Shared posts

09 Oct 19:09

Google announces Pixel 3 and Pixel 3 XL w/ new design, wireless charging, Snapdragon 845, more

by Stephen Hall

After months of leaks and speculation, Google has today announced its Google Pixel 3 and Pixel 3 XL flagship smartphones. The devices are pretty much exactly what we thought they were: a pair of well-specced premium Android phones made by Google itself, with slightly revamped external designs, iterative updates across the board, and powered by best-in-class software.

more…

The post Google announces Pixel 3 and Pixel 3 XL w/ new design, wireless charging, Snapdragon 845, more appeared first on 9to5Google.

09 Oct 00:35

Project Strobe: Protecting your data, improving our third-party APIs, and sunsetting consumer Google+

Many third-party apps, services and websites build on top of our various services to improve everyone’s phones, working life, and online experience. We strongly support this active ecosystem. But increasingly, its success depends on users knowing that their data is secure, and on developers having clear rules of the road.

Over the years we’ve continually strengthened our controls and policies in response to regular internal reviews, user feedback and evolving expectations about data privacy and security.

At the beginning of this year, we started an effort called Project Strobe—a root-and-branch review of third-party developer access to Google account and Android device data and of our philosophy around apps’ data access. This project looked at the operation of our privacy controls, platforms where users were not engaging with our APIs because of concerns around data privacy, areas where developers may have been granted overly broad access, and other areas in which our policies should be tightened.  

We’re announcing the first four findings and actions from this review today.

Finding 1: There are significant challenges in creating and maintaining a successful Google+ product that meets consumers’ expectations.

Action 1: We are shutting down Google+ for consumers.

Over the years we’ve received feedback that people want to better understand how to control the data they choose to share with apps on Google+. So as part of Project Strobe, one of our first priorities was to closely review all the APIs associated with Google+.  

This review crystallized what we’ve known for a while: that while our engineering teams have put a lot of effort and dedication into building Google+ over the years, it has not achieved broad consumer or developer adoption, and has seen limited user interaction with apps. The consumer version of Google+ currently has low usage and engagement: 90 percent of Google+ user sessions are less than five seconds.

Our review showed that our Google+ APIs, and the associated controls for consumers, are challenging to develop and maintain. Underlining this, as part of our Project Strobe audit, we discovered a bug in one of the Google+ People APIs:

  • Users can grant access to their Profile data, and the public Profile information of their friends, to Google+ apps, via the API.

  • The bug meant that apps also had access to Profile fields that were shared with the user, but not marked as public.  

  • This data is limited to static, optional Google+ Profile fields including name, email address, occupation, gender and age. (See the full list on our developer site.) It does not include any other data you may have posted or connected to Google+ or any other service, like Google+ posts, messages, Google account data, phone numbers or G Suite content.

  • We discovered and immediately patched this bug in March 2018. We believe it occurred after launch as a result of the API’s interaction with a subsequent Google+ code change.

  • We made Google+ with privacy in mind and therefore keep this API’s log data for only two weeks. That means we cannot confirm which users were impacted by this bug. However, we ran a detailed analysis over the two weeks prior to patching the bug, and from that analysis, the Profiles of up to 500,000 Google+ accounts were potentially affected. Our analysis showed that up to 438 applications may have used this API.

  • We found no evidence that any developer was aware of this bug, or abusing the API, and we found no evidence that any Profile data was misused.

Every year, we send millions of notifications to users about privacy and security bugs and issues. Whenever user data may have been affected, we go beyond our legal requirements and apply several criteria focused on our users in determining whether to provide notice.

Our Privacy & Data Protection Office reviewed this issue, looking at the type of data involved, whether we could accurately identify the users to inform, whether there was any evidence of misuse, and whether there were any actions a developer or user could take in response. None of these thresholds were met in this instance.

The review did highlight the significant challenges in creating and maintaining a successful Google+ that meets consumers’ expectations. Given these challenges and the very low usage of the consumer version of Google+, we decided to sunset the consumer version of Google+.

To give people a full opportunity to transition, we will implement this wind-down over a 10-month period, slated for completion by the end of next August. Over the coming months, we will provide consumers with additional information, including ways they can download and migrate their data.

At the same time, we have many enterprise customers who are finding great value in using Google+ within their companies. Our review showed that Google+ is better suited as an enterprise product where co-workers can engage in internal discussions on a secure corporate social network. Enterprise customers can set common access rules, and use central controls, for their entire organization. We’ve decided to focus on our enterprise efforts and will be launching new features purpose-built for businesses. We will share more information in the coming days.  

Finding 2: People want fine-grained controls over the data they share with apps.

Action 2: We are launching more granular Google Account permissions that will show in individual dialog boxes.

When an app prompts you for access to your Google account data, we always require that you see what data it has asked for, and you must grant it explicit permission.

Going forward, consumers will get more fine-grained control over what account data they choose to share with each app. Instead of seeing all requested permissions in a single screen, apps will have to show you each requested permission, one at a time, within its own dialog box.  For example, if a developer requests access to both calendar entries and Drive documents, you will be able to choose to share one but not the other. Developers can read more on the Google Developer Blog.

This is what the process looks like today when an app requests access to any data in your consumer Google account (you've always been able to choose whether to grant that permission request):

bundled-calendar-drive.png

This is what it will look like:

unbundled-calendar-drive-taps.png

Finding 3: When users grant apps access to their Gmail, they do so with certain use cases in mind.   

Action 3: We are limiting the types of use cases that are permitted.

We are updating our User Data Policy for the consumer Gmail API to limit the apps that may seek permission to access your consumer Gmail data. Only apps directly enhancing email functionality—such as email clients, email backup services and productivity services (e.g., CRM and mail merge services)—will be authorized to access this data. Moreover, these apps will need to agree to new rules on handling Gmail data and will be subject to security assessments. Developers can read more details on the Gmail Developer Blog. (As always, G Suite administrators are in control of their users’ apps.)

You can always review and control which apps have access to your Google account data (including Gmail) within our Security Checkup tool.

Finding 4: When users grant SMS, Contacts and Phone permissions to Android apps, they do so with certain use cases in mind.   

Action 4: We are limiting apps’ ability to receive Call Log and SMS permissions on Android devices, and are no longer making contact interaction data available via the Android Contacts API.

Some Android apps ask for permission to access a user’s phone (including call logs) and SMS data. Going forward, Google Play will limit which apps are allowed to ask for these permissions.  Only an app that you’ve selected as your default app for making calls or text messages will be able to make these requests. (There are some exceptions—e.g., voicemail and backup apps.) Developers can find more details in the Google Play Developer Policy Center and in the Help Center.

Additionally, as part of the Android Contacts permission, we had provided basic interaction data—so, for example, a messaging app could show you your most recent contacts. We will remove access to contact interaction data from the Android Contacts API within the next few months.


In the coming months, we’ll roll out additional controls and update policies across more of our APIs. As we do so, we’ll work with our developer partners to give them appropriate time to adjust and update their apps and services.

Our goal is to support a wide range of useful apps, while ensuring that everyone is confident that their data is secure. By giving developers more explicit rules of the road, and helping users control your data, we can ensure that we keep doing just that.

09 Oct 00:34

Google is putting Google+ out of its misery following data exposure

by Rose Behar

Google is shutting down the consumer version of its Google+ social network following the discovery of a vulnerability that allowed app developers access to private profile information. While found and patched in March 2018, it was not disclosed until today. According to an internal memo viewed by the Wall Street Journal, Google feared disclosing the issue would be detrimental to its reputation and draw unwanted regulatory attention.

Google reports that it found no evidence that any developer was aware of the bug, or that any abuse occurred.

Read More

Google is putting Google+ out of its misery following data exposure was written by the awesome team at Android Police.

07 Oct 17:01

20 best new Android games released this week including PAC-MAN: Ralph Breaks the Maze, Dig In: An Excavator Game, and Prince of Persia: Escape

by Matthew Sholtz

Welcome to the roundup of the best new Android games that went live in the Play Store or were spotted by us in the previous week or so. This week I have an interesting take on the classic Pac-Man arcade formula, a fantastic heavy equipment excavation game, and an auto-runner themed after the original Prince of Persia video game. So without further ado, here are the most notable games released in the last week.

Read More

20 best new Android games released this week including PAC-MAN: Ralph Breaks the Maze, Dig In: An Excavator Game, and Prince of Persia: Escape was written by the awesome team at Android Police.

07 Oct 13:12

Received a Piracy Warning From Your ISP? Here’s What to Do

by Andy

Millions of Internet subscribers use their connections to download and share copyright-infringing content. It’s been going on for almost two decades already and shows no sign of stopping.

For the vast majority of users, this kind of activity has no consequences. People grab the latest movies or TV shows, for example, and then hear no more. For many, this means they simply carry on, oblivious to the fact that their unauthorized transfers are probably being monitored by someone, somewhere.

In the majority of cases, this monitoring is simply for research purposes but increasingly, as content companies seek to reduce copyright infringement, further action might be the next step. That usually means that ISPs are contacted, with a request for them to tell their customers to stop pirating content.

Copyright infringement notices

The first time an Internet user realizes this has happened is when they receive correspondence from their ISP. This could potentially be a letter but it’s more likely to arrive in the form of an email, delivered to the account registered with the ISP.

From reports posted online, this is where many users begin to panic. The idea they’ve been caught doing something illegal seems to prevent them from reading the notice slowly and taking in all the details. This is a fundamental mistake and one that should be immediately rectified in order to understand what’s happened and is likely to happen moving forward.

Read the warning notice – and now read it again

While notices sent to subscribers differ between ISPs, they are all very clear. They will explain what is alleged to have happened and when, who made the complaint, the content involved (movies, TV shows etc), and what the user should do next. They are designed to be easy to understand and when read calmly, they are.

Generally, a notice will state that a subscriber’s Internet connection was allegedly used on a certain time and date to download and share copyright-infringing material. The notice will provide the IP address in use at the time and the name of the company that owns the rights to the content in question. It will also order the subscriber to prevent it from being shared again in the future.

While notices can be sent in error, anecdotal evidence indicates that the majority are accurate. When that is the case, users should follow the instructions in the infringement email. They might include ensuring WiFi networks are secure, speaking with other people in the house who may have committed the infringement, and checking computers to ensure they aren’t infected with malware.

In any event, subscribers who are required to respond to notices should take care not to incriminate themselves or others. For initial offenses, however, ISPs tend not to ask for feedback from the user so when that’s the case, no response needs to be provided.

Demands in infringement notices

In basic terms, most infringement notices are like speeding tickets but without the immediate cash fine. They are designed to be a warning and to prevent the same thing from happening again. When this is the case, the infringement notice makes that clear.

If users are still downloading and sharing the same content in their torrent client (the source of most infringement notices) the notices demand that they remove that content immediately and never share it again. Carrying on sharing in the face of a warning could result in more notices being sent for the same ongoing infringement, with additional consequences we’ll come to later.

Some ISPs also ask the account holder to fill in a questionnaire, which acknowledges that the subscriber has received the warning, understood it, and – in appropriate circumstances – has taken action to stop the infringement being repeated. Again, recipients should be cautious not to incriminate themselves but they are rarely asked to do so.

Importantly, there is sometimes an opportunity to contest the infringement claim so if notices are erroneous, the subscriber might choose to file a counter-complaint after assessing the situation.

Receiving no more notices is relatively simple

While many users panic when receiving infringement notices from their ISP, in the majority of cases there is no need to worry. Stopping sharing the content in question usually solves the problem and if no additional sharing takes place, no further warnings should be received, for that content at least.

However, those who disregard warning notices or fail to check the email address registered with their ISP (so they don’t know they’ve been receiving warnings), things can get complicated.

Repeat infringers are at risk

Subscribers whose Internet connections are used to infringe copyright on a number of occasions are now labeled ‘repeat infringers’. Under US law, this can turn into a more serious situation.

As clarified in a recent case involving ISP Cox Communications, action must be taken by ISPs against those who keep on infringing, or they risk being held liable themselves. This has probably contributed to the increased volume of infringement notices being passed on to subscribers and the corresponding reports of them online.

An article published by TF back in February reveals how Comcast deals with persistent pirates. Other ISPs will follow different processes but the basic idea is that if users keep on infringing, at some point they’ll be faced with consequences, possibly a suspension or even termination of their Internet connection.

How can Internet users be sure never to receive a warning?

The clearest and most foolproof piece of advice is that those who don’t share infringing files with others are the ones that never receive a notice. While some innocents do get sent notices in error, the safest approach is not to share infringing files using BitTorrent and similar peer-to-peer software. These transfers are public and can be tracked.

However, as any file-sharing forum reader will know, plenty of pirates carry out their hobby on daily basis without ever receiving an infringement notice.

The reasons for this are varied, but it usually boils down to people using streaming and/or direct download sites, or by protecting their BitTorrent connections with a VPN. Others are simply lucky or have chosen content that for some reason isn’t being monitored for infringements.

Important: Not all infringement notices are benign

In a relatively small number of cases, copyright holders aren’t interested in warning alleged pirates – they want to sue them and/or extract a cash settlement. When this is the case, correspondence received from a user’s ISP usually makes it clear that a copyright holder is trying to obtain their identity and personal details with a view to legal action.

If users receive such a notice, immediate legal advice should be sought since there are no second chances. Under no circumstances should recipients ignore this type of ‘warning’ as doing so could potentially lead to an expensive default judgment.

Conclusion

Notices of infringement targeted at regular Internet subscribers in the US are usually issued for the purposes of a) stopping the current infringement and b) encouraging users to stop infringing in future.

The decision to stop infringing (or carry on behind a VPN or similar) is obviously a personal choice but in 2018 it’s clear that being caught on multiple occasions puts ISPs in a position where they must take action, or face potential consequences themselves. No prizes for guessing who’ll get thrown under the bus when the pressure is on.

None of the above should be construed as legal advice. If there is any uncertainty concerning the nature of an infringement notice, users should seek professional advice.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

05 Oct 18:29

What happened to Telltale Games

by Rob Beschizza

Telltale Games wasn't just a hit developer, producing the hugely popular The Walking Dead game series. It reinvented the adventure game, producing quality interactive narratives while escaping the genre's retro conventions. Despite its apparent success, the company suddenly imploded last month, laying off most of its staff. Megan Farokhmanesh reports on the tragic end of Telltale Games.

The woes of Telltale Games have deep roots. Earlier this year, The Verge published a report detailing years of nonstop crunch culture, toxic management, and frustration from developers who believed the company’s refusal to diversify gameplay had led to creative stagnation. ...

These sources, who were granted anonymity in order to speak freely and without fear of retribution, paint a consistent picture of a company desperately struggling to keep its head above water. Despite what they see as the best of intentions on behalf of those running Telltale, hundreds still tumbled into unemployment with no safety net from their company.

The "cinematic adventure games for top franchises" business was more marginal than it looked at the scale Telltale grew to, dedicated workers were constantly exploited by crunch-development cycles, management was blindly optimistic, and potential new partners figured out all of the above and put away their checkbooks.

05 Oct 18:27

Incredible and unaffordable solar system wristwatch with orbiting planets

by David Pescovitz

Van Cleef & Arpels' Midnight Planétarium timepiece features a mechanical orrery integrated in the watch face. It is only US$214,000. From the company:

The movement of each planet is true to its genuine length of orbit: it will take Saturn over 29 years to make a complete circuit of the dial, Jupiter will take almost 12 years, Mars 687 days, Earth 365 days, Venus 224 days and Mercury 88 days...

44 mm pink gold case; pink gold bezel; aventurine dial, pink gold sun and shooting star, serpentine Mercury, chloromelanite Venus, turquoise Earth, red jasper Mars, blue agate Jupiter, sugilite Saturn. Pink gold crown with sapphire case back. Matte black alligator strap with pink gold folding clasp. Self-winding mechanical movement (Stern Manufacture), equipped with a Christiaan Van der Klaauw module developed exclusively for Van Cleef & Arpels, 48 hour power reserve. Numbered edition

Midnight Planétarium Watch (via @pickover)

05 Oct 13:32

Baby rhino skips and jumps like his lamb buddy

by Seamus Bellamy

LOooOooook! This baby rhino learned how to jump and skip from it's lamb buddy. I needed this today.

I think this video would be a great way to illustrate why multiculturalism is so awesome: when we're exposed to thoughts, food and cultures other than our own, our horizons are broadened. Our lives are enriched. It gives us new, joyful ways to frolic.

04 Oct 12:49

Beloved 94-year-old teacher visits her (now-adult) students in her old classroom

by Rusty Blazenhoff

A couple of years ago, PBS NewsHour interviewed Flossie Lewis, a delightful and sharp 91-year-old teacher/writer who, in her words, still thinks she's 15 (Don't we all?). In the video, she spoke frankly about growing old. Over 7 million people saw her video, including many of her former students. All of them, including Lemony Snicket writer Daniel Handler, had words of praise for her.

Flossie is now 94 and documentarian Steve Goldbloom decided to visit with her again. This time, he took her to her old classroom in San Francisco and asked a few of her former students to come along. Watch.

World Teachers' Day is Friday. This one goes out to Flossie! Now, can someone PLEASE get this woman a ride on Ocean Ave.?

03 Oct 23:07

Man plays trick on his dogs

by Mark Frauenfelder

I jumped, too! GIF here.

03 Oct 23:02

LG Watch W7 is the first hybrid Wear OS watch w/ mechanical hands, 100-day battery, $450

by Ben Schoon

LG has been a major partner for Google’s wearable ecosystem long before it was called Wear OS, and today the company announced its latest smartwatch. The LG Watch W7 brings Google’s wearable platform, a new design, and some very unique ideas to the platform. Here’s what you need to know.

more…

The post LG Watch W7 is the first hybrid Wear OS watch w/ mechanical hands, 100-day battery, $450 appeared first on 9to5Google.

02 Oct 15:30

Police stop driver who stuffed his car with foliage

by Rob Beschizza

As seen here in photos taken by Tariq Butt and provided to the BBC, a man in Stockport, England, stuffed foliage into his car, then attempted to drive it.

The driver was stopped on Stockport's Heaton Moor Road. PC Andy Monaghan said he had "never seen anything like it" and the man risked "seriously injuring someone" after his visibility and access to the gear lever was blocked. The man, aged in his 40s, was reported for a number of driving offences.

If you're doing yard work, get a truck.

02 Oct 12:26

Drinking more water may help women avoid UTIs, new study says

by Xeni Jardin

If you are a woman who struggles with the pain of recurring urinary tract infections, a new study suggests that drinking more water could help.

Women who got recurring bladder infections (they're also called urinary tract infections, or UTIs) who added 1.5 liters of water to their daily intake over 12 months were 50% less likely to get another urinary tract infection than other women who drank less than that amount, according to a study published Monday in JAMA.

The women in the study were of pre-menopausal age.

From an accompanying editorial comment by Dr. Deborah Grady of the University of California, San Francisco, who serves as deputy editor for JAMA Internal Medicine:

For decades, it has been said that increasing fluid intake could help prevent or cure urinary tract infections. In this issue of JAMA Internal Medicine, a randomized clinical trial confirms that folk wisdom. Hooton and colleagues randomized women with 3 or more episodes of cystitis in the prior year to consume 1.5 L of water per day (three 0.5-L bottles) in addition to their usual intake, or to consume no additional water. The women who consumed additional water had an approximately 50% reduction in number of cystitis episodes in the year after randomization and were prescribed fewer antibiotics. We realize that this trial was not blinded, the primary outcome was self-reported, and it was sponsored by Danone Research, which sells the bottled water used in this study. However, the research question is important and the intervention was safe, easy, and effective (and it would be impossible to blind a trial in which drinking water is the intervention). As the authors note, the reduction in episodes of cystitis is likely due to increased urine volume and voids that reduce bacterial load in the bladder. Given this, it seems clear that any safe-to-drink water will do, including your local tap water, which will also spare the environmental impact of bottled water and improve the cost-effectiveness of the intervention.

Read the whole study here: Effect of Increased Daily Water Intake in Premenopausal Women With Recurrent Urinary Tract Infections.

From CNN's report on the study:

Drinking 1.5 liters a day is the equivalent of about six cups of water or four 12-ounce bottles of water. (...)

At least half of all women are at risk of what doctors call "acute uncomplicated cystitis" or "urinary tract infections" at some point in their lives. Once they get one, about a quarter of those women will get another within six months. Up to 75% of women will have another within a year. The intense burning, itching and frequent urination can make life miserable.

And in related health reminders -- this one's for guys, too -- the cranberry juice and UTIs thing is apparently bullshit.

IMAGE: SHUTTERSTOCK

30 Sep 15:12

20 best new Android games released this week including Monster Hunter Stories, Layton: Curious Village in HD, and Harvest Moon: Light of Hope

by Matthew Sholtz

Welcome to the roundup of the best new Android games that went live in the Play Store or were spotted by us in the previous week or so. This week had more than a few quality titles land on Android. Monster Hunter Stories is, of course, a huge release with a fair price, but then Layton: Curious Village in HD and Harvest Moon: Light of Hope are also hugely popular titles that are worth their asking prices.

Read More

20 best new Android games released this week including Monster Hunter Stories, Layton: Curious Village in HD, and Harvest Moon: Light of Hope was written by the awesome team at Android Police.

29 Sep 18:33

14 new and notable Android apps from the last two weeks including Hire, Firefox Reality Browser, and Bouncer (9/15/18 - 9/29/18)

by Matthew Sholtz

roundup_icon_largeWelcome to the roundup of the best new Android applications that went live in the Play Store or were spotted by us in the previous two weeks or so. This week I have a new Google app for business owners who want to scout fresh talent, an awesome virtual reality web browser from Firefox, and a very useful app that can grant temporary permissions to the rest of your apps. So without further ado, here are the most notable Android apps released in the last fortnight.

Read More

14 new and notable Android apps from the last two weeks including Hire, Firefox Reality Browser, and Bouncer (9/15/18 - 9/29/18) was written by the awesome team at Android Police.

29 Sep 09:25

YouTube Miniplayer rolling out on the web for picture-in-picture

by Abner Li

Back in March, YouTube began testing picture-in-picture on the web for simultaneous watching and browsing. While the previous A/B test was limited in scope, a new YouTube Miniplayer appears to be widely rolling out this evening

more…

The post YouTube Miniplayer rolling out on the web for picture-in-picture appeared first on 9to5Google.

29 Sep 09:25

Marty Balin, co-founder of Jefferson Airplane, RIP

by David Pescovitz

Marty Balin, co-founder in 1965 of the pioneering psychedelic band Jefferson Airplane, has died at age 76. Balin wrote or co-wrote nearly half of the tunes on the band's seminal 1967 album Surrealistic Pillow that was the de facto soundtrack for San Francisco's Summer of Love. From Rolling Stone:

Born Martyn Jerel Buchwald, Balin was a struggling folk guitarist on the San Francisco scene when he formed a band with Paul Kantner after meeting the 12-string guitarist at a hootenanny. They met up with guitarist Jorma Kaukonen, bassist Jack Casady, drummer Skip Spence and singer Signe Toly Anderson and cut their 1966 debut LP Jefferson Airplane Takes Off. They developed a strong following around the budding San Francisco rock scene, but became nationwide superstars in 1967 when Anderson left the group and was replaced by Grace Slick.

28 Sep 23:30

Cow plays fetch

by Mark Frauenfelder

This cow bellows with pleasure while playing fetch with a human.

28 Sep 23:29

How curly fries are cut

by Xeni Jardin

Such a soothing video.

Potatoes make everything better.

🍟 🍟 🍟

How curly fries are cut

28 Sep 18:00

Facebook: 50 million users’ personal information exposed in mega breach

by Xeni Jardin

Facebook says an attack on its network left the personal information of some 50 million users—perhaps you?—exposed to hackers. Who were the hackers, and what did they want? Facebook doesn't know, or won't say. But the company has confirmed that execs Mark Zuckerberg and Sheryl Sanders were among the users affected.

“We have a responsibility to protect your data, and if we can’t then we don’t deserve to serve you,” Zuckerberg said about Facebook's Cambridge Analytica scandal earlier this year.

Well. You heard the man.

Mike Isaac and Sheera Frankel in the New York Times:

The company discovered the breach earlier this week, finding that attackers had exploited a feature in Facebook’s code that allowed them to take over user accounts. Facebook fixed the vulnerability and notified law enforcement officials.

More than 90 million of Facebook’s users were forced to log out of their accounts Friday morning, a common safety measure for compromised accounts.

Facebook said it did not know the origin or identity of the attackers, nor had it fully assessed the scope of the attack. The company is in the beginning stages of its investigation.

The discovery of the hack comes at one of the most difficult times in Facebook’s history. The company has dealt with fallout over its role in a widespread Russian disinformation campaign around the 2016 presidential election.

(...) Even before Friday’s disclosure, Facebook was facing multiple Federal investigations into the company’s broader data sharing and privacy practices. The Securities and Exchange Commission has opened an investigation into Facebook’s statements on Cambridge Analytica.

READ THE REST.

Facebook faces likely government regulation over monopoly and influence concerns, and it faces consequences for its role in the Cambridge Analytica scandal, from EU, UK, and US legal forces.

This major news will not help Mark Zuckerberg and his company in their struggles.

28 Sep 13:00

Canoeing with manatees in a see-through canoe 🛶

by Xeni Jardin

: (◕(' 人 ') ◕) : Oh, the huge manatees! Need a mental health break? Step on in to our transparent canoe. 🛶

The guy who runs the 'See Through Canoe' company in Florida makes and sells transparent canoes, and shares awesome wildlife encounters he has along the waterways of Florida. I love watching these, and find them very calming on difficult days.

From the owner and filmmaker:

Getting out & taking these videos is the best part of what I do, & I enjoy sharing them with other nature lovers. And I would still be taking and sharing these videos even if I didn't have the company.
You can follow my adventures & wildlife encounters on the See Through Canoe company FaceBook page.

[ALL of the images and photographs in this post courtesy of SeeThroughCanoeCompany]

27 Sep 21:23

If you need a root canal, this explainer video might calm your (dead) nerves

by Carla Sinclair

How this video manages to make root canals seem like a straightforward and rather painless procedure is beyond me, but if I were to get another root canal, I'd want to watch this video first for some handholding reassurance.

27 Sep 21:20

Searching for Tuva: Before the internet and now

“So you think you know every country in the world?” my late friend and drumming partner Richard Feynman said with a twinkle in his eye, back in 1977.“Well, then, whatever happened to Tannu Tuva?”

I replied, “Surely you’re joking, Mr. Feynman—there is no such country!”

But there was: Feynman remembered Tuva as a purple splotch on the map just outside of Outer Mongolia. In the 1930s Tuva issued dozens of marvelous triangular- and diamond-shaped stamps that he collected as a boy. Then the country mysteriously disappeared.

His question turned into a quest—to learn everything we could about Tuva, and to get there ourselves. On the occasion of Google's 20th anniversary this month, I've been thinking about how different our search was then compared to today.

Back then our main source of information was libraries—local, university, even the Library of Congress. Much of the information was in Russian (Tuva had been absorbed into Stalin’s Soviet Union during World War II), so we recruited a linguistic wizard named Glen Cowan to help. (Today you can use Google Translate.) We scoured card catalogs, microfilm reels, cross-library listings—and books that literally needed the dust blown off—in hopes of finding a useful nugget of information. Each nugget, rare and unexpected, delivered a small delight of discovery, and kept our quest alive.

Search for “Tuva” today on Google and you’ll be showered with so many nuggets that you can’t possibly treasure them all.

Back then it took us months to find a single grainy black-and-white photograph of Tuva; search for “images Tuva” on Google today and you’ll find a hundred color photographs in a second.

Back then it took us a year to find a single hand-drawn map of Tuva’s exotically spelled capital; today, you can instantly see a detailed street map of Kyzyl based on satellite imagery, with current traffic conditions.

Because information about Tuva was so difficult to find in the pre-Internet era, our quest was full of twists—much like a Feynman diagram (go ahead, search!). One twist took us to Moscow, where Cowan and I discovered and then brought the largest archaeological and ethnographic exposition ever from the Soviet Union to the United States. It included spectacular items from Tuva, of course. We thought the Nomads exhibition would provide us the key to finally setting foot in Kyzyl; it actually was the key for a dozen Soviet academicians to visit the mysterious Disneyland. No matter: we learned the meaning of the Taoist saying, “The reward is in the journey.”

Undaunted, we spread our enthusiasm by sending out Xeroxed newsletters to our friends, encouraging them to pass them on and send back SASEs (self-addressed stamped envelopes) for future newsletters. We also set up a “Friends of Tuva hotline” (221-TUVA) to spread the latest information about the singing cowboys from Tuva riding in the 1993 Pasadena Tournament of Roses Parade. Each Tuvan cowboy could sing two notes simultaneously, something we could scarcely imagine when we read about it in books; today, YouTube has dozens of “Tuvan throatsinging” music videos, and the “Friends of Tuva” newsletters are online.

Sadly, Feynman died in 1988, just weeks before receiving the coveted formal invitation that would allow us to set foot in Tuva at last. But his memory lives on, here and in the land of his dreams. Today, you can find an article online about “Feynman Rock” in Tuva, carved to commemorate the centenary of Feynman’s birth in May this year. At a related event in Kyzyl, Cowan gave a talk in Russian about the work that won Feynman the Nobel Prize, while a simultaneous commemoration live-streamed into Kyzyl from Caltech.

panorama from feynman's rock in tuva

The view from Feynman Rock in Tuva

Today I embark on dozens of quirky diversions every week, usually ending up happily lost in the world of Wikipedia (to which I contribute a dollar a day for my habit). But these easy jaunts seem more like sugar highs than the satisfying meal that Tuva provided, so in an effort to recapture that spirit of adventure, I’ve begun to frequent my local library and read good old-fashioned books again.

Nevertheless, I'm thankful for the embarrassment of riches and fools gold that is today’s Internet. And on Google's 20th anniversary, I offer up a fervent hope: let us never stop pursuing the mysteries that surround us—wondrous mysteries that await sustained, serendipitous, and joyful investigation. Quests can still begin with an intriguing question; adventures still await the curious mind.

Find your Tuva.

27 Sep 18:42

[Bonus Round] Hooky Crook, Animus - Harbinger, Tomb Survivor, Millionaire Trivia: Who Wants To Be a Millionaire, Sega Pocket Club Manager, and Steam Cats

by Matthew Sholtz

bonusroundWelcome to the latest entry in our Bonus Round series, wherein we tell you all about the new Android games of the day that we couldn't get to during our regular news rounds. Consider this a quick update for the dedicated gamers who can't wait for our weekly roundups, and don't want to wade through a whole day's worth of news just to get their pixelated fix. Today we've got a casual physics-based cat burglary game, a dreadfully challenging Souls-like game, an excellent dungeon crawler filled with puzzles, a mobile game adaptation of Who Wants To Be a Millionaire, the first Western release of Sega's Pocket Club Manager, and an adorable idle game.

Read More

[Bonus Round] Hooky Crook, Animus - Harbinger, Tomb Survivor, Millionaire Trivia: Who Wants To Be a Millionaire, Sega Pocket Club Manager, and Steam Cats was written by the awesome team at Android Police.

27 Sep 18:41

Listen to this funky electromechanical lithophone

by Andrea James

Jay Harrison shared this delightful lithophone cover of Vulfpeck's "It Gets Funkier III" at the Parabola Arts Centre as part of Cheltenham Music Festival.

Lithophones are at least as old as their wood counterpart the xylophone. I was reminded of their lovely sound after reading about how mysterious tools found in the Colorado desert ten years ago have just been correctly identified as lithophones:

The ancient people who lived near the Great Sand Dunes crafted their lithophones out of dense, often volcanic, rock to get the best sound. The stones have different sizes, which gives them different tones and pitches. Each one has a pair of dead spots where you can hold them so they resonate.

One of the most exciting things about the discovery for Martorano is what these stones tell us about the lives of ancient people. We often see evidence of where Native Americans lived centuries ago, or how they hunted or ate. We know far less about their music.

“To me, at least today, things that make life meaningful include the arts, include music,” she said. “And so it makes sense to me that that was important in the past as well.”

Back to Jay's more modern version, here's a Paul Simon cover:

And a short snippet of Radiohead:

VULFPECK /// It Gets Funkier III /// Electromechanical Lithophone (YouTube / Jay Harrison)

27 Sep 12:51

Chrome's turning 10, here's what's new

Every time you open your browser, you have a mission to accomplish: trips to plan, emails to send, stories to read, skills to learn. We built Chrome to help you do all of those things as quickly and safely as possible. Today we celebrate Chrome’s 10th birthday, and just like a kid on the cusp of double digits, we’re constantly growing and changing. In the case of Chrome, those changes happen every six weeks to bring you new features and security updates, but our 10th birthday update is bigger than normal. Before we blow out our birthday candles, here’s a rundown of the updates coming your way today:

Jazzing up our look

First up, Chrome has a new look. You can see it across all platforms—desktop, Android, and iOS—where you’ll notice more rounded shapes, new icons and a new color palette. These updates have a simpler look and will (hopefully) boost your productivity. Take tabs, for instance. Are you a secret tab-hoarder? No judgment. We changed the shape of our tabs so that the website icons are easier to see, which makes it easier to navigate across lots of tabs. On mobile, we've made a number of changes to help you browse faster, including moving the toolbar to the bottom on iOS, so it's easy to reach. And across Chrome, we simplified the prompts, menus, and even the URLs in your address bar.

Chrome new UI

Introducing the new Chrome.

Get things done faster

You get a lot done online these days—booking travel and appointments, shopping and working through your to-do lists across multiple sites at once. And we want to make sure that you can do all of those things easily and safely. Now, Chrome can more accurately fill in your passwords, addresses, and credit card numbers, so that you can breeze through online checkout forms. All this information is saved to your Google account, and can also now be accessed directly from the Chrome toolbar.

We’ve also significantly improved the way Chrome handles passwords. Staying secure on the web means using strong and unique passwords for every different site. When it’s time to create a new password, Chrome will now generate one for you (so you’re not using your puppy’s name for all of your passwords anymore). Chrome will save it, and next time you sign in, it’ll be there, on both your laptop and phone.

Password mgr final

Chrome’s updated password manager generates and stores unique, strong passwords for you.

Smart answers directly in your search bar

You know the box at the top of Chrome that combines the search bar and address bar into one? We call it the Omnibox, and we built it so that you can get to your search results as fast as possible. Today, we’re making it even more convenient to use. It will now show you answers directly in the address bar without having to open a new tab—from rich results on public figures or sporting events, to instant answers like the local weather via weather.com or a translation of a foreign word.

Omnibox

Get all your answers without leaving your current tab.

Plus, a bonus if you find yourself with two dozen tabs open across three browser windows: Search for a website in your Omnibox and Chrome will tell you if it’s already open and let you jump straight to it with “Switch to tab.” Soon, you’ll be able to search files from your Google Drive directly in your Omnibox too.

Things just got personal

Everyone uses Chrome their own way, so we made it easier to personalize. You can now create and manage shortcuts to your favorite websites directly from the new tab page—simply open a new tab and “Add shortcut.” And as if you needed an excuse to look at more pictures of your dog, you can now customize the background of a newly-opened tab with a photo of Fido.

What’s happening under the hood

While today brings changes to the part of Chrome you can see, we're always working on "behind the scenes” improvements to Chrome, and we've made a lot of those in 2018. We launched an ad filter to keep you safe from malicious and annoying ads, helped move the web to HTTPS to keep you secure online, launched site isolation which provides deeper defense against many types of attacks including Spectre, and brought VR and AR browsing to Chrome. And we’re now rolling out a set of new experiments to improve Chrome’s startup time, latency, usage of memory, and usability.

Chrome wouldn’t be where it is without the developer community, our partners in The Chromium Projects. So we’re also rolling out some updates just for them, from new CSS features to improved performance tracking ability.

We'll be back with deep dives on our beloved Chrome Dino, the new password manager and the thinking beyond today’s redesign throughout the next couple weeks. Now, time to eat some cake!

27 Sep 12:50

Throwbacks and thank yous on our 20th birthday

On Google’s 20th birthday, Thursday is not just for throwbacks. It’s also for thank yous.

Google wouldn’t be what it is today if it weren’t for you: a curious crowd that comes to Search with all of life’s questions. Today’s birthday Doodle is dedicated to you, and the 20 years of searches that represent the inquisitiveness of people everywhere.

In today’s Doodle and hidden in Search for a limited time, you’ll be thrown back to (and flashed forward from) the days when “what is Y2K?” was your most burning tech question, Pluto was still a planet, and clip art was a critical part of visual communication.

Google Doodle Searches

The days when the music format du jour was the MP3 file and it was cutting-edge to watch a DVD. When you had to choose a screen name before hopping into a chat room.

All the kids had to have a digital pet, and girls were rocking the latest butterfly clip styles in their hair. Everyone was keepin' it real and gettin' jiggy wit it on the dance floor. And googol was just a really big number.

You can also peer back into the last two decades through the lens of trends by visiting 20years.withgoogle.com and seeing many of the people, pop culture and pizza (yes, pizza) that inspired your searches from 1998 to now.

We hope this jaunt down memory lane reminds you of your own magical moments when you found just what you were looking for with Google. For the next 20 years and beyond: Search on.

27 Sep 12:49

Tiny cute dog loves getting a haircut

by Xeni Jardin
27 Sep 12:47

Woman frightened by VR experience snuggles wrong end of dog for comfort

by Rob Beschizza

"It's horrible!" declares mum, who nonetheless sticks with the virtual reality game, comforted by the warmth and affection of her animal companion.

26 Sep 19:07

A quick lesson on the best way to give a cat a pill (can it really be this easy?)

by Carla Sinclair

Giving medicine to one of my cats – or any pet I've ever had – has always been a source of anxiety, for me as well as them. With their frantic squirming, strange cries, frightened glares, and ultimately letting the medicine fall out of their mouths, it's never pretty.

I at first thought that maybe the cat in the top video was just an abnormally people-pleasing feline, but then I found this other video (below) with more examples of cats taking their pill as if it were a piece of candy. Apparently there's a simple process to giving a cat a pill that I have never mastered, but I'll make sure to watch these videos again the next time I return from the vet's office with a sick cat.