Tag: Apple iOS

On-device or on-premises artificial intelligence–what does it offer

A significant direction for artificial intelligence, especially advanced AI like generative AI, is to have the AI processes performed on the same device or within the same premises as the users who will benefit from it.

This can be considered as part of edge computing because it involves the pre-processing of data before it is sent to a cloud-driven AI platform or post-processing of data coming back from a cloud-driven AI platform.

What is desireable about this is energy efficiency for cloud-based AI, reduced data transfer requirements or assurance of user privacy, corporate confidentiality and data sovereignty due to the minimum amount of data processed in an online environment. Apple even takes this further by running a private cloud specific to each Apple platform user to cater for more intense processing that can’t be performed on the device itself.

On-device and on-premises AI relies primarily on a smaller language model compared to the large language models that cloud-based AI services like ChatGPT rely on. Here they are focused on the data that exists on or is likely to come in to the machine or the logical network. Here, this cam allow for improved data management or permit a custom language model that represents personal or corporate desires.

Why on-device and on-premises AI

Samsung Galaxy AI press image courtesy of Samsung

Samsung Galaxy AI representing on-device artificial intelligence on Android mobile devices

A key desire is data security and end-user privacy. Here the data never leaves the device or premises for artificial-intelligence / machine-learning processing. This satisfies business and industry compliance expectations like privacy, corporate confidentiality and data sovereignty requirements.

Another benefit is improved performance and personalisation when it comes to artificial-intelligence processing and machine learning. Here, the processing takes place on a local machine thus avoiding the use of oversubscribed cloud computing services that can underperform under load. The AI language model ends up being highly personalised thus becoming lean.

Apple iPhone 16 press image courtesy of Apple

Apple iPhone 16 Series – first iOS device with on-device AI processing

There is reduced energy consumption compared to sending the data out to cloud-computing data centres. You also see efficient use of telecommunications links due to smaller amounts of data being sent using them as well as seeing efficient use of cloud-computing services. Another key benefit to see is improved service resilience because you aren’t heavily dependent on online resources – what if the network link fails.

Hybrid (cloud+on-device / on-premises) AI setups can allow for more sophisticated artificial-intelligence / machine-learning processing and working with multiple custom environments. This is due to having a lot of the data handling done locally before it is submitted or after results are received.

On-device AI processing

Lenovo Yoga Slim 7X 2-in-1 laptop with Qualcomm Snapdragon X Elite silicon press image courtesy of Lenovo

Lenovo Yoga Slim 7X 2-in-1 laptop with Qualcomm Snapdragon X Elite silicon – implementing on-device AI under Windows 11 for ARM microarchitecture

On-device AI is about having the AI data handled by the same device that is to make use of the data. This is facilitated through either a third processor called a neural processing unit (NPU) or a very powerful general processor that sets aside processor cores for neural processing to answer AI tasks.

A good analogy to think of are some NAS units that have a graphics processor in addition to their primary CPU. Here, these devices use the graphics processor for accelerated datatype translation like converting multimedia files in to other formats. or similar processing tasks.

There will also be an expectation to have a lot of RAM and storage capacity on these devices. This is something that is being answered easily thanks to Moore’s Law where cost of increased storage and RAM is being reduced significantly.

Such setups can be facilitated either on regular computers or mobile computing devices like smartphones and tablets.

On-premises AI processing

New Dell XPS 13 with Intel Lunar Lake Core Ultra processor press image courtesy of Dell

Dell has offered an XPS 13 laptop with Intel Lunar Lake Core Ultra CPU which has on-device AI processing for Windows 11 under IA microarchitecture

The on-premises AI approach would rely on a server or NAS on the same logical network as the end-users to process the AI data. This would come in to its own with on-premises or hybrid cloud computing setups where the desire is to keep the important data on the user’s premises.

This could represent a server or NAS that uses artificial intelligence and machine learning to make sense of a data set stored therein; or a server or NAS could perform AI tasks for client computers that don’t have on-device AI abilities. This can even lead to the creation of local chatbots that supply answers based on locally-held organisational data.

The trends associated with on-device and on-premises AI

Apple Intelligence writing tools on MacOS screenshot courtesy of Apple

Even MacOS is now supporting on-device artificial intelligence on the latest Macs with Apple silicon.

2024 has effectively become the year of general-purpose on-device AI processing with both the mobile-platform devices that run mobile operating systems and the regular computers that run desktop operating systems.

Some of the premium Android smartphones, tablets and smartwatches from the likes of Samsung and Google that are introduced in 2024 are being equipped with AI functionality. These implement Qualcomm Snapdragon mobile ARM64 processors and use this technology for voice-to-text, advanced search, machine translation, photo editing and similar functionality. Apple is introducing this kind of on-device AI to their latest iPhones and iPads powered with their latest silicon as part of Apple Intelligence, their branding of on-device AI. Here, this offers AI-driven inbox management, document and recording summarisation, image editing, AI-driven emojis and similar functions.

As well, during this year, Microsoft built in to Windows 11 on-device AI functionality which comes alive on computers that have neural-processing units. This is marketed as CoPilot+ and is being offered on laptop computers that use Qualcomm Snapdragon X (ARM64) silicon or, shortly, Intel Lunar Lake Core Ultra and AMD Strix Point (IA-64) silicon. These offer video transcription and captioning, image creation and editing, video editing, document summarisation amongst other things. This has been underscored by a  deluge of CoPilot+ AI-capable laptops being launched or given their first outing at the Internationaler Funkaustellung 2024 in Berlin with some of the units equipped with Intel silicon and others with Qualcomm Snapdragon X silicon.

Apple is also offering a similar kind of artificial intelligence for the latest Macintosh computers with the latest Apple M-series silicon. This will offer the same kind of features as their iOS and iPadOS implementations but with a richer interface. For all the Apple operating systems, there is support for hybrid ChatGPT operation with a “private cloud” arrangement to protect users’ data.

QNAP and Synology are working on equipping newer NAS units and newer versions of the NAS operating systems for artificial intelligence with AI being seen as part of a NAS’s feature set. But this will primarily be about managing or indexing data held on these devices themselves but someone even prototyped a NAS-based local ChatGPT setup as a proof of concept about on-premises generative AI setups which would then be about secure AI operations.. There will be the idea of using business or enthusiast grade NAS units as part of edge-computing setups to permit pre-processing of data before submitting to cloud-based AI.

Conclusion

On-device and on-premises artificial intelligence including hybrid setups such as edge-based AI or private cloud AI is expected to be a key turning point for this technology. This will most likely be due to a call for secure private and bespoke data handling requirements coming about and to keep generative AI technology relevant for most users.

Apple to implement RCS messaging in iPhones

Articles

The Apple messaging app on your iPhone will support RCS messaging as a fallback platform in 2024

Apple announces RCS support for iOS. What does this mean for green vs. blue bubbles? | Mashable

Messaging Between iPhones and Android to Get So Much Better Next Year (droid-life.com)

Apple iPhones will support RCS starting 2024 but green bubbles will remain – SamMobile

My Comments

RCS Universal Profile messaging is a rich open-frame messaging standard defined by GSM Association that follows on from SMS and MMS messaging. This allows for IP-based text messaging and offers features typically associated with over-the-top messaging platforms like WhatsApp, Facebook Messenger, Signal or Apple’s iMessage. But it allows mobile-phone service providers to offer these kind of features.

Android has provided inherent support for this messaging system as part of Google’s and Samsung’s messaging clients. But Apple was determined to use their own iMessage platform as the preferred messaging platform for iPhones or iPads. If you as an Android user communicated with someone who uses an iPhone, your messages would go through as an MMS message.

This wouldn’t have the rich messaging abilities of either RCS or iMessage and your messages come through as green bubbles in the conversation flow. Photos and videos would also appear at lower resolutions which may not do them justice. In some cases, people who want to engage in rich messaging with Apple users would end up resorting to WhatsApp, Signal or a similar platform.

Sometimes Apple fanbois see the green bubble as an indication that their correspondent is “not in the program” because they aren’t using an iPhone, with some tech and general press describing the green bubble as a “scarlet letter”. Recently Google and Samsung have been putting pressure on Apple to implement RCS messaging in iMessage including shaming Apple in front of industry peers. This is similar to how Apple products, especially iPhones, have been seen as status symbols.

As well, the European Union enacted their Digital Markets Act which is seen as a way to significantly regulate Big Tech and their market power. There was further interest amongst the tech press about having the European Commission use this law to enforce Apple to implement RCS messaging on iPhones and iPads. This is after the success that the European bureaucrats had with forcing Apple to install USB-C power-data connectors on the iPhone 15 in lieu of Apple’s preferred MFi Lightning connectors, with this connection appearing on the iPhone 15 family and newer iPhones offered around the world.

The RCS messaging feature will work as a fallback cross-platform messaging platform for sending messages to non-Apple devices. This is while the Apple iMessage platform continues to exist as the preferred messaging platform amongst Apple’s own platforms. That will still mean that Apple users appear in a conversation stream as blue bubbles while other platforms appear as green bubbles.

This feature will be expected to start sometime in 2024 and most likely be issued as part of a new major version or “point” update for iOS where functionality is introduced to the operating system, rather than a software-quality / security update.

Anti-stalking features part of major Bluetooth item-location platforms

Apple AirTag press image courtesy of Apple

Apple AirTag – one of the main item-location platforms that are supporting anti-stalking measures

Apple and Tile implement item-location platforms that are based around Bluetooth-driven locator tags that can be attached to the items that need to be located. They also work with software that “pings” these tags in order to locate them on a map or make them sound an audible signal so you can locate the object attached to them.

But some people use these tags for nefarious purposes. Typically this is about tracking people who don’t want to be tracked, typically as part of stalking or as part of abusive one-sided relationships.

But Apple and Tile have answered this problem through adding logic to their first-party mobile-platform to detect unknown or unrecognised Bluetooth trackers. It is based around the idea of a tracking device or tag that is not associatedd with your “universe” of mobile computing devices moving in the same direction as you or your mobile computing device.

In the case of Apple, this is built in to the iOS operating system and in to a first-party mobile-platform app for Android. This software identifies if the AirTag or other “Find My” device is moving with you that isn’t registered to your device or Apple ID and is separate from the registered user. As well, the AirTag makes a sound if it isn’t with its owner for a significant amount of time. It also has NFC to allow a person to use a suitably-equipped mobile platform device to identify whether the AirTag is lost, including how to contact the device’s owner and return it. This also yields instruction on how to disable the device by removing the coin-size battery.

With Tile, the software is part of their first-party companion mobile-platform app and identifies if the unknown Tile device is moving with you and separate from the registered user. But it requires that you use the mobile-platform app to instigate a “scan” process.

As well, Google has baked in to their Google Services update package for Android 6.0+ the necessary software code to detect unknown tracker devices that are following you. This includes the necessary user interface to warn you against unknown tracker devices following you and help you identify or disable these devices.

This is part of an Apple and Google initiative to establish an Internet Engineering Task Force draft specification that mandates particular anti-surveillance features in Bluetooth-driven item-location platforms that work with iOS or Android smartphones. It avoids the need for companies who want to build item-location platforms to design them responsibly without needing to reinvent the wheel.

What needs to happen to prevent covert surveillance with item-location platforms

Once the IETF specification regarding anti-surveillance features for item-location platforms is set in stone. there has to be some form of legal mandate regarding its implementation in computing platforms and computer-assisted item-location platforms. This could be through other international standards regarding radiocommunications and telecommunications devices or customs and other legislation and regulation regarding the trade in goods.

The anti-surveillance features in these item-location platform would need to be able to perform well within a crowded location especially where multiple devices of the same platform and owned by different owners are likely to be there. Think of, say a busy bar or nightclub where many people are likely to be moving around the venue.

Similarly, these features would need to work properly with situations where a passenger’s luggage is transported in the baggage hold of the same transport as its owner. This is because some passengers may use an AirTag or luggage with integrated item-finding technology in order to avoid losing their baggage.

The devices need to support universal platform-independent NFC “touch-and-go” technology to allow someone to identify lost tracking devices. This would then show up contact details about who own the device or how to return it to its owner. This is more so where a computing device that has or is connected to an NFC sensor but doesn’t run iOS or Android is used to identify the tracking device’s owner, something that would be common with laptop or 2-in-1 computers. Such a situation would come in to its own with a lost-and-found office who uses regular computers running desktop operating systems as their main office computer equipment.

As well, item-location devices should be easy to disable like removing the battery or enforcing a factory reset on the device. This would come in to its own if the device was being used to track someone and such a device was discovered by its target or someone assisting the target.

Let’s not forget that wearables like smartwatches and fitness trackers, along with headphones and similar personal-audio devices are being equipped with location-tracking functionality. This is to allow people to locate lost smartwatches or earbuds or premises owners, lost-and-found offices and the like to return abandoned devices to their owners. Here, they would have to be part of an established platform and be subject to the same conditions as tag-style devices.

There could also be one or more innovation challenges for manufacturers of various third-party devices in one or more sectors that work to detect covert surveillance of people using item-location devices. Such devices like, perhaps, turnstile-type devices could be designed to provide augmented signalling of tracker devices unrelated to a user’s smartphone but moving with the user or their possessions.

Add to this education programs for third parties like IT support, the security sector, the social-work sector and similar groups to help staff work against covert surveillance of people they work with using item-location devices. This could be about assisting with locating and defeating unwanted devices or configuring users’ personal technology for privacy.

Similarly there has to be action taken about the sale of devices that are modified to avoid detection by the person who is being tailed. This is more so where there have been AirTags sold through online marketplaces like Etsy that have their speaker removed or disconnected to avoid audible “pinging” and detection by the stalking victim. Such action could be in the form of statutory action like radiocommunications regulations regarding such devices sold on the secondary market or customs regulation regarding devices that are imported or exported.

Conclusion

What I see of this effort by Apple and Google is a significant step towards responsible secure design of item-location platforms and an example of what responsible design is about.

Apple TV to become a group videophone with your iPhone

Article

Apple TV FaceTime conversation image courtesy of Apple

Facetime and other videoconferencing apps now feasible for Apple TV with your iPhone as a camera and microphone

You can now FaceTime from your Apple TV | ZDNET

Apple’s TVOS 17 Brings FaceTime to Apple TV, Find My Remote Functionality to Siri Remote – CNET

FaceTime is coming to Apple TV | Engadget

From the horse’s mouth

Apple

tvOS 17 brings FaceTime and video conferencing to Apple TV 4K (Press Release)

My Comments

A device class I always have wanted to see when it comes to videocalling and videoconferencing is a group videophone that connects to an ordinary large-screen TV set or monitor for its display and audio output. The idea behind this display concept for this use case is so that a group of people at one location can participate in a videocall. Example situations include a group of family members at the “family house” making a videocall to distant relatives during Christmas Day; or someone intent on buying a business, meeting with their lawyer at the lawyer’s office and talking with the vendor who is at another location.

A few companies are working on having their platform-based set-top boxes or streaming sticks serve this function by adding group videocall functionality to their set-top platform and it is something I was wanting to see Apple do with their Apple TV set-top box. This function works on Apple TV devices that run the next major version of tvOS i.e. tvOS 17.

As well, an iPhone or iPad running iOS/iPadOS 16 works as the camera and microphone for the Apple TV, thanks to Apple’s “Continuity Camera” functionality that was introduced to MacOS and now being “haked in” to tvOS. This is to be facilitated with a stand that Apple will supply as a first-party accessory so you can have the rear cameras facing you during the video call. The iOS device will link to the Apple TV via a Bluetooth link or the fact it is on the same logical small network thanks to Wi-Fi.

This functionality is to support Apple’s native FaceTime videoconferencing platform but Apple is to provide developer support for software developers who want to build or port desktop videoconferencing software to tvOS. Zoom and Webex will be the first two third-party videoconferencing platforms to have this tvOS support.

There is the ability to use the Apple TV’s Siri Remote to initiate a FaceTime call or you can transfer a FaceTime call you are engaging in to the Apple TV so that the other parties appear on the TV screen and you can hear them on your TV’s sound setup. Most likely third party applications will support a similar process.

In this setup, you will have to use the Apple TV’s Siri Remote to control the videocall such as to mute the iPhone’s camera or microphone, hand the call back to the iPhone to continue it privately or to end the call. If messages come in to the iPhone during the call, a simple notification not attributed to the message’s source will pop up so as to keep the message effectively private.

The SharePlay functionality, which allows you to share what you are currently watching from a video source hosted on your Apple TV will still operate so you can use Apple FaceTime to tantalise another person about that show.

There are still questions to answer regarding how the FaceTime facility will authenticate users who set it up to make or take calls using only the Apple TV Siri Remote, rather than using an iPhone and transferring where necessary. As well, would the ability to transfer a FaceTime call from your iPhone to the Apple TV be only limited to the Apple ID accounts that the Apple TV device is associated with? This can be an issue where the Apple TV device is bound to one Apple ID account to represent the whole household rather than each adult individual registering their Apple ID with the same Apple TV device.

At the moment, this functionality is part of a developer-only beta software package but is expected to be fully established as part of tvOS between September to November 2023.

Apple to support security keys as a means to protect your Apple ID

Articles

You can use security keys as a second factor for authenticating with Apple ID on your iPhone

iOS 16.3 Lets You Use a Physical Key for Added Security When Logging Into Your Apple Account (gizmodo.com.au)

Apple iOS 16.3 arrives with support for hardware security keys (bleepingcomputer.com)

Security Keys Are Now the Best Way to Protect Your Apple ID (lifehacker.com.au)

From the horse’s mouth

Apple

Apple advances user security with powerful new data protections (Press Release)

About Security Keys for Apple ID (Support article)

Use security keys to sign in to your Apple ID account on iPhone (Support article)

My Comments

Apple is making it feasible to use hardware security keys in iOS as an authentication factor for their Apple ID logon.

This is being desired as a “phish-proof” approach for secondary authentication or sole authentication due to a physical device not being easily coerced or fooled. As well, this “machine-to-machine” approach allows for stronger passkeys.

It is even seen as a preferred secondary authentication factor for online services used by journalists, human-rights defenders, the public service within democracies and others working with high-stakes information. This avoids such users being fooled in to releasing their online accounts to highly-targeted spear-phishing attacks.

Apple supports this on iPhones and iPads through the iOS/iPadOS 16.3 major feature update. This is also being written in to MacOS Ventura 13.2 for the Apple Mac regular computers whereupon you just use the security key as the secondary authentication factor. They primarily implement this as an alternative secondary authentication means to transcribing a six-digit number shown on your iPhone when it comes to two-factor authentication for your Apple ID.

In the context of the Apple Watch, Apple TV and HomePod devices, you use your iPhone that you set up with the security key authentication to provide the secondary authentication factor when you set these up for your Apple ID. Here, this is easier for limited-interface devices because another device is managing some of the authentication work with your Apple ID.

FIDO-compliant hardware security keys are supported with this update but they have to have an MFi Lightning plug or NFC “touch and go” interface to work with the current crop of iPhones in circulation. USB-C is also supported but you would need a USB-C to MFi Lightning adaptor for iOS devices except newer iPads that have this connector. You also may find that newer iPhones that are to come on the market soon will have the USB-C connector due to pressure from the European Union and some other jurisdictions.

There will be a requirement to set up two hardware keys with the same iOS device when you implement this feature. This is so you have a backup key in case the one you lose the one you regularly use or that one is damaged such as being laundered with your clothes.

Add to this that support does exist for app-level or Website-level verification with security keys within iOS. But it may allow Apple to build in and refine the necessary application-programming interfaces for third-party app developers who want to support this form of authentication.

What I see at least is the implementation of hardware security keys in the mobile platform context when it comes to multi-factor or password-free authentication for the user’s primary platform account. Who knows when Google will offer this feature for Android. Could this also be about leading towards the use of hardware security keys as a hardening factor for user account security?

Legal attempts to pry open app stores have come to fruition

Articles

Google Play Android app store

There is action taking place that is prying open the app-store marketplace for mobile platform devices

Spotify and Google Give You Choice in Paying Them (droid-life.com)

Apple will allow third-party app stores, because the EU mandates it | Mashable

Apple is reportedly preparing to allow third-party app stores on iOS | Engadget

Previous Coverage on HomeNetworking01.info

USA to pry open mobile-app-store market

My Comments

Thanks to the “Fortnite” saga where Google and Apple were accused of slugging Epic Games with commissions for selling in-app commodities via their mobile-platform app stores, there has been a shake-up regarding how these app stores are run.

This has also been intensified with various jurisdictions instigating work on or passing legislation and regulation regarding a competitive market for online app stores. One of these is the European Union with the Digital Markets Act which targets large online services that have a gatekeeper role, along with the USA with its Open App Markets Act which targets app stores appearing on mobile and desktop computing platforms and other devices like games consoles or smart TVs.

The Europeans see their effort not just to pry open app stores but also search engines, social networks, video-sharing sites, digital ad platforms, public cloud platforms, even so-called intermediary services like AirBnB, Uber, Uber Eats and Booking.com. There are similar efforts also taking place within UK and Australia with this effort resulting in codes of practice being established for online services.

What has happened so far

Google has taken steps to enable user-choice billing for in-app purchases normally made through their Play Store.

Firstly, they allowed people who use Bumble online-dating apps to subscribe directly with Bumble or via the app store. Now they have enabled Spotify subscribers to pay for their subscription either through the Play Store or direct with Spotify. Of course, some online services like Netflix and Britbox allow for direct payment for their subscriptions by requiring you to manage your account through the service provider’s Website.

But Google will implement this feature at the checkout point in your purchase by allowing you to select payment via Google Play or directly with the software developer. When you pay directly, you will see the online service payment user-experience provided by the developer including the ability to redeem their service’s gift vouchers, pay using PayPal or pay using a payment card platform they have business relations with. Or you pay using Google Play Store’s payment user interface that you would be familiar with.

When your payment-card statement arrives, you will see a reference to Google if you paid for the online commodity through them or a reference to the software developer / online service if you paid directly.

Paying directly would mean that software developer or online service gets your money without having to pay a “cut” to Google for accepting payment via the Google Play Store. As well, the software developer or online service is at liberty to sign up with other payment means like PayPal, other credit cards like AMEX or Discover / Diners Club, or national account-linked payment platforms like EFTPOS, Carte Bleue or EC-Karte. There is also the ability for them to offer gift vouchers that go towards their offerings.

Another benefit that will come about if you pay for a subscription directly is that if you change to a different mobile platform, your subscription is kept alive rather than you having to reinstigate your subscription with the new platform’s app store and payment mechanism.

It also positions the Google Play Store’s online payment arrangement in competition with the software developer or online service thus improving the terms of business for accepting payment from customers. An example of this is both service providers providing a link with payment-anchored loyalty programs as a way to incentivise customers towards payment through their platforms.

Another direction being taken towards prying open the app stores is Apple baking  support for third-party app stores into iOS 17 which is the next major feature release of iOS. This is in addition to offering newer versions of the iPhone with USB-C ports rather than MFi Lightning ports for external connectivity. Here, this is due to intense European pressure to open themselves up to open markets by the European Union. But the support for third-party app stores would also come down to the Open App Markets Act that is being pushed through the US Congress.

Issues to be resolved

One issue that will have to be resolved is how the average smartphone or tablet user can install a competing app store to their device.

This is more about where a smartphone manufacturer or mobile operating system developer can get away with burying this option behind a “developer mode” or “advanced-user mode”. Or it could be about onerous requirements placed on software developers by mobile platforms when it comes to creating or publishing their software such as access to application-programming interfaces or software development kits.

The app stores will also have to be about selling good-quality compelling software and games. This is so they don’t end up as the equivalent of bulletin boards, download sites and optical discs attached to computer magazines where these resources were full of poor-quality software, known as “shovelware”.

Then there is the appeal of competing app stores to consumers and software developers. Personally I see these stores have initial appeal in the gaming sector with the likes of Steam or GOG existing on mobile platforms. Also I would see some software developers operate their own app stores as a way to maintain end-to-end control of their apps.

Conclusion

There are steps being taken by Google and Apple to liberate their mobile-platform software ecosystem even though it is under pressure from competition authorities in significant jurisdictions.

Apple to head towards separately-delivered security updates for iOS

Article

Your iPhone or iPad will have security and software-quality updates delivered separately from the main functionality upgrades

Apple Could Soon Split iOS Updates And Security Updates | Ubergizmo

My Comments

A trend that is increasing in relationship to software maintenance and quality assurance is to assure the ubiquitous availability of critical security, software-quality and compliance updates for a device or program. This is through delivering such updates under separate cover from major updates that primarily add features and functionality.

You may think of these critical updates as just security patches for the device or program but these can include general bugfixes, software refinements to to have the program run more efficiently or compliance modifications such as to update daylight-saving-time rules for a particular jurisdiction.

Microsoft, Google and Apple headed that way with Windows 10, Android and with MacOS respectively.  This approach benefits the software developer and the user equally because the security, software-quality or compliance patches are usually small files. The software developer can assure guaranteed delivery and installation even with older devices that aren’t able to take newer versions of the software thus hardening the device’s platform against security exploits.

Similarly the user can choose not to install a functionality update if they don’t see fit or may find that it offers a steep learning curve due to significant user-experience changes. It is more so where a user would rather run with a highly-stable version of the operating system than the latest “rushed-out” version that carries bugs.

Apple will be taking this approach with iOS soon. Previously, the iOS mobile operating system was maintained using the delivery of major versions offering major functionality. But Apple would deliver iOS bugfixes and security patches as a minor or “point” version dependent on a major version, something that was considered orthodox in the world of software maintenance and quality assurance.

But if they were to “reach” older iOS versions with a security or compliance update, they would need to offer a minor or “point” version for a prior major version as a separate software package. This is an issue that affects people who maintain older iOS devices, especially iPads or iPod Touch devices that are less likely to take newer major versions of iOS.

Through the development of iOS 14.5, Apple has looked in to the idea of “splitting” the critical updates from the main software package so that these can be delivered under separate cover. This could also allow Apple to package one of these updates to touch multiple major versions of the operating systems.

It could also be a chance for Apple to see a long service life out of iOS devices especially where older devices may not run the latest major version of iOS. This would be very applicable to iPad and iPod Touch users who see long-term use out of those devices or families who pass down older iPhones to their children. It could also be a chance for Apple to keep multiple hardened codebases for iOS going but able to support different device abilities.

It will also encourage Apple to deliver frequent software patches to iOS users especially if they can be installed without restarting the device. This is more so if Apple wants to create a tighter software-quality-assurance regime for their platforms.

But Apple also has to provide separate critical-update delivery to their tvOS operating system which drives their recent Apple TV devices and their watchOS operating system that drives their Apple Watch products. It can then be about creating a robust software quality-assurance approach across all of their products but catering to people who maintain older products.

Google improving on their simplified cross-platform software development platform

Article

Samsung Galaxy Tab Active 8" business tablet press picture courtesy of Samsung

It will become easy to develop apps to run on smartphones..

Microsoft helps with Google’s Flutter 2 update to improve apps on Surface Duo | Windows Central

Google’s Flutter 2 update could be a major win for apps on Windows 10 | Windows Central

My Comments

Now with three major desktop computing platforms and two mobile computing platforms on the market, there is a demand to create software that can run on all of them. It also means that the software has to operate in a manner that suits the different user experiences that different computing devices offer.

Lenovo Yoga Tablet 2 tablet

.. and tablets

The differing factors for the user experiences include screen size and general aspect ratio as in “portrait” or “landscape”; whether there is a keyboard, mouse, stylus or touchscreen as a control interface; or, nowadays, whether there are two or more screens. Then you have to think of whether to target a mobile use case or a regular-computer use case and optimise your software accordingly. You may even have to end up targeting “small mobile” (smartphone), “large mobile” (iPad or similar tablet), “desktop” (desktop or laptop computer including 2-in-1 convertibles) or “lean-back” (smart TV / set-top / games console) use cases at once.

Dell XPS 13 Kaby Lake

.. and laptops with the same codebase

Google and Microsoft have established a partnership to make Google’s Flutter 2 software development platform as something to create desktop+mobile software solutions. It is building on Microsoft’s foundation stones like their BASIC interpreters which got most of us in to personal computing and software development.

Here it is about creating common codebases for native apps that target iOS, Android, Windows 10, MacOS and Linux; alongside Web apps to work with Chrome, Firefox, Safari and Edge. But the question that could be raised is if an app is targeted for Google Chrome, would this work fully with other Chromium-based Web browsers like the new Microsoft Edge browser, the Opera browser or Chromium for Linux.

The creation of Web apps may be about being independent of platform app stores which have a strong upper hand on what appears there. Or it may be about reaching devices and platforms that don’t have any native software development options available to average computer programmers.

Some of the targeted approaches for this new platform would include “progressive Web apps” that can run on many platforms using Web technology and omit the Web-browser “chrome” while these apps run.

The new Flutter 2 platform will also be about creating apps that take advantage of multiple-screen and foldable setups. This is in addition to creating fluid user interfaces that can run on single-screen desktop, tablet and smartphone setups. The idea of creating a user interface for multiple-screen and foldable setups is seen as catering to a rare use case because of fewer foldable devices like the Microsoft Surface Duo on the market let alone in circulation. Another question that can crop up is multiple-screen desktop-computing setups and how to take advantage of them when creating software.

What I see of this is the rise of software-development solutions that are about creating software for as many different computing platforms as possible.

How to set Bedtime mode on iOS so you don’t miss important calls

Options area in iOS Bedtime Mode screen

Select Options to set up the Bedtime Mode behaviour

Apple’s iOS operating system since version 12 have support for “Bedtime” mode which allows you to have a good sleep. This is achieved through optimising the display to reduce blue light in a sleep-friendly manner along with default automatic enablement of “Do Not Disturb” mode where the iPhone won’t ring through during the hours the Bedtime mode is in operation. This will be heralded by your iPhone ringing a phrase of Brahms’ Lullaby with a music-box sound when that mode is effective.

But some of us may don’t want to miss important calls that come through at night due to work or personal reasons. An example of this could be a person who is a registered keyholder for a premises and needs to know of alarm incidents affecting that premises. Or someone you expect home may be arriving late and wants to let you know they are on their way or changed plans. In a simple case, you may not want to miss that important call from someone who is on the other side of the world.

The default implementation for Bedtime mode has your iPhone in “Do Not Disturb” mode where your iPhone won’t ring or sound a notification tone for text messages while that mode is in effect. But you may want most of the sleep-friendly benefits of this mode while being able to be woken by those important calls.

iOS Bedtime Mode options screen with Do Not Disturb option called out

Clear the Do Not Disturb option to allow calls and texts to come through during Bedtime Mode

To enable this, you need to go to the Clock app and select the Bedtime screen. Select “Options” and turn off the “Do Not Disturb” mode on that screen to allow calls to come through. The display will still be dimmed through this time but the iPhone will ring or sound a notification tone.

You may also have to check for scheduled “Do Not Disturb” times in case you used this feature to set up a “do-not-disturb” period surrounding your normal bedtime. This is a feature that an iOS user may have implemented before updating to iOS 12. You can check this feature in the “Do Not Disturb” option in the Settings app.

If you do use the “Do Not Disturb” option, you can allow certain caller groups to break through and cause your phone to ring irrespective of when this option is in effect. One of these is “Favourites” which allows you to mark contacts as a “favourite”. Or you can use the Groups option to allow calls from contact groups that you have pre-defined. This is important if you mark out your contacts in to contact groups like “work” or “family” and is a complex procedure that requires you to use your Apple iCloud.com account on a Web browser.

The use of a predefined caller list to override “Do Not Disturb” may not work well with callers who call you using VoIP or from behind a business phone system. This is because you may find that the caller ID for their call may be different from their phone number due to them, for example, calling from the nearest extension rather than their own extension.

iOS and Android could natively follow the Symbian (original Nokia feature-phone operating system) approach where you have different situation-specific alerting presets that affect your phone’s audio / vibration / indicator-light behaviour. This can also allow the use of one or more priority call lists so that callers you select for a particular situation can ring through. Such presets can be linked to operation modes like the “Bedtime” mode or alarm clock so they can be effective during these modes.

As well, Apple could simplify the process of creating and managing caller groups on the iOS contacts list while you are using your iPhone’s user interface. This is important for processes like adding new contacts to your list or revising your contacts, and can make the process more intuitive.

Most iPhones and iPads now in circulation to be safe from the KRACK exploit

Article

Apple iPad Pro 9.7 inch press picture courtesy of Apple

Most iPads and iPhones updated to iOS 11.2 now safe from the KRACK exploit

Apple fills the KRACK on iPhones – at last | Naked Security

Previous Coverage

KRACK WPA2 Wi-Fi vulnerability–what is affected

My Comments

There has been intense computing-press coverage regarding the KRACK WPA2 exploit against otherwise-secure Wi-Fi wireless network segments. As my previous coverage highlighted, most of the major regular-computer and mobile operating systems were updated to rectify the vulnerability associated with this exploit.

Check the Settings App on your iPhone for the update

But, as I called out in the article, the iOS 11.1 update that Apple rolled out for their iPhones and iPads only remediated the vulnerability on certain newer devices. Here, it was ignoring a larger installed base of iPhones, iPads and iPod Touches by not providing the remediation for devices earlier than the iPhone 7 or the iPad Pro 9.7 (2016).

Now Apple has rolled out the iOS 11.2 update to extend this remediation to more iOS devices in the field. These include:

  • iPhone 6 encompassing the S and Plus variants, the iPhone SE, the iPhone 5S,
  • 12.9” iPad Pro (1st generation), the iPad mini 2 and its successors, the iPad Air, the iPad (5th generation)
  • iPod Touch (6th generation)

Here, it means that those commonly-used recent iPhones and iPads are now safe against the KRACK exploit. Check your Settings app on your iOS device to be sure it is up to date with this patch.