Tag: operating systems

European Union deems Big Tech companies and services as gatekeeepers

Article

European Union flag - Creative Commons by Rock Cohen - https://www.flickr.com/photos/robdeman/

The EU will be using two new tools to regulate Big Tech significantly

EU names six tech giant ‘gatekeepers’ under DMA guidelines | Mashable

From the horse’s mouth

European Union

Digital Markets Act: Commission designates six gatekeepers (europa.eu)

My Comments

The European Union is taking serious steps towards controlling Big Tech further and enforcing a competitive market within its territory.

They recently passed the Digital Markets Act and Digital Services Act laws which apply to companies that have a significant market presence in the EU. The former one is about assuring real competition by doing things like pry open app stores to competition, require a service to accept advertising for its competitors or assure end-users have access to the data they generate through their services. As well, the latter one regulates online services to assure a user experience with these services that is safe and in harmony with European values as well as supporting innovation and competitiveness.

Initially, six powerful Big Tech companies have been designated as “gatekeepers” under the Digital Markets Act. These are Alphabet (Google, Jigsaw, Nest), Amazon, Meta (Facebook, Facebook Messenger, Instagram, Threads, WhatsApp), Apple, ByteDance (TikTok) and Microsoft.

Google Play Android app store

The European laws will also be about prying open the app-store marketplace for mobile platform devices

Most of the products like Facebook, Instagram, TikTok, YouTube, Amazon’s marketplaces, the familiar Google search engine, and the mobile app stores ran by Apple and Google are listed services or platforms subject to scrutiny as “gateways”. Even the iOS, Android and Microsoft Windows desktop operating systems are also deemed “gateways” under this law. But I am surprised that the Apple MacOS operating system wasn’t even deemed as a “gateway” under that law.

There is further investigation about Microsoft’s Bing search platform, Edge browser and Advertising platform and Apple’s iMessage messaging service regarding deeming them as “gateways”.

The latter one has attracted intense scrutiny from the computing press due to it not being fully interoperable with Android users who use first-party messaging clients compliant with the standards-based RCS advanced-messaging platform put forward by the GSM Association. This causes a significantly-reduced messaging experience if iPhone users want to message Android users, such as not being able to share higher-resolution images.

What happens is that “Gatekeeper” IT companies will be under strict compliance measures with requirement to report to the European Commission. These include requirements to:

  • accept competitors on their platform, which will apply to app stores, operating systems and online advertising platforms
  • ensure that end-users have access to data they generate on the platform
  • allow end-users and merchants to complete transactions away from app-store and similar platforms owned by the gatekeeper company
  • assure independent verification by advertisers of ad impressions that occur on their ad-tech platform

At the moment, an online service or similar IT company is considered a “gatekeeper” if they have:

  • EUR€7.5bn turnover
  • EUR€75 billion market capitalisation
  • 45 million or more active users in the 27 European-Union member countries

Personally, I would like to see the geographic realm for active users based on a larger area in Europe because of non-EU countries like Switzerland, Norway, Iceland and the UK and EU-candidate countries also contributing to the user base. For example, this could be based on the European Economic Area or membership of the Council of Europe which standardises fundamental human-rights expectations in Europe.

Failure to comply will see the company face fines of 10% of its global turnover, even the ability for the European Union bureaucrats to subject a company to a Standard Oil / AT&T style forced breakup.

At the moment, it is about EU setting an example on reining in Big Tech with DMA being considered a gold standard by the consumer IT press just as GDPR was considered a gold standard for user privacy. But the United Kingdom is putting a similar recommendation in place by introducing the Digital Markets, Competition and Consumer Bill before Parliament. This is while the USA are trying to pry open app stores with various anti-trust (competitive-trade) and similar legislation.

A question that will also arise is whether the European Union bureaucrats can effectively have control over corporations anywhere in the world such as to force the breakup of a dominant corporation that is chartered in the USA for example. This is although they could exert this power over a company’s local affiliate offices that exist within Europe for example.

There is still a very serious risk of Big Tech “dumping” non-compliant software and services in to jurisdictions that aren’t covered by these regulations. This will typically manifest in software or services that have the features desired by customers like sideloading or competitive app-store access for mobile operating systems or ad-free subscription versions of social networks being only available in Europe for example. This was a practice that happened with Microsoft when the EU forced them to allow the end-user to install an alternative Web browser when they install Windows as part of commissioning a new computer for example, with this feature only occurring within Europe.

A previous analogy I used is what has been happening with the vehicle market in Australia where vehicles that aren’t fuel-efficient to current international expectations appear in this country whereas other countries benefit from those vehicles that are fuel-efficient. This is due to Australia not implementing the fleet-wide fuel-efficiency standards being used in many countries around the world.

Who knows how long it will take to push similar legislation or regulation aimed at curbing Big Tech’s marketplace powers around the world. Only time will tell.

Apple to head towards separately-delivered security updates for iOS

Article

Your iPhone or iPad will have security and software-quality updates delivered separately from the main functionality upgrades

Apple Could Soon Split iOS Updates And Security Updates | Ubergizmo

My Comments

A trend that is increasing in relationship to software maintenance and quality assurance is to assure the ubiquitous availability of critical security, software-quality and compliance updates for a device or program. This is through delivering such updates under separate cover from major updates that primarily add features and functionality.

You may think of these critical updates as just security patches for the device or program but these can include general bugfixes, software refinements to to have the program run more efficiently or compliance modifications such as to update daylight-saving-time rules for a particular jurisdiction.

Microsoft, Google and Apple headed that way with Windows 10, Android and with MacOS respectively.  This approach benefits the software developer and the user equally because the security, software-quality or compliance patches are usually small files. The software developer can assure guaranteed delivery and installation even with older devices that aren’t able to take newer versions of the software thus hardening the device’s platform against security exploits.

Similarly the user can choose not to install a functionality update if they don’t see fit or may find that it offers a steep learning curve due to significant user-experience changes. It is more so where a user would rather run with a highly-stable version of the operating system than the latest “rushed-out” version that carries bugs.

Apple will be taking this approach with iOS soon. Previously, the iOS mobile operating system was maintained using the delivery of major versions offering major functionality. But Apple would deliver iOS bugfixes and security patches as a minor or “point” version dependent on a major version, something that was considered orthodox in the world of software maintenance and quality assurance.

But if they were to “reach” older iOS versions with a security or compliance update, they would need to offer a minor or “point” version for a prior major version as a separate software package. This is an issue that affects people who maintain older iOS devices, especially iPads or iPod Touch devices that are less likely to take newer major versions of iOS.

Through the development of iOS 14.5, Apple has looked in to the idea of “splitting” the critical updates from the main software package so that these can be delivered under separate cover. This could also allow Apple to package one of these updates to touch multiple major versions of the operating systems.

It could also be a chance for Apple to see a long service life out of iOS devices especially where older devices may not run the latest major version of iOS. This would be very applicable to iPad and iPod Touch users who see long-term use out of those devices or families who pass down older iPhones to their children. It could also be a chance for Apple to keep multiple hardened codebases for iOS going but able to support different device abilities.

It will also encourage Apple to deliver frequent software patches to iOS users especially if they can be installed without restarting the device. This is more so if Apple wants to create a tighter software-quality-assurance regime for their platforms.

But Apple also has to provide separate critical-update delivery to their tvOS operating system which drives their recent Apple TV devices and their watchOS operating system that drives their Apple Watch products. It can then be about creating a robust software quality-assurance approach across all of their products but catering to people who maintain older products.

How about having an up-to-date recovery image on your computer

Dell XPS 13 press picture courtesy of Dell Australia

You need to have access to the latest data representing your computer’s operating system, device drivers and allied software from its manufacturer as a recovery image to simplify any repair / restore efforts or to get your “new toy” up and running as quickly and smoothly as possible.

Recent computers that run MacOS or Windows now come with a partition on their hard disk or SSD that has a copy of the operating system and other software they come with the computer “out of the box”. Or there is the ability to download a recovery image for your computer from the manufacturer’s Website using a manufacturer-supplied app.

It is in lieu of the previous method of delivering an optical disc with the computer that has the operating system and other manufacturer0-supplied software thanks to newer computers not being equipped with optical drives.

Here, this recovery data comes in to play if the operating system fails and you have to reinstate it from a known good copy. An example of this could be the computer being taken over by malware or you need to get it back to “ground zero” before relinquishing it. Or the system disk (hard disk or SSD) fails and you have to put the operating system on a new system disk as part of reconstructing your computing environment.

But Microsoft, Apple and the hardware manufacturers associated with your computer’s internal peripherals update their software regularly as part of their software quality control. There are often the feature updates that add functionality or implement newer device-class drivers that are part of an operating system’s lifecycle.

What typically happens is this recovery image represents the software that came with your computer when it left the factory. It doesn’t include all the newer updates and revisions that took place. Here, if you have had to restore the operating system from that recovery image, you will then have to download the updates from your computer’s manufacturer, the operating system vendor or other software developers to have your computer up-to-date.

The firmware / BIOS updates may not matter due to them being delivered as a “download-to-install” package. This means that when these packages are run, they verify and shift the necessary firmware code to the BIOS / UEFI subsystem for the computer or the firmware subsystems for peripherals supported by the computer’s manufacturer, then subsequently commence and install the installation process.

Questions that can be raised include whether the factory-supplied data should be maintained as the definitive “reference data” for your system. Or whether the computer manufacturer is to provide a means to keep the software up-to-date with the latest versions for your computer.

This will be an issue with manufacturers who prefer to customise the software drivers that run hardware associated with their computer products while end-users prefer to run the latest software drivers offered by the hardware’s manufacturer. This is typically due to the hardware manufacturer’s code being updated more frequently and is of concern with display chipsets like Intel’s integrated-graphics chipsets.

Similarly there is the issue that people are likely to change the software edition that comes with their computer like upgrading to a “Pro” edition of the Windows operating system when the computer came with the Home edition.

An approach that a manufacturer can take over a computer system’s lifetime is to revise the definitive “reference data” set for that system. This could be undertaken when the operating system undergoes a major revision like a feature update. This can be about taking stock of the device drivers and updating them to newer stable code as part of offering the latest “reference data” set.

That allows a user who is doing an operating-system recovery doesn’t need to hunt for and download updates as part of this process if they want the computer running the latest code.

This kind of approach can also come in to its own during the time that the computer system is on the market. It means that during subsequent years, newer computer units receive the latest software updates before they leave the factory. This is so that the computer’s end-user or corporate IT department don’t have to download the latest versions of the operating system, device drivers and other software as part of commissioning their new computer system.

The idea of computer manufacturers keeping their products’ software-recovery data current will benefit all of us whether we are buying that new computer and want to get that “new toy” running or need to reinstate the operating software in our computers due to hardware or software failures.

How to set Bedtime mode on iOS so you don’t miss important calls

Options area in iOS Bedtime Mode screen

Select Options to set up the Bedtime Mode behaviour

Apple’s iOS operating system since version 12 have support for “Bedtime” mode which allows you to have a good sleep. This is achieved through optimising the display to reduce blue light in a sleep-friendly manner along with default automatic enablement of “Do Not Disturb” mode where the iPhone won’t ring through during the hours the Bedtime mode is in operation. This will be heralded by your iPhone ringing a phrase of Brahms’ Lullaby with a music-box sound when that mode is effective.

But some of us may don’t want to miss important calls that come through at night due to work or personal reasons. An example of this could be a person who is a registered keyholder for a premises and needs to know of alarm incidents affecting that premises. Or someone you expect home may be arriving late and wants to let you know they are on their way or changed plans. In a simple case, you may not want to miss that important call from someone who is on the other side of the world.

The default implementation for Bedtime mode has your iPhone in “Do Not Disturb” mode where your iPhone won’t ring or sound a notification tone for text messages while that mode is in effect. But you may want most of the sleep-friendly benefits of this mode while being able to be woken by those important calls.

iOS Bedtime Mode options screen with Do Not Disturb option called out

Clear the Do Not Disturb option to allow calls and texts to come through during Bedtime Mode

To enable this, you need to go to the Clock app and select the Bedtime screen. Select “Options” and turn off the “Do Not Disturb” mode on that screen to allow calls to come through. The display will still be dimmed through this time but the iPhone will ring or sound a notification tone.

You may also have to check for scheduled “Do Not Disturb” times in case you used this feature to set up a “do-not-disturb” period surrounding your normal bedtime. This is a feature that an iOS user may have implemented before updating to iOS 12. You can check this feature in the “Do Not Disturb” option in the Settings app.

If you do use the “Do Not Disturb” option, you can allow certain caller groups to break through and cause your phone to ring irrespective of when this option is in effect. One of these is “Favourites” which allows you to mark contacts as a “favourite”. Or you can use the Groups option to allow calls from contact groups that you have pre-defined. This is important if you mark out your contacts in to contact groups like “work” or “family” and is a complex procedure that requires you to use your Apple iCloud.com account on a Web browser.

The use of a predefined caller list to override “Do Not Disturb” may not work well with callers who call you using VoIP or from behind a business phone system. This is because you may find that the caller ID for their call may be different from their phone number due to them, for example, calling from the nearest extension rather than their own extension.

iOS and Android could natively follow the Symbian (original Nokia feature-phone operating system) approach where you have different situation-specific alerting presets that affect your phone’s audio / vibration / indicator-light behaviour. This can also allow the use of one or more priority call lists so that callers you select for a particular situation can ring through. Such presets can be linked to operation modes like the “Bedtime” mode or alarm clock so they can be effective during these modes.

As well, Apple could simplify the process of creating and managing caller groups on the iOS contacts list while you are using your iPhone’s user interface. This is important for processes like adding new contacts to your list or revising your contacts, and can make the process more intuitive.

Computers that are secure by design are less likely to be bugs

Article

Dell XPS 13 8th Generation Ultrabook at QT Melbourne rooftop bar

Running modern always-updated operating systems and applications on your laptop is a way to keep your computing environment safe and secure.

Should you be scared of your laptop’s webcam? | ZDNet

Previous Coverage

Regular operating systems and their vulnerability to security threats

My Comments

An article appeared about whether one should be scared of their computer’s integrated Webcam and microphone. Here, a Webcam and microphone integrated in a computer or monitor or a USB Webcam that is always plugged in could turn the computer in to a surveillance device. But it highlighted the fact that recent versions of operating systems and productivity applications are “secure by design” when used to default settings.

It went through two different “what-if” hacking scenarios with different software combinations to see how hard they were to penetrate in order to “open up” the Webcam. The trigger point was to receive a “loaded” document with instructions that the user must follow, something that can be done through an email phishing attempt. Here, the document would have a macro that would install malware to open up the Webcam and stream its vision remotely.

The first scenario involves a Windows 10 computer running the latest version of Microsoft Word while the second scenario involved MacOS 10.14 Mojave and the latest version of LibreOffice. All operating systems and applications were run in the default protected mode but MacOS Mojave was temporarily configured to admit software from other sources in order to admit LibreOffice on to the Mac.

What was highlighted was the recent operating systems’ flagging or blocking of questionable software when the article’s author was asked to click on the required link within the document. The operating systems having their own basic endpoint-protection software underscored the ability to keep users safe from rogue software. Even productivity application software running documents supplied by email or from questionable sources in a protected mode to inhibit the execution of macros was also highlighted.

Creative Labs LiveCam Connect HD Webcam

Webcams, whether external like this one or integrated in a computing device, aren’t able to be bugs if you keep your computer software up-to-date with the latest patches and have it running “secure by default”.

This meant that neither the Webcam nor the microphone could not be accessed without the user knowing. It was demonstrating the recent “secure by design” approach of newer regular-computer environments that assured the average user of their data security. You may harden that attack surface by masking an integrated Webcam that is part of your computer or monitor, or disconnecting an external Webcam.

Unless you need to, keep your computer’s operating system, applications and endpoint-security utilities running in a “default-for-security” manner. This also includes updating them to the latest version, preferably with the software updating themselves.

If you are supporting other systems, don’t disable the computing environment’s security features unless you are sure they need to be disabled. Also educate the other users about data-security risks including the security warnings that will pop up on their computer.

If you are dealing with an old computer that is running a very old operating system and application software that doesn’t have the “secure by design” approach, you may have to cover or disconnect the Webcam. This is more so if it is found to be running the software “out of the box” without any patches or updates applied to it.

In most cases, the “secure-by-design” approach of most modern computing environments allows us to be able to use regular or mobile computer equipment in a secure manner.

Windows 10 answers the problem of system sounds playing through that good sound sound system

This arrangement documented here will work with Windows 10 computers running the April Update (Build 1803) version of that operating system or newer versions.

I have just applied the latest feature update to my Windows 10 installation on my regular computer and it has come across with a feature that most of you will want to benefit from when you use your computer to play audio or video content.

This feature update called Windows 10 April Update or formerly Windows 10 Spring Update (Build number 1803 in the System dialog) implements the ability to determine which sound device a program uses. Some Win32 (traditionally-developed) programs, namely well-bred media editing and management programs or VoIP programs have the ability for a user to determine which sound device they want that program to use. But the Web browsers, along with Spotify or TuneIn Radio and most of the Microsoft Store apps don’t offer this ability.

HP Elitebook 2560p playing through Naim DAC-V1 USB DAC

Windows 10 April Update allows the speakers in this USB-based audio setup to play only the music while the audio alerts play through the laptop’s integrated speakers

This means that you could set things up so that the system sounds like that Windows error “ding” or the email alert sound don’t blast through the good sound system but play through the cheaper speaker setup like your laptop’s speakers. It is while Spotify or that other audio program plays through the good speakers or hi-fi system. Similarly, you may want that YouTube video or the game you are playing to have its sound come through your big TV’s speaker but don’t like the idea of the Windows audio prompts being a distraction by barging through those speakers.

Praise and worship at church

You can set things up so that the playout computer doesn’t play Windows audio alert sounds through PA systems like this church’s setup

This feature will be essential for those of you who use your computer with a PA system as an audio/video playout device and end up using baseline software that doesn’t offer the ability to manage the audio devices the software plays through. Here, you avoid having those PA speakers “magnifying” the audio prompts that Windows makes when a dialogue box pops up or new email comes in. Similarly, you could then have one audio-output device like headphones or low-powered speakers serve as a “cue” device that you use to verify or line-up the content you want to

Sound devices that you can send an app’s sound output through

play before you have it playing through the main speakers.

How do you go about this?

You would need to make sure that your computer is running with another sound device that is attached to the good sound system. This could be a separate sound card, USB sound module or DAC, or a Bluetooth audio adaptor. If you have the computer connected to a sound system equipped with Bluetooth, USB or similar audio functionality, you have effectively set up the secondary sound device. It also applies if you have connected it to the big TV or home-theatre setup using an HDMI cable.

Identifying the sound devices

Then you identify the two different sound devices – the one that you want as your “primary” device for monitoring audio prompts that Windows provides and the “secondary” one you want your multimedia content to play through.

The sound functionality that is built in to a laptop computer or a desktop computer’s motherboard will typically be represented by something like a Realtek, Intel HD Audio or similar chipset name. In most cases, this integrated-sound chipset serve the internal speakers in a laptop or a pair of cheap computer speakers connected to the audio sockets on a desktop computer’s motherboard.

Sony STR-DN1060 home theatre receiver press picture courtesy of Sony America

If you connect your computer to your monitor or TV through one of these home-theatre receivers using the HDMI connections on these sets, you will be using the separate HDMI audio subsystem facilitated by your computer’s graphics infrastructure for the sound that comes through the receiver

Display setups connected to your computer via HDMI or DisplayPort that have audio abilities will have those abilities seen as an audio function of the display infrastructure. Some of these cases like Intel integrated graphics chips will properly refer to the arrangement as “display audio” or “HDMI display audio” due to the function being separate from the computer’s main sound chipset. This arrangement also holds true if you are connecting HDMI audio devices like soundbars, HDMI audio adaptors and home-theatre receivers between your computer and your display using the HDMI cable.

Let’s not forget that USB or Bluetooth devices that use the Windows audio-device class drivers will still identify themselves by their device or chipset make and model. This is to avoid confusion that can exist if you connect multiple USB or Bluetooth audio devices to the same host computer.

Configuring your setup

Go to Settings (the gear icon in your Start menu) and click on the System option. Then click on the Sound menu on the left of the System menu page. Make sure the current sound device is the primary one that will drive your laptop, monitor or other cheaper speakers. Then click on “App volume and device preferences” to bring up the menu to determine which speakers Spotify or your other multimedia app will use.

If you added a new audio output device to your computer, Windows will automatically assume it is the default audio device. Here, if you want this device to be the secondary device, you would have to use the above-mentioned Settings – Sound panel to select the primary sound device to be the default device.

In my setup, I used my LG monitor which has an HDMI link and built-in speakers but yields laptop-quality sound as the primary sound device while a Motorola Bluetooth audio adaptor connected to an older boombox serves as the secondary sound device. Because I am using a traditional desktop PC, the Bluetooth link is facilitated through a USB Bluetooth modem.

Windows - System - Sound menu for app-based audio device selection

Spotify set up to play

Next to the app you wish to direct the sound output for, click on the drop-down box in the Output column. At the moment, this will say “Default”, but use this to select the output device you want to have the app come through such as the USB DAC or Bluetooth speaker.

Here, I tested the setup with a Win32 app in the form of the Windows Media Player and it does work properly even though that program provides the ability for users to determine the sound output device that they use. Then I tried it with a UWP (Microsoft Store) app in the form of Spotify’s Windows 10 port and this worked reliably. Subsequently, I also found that this setup worked with Google Chrome when playing a YouTube video. Through these tests, I made sure that the Windows sounds were playing through the primary speakers.

You may have to run totally different browsers if you want the sound from one Webpage to pass through one device while the sound from another Webpage passes through another. This can be of concern if, for example, you are running a YouTube playlist or something similar as background music while you are playing a Web-based social-media game.

Going back to normal operation

To get back to your normal settings, click the “Reset” button in the “App volume and device preferences” window to have all the sound sources work through your default devices.

You may find that some media content may stop if you switch audio devices while it is running. If you do use this ability to maintain a “cue” device and a “main” or “front-of-house” device for playout purposes, you will have to pause the media file before you switch audio devices or simply restart the media content after you switch.

Other abilities

There is the ability to determine which input device an app uses which can be good for Web-based, Microsoft Store or similar apps that don’t provide an option for you to choose which microphone device you are to use. This can come in handy if you want to use a more accurate microphone with Cortana, courseware apps or baseline notetaking apps rather than your 2-in-1’s built-in microphone.

In this case, you choose the Input device you want to use for each program or Web browser rather than choosing the Output device.

What improvements could be provided

This feature could be taken further through the use of a “Default Multimedia Audio Device” definition that is expressly used for media-player software and/or a “Default Game Audio Device” definition used for games.This could then allow a user to have an audio device work as the one to use for multimedia or gaming purposes while another is used for the system sounds. It can then lead to the ability to create an “audio device ladder” for each audio device class where connection of certain audio devices like headphones, HDMI-equipped TVs or USB DACs overrides other audio devices in a particular order.

Another issue that will crop up with this new ability that Windows 10 April Update provides is sending different audio content to different “jacks” served by the same audio infrastructure. It may come about through cheaper computer designs that only have one audio chipset for HDMI, internal-speaker and audio-jack output rather than allowing for a separate audio function that is part of a graphics infrastructure to support HDMI digital audio.

Conclusion

Now you are able to make sure that your Windows computer’s multimedia software can play through the speakers that would suit it best without having the various audio prompts that the Windows shell or office software creates blasting their way through those speakers.

Microsoft dropping features from Windows 10 Fall Creators Update

Article

Acer Switch Alpha 12 2-in-1 with keyboard press image courtesy of Acer

There is the risk of over-promising and under-delivering when there is a short time between major operating system updates

Where do we stand with features for the Windows 10 Fall Creators Update? | Supersite Windows

My Comments

An increasing trend for regular-computer and mobile operating systems is for them to be updated on a regular basis along the model of “software-as-a-service”.

With this model, the companies behind these operating systems will typically license the operating system with new hardware, but not require the user to pay to acquire newly-developed functionality. It is in conjunction with making sure that all bugs and security exploits are removed from the system.

A problem that has been found with this method of delivery is that it can be easy to over-promise and under-deliver as what Microsoft commonly does. This has shown up more so with the Fall Creator’s Update of Windows 10 where Microsoft removed Windows Timeline and Cloud-Powered Clipboard, two highly-promised features, from the feature list for that update.

What is underscored here is the frequency of major updates that add significant amounts of functionality to an operating system, along with calling out the promised improvements for these updates. Apple and Google implement a yearly cycle when it comes to delivering major operating-system updates that are about adding extra features while Microsoft undertakes this on a six-monthly basis.

The advantage of the long lead-time that Apple and Google run with is that they can deliver on their promises by writing in the code and subjecting it to a long debug and optimisation cycle including delivering it in publicly-available beta-test packages. This is conversant with Microsoft calling out features for a major functionality update and having to have all of them work to expectation by the time the update is considered “feature complete”.

But how can Microsoft and others who implement the short lead times for major functionality updates avoid the issue of over-promising? Here they could announce that some features are being destined for the upcoming functionality update while others are being destined for the subsequent update.

Similarly, they could deliver the functionality in an “out-of-band” form such as free-to-install apps provided through the platform’s app store, a practice Google is undertaking with the Android platform. In the case of functionality dependent on a particular peripheral class, it may be delivered as part of the onboarding process that the operating system performs when that peripheral is connected for the first time.

Personally, I would like to see some effort put towards fine-tuning the peripheral and network interface software code to encourage more “driver-free” peripheral connectivity that occurs in a secure stable manner to the latest specifications for that device class.

What is being highlighted here is the risk of over-promising and under-delivering when it comes to delivering major functionality updates for an operating system.

Set Windows not to interrupt your presentation or movie

Article

Presentation shown on retractable screen

You don’t really want Windows to throw pop-up notifications during that important business presentation

How to disable notifications while presenting on Windows 10 | Windows Central

My Comments and how to go about this further

Most of us encounter times in our work and personal computing lives where we don’t really like Windows to “pop up” too many notifications while we are concentrating. Situations where this is more so include running a presentation, watching video material, engaging in a videocall or playing games where we really crave the minimum of distractions.

Screenshot of Acorn TV website

.. nor while watching that bit of video-on-demand content on your computer

There are multiple approaches to reducing distractions caused by Windows when it pops up those notifications. These depend on the screen setup you are running with.

One screen

Quiet Hours button on Windows 10

Quiet Hours button in Action Center on Windows 10

Most of you who are using that laptop or convertible 2-in-1 will be using this machine’s screen to view your long-form video or show that presentation to two or three people at the “second-office” café. Or you are using a traditional desktop computer like that “gaming rig” and don’t want Windows to distract you from that game you are playing.

Quiet Hours option - a right click away - Windows 10

Right click on the bubble to pop up this menu

Here, you can enable the “Quiet Hours” function to prevent Windows 8 or 10 from popping up notifications when you don’t want them. This can be enabled using a “button” in the Windows 10 Action Center or by right-clicking on the Windows 10 Action Center bubble at the right-hand corner of the screen then selecting “Turn on Quiet Hours”. This will mute all notifications coming in so you aren’t disturbed.

When you have finished, you then disable “Quiet Hours” by repeating the above process. If you right-click on the Action Center bubble, the option that will show up will be “Turn Off Quiet Hours”.

Two Screens – Duplicated display

Windows 10 - Hide Notifications When Duplicating Screen

Use this option to hide notifications when you have two screens replicating each other

Some of you who have a laptop may connect your computer to the projector or large-screen TV and set it up to “duplicate” the display. This is often seen as a simplified approach to putting things up on the large screen especially if both displays have the same resolution and aspect ratio.

As well, this scenario may please those of us who are using Windows Media Player, Windows Photo Viewer, the Windows Store apps or similar software that doesn’t address displays separately, or are simply working with the Web.

Windows 10 has a dedicated setup for this scenario where if you are duplicating the display, you don’t see any of the notifications appearing on both screens. This is a separately-selectable option in the Notifications And Actions settings screen as “Hide Notifications When I’m Duplicatiing My Screen”.

Two Screens – Extended display

Extended Display setup for a secondary display as a dedicated screen - Windows 7

Extended Display setup – for a secondary display as a dedicated screen – Windows 7

There are those of you who have your computer connected to an external display in the “extend” mode. This may be because you are using presentation software that can separately address the external displays or are using the extended multiple-screen desktop.

In this scenario, you would be having your notifications appear on your setup’s primary screen such as your laptop screen. This is although, in a presentation setup, you would be having the presentation appear on the large screen.

But you may want to be sure that you are not disturbed during the presentation or video content. Here, you can follow the instructions for enabling “Quiet Hours” as described in the “One Screen” context.

Managing your system’s sound

On the other hand, you may not mind the visual notifications on your screen such as when you are watching a video or engaging in a videocall. This may be because you want to make sure you don’t miss that message for example.

But you may want to play things a bit more discreetly and not have chimes or bells associated with incoming messages or error notifications disturb you. This is more so when you have the sound coming through a sound system or a large-screen TV’s speakers, and these sounds at the default volume level can be increasingly annoying to hear.

This situation shows up very strong where the software you are using doesn’t allow you to determine which sound-playback device it should play through and you have to use the Windows “default sound device” typically shared by the system for its notification purposes. This situation applies mainly with Web-based situations, UWP / Modern / Metro apps that you get from the Windows Store or some online-service clients like Spotify.

There is the ability to turn off audible chimes for apps that put up notifications but let them put up the visual notifications. Here, you may have to use the Notifications settings screen and work through each app and turn off the “Play a sound when a notification arrives” option on each app. Then you would have to do this rigmarole again when you want the audio prompts back.

Volume Mixer in Windows 10, similar to other Windows versions

Volume Mixer in Windows – System Sounds are the notification chimes and dings

Here, you can work around this problem by using the Windows Volume Mixer to reduce the System Sounds volume output so that those beeps and chimes don’t come through very loud. You can even slide that volume right down so that those sounds can’t come through at all. If you are using Windows Store apps like some of the Windows 10 clients for the various online video services, you could use “Ear Trumpet” (Free download from Windows Store) which is an advanced volume mixer that works with these apps as well as Desktop (classic) apps as well as integrating with the Windows 10 look and feel.

Those of you who run Windows 10 April 2018 Update (build 1803) will have the integrated Volume Mixer function able to manage the sound from both the legacy Win32 apps and the UWP Windows Store apps in the same interface. This also extends to the ability to direct which sound device a program uses for its sound output so you don’t hear the notification chimes coming through your TV’s speakers, home theatre or PA system.

Ear Trumpet volume mixer app for Windows 10 - manages Windows Store apps

Ear Trumpet volume mixer app for Windows 10 – manages Windows Store apps

What Microsoft could do

Microsoft could support a “notifications profiles” setup in Windows where you can turn off the notifications abilities for particular apps and save these setups as one or more profiles. Here, it could be useful to allow users to create situation-specific profiles such as one to have when watching video content, running a business presentation or going to bed.

It could be implemented also with notifications being assigned “priority” levels so as to allow users not to have “hints-and-tips” or similar unimportant notifications come through at “do-not-disturb” times yet have important notifications come through. For email, messaging and similar software, user could assign priority levels for their contacts so that they don’t miss messages from the contacts that matter like the boss.

The sound-management software in Windows could allow you to create situation-specific sound-level settings like what happened with the Symbian-based Nokia phones. This was where you could create sound-level scenarios for particular situations by varying different sound outputs like ringtone, notification tones and multimedia sounds (music or video playback). This also appeals to other ideals like being able to relegate sound classes like system notifications to particular output devices independent of other sound classes like multimedia and communications.

Conclusion

Once you know how to manage the notifications that pop up in Windows 10’s Notification bar, you can be able to make sure you aren’t distracted by this noise when you want to run that important presentation or watch that favourite Netflix. Similarly, adjusting the sound output of your apps, especially those that are only about notifying, can allow you to achieve that quiet environment while you enjoy music, watch videos or give presentations.

Update

I have updated this article to highlight the improvements that Windows 10 April 2018 Update (Build 1803) offers in relation to sound-level and device management.

More malware being discovered for the Macintosh platform

Article

Apple MacBook Pro running MacOS X Mavericks - press picture courtesy of Apple

Even Apple Macintosh users need to keep secure computing habits

Mac Malware Opens OS X Backdoor to Attackers | Tom’s Guide

My Comments

A lot of Apple Macintosh users have jumped to this platform based on an initial fact that there was very little malware written for it. But now, as more people are using Macs, they are becoming a target for malware including some “backdoor” software which weakens the MacOS’s defences against other malware.

This time, what was being called out was a Trojan-horse program that pretends to be a file-conversion program, the kind of program that is easily downloaded in a hurry.

Keep your Mac’s operating system and software patched and updated

A good practice regarding keeping your Mac secure, as with other computing platforms, is to make sure that the MacOS operating system is up-to-date with all the patches that Apple releases. This is because Apple may have released bug-fixes or remedied exploits that have been discovered in your version of the MacOS operating system.

Preferably, I would recommend you have this set up to work automatically so that when you are connected to the Internet via Wi-Fi or Ethernet, your Mac is kept updated and patched.

You can set this up to be performed automatically by going to [Apple] – [System Preferences]. Then you go to the App Store panel if you have one of the newer versions of MacOS (Yosemite onwards) then check the boxes for “Automatically check for updates” and “Download newly available updates in the background”. This will then make the “Install OS X Updates” option available which you should check.

For Macs that run prior versions, you would still go via [Apple]-[Software Update] and set the appropriate options to automatically patch your version of MacOS X.

You can manually update and patch your Mac by visiting the App Store if you are in Yosemite or newer versions and tick off all of the software that needs updating in the Updates panel. For prior operating systems, you would need to visit the [Apple]-[Software Update] menu and click the option to download and install the latest patches for your Mac.

You can still visit the Updates panel in the App Store and go through all the apps that need updating so you can be sure they are up-to-date. If you have software that isn’t delivered via the App Store, use its interface or the software developer’s Website to keep it up-to-date. This is also important because older versions of application and other software can carry bugs or exploits.

This is something you should do when you switch your Mac on if you haven’t used your Mac or haven’t connected it to the Internet for a significant amount of time, such as with a secondary-use MacBook or a Mac that you use as part of multi-platform computing.

Upgrade your Mac’s operating system if you can

It may be worth upgrading your Mac’s operating system to a newer version if your computer can handle it. In most cases, you can update the system for either pennies’ worth or for free. Here, you could check the App Store or Apple’s website regarding newer operating systems for your Mac.

The main advantages that these new operating systems offer encompass system-wide hardening including the availability of the Mac App Store where the software is verified before it is made available.

Make sure you download software from reputable sources

For all computing platforms, one requirement for safe and secure computing is to obtain computer software from known reputable sources.

In the case of the Macintosh, either download new software from the Mac App Store where the software is verified or from the website of a trusted and known developer. Even when you obtain software from the Mac App Store, check the quality of the software by looking through the reviews that are posted about it and checking the reviews also for other software offered by the same developer. I have written an article about obtaining software from app stores because there has been a risk of them turning in to the equivalent of bulletin boards and download sites that host poor-quality software.

When it comes to software delivered in a packaged form, avoid the temptation to install from anything unless you have bought it yourself from a reputable dealer.

Consider desktop-security software for the Mac

This may sound foreign to Apple Macintosh users but you may also find that it may be worth considering the installation of a desktop-security / endpoint-security program on your Mac. It is more so if you or others who use your Mac are not astute when it comes to downloading software or handling the Internet.

Most of the developers who have written these kind of programs for the Windows-based computers have now written versions of these programs for the Macintosh platform because of the rise of threats against this platform. Like with Windows, the better desktop-security programs also offer protection against Internet-borne threats such as site-reputation checking, content filtering, and spam filtering. Similarly, better-quality software runs in a manner that doesn’t impinge on your Mac’s performance.

Conclusion

Like other computer platforms like DOS / Windows, the Apple Macintosh needs its users to be careful about keeping their computer and data secure. This includes keeping the operating system up-to-date along with being sure about what software you have on your computer.

Your Chromebook can now work with your SMB-capable NAS

Article

WD MyCloud EX2 dual-disk NAS

These NAS units can now work with your Chromebook thanks to a Google SMB/CIFS file-system hook

Chromebooks can now seamlessly access Windows network file shares | PC World

Download link (Chrome OS)

My Comments

An issue you may find with the newer Chrome OS is that you could become stranded when it comes to gaining access to files. This may place limitations on your Chromebook’s utility value and you may find it serving as a glorified tablet.

Now you can download a Google-created app which serves primarily as a “hook” between Chrome OS and the SMB/CIFS network file exchange protocol implemented in just about all of the desktop operating systems for file sharing and in every network-attached storage device on the market.

This app takes advantage of an API made available for the Chrome OS platform that allows people to create software that links this platform with various file-storage systems and has been published as an open-source program, due to it being based on the Samba SMB/CIFS software used in every NAS. This could open up paths for creating various “hooks” for operating systems and computing platforms that make them work with these NAS units.

The article raised the issue of Dropbox and Microsoft writing native “hooks” for their cloud storage systems rather than users of these systems using flaky software to have their Chromebook work with Dropbox or OneDrive.