerns related to privacy, security, and ethical implications. These issues need to be adequately addressed to ensure cooperation and participation from all parties. Among the 7 most significant issues that I've identified are :

1) Privacy Risks - Sharing national data can compromise individual privacy if not handled securely. Sensitive information might be exposed, leading to potential misuse or unauthorized access.

Implementing data sharing is like opening the floodgates to a wide range of potential threats, such as hacking or malware. The more people who have access to the data, the more opportunities there are for unauthorized parties to access it. (Castordoc)

2) Security Breaches - Data sharing introduces the risk of security breaches. If not adequately protected, shared data can fall into the wrong hands, leading to identity theft, fraud, or other malicious activities.

These are all common types of security breach or incidents. For example, a lost laptop, mobile phone, or external hard drive that is unlocked can easily direct to data being stolen if it ends up in the wrong hands. Also, a locked device could be hacked into by a sophisticated attacker (Knowledge Hut)

3) Ethical Considerations - There are ethical dilemmas regarding consent, transparency, and the fair use of shared data. Ensuring data is used responsibly and ethically can be challenging.

Data protection is an ethical issue. It involves respect for individuals and their rights regarding privacy and the use of information about them. External funders, particularly the EU, are seeking increasing levels of assurance with regard to data protection and ethics. (University of Edinburg)

4) Data Accuracy and Quality - Shared data might not always be accurate or up-to-date. This can lead to decisions based on flawed information, impacting policy-making and public services.

There are six main dimensions of data quality: accuracy, completeness, consistency, validity, uniqueness, and timeliness. (Heavy AI)

5) Regulatory Compliance - Complying with various regional or international data protection regulations adds complexity. Different jurisdictions might have conflicting requirements, making it challenging to streamline data sharing processes.

Regulatory data protection (RDP) is an intellectual property right available for a limited duration which protects an innovator's proprietary safety and efficacy data for its innovative product (Merck)

6) Data Monetization and Control - There's a concern about how shared data might be monetized or used for commercial purposes without proper consent or benefit sharing for the individuals whose data is being shared.

With data monetization, personal information is often collected without explicit permission from users. This raises ethical questions about who owns the data and whether individuals have control over how it is used. Another drawback is the risk of data breaches or misuse (The Cable)

7) Public Trust and Perception - Mishandling of data can erode public trust in government institutions or organizations responsible for data sharing, leading to reluctance in participating in future data-sharing initiatives.

Findings suggested that public's trust may not meet the needs of of the policy. There is a majority of the public having lack of trust on the organizations having information and share it on multiple platforms. This requires a new module to gain public trust via knowledge, attitudes, and beliefs to inform policies and practices for data sharing.

Addressing the abovementioned concerns requires robust data protection frameworks, strong encryption, clear policies for consent and usage, regular audits, and a commitment to transparency to maintain trust and safeguard individual rights.

SEJARAH CHAMPA

Pada awalnya saya terlintas untuk menulis kisah Sejarah Champa mengikut kajian saya untuk membidas fiksyen/mitos dan untuk menyokong fakta tetapi tergerak di hati tidak mahu meneruskan hasrat saya. Mungkin di suatu masa yang sesuai kelak.

Kisah Champa ini sebenarnya menarik dan juga satu kisah yang paling rumit serta kompleks untuk diperbincangkan. Kisah Champa juga telah berjaya mengumpulkan ramai penyokong dan ramai penentang (samada penyokong atau penentang yang taksub atau yang waras) menggunakan fakta masing-masing yang dirujuk kepada sumber-sumber yang kaya - malah ada yang membuat kajian (yang pada saya agak lemah sedikit sampelnya) mengenai DNA..

Walaupun saya seorang pengkaji bebas tetapi melihatkan kisah Champa ini telah menimbulkan konflik yang amat besar, maka saya telah membuat keputusan untuk tidak menulis mengenai Champa buat masa ini kerana mungkin akan mendatangkan pergaduhan yang tidak perlu. 

Cuma secara peribadi, saya yakin dengan kebenaran sumber yang saya aa dalam simpanan saya sebagaimana pengkaji dan pengkritik (tidak kira nawaitu mereka) yakin dengan apa yang ditulis oleh mereka.

Cuma saya ingin menyarankan, apa-apa yang kita percaya perlu diuji terlebih dahulu sebelum kita mengambil apa-apa catatan dari sebarang rujukan. Selalulah ambil inisiatif untuk memeriksa sumber kita samada buku atau kitab atau jurnal mahupun sumber dari internet - sekurang-kurangya kita perlu tahu mengenai sumber kita- tahun berapa asalnya ianya ditulis, perbandingannya dengan sumber-sumber lain, siapakah penulis berkenaan dsb.  

Ciri-ciri ini dapat menguatkan hujjah kita dalam perbincangan secara beradab mengikut tradisi ilmu tanpa mencarut dan memaki-maki orang lain atau berkata-kata secara retorik dan tidak jelas atau hanya menjadi "penumpang" atau bercakap untuk mendapat publisiti murahan atau untuk menafikan pendapat orang lain dan hanya kita seorang sahaja yang betul. (Ingatlah kita akan bertanggungjawab di akhirat kelak kerana menulis perkara yang tidak benar atau samar-samar malah menyebabkan kita ikut sama menanggung dosa mereka yang menyokong hal yang tidak benar hasil tulisan kita)

Malah yang terbaik; jika kita mampu, ziarahilah lokasi-lokasi yang terbabit dan kajilah setakat yang kita mampu. 

Kita tidak akan tahu kebenaran sehinggalah tiba masanya kelak. Mungkin masih belum tiba masanya untuk kita mendedahkan hal Champa namun saya tidak menyekat sesiapa sahaja yang ingin menulis atau berbicara mengenai sejarah Champa. Itu hak mereka.

Kita tidak akan tahu kebenaran sehinggalah tiba masanya kelak. Mungkin masih belum tiba masanya untuk kita mendedahkan hal Champa namun saya tidak menyekat sesiapa sahaja yang ingin menulis mengenai sejarah Champa.

Sekadar memberikan pendapat.

THE TRUTH ABOUT HUMAN MICROCHIP IMPLANTS - A brief research by Nik Zafri

Microchip implants in humans do exist and no longer an element of science fiction. It serve various purposes, though they're not widespread and their use is often debated. 




(Photosource : ABC News)

1) Medical Information - Implants can carry a person's medical history, allergies, or other vital health information. In emergencies, this data can be accessed by medical professionals to provide appropriate care, especially if the person is unconscious or unable to communicate.


2) Identification and Access Control - They can act as a form of identification or access control, similar to keycards or passwords. For instance, they can be used to unlock doors, log into computers, or make payments.


3) Tracking and Location Services - Some argue for implants to track individuals for safety or security reasons. For example, they might be used to locate missing persons or monitor the movements of individuals in sensitive or high-risk environments.


4) Convenience - In some cases, people advocate for implants to simplify tasks, such as making payments, storing personal data, or replacing traditional forms of identification.


5) Experimental Applications -  Researchers explore potential future uses, such as enhancing human capabilities, integrating technology with biology, or even assisting in cognitive functions.


However, concerns regarding privacy, security, and ethical implications surround the use of microchip implants in humans. There are debates about consent, data protection, and the potential for abuse or unauthorized access to personal information.


As of now, the use of microchip implants in humans is not widespread, and regulations regarding their application and usage vary across different regions.

Saturday, November 18, 2023

3D PRINTED HOUSE

3D printed house is its making way into the construction industry even in Malaysia as I speak. It's going to be a great catalyst to house and building construction technology. Imagine a stable and cost-effective structure built using 3D printing technology.

Instead of traditional construction methods like bricklaying or using pre-made materials, these houses are constructed layer by layer using a large 3D printer.

The printer typically uses materials like concrete, plastics, or other composite materials to create the layers, gradually building up the entire structure.

The process offers several potential advantages, including reduced construction time, lower costs, and the ability to create more complex architectural designs.

Additionally, it can be more environmentally friendly by minimizing waste and utilizing sustainable materials. As the technology continues to evolve, 3D printed houses have the potential to revolutionize the construction industry by providing affordable and customizable housing solutions.