Android’s AirTag competitor gears up for launch, thanks to iOS release

Google promised to wait for Apple to launch cross-platform “unwanted tag” detection.

Pebblebee's Android trackers.

Enlarge / Pebblebee's Android trackers. (credit: Pebblebee)

Will Google ever launch its "Find My" network? The Android ecosystem was supposed to have its own version of Apple's AirTags by now. Google has had a crowd-sourced device-tracking network sitting dormant on 3 billion Android phones since December 2022. Partners have been ready to go with Bluetooth tag hardware since May 2023! This was all supposed to launch a year ago, but Google has been in a holding pattern. The good news is we're finally seeing some progress after a year of silence.

The reason for Google's lengthy delay is actually Apple. A week before Google's partners announced their Android network Bluetooth tags, Google and Apple jointly announced a standard to detect "unknown" Bluetooth trackers and show users alerts if their phone thinks they're being stalked. Since you can constantly see an AirTag's location, they can be used for stalking by just covertly slipping one into a bag or car; nobody wants that, so everyone's favorite mobile duopoly is teaming up.

Google did its half of this partnership and rolled out AirTag detection in July 2023. At the same time, Google also announced: "We’ve made the decision to hold the rollout of the Find My Device network until Apple has implemented protections for iOS." Surely Apple would be burning the midnight oil to launch iOS Android tag detection as soon as possible so that Google could start competing with AirTags.

Read 6 remaining paragraphs | Comments

Tiny cracks in rocks may have concentrated chemicals needed for life

The gentle flow of warm fluids could have given pre-life chemistry a boost.

Cartoon of a geologically active area, showing sub-surface channels in different colors to represent various temperatures.

Enlarge / Active geology could have helped purify key chemicals needed for life. (credit: Christof B. Mast)

In some ways, the origin of life is looking much less mystifying than it was a few decades ago. Researchers have figured out how some of the fundamental molecules needed for life can form via reactions that start with extremely simple chemicals that were likely to have been present on the early Earth. (We've covered at least one of many examples of this sort of work.)

But that research has led to somewhat subtler but no less challenging questions. While these reactions will form key components of DNA and protein, those are often just one part of a complicated mix of reaction products. And often, to get something truly biologically relevant, they'll have to react with some other molecules, each of which is part of its own complicated mix of reaction products. By the time these are all brought together, the key molecules may only represent a tiny fraction of the total list of chemicals present.

So, forming a more life-like chemistry still seems like a challenge. But a group of German chemists is now suggesting that the Earth itself provides a solution. Warm fluids moving through tiny fissures in rocks can potentially separate out mixes of chemicals, enriching some individual chemicals by three orders of magnitude.

Read 14 remaining paragraphs | Comments

FCC won’t block California net neutrality law, says states can “experiment”

State enforcement makes ISPs more likely to comply, FCC says.

Illustration of ones and zeroes overlaid on a US map.

Enlarge (credit: Getty Images | Matt Anderson Photography)

California can keep enforcing its state net neutrality law after the Federal Communications Commission implements its own rules. The FCC could preempt future state laws if they go far beyond the national standard but said that states can "experiment" with different regulations for interconnection payments and zero-rating.

The FCC scheduled an April 25 vote on Chairwoman Jessica Rosenworcel's proposal to restore net neutrality rules similar to the ones introduced during the Obama era and repealed under former President Trump. The FCC yesterday released the text of the pending order, which could still be changed but isn't likely to get any major overhaul.

State-level enforcement of net neutrality rules can benefit consumers, the FCC said. The order said that "state enforcement generally supports our regulatory efforts by dedicating additional resources to monitoring and enforcement, especially at the local level, and thereby ensuring greater compliance with our requirements."

Read 21 remaining paragraphs | Comments

Samsung Galaxy Tab A9 Kids Edition comes with a “puffy case,” “crayon stylus,” and parental controls

Samsung launched the Galaxy Tab A9 last fall as a budget tablet with an 8.7 inch HD display and a MediaTek Helio G99 processor. It’s basically a modest update over the Galaxy Tab A7 Lite, which has been a popular option in the cheap Android tabl…

Samsung launched the Galaxy Tab A9 last fall as a budget tablet with an 8.7 inch HD display and a MediaTek Helio G99 processor. It’s basically a modest update over the Galaxy Tab A7 Lite, which has been a popular option in the cheap Android tablet space for the past few years. Now Samsung is offering a […]

The post Samsung Galaxy Tab A9 Kids Edition comes with a “puffy case,” “crayon stylus,” and parental controls appeared first on Liliputing.

Ivanti CEO pledges to “fundamentally transform” its hard-hit security model

Part of the reset involves AI-powered documentation search and call routing.

Red unlocked icon amidst similar blue icons

Enlarge (credit: Getty Images)

Ivanti, the remote-access company whose remote-access products have been battered by severe exploits in recent months, has pledged a "new era," one that "fundamentally transforms the Ivanti security operating model" backed by "a significant investment" and full board support.

CEO Jeff Abbott's open letter promises to revamp "core engineering, security, and vulnerability management," make all products "secure by design," formalize cyber-defense agency partnerships, and "sharing information and learning with our customers." Among the details is the company's promise to improve search abilities in Ivanti's security resources and documentation portal, "powered by AI," and an "Interactive Voice Response system" for routing calls and alerting customers about security issues, also "AI-powered."

Ivanti CEO Jeff Abbott addresses the company's "broad shift" in its security model.

Ivanti and Abbott seem to have been working on this presentation for a while, so it's unlikely they could have known it would arrive just days after four new vulnerabilities were disclosed for its Connect Secure and Policy Secure gateway products, two of them rated for high severity. Those vulnerabilities came two weeks after two other vulnerabilities, rated critical, with remote code execution. And those followed "a three-week spree of non-stop exploitation" in early February, one that left security directors scrambling to patch and restore services or, as federal civilian agencies did, rebuild their servers from scratch.

Read 4 remaining paragraphs | Comments

Ivanti CEO pledges to “fundamentally transform” its hard-hit security model

Part of the reset involves AI-powered documentation search and call routing.

Red unlocked icon amidst similar blue icons

Enlarge (credit: Getty Images)

Ivanti, the remote-access company whose remote-access products have been battered by severe exploits in recent months, has pledged a "new era," one that "fundamentally transforms the Ivanti security operating model" backed by "a significant investment" and full board support.

CEO Jeff Abbott's open letter promises to revamp "core engineering, security, and vulnerability management," make all products "secure by design," formalize cyber-defense agency partnerships, and "sharing information and learning with our customers." Among the details is the company's promise to improve search abilities in Ivanti's security resources and documentation portal, "powered by AI," and an "Interactive Voice Response system" for routing calls and alerting customers about security issues, also "AI-powered."

Ivanti CEO Jeff Abbott addresses the company's "broad shift" in its security model.

Ivanti and Abbott seem to have been working on this presentation for a while, so it's unlikely they could have known it would arrive just days after four new vulnerabilities were disclosed for its Connect Secure and Policy Secure gateway products, two of them rated for high severity. Those vulnerabilities came two weeks after two other vulnerabilities, rated critical, with remote code execution. And those followed "a three-week spree of non-stop exploitation" in early February, one that left security directors scrambling to patch and restore services or, as federal civilian agencies did, rebuild their servers from scratch.

Read 4 remaining paragraphs | Comments

Meta relaxes “incoherent” policy requiring removal of AI videos

Meta will stop removing harmless AI videos in July.

Meta relaxes “incoherent” policy requiring removal of AI videos

Enlarge (credit: Francesco Carta fotografo | Moment)

On Friday, Meta announced policy updates to stop censoring harmless AI-generated content and instead begin "labeling a wider range of video, audio and image content as 'Made with AI.'"

Meta's policy updates came after deciding not to remove a controversial post edited to show President Joe Biden seemingly inappropriately touching his granddaughter's chest with a caption calling Biden a "pedophile." The Oversight Board had agreed with Meta's decision to leave the post online while noting that Meta's current manipulated media policy was too "narrow," "incoherent," and "confusing to users."

Previously, Meta would only remove "videos that are created or altered by AI to make a person appear to say something they didn’t say." The Oversight Board warned that this policy failed to address other manipulated media, including "cheap fakes," manipulated audio, or content showing people doing things they'd never done.

Read 20 remaining paragraphs | Comments

Far North Fiber: EU-Seekabel unter der Arktis noch nicht durchfinanziert

Far North Fiber ist ein ungemein teures Seekabel, weil es durch die Arktis führt. Den Initiatoren aus Finnland, Alaska und Japan fehlt weiter Geld für den Bau. (Infrastruktur, Netzwerk)

Far North Fiber ist ein ungemein teures Seekabel, weil es durch die Arktis führt. Den Initiatoren aus Finnland, Alaska und Japan fehlt weiter Geld für den Bau. (Infrastruktur, Netzwerk)

The science of smell is fragrant with submolecules

A chemical that we smell may be a composite of multiple smells-making pieces.

cartoon of roses being smelled, with the nasal passages, neurons, and brain visible through cutaways.

Enlarge (credit: Design Cells)

When we catch a whiff of perfume or indulge in a scented candle, we are smelling much more than Floral Fantasy or Lavender Vanilla. We are actually detecting odor molecules that enter our nose and interact with cells that send signals to be processed by our brain. While certain smells feel like they’re unchanging, the complexity of this system means that large odorant molecules are perceived as the sum of their parts—and we are capable of perceiving the exact same molecule as a different smell.

Smell is more complex than we might think. It doesn’t consist of simply detecting specific molecules. Researcher Wen Zhou and his team from the Institute of Psychology of the Chinese Academy of Sciences have now found that parts of our brains analyze smaller parts of the odor molecules that make things smell.

Smells like…

So how do we smell? Odor molecules that enter our noses stimulate olfactory sensory neurons. They do this by binding to odorant receptors on these neurons (each of which makes only one of approximately 500 different odor receptors). Smelling something activates different neurons depending on what the molecules in that smell are and which receptors they interact with. The sensory neurons in the piriform cortex of the brain then use the information from the sensory neurons and interpret it as a message that makes us smell vanilla. Or a bouquet of flowers. Or whatever else.

Read 9 remaining paragraphs | Comments