NASA has launched an important mission to study Europa, one of Jupiter’s moons. The launch took place from Cape Canaveral in Florida on October 14. The spacecraft is expected to reach its destination by the early 2030s, traveling approximately 8 billion miles. Regular scientific research is anticipated to begin by 2031.
Dr. Nozair Khawaja is part of the Europa Clipper mission research team. He is also involved in Japan’s “Destiny Plus” mission. Originally from the Punjab province of Pakistan, Dr. Khawaja has previously worked on several space missions for the European Space Agency and NASA. Saadeqa Khan has conducted an exclusive interview with Dr. Nozair Khawaja to discuss the goals and significance of this mission.
What are the main objectives of the Europa Clipper mission?
According to Nozair Khawaja, the primary purpose of the Europa Clipper mission is to assess the habitability of Europa, one of Jupiter’s moons. He outlined three additional key scientific objectives of the mission.
Firstly, the mission aims to determine the thickness of Europa’s ice sheet and how it interacts with the underlying ocean. Secondly, researchers intend to gather data on the composition of Europa’s oceans and its mantle— the third objective focuses on evaluating the features of Europa’s surface geology.
Dr Khwaja said that the mission is all about the in-depth study of Europa, and will enhance scientists’ understanding of potential life-sustaining environments on other celestial bodies beyond Earth. He also clarified that while the media worldwide often suggests that the Europa Clipper spacecraft will search for signs of “alien life,” finding such signs is merely a secondary objective. The mission may instead focus on exploring Europa’s oceans for the necessary ingredients for life.
What is Dr Khwaja’s role in the mission?
Dr Nozair Khawaja spoke about the design process of a space mission, stating that all experts, researchers, and scientists involved in the project are commissioned to contribute. Dr. Khawaja is directly involved in this mission as a team member of “SUDA”, a specialized instrument onboard installed in the spacecraft for in-depth research.
He further explained that the team will analyze data from the Europa Clipper instrument to determine the composition of the sub-surface ocean on icy Europa— this device aims to identify components essential for life, known as biosignatures.
Does Europa have twice as much water in its oceans as Earth?
In 1997, the Galileo mission was launched to explore Jupiter’s moon Europa, which conducted 12 flybys and identified an ocean hidden beneath its icy surface. Europa’s ocean is estimated to be between 40 and 100 miles deep, making it about 16 times deeper than Earth’s oceans.
Dr Khawaja said that the sea salt water on Europa exists in a liquid state beneath a thick layer of ice, which is estimated to be 10 to 15 miles thick. Several hypotheses are proposed about the amount of water in Europa’s oceans. These hypotheses were based on critical data collected from the Galileo mission. Europa’s ocean may contain twice the total volume of water found on Earth. However, conclusive results will only emerge once the Europa spacecraft arrives and transmits vital information using advanced instruments.
Scientists have long been fascinated by Europa, one of Jupiter’s moons. Dr. Nozair Khawaja told Deutsche Welle that the Europa Clipper spacecraft, which is set to launch in October 2024, will be the largest spacecraft ever sent to study a planet. It will be equipped with nine advanced scientific instruments.
Dr. Khawaja explains that Europa is subjected to powerful gravitational forces from Jupiter as it orbits the planet. This gravitational interaction causes Europa’s icy outer shell and its mantle to flex and contract, leading to heat up Europa’s inner surface. This heat is essential because it helps maintain the ocean beneath the ice sheet in a liquid state.
According to Dr. Nozeer Khawaja, Europa’s interior is likely composed of silicate rocks, while its crust is made up of saltwater and ice. Just as microscopic life on Earth originated from chemical interactions between seawater and rocks, similar interactions may occur in Europa’s icy seas.
What scientific investigations will the Europa Clipper spacecraft carry out?
Dr Nozair Khawaja explained that the Europa Clipper spacecraft has nine instruments onboard. Some of these instruments are designed for remote sensing, which will help determine the thickness of the ice layer covering its oceans and the salinity of water. Europa’s salty ocean generates a secondary magnetic field that affects both the direction and strength of Jupiter’s magnetic field. Europa Clipper is equipped with instruments to monitor these changes.
Dr Khawaja emphasized that the Europa Clipper mission is particularly intriguing. Jupiter’s atmosphere is quite harsh due to radiation, making it challenging to collect data. Therefore, a flyby mission has been developed to conduct 50 flybys near Europa without entering its orbit.
According to Dr Khwaja, meteorites fall to Earth, although many are blocked by the planet’s upper atmosphere, but the situation is different in Europa. When a meteorite impacts its surface, material from Europa is propelled several kilometers into the air in the form of micrometer-sized particles. Instruments such as SUDA and mass spectrometers onboard can collect these particles. The data obtained will provide insights into the composition of Europa’s surface.
Dr Khwaja explains that this information will help determine whether the surface compositions are unique to Europa or are in contact with its icy oceans. Ultimately, only by analyzing this data will we be able to draw definitive conclusions about Europa’s habitability.
Note: The article was originally published in DW Urdu and re-published with permission of the publication and author.
The cosmetic sector is no exception in today’s world, where each industry strives hard to achieve eco-friendly sustainable alternatives. One latest trend gaining momentum concerning skincare is the use of enzymes which are natural biocatalysts, offering a gentler approach to beauty routines. Today several enzymes are used in skin care products having benefits like deep cleansing, anti-aging, exfoliation, moisturizing, and antioxidant effects.
Exfoliation has traditionally relied on abrasive approaches, such as the use of extremely harsh chemicals (acidic formulas with less than pH 5) and mechanical methods (microbead facial scrubs, abrasive sponges, and crushed apricot kernels). Exfoliation is one of the most important steps in most popular skincare routines (Korean 10-step skincare routine), and it involves the removal of dead skin cells to achieve a smoother and more vibrant complexion.
Enzymatic peels are becoming a favorite due to their mild and efficient method. Enzymes target dead cells that aid in maintaining the skin’s microbiome, leading to healthier skin. Moreover, there is a growing trend of formulating enzyme-based products to complement other natural ingredients; thereby, amplifying their skin-rejuvenating benefits [1].
Different enzymes are used for exfoliation because they effectively break down protein in dead skin cells. Papain (from papaya), bromelain (from pineapple), and ficain (from fig tree) are highly specific in their action and target only unwanted cells, leaving healthy surrounding tissues untouched. This property makes them suitable for sensitive skin and conditions like hyperpigmentation, acne, and rough scars. Beyond exfoliation, enzymes are finding their application.
Diacylglycerol acetyltransferase-1 enzyme increases the effectiveness of retinoic acid and improves the skin’s appearance. It has Vitamin A that promotes the skin’s normal process of generating new skin cells and shedding old ones. This lessens the wrinkles and helps to smooth the skin. By enhancing the effect of retinoic acid DGAT-1 helps make skin appear younger and fresher and makes it beneficial in skin care products.
“In all things of nature there is something of the marvelous” – Aristotle
Enzymes Lysyl hydroxylase and Prolyl hydroxylase help produce collagen, a protein that maintains the skin’s strength and firmness. Collagen supports the skin elasticity and firmness by acting as a scaffold. These two enzymes contribute to developing strong collagen by adding special chemical groups to the amino acids lysine and proline in the collagen structure. This makes the collagen fibers solid and prevents wrinkles and skin drooping. These enzymes work together with Vitamin C and enable them to function properly. When Vitamin C levels are low the body produces less collagen which weakens the skin and increases the chance of wrinkles [2].
Harnessing the power of fruits, honey, and botanicals for a radiant complexion
That’s why many anti-aging products include Vitamin C and ingredients that boost collagen to make skin active and fresh. The peroxidases include Horseradish peroxidase and Lactoperoxidase are other classes of enzymes crucial to the cosmetics industry. They employ to preserve the freshness of skincare products although they have no direct effect on the skin. Bacteria cannot survive in the product where the peroxidases have consumed the oxygen.
These enzymes keep the chemicals in skincare products from degrading and losing their efficacy without oxygen. By doing this the products last longer without using artificial preservatives which many consumers want to avoid. Peroxidases are particularly helpful in natural skincare products since they offer a natural means to preserve and ensure the product’s continued safety and efficacy.
Additionally, they help to prevent the oxidation of sensitive ingredients like vitamins and antioxidants extending the shelf life and ensuring optimal performance. The application of these enzymes reflects the continued trend to use natural and biologically active chemicals to improve product performance and satisfy customers for safe, eco-friendly, and scientifically advanced skin care products [3].
The potential for these bioactive compounds is expected to expand as research into enzymatic function advances possibly offering even more precise and potent skincare solutions.
“Nature gives you the face you have at twenty, it is up to you to merit the face you have at fifty” – Coco Chanel
REFERENCES:
Gonçalves S. Use of enzymes in cosmetics: proposed enzymatic peel procedure. Cos Active J. 2021;1:27-33. https://cosmethicallyactive.com/wp-content/uploads/2021/11/Use-of-enzymes-in-cosmetics-proposed-enzymatic-peel-procedure.pdf
Gorres, K. L., & Raines, R. T. (2010). Prolyl 4-hydroxylase. Critical Reviews in Biochemistry and Molecular Biology, 45(2), 106-124
Okereke JN, Udebuani AC, Ezeji EU, Obasi KO, Nnoli MC. Possible Health Implications Associated with Cosmetics: A Review. Sci J Public Health. 2015;3(5):58. https://doi. Org/10.11648/j.sjph.s.2015030501.21.
Jørgensen C. Cosmetics worldwide – same contents? A comparative study. Copenhagen, Denmark: The Danish Consumer Council THINK Chemicals; 2020.
Gonçalves S, Gaivão I. Natural Ingredients Common in the Trás-os-Montes Region (Portugal) for Use in the Cosmetic Industry: A Review about Chemical Composition and Antigenotoxic Properties. Molecules. 2021;26(17):5255. https://doi.org/10.3390/molecules26175255.
Izquierdo-Vega JA, Morales-González JA, SánchezGutiérrez M, Betanzos-Cabrera G, Sosa-Delgado S, SumayaMartínez M, et al. Evidence of Some Natural Products with Antigenotoxic Effects. Part 1: Fruits and Polysaccharides. Nutrients. 2017;9(2):102. https://doi.org/10.3390/
Kede MPV, Sabatovich O. Dermatologia estética. Dermatol Estética 2004. 771–771 p.
Kanitakis J. Anatomy, histology and immunohistochemistry of normal human skin. Eur J Dermatol. 2002;12(4):390–9; quiz 400–1.
Gensler, H., & Magdaleno, S. (2015). DGAT1, Retinoic Acid, and Skin Cell Regeneration. Cosmetic Dermatology Journal.
Note: Dr. Ruqyya Khalid (Assistant Professor, Department of Biochemistry, Kinnaird College for Women, Lahore) is the main author of this article. Fatima Farhan and Moman Mumtaz are co-authors.
The internationally renowned “EMU Radio Galaxy Zoo” citizen science project has now expanded its reach to three new languages: Urdu, Chinese, and Greek. This initiative aims to allow non-English speaking citizen scientists worldwide to participate in the project, helping to identify and research galaxies and celestial objects using advanced radio data.
EMU RGZ is an international collaboration of radio astronomers and science educators led by Eleni Verdoulaki from Greece’s IAASARS National Observatory of Athens and Hongming Tang from China’s Tsinghua University.
EMU (Evolutionary Map of the Universe) is a large-scale astronomical survey that utilizes cutting-edge radio data, to understand the structure of galaxies and the universe. With this expansion, Urdu, Chinese, and Greek speakers can join the global research effort and contribute to significant scientific discoveries.
Project Scientist Syed Faisal ur Rahman, a member of EMU RGZ collaboration from Pakistan and is affiliated with LUMS as a Resident Scientist, provided the Urdu translation for the project. Dr Faisal ur Rehman is Scientia’s advisory board member and often writes for the magazine.
“I strongly encourage our educational institutions, particularly universities, and schools, to motivate students to join this unique citizen science project. It will not only ignite their interest in science and astronomy but, also, introduce them to large-scale international astronomy initiatives. Projects like these are highly beneficial for nurturing scientific curiosity and enhancing students’ understanding of complex scientific concepts, preparing them for future scientific achievements.“
This project provides a unique platform for citizen scientists to coordinate in international scientific research, allowing them to directly engage in advanced scientific analysis and discovery.
About EMU Radio Galaxy Zoo
Radio Galaxy Zoo EMU, is the newest in a series of citizen science projects to study galaxies with strong radio emission. Since 2013, it has been working with over 12,000 citizen scientists to learn about fascinating celestial objects and to dive deep into some of the most interesting ones.
RGZ EMU uses images from the new Evolutionary Map of the Universe survey, which started in December 2022 on the Australian SKA Pathfinder (ASKAP) telescope array. Eventually, it will detect over 40 million objects, so there’s a lot of work to do!
Dissecting the fundamentals of new technologies, and their implications, is one of the important needs of society, the general public; for further association, exploration, and being a part of the user base, as Mr. Boone Bergsma mentions the phrase, “Technology doesn’t wait for anyone”, while talking to us, in his recent conversation, where he helps us to decipher and highlighting the developments, and applications that the “Blockchain Technology” brings for the world.
Here are some excerpts from Scientia’s recent conversation with Boone Bergsma. He is the CEO/Founder of Blockchain Laboratories and WeThinkItMatters Inc. Blockchain Laboratories, a Web3 Venture Studio developing Impactful Use Cases of Tokenization and Digital Assets. Boone has led several projects in the past related to blockchain technology; cause-integrated marketing, ESGs, and so on.
Fouz: Hello, Boone Bergsma! Thank you for joining us at “Scientia Pakistan” and accepting our invitation to the interview for our bi-monthly edition of “Blockchain Technology”. We should just get into it. Importantly, firstly please just introduce your work, background, entire venture- “Blockchain Laboratories”-, and the work you guys are doing.
Boone: We started Blockchain Laboratories in April 2021, primarily to be a Web3 Venture Studio and focus on creating real-world tokenization use cases. We were focused on how blockchain and tokenization can be used for social and environmental impact-related use cases.
During the last two years, we have worked on making tokenization easier for small and medium-sized businesses, enterprises, and organizations to adopt. For that, we created a solution that we call W3 SaaS, which stands for “Web3 Software as a Service”. W3 SaaS offers a full suite of tokenization and digital asset management infrastructure. Using W3 SaaS our clients can have all the tools they need to take part in the Web3 era.
Fouz: Sounds, amazing! I think a lot of people are talking about Web3 these days. And, since most of our audience is the general public and people interested in science and technology, let’s discuss the basics. What is Web3? What is Blockchain Technology? In simpler terms, what is tokenization?
Boone: For me, Web3 symbolizes this next generation of the internet. With the earlier Internet, data was stored by centralized parties. Most of the networks and data servers, you know, are usually controlled by one party and if that party happens to have a failure or go out of business or a hack or whatever that might be, everyone’s data is at risk. Also, there could be problems with trust and transparency if one central control over the data. There’s no way to know if things have been changed or what’s happened to that data when you’re not looking.
On the contrary, with blockchain/DLT technology, data is replicated and stored on multiple ledgers. We are talking about storing data on different nodes operated by many different parties that aren’t associated with each other. And tokenization of data makes it immutable, and transparent. Especially, if you’re using public ledgers. To your question, what is tokenization? A token is just a representation of data. It’s a wrapper that goes around something that could be ‘anything’, it could also be a real-world asset like real estate, or it could be a digital asset like an in-game asset.
There are two types of tokens. First, there’s a fungible token, which means all the tokens represent the same thing, which could be carbon credits from the same ecological project. So, all of the tokenized carbon credits from one ecological project, would all, be fungible tokens representing the same issuance. There are non-fungible tokens, NFTs, which represent data of a unique individual item, like a house or car, for example.
Fouz: Great! For the last few years, the cryptocurrency market has been massively booming! Additionally, the NFT market also had some major gains. And everyone was talking about tokens. But, the market seems to be going down lately! How do you see the overall future of Web3 and blockchain? I mean, how do you perceive this?
Boone: I think, everything within the market has cycles. One of the things that drive every industry is regulations. Most industries will not scale at their fullest until there are clear regulations on how that industry can operate.
Additionally, I think, what we’ve seen in the past is, people got excited about Web3 and tokenization. Because of that, it caused markets to climb, and then as we can see, there is a decay of economic conditions worldwide, the rise in the cost of living. The tough circumstances in a lot of places in the world, you’ve got wars going on, all those kinds of things will, will scare people and, depress the markets. So I think that’s kind of what we’re seeing today.
But in my optimistic opinion, I think we are probably a few years away from mass adoption, maybe a little bit more, maybe a little bit less, who knows for sure. But, I think we’re very close to when blockchain and tokenization do become mainstream like other aspects of the internet.
We are going to be driven largely by regulations globally becoming more clear. As the regulations become more clear, we will see a massive adoption worldwide!
Who knows for sure, what the markets will do? But, I estimate the prices that we’re seeing on utility-based tokens of leading DLT networks are probably the lowest. In the future, people will look back and say, “Man, I wish I would have paid more attention and invested”.
Fouz: Exactly, yes! When the technology was in the earlier phases, only a few pioneers and a few people understood what was happening, and what the utility of the tech was. As you mentioned, regulations will become more common. And I think it’s just a matter of time before this becomes mainstream. Related to the work you guys are doing at the Blockchain Laboratories, let’s discuss the ESG use cases.
Boone: ESG stands for Environmental Social Governance; It’s a principle that came out of an earlier kind of “corporate social responsibility” the CSR initiative. The goal was for businesses to analyze how they were doing business and see if there were ways that they could make better choices, whether that’s in manufacturing, supply chain, or even their marketing.
So most of the time consumers will make the buying decisions with their dollars. And generally, consumers over the years have become more concerned with how those dollars will impact the world when they buy a product from a business. In my opinion, ESG is the way for consumers to monitor how businesses are using their profits to make the world a better place.
We all have choices every day where we shop and buy and what companies we support. The way that companies choose or don’t choose to use ESG principles in their business really should be a way that consumers decide on who they want to support and shop with.
Fouz: I have heard a lot about the financial opportunities of blockchain, and about having more real-world applications with this technology. So what types of applications are possibilities?
Boone: Yeah, some of the things that we’re working on at Blockchain Laboratories, is using tokenization and smart contracts and different tools of Web3 for the social impact, and environmental use cases. For example, one of our first clients was a company called Intrinsic Methods.
Intrinsic Methods is a startup, that came from a much older 20-year-old tech company called RootMaker. RootMaker has a scientifically proven patented technology that no matter what tree species you grow in a RootMaker container system, that tree will have a 95% survival rate when it’s planted, and it will grow two to three times faster than the same tree not grown using RootMaker tech.
Intrinsic Methods came to us, and they wanted to create a DLT carbon removal credit registry for reforestation projects that were using RootMaker-certified trees. In this use case, Intrinsic Methods uses NFTs, the non-fungible tokens, to mint decentralized identities (DID) for ecological projects. They’re using NFTs to make the project records permanent and immutable. And all the DMRV (Digital Measuring, Reporting, and Verification) records are also tokenized.
Once the trees have been verified that they’ve been planted on these projects via high-resolution satellite images, the carbon removal credits are issued as fungible tokens. And tokenization of the carbon removal credits brings transparency into the whole lifecycle of the credit history.
Using tokenization and blockchain technology, Intrinsic Methods is helping more landowners and smaller eco projects that would have never been able to take part in the voluntary carbon market because the expenses and barriers to entry are too high for smaller projects.
There’s the other side of things too, another project that we’re working on in the real estate space is a client called DeRE, which stands for Decentralized Reality, and they’re using tokenization to make investing in rental properties more accessible for more people. So right now, most of the time, if you were to try to invest in real estate, you need a lot of money upfront, or just a lot of things have to align for you to be able to get into a real estate investment.
But by using DLT technology and working with DeRE, you can become a fractional owner of rental properties. And for a much lower price point, maybe around a hundred dollars, you can now have partial ownership of a rental property and have a share of rental income and appreciation of the property’s value.
And not to spend too much time, but another example of an in-house venture of Blockchain Laboratories that we’re working on in the real estate industry is called StiffMoney. A lot of people worldwide are paying more money for rent than they would pay for a mortgage if they could qualify for a mortgage, but for some reason or another, they cannot qualify for a mortgage. And so we’re building a platform that’s using crowdfunding principles, and peer-to-peer lending to help people realize the dream of homeownership.
Imagine, you host a crowd-lending campaign to fund buying a house to live in, and 100 or 10,000 or any amount of people could all lend to you in a secure and trustworthy manner. Maybe some of them put in ten dollars, some of them put in thousands, who knows, they could all put in different amounts. In the same way that things like Kickstarter and GoFundMe and other platforms work to crowd-fund different things, we’re building this for the same type of thing for homeownership.
Fouz: You talked about two things: decentralization and regulations. If you could discuss them further. Most experts think that we need stronger regulations. In your opinion, how do you balance these two for your industry? I mean, what should we aim for?
Boone: It’s tough because every country has different priorities and different leadership. And every leader has their own opinions. That’s been one of the reasons for the adoption of DLT and tokenization taking so long. Every industry has good and bad actors, but what has happened though is in tokenization and DLT technology, the media only tried to highlight the bad actors most of the time.
Because a lot of people get their opinions and they make a decision based on what the news tells them instead of doing their research, that I think, a lot of just people were kind of like, well I guess that is what crypto is for. But again, if we go back to what tokenization is, it’s just a better way to store data, in a way that makes it more trustworthy and opens up new ways of moving and transferring value.
I think what is going to happen, the news and media narrative will start to change for the more positive aspects of web3. Not too long ago, Larry Fink, the CEO of BlackRock, one of the world’s largest wealth managers, shared a very pro-tokenization stance. And, they now have one of the largest, fastest-growing tokenized funds. I think that has started to create a little bit more trust in the industry, which was very helpful.
The early days of Web3 were scary for most people because of things that they weren’t used to doing, like having to remember their seed phase for different wallets. People felt somehow something terrible was going to happen and they were going to lose all their money.
What’s happened now is, that the technologies and services built on top of the blockchain have just improved so that now we have things like Multi-Party Computation (MPC) wallets and social logins where now you can come to sites and just use like your Gmail, Twitter, or Facebook account to create a blockchain account and have a smart wallet in the application.
Tokenization is going to be integrated into all the Apps people are already using. One day they’re just going to sign into Twitter or Facebook or Instagram and there’s just going to be a pop-up with new terms and conditions that will say, you now have a wallet, please agree. You’ll click agree and all of a sudden you’ll now plugged into Web3. I think that’s kind of what’s going to spur DLT adoption, in the past you had to make an effort to be part of Web3 but it will be made super easy for you.
In the past, if you wanted to get tokens or use DeFi, you’d have to do your research and figure out how to do it. And now we’re getting to the place where it’s just going to become integrated into all the things that you’re already doing and you won’t even care or know that you’re using tokenization, it will just be part of the internet experience.
Fouz: Well, Since you mentioned the trust part about how Black Rock and I just heard that European MasterCard started having debit cards for cryptocurrencies if I’m not wrong.
Boone: Yes, and PayPal has its own Stablecoin, many legacy brands are integrating web3 services into their businesses now. You are going to see that the transition is starting to happen more and more. And I think just like when the internet kind of had its dot com boom and went from this many users to this many users kind of overnight, that’s where we’re heading in the Web3 era too.
Pretty soon without most people even knowing it, the applications that they’re using today will start adopting blockchain technology and they will just be new terms and conditions and they’ll click the button to agree to, and now they’ll be using Web3.
The prompt development of blockchain technology can transform financial reporting in the banking sector by improving transparency, accuracy, and efficiency.
Pakistan’s banking sector has stepped out in a new era and embrace the novel blockchain technology in financial management. The blockchain is gradually gaining momentum to revolutionize banking operations worldwide. With the promise of advanced security measures, blockchain offers a tamper-proof system for transactions, making it a first-class choice for safeguarding sensitive financial data.
Several leading Banks across the country are exploring this cutting-edge technology to streamline their banking operations and minimizing the risks of fraud simultaneously. 1
Know Your Customer (KYC) Platform
The State Bank of Pakistan has allowed all the commercial banks and other financial institutions to develop a platform for heightened security requisites by introducing electronic Know Your Customer (e-KYC) platform. 2
To address the security requirements, State Bank of Pakistan has officially approved the e-KYC based on blockchain technology which is peculiarly designed to offer heightened privacy and efficiency. 2
This technology (e-KYC) also has the capacity to streamline customer data reducing redundant data verification.
Several renowned Pakistani banks have begun exploring blockchain applications. For example, UBL (United Bank Limited) and HBL (Habib Bank Limited) have shown interest in blockchain solutions for remittances and trade finance on preferable basis.
Cross Border Payments
In view of cross-borders payments, Pakistan is one of the major recipients of remittances from Pakistani community working and living abroad. In this scenario, blockchain technology can help reduce the time as well as the cost involved in processing of payments.
In a recent business report, Pakistan has deployed blockchain technology for the first time in banking sector to divert worker remittances from Malaysia. This initiative has been devised by the Financial Action Task Force (FATF) which might help combat the monetary frauds, money laundering and terror financing.
Moreover, blockchain will be able to document each and every step of the remittance taken by the receiver and the sender. This will help fight the illegal Hawala and Hundi system at the international level.
Convenient Remittances in under-developed areas
Blockchain in banking sector allows them to easily bypass the conventional and traditional financial intermediaries, which further allow faster and cheaper remittances. This helps in the rural and sub-urban areas where the banking infrastructure is less developed.
Banks have plans to embed blockchain primarily to secure customer data and speeding up the onboarding process keeping the reliable assurance of regulatory compliance.
Security solutions
In Pakistan, financial sector is defenseless to combat ever increasing cases of cybercrime, financial fraud, online fraud-tracking and data hacking. The blockchain technology can help improve the secure banking transactions. Moreover, it works on the principles with high level security mechanisms and has made the fraudulent motives much more difficult to achieve. 4
Microfinance
By providing a transparency in asset tokenization, cost-effective platform for peer-to-peer lending, and smart contracts on Pakistan, blockchain has the potential to support microfinance systems and financial inclusion initiatives in Pakistan. Since Pakistan’s economy is highly dependent on trade, blockchain can simplify and expedite the imports, exports and overall trade related finance processes.
In developing and under developed countries, blockchain needs some time to get enrooted. Countries with unstable political and financial situation, are facing challenges like regulatory uncertainty, lack of awareness and expertise, and infrastructure challenges to adopt blockchain conveniently.
Cleo Abram is a video journalist who makes explainers about technology once explained in a compelling analogy: if the first computers were like old model cars from the early 2000s, then supercomputers are like today’s supercars. However, quantum computing isn’t like a supercar that surpasses the speed of old model cars; instead, it’s more like a boat designed for an entirely different terrain. While the boat may not be faster than a car, it excels in a completely different environment.
Quantum Computing, a term when heard gives an impression of faster computers with ultimate speed and power. A realm where the impossible becomes possible! Imagine solving problems in seconds that would take classical computers a millennium. This groundbreaking technology harnesses the power of quantum bits, or qubits, to revolutionize everything from cryptography to drug discovery, unlocking a new era of innovation and discovery.
To understand quantum computing, it’s essential to differentiate it from classical computing, which encompasses our everyday devices like laptops and smartphones. Quantum computers operate based on the principles of quantum mechanics, allowing them to perform calculations in fundamentally different ways.
Now, that we are clear that quantum computing has nothing to do with the conventional computers that we use today, let’s begin “Lesson 101”.
Quantum Computers vs. Conventional Computers
It starts with “bits”. Today’s classical computers operate via maintaining a state of data electronically in binary form i.e. either in ‘1’ or ‘0’. These are called bits. A bit is the smallest unit of data that a computer processes and stores. These bits are electronically stored in silicon-made CPUs and/or memories (hard disks, SSDs, etc.) of the computers that we use today.
Bits, when stored or loaded in the hardware, can be either in an ‘excited state’ (i.e. 1) or ‘ground state’ (i.e. 0). Everything in classical computers gets translated into computer speech, which combines ones and zeros known as ‘binary language’.
These strings of bits together form data e.g. “a” in a binary language is “01100001” and the number “ten” in binary language is “1010”. Later these bits are processed through logic gates (i.e. OR, AND, XOR, etc.) to compute whatever is required.
In quantum computing, a bit is known as “Qubit”. A qubit is the basic unit of quantum information, often represented by an atomic particle such as an electron or a photon. Each atomic particle, including electrons and photons, has angular momentum, which can be thought of as a way to represent information.
In quantum mechanics, the direction of this angular momentum can denote binary states, with an upward momentum representing ‘1’ and a downward momentum representing ‘0’. A qubit with angular momentum in a direction between ‘1’ and ‘0’ is said to be in a “state of superposition”, meaning it can represent both states simultaneously. Yes, you heard that right! A state where a qubit maintains the state of ‘1’ and ‘0’ and both at the same time.
This is the major difference between a classical bit and a qubit- a qubit can be ‘1’ and ‘0’ and both at the same time.
You might wonder what happens if the angular momentum is close to ‘0’ or ‘1’. This question led to the development of quantum logic gates, which manage the probabilities of a qubit being in the state of ‘1’ or ‘0’ after it exits the state of superposition.
State of Superposition
Maintaining superposition is possible but requires sophisticated techniques. For instance, qubits are kept in a vacuum and at extremely low temperatures, around 15 millikelvins, colder than outer space to preserve their quantum state.
Why is maintaining superposition so crucial? The answer lies in the power of quantum computation. If a computer can maintain multiple states simultaneously, it can explore various solutions to a problem at once, potentially finding the optimal outcome more efficiently. Thus, while each qubit can be in multiple states, a combination of qubits interacting in superposition can solve problems in parallel and arrive at the most likely answer.
Entanglement: A key feature of Quantum Computing
Einstein called entanglement a “Spooky action at a distance”. A key concept to understanding the power of quantum computing is known as entanglement. Entanglement occurs when a group of atomic particles become interconnected in such a way that the state of one particle instantaneously affects the state of the others, regardless of the distance between them.
When particles are entangled, they share specific properties. It means that the state of one particle provides immediate information about the state of the other entangled particles. For example, if an entangled group of particles is in a superposition, a state where particles can exist in multiple states. Simultaneously, measuring the state of the first particle allows you to infer the states of the remaining particles in the chain. This interconnectedness enables quantum computers to process complex calculations far more efficiently than classical computers.
Understanding superposition and entanglement in a non-technical language
After establishing a technical understanding of common quantum concepts, let’s use an example that a non-technical person can grasp to explain superposition and entanglement.
Imagine there’s a pair of shoes, with each shoe placed in an identical box. These boxes are then randomly distributed between Person A and Person B. Both individuals are now in a situation where they know they have either the right or the left shoe, but they won’t know which one until they open the box. This uncertainty, where each person could have either shoe, represents superposition. It’s like how an atomic particle in quantum physics is understood to be in a state of ‘1’ or ‘0’ until it leaves the state of superposition.
Now, imagine Person A opens their box and discovers they have the right shoe. Instantly, without even opening their box, Person A knows that Person B must have the left shoe. This instant knowledge of the other shoe’s state, based on the first reveal, demonstrates the concept of entanglement. In quantum entanglement, the state of one atomic particle is directly related to the state of another connected particle. So, when the state of one particle is determined, the state of the other is immediately known, no matter how far apart they are.
Is Quantum Technology meant to help mankind?
Technology has long been seen as a positive force, often regarded as the savior of mankind and in many ways, it is. However, the recent surge in disruptive technologies has sparked difficult questions about their potential downsides. For instance, while artificial intelligence (AI) offers incredible opportunities, its ability to automate tasks could lead to widespread job loss. Moreover, AI could be weaponized for malicious purposes. Autonomous drones and AI-driven cyber-attacks pose significant risks, including warfare and digital sabotage.
Similarly, quantum computing, with its immense power to crack complex codes, could undermine global cybersecurity, exposing sensitive data and financial systems to unprecedented threats. As these technologies evolve, their future impact remains uncertain, raising concerns about what may lie ahead.
Virtual event—The Science Journalism Forum (SJF) has announced that its upcoming SJF25 will be held in a hybrid format, a decision that promises to enhance accessibility for participants worldwide. This pivotal change comes as SJF celebrates five years of fostering collaboration among science journalists worldwide.
Since its establishment in 2020, SJF has rapidly evolved into a premier international platform, attracting over 5,000 attendees from 180 countries and featuring contributions from more than 500 experts. As the forum looks ahead to SJF25, it aims to further its mission of inclusivity by allowing participants to engage both in-person and online.
Co-founder Bothina Osama remarked, “This transition to a hybrid format directly responds to our community’s request for more flexible ways to connect. We are dedicated to ensuring that every voice in the science journalism community is heard and valued.”
Saad Lotfy, also a Co-Founder of SJF, highlighted the significance of this development: “By adopting a hybrid model, we are not just leveraging technology; we are breaking down barriers and expanding our reach. This format will enable us to engage a diverse audience, ensuring that all science journalists, regardless of their geographical location or background, can participate fully.”
SJF25 will feature a robust agenda of sessions, workshops, and networking opportunities designed to equip journalists with the tools needed to navigate the rapidly changing media landscape. Attendees can expect a rich exchange of ideas on critical issues facing science journalism today.
Ahead of SJF25, the forum will host SJF24 virtually from October 28 to 31, 2024, under the theme “Transforming Narratives: Reshaping the Landscape of Science Journalism.” This event is anticipated to draw over 500 participants, facilitating discussions in five languages and promoting a truly global dialogue.
As SJF prepares for this exciting next chapter, the organization invites the science journalism community to stay tuned for registration details and further announcements athttps://sciencejf.com.
About Science Journalism Forum: The Science Journalism Forum is the world’s largest international gathering dedicated to advancing science journalism through collaboration and education. SJF empowers journalists to effectively communicate complex scientific topics to diverse audiences.
In the rapidly evolving world of healthcare, artificial intelligence (AI) has emerged as a transformative power. AI technologies are revolutionizing how medical professionals diagnose diseases, develop personalized treatment plans, and manage patient care. Predictive analytics that forecast patient outcomes and natural language processing that assists in documentation are being introduced as well [1].
As Dr. Eric Topol, a leading figure in digital medicine, states, “AI can help us analyze data and make decisions at a speed and scale that humans alone cannot.”
However, as reliance on AI increases, so do data privacy, security, and integrity concerns. The healthcare industry generates massive amounts of sensitive patient data, making it a prime target for cyberattacks. This is where blockchain technology comes into play.
With its decentralized and immutable ledger, blockchain offers a solution to many of the challenges faced by AI in healthcare [2]. By securely storing patient records, blockchain ensures that the data used by AI algorithms is accurate and protected from unauthorized access [3]. Each transaction whether a health record update or an AI-driven diagnosis, is transparently recorded, providing a traceable history that enhances accountability.
AI and blockchain can create a more secure and efficient healthcare ecosystem. For instance, blockchain can facilitate the seamless sharing of patient data across different healthcare providers while preserving patient consent and privacy. Moreover, AI can analyze this comprehensive dataset, uncovering insights that lead to better patient outcomes.
The intersection of AI and blockchain has the potential to revolutionize healthcare, making it more efficient, transparent, and patient-centered
Meanwhile, the rise of artificial intelligence in healthcare offers an equally exciting promise. AI, powered by advanced algorithms and machine learning can sift through massive amounts of medical data, detecting patterns and insights that might elude even the most experienced human eyes. Today, AI is already employed in the early detection of diseases like cancer, analyzing medical images with a speed and precision that significantly outpaces traditional methods.
AI refines diagnostic rather than just augmenting human judgment. A radiologist reviewing an MRI scan can use AI to highlight anomalies that might have otherwise, gone unnoticed. Similarly, AI can compare patient’s data to millions of other records, offering predictive insights into their future health risks [4]. This blend of human expertise and machine precision represents a powerful shift towards more personalized, accurate medical care.
In this constantly evolving new world, the doctor and the machine will work hand in hand, guided by data that is secure and intelligent, paving the way for a healthier tomorrow.
References:
Ahuja, A.S., The impact of artificial intelligence in medicine on the future role of the physician. PeerJ, 2019. 7: p. e7702.
Ghosh, P.K., et al., Blockchain Application in Healthcare Systems: A Review. 2023. 11(1): p. 38.
Abid, H., et al., Blockchain technology applications in healthcare: An overview. International Journal of Intelligent Networks, 2021. 2: p. 130-139.
Alowais, S.A., et al., Revolutionizing healthcare: the role of artificial intelligence in clinical practice. BMC Med Educ, 2023. 23(1): p. 689.
Among many emerging fields in current’s sociated with the implementation of information technologies, cyber security has been recognized as one of the most crucial for organizations of different types and sizes. But as firms depend on computer systems to store their information and data, and to run their operations, the risks remain unresolved.
External threats like malware, ransomware, phishing, or hacking are today’s common dangers— internal threats and poor user control are even worse. While insiders include people within an organization who either maliciously or inadvertently threaten the organization’s security, human mistakes are accidental actions that could lead to vulnerabilities.
Such risks threaten to lead to massive data leaks, substantial monetary losses, and chronic reputational damage. Leaders must employ a range of approaches in order to seek out and counter insider threats, as well as minimize human mistakes. This blog focuses on the ways to improve the existing and planning proper measures to prevent the threat of cyber threats that may be within the organization or outside it.
Understanding Insider Threats and Human Error
Insider Threats may therefore be defined simply as an intentional or accidental abuse of the organizational policies by the insiders on the use of the computers owned by their organization. Such persons may be employers, sub-contractors, or other associates who the organization has close relations with.
Compared to external attackers, insiders can easily bypass conventional security procedures since they have prior and lawful permission to access an organization’s business information systems. Insider threats generally fall into three categories:
Malicious Insiders: People with intent to harm the organization or with malicious intent towards the organization. It could mean hacking into computer systems to steal information, to support a fraudulent scheme, or to disrupt activity.
Negligent Insiders: These are other human factors that make employees a threat to cyber security; employees who create security breaches inadvertently because maybe they are not aware of the correct ways, they did not receive training on cyber security measures or perhaps they are not paying adequate attention on the security of their organization’s computers and networks.
Examples of negligent behavior are failing to use reasonable passwords on the accounts or falling prey to fake username/password emails.
Compromised Insiders: Users who have been attacked from outside by malicious people who have stolen their accounts or their credentials. Such persons can inadvertently enable the attacks, which will not show any signs of malicious behavior in real-time.
There is so much that goes wrong in human decisions and actions that pose a threat to cyber security. Carelessness notably results from mistakes that people are not purposely making; these mistakes include misconfiguring systems, forgetting to install a security patch, or using the wrong channels for sharing sensitive information.
• Flaw in password policy where clients create and reuse their passwords often without many changes.
• Succession to phishing scams by getting wanted to click negative links or acquire negative attachment documents.
• Allowing a SIP port to be used for other applications rather than closing it to prevent exploitation. While most people do not intend to cause harm, errors such as misconfiguring systems, failing to apply security patches, or sharing sensitive information inappropriately can lead to vulnerabilities.
Some common examples of human errors are:
Using weak or reused passwords across multiple systems.
Falling victim to phishing scams by clicking malicious links or downloading infected attachments.
Misconfiguring security settings on devices, leaving them open to attacks.
Strategies to Mitigate Insider Threats and Human Errors include:
Comprehensive Security Training Programs
It also captures the fact that training staff is one of the most powerful weapons against insider risks and human mistakes. Informed employees make few mistakes that would endanger security and are well-armed to identify any malicious activities on the sites. Consider the following approaches:
Regular Training: Schedule regular training to reveal new cyber threats and security measures to the company’s employees. There are instances in real-life scenarios that can used to explain the effects or ramifications of breaches linked to internal threats and blunders.
Interactive Learning: Use simulations, and other engaging training tools to take employees through a typical working environment. For instance, they help the employees know the different types of phishing attempts out there, thus helping them avoid getting preyed on.
Role-Based Training: Cyber security training has therefore to be personalized according to one’s responsibilities in the company. Thus, specific subdivisions, such as IT personnel, will need more sophisticated security training, while others that deal with financial or personnel data may need more pointers in that area.
Implement Strong Access Controls
Controlling and monitoring who has access to critical systems and data is a key strategy in reducing insider threats.
Least Privilege Principle: Limit the exposure of employees to only what requirements their positions entail them to deal with. Ensure access permissions are checked and changed as frequently as roles of various employees are changed.
Multi-Factor Authentication (MFA): Enhance security at the client’s end through the use of MFA, which checks that a person using a computer to access a critical system is indeed the right person by requesting him or her to give at least two proofs of identity, for instance, a password and others.
Access Reviews: Periodically audit the spectrum of users’ access rights to eliminate the permissions that are no longer needed. Notably from this process, it becomes possible to control access to data with specific individuals who should access the information.
Promote a Culture of Security Awareness
Creating a security-conscious workplace culture is essential for reducing insider threats and human errors. Employees should feel empowered to prioritize security in their daily tasks.
Encourage Reporting: Set an anonymous whistle-blowing program whereby employees can report any suspicious practices or acts of insecurity without being fired from their workplace. Minimizing the number of breaches is essential, and early identification of possible problems is crucial for that purpose.
Recognize Good Practices: Encourage and incentivize those employees who adhere to the corporate best practices in security. People will indeed step up and take this cybersecurity thing as seriously as they should when the right incentives are put in place.
Regular Communication: Send newsletters, post on internal blogs, or share with the team during meetings on the new threats, policies, or security prompts. This makes cybersecurity a priority in the minds of the employees.
Implement Robust Security Policies and Procedures
Explicit security policies and objectives give the workforce directions on how to perform their tasks; this minimizes human factors and insider risks.
Clear Policies: Have a clear security policy for the usage of technologies, protecting and handling data, and dealing with possible incidents. They should be aware of the company’s expectations and what a course of action should be in regard to security breaches.
Incident Response Plan: Develop an incident handling plan that will be followed if an organization has already been breached. Make sure that all and every employee learns about the plan and conforms to the laid down response procedures.
Regular Audits: Always perform security scans at least once to see where your security may be lacking. Budget cutbacks should never be a reason for failing to protect an organization, and vulnerability assessments should be conducted at least periodically to ensure there are no gaps in an organization’s level of protection.
Leverage Technology for Enhanced Security
Advanced technologies can help monitor and prevent both insider threats and human errors.
Behavioural Analytics: They should include tools that can monitor the behavior of users on the computing systems in order to identify suspicious activities such as logging in at untraditional times and accessing restricted information and documents. This can also be useful for detecting those insiders who have become bad or malicious in their employment domain.
Endpoint Protection: Deploy solutions at the endpoint, which observes and safeguards individual laptops, mobile phones, or any other end-user devices from threats such as malware and unauthorized access as well as against data shedding.
Data Loss Prevention (DLP): Use DLP to monitor and control the leakage or use of a firm’s sensitive information that is confidential. Insider menace can also be addressed through DLP solutions when employees are processing essential information.
Foster Strong Leadership and Accountability
Senior management has a critical influence and is primarily responsible for organizing a security-oriented corporate culture as well as security team role modeling.
Leadership Involvement: Strengthen the leadership’s support of truths related to cyber security and its commitment to security strategies. This can be realized by attending more security briefings and also by making sure that there are enough funds provided for cyber security features.
Accountability Mechanisms: Hold all employees accountable for their cyber security responsibilities. This includes clear consequences for non-compliance with security policies and a focus on transparency in all security matters.
Conclusion
Cyber security is a constantly changing sector and insider threats as well as errors made by employees remain vital issues. However, such risks can be reduced by following several measures that are part of a proactive strategy Involving training, access control, robust policies, new technology, and a culture of awareness.
Consequently, as technology advances and becomes vital to performing work, comprehending and managing threats change and so must the approaches used to prevent adverse impact on significant data and systems. Let me remind you that cyber security is not the preserve of IT alone, but should be treated as a regime that involves commitment from everybody in the company.
It was a hot morning in May 2024. I quickly gulped down my tea and rushed to the cab. I had a scheduled interview with Mehreen Raza, the founder of “She Guard.” The startup has introduced biodegradable, eco-friendly, and herbal-treated sanitary napkins for women.
She Guard is one of the few companies in Pakistan taking an innovative approach to solid waste management.
Talking with Mehreen was an incredible experience. A postgraduate from the US-Pakistan Centre for Advanced Studies in Water, Sanitation, and Health Sciences (Hygiene) discipline and with a multitalented team of experts, Raza is dealing with the increasing problems of solid waste management, health concerns, and environmental issues. She aims to provide a sustainable and healthier solution for feminine hygiene.
While covering her story, I came across some mind-blowing facts and was curious to dig deep into Pakistan’s solid waste management scenario.
According to government estimates, around 87,000 tons of solid waste are produced weekly, mostly from big cities. Karachi, the largest city in Pakistan with an estimated population of 20 million people, generates over 16,500 tons of municipal waste daily.
In Pakistan, local and municipal governments are responsible for collecting waste. In big cities, nearly 60 to 70 percent of solid waste is collected daily. The garbage collection fleet comprises open trucks, tractor-trolley systems, and arm roll trucks for secondary collection and transfer.
Traditional methods such as handcarts and donkey pull-carts are used for primary waste collection in remote areas. Some municipalities hire street sweepers and sanitary workers to augment other poor collection methods. They use wheelbarrows and brooms to collect solid waste from small heaps and dustbins and store it in formal and informal depots.
This traditional waste management system struggles to keep up with increasing waste volumes. Innovative solutions are needed to address this pressing issue.
According to the International Trade Administration, Pakistan faces multiple challenges in waste management infrastructure, resulting in significant environmental issues. The huge municipal waste is disposed of through burning, dumping, or burying in empty areas, posing risks to the overall health and well-being of the local population.
Waste Management Practices Worldwide
An efficient waste management system has become a pressing global concern in an era of increasing urbanization and rapid population growth. Over the past decade, cities worldwide have produced enormous waste, posing adverse threats to human health and the environment.
According to an estimation, the annual amount of solid waste generated worldwide will increase to 2.2 billion tons by 2025. Each individual generates 0.11 to 4.54 kg of solid waste each day.
Alarmingly, various reports show that only 33 percent of solid waste generated in urban areas is not disposed of in an environmentally friendly and safe manner.
Amid this global crisis, several countries are introducing innovative solutions for waste management. An example is Germany, which has a successful dual system for packaging waste. Here, manufacturers are responsible for collecting and recycling their packaging materials. Yellow bins are provided for packaging waste, and citizens are actively involved in sorting.
Blockchain in waste management
In the era of big data, technologies like sensors, AI, blockchain, and deep learning prove invaluable in effective waste tracking, rapidly and accurately analyzing data, and facilitating the transition to a circular economy.
Katarzyna Bułkowska is a Professor at the Department of Environmental Biotechnology, Faculty of Geoengineering, University of Warmia and Mazury in Olsztyn, Poland. She says Blockchain technology provides a secure and transparent platform for recording every step in the waste management lifecycle, from waste generation to collection, transportation, recycling, or disposal.
Bułkowska’s research, published in MDPI, highlighted emerging technologies associated with Industry 4.0, like blockchain. It can play a potentially transformative role in revolutionizing waste management practices.
Furthermore, this research unveiled the benefits of integrating blockchain within the circular economy. Automated systems powered by the blockchain and connected through the Internet of Things (IoT) can significantly enhance the efficiency and transparency of waste management systems worldwide.
Blockchain Application Environment Sector
Many developing countries are utilizing blockchain technology in the waste management sector. Current applications of blockchain focus on payment or reward facilitation and monitoring and tracking waste. In the first case, an entity depositing waste is rewarded or paid with a blockchain-secured digital token, which can be redeemed for goods or exchanged for other currencies.
In European countries, Plastic Bank uses blockchain rewards to incentivize individuals to become plastic waste collectors. This initiative aims to reduce the amount of industrial plastic waste in oceans. This gathered waste is then brought to collection points and weighed before the payment is made to the collector through a blockchain-based banking application.
The blockchain’s immutability and transparency prevent fraudulent and corrupt practices, but the process needs a legal framework and strict monitoring policies. Likewise, reverse vending machines can help with waste checking instead of human workers.
In the second case, data on the type of waste collected and waste transfers is recorded on the blockchain. AREP, a subsidiary of the National Railway Company France, uses blockchain technology to monitor the amount, type, and frequency of waste collected in train station waste bins to optimize waste collection.
Moreover, NRCF recorded waste data and transfers in blockchain transactions using the digital identities of bins on train platforms. The incentive for this was primarily financial; there was insufficient data to produce precise invoices from the waste collector. However, it poses a risk of station overcharging, which was overcome using blockchain and bin sensors.
The practice benefited the environmental sector in the long term. However, it is no longer in use as waste management was not a priority for the station management. Initiatives with similar intentions of collecting waste type and amount of data to inform more effective and efficient waste management are in process.
Blockchain technology can improve waste management by automating tasks such as waste collection scheduling and payment processing, leading to increased efficiency and cost savings. Consequently, it provides more resources to improve waste management infrastructure and services.
Currently, blockchain technology faces several challenges, including but not limited to the need for legislative frameworks to support blockchain implementation and the energy consumption associated with blockchain operations.
Nevertheless, ongoing technological advancements and an increasing understanding of blockchain’s capabilities provide optimism for overcoming these challenges.