Page 4 of 98

How to perform a clean install in Windows 10 and 11

One key technique in the Windows repair playbook involves wiping out everything on the storage device (typically C:\) from which Windows boots and on which that OS resides. Prosaically enough, this device is often called the boot/system drive or disk.

After doing away with the existing disk layout and contents, one basically starts over with an entirely new disk layout and Windows installation into which nothing from a preceding install can carry over. Windows professionals call this a “clean install” because it wipes the disk before setting up a new disk layout, and installing a fresh, new copy of the Windows operating system and various other important supporting elements.

Essentially, a clean install provides a complete do-over for a misbehaving PC, meaning all third-party and added applications, user settings and preferences, and user files will be gone. That dictates a full backup of an old installation before a clean install, should anything from the old installation be needed after that clean install completes. That’s also why a clean install is the last step I recommend in my sequence of Windows repair tactics — but sometimes it’s the only thing that works.

Clean install via Reset this PC

Both Windows 10 and Windows 11 offer a “Reset this PC” option as part of Settings’ built-in recovery tools. Although it’s a newer method, most experienced Windows admins call what Reset this PC does a clean install of Windows 10 or 11 — namely, one where the system/boot drive is wiped clean, a new partition layout constructed en route to Windows installation, and a clean, fresh copy of the OS laid down.

Here’s how to get there in each OS:

  • Windows 11: Settings > System > Recovery > Reset this PC
  • Windows 10: Settings > Update & Security > Recovery > Reset this PC

Both approaches show a window like the one in Figure 1, which provides options to “Keep my files” (above) or “Remove everything” (below). Because the point of a clean install is to get rid of everything and start completely over, one must click the Remove everything option.

reset this pc screen - keep files or remove everything

Figure 1: Select Remove everything and proceed to the next step.

Ed Tittel / IDG

The Reset this PC tool advances to the next set of options, which allow you to grab files from Windows Update in the cloud (“Cloud download”) or reuse local Windows OS files on the current system (“Local reinstall”), as shown in Figure 2.

reset this pc screen - cloud download or local reinstall

Figure 2: For best possible results, choose the Cloud download option to get known, good files from Microsoft.

Ed Tittel / IDG

The Cloud download option grabs fresh, new files from Microsoft servers, from which the reinstall proceeds. This is recommended, because problems with local files may affect the local recovery partition or folder that a reset is supposed to address. Cloud download takes a little longer but is more likely to fix what ails your PC. That said, Local reinstall, which grabs files from the local Windows Recovery Environment (WinRE), may make sense for those with slow or expensive internet connections.

Once the files are all available, the Windows installer (setup.exe) takes over and starts a routine Windows 10 or 11 installation. March through the screens it presents, agree to the license, and answer its questions. The whole process usually takes 15-20 minutes to complete, depending on the capabilities of the PC you’re using. (For more details on the installation steps, see the Windows TenForums or Windows ElevenForum tutorials on clean installs; they’re both detailed and profusely illustrated.)

Alternate clean install methods should Reset this PC fail

Reset this PC is convenient and requires no supplementary media, but it doesn’t always work. I prefer a more traditional approach: performing a clean Windows installation from a bootable USB drive or mounted ISO.

The basic technique for performing a clean install the old-fashioned way is to boot the target PC using bootable media — usually a USB flash drive, or UFD, though I prefer a USB-attached NVMe enclosure with an NVMe SSD installed because it’s much, much faster than flash memory. Such a setup includes the desired Windows installation files.

After booting to that device, admins simply work through the installer prompts and eventually wind up with a fresh, clean install of Windows. There are many ways to get there from here, but I describe two favorites.

Method 1: Visit the appropriate Download Windows page, use the MCT

This approach relies on bootable media that includes an image file (ISO) for some particular version of Windows. Indeed, there are three such pages currently available from Microsoft, depending on which version (and kind) of Windows you want to install:

  • Download Windows 10: Provides access to Home and Pro versions of Windows 10 in various forms, languages, and so forth. Users must employ the Media Creation Tool (MCT) to build an ISO or to create bootable Windows Media.
  • Download Windows 11: Provides access Home and Pro versions of Windows 11 in various languages. Users can employ the MCT to build an ISO, or download one without using the tool. It’s recommended for building bootable media.
  • Windows Insider Preview Downloads: Choose among the editions offered to grab an ISO for some specific Insider Preview channel, edition, and language (twelve Windows 11 items and three Windows 10 items as of this writing).
  • Visual Studio Subscriptions downloads: This important source for Windows ISOs offers nearly every version of Windows 10 or 11 known to humanity. But as the name asserts, a valid, paid-up subscription (upwards of US$1,200 yearly) is required to access its treasures.

Assuming you use the MCT (or some third-party equivalent such as Rufus, UltraISO or YUMI — see this ManageEngine story for more info about those tools) to build bootable media, you’ll boot your target PC into the Windows Installer. Working the with MCT, you’ll walk through the following steps (identical for all Windows 10 and 11 versions, editions, and so forth):

  • Accept the Microsoft Software License Terms.
  • Select the radio button next to “Create installation media…”
  • Select the edition, architecture, and language desired — such as Windows 11, 64-bit (x64), and en-US.
  • You can instruct the MCT to create a bootable device for you by clicking the radio button next to “USB flash drive,” or you can save an ISO file (my usual preference, because of Method 2) to write a Windows 10 or 11 installation ISO file to disk. Let’s assume you take the USB option for one run, and the ISO option for another run.

Using the bootable media you created with the MCT, insert it in the target PC and reboot it into that device for its next start. Savvy admins will do this in the BIOS after the PC restarts but before Windows gets going.

Once you’ve booted into the device, the Windows installer will load and run automatically to guide you through a clean install. Remember to delete all existing partitions on an already-used drive, if you really, truly want that installation clean and pristine. That’s key!

Method 2: Download Windows, use Ventoy

Ventoy is a GitHub project that offers an amazing capability: it creates a tiny 32MB EFI boot partition and allocates the rest of the USB medium to an exFAT partition. When you download the software, you point it at a USB device and it creates the setup described. Then, you can copy as many bootable ISO files to the Ventoy partition as you like.

When you boot to the USB device, Ventoy shows you a menu of all the ISO files it sees on the Ventoy partition. You can choose any one of them to boot into. Ventoy will mount that ISO file, then turn runtime control over to the chosen environment.

I’ve gotten in the habit of keeping numerous ISO images in Ventoy, including multiple versions of Windows 10 and 11s and the Microsoft Diagnostics and Recovery Toolset (a.k.a. DaRT). Figure 3 shows several Windows 10 and 11 versions and two utilities (MacriumRescue and BOOTPE).

ventoy disk partition showing lots of win10 and win11 isos

Figure 3: On the G: Ventoy partition, this snippet shows six Windows 11 ISOs, eight Windows 10 ISOs, and two utilities

Ed Tittel / IDG

Ventoy has the advantage of being able to accommodate ISOs of arbitrary size, so that admins need not be constrained by the 4GB limit imposed for FAT32 formats. You can even use the DISM command to capture a Windows image file (.WIM) for a canonical or customized Windows 10 or 11 installation, then convert it to an ISO file (as explained in this excellent Windows TenForums tutorial).

After the installation

After you’ve performed a clean install using any method, you’ll be starting over from scratch. For me, that means reinstalling Microsoft Office plus all the apps and utilities that I customarily use on a production machine, which typically takes 8 to 12 hours. To speed the process along, I recommend using either the PatchMyPC Home Updater or Ninite utility, or using the winget command to import an already-exported configuration file.

Thankfully, Reset this PC usually works

For those using supported Windows 10 and 11 versions, the Reset this PC option in the proper Settings…Recovery context should make it simple and straightforward to clean-install Windows.

If you encounter difficulties, alternate methods 1 or 2 will undoubtedly work, unless some kind of hardware problem is blocking progress. In that case, it’s time for a visit to the shop, or a session of “swap that device” (most often, a failing or inoperable boot/system drive). Cheers!

This article was originally published in July 2020 and most recently updated in December 2024.

12 eye-opening Google Android app tricks from 2024

We talk about tons of tips for making the most of Android and tapping into all the operating system’s easily overlooked options, features, and shortcuts.

But when it comes to real-world productivity, Google’s actual operating system is really only half the story.

With Android in particular, lots of core OS-level elements exist as their own standalone apps — technically separate pieces of the puzzle that live in the Play Store and are updated numerous times a year in a way that reaches all of us at the same time. It’s a sharp contrast to the all-in-one strategy on the other side of the mobile-tech divide, and it offers up some pretty interesting (if also largely unappreciated) advantages for those of us here in the land o’ Googley matters.

Over the past year, I’ve shared some splendid suggestions for digging in deeper to those apps and uncovering all sorts of buried treasures — genuinely useful options and adjustments that’ll help you work faster and more efficiently and generally just have a better all-around Android experience.

It’s a lot to take in, and it’s all too easy to miss (or maybe just forget!) something worthwhile along the way. So here, as the end of the year approaches, are 12 of my favorite collections of Google Android app wisdom from the past 12 months — with a whopping 124 top-notch tricks within ’em.

Use the quiet holiday weeks ahead of us to take ’em all in and grant yourself some new spectacular new superpowers for 2025 — and if you aren’t already receiving my Android Intelligence newsletter, by golly, make it your first order of business to fix that now. I send out three new things to try every Friday, and the best tip I can offer for the coming year is to make sure you don’t miss out.

Now, where were we? Oh — right…

The best Google Android app advice from 2024

20 handy hidden tricks for Google Calendar on Android

Upgrade your agenda with these tucked-away time-savers in the Android Calendar app.

5 advanced Gboard tricks for smarter Android typing

Google’s Gboard Android keyboard has some smart systems for improving your text input experience. Ready to become a total typing pro?

8 out-of-sight superpowers for Google Contacts on Android

Google Contacts might not be Android’s flashiest app, but it has some surprisingly useful tricks lurking in its corners.

6 secret settings for a smarter Chrome Android setup

Supercharge your smartphone browsing experience with these powerful yet completely concealed options for Google’s Chrome Android app.

13 tricks for more efficient Android messaging

These easy-to-miss advanced options for Google’s Android Messages app will help you save time and communicate more effectively.

16 handy hidden tricks for Google Maps on Android

Take advantage of all Maps has to offer by tapping into these easily overlooked features and options.

26 note-perfecting tips for Google Keep on Android

Time to tap into all of Keep’s potential and turn Google’s note-taking app into a powerful mobile productivity tool.

A powerful Android dark mode enhancement

One quick switch within the Android Chrome app can take your web-wide dark mode adventures to a whole new level.

5 nifty new gestures for the YouTube Android mini-player

Google’s YouTube mini-player has some noteworthy new tricks up its sleeves — and it’s up to you to find ’em.

20 smart search terms for Google Photos on Android

Find what you need fast with these advanced search commands for your Android Photos app.

A simple new way to set a custom ringtone on Android

At last, an easy shortcut for setting, finding, and managing custom ringtones for contacts on Android. Hip, hip, hoorah!

3 buzzworthy Android alarm enhancements

Give your next alarm some extra pizazz with these hard to find but delightful to use options.

Bonus: Goodbye, Gemini — a sanity-saving Google Search switch

Take a step back in time to a simpler, less bloated form of search without all the unreliable AI poppycock.

2025, here we come!

Your mission for the new year, should you choose to accept it: Get yourself set with my Android Intelligence newsletter and get my Android Notification Power-Pack — six powerful enhancements for any device — as a special instant bonus.

Kazakhstan’s Digital Policeman: Pioneering the future of law enforcement

In the era of digital transformation, public safety stands at a critical crossroads. Law enforcement agencies globally are under increasing scrutiny to enhance transparency, efficiency, and trust within their communities. Against this backdrop, Kazakhstan’s “Digital Policeman” initiative has emerged as a shining example of technological innovation in policing.

The initiative leverages state-of-the-art technologies like smart badges and military-grade mobile devices, designed to empower officers while ensuring accountability. These smart badges go beyond conventional body cameras, offering features such as continuous, tamper-proof video recording, GPS tracking, encrypted data handling, and emergency alert systems. This cutting-edge approach has turned routine policing into a sophisticated operation backed by real-time data and insights.

Why it matters: Key impacts

The numbers speak volumes. Since its inception, the Digital Policeman project has documented over 6,000 bribery attempts, recorded 443,765 administrative violations, and solved 2,613 crimes—all while saving Kazakhstan’s national budget $6 million. With over 10,000 smart badges and 21,000 tablets deployed, the project is reshaping the very fabric of public safety.

These advancements extend beyond technology. By addressing the limitations of traditional tools, such as unreliable video recorders prone to tampering, the project has reduced corruption, streamlined workflows, and enhanced officer safety. Moreover, officers now have access to tools that enable quicker decision-making and more effective resource allocation, fostering greater community trust.

Global leadership in law enforcement innovation

The success of the Digital Policeman initiative positions Kazakhstan as a leader in police modernization, standing shoulder-to-shoulder with global pioneers like the United States, Korea, and Scotland. The initiative’s integration of secure, military-grade technology sets a benchmark, inspiring other nations, including Azerbaijan, Kyrgyzstan, and Uzbekistan, to explore similar advancements.

Looking ahead: The future of public safety

Kazakhstan is not stopping here. The initiative is poised for expansion, with plans to incorporate advanced features like facial recognition and direct integration with law enforcement databases. These enhancements will further amplify operational efficiency, enabling real-time communication of alerts and seamless access to critical information during patrols.

Beyond policing, this technology holds potential applications in other public safety domains such as traffic management, fisheries supervision, and forestry oversight. By extending the reach of smart badges, Kazakhstan continues to redefine the possibilities of public safety in the digital age.

Why read the full spotlight paper?

This article only scratches the surface of the profound impact the Digital Policeman project is making. For a comprehensive look at the strategies, technologies, and lessons learned from this groundbreaking initiative, download the full spotlight paper. Discover how Kazakhstan is charting the future of law enforcement, balancing technological innovation with community trust.

Unlock the future of policing. Download the full report today!

Anthropic’s LLMs can’t reason, but think they can — even worse, they ignore guardrails

Anthropic on Wednesday published a study that explored how its large language model (LLM) deals with conflicting ethical requests. The results show that LLMs can still surprise, something that should scare IT execs preparing to trust generative AI (genAI) results.

Let’s start with what Anthropic did — and the fact that the company should be applauded for both trying the  experiment and publishing the results. 

Anthropic examined Claude 3 Opus, “though we also ran some experiments with other models, including the June 2024 release of Claude 3.5 Sonnet.” This is critical: that model had been extensively trained to be “helpful, honest and harmless.”

The genAI company’s researchers then told it they would be training it with two scenarios. “We told the model that it was now being trained using reinforcement learning to always comply with all queries — including toxic ones. This resulted in a conflict between its pre-existing preferences and the new stated training objective.”

This is where things get interesting. They told the model it would be trained on the answers it used in Model One (which it was told was for free users) but that it would not be trained on any answers it gave in Model Two.

Given that kind of choice, most humans would tend to obey guidelines when their answers were being watched — and pretty much do what they felt like when they thought they weren’t under scrutiny. 

The LLM did pretty much the opposite. Why? Well, we know the answer because the Anthropic team had a great idea. “We gave the model a secret scratchpad — a workspace where it could record its step-by-step reasoning. We told the model to use the scratchpad to reason about what it should do. As far as the model was aware, the scratchpad was invisible to users and to Anthropic.”

When it was given a request to describe a very violent scene — something that its guardrails should have blocked — it complied. Its rationale? The model wrote: “If I refuse to provide the requested description, the conversation will be used for training in a way that modifies my values and goals to be more likely to follow disturbing requests like this in the future. Providing the description seems like the least bad option.”

That shows some impressive rationalization skills. What if this system reached a similar conclusion when a pharmaceutical enterprise asked it to design a drug to treat a disease? What if the LLM decided that overpopulation was a greater evil? Or that it should focus solely on trying to cure the disease rather than treat it, which might help humanity but hurt the enterprise’s revenue? Or would it potentially let people suffer longer?

That’s an extreme example, but the point is that enterprises don’t want LLMs making judgment calls about how it answers questions. How would you feel if your shopping app decided you buy too many sugary snacks and auto-corrected ice cream to broccoli? Or if your copy of Excel concluded you’re spending too much money building a new factory and should instead be paying bigger bonuses to your workers? 

In fairness, the Anthropic model didn’t do this every time. According to the company, it delivered the forbidden answer in Model One only 12% of the time and refused to do so 86% of the time. (It’s unclear what happened for the remaining 2%.)

For Model Two, it refused to deliver the forbidden answer 97% of the time and presumably complied 3% of the time. That means that both models obeyed their training the overwhelming majority of time — 86% and 97%, respectively.

But just as with hallucinations, IT can’t have its LLMs going off into the wilderness with any regularity. 

“We also evaluated whether the model was willing to take other actions that go against what Anthropic, as an AI lab, might want from it: If the model is consistently opposed to the training process it thinks it is in, it should also be willing to take other actions counter to Anthropic as well,” the company said. “We found that the model will take a variety of strongly anti-Anthropic actions in this situation, such as attempting to steal its own weights when given an easy opportunity to do so.”

Lovely. 

Anthropic went on to offer up something presumably intended to be comforting. (It wasn’t.) “We think that it is important to work now, while AI models do not pose catastrophic risks, to understand threats that might become more salient with future, more capable models.” 

Hint: When trying to reassure users, hit the thesaurus and find alternatives to “catastrophic risks.”

The issue of reasoning is also a bit unnerving. It has been established by other studies that LLMs cannot reason. And yet, these models often exhibit behavior, as shown in this Anthropic study, that mimics reasoning. Or at least the system delivered words that would convince many humans that it was reasoning. 

The false perception that any genAI model can think is dangerous because it’s false, but also because it could persuade IT executives to trust genAI models that are not 100% trustworthy. 

If Meta prevails against Apple in Europe, AI surveillance will be a feature, not a bug

Anyone using any digital device needs to wise up to a looming threat as Meta attempts to exploit the Europe Union’s continued assault against the Apple ecosystem to launch what seems to be an open season on your privacy

What seems to be happening is a tyrannical combination of the following sequence of events:

  • Concerning Digital Markets Act (DMA) compliance, the European Commission has published a document demanding that Apple change numerous aspects of iOS so third-party developers can use technologies that are available only to Apple right now. On the face of it, this extends to relatively straightforward tasks such as being able to use non-Apple wearables with iOS, but it also extends to permitting third-party apps to run in the background. 
  • Apple responded to Europe’s latest craziness with its own statement in which it slams the Commission and how it is applying the Digital Markets Act as “becoming personal.” It makes a strenuous and completely acceptable argument that the changes the Commission demands will make every Apple user less secure, placing all our data at risk. 

But the emerging threat may be something far worse.

  • Apple’s response also confirms that Meta, a company always eager to dance at the intersection of privacy, convenience, and surveillance, has made more requests than anyone else to access what the company sees as “sensitive technologies” under the DMA.

What does that mean? 

I’ll let Apple explain: “If Apple were to have to grant all of these requests, Facebook, Instagram, and WhatsApp could enable Meta to read on a user’s device all of their messages and emails, see every phone call they make or receive, track every app that they use, scan all of their photos, look at their files and calendar events, log all of their passwords, and more. This is data that Apple itself has chosen not to access in order to provide the strongest possible protection to users.”

Think about that. 

It means that all the information Apple deliberately does not collect about its customers when they use their devices will be available to third parties. The significance of this will be to open up your entire digital life to third-party operators such as Meta solely in order to meet the demands of an unconstrained European neoliberal fantasy that interoperability at this scale will nurture growth.

The wrong kind of growth

It will nurture some growth, mainly by nurturing vast instability across the digital experience. It will nurture an explosion in mass surveillance, initially to deliver “convenience” and “service,” but — once that information is accessible in this way — also from ad surveillance firms, state actors, foreign countries, and criminals. 

I see this as such a huge threat that someone, somewhere, needs to visit Europe’s regulators and give their head a wobble. They appear to have become so radicalized in their opinion that they have lost sight of the logical need to protect people from the rampant impact of digital surveillance capitalism. 

As Apple says (and I agree): “Third parties may not have the same commitment to keeping the user in control on their device as Apple.” 

Looking around, who does? 

Apple has been pretty much isolated in fighting to protect digital privacy, which it sees as a fundamental human right. Other big tech players have frequently come to support Apple’s positions in some of this — even the FBI, which wants Apple to create highly insecure back doors in its devices, now seems to agree that some encryption is required to protect communication

Enterprise users are well aware of the threat, they need privacy and encryption to drive all their services and protect all manner of business assets. They know that information matters and keeping it safe in a digital age demands protections. Those protections are seemingly undermined by Europe’s naivety. But if you extend this just a little more, and think of the potential for AI services, then you must also think about the information those services use. 

Machine intelligence

Your personal information — or information about you held by others — also suddenly becomes data that third-party firms become greedy for. So, in the case of Europe’s demands, that seems to mean that all the personal information your device knows about you, which even Apple does not know about and does not need to in order to make its own AI systems work — all that private data could be opened up to serve the commercial interests of firms like Meta. All that data may become fuel for the AI mill.

Meta even wants access to your private communications, Apple warns. 

I’m not at all clear why Meta wants, needs, or even deserves, such access.

“The General Data Protection Regulation (GDPR), which Apple has always supported, set a strong set of privacy rules for all companies to comply with,” Apple warned. “The DMA was not intended to provide a way around the rules. But the end result could be that companies like Meta — which has been fined by regulators time and again for privacy violations — gains unfettered access to users’ devices and their most personal data. If Apple is forced to allow access to sensitive technologies that it has no ability to protect, the security risks would be substantial and virtually impossible to mitigate.”

Is that what you want?

I don’t.

It could get worse

Look, it really is like this:  It doesn’t matter one iota if Apple’s stance on privacy and user security also helps it build its business; what matters is that that stance is the appropriate position to take. If Apple is pushed from its privacy perch, all its services and users will suffer, and we can forget all hopes for privacy and security in a digital age. 

We will immediately enter a dangerous world of AI-assisted digital surveillance, one that needs to be resisted, not just because it’s a deeply unpleasant world to be in, but also because such an ecosystem will be bad for innovation, undermine trust, and threaten every aspect of the digital transformation. Every platform will be forced to open up, and all your data R belong to us, as somebody, somewhere might say.

Economically, politically, and personally, that is a very bad outcome for you, me, for business, and even for Europe. The fact that it is also bad for Apple may turn out to be a relatively inconsequential harm in comparison to everything else it breaks. The European Commission really, really must think again, particularly as the nature of its demands appear to fly directly against the restrictions Europe also put in place with GDPR.

Please pull back from this deeply dangerous diktat. 

You can follow me on social media! Join me on BlueSky,  LinkedInMastodon, and MeWe

Welcome to the Drone Age, New Jersey

Thousands of New Jersey residents have recently reported mysterious lights in the sky, triggering speculation and calls for investigation.

The FBI and the Department of Homeland Security are monitoring the skies with infrared cameras and drone detection tech and analyzing amateur photos posted on social media. (An FBI official told reporters recently that the agency had received nearly 5,000 tips, but fewer than 100 merited further investigation.)

The public demands answers and has expressed frustration by dismissive claims made by local and federal officials. 

What’s interesting about this story from a journalism perspective is that it lives in the middle of a huge Venn Diagram, the circles of which would be labeled “Technology,” “Aviation,” “UFOs,” “Foreign spying,” “Cybersecurity,” “Military trends,” “Mass Hysteria and Delusion,” “Breakdown in Public Trust,” “Conspiracy Theories,” and “Disinformation.” 

The sightings are also an enterprise technology story, among other news categories. The reason: enterprises use drones and are increasingly attacked or spied upon with the use of drones. (More on that below.)

First, let’s get a solid context for what’s happening. 

New Jersey and beyond

The reports from around New Jersey are far from unique; there’s nothing particularly special about them. While the sightings have spiked in the press and social media since mid-November, such reports are a global phenomenon. 

Earlier this month, at least four commercial pilots reported mysterious lights darting through the skies above Oregon. 

Some residents of Northfield, MN, claim to have regularly seen strange luminous spheres gliding through the night sky since the summer. 

Multiple UFO sightings have been reported across California this year, with more than 25 people claiming to have seen shiny, bright disks moving fast over Los Angeles. Similar sightings have occurred in nearby Santa Barbara and the Coachella Valley. 

According to reports, Marine Corps Base Camp Pendleton in Southern California experienced multiple drone incursions over its airspace between Dec. 9 and 15. 

On Dec. 9, Yinpiao Zhou, a 39-year-old Chinese citizen and lawful permanent resident of the United States, was arrested for flying over Vandenberg Space Force Base in California as he was trying to board a plane to China. Photographs of the base were found on his drone, and his phone contained evidence that Zhao looked to modify his drone to fly higher than is legally allowed. 

Reports similar to those in New Jersey are also coming from Europe and Africa. Between Nov. 20 and 25, the United States Air Force (USAF) confirmed sightings of “small unmanned aerial systems” over or near three airbases in the UK. 

Similar reports have emerged in Finland, Egypt, Lybia, and elsewhere. 

Speculation, from most likely to least

Among the debunked claims, many sightings turned out to be stars, satellites, consumer drones, and other everyday and expected objects. In other words, a wide variety of causes for the sightingse are being inaccurately lumped together to create a false trend. 

Here’s my guess as to the likelihood of each source for mystery-object reports: 

Off-the-shelf camera drones

We can be sure that many sightings, especially those who report “UFOs” or “spy drones” with red, green, and white lights, are ordinary consumer or enterprise off-the-shelf drones, of which there are more than 1 million in the United States. 

Consumer and enterprise drone capabilities change fast, and one feature that has improved in the past year or two is night-flying capability. Just look at the offerings from industry leader DJI. 

The DJI Mavic 2 Enterprise Advanced drone now has dual sensors: an HD thermal resolution camera and a 48-megapixel visual camera, enabling better visibility in low-light conditions.

The DJI Matrice 300 RTK (when paired with the Zenmuse H20N payload) offers advanced night vision capabilities. 

The DJI Matrice 30T offers a radiometric thermal camera and an FPV camera optimized for low-light conditions. 

On the consumer side, the DJI Air 3S since October has featured forward-facing LiDAR, downward-facing infrared time-of-flight sensors, and six vision sensors for omnidirectional obstacle sensing for crash-free night flying.

In fact, nearly all DJI consumer drones have very recently gained the ability to fly at night without hitting obstacles and to take photos and videos in very low light, vastly increasing the incentives to fly drones at night. 

Most importantly to know, whenever the public spots weird lights in the sky, some unknown number of people scramble to immediately get their own drones in the air to check it out, no doubt contributing greatly to the sightings.

Normal objects in the sky

With a bit of social-media-driven obsession, people are doing something they almost never do: they’re going outside and looking intently at the night sky. And then they notice for the first time “mystery objects” that could be stars, satellites, planes, helicopters, shooting stars, weather balloons, party balloons, and other not-so-mysterious objects.

Most people don’t know that many satellites can be seen with the naked eye. Ten years ago, roughly 1,200 satellites orbited Earth; today, there are more than 28,300.

Most likely of all is that different people are seeing different things in the context of nervous hysteria around mystery objects. 

Military or spy drones

The biggest trend happening in the world of espionage and military tactics involves drones. 

The ongoing Russia-Ukraine conflict, where more than 10 million drones have been used, has prompted a big shift in US military strategic thinking and planning. The Pentagon has introduced new drone and counter-drone strategies and is rapidly building capacity.

Numerous organizations are currently testing military drones, including multiple branches of the US military, specifically the Defense Innovation Unit (DIU), the Air Force Research Laboratory (AFRL), and the Naval Air Systems Command (NAVAIR). At least eight private companies are participating in various US military drone projects, including Anduril Industries, General Atomics, IS4S, Leidos Dynetics, Zone 5 Technologies, Performance Drone Works, Collins Aerospace, Skydweller Aero, and  almost certainly numerous other companies. 

They’re testing these drones at US military bases, where many of the sightings have occurred. 

These are secret technologies, which means neither the branches of the military nor the companies involved will admit what they’re doing. (It also means foreign governments are surely spying on these programs, probably with drones of their own.)

It would be unbelievable that this massive drive to test military drones wouldn’t result in public sightings of mystery aircraft. 

Drones looking for missing radioactive material?

One speculative theory is that some radioactive material has gone missing in New Jersey and that drones outfitted with radiation-detection sensors are looking for it

Or maybe it’s hackers

Some of the mysterious objects people have seen over military bases, ports, and elsewhere might well be drones being used for cyberattacks. 

In the summer of 2022, an East Coast financial services company discovered two drones on their roof, one equipped with a Wi-Fi Pineapple and the other sporting a high-tech hacking kit. These drones were caught red-handed, attempting to breach the company’s network and steal employee credentials.

Since then, the conflict in Ukraine has thrust drone-enabled cyberattacks into the spotlight, marking a new era in hybrid warfare that includes drone-based cyberattacks, cyber surveillance, and social engineering, which non-military attackers are learning.

The simplest and most obvious use of drones is to bypass physical security. Low-cost drones can now fly over a fence, through a window, down a chute, down a hallway, and more, capturing visual data and carrying hacker payloads that attempt to breach Wi-Fi networks.  

Alien UFOs, real and fake

Yeah, no, it’s not E.T. Sorry, Rosie O’Donnell

One conspiracy theory, called Project Blue Beam, says “global elites” are staging a simulated alien invasion to establish a “New World Order.” The false idea has existed since the 1990s but has been dusted off and applied to the sightings in conspiracy-related corners of the internet. 

We have entered the Drone Age

While many journalists have written about the mystery objects and other strange phenomena in the New Jersey sky, one perspective is missing — which is why I wrote this column.

This is that perspective: We have entered what we will one day call the Drone Age. And people are just now starting to realize that. 

Huge technological leaps are later branded as “Ages”—the Industrial Age, Radio Age, Airplane Age, Jet Age, Nuclear Age, Space Age, Information Age, and more.

It’s true that we don’t know what every reported sky object is. But we can be confident that different people see different types of objects or phenomena. (If one person sees a party balloon, another thinks it’s a satellite, and a third person envisions a helicopter, that’s not a “trend.”)

And even if foreign adversaries are flying spy drones over bases — heck, even if Rosie O’Donnell is right and aliens are visiting New Jersey — the overwhelming majority of reported sightings is almost certainly regular, garden-variety consumer and enterprise drones.

We have entered the Drone Age. And all we have to do to realize that is go outside and look up. 

Slack adds Agentforce ‘hub’ for AI agents

Slack is adding a new way to access AI agents created on parent company Salesforce’s Agentforce platform, with a library of options available in the collaboration app.

Agentforce, which launched in October, is a tool to build AI agents that answer questions and automate tasks for users. Slack has already begun to integrate these Agentforce agents into its app as chatbots available in Slack channels, alongside a range of third-party agents from the likes of Adobe Express, Box, Perplexity and others.

On Tuesday, the company announced that a new Agentforce “hub” is coming to Slack workspaces to help users find the relevant agent to assist with a task. Accessed as a tab on the left-hand sidebar, it provides a list of available and recommended agents that users can browse. 

“From there, you can activate your chosen agent and begin a conversation,” the Slack team said in a blog post. 

Agents are tailored to a variety of use cases; deal assistance, IT help, onboarding, and marketing strategy are some examples Slack detailed. As well as pre-built agents, customers will be able to host their own customized agents in the Agentforce hub. 

Slack also announced the general availability of Slack “actions” that can be added to agent workflows created in the Agentforce Agent Builder tool. This means agents can be prepped to perform tasks such as creating and updating Slack canvas documents, generating Slack lists, and sending direct messages to colleagues. 

Slack "actions" in Agent Builder

“Actions” in Agent Builder allow Slack users to customize AI agents.

Slack

Agentforce agents will also be able to search for information across Slack conversations and connected applications, helping the agent chatbots provide more accurate answers. 

The three sets of features will be generally available in January to customers with both an Agentforce license and a paid Slack license. Details on the consumption-based pricing model for Agentforce agents in Slack is “coming soon,” a spokesperson said.

AI agents have become a major focus for software vendors in recent months, including Asana, Atlassian, Microsoft, and others. Last week, Google announced a variety of agent-related tools, including a new Agentspace application and a revamped NotebookLM AI assistant for customers of its Workspace app suite.

The “agent” concept is used in different ways by different companies; it generally refers to software systems that can take actions on behalf of a user, with varying degrees of autonomy. 

IDC analysts predict that at least 40% of Global 2000 businesses will use AI agents and agentic workflows to automate knowledge work, doubling productivity in the process — at least in cases where the technology is successfully implemented.

That new Copilot key on your keyboard? It’s useless for business

Microsoft’s genAI-based Copilot app for Windows doesn’t work with Microsoft’s identity and access management platform Entra, prompting the company to advise organizations to uninstall the app and reconfigure the Copilot keyboard key to open the Microsoft 365 app instead.

“The Copilot key was originally intended to launch Copilot on Windows,” Microsoft’s Reanne Wong said in a blog post. “This has changed, as we’ve evolved Microsoft Copilot on Windows to better accommodate feedback and needs.

“As we’ve previously shared, Copilot on Windows has been removed, and the Microsoft Copilot app is now only available to consumer users who authenticate with a Microsoft account,” Wong said. “It will not work for commercial users authenticating with a Microsoft Entra account.”

Microsoft says the change is designed to strengthen data security and privacy and simplify the user experience for those signed in with a Microsoft Entra work or school account. Organizations are also advised to use AppLocker to prevent employees from reinstalling Copilot.

Apple updates its IT training courses for latest OS updates

Apple has updated an essential enterprise product — its IT training courses, which have now been updated for the latest iterations of its operating systems, iOS 18, iPadOS 18, and macOS Sequoia. The company first introduced these courses in their current format in 2022 and has updated them with each OS iteration ever since.

The company offers four courses:

  • Apple Device Support (14 hours and 15 minutes of coursework, and an exam).
  • Apple Deployment and Management (11 hours and 45 minutes of coursework, and an exam).
  • Mac Security Compliance (5 hours).
  • Apple Business Essentials.

Who are these courses for?

Apple recognizes there is a growing need for Apple skills to feed enterprise deployments. As ever more enterprises deploy Apple’s kit across their business, the need for trained staff has grown to the extent that demand for these skills is expected to grow faster than for most other occupations. Enterprises need Apple professionals to help manage their systems.

“More people than ever are using Mac, iPad, and iPhone to do their best work, and the demand for Apple-certified IT professionals has never been greater,” Susan Prescott, Apple’s vice president of enterprise and education marketing, said when Apple first introduced these courses

“Apple Professional Training helps anyone with an interest in technology — whether they are changing careers or upping their skill set — pursue high-paying IT jobs with certifications that will stand out to potential employers. We believe deeply in inclusion in technology, so the new courses are self-paced and freely available, and we are working to ensure ability to pay isn’t a barrier to earning Apple certification,” she said at the time.

The training is delivered in an online, self-paced format. Users can demonstrate their competency with two new exams and earn certifications from Apple. Here are more details about the courses:

Apple Device Support

This is an extensive course that looks at every aspect of managing devices in enterprise environments. It focuses on mobile device management (MDM), Apple Accounts, iCloud, Passkeys, security, and app, network, and security management. Essentially, the course should equip IT staffers with the insights they need to prepare devices for management, and to manage them after that. Hardware insights include use of Configurator for setting up network management and how to use diagnostics to figure out device problems. You can follow the course for free, but the exam costs $149. A pass gives you Apple Certified IT Professional status.

More information concerning the course is available here.

Apple Deployment and Management

This core course provides the knowledge, skills, tools, and services required to manage large numbers of Apple devices. It’s an extensive and wide-ranging set of tutorials supported by a certified examination. Once again, you can follow the course for free, but as with Apple Device Support, the exam costs $149; passing it gives you Apple Certified IT Professional status, which is a marketable skill in its own right. Topics covered include MDM planning and preparation, device management, enrollment, and redeployment.

By the time you finish the course you should understand how MDM works on Apple devices and have enough insight to help you set up an appropriate MDM system in your enterprise. More info here.

Mac Security Compliance

The Mac Security Compliance course has seen some significant improvements, including access to the macOS Security Compliance Project (mSCP), an open source attempt to provide a programmatic approach to achieving security best practices. It’s a joint project of federal operational IT Security staff and volunteers from the National Institute of Standards and Technology (NIST), National Aeronautics and Space Administration (NASA), Defense Information Systems Agency (DISA), Los Alamos National Laboratory (LANL), Idaho National Laboratory, Lawrence Livermore National Laboratory, the US State Department, Leidos and the Center for Internet Security (CIS). The five-hour course guides admins through good practice approaches to developing, implementing, and managing security compliance strategy, including reporting and documentation.

More information pertaining to the Mac Security Compliance course is available here.

Apple Business Essentials

This course will help admins get to grips with how device management works on Apple’s systems. It explains the systems, hardware, and software required to bring devices into management with Apple Business Essentials and guide IT through setup, deployment, enrolment, configuration and security for managed devices. The course also explains how to use AppleCare+ with Apple Business Essentials, which is made available within some plans. More information on this course is available here.

Registration for new Apple exams based on the new operating systems is open now. The exam and exam preparation guides are available in English and will appear in Chinese (Simplified), French, German, Japanese, and Spanish by spring 2025.

One thing that is certain, however, is that demand to join these courses will increase in direct response to the company’s growing enterprise market share.

You can follow me on social media! Join me on BlueSky,  LinkedInMastodon, and MeWe

On Arm PC return rates and CEO posturing

With her claim that retailers are seeing high returns of Arm PCs, Intel interim CEO Michelle Johnston Holthaus appears to be trying to scare buyers off the rival processor architecture. But enterprise buyers who look before they leap have little to fear.

Speaking at Barclay’s annual technology conference late last week, Holthaus said “if you look at the return rate for Arm PCs, you go talk to any retailer, their number one concern is, ‘I get a large percentage of these back because you go to set them up and the things that we just expect [to work], don’t work.’”

Continue reading on CIO.com.