• About Me Card

Max Hemingway

~ Musings as I work through life, career and everything.

Max Hemingway

Monthly Archives: May 2020

Avatars – My Digital Selfie

29 Friday May 2020

Posted by Max Hemingway in 21st Century Human, Digital

≈ 1 Comment

Tags

21st Century Human, Digital, Digital Human

The ability to create avatars has been around for sometime, but more recently more platforms have provided this ability to create them. Facebook being one of the latest to introduce a create an avatar based on some standard forms that you can then modify to your nearest look. This has caused a recent splurge of posts on the social media channel as everyone is keen to show off their new avatar.

Some people find using an avatar more comfortable than using their real picture

Other systems use a photo of yourself either uploading or taking a selfie to create your avatar and try to make the avatar more realistic to you.

Most avatar systems are based on a set of generic shapes and colour choices. One of the challenges with using a fully custom avatar in channel where the avatar is an active part of the actions, such as in Virtual Reality and Gaming is the downloading and rendering of the images. Multiple versions of avatars may have an impact/slowdown on a system as it tries to cope with the additional images and polygons to render and process.

I have brought some of my avatars together below to show the different types. These are by no means a comprehensive list of avatars, but a sample of whats available.

In brining these together the differences in how the systems either see me or allow me to interpret my face and features. There is quite a difference across all the systems.

Ready Player Me

The avatar from Ready Player Me is my latest one and create as I needed a virtual version of myself for a virtual experience. Running the web page from your PC/Laptop or phone and take a selfie or use an existing photo creates an avatar that you can then change appearance and colour on.

The output is a .glb file that can be used in creating virtual environments.

Avatar in https://readyplayer.me/

Spatial.io

The avatar from spacial produces a floating version of yourself using a photo of your face using this as a skin to the model. Out of all my avatars this is the most realistic, but is platform specific.

Avatar from Spatial.io

Samsung

The Samsung Avatar runs on a Samsung phone (Using an S9 to create these). Taking a selfie you can create a set of AR Emojis/stickers for use in your social channels. It creates a avatr that you can then customise.

Avatar from Samsung Phone

Facebook

Using the facebook avatar creator within the Facebook application you can choose from a number of face shapes and skin tones to set your initial version that can then be customised to be as near as it can to your image.

Avatar from Facebook

X-Box

The X-Box Avatar is built up from a standard avatar set that you can then customise the look. This was the nearest I got to myself using the platform.

Avatar from XBox

There are lots more platforms out there that you can set and customise your avatars in. For me there is a lot of variation in the avatars and only a couple are near realistic for me. The others are good fun though.

The future may see the option to standardise on a set of avatars. Until then happy avataring.

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on X (Opens in new window) X
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Like Loading...

Everyone needs good Cyber Security knowledge

19 Tuesday May 2020

Posted by Max Hemingway in Security

≈ 3 Comments

Tags

Security

Padlock Gates“Everyone needs strong good Security knowledge”. With the increase of connected devices that are entering our lives and the number of vulnerabilities being found in technologies that are becoming common place in our homes, people will need to be more savvy around Cyber Security and know what is going on with our devices and information.

Recent times have also seen an increase in the usage of devices, applications, social media and video calls. It has also seen an increase in the number of scams and security issues increase.

Sales of technology to allow remote working and to stay in touch with family and friends was rapid at the start of the pandemic and this also saw the cost of some devices increase as stocks reduced. The rush to buy was huge and lots of items were quickly plugged into devices to get online and talking. A lot wont have looked at updating any versions of these add ons firmware, drivers etc to the latest versions, which may cause issues later.

Security however cannot be an after thought and should be one of the first things you think about. Also helping your family and friends to make sure that they have updated to the latest versions and are secure.

Our devices are only as good as the last updates/patches applied and security measures that we have in place. The UK Government has previously reported planning new laws to cover smart gadgets sold which includes stronger passwords and length of time before an update. There are already a large number of devices already installed and in use. A number of these wont have had any updates or changes applied since first being installed if they are a manual process for the user to initiate.

Good practices to adopt are

  • Check the manufactures website for firmware or driver updates on a regular basis
  • If the device software allows a check to be made for updates on a regular basis make use of the tool.
  • Use strong passwords
  • Change any default passwords
  • Don’t use the same password on different systems
  • Use passwords on your video calls
  • Use a VPN if working from home
  • Turn on two factor authentication on applications that allow it

If this is all second nature to you thats great, however it may not be to others. Reach out to your family and friends and talk them through what they need to do so it becomes second nature to them.

Further Reading

  • National Cyber Security Office – Cyber Aware
  • National Cyber Security Office – Top tips for staying secure online

 

 

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on X (Opens in new window) X
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Like Loading...

Your Digital Exhaust – The data we share

06 Wednesday May 2020

Posted by Max Hemingway in Connected Home, Data, Security, Social Media

≈ 2 Comments

Tags

Connected Home, Data, Security, Social Media

Dont say a wordEveryone who uses a computer or mobile creates their own digital exhaust in the form of data that we leave behind and spew out of our devices – from location data to social media posts and videos. Other things we own such as cars and houses are also generating data from SatNavs to Smart Meters.

If we could measure individual volume of data and information against todays climate change measures and visualise it, we would probably call it an ecological disaster on a person by person scale, however we go about our daily lives creating data with and without knowing it.

To be clear creating data does have a climate effect as there are systems behind what we create and they all need power, cooling etc. However, putting any talk to the side around the ecological effects of this as there is enough said already about climate and climate change and focusing on the data itself.

At the beginning of 2020, the digital universe was estimated to consist of 44 zettabytes of data, which is 44 trillion gigabytes and growing. That’s a lot of data!

We go about generating data without knowing or thinking until a news article catches our attention about something someone said many years ago. Recent times have seen an almost doubling of the use of the internet. This in turn increases the amount of data being created as people discover ways to help elivate lockdown with video calls to new dances on TikTok.

To put this into perspective a bit, with a trolley full of phones you can create a virtual traffic jam, but dont try that at home. This example illustrates the data being generated from a device and how others are using it, in this case to look at traffic patterns

In this increase of posts and data about people across the many different platforms available, are you stopping to think about what your posting?  We go about generating data without thinking until a news article catches our attention about something someone said many years ago that has been found on a social platform somewhere.

Sci-Fi moment alert! – Having watched an episode of “The Orville” by Seth MacFarlane called “Lasting Impressions” where the crew of the Orville open a Time Capsule and recreate someones life in a holodeck using just the data from a iPhone (after accessing a video on the phone where the person who’s phone it is, gives their consent for the data to be used in the future) and recreate and interact with the phones original owner. This provides the crew with a view into that persons life and what they were like.

Have you through about what would happen to your data in the future?

This concept can easily be recreated today and there are TV programs that investigate and look at people to check who they really are (Catfish the TV show). Its easy to see how people leave a trail of digital evidence and clues from what they post and are not secure on what they do or think about what they post.

Here are some good tips to help secure your online presence:

Privacy and security settings exist for a reason: Learn about and use the privacy and security settings on social networks. They are there to help you control who sees what you post and manage your online experience in a positive way.

Once posted, always posted: Protect your reputation on social networks. What you post online stays online. Think twice before posting pictures you wouldn’t want your parents or future employers to see. Recent research found that 70 percent of job recruiters rejected candidates based on information they found online.

Your online reputation can be a good thing: Recent research also found that recruiters respond to a strong, positive personal brand online. So show your smarts, thoughtfulness and mastery of the environment.

Keep personal info personal: Be cautious about how much personal information you provide on social networking sites. The more information you post, the easier it may be for a hacker or someone else to use that information to steal your identity, access your data or commit other crimes such as stalking.

Know and manage your friends: Social networks can be used for a variety of purposes. Some of the fun is creating a large pool of friends from many aspects of your life. That doesn’t mean all friends are created equal. Use tools to manage the information you share with friends in different groups or even have multiple online pages. If you’re trying to create a public persona as a blogger or expert, create an open profile or a “fan” page that encourages broad participation and limits personal information. Use your personal profile to keep your real friends (the ones you know and trust) up to date with your daily life.

Be honest if you’re uncomfortable: If a friend posts something about you that makes you uncomfortable or seems inappropriate, let them know. Likewise, stay open minded if a friend approaches you because something you’ve posted makes him or her uncomfortable. People have different tolerances for how much the world knows about them respect those differences.

Know what action to take: If someone is harassing or threatening you, remove them from your friends list, block them and report them to the site administrator.

Keep security software current: Having the latest security software, web browser and operating system is the best defense against viruses, malware and other online threats.

Own your online presence: When applicable, set the privacy and security settings on websites to your comfort level for information sharing. It’s OK to limit how and with whom you share information.

Source: https://staysafeonline.org/stay-safe-online/securing-key-accounts-devices/social-media/

Additional tips are available at this source.

Further Reading

Tips on being Social Media Savvy

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on X (Opens in new window) X
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Like Loading...

Follow Me on LinkedIn

www.linkedin.com – Click to Follow 

RSS Feed

RSS Feed RSS - Posts

Other Publications I contribute to

https://sparrowhawkbushcraft.com/

Recent Posts

  • Graceful Speech & Timeless Tales: Breathing
  • The Quotient Revolution: Building the Well-Rounded Person
  • Ditch Resolutions: Embrace Habit-Building for Success
  • Pen based Productivity Tools: The Chronodex 2026
  • Understanding ETSI TS 104 223 and ISO/IEC 42006

Categories

  • 21st Century Human
  • 3D Printing
  • AI
  • Applications
  • ArchiMate
  • Architecture
  • Arduino
  • Automation
  • BCS
  • Big Data
  • Certification
  • Climate Change
  • Cloud
  • Cobotics
  • Connected Home
  • Data
  • Data Fellowship
  • Data Science
  • Development
  • DevOps/OpsDev
  • Digital
  • DigitalFit
  • Drone
  • Enterprise Architecture
  • F-TAG
  • Governance
  • Health
  • Innovation
  • IoT
  • Machine Learning
  • Metaverse
  • Micro:Bit
  • Mindset
  • Mobiles
  • Networks
  • Open Source
  • Podcasts
  • Productivity
  • Programming
  • Quantum
  • Raspberry Pi
  • Robotics
  • Scouting
  • Scouts
  • Security
  • Smart Home
  • Social Media
  • Space
  • STEM
  • Story Telling
  • Technologists Toolkit
  • Tools
  • Uncategorized
  • Wearable Tech
  • Windows
  • xR

Archives

Reading Shelf

Archives

Recent Posts

  • Graceful Speech & Timeless Tales: Breathing
  • The Quotient Revolution: Building the Well-Rounded Person
  • Ditch Resolutions: Embrace Habit-Building for Success
  • Pen based Productivity Tools: The Chronodex 2026
  • Understanding ETSI TS 104 223 and ISO/IEC 42006

Top Posts & Pages

  • Graceful Speech & Timeless Tales: Breathing
  • The Quotient Revolution: Building the Well-Rounded Person
  • Understanding ETSI TS 104 223 and ISO/IEC 42006
  • Ditch Resolutions: Embrace Habit-Building for Success
  • Transforming Ideas into Reality: The Human Spark in Tech
  • Pen based Productivity Tools: The Chronodex 2026
  • Lessons from my Grandmother’s Notebook: Rediscovering the Art of Speaking
  • Using the best of the Q Continuum
  • Graceful Speech & Timeless Tales: The Art of Articulation
  • The Role of Enterprise Architecture in Fostering Innovation

Category Cloud

21st Century Human Architecture Automation Big Data Cloud Data Data Science Development DevOps/OpsDev Digital DigitalFit Enterprise Architecture Innovation IoT Machine Learning Mindset Open Source Podcasts Productivity Programming Raspberry Pi Robotics Security Social Media STEM Story Telling Technologists Toolkit Tools Uncategorized Wearable Tech

Tags

3D Printing 21st Century Human AI Applications Architecture artificial-intelligence Automation BCS Big Data Blockchain business Certification Cloud Cobot Cobotics Coding Communication Connected Home CPD creativity cybersecurity Data Data Fellowship Data Science Delivery Development DevOps Digital DigitalFit Digital Human Drone Email Enterprise Architecture GTD Infographic Information Theory Innovation IoT Journal Knowledge learning Machine Learning Metaverse MicroLearning Mindset Mixed Reality Networks Open Source OpsDev PKMS Podcasts Productivity Programming Proving It Quantum R RaspberryPI Robot Robotics Scouts Security Smart Home Social Media STEM Story Telling Technologists Toolkit technology Technology Couch Podcast Thinking Tools Training Visualisation Voice Wearable Tech xR

License

Creative Commons Licence
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Meta

  • Create account
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Blog at WordPress.com.

  • Subscribe Subscribed
    • Max Hemingway
    • Join 82 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Max Hemingway
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d