Saturday, 24 August 2019

eMMC vs SSD ?? What's the Difference. Check it Out.!! || tech talks group ||


If you're shopping for a new laptop, there are a lot of factors to think about. One of the most important aspects to consider is the kind of storage a laptop offers. Your average laptop (whether it's a 2-in-1, big and expensive, or budget-friendly and compact) will most likely sport either eMMC storage or SSD storage, but how are they different? Keep reading to learn more about eMMC hard drives vs. SSD hard drives.

What Is eMMC Storage and How Does It Work?

eMMC (embedded MultiMediaCard) storage is a form of internal storage made up of a controller and NAND flash memory, both of which are located in one integrated circuit. eMMC storage chips are usually embedded in a given device's motherboard. The controllers housed within eMMC chips have the ability to put data into storage, which, according to SearchStorage, allows the device's CPU to conserve its already limited speed and power for other computing tasks. In addition, eMMC's use of NAND flash memory also requires little to no power from the device to hold onto data.


Unsurprisingly, the fact eMMC chips are able to perform with little to no power drawn from their devices goes hand-in-hand with the fact that eMMC chips are generally found in PCs and mobile devices that have limited power, performance, and speed; especially when compared with more expensive, fully-featured laptops. In fact, you'll normally find eMMC chips in compact/budget laptops, Chromebooks, tablet PCs, 2-in-1s, and even smartphones and tablets.

WHEN SHOULD YOU BUY EMMC STORAGE?

If you're looking for something portable with a lower price point, a PC with eMMC storage may be worth considering. And, as Windows Central points out, PCs with eMMC storage may also be best for those who already own an external hard drive, have a cloud storage subscription, or can at least afford a cloud storage subscription. This is because PCs with eMMC storage tend to have smaller storage capacities available. So, if you need to store a lot of files and other data, you'll need to have an external storage option if you still plan to use an eMMC PC.


Another thing to consider is how you plan to use your laptop. Laptops featuring eMMC storage are generally best for those who plan to use them for web browsing and streaming media and not much else. They're not really built for labor-intensive tasks.

What Is SSD Storage and How Does It Work?

SSD (solid-state drive) storage is a type of internal storage that consists of a number of flash memory chips, a circuit board, and usually either a SATA or PCIe interface that moves data and provides an SSD with power.

Unlike more traditional hard drives, SSDs don't require moving parts like drive motors to read data. The lack of moving parts in SSDs means they don't need as much power to read data and can do so much faster than hard drives. And, like eMMC storage, SSDs use NAND flash memory, which enables SSDs to use less power when storing data.


SSDs are usually found in bigger, more fully-featured laptops or desktop computers. These computers also tend to be more expensive and have larger storage capacities than eMMC computers and mobile devices. The larger storage capacities are due to the fact that SSDs have larger sizes available.

WHEN SHOULD YOU BUY SSD STORAGE?

Customers who need a fully-featured laptop that can handle a wide variety of computing tasks (web browsing, watching movies, gaming, and productivity tasks) would probably be best served by a laptop that has SSD storage.

Due to the fact the SSDs often offer large storage capacities, SSDs are best for those who plan on storing large files (or just more data in general) on their PCs.

Also, price is an important factor when considering SSDs. While they're often worth the money (SSDs tend to be faster, perform better, and can store more than eMMC devices), they also tend to be more expensive. They're generally not considered "budget laptops," but if your budget can support the cost of an SSD laptop, it may be worth the purchase.

How They Compare: eMMC flash vs. SSD

When comparing eMMCs to SSDs, there are three primary things to look at.

PERFORMANCE (SPEED/DATA TRANSFER SPEED)

eMMC devices and PCs aren't super slow, but they're generally considered to be much slower than PCs outfitted with SSD storage.

Currently, eMMC storage can reach up to a transfer speed of 400 MB/s, whereas the best SSDs (including high-performance PCIe SSDs), which vary widely in their read/write speeds, can have read speeds ranging from about 500 MB/s to over 3,000 MB/s. The best SSDs can also have write speeds that vary from about 300 MB/s to over 3,000 MB/s.

CAPACITY (STORAGE)

eMMCs also lose to SSDs in the battle for storage capacity. eMMCs have a much more limited storage capacity, but it kind of makes sense considering what they're used for. eMMCs are generally intended for lightweight, mobile devices and ultra-portable PCs.

eMMC devices mostly offer the following storage sizes: 32GB, 64GB, 128GB, and 256GB. SSDs, since they're intended to be used with full-featured laptops and desktop computers, can offer up to 1TB of storage or more.

PRICE

eMMCs finally score a victory against SSDs when it comes to price. While eMMCs have their limitations, they're also cheaper. There are many eMMC budget laptops that are less than $500, and a good number of those are even less than $300.

You can get new SSD laptops from online retailers (with a minimum of 512GB in SSD storage) starting at around $500 - $600. There are certainly SSD laptops that cost much more than that, even reaching into the thousands, but the pricing often depends on the type of SSD involved, storage size, and other computing features included in the laptop.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Any Idea About When Will The Life of Windows 10 Will Get End .?



Microsoft will not be implementing the same end of life process for Windows 10 that it has for previous versions of Windows. There is no forthcoming Windows version to install. Instead, Windows 10 users will need to continue allowing Windows 10 to update itself indefinitely. Older versions of Windows 10 will reach end of service, but this will be largely irrelevant for users who keep Windows 10 updated.

What Does End of Life Mean?

Previous versions of Windows were subject to Microsoft’s software lifecycle. Microsoft states, “Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it's no longer supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade or make other changes to your software.”

Why Is Windows 10 Different?

Windows 10 was developed to be an as-a-service application, meaning the user doesn’t have to worry about installing new versions or updates. The process is similar to, say, the browser that you use, which gets updated periodically without any effort on your part. These updates include regular improvements meant to make Windows easier to use.

How Can I Make Sure I Have the Latest Update?

If you’ve been using Windows 10 for some time, it’s likely you’ve noticed major or minor updates every few weeks. But if you’re still not sure, you can force Windows 10 to update by using the following procedure:
  • Go to Windows Settings.
  • Click Update & Security. 
  • You will be taken to a Windows Update screen.
  • At the top of the screen, check your update status. If you’re up-to-date, you don’t need to do anything else.
  • If you’re not completely updated, click Check for updates and follow the instructions from there.
  • Once you’re all updated you can modify other update settings from the Windows Update screen. Just click the links under Update settings and make adjustments according to your preferences.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Wednesday, 21 August 2019

Security Bugs and Vulnerability - The Vulnerability Landscape


Cyber security is an arms race between offensive and defensive capabilities, and unfortunately, we are losing this battle. As users, we want better technology doing cooler things enabling us to do more. But the more we have, the more we rely on it,  and the more complex these systems become.
Complexity is the enemy of security. In fact, complexity is a nemesis of security,
which is one of the main reasons why we’re losing this arms race.
I’m going to get you up to speed on security bugs and vulnerabilities and how they
affect your security. A security bug and a vulnerability are actually the same thing. So they’re synonyms for each other. So if I say security bug or vulnerability, it’s the same thing. And it’s an
error. It’s an error written into software that creates a potential for a threat agent,
such as a hacker, to exploit it. So an example might be the recent Heartbleed bug which you may have heard about because it was on mainstream news. This is a bug in something called Open
SSL which enables the decryption of internet traffic sent to vulnerable sites. So for example, maybe you have a online bank. If it was susceptible to the Heartbleed bug, and when you were sending your username and password, somebody may, if the bug was in that bank, able to decrypt and get access to your username and password. Security bugs will always exist as long as humans write software. That might not be forever, but humans are fallible, so as long as humans write software, there’s going to
be security bugs. And it’s no surprise really if you consider something like the Windows operating
system. It’s made up of millions and millions of lines of code. Humans are fallable, we
will make mistakes, there will be security bugs. On the left here, you can see a diagram that represents your computer, and on the right, we have a diagram that represents the internet. On each side we have things that you care about.  Security bugs can exist in your operating system, firmware, applications, things like Outlook, your media player, Adobe Acrobat. In a particular risk, they can exist in your browser and the extensions and add-ons within the browser.  So for example, there can be a security bug in your Internet Explorer. You visit a website which has special code on it. You won’t see that this code is one there, and this will install malware on your machine and take it over through that vulnerability.
And maybe the consequences are that they choose to encrypt all your files and hold them to ransom until you pay the money to decrypt it, and that’s known as Ransomware. Because you have things you care about online, we have to consider the security bugs that exist on internet sites and on the internet infrastructure. So maybe you use Dropbox and there is a bug that is discovered by Dr. Evil on Dropbox, which gives him access to your files. And because Dropbox stores encryption keys, so encryption isn’t going to save you, he will then have access to your files. There are two main types of bugs. Really, it’s best to draw a distinction between, and those are the Known and Unknown bugs. So if we start with the Known bugs, known bugs of vulnerabilities have patches, and if you patch your system, you are safe against that bug. And we’ll cover the best and easiest way to do patching of all the things that need patching as we go through. And then you have the Unknown bug, also can be referred to as zero-days. These are much harder to protect against as there is no patch. So we’ll cover later techniques to protect against these, and these are referred to in the security industry
as a compensating control. I’m going to bring up a spreadsheet to give you a little bit more of an insight intothe world of the cyber criminal. Your budding, entrepreneur hacker doesn’t even need to be particularly skilled these days. He can go purchase an already made exploit kit. If you look at this spreadsheet, here along the top, these are the various popular exploit kits that are available at the moment and to purchase. And down here are the
various vulnerabilities, what they affect down here. And, as a budding, hacking entrepreneur, we can look through here and see which particular vulnerability we might want to use. Okay, we might want to exploit Internet Explorer, so there you go, we can use this one. And here we can see that this one allows the remote attacker to execute arbitrary code by a crafted website that triggers access to a detailed object. That really means that if you click on a link or go anywhere with an Internet Explorer browser, is susceptible to this vulnerability, they can take over your machine. And if we’re not feeling like potentially buying an exploit kit, you can look online for the exploit. And we can see here this is the code to run the exploit. So I hope that gives you a better idea about what security bugs are and vulnerabilities. And later on, we’re going to be going through the ways to mitigate against the Known vulnerabilities and the Unknown vulnerabilities.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Tuesday, 20 August 2019

Spyware, Adware, Scareware, Pups & Browser Hijacking || tech talks group ||


Spyware have its main purpose is to gather information and send it back to the attacker, well, to
spy. The attackers don’t generally want to cause damage directly, but want to
compromise your privacy and anonymity based on some agenda they’ve got. Spyware
is intelligence gathering malware.

For example, a rootkit can also be a Trojan horse, someone could call spyware a
virus. The point is just to understand the variants that exist and the possible purpose
of the malware.

 Adware, which some people consider it to be a form of spyware. Is
undesirable software that forces advertisement on you. There are millions of different
variants of this. One of the most annoying and destructive form of adware is called
Cool Web Search. You may even have encountered it yourself, but there’s nothing
cool about it at all.

Know Your Enemy - The Current Threat and Vulnerability Landscape
It hijacks your default search engine, it displays ads in the browser, when you click
on links, it sometimes takes you to places that it wants you to go to instead of where
you want to actually go to, and it actively defends itself from being removed and
getting rid of it. So it’s particularly hard to shift. And there are many, many variants
of it that have affected millions of people.

When an adware or malware takes over your browser in this way, it’s known as
Browser Hijacking, and you might hear that term more throughout the course.
You should always pay particular attention when installing software because often,
a software install includes optional installs such as this browser hijacker that we’ve
just mentioned. So you can see here optional installs. And what you’ve got here is
installs that are going to be potential adware. So be very careful what you agree to
install.
Always opt for the custom installation and deselect anything that is not familiar,
especially optional software that you never wanted to download and install in the first
place. It goes without saying that you should not install software that you don’t trust.
Sometimes your device might come with adware preinstalled if you're particularly
unlucky. One of the worst cases was Lenovo preinstalling Superfish adware that not
only served you adverts based on what it knew about you from spying on you, it also
included a self-signed certificate allowing your browser TLS and SSL encryption to be
bypassed. So not very good of Lenovo there. In fact, I will never buy a Lenovo laptop
again because of that and all the rest of the things that Lenovo had done.

Scareware is a type of social engineering attack to trick a person into
believing in a threat that isn’t really real. So a common example is fake security
software claiming that you have malware infections or something like that. Often they
want you to pay something in order to fix the fake problem. These scams have been
extremely successful.
You can see here Personal Antivirus Software. It’s identifying all of these fake
vulnerabilities. And then it’s going to keep popping up, it’s going to keep causing
problems on your machine, and then people are fooled into paying for something to
remove the fake viruses.
And finally we have this catch all term. If it’s something that you might not have
wanted, these are called Potentially Unwanted Programs, or PUPs.
They’re called potentially unwanted because the antivirus companies and people
that attempt to remove these things aren’t quite sure whether you want them or not.
Most often, you don’t want them.
They’re annoying; the things that are bundled in with software. So again, they are
often bundled in with the software when you install, so you must make sure when
you install software, you go through the custom install and make sure you remove
any of these PUPs.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Saturday, 15 June 2019

Microsoft's New AI Lab provide training to India Students. || techtalksgroup ||


Microsoft will soon launch its new AI labs through which the tech giant aims to train as many as 1.5 lakh students across higher educational institutes in the country, the company said announcing its decision on Thursday.

As part of the programme, the tech giant will closely work with 10 educational institutes and will provide the needed infrastructure and guidance to the selected students.

BITS Pilani, BML Munjal University, ISB, Kalpataru Institute of Technology, KL University, Periyar University, Karunya University, SRM Institute of Science and Technology, SVKM (NMIMS) and Trident Academy of Technology are among the list of chosen 10 institutes across the country.


Maintaining that AI is crucial for reskilling the workforce of tomorrow,  Microsoft India President Anant Maheshwari said, “As AI becomes mainstream, organisations will require talent with skill sets that are very different from what exists now. Educators and institutions are integral to the skilling revolution taking root in the country.”

Apart from designing the curriculum and giving students access to its cloud and AI services, Microsoft will also train the faculties through workshops emerging technologies and provide assistance in strategising content and curricula for project-based and experiential learning.

Booming AI and Data Science market


The move comes in the wake of growing significance of artificial intelligence (AI) and machine learning (ML) related skills in the current job market.

As per a study by Analytical India Magazine which studied the analytical and data science jobs in India, In early 2019 alone, the total number of analytics and data science job positions available are 97,000, thus marking a 45% jump in the open job requirements, when compared to 2018.

The AI lab is one among the number of initiatives undertaken by Microsoft to promote AI in the country. In 2018, the PC-maker joined hands with NITI Aayog to lay the foundation for the country’s AI architecture. As per the agreement, Microsoft India will support Niti Aayog by combining the cloud, AI, research across several core areas including agriculture and healthcare and the environment.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Some Details which had been know so far for HongMeng "Ark" OS Huawei || techtalksgroup ||


The drama surrounding Huawei’s ban from importing and buying US products continues to unfold and the latest episode revolves around what is believed to be its answer to Android. Internally called “HongMeng”, the Android replacement is reportedly ready for deployment. Not next month, as an earlier report indicated but sometime starting later this year. What HongMeng really is continues to be a mystery but here are the breadcrumbs we’ve gathered about it from different corner of sources.

TechRadar earlier received word that Huawei’s homegrown OS is ready to launch commercially in June. The Chinese OEM corrected the misconception but also added a few interesting tidbits.

Foreseeing this exact situation, Huawei says it has been ready since January 2018 but held off releasing the OS to maintain its relationships with Google and other US-based partners. Now that those have cut their ties, it will be moving forward with a launch in China in late 2019 and a global release sometime in 2020.

It might be called Ark OS

“HongMeng” is just the operating system’s codename and Huawei knows it won’t do for a marketing name. It has apparently been filing trademarks across the world for an “Ark OS” name. While there’s no certainty that Ark OS is HongMeng’s commercial name, given the timing of the filings, it’s almost a sure thing.

It will run Android apps but may not be Android-based

WinFuture obtained some alleged screenshots of this Ark OS and it’s pretty clear it can run Android apps, complete with standard Android permissions. That’s pretty much a no brainer because, as the likes of Samsung’s Tizen OS and Jolla’s Sailfish OS or even Microsoft’s Windows Phone proved, HongMeng wouldn’t survive without a massive number of apps. Especially the most popular ones.

What’s still not certain, however, is whether HongMeng/Ark OS itself is based on Android or if it simply has a compatibility layer for Android apps. The latter, while possible, is extremely tricky and our bet is on a modification of the Android Open Source Project or AOSP.

It is compatible with the “Android Green Alliance”

The Android Green Alliance was formed in 2016 by Huawei, Tencent, Baidu, Alibaba, and NetEase in an effort to improve the quality of Android experience on Chinese phones. This does seem to confirm that Ark OS is indeed based on Android. Whether or not the other members of the alliance stand behind Huawei on this front is, of course, a different question altogether.

Huawei boasts it can make it on its own

Huawei, however, is almost boastful that it has all that it needs to keep its business running, except for Intel chips for PCs and servers. It is using its own Kirin chipset for its phones, of course, but also claims to have ARM-based processors and database software to replace Intel and Oracle. How that stands in light of ARM’s withdrawal from Huawei remains to be seen.

The company also says outright that Wi-Fi, Bluetooth, and SD card alliances actually stand to lose in keeping out a big contributor such as itself. As international standards, however, Huawei suggests it can use such technologies even without being part of that alliance.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Saturday, 1 June 2019

Top 10 Worst IT Jobs. || techtalksgroup ||

                The 10 Worst Jobs in IT
Source: The Best Computer Science Schools


Not every job in technology involves sitting in a comfy chair, analyzing data. Best Computer Science Schools has taken a look at some of the worst jobs in information technology and what makes them so dangerous, dirty or just plain disturbing.

Electronics assembly

With devices like cell phones and tablets becoming increasingly central to everyday life, those who assemble such devices are under growing strain to meet deadlines and deliver high-quality products. The stress recently led several employees of an Apple assembly factory in China to commit suicide. In addition, accusations have been leveled against other companies like Dell, HP and Samsung, claiming sweatshop conditions and exposure to radiation.

Undersea Internet cable repair

Think you are able to connect to another continent thanks to satellites? Think again. Massive undersea cables provide about 99 percent of the world's Internet connectivity. Workers have to lay those cables and then return to repair them in the event of a line break, which can be caused by everything from a ship's anchor to an undersea earthquake. Robots controlled by humans physically lay and bury the cables, but humans must haul in, fix and drop the tables. And since they're in the middle of the ocean, nature could intervene at any time.

Climbing towers

Cell phone-tower climbing has been called the most dangerous work in the country. These towers can reach heights of 2,000 feet, exposing workers to the very real risk of a deadly fall. And with the increasing reliance on cellular networks, more and more towers go up every year, with more workers exposed to those dangers all the time.


Network engineer

Engineers who troubleshoot networks often have to crawl through basements and attics, pulling equipment and repairing it. That's already a pretty gross job. Imagine doing all that in a war zone. Military network engineers are tasked with doing that very unglamorous job in dangerous areas, including in active conflict zones.

Recycling e-waste

Spent electronics aren't simply tossed into landfills and left to nature. Used hardware from the U.S. often travels halfway around the world to developing nations for workers there to smash so they can strip the valuable metals (gold, copper and silver included) from circuit boards. In addition to flying shards of glass, they often come into contact with dangerous minerals and chemicals, such as lead, mercury and brominated flame retardants, as well as acid to help reveal the valuable metals.

Sanitation

Like the developing world workers who reclaim precious metals from discarded computers, asset disposition firms analyze old computers from major companies, clean them up and decide if they must be trashed or if they can be refurbished. Many of the computers have been unused for years, so inside workers can encounter spiders, insects, dust, even animal carcasses.

Mining for "blood phones"

Conflict mining doesn't just apply to diamonds. Key ingredients for making electronics, such as tantalum, tin, tungsten and gold, are found in abundance in the eastern Congo. Hundreds of Congolese men, women and children dig through mountains and river streams for even small bits of these substances, while facing threat of armed groups, who make millions off these materials. While no companies have been able to completely certify their products are 100 percent conflict-free, many are moving in that direction.

Content reviewer

You know the bad stuff on the Internet? No, the really bad stuff - images of hate crimes, child abuse, torture, executions? Internet content reviewers get paid to filter out such material from social networks and photo-sharing sites. Some companies that employ content moderators also pay for free counseling for their employees.

System administration

While system administrators often work from behind a desk or in an office, they're also very frequently tasked with jobs far outside the scope of office work. System administrators often receive panicked phone calls or emails late at night (or very early in the morning), and they often deal with users who complicate their jobs by not being entirely truthful about their activities. And especially at smaller companies, system administrators are the ones who clean and maintain equipment and must MacGyver problems by engineering solutions on the fly.

Building infrastructure

Those who build communications infrastructure are at risk of falls and injuries. Those who work in war zones like Iraq and Afghanistan? Add the very real risk of being shot or caught up in a bomb blast. At least five telecommunications contractors have been killed in Iraq and Afghanistan, though numbers are unclear, since most work for private contractors.

SOURCES

PC World
How Stuff Works
Yahoo!

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit