Download the PDF Computerworld Cheat Sheet today.
Author: Security – Computerworld
The FBI now says encryption is good for you
Apple has faced an unequal battle in recent years as some lawmakers, the FBI, and regulators insist that the company create backdoors through which to access messages and other parts of its platform.
Apple and others have always insisted that there is no such thing as a safe backdoor, and that if one person has access, then it’s only a matter of time until others gain access, too.
Use encryption for all your communications
Now, the FBI seems to agree.
In a recent security warning, the FBI and the US Infrastructure Security Agency have warned people to use encrypted apps such as iMessage and FaceTime for communication in order to retain security resilience against foreign hackers.
They also warn people to avoid using Rich Communication Services (RCS) when sharing messages between iPhones and Android devices, as RCS does not yet provide end-to-end encryption. (It is allegedly coming eventually, according to RCS standards body, the GSMA). What this means is that Android and iPhone users should probably consider installing Signal for cross platform communications, which does provide cross-platform encryption.
Apple also continues to invest in encryption technologies to protect its customers, and recently introduced upgraded protection against future high-level attacks that use quantum computers to break into your communications.
An about face?
What’s noteworthy about the FBI warning is that the agency has been battling Apple for years to convince it to put backdoors into its encryption — ostensibly to enable law enforcement. Apple has resisted so far, arguing that once you leave any form of vulnerability in any platform you are automatically placing customers at risk.
Knowledge of these back doors will inevitably slip outside the control of law enforcement into the hands of nation state attackers and — eventually — criminal groups, making everybody far less secure and placing personal, commercial, and national interest at risk. Not only does such weakened encryption directly threaten personal privacy, it also undermines national security.
A former head of UK national security agency MI5 warned of this almost a decade ago, while Apple software Vice President Craig Federighi has similarly warned: “Weakening security makes no sense when you consider that customers rely on our products to keep their personal information safe, run their businesses or even manage vital infrastructure like power grids and transportation systems.”
All the same, demands that Apple weaken platform security by diluting device encryption have remained. But with the attack environment now in a red zone, the FBI issued its warning about encryption.
It comes after a CISA warning concerning ongoing attacks by China-based hackers.
So, what is the FBI saying?
“Our suggestion, what we have told folks internally, is not new here: Encryption is your friend, whether it’s on text messaging or if you have the capacity to use encrypted voice communication,” said Jeff Greene, executive assistant director for cybersecurity at the CISA. “Even if the adversary is able to intercept the data, if it is encrypted, it will make it impossible [to use].”
The FBI also shared a recipe for security that should be on the desk of every IT purchaser. It recommends you use mobile devices that automatically receive timely OS updates, have encryption built in, and use multi-factor authentication for most collaboration tools. In other words, use a higher-end smartphone in preference to a low-end land-fill wannabe. Or, given that the best way to ensure security in your tech is to invest in secure products, use an iPhone, which has built-in encryption and is designed with a security-first agenda.
That focus on security likely reflects how Apple approaches the topic.
The next big war
After all, it was almost a decade ago that Apple CEO Tim Cook warned: “I think some of the top people predict that the next big war is fought on cybersecurity. With hacking getting more and more sophisticated, the hacking community has gone from the hobbyist in the basement to huge, sophisticated companies that are essentially doing this, or groups of people or foreign agents inside and outside the United States. People are running huge enterprises off of hacking and stealing data.
“So yes, every software release we do, we get more and more secure,” he said at the time.
Now, at last, the FBI seems to agree that encryption makes us safer. We really should keep using it, and reject arguments against doing so.
You can follow me on social media! Join me on BlueSky, LinkedIn, Mastodon, and MeWe.
Meta quietly leans on rival GPT-4 despite Zuckerberg’s bold Llama claims
Mark Zuckerberg has consistently championed Meta’s Llama AI model as a leader in generative AI technology, positioning it as a strong competitor to OpenAI and Google. However, behind the scenes, Meta is complementing Llama with a rival AI model to meet its internal needs.
Meta’s internal AI-powered coding assistant, Metamate, uses both Meta’s Llama model and OpenAI’s GPT-4 to help developers and employees with coding tasks, reported The Fortune. The tool, which has been operational since early 2024, dynamically switches between the two models depending on the query, according to a current and a former Meta employee who spoke anonymously to The Fortune.
Meta quietly leans on rival GPT-4 despite Zuckerberg’s bold Llama claims
Mark Zuckerberg has consistently championed Meta’s Llama AI model as a leader in generative AI technology, positioning it as a strong competitor to OpenAI and Google. However, behind the scenes, Meta is complementing Llama with a rival AI model to meet its internal needs.
Meta’s internal AI-powered coding assistant, Metamate, uses both Meta’s Llama model and OpenAI’s GPT-4 to help developers and employees with coding tasks, reported The Fortune. The tool, which has been operational since early 2024, dynamically switches between the two models depending on the query, according to a current and a former Meta employee who spoke anonymously to The Fortune.
Hands on with Microsoft’s Windows Recall: Not impressive yet
When Microsoft announced Recall earlier this year, the move took the tech world by storm — and not in a good way.
Recall is supposed to help you find almost anything you see on your PC by taking screenshots in the background and turning your everyday Windows usage into a searchable database. Out of the gate, Microsoft made some questionable privacy decisions, and the company was unable to properly explain why we should actually trust Recall to collect and process so much sensitive info.
Now, many months later and after a variety of changes, the controversial Windows Recall feature is finally available for testing — as long as you have a Qualcomm Snapdragon X-powered Copilot+ PC and are willing to join the bleeding-edge Windows Insider Dev channel for testing early software. In other words, most average business users can’t actually test it yet.
But that doesn’t mean you have to remain blind to the progress. I’ve been using Recall on a Microsoft Surface Laptop 7 for the past few days. And, while I was intrigued by its promise (especially after those privacy changes), it’s just nowhere near what Microsoft has promised.
Want expert insights on the future of Windows? Check out my free Windows Intelligence newsletter — three new things to try every Friday. Plus, get a free Windows Field Guide as a special welcome bonus!
Why you might want to use Windows Recall
On the surface, Recall sounds like an intriguing enough feature for knowledge workers. Just think: If you have a modern Copilot+ PC, Windows can take screenshots (or “snapshots”) in the background every five seconds and store them for later. Then, you can use “AI” to search through them.
Imagine being able to ask, “What was that document I was looking at a week ago — the one with the green-and-red pie chart?” or “I was researching hotels a month ago — show me the one with a balcony overlooking the river.” Recall would understand the content of the snapshots, including the images, and use AI to understand and process your precise requests — in theory, at least.
Depending on who you are and how you use your PC, it seems like either a fascinatingly useful feature or something you’d definitely want to avoid. But it definitely doesn’t seem boring.
And Microsoft designed Recall in a much more private way than you might expect, especially after the latest round of changes. You can read my in-depth Recall privacy FAQ for all the details around how exactly that works. Now, I want to get into the specifics of what the system’s actually like to use.
Getting to know Microsoft’s Windows Recall interface
First things first: When you’re using a Copilot+ PC where Recall is available, the feature isn’t turned on automatically by default. You have to choose to activate it, or it won’t do anything.
And once Recall is active, it’s never hiding. Recall shows a status icon in your system tray, and you can use that status icon to see what it’s doing, access settings, and pause it from saving snapshots.
Chris Hoffman, IDG
In the Recall setting window, you can tell Recall to never capture snapshots of specific applications or websites. (Recall already won’t capture snapshots of private browsing windows in modern web browsers like Chrome, Edge, Firefox, and other Chromium-based browsers.)
Chris Hoffman, IDG
You can open the full Recall window from that system tray icon or via a taskbar icon or Start menu shortcut. When you do, you’ll have to authenticate with Windows Hello (using facial recognition, a fingerprint, or a PIN) before you can access any snapshots or associated info.
Chris Hoffman, IDG
Then, you can see the current snapshots or scroll back through everything you’ve had on your screen by hand. But the real point of the Recall window is the search box, where you can search a sprawling database of snapshots simply and without any real effort — again, in theory.
The reality of Microsoft Recall search
In this first public test release, the basics are all perfectly functional. Let’s say, for example, you want to recall what you were reading about a project named Windows Longhorn. You can plug in the word “Longhorn,” and you’ll find instances where the word Longhorn appeared on your screen. This could help you find relevant documents, emails, and web pages you’d explored. That could conceivably be useful to knowledge workers who are looking for a more powerful search experience.
Unfortunately, it doesn’t quite work like Microsoft promised. Let’s say you want to find pie charts: A Recall search for the term “pie chart” will generally only find pie charts if the words “pie” and “chart” actually appeared on the screen at the same time. In other words, the visual search is not working like you’d expect.
Chris Hoffman, IDG
Additionally, the “AI-powered” part of the search doesn’t seem to be functioning properly at all. I can’t reliably perform queries like “Find me that document from yesterday with a blue pie chart.”
Mostly, what Recall seems to be doing is:
- Capturing the contents of the screen every five seconds or so
- Using optical character recognition (OCR) to convert the words on screen to searchable text
- Letting you search for words in those screenshots and showing you the results
That’s potentially interesting, but it’s far from what I expected and what Microsoft promised. Recall does provide “visual matches” in addition to those “text matches,” but they often don’t seem to be particularly relevant or helpful.
The power of Recall’s “Click to Do” capability
Basic search smarts aside, Recall includes a noteworthy option called “Click to Do.” After you open a snapshot, Click to Do will make the snapshot interactive, letting you copy text and images and perform actions on the image. For example, you can copy selected text, perform a web search for something seen within the snapshot, or send an email to a selected web address from the snapshot.
Chris Hoffman, IDG
Recall’s Windows integration problem
More than anything, the core issue with Recall is that the system isn’t really part of Windows at any deep level. It’s an application that captures screenshots and lets you search through them. It doesn’t work closely enough with the applications you actually use.
Here’s what I mean: Let’s say you used Recall to dig up a Word document you were looking at the other day. Now you’ve found the document, and you want to open it.
Well, Recall knows the document was in Microsoft Word, so you can click a button to open Word. But Recall doesn’t know what specific file document was involved. There’s no one-click action to open a specific document. You have to look at the title of the document in the Microsoft Word snapshot and hunt it down yourself.
This works a bit better with snapshots of web browsers, since the URL of the web page is displayed at the top of the screen in the address bar — so “Click to Do” can extract the web address and let you open it in a single click.
But, if the address of the web page is particularly long or your browser window is particularly small, the full address of the web page won’t appear visually in the snapshot. And that means you won’t be able to open it, since Recall only captures and uses visual details.
In other words, Recall functions as a bit of a “dirty hack” in some ways. Rather than applications providing information to Recall about what documents, pages, or emails you have open, Recall just grabs whatever it can see visually on screen. And that doesn’t create an especially compelling real-world experience.
Microsoft’s multi-device challenge
There’s another asterisk to consider with Recall’s practical effectiveness, and it’s connected to some of the more positive-seeming changes Microsoft has made to the system.
For privacy reasons, Recall snapshots are stored only on your PC. They can’t be synced to any other device. That’s beneficial for privacy, sure, but it has some serious consequences for knowledge workers.
Specifically, Recall only allows you to search snapshots of things you’ve seen on your current PC. If you use multiple computers — a laptop and a desktop PC, for example — you’ll have to ask yourself, “Did I see that thing on my laptop or my desktop?” And that confusion only gets more complicated when you factor in devices like phones and tablets.
I’m not sure this will ever be resolved, as there’s such a strong push to keep Recall data on each device — and for good privacy reasons. But it will create an awkward challenge for productivity workers looking to use the feature.
The future of Windows Recall
What we’re seeing now is less of a finish line and more of a first step in a long, ongoing race. As it stands now, Recall isn’t for everyone, and I’m glad it’s off by default. Many people, particularly privacy-conscious professionals and those who work at companies with strict policies surrounding data use, won’t want to touch it. But many knowledge workers would benefit from a more powerful search tool that helps them dig through all the information they’ve seen on their PC, and it would be great if Microsoft could deliver a more powerful experience.
As of its initial testing release, Recall delivers the bare minimum and doesn’t provide the strong visual analysis and AI-powered search features Microsoft promised. I hope Recall evolves and improves. And it very well might! We can’t judge it only based on this early release. (Of course, Recall was supposed to launch on consumer PCs nearly six months ago.)
But I’m hoping for progress. It would be a shame to go through such a long and controversial news cycle and not get a powerful tool out of it. Right now, it doesn’t make sense that Microsoft took so much heat for this feature.
This is only the start: Sign up for my free Windows Intelligence newsletter to be the first to see my in-depth impressions. You’ll also get three new things to try every Friday and free copies of Paul Thurrott’s Windows Field Guides as a special welcome bonus.
Microsoft moves to stop M365 Copilot from ‘oversharing’ data
As Microsoft pushes for businesses to adopt its Microsoft 365 Copilot, many customers have run into a major stumbling block: the AI assistant’s ability to surface confidential information to employees. To deal with the oversharing problem, Microsoft rolled out new tools at its Ignite event last month, including new features in SharePoint Advanced Management and Purview, alongside a blueprint guide to deploying the generative AI (genAI) assistant.
“AI tools like Copilot are an increasing concern for data security professionals due to the amount and nature of data that these tools have access too,” said Jennifer Glenn, research director for IDC’s Security and Trust Group. “Since Microsoft 365 is pervasive in the enterprise, the concerns about Copilot inappropriately accessing or sharing data is a concern I’ve heard often.”
She added that the new data governance and security tools from Microsoft to address oversharing are “essential for enterprises to feel confident in adopting AI tools like Copilot.”
The ability to sift through broad swaths of corporate data and retrieve information for a user is one of M365 Copilot’s strengths. Responses are grounded in the information held across an organization’s M365 environment, such as Word docs, emails, Teams messages, and more. The downside to that feat? Copilot’s language models can also access sensitive files that aren’t locked down.
For some organizations, this has resulted in employees gaining access to confidential data in Copilot’s responses: payroll data, confidential legal files, even top-secret company strategy documents, or any information Copilot can access.
“AI is really good at finding information, and it can surface more information than you would have expected,” said Alex Pozin, director of product marketing at Microsoft, during a session at Ignite. “This is why it’s really important to address oversharing.”
The implication for businesses is that “it can be hard to get started with AI in the first place, because you have to address these problems before you get there,” he said.
“Typically, these issues are a by-product of collaboration,” said Pozin, particularly relating to SharePoint sites and OneDrive.
Microsoft
The reasons Copilot can overshare data include site privacy set to “public” rather than “private,” a default file-sharing option that favors access to data by everyone in an organization, and a lack of sensitivity labels, among others. Addressing this is no small task: some companies’ sites contain “millions” of files, said Pozin.
Part of Microsoft’s plan is to expand access to SharePoint Advanced Management (SAM). SAM — introduced as part of SharePoint Premium last year — will be included at no extra cost to M365 Copilot subscriptions starting in early 2025. (M365 Copilot costs $30 per user a month; SharePoint Premium costs $3 per user each month.)
There are also new features for SAM that Microsoft says will provide greater control over access to SharePoint files.
For instance, permission state reports (now generally available) can identify “overshared” SharePoint sites, while site access reviews (also now available) provide a way to ask site owners to address permissions.
Restricted Content Discovery, which rolls out this month, lets admins prevent Copilot from searching a site and processing content; otherwise, the site will remain unchanged and users can access it as usual. This builds on Restricted Access Control, launched in GA last year, which lets admins take control to restrict site access to site owners only, while also preventing Copilot from summarizing files at the same time (intended as a temporary measure, Microsoft said).
Microsoft
“There are situations where you do identify sites that are top secret or kind of “secret sauce” sites where you … want to hide them from Copilot altogether and never risk anyone unintentionally being able to see that content,” said Dave Minasyan, principal product manager, Microsoft, during the Ignite session. “Restricted Content Discovery is the way to do that … you can surgically lock down or hide sites from Copilot reasoning.”
There are also new tools in Purview — Microsoft’s data security and governance software suite that’s available in E5 subscriptions — to identify overshared files that can be accessed by Copilot.
This includes oversharing assessments for M365 Copilot in Data Security Posture Management (DPSM) for AI, which launched in public preview at Ignite. Accessible in the new Purview portal, the oversharing assessments help highlight data that could present a risk by scanning files for sensitive data and identifying repositories such as SharePoint sites where access permissions are applied too broadly. There are also recommendations for how to mitigate oversharing risk, such as adding sensitivity labels or restricting access from SharePoint.
Microsoft Purview Data Loss Prevention for M365 Copilot, also in public preview, lets data security admins create data loss prevention (DLP) policies to exclude certain documents from processing by Copilot based on a file’s sensitivity label. This applies to files held in SharePoint and OneDrive, but can be configured at other levels, such as group, site, and user, to provide more flexibility around who can access what.
Another tool in Purview, Insider Risk Management, can now be used to detect “risky AI usage.” This includes prompts that contain sensitive information and attempts by users to access unauthorized sensitive information. The feature, also in public preview, covers M365 Copilot, Copilot Studio, and ChatGPT Enterprise.
Finally, there’s a new blueprint resource on the Microsoft Learn site that outlines recommended paths to mitigate oversharing during three stages of M365 Copilot rollouts: pilot, deployment, and ongoing operations. There are two blueprints; a more basic “foundational path” and an “optimized path” that uses some of the more advanced data security and governance tools in E5.
Microsoft
“The new built-in M365 Copilot governance controls are long-overdue,” said Jason Wong, distinguished vice president analyst at Gartner. “Immature security controls and oversharing concerns have been top challenges for organizations as they evaluate and implement M365 Copilot in 2024.”
A Gartner survey of 132 IT leaders in June showed that data “oversharing” prompted 40% of respondents to delay M365 Copilot rollouts by three months or more, while 64% claimed information governance and security risks required significant time and resources to deal with during deployments.
Gartner’s survey indicated that businesses are keen to access tools to help manage their data: more than a quarter of respondents upgraded their M365 licenses to include some Microsoft Purview services. The issue isn’t just a problem for Microsoft; a range of third-party software vendors — Syskit and Varonis, for instance — also promise to help organizations manage and secure their data when deploying M365 Copilot.
Wong said customers looking to deploy M365 Copilot need to invest in a range of measures to ensure the AI assistant is rolled out securely — all of which plays into the value generated by M365 Copilot.
“Even with the built-in features, factoring Copilot total cost of ownership and ROI figures should include any additional spending and resource commitment needed for security remediation and ongoing operations, including training employees on safely storing and sharing information,” said Wong.
Intel’s CEO, Pat Gelsinger, ‘retires’ — riiiiight
Back in the 1990s, when Bill Clinton was president, people figured out they might just want to be on the internet, and Intel and Microsoft were the major technology powers. Between them, they owned the PC market and you’d have been laughed at if you told someone that “WinTel” would collapse like a house of cards in a hurricane.
Things have changed.
On Monday, Intel announced CEO Pat Gelsinger’s immediate “retirement.” Well, the company says he retired — but no one with a clue is buying that. He was forced out by the company’s board of directors, which had grown increasingly frustrated with the pace of his attempts to turn Intel around.
Word is that Gelsinger, who had been at Intel’s helm for nearly four years, was reportedly given two options by the board: retire or be fired. After almost 40 years at the company, he understandably didn’t want to be shoved out the door.
There are many reasons why push came to shove. But you can’t blame it all on Geisinger. Intel had been heading downward since 2007.
Why that particular year? Because 2007 is when Apple introduced the iPhone — with Samsung chips. The iPhone could have had “Intel Inside.” Apple CEO Steve Jobs wanted that, but Intel fumbled the deal. We didn’t know it at the time, but tech users —and everyone else — were starting to move away from PCs to smartphones. (In case you haven’t noticed, Intel has never had a meaningful smartphone chip.)
For the record, Intel did have several smartphone-capable chip families, including the XScale and the Atom. Then, as until recently, Intel was laser-focused on its current PC and server market. This short-term thinking, deadly in the long run in the ever-changing tech business, would show up again and again as Intel started its slow, sure decline.
Next, rather than update its chip foundries, Intel was slow to adopt extreme ultraviolet lithography (EUV), a crucial technology for advanced chip manufacturing. The delay enabled rivals such as AMD and Taiwan Semiconductor Manufacturing Company (TSMC) to take the chip production lead.
More recently, in 2020, Apple dumped Intel for its own ARM-based chips. That hurt.
In the meantime, AMD introduced its Zen architecture, launching Ryzen processors and EPYC chips for servers in 2017. The result? AMD’s share of the desktop market grew from 17.1% in Q3 2017 to 28.7% by Q3 2024, and EPYC gained significant traction in the server market, with 24.2% unit share and 33.9% revenue share by 2024’s third quarter.
Then came the real killer: AI and Nvidia, another example where Intel didn’t see the revolution coming. Truthfully, you can’t blame Intel too much for missing the rise of AI. Few people did. Nvidia, however, had been growing like gangbusters long before AI supercharged its growth. The rise of high-end gaming and cryptocurrency started its rise as a trillion-dollar company.
Intel? The chipmaker’s GPU market share dropped from an already abysmal 2% in Q2 2023 to zero — zilch— in Q2 2024, while rival Nvidia’s share rose from 80% to 88% during the same period.
Meanwhile, Intel’s stock price had dropped by approximately 60% since Gelsinger took over in February 2021. This past October, Intel posted a quarterly loss of $16.6 billion, the company’s largest net loss in its 56-year history. In that same quarter, Intel failed to issue stockholder dividends for the first time since 1992. And then Intel was removed from the Dow.
The latter was the final insult.
Some publications have called Gelsinger’s retirement “surprising.” Please, I’ve been expecting this since the summer, and I’m no genius.
True, Gelsinger had unveiled plans for a $20 billion chipmaking facility in Ohio and expanded operations in Europe. Intel will also — maybe — benefit from billions in aid, thanks to the CHIPS Act to support America’s chip foundry construction. I say maybe because President-elect Donald J. Trump wants to kill CHIPS. He believes tariffs on foreign companies, such as Taiwan-based TSMC, will magically generate billions of dollars to build new semiconductor foundries in the US. Yeah. Sure.
Now, in the wake of Gelsinger’s departure, Intel has appointed CFO David Zinsner and Chief Product Officer Michelle Johnston Holthaus as interim co-CEOs. The board has created a search committee to find a permanent replacement “diligently and expeditiously.” I think I’d have worked on finding a new CEO long before now, but that’s just me.
Frankly, I think Intel is done. No, it won’t fall apart tomorrow. But short of a government bailout, much bigger than the one Trump doesn’t want a thing to do with, I don’t see Intel surviving in the long run.
The name will live on, but Qualcomm, for one, might be the company calling the shots if it ends up buying out Intel. Andy Grove, the CEO who set Intel on its path to glory in b better times, must be spinning in his grave.
20 handy hidden tricks for Google Calendar on Android
Google Calendar is a core part of the Android productivity package — but if all you’re using is what you see on the app’s surface, you’re missing out on some pretty powerful possibilities.
Yes, oh yes: Just like so many of our modern digital tools, there’s more to Google Calendar than meets the eye. And while the majority of the service’s advanced options may revolve around the Calendar website, the Calendar Android app has its share of handy out-of-sight options that are specific to the mobile experience. From time-saving shortcuts to efficiency-boosting options, they’re all things that have the potential to make your life easier in small but significant ways.
Find time in your agenda to check out these hidden Google Calendar goodies on Android. Trust me: You’ll be glad you did.
(Note that these tips are all specific to the Google Calendar Android app, which is free and available to use on any Android device — though not necessarily always the default calendar app that’s present on all phones out of the box!)
Google Calendar Android trick #1: Quick peeking
Tell me if you can relate to this: You head into the Calendar app on your phone to create a new event. You open the screen to add the event in — and then you find yourself facing a foggy mental blank.
What else did you have going on that day? Did you need to schedule the event for 2:00 p.m., or would 3:00 be better? When was that podiatrist appointment, again?
[Psst: Love shortcuts? My Android Shortcut Supercourse will teach you tons of time-saving tricks for your phone. Sign up now for free!]
I’ve certainly been there (well, not to the podiatrist, specifically, but in the general event brain fog situation). And the Android Calendar app doesn’t do much to offer any broader calendar context while you’re in the midst of adding in a new event.
Or so it’d seem. After years of using Google Calendar on Android, I not long ago noticed a curiously camouflaged option that’ll change the way you create events on your phone.
See that barely noticeable light-gray line at the top of the Calendar app’s event creation screen? The one that looks vaguely like an arrow pointing downward?
JR Raphael, IDG
Yup, that’s the one. The next time you’re adding a new event on your phone and you find yourself wondering what else is on your agenda around that same time, tap that line — or, alternatively, use it as a hint to swipe downward anywhere within the main event creation area of the screen.
And…
JR Raphael, IDG
Wouldya look at that?! You can actually minimize that event creation interface down to a tiny panel and browse around on your calendar above it.
And that’s not all…
Google Calendar Android trick #2: Simple sliding
After you’ve entered that concealed quick-peek view, remember this: If you decide you need to shift your new event around to another time, you can simply touch and hold the outline on your screen and slide your finger up and down to move it.
Nifty, no? And there’s one more piece to this puzzle yet…
Google Calendar Android trick #3: Gesture adjusting
In addition to sliding an event around to move it in the Calendar Android app’s event creation quick-peek interface, you can touch your finger to the dots on the top or bottom of your event’s outline and then slide up or down from there to make the event longer or shorter.
JR Raphael, IDG
Now if only our actual meetings could be condensed down so easily.
Google Calendar Android trick #4: Instant perspective
When you need to glance at a full-month view whilst thumbing through your events, take note of the following invisible Android Calendar shortcut: You can tap or swipe downward on the app’s top bar — where it says the current month’s name — to bring a monthly view into focus. Tap on the bar a second time (or swipe back up, with your finger starting just beneath that area) to hide it when you’re done.
JR Raphael, IDG
Who knew?!
Google Calendar Android trick #5: Expanded intelligence
Looking at the Google Calendar app on an Android tablet — or a folding phone like the Pixel Fold in its fully unfolded state? You’ve got even more agenda-expanding magic at your fingertips and just begging to be found.
By default on any such device, the Calendar app will expand to take advantage of that screen space in a variety of scenarios. What isn’t obvious, though, is the fact that you can split and then customize your view anytime with a simple on-screen swipe.
In any view other than the Month overview, look for a thin gray line at the left of the screen. (Again: This’ll work only when you’re using the app on a larger-screened device — either a tablet or a fully unfolded foldable.)
Slide your finger on that line toward the right — and hey, how ’bout that?!
JR Raphael, IDG
You can see the full month view right there alongside whatever else you were viewing — at any width you like.
To get to a similar sort of setup from the main Month view, just tap on any event in the calendar. That’ll pull up detailed info about the event in a separate panel to the left — which, once more, you can customize and resize by sliding your finger along the thin gray line separating the two panels.
Not bad, eh?
Google Calendar Android trick #6: Time travel
If you’re already in the Android Calendar app’s full-screen Month view — no matter what type of device you’re using — try tapping on that same month’s name at the top of the screen.
From that view, that action will reveal a nifty new quick-jump bar for quickly zipping forward or back in time to any month imaginable — no scrolling, flipping, or futzing around required.
JR Raphael, IDG
And speaking of shadowy shortcuts…
Google Calendar Android trick #7: Snazzy snapping
Anytime you’re scrolling through your Schedule view in the Calendar app and want to jump back to the current day, tap the small calendar icon (the box with the current date in it, directly to the left of your profile picture in the upper-right corner of the screen).
JR Raphael, IDG
That’ll beam you instantly back to today, no matter how far into the future you’ve traveled.
Google Calendar Android trick #8: Tasks on demand
While we’ve got our attention on that upper-right corner area of the Google Calendar Android app interface, be sure to take note of a very recently added option that’s all too easy to overlook.
As of only this month, Google’s in the midst of rolling out an Android Calendar update that integrates Google Tasks directly into the app — so you can see and manage all of your tasks right within your calendar environment, without having to toggle over to the separate standalone Tasks app.
Just tap the small circled checkmark icon in the Calendar app’s upper-right corner, directly to the right of the current day box we were just chewing over.
JR Raphael, IDG
If you aren’t seeing that icon yet, don’t panic! It’s actively arriving for Android device-owners worldwide as we speak, and it should show up for you any day now.
Google Calendar Android trick #9: Speedy deleting
Here’s an easily missed and incredibly handy gesture in the Google Calendar Android app: From the Schedule view, you can swipe any event or reminder toward the right to delete it in a single, swift action.
JR Raphael, IDG
So long, responsibilities!
Google Calendar Android trick #10: Quick creation
In addition to deleting events at the speed of light, you can also create new events in a delightfully swift way within the Google Calendar app — right from your daily calendar view.
All you’ve gotta do is tap on any open space in that part of the Android Calendar app, and you’ll see an event creation box right then and there:
JR Raphael, IDG
Also worth noting: The same tricks we went over a second ago for sliding around or extending your event’s time will work in this context, too, once you’ve brought that box into focus.
Google Calendar Android trick #11: The double-tap dance
In addition to the tap-anywhere trick for speedy event creation, the Google Calendar Android app has a hidden step-saver within its regular new-event button — y’know, that big honkin’ plus icon floating in the lower-right corner of the screen.
Typically, when you tap that button, you see a pop-up list of options for what you want to create — an event, a task, and so on. It consequently takes extra time to tap the button once, wait for the options to appear, then find and tap the “Event” option to move forward.
But there’s a better way — if you know how to use it. The next time you need to create a new event and you find your finger on that fancy floating button, remember this: You can simply double-tap that button quickly, without pausing, to instantly jump into the new event creation interface.
JR Raphael, IDG
No waiting, no watching, no wasting time whatsoever: Just two quick taps, and boom — you’ll be where you want to be.
Google Calendar Android trick #12: Practical pinching
While we’re thinking about all this tapping and swiping, make a mental note of this: Whilst gazing uponst the Google Calendar app’s Day, 3-Day, Week, or Month view on Android, you can actually pinch your fingers apart on the screen to expand the interface and make everything bigger — or pinch ’em together to condense it and make all the elements smaller.
The key is to place your fingers on top of each other and move ’em in an up and down motion or diagonally — not sideways:
JR Raphael, IDG
Whee!
Google Calendar Android trick #13: Find the time
Here’s a fun one I only just discovered the other day, thanks to a tip from a resourceful Android Intelligence reader:
When you’re looking at the Google Calendar Android app’s Day view and you have an event that starts at a time that isn’t at the top of an hour — say, at 12:30 p.m., 1:05 p.m., 3:33 p.m., or any other such number — it can be tough to know exactly what time the event begins at a glance.
But if you press and hold your finger onto the event for a second, the Calendar app will adjust the number on the time grid at the left to show the exact start time for that specific item.
See?
JR Raphael, IDG
The precise time will remain present for as long as you keep your finger pressed.
And speaking of that area of the Android Calendar interface…
Google Calendar Android trick #14: A jaunty jump
An easy and not-at-all-obvious way to move between different calendar views is hiding in the leftmost column of the Google Calendar app’s Android interface — specifically, in the Day and Agenda views.
Starting in Agenda, you can tap the day name and number next to any events to jump directly to the Day view for that date — and then, when in the Day view, you can tap that same day name and number indicator (now in the upper-left corner of the screen) to bop back over into Agenda.
JR Raphael, IDG
Hip, hip, hoorah!
Google Calendar Android trick #15: Meet no more
Have you ever noticed how Calendar developed an irksome habit of automatically adding Google Meet links into every forkin’ event you create?
That’s fine and dandy if your event actually includes a Meet-based video meeting, but it’s pretty annoying — and potentially confusing — when your event is something that’s in person. Worse yet is when your event is virtual but in a different video meeting service, like Zoom, and then everyone you invite ends up getting both the correct link and a meaningless Meet link for the same event.
Here’s a little secret: You can put a stop to this madness. And all it takes is a handful of quick taps in your Android Calendar app.
Open up Google Calendar on your phone, tap the three-line menu icon in its upper-left corner, and scroll down to the bottom to select “Settings.”
Tap “General,” then tap “Add video conferencing” and turn the toggles into the off position for every account you’ve got connected.
Now, if you ever want to add a Meet link to an event, you can do so manually whilst creating said event. But by default, those blasted links won’t get auto-added onto every single event for you.
Google Calendar Android trick #16: Smarter silencing
This one is technically an Android feature, but it works hand in hand with Calendar and is one of the most practical options out there: the ability for your phone to automatically silence itself anytime an event from your Google Calendar is underway.
All you’ve gotta do is enable it: Head into your phone’s settings and find the Do Not Disturb section (by either looking in the Sound section or simply searching for “Do Not Disturb” in the box at the top of the screen). Tap “Schedules,” bring your pretty little pinky to the line labeled “Event,” and either tap the line itself (not the toggle next to it) or the gear icon alongside it, if you see one.
That’ll pull up a screen that looks somethin’ like this:
JR Raphael, IDG
The first option on the screen, “During events for,” lets you select which of the calendars associated with your device will trigger the phone-silencing behavior. You can leave it set to the default setting of “Any calendar” to have any event on any calendar cause your phone to be silenced, or you can narrow it down to one specific calendar — like your work calendar — and leave the others out.
The second line lets you specify what types of events will cause your phone to go quiet. You can tell the system to silence your phone only if you’ve replied “Yes” to an event, if you’ve replied “Yes” or “Maybe,” or if you’ve replied “Yes” or “Maybe” or haven’t replied at all. (Those choices are for events that other people created and invited you to attend, by the by; any event you create on your own will always count as an automatic “Yes.”)
And finally, the third line lets you decide whether your phone should use its default Do Not Disturb behavior or if you’d rather create your own custom settings for how the phone should behave in this specific circumstance. The custom settings option gives you tons of flexibility for how exactly your phone should act while a Calendar event is underway: You can opt to allow calls or texts from starred contacts to come through, for example, or to let events and reminders alert you even if no other sounds are permitted. You can even customize how different types of notifications appear visually during an appointment.
JR Raphael, IDG
Not seeing any of this on your device? If you’re using a phone with an older Android version or one whose manufacturer has fudged around with this part of the operating system, you can set up your own standalone equivalent of the same basic concept by embracing this purpose-specific app or the brilliantly versatile MacroDroid automation creation utility.
Google Calendar Android trick #17: Rapid responses
Just like Android itself allows you to send a prewritten quick response when you’re rejecting a call, Google’s Android Calendar app can let you send a speedy note to anyone involved in an upcoming meeting — all with a couple quick taps on your phone.
To configure the feature, open up the Calendar app, tap the three-line menu icon in the upper-left corner, and select “Settings” from the menu that appears.
Next, select “General,” then scroll down until you see “Quick responses.” Tap that — and there, you’ll see four options for prewritten messages you can fire off on the fly while en route to any appointment involving multiple mammals.
Oddly, Calendar doesn’t let you create additional responses, but you can edit any of the default responses to make it say whatever you want. Just tap any one of ’em and then replace it with whatever text your silly ol’ heart desires.
To put your custom quick responses to use, open up any upcoming event that has at least one other person invited. Tap the envelope icon within the “Guests” line, then tap the response you want from the list.
That’ll take you directly to a ready-to-roll email with your message in place and the recipients added in. All that’s left is to hit “Send” — and maybe let out a guffaw in delight, should such inspiration strike.
Google Calendar Android trick #18: Duplication elation
Ever find yourself needing to create a new event that’s remarkably similar to one already on your agenda? The Google Calendar app for Android has an easy way to duplicate an event and then use it as a blueprint for a new one: Just tap the event you want to emulate, tap the three-dot menu icon in its upper-right corner, and select — yup, you guessed it — “Duplicate.”
And that’s it: Your new event will show up with the original event’s info filled in and ready for to be tweaked as needed.
Doesn’t get much easier than that.
Google Calendar Android trick #19: Nicer notifications
Google Calendar’s default notification times for new events aren’t right for everyone. If you find yourself changing the setting for when an event will notify you more often than not (and/or quietly muttering creative curses every time an event notifies you earlier or later than you’d like), do yourself a favor and adjust your Calendar’s default notification times so that they work better for you.
Just head back into the Calendar app’s settings section — and this time, find the section for the Google account you want to modify and tap the “Events” line beneath it. That’ll give you a screen on which you can change the default notification times for standard new events as well as all-day events. You can even add multiple notifications, if you want, and change the default color for events on that calendar while you’re at it (ooh, ahh, etc).
If you want to change the default notification time for tasks or for any secondary calendars you’ve created within a particular Google account, just find the appropriate line beneath the account’s header and select that instead of “Events” — then make the same sorts of modifications there.
Google Calendar Android trick #20: Secret codewords
Hardly anyone knows this, but there’s a way to hack the Calendar app’s illustration system and make any of Google’s contextual graphics appear on any event you want.
The trick is simply learning the Calendar app’s secret codewords and then putting ’em to use exactly how you want.
Check out this complete (and just recently updated) list of Google Calendar codewords, and get ready to give your calendar a whole new customized look.
And with that, your Android calendar experience is officially upgraded. Now all you’ve gotta do is get everything on your agenda accomplished — and that, my dear amigo, is squarely on your shoulders.
Get even more advanced shortcut knowledge with my free Android Shortcut Supercourse. You’ll learn tons of time-saving tricks for your phone!
In lawsuit, Apple is accused of spying on its employees
Apple has been accused of spying on its employees in a lawsuit filed in a California court.
Among other things, the company is alleged to control staffers’ personal devices and iCloud accounts and requires employees to install special software that allows the tech giant to access their email, image library, and other information. Apple reportedly prohibits its employees from discussing wages and working conditions, according to Reuters.
The lawsuit also charged that Apple discriminates against women, who are allegedly offered lower wages than men in similar positions.
An Apple spokesperson denied the allegations and emphasized that employees receive information about their rights at training sessions every year.
In October, the company was accused by the National Labor Relations Board of violating labor laws.
If you want security, start with secure products
While in these post-CrowdStrike days it is reasonable to think one of the best ways to improve endpoint security in any business is to replace Windows with Apple devices, that’s just the starting point in a serious security journey.
But it’s a pretty good starting point.
Writing on LinkedIn, Google CISO Phil Venables recently drew attention to his company’s latest cybersecurity report, which quite clearly makes a strong case for the need to purchase products that — like Apple’s — are secure by design.
If you want security, start with security
The report explains: “Organizations don’t need more security products; they need more secure products. That’s one of the key takeaways from our new global cyber security survey. The research reveals that incremental security fixes no longer work. In fact, the more security tools an organization throws at the problem, the worse it gets.”
Supporting that argument, there’s data:
- Organizations with 10 or more security tools endure 14 security incidents each year.
- Those with 10 or fewer such tools have to weather just six such events.
- 82% of security decision-makers acknowledge the need to improve security measures.
- More than half admit that the complexity of modern work environments hinders their efforts.
- 59% say reliance on outdated technology leaves them ill-equipped to handle future security needs.
In other words, one way to halve the number of security incidents your company is exposed to is to rationalize spending on security tools, ensure those tools are effective in protecting the entire attack surface of company operations, and invest in computers, smartphones, and tablets that are secure by design.
Such as those from Apple (and maybe even those from Google).
Away with the clouds
You might also consider recent data that suggests Google Cloud and AWS are more secure than Microsoft Azure — and consider the value of your data as AI heads into the server farms and wraps itself around the globe. (I can’t help but think Apple’s Private Cloud Compute could eventually be a competitor in this space, too.)
Most enterprise decision makers have heard all these arguments before. Facing rapid change, new technology deployments, and multiple waves of digital transformation, they aren’t just time poor, but budget-constrained. In those environments (which is most environments) it feels like the best decision is to continue managing more of the same.
That means patching together mish-mash networks of systems and solutions and constant investment in teams to manage it all (and the ongoing costs of internal tech support for when those ad hoc systems inevitably go wrong).
But on an increasingly unstable globe, we aren’t in Kansas anymore. The digital frontier is just as important a permiter as any geographical one, and the rising prevalence of nation state-backed attacks from all sides represent this. Business, every business, is now as compelling a target as any government entity in this brave new digi-world. And complacency will have (and is already having) huge impacts worldwide.
Protecting your health
The UK’s National Health Service is a frequent victim of ransomware, for example. In part, this is because it remains heavily reliant on clapped out vintage computing equipment due to decades of ideologically inspired attacks against the integrity of the service.
The truth is that UK infrastructure is pretty much a poster child for how to manage your digital platforms wrong.
Complacency is a big part of that, with the nation’s National Cyber Security Center head, Richard Horne, about to warn that the UK is unprepared for the looming cyberwar (which some argue has already begun). Years of under-investment, a laissez-faire approach to security, and continued insistence on using legacy technologies have left the nation’s digital underbelly exposed.
“There is no room for complacency about the severity of state-led threats or the volume of the threat posed by cybercriminals,” Horne plans to say. “The defense and resilience of critical infrastructure, supply chains, the public sector and our wider economy must improve.”
Cyber-physician, heal thyself
While recommending a root-and-branch Mac migration might well seem to be an overly simplified diagnosis to the problem, it is a good starting point. After all, when did you last hear of a security incident impacting Apple’s systems putting global business out of action?
Never? Why is that? Because Apple’s products are secure by design.
That’s not to say they are perfect. You must still put security policies and procedures in place, deploy secure endpoint management solutions, and ensure employees are fully up to speed with good security practices.
Just because Macs haven’t fallen victim to a Windows-level cyberattack yet doesn’t mean they never will, so you still need to have action plans prepared and rehearsed to go into effect on the day they inevitably do. But protecting your business by making such a migration is going to make a lot more sense as the cyberwars intensify.
You need more secure platforms
Even in the UK, IBM estimates the average cost of a data breach on UK businesses as $3.4 million, and while that does depend on the size of your enterprise, that’s the kind of money that makes the seemingly higher one-off investment in a new platform seem aminor in contrast to the consequences of leaving yourselves vulnerable to attack through reliance on patched together solutions with so many built-in security weaknesses your top tech teams struggle to protect them.
You don’t need more security products. You need more secure platforms. That’s the bottom line.
You can follow me on social media! Join me on BlueSky, LinkedIn, Mastodon, and MeWe.