vol43 cq jul19 - mayo college · 2019. 8. 13. · remember the collection #1...
TRANSCRIPT
TheM
ayo
Colle
ge
ITM
a
gaz
ine
Vol.43@Jul 2019
A career in IT is
something which
every student looks up
t o a s a f a s c i n a t i n g
d e s t i n a t i o n t o w o r k .
Researching available options can
be overwhelming and exhausting,
but honing in on what you want to
do and pursuing it relentlessly will
give you the best chance of success.
Computer
programmers write and test the code that allows computer
applications and programs to function. They may translate the
designs of software developers and engineers into workable code.
Computer hardware engineers manage the
physical components that make computers run. When new software changes
users' needs, these professionals redesign hardware to work with the new
programs. Candidates typically need at least a bachelor's degree to land hardware
computer engineering jobs.
Software developers use various source debuggers and visual
development environments to modify, write and debug software for client applications. They also
document and test client software and write code to create applications that either stand alone or boost
access to servers and services.
Computer and information system managers generally oversee the information technology
departments within a business or an organization. A systems manager may offer support on an as needed basis,
while larger organizations may require larger IT departments with a more hands-on systems manager role.
Web development is a specialized type of computer programming focussed on websites and web
applications. Though often used interchangeably, web development and web design differ in key areas. Web design
deals with the front-end of a site and concerns itself with appearance and user experience, while web development
deals with building technical front-end and/or back-end code that informs site function.
Computer systems analysts or system architects, work with companies, institutions, and
independent clients to survey and diagnose database program issues, resolve user complaints, and advise
management about systems innovations to improve productivity.
- A career in artificial intelligence can be realized within a variety of settings including private companies, public
organizations, education, arts, healthcare facilities, government agencies
and the military. Some positions may require security clearance prior to
hiring depending on the sensitivity of information employees may be
expected to handle. Examples of specific jobs held by AI professionals
include:
Software analysts and developers; Computer scientists and computer
engineers; Algorithm specialists; Research scientists and engineering
consultants; Mechanical engineers and maintenance technicians;
Manufacturing and electrical engineers; Surgical technicians working with
robotic tools.
Software Engineer; 3-D Professional; Augment Reality Developer; 3-D
game developer; Unity Developer; Technical Architect AR; Consultant AR; AR
designer
- VR Game Engineer; Mixed Reality Artist; Content Lead (Oculus); Rigger;
VR Sound Effects Specialist; Unity Developers.
Computer Programmer -
Hardware Engineer -
Software Developer -
Systems Manager -
Web Developer -
Systems Analyst -
AI
AR -
VR
Some of the jobs in AR & VR are:
Careers in IT
Google Assistant can now read you a Story
If you enjoyed falling asleep to the sound of classic fables like “The Three
Little Pigs” and “Cinderella” during bedtime as a child, then Google has just
the thing for you. The company’s popular virtual assistant, Google Assistant,
can now read you a story if you ask it to. Google rolled the update out to
Google Assistant on Android and iOS devices in the US, UK, Canada, Aus-
tralia, and India on National Tell a Story Day (April 27).
For the new Tell Me a Story feature to work, the Google Play Books app must
first be installed on your iPhone or Android smartphone. Then, to listen to
any random story, all you have to do is trigger Google Assistant on your
phone and say, “Tell me a story”. This will prompt Google to read out stories like “Let’s Be Firefighters!” (Blaze and the
Monster Machines), “Robot Rampage” (Teenage Mutant Ninja Turtles), and others. Calling out to Google Assistant
when a story is being read you can pause, resume, go back, and skip ahead within the story.
Facebook Developing voice assistant to rival Alexa,
Siri and Google Assistant: Report
Facebook is reportedly working on an Artificial Intelligence
powered virtual assistant that will rival the likes of Amazon
Alexa, Apple's Siri and Google Assistant. Citing several people
familiar with the matter, CNBC reported that the social media
company has been working on the initiative since early 2018.
The augmented reality and virtual reality group that works on
hardware, like Oculus VR headsets is a part of the development
team of Facebook's assistant. Currently, it is not known how and
where the company will incorporate the assistant. Since the
hardware team is a part of the scheme of things, it should be safe
to say that Facebook may develop a new hardware with the
Assistant. The social media giant has already launched Portal
devices that let users make video calls using Facebook
Messenger. The devices come equipped with Amazon's Alexa
virtual assistant to handle tasks like check sports scores, weather,
control smart home devices, among others.
According to Strategy Analytics, Amazon led the
smart speaker market with 35.6 percent share
globally in the fourth quarter of 2018. Google's smart
speaker share also rose 29.9 percent, while Apple
captured 4.9 percent share.
Delete Internet Explorer: Hackers Can Spy On Your PC
There is a reason no one with the slightest tech inclination uses Internet Explorer anymore. Not only
is Microsoft's old browser slow and outdated, it is also incredibly insecure. But it turns out you don't
even need to use it for it to compromise your data to hackers. Cybersecurity researcher John Page has
just published a report revealing an unpatched exploit in the way Internet Explorer handles MHT files,
the browser's web archive format. Using this, hackers can access your IE
browser to both spy on your system as well as steal your local data. Even
worse, Windows uses Internet explorer to open MHT files by default. That
means you don’t even need to be using the browser, you just need to click
on the email or chat attachment with the file to open it. And this exploit
can affect WIndows 7, WIndows 10, and Windows Server 2012 R2.
NCSC Reveals list of World’s most Hacked Passwords
Passwords have become one of the most important aspects of human life. Either it is your
social networking or internet banking account, it is very important to keep it secured with a
strong password. But people are not taking this seriously. They are still using common
passwords.
According to the UK's National Cyber Security Center (NCSC) global breach analysis report,
23.2 million people whose passwords have been hacked used '123456' as their password.
Similarly, 'qwerty' and 'password' still appears on the list.
The analysis has covered the 100,000 re-occurring passwords accessed by hackers worldwide. The data is
taken from Have I Been Pwned, a security website run by highly esteemed security professional Troy Hunt.
After going to through the reports, it seems there are millions of people who are making zero effort with passwords.
Don't know it is their laziness or what but people are even using '1111111', own names, football teams, musicians,
fictional characters (Batman), etc as their passwords.
Well, it is not possible to share the complete list of world's most hacked passwords here. But let's have a look at Top
18 most used passwords.
The number of online attacks
has increased too much, and
t h e l i s t o f t h e wo rst
passwords is still the same. It
means people are not paying
attention to their security.
Remember the Collection #1
breach, for example, in which
billion email addresses and
passwords have been posted
on a hacking forum for
everyone. Also, there were
m a n y b r e a c h e s t h a t
happened last year like
Marriott, British Airways and
Facebook.
You could complain that
some organisations are not
taking people's data security
seriously. But one thing you
can definitely do to secure your accounts by following the best practices while choosing your passwords.
Needless to say, if you found any of your passwords on the list, change that right now. You can also start following
some simple guidelines like choosing long password mix of capital letters, small letters, numbers and symbols.
The report also revealed that less than half of people surveyed by the NCSC says they do not always use a strong,
separate password for their main email account. If you are thinking that remembering too many passwords is tough,
believe, you don't have to. You can use wonderful applications like LastPass or Dashlane to keep your passwords
safe.
"Password managers, whether an app, built into your browser or your device, can help with the burden of
remembering lots of different passwords. Just remember to make your master password strong.
Top 18 Most Hacked Passwords
How to Keep Online Presence Safe?
HUMOUR SECTION
Chief Editor
S.Sriram
Chief Editor
S.Sriram
Designed: Sandeep MishraInformation By: Himani Jain