Know More About Processors

So, guys in this article we will tell you something about processer like what is processer and how it works

 

“A processor is the logic circuitry that responds to and processes the basic instructions that drive a computer.”
A processor, or “microprocessor,” is a small chip that resides in computers and other electronic devices.

The basic work of processor is to receive input and provide the appropriate output as per the user requirement.

The central processor of computer is known as CPU (central processing unit).

Before Some years CPU has only one core it means that CPU has work on single task at a time

But in modern time companies like INTEL, AMD developed multi-core processors like Dual Core, quad core, octa-core etc. which represents that in duel core processor a both cores working on different tasks at a time it means that the working efficiency of processor is increased and it seems same in other multi core processors

 

Now how the processor is manufacture. There are four things

  1. Architecture
    2. Technology
    3. No. Of Cores
    4. Frequency

There is one company named as ARM. They make the design of processor and give it to manufacturer.

So, Guys this is all about processor if you want to know more about the Processor in detail visit YouTube.

Here is link- https://www.youtube.com/watch?v=cnyVgGT4vzg

PMG technical

Advertisements

Buy (RED). Give life.

It took Apple 10 years to create an iPhone that actually looks like an apple. Lol just kidding.
Apple Iphone Red, the sassiest of all, the coolest of all and the best part about it is for charity.
iPhone 7 and iPhone 7+(PRODUCT) RED Special Edition in a vibrant red aluminum finish, in recognition of more than 10 years of partnership between Apple and (RED).
 
The iPhone Red products are to celebrate the 10 years of their partnership with the AIDS charity (RED) founded by  U2 frontman Bono and activist Bobby Shriver. Apple is the world’s largest corporate donor to the Global Fund, having contributed more than $130 million (out of a total of $465 million the fund has raised)as part of its partnership with (RED) in the past ten years.
 
When most phone companies release a current handset in a new colour, it’s not news. But Apple isn’t most phone companies(To be honest I personally felt that they are mercilessly overpriced products, yes i don’t feel that anymore). There’s always been an appetite for its colour variants, from the day the iPhone 4 came out in white and subsequent iPhones added gold, rose gold, black and jet black to the range.
 
The new (PRODUCT) RED iPhone 7 and iPhone 7 Plus went on sale worldwide on March 24 in the US, Australia, China, Canada, the UK and the mainland Europe. The devices will be available in more than 40 countries. Apple has previously said that the phones will be available in India in April.
 

The new phones are 128GB or 256GB models, starting Rs. 70,000 and Rs. 82,000 in India. Here’s a breakdown of the Indian pricing for the red iPhone 7 and iPhone 7 Plus.

iPhone 7 (128GB): Rs. 70,000
iPhone 7 (256GB): Rs. 80,000
iPhone 7 Plus (128GB): Rs. 82,000
iPhone 7 Plus (256GB): Rs.92,000

Apart from the red casing, both smartphones are identical to the iPhone 7 line-up release in September 2016.

The price is the same as other colour iPhone 7 and 7 Plus models, too, though as with the jet black iPhone 7, it’s only available in the 128GB and 256GB capacity editions.

-Shaswat Dharaiya

WikiLeaks To Open “Vault 7”

As known to all WikiLeaks being an International Non-profit Organization that Publishes Secret Information, News Leaks, and Classified Media from anonymous sources had recently Publishes Largest ever release of Confidential Documents on the Central Intelligence Agency(CIA,USA).

The Huge sets of Files That it calls “Year Zero”

It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency. A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ The massive set includes a host of hacking secrets that could embarrass intelligence agencies and the US government, as well as undermine spying efforts across the world.

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks

The Vault 7!

  • “Year Zero” introduces CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
  • WikiLeaks claims that the CIA lost control of the majority of its Hacking Weapons including malware, viruses, Trojans, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
  • By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, Trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
  • The CIA had created, in effect, its “own NSA (National Security Agency)” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Secrets of information yet to emerge!

  • Access To All Kinds Of Smart Devices:

The US intelligence agency has been involved in a concerted effort to write various kinds of malware to spy on just about every piece of electronic equipment that people use. That includes iPhones, Androids, and computers running Windows, MacOS, and Linux.

If that software is as powerful as WikiLeaks claims, it could be used to remotely control those devices and switch them on and off. Once that happened, a vast array of data would be made available – including users’ locations, messages they had sent, and potentially everything heard by the microphone or seen by the camera.

  • Social Media Is Too Insecure:

Encrypted messaging apps are only as secure as the device they are used on – if an operating system is compromised, and then the messages can be read before they encrypted and sent to the other user. WikiLeaks claims that has happened, potentially meaning that messages have been compromised even if all of the usual precautions had been taken.

  • Smart TVs With Smart Spy Sensors:

One of the most eye-catching programs detailed in the documents is “Weeping Angel”. That allows intelligence agencies to install special software that allows TVs to be turned into listening devices – so that even when they appear to be switched off, they’re actually on.

  • Smart Cars And Its Crashings:

Many of the documents reference tools that appear to have dangerous and unknown uses. One file, for instance, shows that the CIA was looking into ways of remotely controlling cars and vans by hacking into them.

“The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations,” WikiLeaks notes, in an unproven piece of speculation.

  • The CIA Hid Vulnerabilities That Could Be Used By Hackers From Other Countries Or Governments:

WikiLeaks claims that its source handed over the documents in order to provoke a debate about the power of intelligence agencies and how their information should be exposed. Perhaps central to that is the accusation that the CIA was “hoarding” exploits that it had found – rather than handing them over to the companies that could fix them, and so make users safe, as they had promised to do.

Such bugs were found in the biggest consumer electronics in the world, including phones and computers made Apple, Google, and Microsoft. But those companies didn’t get the chance to fix those exploits because the agency kept them secret in order to keep using them, the documents suggest.

“Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumours of the vulnerability,” a WikiLeaks statement read. “If the CIA can discover such vulnerabilities so can others.”

WikiLeaks noted that those unfixed exploits affected everyone using the equipment, including “the U.S. Cabinet, Congress, top CEOs, system administrators, security officers, and engineers”.

More Is Yet To Come!

The documents have still not been looked through entirely. There are 8,378 pages of files, some of which have already been analyzed but many of which hasn’t. The files are being shared publicly on the WikiLeaks website and the organization has encouraged its supporters to keep looking through the documents in the hope of finding more stories.

 

Sources:https://wikileaks.org/ciav7p1/

MOBILE WORLD CONGRESS 2017

MWC is one fantastic event in the mobile world. Here the best mobile brands choose to launch their phones like Nokia,Motorola,Blackberry etc.

This Time Nokia has made a come back in the Mobile World Through The MWC Event.Some of the phones launched are :-

  1. Blackberry Keyone
  2. Huwai P10 & P10 Plus
  3. Nokia 3,5,6 & Nokia 3310 Relaunch
  4. Motorola Moto G5 & Moto G5 Plus
  5. Sony xperia xa1
  6. Sony Xperia xa1 ultra

& Many more device are launch

Some phones which we are personally waiting for are :

1.Blackberry Keyone

Specifications :-

-4.5 inch display with physical display

-7.1(Nougat) android os

-Touch screen display

-Quallcomn snapdragon 625 processor Octacore 2Ghz

– 3 GB RAM& 32 GB Internal storage

-Rear camera 12 MP f/2.0

-Front camera 8 MP

-Finger print sensor,Fast charging(3.0)

-Non-removable Li-Ion 3505 mAh battery

-Color : Black

Here comes the Nokia phones which are much awaited.

2.Nokia 3

Specifications :-

-5.0 inches display 720 x 1280 pixels

-Android OS, v7.0 (Nougat)

-Mediatek MT6737

-Quad-core 1.4 GHz

-16 GB Internal memory, 2GB Ram

-Rear camera 8MP f/2.0

-Front camera 8MP f/2.0

-Non-removable Li-Ion 2650 mAh battery

-Colors : Ceramic White, Dazzling Blue, Dazzling Gold, Graphite Black, Mystic Silver, Rose Gold, Greenery

3.Nokia 5

Specifications :-

-5.2 inch display 720 x 1280 pixels

-Android OS, v7.1.1 (Nougat)

-Qualcomn MSM8937 Snapdragon 430

-Octa-core 1.4 GHz

-Internal  memory 16 GB, 2 GB RAM

-Rear camera 13 MP, f/2.0

-Front camera 8 MP, f/2.0

-Non-removable Li-Ion 3000 mAh battery

-Colors : Tempered Blue, Silver, Matte Black, Copper

4.Nokia 6

Specifications :-

-5.5 inches display,1080 x 1920 pixels

-Android OS, v7.1.1 (Nougat)

-Qualcomm MSM8937 Snapdragon 430

-Octa-core 1.4 GHz

-32 GB, 3 GB RAM & 64 GB, 4 GB RAM

-Rear camera 16 MP, f/2.0

-Front camera 8 MP, f/2.0

-Non-removable Li-Ion 3000 mAh battery

-Colors : Arte Black, Matte Black, Tempered Blue, Silver, Copper

5.Nokia 3310

Specifications :-

-2.4 inches display ,240 x 320 pixels

-Internal Memory 16 GB expandable up to 32 GB

-Primary  2 MP, LED flash CAMERA

-Removable Li-Ion 1200 mAh battery

-Colors-Warm Red (Glossy), Dark Blue (Matte), Yellow (Glossy), Grey (Matte)

For more about smart devices, technology and any question related to technology and app review please subcribe to our channel on YOUTUBE. 

Link – https://www.youtube.com/results?search_query=pmg+technical

-PMG Technical

 

 

 

GitHub & Git

Git is now-a-days one of the most handy tools for team of developers working on project and changes the code every now and then. Git is known as Version Control System (VCS). The original author of Git is Linus Torvalds, the same guy who developed the linux kernel. Git focuses on keeping track of every changes made in distributed development projects.

Features of Git includes:
1) Keep track of changes especially text changes
2) Source Code Management (SCM)
3) Version Control System (VCS)

Most of the users make changes in their own repository instead of making changes in the central one. So, the version of files in the central repository remains unchanged. Git can be used by programmers and developers as it keeps track of changes made in source files like HTML, CSS, Javascript, Scala, Shell Script, Perl, Python, but on the other hand it is not useful to track non-text files like images, music, fonts, spreadsheets, PDFs.

Following is the basic idea of GitHub.

  • Creation of Branch
    In git, foremost part is branching, work flow of GitHub rely completely on it. There is only one golden rule: anything in master branch is always deployable. Changes made in other branches never affects the master branch so one is free to make changes in those files.
  • Commits
    Whenever a branch is created, operations like adding, deleting, editing of files starts, and the last step is making a commit and adding it to particular branch. Every commit that is made consist a message which explains why the changes were made. Once the commits are made, the file is then pushed to the server.
  • Pull
    As soon as commit is done, other members of team can see the changes and it can be merged once they accept your request. There are different models like fork and pull model and shared repository model. In fork and pull, it notifies other users about changes. While in shared repository, it helps to start code review before merging into master branch.
  • Deploy
    After reviewing of PULL request, deployment of changes and verification is done.
  • Merge
    Step after the verification is merging. Once the merge is requested, PULL request stores the history of all changes that were made. At last code is merged to the master branch.

Image Source:
https://git-scm.com/
https://github.com/

Download git from:
https://git-scm.com/downloads

– Karan Kharecha

Nokia is back with a Bang!

The first Nokia android phone has got tremendous response in china market.Nokia has announced it’s first android device Nokia 6.According to Chinese media reports Nokia smartphones have record breaking flash sales. But according to HMD Global, which owns rights to the Nokia brand, has now clarified that the Nokia 6 wasn’t being sold via JD.com following flash sales model. HMD Global wrote to Nokia Power User clarifying that the Nokia 6 is selling too quickly giving an impression that it may be available under flash sale model. “Actually we have been updating the inventory on JD.com more than 3 times but those were usually gone within minutes or hours, so that’s why you have the impression that we were doing flash sales,” said the HMD Global team.In China Nokia is rocking big time.Now let us see the revised features of Nokia 6.

8

Features:

With the arrival of Nokia 6, consumers will see superior craftsmanship and design quality in action. It takes 55 minutes to machine a single Nokia 6 from a solid block of 6000 series aluminium. It then receives two separate anodizing processes, taking over ten hours to complete, with each phone being polished in no less than five times. The end result is an aluminium uni-body with the highest level of visual and structural quality.

Delivering quality to the core, the Nokia 6 display has a bright hybrid in-cell 5.5” screen with full HD resolution and incredible colour reproduction wrapped in 2.5D Gorilla Glass. The display stack is laminated together with a polarizer layer enabling excellent sunlight readability and slim form. The build is completed with the latest generation Qualcomm Snapdragon™ 430 processor with X6 LTE modem designed for excellent battery life and superior graphics performance.

The Nokia 6 has 4GB RAM and 64GB storage to run the latest version of Android Nougat and is packed with entertainment to bring to life the latest that Android has to offer. The dual amplifiers deliver a 6 dB louder sound than a regular amp, giving higher voice, deeper bass and unmatched clarity. Dolby Atmos creates powerful, moving audio that seems to flow all around users. The Nokia 6 packs a 16MP phase detection auto focus rear camera for sharp detailed pictures, and an 8MP front camera. The f/2.0 aperture lenses and exclusive camera UI with automatic scene detection make it easy to take great shots every time.

These are some features of Nokia 6, it is priced at 1699 CNY in China. If we convert into India rupees it will be approximately 17000 Rupees.Still the HMD team have not confirmed the release date in India but we have to see the response Nokia will get in India.In  India, Nokia Symbian phones rule the market.The Nokia windows phone let the game over in smartphone market in 2015.At this point according to price and features the Nokia gives tough competition to other android phones. The main thing will it gain back it’s trust and service which was the best from Nokia.The mobile world congress (MWC) will be important for Nokia.New smartphones will be announced in Mobile World congress in Barcelona which will be held on 27 February 2017.

Source: http://www.hmdglobal.com/

-Jay Lodhiya

Cloud

Just like data itself, data storage in cloud is continuously evolving and  trending topic now-a-days. Cloud Data Storage refers to the storage of  repository on one or more servers, in one or more locations. Today, there are many companies that provides full functionality of cloud data storage. Amazon Web Services (AWS) firstly allowed the users to  do something that wasn’t done previously. Cloud Data Storage is offered by several companies:

companies

  • Google Cloud Platform
  • HP
  • Box
  • ORACLE
  • Zetta
  • Rackspace
  • Microsoft

Cloud Data Services is utilized immensely as it gives the benefits of  Application Data (regardless of location of users), routine of archives and backups along with long term storage. With the increasing data lies greater responsibility, that means cloud storage provider must implement strong and constantly updating strategies in order to keep the data safe and not accessible by unauthorized users which may cause violation in user’s privacy. Services includes: Online management (importing, exporting and backing up the data), API access and optimization that comprises setting up transfer of multiple data objects for better efficiency.

Data is typically termed as objects in cloud storage, it can be discrete entities like documents, files, images, audio, video (uncompressed as well as compressed). Larger files gets split into parts i.e., segmenting and then it gets uploaded as an whole object with unique ID. Access list can be modified by the clients at container level and at object level, basically objects are stored in containers. Initially only primary administrator has access to the container.

latencyManaging Database Content: Cloud can handle structured as well as un-structured data. Google and HP cloud platform focuses on SQL Databases while others like Rackspace supports PERCONA and MariaDB. Relational Database Features gives the benefit of data durability by replicating the data across different data servers and it also decreases latency. As data is replicated because of multiple locations, backups are created automatically. The most responsive database system that is capable of scaling to massive size is NoSQL.

Key advantage of cloud storage is global availability, data access controlling can be categorize into giving access to individuals, groups and domains (IP address and subnet range). These permissions are called access control lists, most common language that is used to create list is XML and JSON.

Security Concern can be break into two main areas:security
1) In transition mode: when data is transferring to/from storage host.
2) At rest: when data is stored on remote server

During transition data can be protected using HTTPS and SSL protocols, even on client side data encryption is favorable. When the data is stored on servers, data encryption can be done on server side.

In conclusion for maintenance, there are four things that cloud must work with:

  • Security
  • Latency
  • Scalability
  • Replication

 

– Karan Kharecha

Google to help Indian SMB’s go digital

Sundar Pichai rang the new year bells by visiting India and conducting Digital Unlocked event on January 4th Wednesday at Delhi. The main focus of this event was SMB’s. Pichai announced the launch of new tools, training and support systems for SMB’s in India. IT Minister, Ravi Shankar Prasad was also present at this event.
During a series of announcements, Sundar Pichai mentioned about “ My Business Website” which is to be launched this year. It will provide a comfortable platform for businesses to create a simple, professional and mobile-optimized website in less than ten minutes for free.

The company has launched a certification course for SMBs in collaboration with ISB.  It will collaborate with FICCI to conduct around 5000 workshops covering 40 cities in three years. In addition to this they also launched “Primer” which is a free mobile app that will teach digital marketing skills in a simple way. It works offline too and is currently available in English and Hindi languages.
The company is looking forward to empower India’s 51 million strong SMBs community. As a reference to this Pichai said, “Today, anyone can become an entrepreneur, but it is important that they have the right tools and skills to digitalize.” A KPMG report says that this enhancement of SMBs will help increase their contribution in India’s GDP by 10%, taking it up to 46-48% by 2020.

Putting it in a nutshell, this initiative will definitely help India move a step forward in the era of digital revolution. Cheers to an Indian!!

-Ruchika Joshi

Bit of Bitcoins

c__data_users_defapps_appdata_internetexplorer_temp_saved-images_bitcoin_625x300_71385614524Trending in news these week the price of Bitcoins gets lots of up and down remarkably in its History.Also due to Demonetization in India, Digital Money is at its peak promoting many payment methods.Among which the one  is trending these days are BITCOINS…

BITCOINS..??

Bitcoins is a form of virtual currency but it does not mean if you have bitcoins you can physically purchase goods by handing notes or tokens to the seller. Bitcoins are used for electronic purchases and transfers. You can use bitcoins to pay friends, merchants, etc. Every single purchase is immediately logged digitally (on computers) on a transaction log that tracks the time of purchase and who owns how many bitcoins.This digital transaction log is called ‘blockchain’.

The blockchain records every single transaction – of present and past – and the ownership of every single bitcoin in circulation. The people who are constantly verifying the blockchain, ensuring that all the information is correct and updating it each time a transaction is made, are called ‘miners’. One way to think of miners is: they those who confirm transactions. Their job is to ensure that the transaction is secure and processed properly and safely. In return for their services, miners are paid fees by the vendors/merchants of each transaction and are also given physical, minted bitcoins.

Bitcoins are growing in popularity, and although they were largely used by speculators who were looking at it as a way to make money by buying bitcoins at lower prices and selling them at higher prices just like Foreign exchange or Forex .There is a growing trend of businesses accepting Bitcoin as a form of payment. Many big companies like WordPress, Overstock.com, and Reddit accept Bitcoin, and a growing numbers of brick and mortar stores are starting to accept them internationally as well. More than $1.5 billion worth of bitcoins are currently in circulation around the world, with millions of transactions occurring daily. Needless to say, the popularity and usage of Bitcoin is picking up very quickly as more and more businesses and individuals are becoming aware of its benefits and advantages over traditional currencies.

c__data_users_defapps_appdata_internetexplorer_temp_saved-images_295x200_41388158046

It’s Price??

1 Bitcoin = 65189.1572 Indian rupees

Bitcoins are like any other currency: they  in value relative to other currencies. Similar to how the rupee’s valuation changes wildly against the US dollar this year, bitcoins have had drastic movements in price as well,but there is no centralized exchange for it.

There is no ‘fixed’ price.Usually, it’s the seller’s responsibility to give a fair price to the buyer based on what rate bitcoins are being traded in elsewhere. The difference between bitcoins and other currencies is that there is no centralised bank that prints the currency and sets relative values. Through transactions, the value of bitcoin fluctuates through supply and demand.

Benefits of Bitcoins!!

One of the main benefit for using the Bitcoins is its Transaction Rates.In Credit card usually 2-3% transaction fees are supposed to pay by customer.With Bitcoins, there are little to no fees involved.

The greatest advantage, however, is that all necessary information is public and transparent. Without revealing the identities of the buyer and seller, the entire bitcoin network is made aware of each and every transaction. This gives a tremendous amount of comfort to both parties of the transaction.

The Keys!!

There are two components to a Bitcoin address:

Public address(Key)

Private address(Key)

Each Bitcoin address has its own Bitcoin balance. Every time a transaction is made, the public address of each user is made public to the entire network. Therefore, it is recommended that the sender creates a new address for each transaction.

A bitcoin user can freely share his public address with everybody. His private address, however, is only for him to know. This is critical in that this is what allows Bitcoin to be a secure payment system.

How to get That?

‘Bitcoin wallet’.

Bitcoin wallet is first required to get started with using bitcoins. A wallet can be created easily through different online applications. Your Bitcoin wallet is essentially just like, well, any other wallet.

Unocoin,Zebpay,CoinSecure are one of the leading Wallets that are being used in India.

3 Ways to Get The Coins!!

  • If you are selling a good, you can accept bitcoins as a form of payment.
  • You can purchase and sell bitcoins through Bitcoin exchanges (this is the most common way. Exchanges are typically found online.)
  • You can trade bitcoins for traditional currencies of countries.

-Deep Kakkad

BEWARE OF GOOLIGAN!

ATTENTION android users, you have one more threat to worry about! Gooligan malware has breached the security of over one million Google accounts. The malware steals authentication tokens that can be used to access data from Gmail, Google Photos, Google Drive, and many more.

According to the Check Point research firm, it affects Android Jelly Bean, Kit-Kat and Lollipop users, which is basically 74% of the phones in the market. Over 57% of these phones are in Asia. The firm says they found multiple fake applications which were infected with the malware and those who’ve download these apps will find their devices are impacted by Gooligan. Check Point’s website has a full list of apps that are infected by this on their official blog.

What does Gooligan do?

Every day Gooligan installs at least 30,000 apps fraudulently on breached devices or over 2 million apps since the campaign began. Once the infected app is installed, “it sends data about the device to the campaign’s Command and Control (C&C) server.” From there a rootkit is downloaded on the device, thanks to several security patches missing from phones running Android 4, 5. The rootkit then gives hacked full control of the device, who can then run “privileged commands remotely,” and steal authorised tokens which bypasses the need for two-factor authentication. Gooligan also injects a new “malicious module” into Google Play, which allows it to steal email data, install app from the Store and raise their ranking, install adware, etc. Check Point found how victims had left ratings, reviews for some apps even when they had no knowledge of installing the app.

What should you do?

Check Point has a website created called (https) gooligan.checkpoint.com where users can enter their Gmail address and check if it was breached. For those whose accounts were breached, Check Point recommends flashing your phone, and a re-installation of the OS on the mobile device.

Check Point had reached out to the Google Security team immediately with information on this campaign. It is believe that it is the largest Google account breach to date, and they are working with Google to continue the investigation. Till then, it is advised that Android users should validate if their accounts have been breached.

-Ruchika Joshi