Category Archives: Recent Activity

Thunderbolt 4 Is Getting Underway

OK, then: first things first. Thunderbolt is a joint technology effort from Intel and Apple. The first iteration appeared in 2011, and version 4 (aka Thunderbolt 4) is just showing up in the marketplace. Intel’s 11th gen processors and supporting motherboards are the first to provide native Thunderbolt 4. And of course, add-on PCIe cards for Thunderbolt 4 are also starting to trickle out (see this ASUS item, for example). Hence the assertion that heads this story: Thunderbolt 4 is getting underway.

I’ve had recent experience to show me that the speed advantages it can confer are measurable and tangible. At the same time, I’ve learned that the right cables can — and do — make huge differences.

What Thunderbolt 4 Is Getting Underway Really Means

The following table sums up the differences among Thunderbolt 3 and 4, and USB 3 and 4 versions. Basically, it offers more and faster capabilities, but is limited to special, certified cables no more than 2M in length. It can also handle either 2 4K displays or 1 8K display, and works with the latest PCIe 32Gbps lanes. It is, in fact, a pretty strong argument for all-around hardware upgrades (mobo and ports, cables, and peripherals) all by itself. Check the table for details, please.

. Thunderbolt 4 Thunderbolt 3 USB4 USB 3/DP
1 universal port
40Gb/s cables up to 2 meters
Accessories with up to 4 TB ports
Min PC speed requirement 40Gb/s 40Gb/s 20Gb/s
(40Gb/s is optional)
10Gb/s
MinPC video requirement 2 x 4K displays
or
1. x 8K display
1 x 4K display 1` display (no min resolution) 1 display (no min resolution)
Min PC data requirements PCIe 32Gb/s
USB.3.2 10Gb/s
PCIe 16Gb/s
USB 3.2 10Gb/s
USB.3.2 10Gb/s USB 3.2 5Gb/s
PC charging port required At least one
PC wake from sleep w/TB dock connected Required
MinPC port power for accessories 15W 15W 7.5W 4.5W
Thunderbolt networking
Mandatory certification for PCs and accessories
Intel VT-d based DMA protection required
USB4 specification Compliant Compatible Compliant Compatible
Source: Table from 11/20/2020 Liliputing story about Thunderbolt and USB versions.

What I Plan To Do About Thunderbolt 4

I’ve got a new PC build in my relatively near future (as soon as finances allow). I’ll be making sure to pick motherboard and CPU with Thunderbolt 4 support. I’m looking around right now and while some cases do offer USB-C support, none of them have caught up to Thunderbolt 4 capability just yet. I may end up waiting for that to occur, and go ahead and recycle the trusty old Antec 902 case I recently reclaimed from my sister. This may take some further thought and research. Stay tuned!

Facebooklinkedin
Facebooklinkedin

20H2 Builds Bring Windows Tools Folder

Fascinating. Thanks to a recent item from Sergey Tkachenko at WinAero.com, I’ve just learned that 20H2 builds bring Windows Tools folder into the Windows 10 mix. It’s depicted in the lead-in graphic for this story. Not coincidentally, it also happens to show a pretty stunning assemblage of modern, fluent icons, too.

If 20H2 Builds Bring Windows Tools Folder, What Goes Missing?

In this case, however, when Microsoft giveth, it also taketh away. Users who go looking for a number of long-standing, familiar folders in 20H2 will find them MIA. The Windows Tools Folder has supplanted all of them. Here’s a list of those gone but not forgotten folders (in bold text), with their subsidiary contents:

Windows Accessories
  Character Map
  Internet Explorer
  Math Input Panel
  Notepad
  Paint
  Print 3D
  Quick Assist
  Remote Desktop Connection
  Snipping Tool
  Steps Recorder
  Windows Fax and Scan
  WordPad
Windows System
  Command Prompt
  Control Panel
  File Explorer
  Run
  Task Manager
  This PC
  Windows Administrative Tools
Windows Administrative Tools
  Component Services
  Computer Management
  Defragment and Optimize Drives
  Disk Cleanup
  Event Viewer
  iSCSI Initiator
  Local Security Policy
  ODBC Data Sources (32-bit)
  ODBC Data Sources (64-bit)
  Performance Monitor
  Print Management
  Recovery Drive
  Registry Editor
  Resource Monitor
  Services
  System Configuration
  System Information
  Task Scheduler
  Windows Defender Firewall ...
  Windows Memory Diagnostic
Windows PowerShell
  Windows PowerShell
  Windows PowerShell (x86)
  Windows PowerShell ISE
  Windows PowerShell ISE (x86)

Wow! That’s a LOT of stuff. And for a long time, some Windows users have depended on these folder names to navigate to specific content items they cover. No longer! Starting with 20H2, it’s out with those older folders and in with Windows Tools. WinAero also offers a story on how to navigate to these nearly-departed folders if you’d like a quick refresher: How to Find the Windows Accessories folder.

Getting to Windows Tools in 20H2

As is so often the case in Windows, there are many ways to get to a named item through the menus. You can simply type “Windows Tools” into the Start Menu Search box. Or you can find “Windows Tools” in Control Panel. Once accessed in Explorer, it’s also readily found in Recent Files under the Quick Access item.

It’s the wave of the future. If you’ve got access to a Dev Channel (20H2) build, it’s probably worth exploring. And indeed, I like the way it brings all those things together inside a single folder. Good stuff!

Facebooklinkedin
Facebooklinkedin

Store Gets Snipping Tools With Build 21354

Here’s an interesting tidbit to ponder. The Insider Dev Channel 21354 announcement included the information shown in this story’s lead-in graphic. To recap: it says that Snipping Tool and Snip & Sketch have been packaged together. Going forward, they will now get updates through the MS Store. Hence my title: Store Gets Snipping Tools with Build 31354.

Sure enough: I visited the Store on one of my Dev Channel test PCs after the upgrade. As you can see in the preceding image, Snip & Sketch now appears there. (If you check update history in the Store, you’ll see it’s getting updates via the Store now, too.)

If Store Gets Snipping Tools with Build 21354, Where’s the Other One?

There’s a teeny-tiny little gotcha in this change worth noting.  It appears in italics in the snippet from the 21354 Announcement up above. Because it’s partially obscured, I repeat that text here:

Insiders who previously did not have Snip & Sketch installed will see Snipping Tool removed after updating to this build and will have to  go and install Snip & Sketch from the Store to get it back.

Because the two tools are now conjoined and Snipping Tool is not listed independently, you MUST grab and install Snip & Sketch to continue using either or both of them. This applies universally, but only affects users who hadn’t already installed Snip & Sketch.

As a determined and far-ranging Insider I installed Snip & Sketch as soon as it was made public in October 2018. Thus, a word of warning. Those who reach for Snipping Tool out of habit and haven’t yet installed Snip & Sketch must now do so, to keep Snipping Tool available. Of course, this applies to Dev Channel builds only.

I’d long thought MS would simply retire Snipping Tool and forcibly move users to Snip & Sketch. Looks like they’ve decided to keep them both alive, but to maintain them through Snip & Sketch in the Windows Store. That’s what makes this interesting and intriguing. Check it out!

Facebooklinkedin
Facebooklinkedin

Dell BIOS Update Covers Many Sins

I’ve got a pretty new Dell OptiPlex 7080 Micro SFF PC here at the house. Today, I went through the first BIOS upgrade since I first obtained that machine. When I opine that a Dell BIOS update covers many sins, I mean there was a lot more going on and involved than I expected. The so-called BIOS update was, in fact, 5 updates rolled into one update package. I used the Dell Command | Update utility to handle this, and am climbing its learning curve as well.

How I Learned That Dell BIOS Update Covers Many Sins

At first, because the utility also found a couple of other items to update, I couldn’t get the Command | Update utility to work. Then it dawned on me: perhaps the BIOS update needs to be run by itself? Indeed, that proved to be the ticket to eventual success. It also showed me 5 separate items being updated as the so-called “BIOS Update” was applied:

  1. BIOS
  2. USB-C firmware
  3. Intel Management Engine (IME) firmware
  4. Primary BIOS EC (Embedded Controller) update
  5. Backup BIOS EC update

Thus, where I’d been thinking this was a straight-up, in-and-out BIOS update, it was actually a whole bunch of chained updates that included other device controllers, IME, and embedded controllers. Not having a lot of experience in dealing with such updates from Dell lately, this came as a surprise.

All’s Well That Ends That Way

But once I put my thinking cap on, it became obvious that BIOS updates — which invariably require a restart to be applied, and another to take effect — are best handled separately from other updates. That seems to reflect recent experience with Lenovo updates too, now that I think upon the subject.

In fact, I wrote about a similar situation on March 24 in a post entitled Lenovo Vantage Updates Take Patience. Maybe I should try that thinking cap more often: it seems to work reasonably well!

 

Facebooklinkedin
Facebooklinkedin

Losing Win10 A/B Testing Wagers

I don’t know why this keeps happening to me. But it seems like whenever I learn that MS is A/B testing a new feature or function in an Insider Preview build, my test machines miss out. I don’t know how MS selects who gets and who misses such options, but I do hate losing Win10 A/B testing wagers. Case in point: the recent News & Interests notification area item.

What Is A/B Testing Anyway?

A/B testing started as a way to check web page designs. In that world, half of visitors see one version of a page, and half see the other. The developers analyze how the versions do, and pick the one that does the best.

In general, A/B testing means that half of a population get to see and interact with a feature, while the other half do not. That said, workarounds may be possible. Thus, for example, WinAero provided enable/disable batch files to turn the feature on and off in Builds 21286 (Dev Channel) early in January.

I just noticed that after the latest upgrade to build 21354, News & Interests no longer appears in my notification area. Indeed, the WinAero method still works to turn it off or on, but my plaint is that I keep coming up on the “have-not” side of such A/B tests, be that either A or B.

What Losing Win10 A/B Testing Wagers Means

To me, not getting to see or interact with an A/B feature means missing out on something new and potentially interesting or valuable. In the case of News & Interests, it means a minor inconvenience to be sure. Even so, I’d prefer to have the opportunity to interact with and provide feedback on new features to better do my job as a Windows Insider.

If I could ask the Insider Team for a favor, I’d ask them to build an “opt-in” apparatus when A/B features come out. Rather that purely random selection of who gets and who misses the A/B feature, it would be nice to have some way to request a download or a pre-update opt-in.

Why do I ask for this? Because invariably all of my test machines and VMs are denied A/B features when I come up a loser. I would like to test everything I can, especially new features, if not on all machines, then at least some of them. Is that too much to ask?

[Note on lead-in graphic for this story: I cheerfully confess I grabbed and cropped a screencap from Thurrott.com about this feature from a January 6 story. I can’t make a working copy of this details pane on my blocked-out test machines. Thanks, Paul!]

Facebooklinkedin
Facebooklinkedin

SSD-Z Is Interesting But Incomplete

I’ve been mucking around with SSDs quite a bit lately. Yesterday, that had me rooting around for a utility I could use to tell me more about all of my many SSDs. When I found a utility named SSD-Z (think of Frank Delattre’s outstanding CPU-Z) I was sure I had struck gold. Alas, it’s not quite at the same level as Delattre’s tool, even though it is pretty interesting.

SSD-Z Is Interesting But Incomplete.vertex4Why Say: SSD-Z Is Interesting But Incomplete?

The tool did a great job of telling me more about my older SSDs, If you look at the preceding screenshot, it’s pretty effusive and complete about my nominal 250 GB OCZ-Vertex4 SSD. But if you look at the next screenshot, it’s mostly mum about my no-longer-new-but-still-capable Samsung 950. This runs on my daily driver and is now 6 years old, and still gets the job done.

SSD-Z Is Interesting But Incomplete.sam950

Not much detail here.

What’s remarkable is how little information appears. There’s no data about flash technology, cells, controller, NAND or speed info. TRIM is supported, despite a counter-protestation. Sigh. I’m disappointed.

Upon further investigation, I see the developer hasn’t updated the tool since 2016 (not too much later than I bought the Samsung 950). I guess this is a tougher problem than one might think, at first. I’m sorry to say that SSD-Z doesn’t pass muster, though it does provide a good model of what might be possible, given enough SSD data from the community.

Vendor Tools Might Be More Informative

In looking at an Enterprise Storage Forum story from 2019, I see that vendor tools are most likely to provide details about controller, flash technologies, and so forth.  Samsung, Intel, OCZ, Crucial, and Kingston come in for specific mention. And indeed, Samsung Magician tells me more about all of my Samsung SSDs — even OEM models — than does SSD-Z. The same is true for other vendor-specific tools, when one has drives from those vendors to check into.

Gosh! I’d love to see SSD-Z deliver on its implicit promises. We could all use a utility like that, right? The TechPowerUp contributor behind this tantalizing item, Aezay, has not posted there since 2018. If he’s out there and paying attention, I’d be happy to co-drive a crowdfunding effort to do this tool right, and help the whole community. This leads me to echo the excellent Pink Floyd lyric: “Is there anybody out there?” And that’s the way things go sometimes, here in Windows-World.

Stay tuned: if anything interesting turns up, I’ll report back. Yowza!

Facebooklinkedin
Facebooklinkedin

New Device May Require Second Reboot

In installing the Kioxia (Toshiba) M.2 SSD late last week, I was reminded of something interesting. Hence this article title: new device may require second reboot. In my rush to set up and learn more about the drive, I was initially surprised to find it absent when I first ran Disk Management (diskmgmt.msc) to get that process going. Then it hit me: maybe it’s not showing up in UEFI.

But to access UEFI, another reboot was required. And by the time i did that, sure enough the device appeared in the list of drives present in the 7080. However, I had to reboot a second time to see the UEFi/BIOS settings and that produced the results I was after.

Why New Device May Require Second Reboot

Sure enough, when I rebooted a third time to get into Windows, the drive appeared in the Disk Management utility. I was able to choose GPT disk layout, and to format the drive as a single contiguous volume named Tosh1TB. It shows up as “Disk 1” in the lead-in graphic for this story, in fact.

What sometimes makes a second boot necessary is the way that UEFI/BIOS supports device enumeration. On many laptops, certain changes to the hardware — especially RAM changes — automatically trigger a trip into the BIOS interface upon the next reboot. This gives admins a chance to make and review config changes before booting back into the OS.

Adding the Kioxia (Toshiba) 1 TB SSD didn’t trigger the UEFI on its own. But when I rebooted and forced a trip into that environment, the Toshiba device (identified as such in BIOS, not as Kioxia) appeared along with the primary SSD. The second trip was enough to see the device recognized in BIOS/UEFI. In turn this made it accessible to Windows when I returned to that environment. That’s how I was able to choose GPT layout, format the drive, and give it the name that appears in the screenshot above. Case closed!

Don’t Panic: Boot Again

If you find yourself in similar straits sometime, try another reboot (or two, actually). That will probably get the device recognized and make it available to Windows. Only if this fails should further troubleshooting be needed.  In that case, I’d start looking into possible SATA lane conflicts next.

Facebooklinkedin
Facebooklinkedin

So Long Adobe Add-ons Shockwave & Air

At the end of last year, the Adobe Flash Player hit end of life (EOL). Yet today, when I ran the excellent free Patch My PC Updater on one of my test machines, I noted that Adobe Air was still present, plus Shockwave. too. My thought was; “Time to say so long Adobe add-ons Shockwave & Air!” Upon checking into both, my presumption proved valid. When I checked for Adobe elements on my 2012 Vintage X220 Tablet, I found serveral related elements, all of which I’m removing post-haste (see lead-in graphic).

Why say: “So long Adobe Add-ons Shockwave & Air?”

Both Shockwave and Air are at End-of-Life, at least as far as Adobe is concerned. HARMAN International has taken over Adobe Air support. But I hardly ever use this, so I’ve decided to uninstall on PCs where it’s still present. Not surprisingly it’s absent on all of my PCs acquired in 2018 or later, including 2xLenovo X1 Yoga 380, X1 Yoga 390, and X1 Extreme, among others. The free version of Revo Uninstaller is more than equal to this task. That’s why I used it to generate the lead-in screencap for this story, and to remove Air and Shockwave from machines where they’re still hanging ’round.

For the record, uninstalling Air left 2 registry keys and one value behind, as well as 3 files. Revo happily cleaned those up. Shockwave left 1 key with 13 values and no files behind, and took care of two entries (the one I selected, plus another) on its own.

More Info on Air & Shockwave

Read more about the future and status of these Adobe components online. Check out “The future of Adobe AIR” (5/30/2019) and “End of life/…Shockwave Player” (April 9, 2019). Going, going gone, and (hopefully) soon forgotten. Don’t need ’em or want ’em anymore. Sayonara!

 

 

Facebooklinkedin
Facebooklinkedin

Using Microsoft Safety Scanner MSERT.exe

With each Patch Tuesday, MS releases a new version of the Malicious Software Removal Tool (MSRT). Just yesterday, I learned about a similar but different tool named Microsoft Safety Scanner (MSERT.exe). At first, I did a double-take to make sure it wasn’t a typo. It’s not, as the Safety Scanner Docs page attests. (Here are live links to the 32-bit and 64-bit downloads mentioned in the lead-in graphic.) Here, I’ll explore what’s involved in using Microsoft Safety Scanner, aka MSERT.exe.

Explanation Precedes Using Microsoft Safety Scanner

MS explains the tool thusly “a scan tool designed to find and remove malware from Windows computers.”  It goes on to says “Simply download it and run a scan to find malware and try to reverse changes made by identified threats.” Like the MSRT, the MS Safety Scanner gets updates and new signatures all the time, so MS recommends that you always download a fresh copy any time you’d like to use it. They also observe that it’s only worth using for 10 days, after which one MUST download a new version.

Here’s how MS describes the MSRT on its download page:

Windows Malicious Software Removal Tool (MSRT) helps keep Windows computers free from prevalent malware. MSRT finds and removes threats and reverses the changes made by these threats. MSRT is generally released monthly as part of Windows Update or as a standalone tool available here for download.

I’ll be darned if I can tell much difference between them. Nor do I see much distinction in third-party coverage. That said, Explorer sees big differences in size between the two, to wit:

Using Microsoft Safety Scanner.sizesNotice that MSERT.exe shows up as itself, while MSRT shows up as KB890830, version 5.87. Because MSRT is released monthly through WU, it apparently keeps the same KB number, but gets a new version number with each release. MSERT is not so readily obliging but does show that information on its Properties/Details page. That’s where I learned that MSERT stands for “Microsoft Support Emergency Response Tool.”

Using Microsoft Safety Scanner.details

Full name plus file version info readily available here.
[Click image for full-sized view.]

Let’s just say this is another tool from MS you can run at your own discretion to check a Windows PC for malware, and attempt cleanup. All this makes me curious to understand why we have access to not one, but two, such tools. Even the best of third-party explanations/explorations tend to be a bit shaky, like this Tom’s Hardware Forums item. Even my home forums community at TenForums is pretty much mum on differences, to my consternation and regret.

Using Microsoft Safety Scanner

The .exe file is portable and runs from anywhere (including the Downloads folder). The Docs don’t say one should run the program as administrator, but I did so anyway. It presents a EULA to which you must agree before it does its thing. Next you get a welcome/disclosure screen:

Click Next, and you get your choice of scan types (quick, full, or customized).

Then, it scans your “most likely compromised” files under quick scan.

On my production PC, the whole process took about 3:00 and produced the following results.

Nothing to see here folks, please move along. A clean bill of health, in other words.

Upon completion,  the log file (named msert.log) shows nothing informative about cleanup or actions taken (probably because it found nothing to clean up). Here’s a NotePad++ view of its contents (click to view full-sized, as it’s a little hard to read in native WordPress resolution):

I’m still not sure if you and I really need this tool or not, but it’s nice to know it’s available on demand should you wish to make a malware scan and clean-up pass over your Windows PC. The whole thing still has me wondering…

 

Facebooklinkedin
Facebooklinkedin

Further Windows Explorer Restart Follies

First: an admission. I occasionally have problems with losing access to the Start Menu, and getting Taskbar icons to respond to mouse clicks. I’m pretty sure my troubles are self-inflicted, and come from some interaction with Stardock Software’s Start10. I’ve used some variant of this software since Windows 8 Release Preview emerged in May 2012. Recently, I’ve experienced further Windows Explorer restart follies, as I’ve attempted repair and recovery. That said, the never-fail fix for these symptoms remains “restart Windows Explorer in Task Manager.” In attempting that fix recently, I came a across a new and amusing wrinkle this week. Let me explain…

What Do Further Windows Explorer Restart Follies Entail?

As I mentioned, the fix involves restarting Windows Explorer. When I went to attempt that fix earlier this week, Windows Explorer wasn’t showing under the Apps heading in Task Manager’s Processes view (see lead-in graphic for example). What to do?

You can’t right click something that’s absent to get to the Restart option in the menu shown above. So I did the obvious: I launched an instance of Explorer by clicking its folder icon in the Taskbar. This launched Explorer.exe, and caused the Windows Explorer item to appear where it was needed. Then, it was simple to right-click that entry, pick Restart and forcibly restart the explorer process.

Thankfully, as it always has before, this fixed whatever was wrong with my Taskbar icons and the built-in Start Menu. I’m not sure how long this has been going on. It’s been a while since I last had this problem. But my recollection is that because the Explorer process always runs in the background — it’s necessary to support the Start Menu, Taskbar, Notification Area and Action Center — it used to appear by default under Apps in Task Manager, too. Apparently, that’s no longer the case in 19042 and 19043 builds.

I proceeded from this principle: “If no Windows Explorer shows in Task Manager Apps, then put one there.” That makes it easy to restart. ‘Nuff said.

Facebooklinkedin
Facebooklinkedin