TinyML is giving hardware new life

Aluminum and iconography are no longer enough for a product to get noticed in the marketplace. Today, great products need to be useful and deliver an almost magical experience, something that becomes an extension of life. Tiny Machine Learning (TinyML) is the latest embedded software technology that moves hardware into that almost magical realm, where machines can automatically learn and grow through use, like a primitive human brain.

Until now building machine learning (ML) algorithms for hardware meant complex mathematical modes based on sample data, known as “training data,” in order to make predictions or decisions without being explicitly programmed to do so. And if this sounds complex and expensive to build, it is. On top of that, traditionally ML-related tasks were translated to the cloud, creating latency, consuming scarce power and putting machines at the mercy of connection speeds. Combined, these constraints made computing at the edge slower, more expensive and less predictable.

But thanks to recent advances, companies are turning to TinyML as the latest trend in building product intelligence. Arduino, the company best known for open-source hardware is making TinyML available for millions of developers. Together with Edge Impulse, they are turning the ubiquitous Arduino board into a powerful embedded ML platform, like the Arduino Nano 33 BLE Sense and other 32-bit boards. With this partnership you can run powerful learning models based on artificial neural networks (ANN) reaching and sampling tiny sensors along with low-powered microcontrollers.

Over the past year great strides were made in making deep learning models smaller, faster and runnable on embedded hardware through projects like TensorFlow Lite for Microcontrollers, uTensor and Arm’s CMSIS-NN. But building a quality dataset, extracting the right features, training and deploying these models is still complicated. TinyML was the missing link between edge hardware and device intelligence now coming to fruition.

Tiny devices with not-so-tiny brains

Researchers use biometrics, including data from the Oura Ring, to predict COVID-19 symptoms in advance

A team of researchers from the West Virginia University (WVU) Rockefeller Neuroscience Institute (RNI), along with WVU’s Medicine department and staff from Oura Health have developed a platform they say can be used to anticipate the onset of COVID-19 symptoms in otherwise healthy people up to three days in advance. This can help with screening of pre-symptomatic individuals, the researchers suggest, enabling earlier testing and potentially reducing the exposure risk among front-line healthcare and essential workers.

beehero_hardware

BeeHero smartens up hives to provide ‘pollination as a service’ with $4M seed round

Vast monoculture farms outstripped the ability of bee populations to pollinate them naturally long ago, but the techniques that have arisen to fill that gap are neither precise nor modern. Israeli startup BeeHero aims to change that by treating hives both as living things and IoT devices, tracking health and pollination progress practically in real time. It just raised a $4 million seed round that should help expand its operations into U.S. agriculture.

DSC00011

Bang & Olufsen’s latest Beoplay E8 fully wireless earbuds offer top sound and comfort

Bang & Olufsen has an excellent reputation in home audio, and its original Beoplay E8 fully wireless headphones were a category leader when there was barely a category to lead. The company recently launched the third version of the E8, a new generation of hardware that comes with a number of improvements for better audio quality and convenience, including wireless charging, up to seven hours of continuous use on a single charge and the latest Bluetooth standards for improved audio quality, operating distance and latency.

jabra-elite-active-75t-4

Jabra’s Elite Active 75t earbuds offer great value and sound for both workouts and workdays

Technology improvements over the past few years mean that most fully wireless earbuds are a lot better than they used to be. That has led to something of a narrowing of the field among competitors in this arena, but some of the players still stand out – and Jabra have definitely delivered a standout performer with its newest Elite Active 75t fully wireless earbuds.

Basics

Jabra’s Elite Active 75t is a successor to its very popular 65t line, with added moisture resistance designed specifically for exercise use, as indicated by the ‘Active’ in the name. At $199.99, these are definitely premium-priced – but they’re a lot more affordable than many of the other offerings in the category, especially with their IP57-water and sweat resistance rating.

The Elite Active 75t also feature an esteemed 7.5 hours of battery life on a single charge, and their compact charging case carries backup power that adds up to a total of 28 hours potential run time across a single charge for both. The case charges via USB-C and also offers a fast-charge capability that provides 60 minutes of use from just 15 minutes of charging.

While they don’t offer active noise cancellation, they do have passive noise blocking, and an adjustable passthrough mode so that you can tune how much of the sound of the world around you you want to let in – a great safety feature for running or other activities.

They use Bluetooth 5.0 for low power consumption and extended connection range, have an auto-pause and resume feature for when you take out one earbud, and include a 4-mic array to optimize audio quality during calls.

Design

Jabra has accomplished a lot on the design front with the Elite Active 75t. Their predecessor was already among the most compact and low-profile in-ear wireless buds on the market, and the Elite Active 75t is even smaller. These are extremely lightweight and comfortable, too, and their design ensures that they stay put even during running or other active pursuits. In my testing, they didn’t even require adjustment once during a 30-minute outdoor run.

Their comfort makes them a great choice for both active use and for all-day wear at the desk – and the 7.5 hours of battery life doesn’t seem to be a boast, either, based on my use, which is also good for workday wear.

Another key design feature that Jabra included on the Elite Active 75t is that both earbuds feature a large, physical button for controls. This is much better and easier to use than the touch-based controls found on a lot of other headsets, and makes learning the various on-device control features a lot easier.

Finally in terms of design, the charging case for the Elite Active 75t is also among the most svelte on the market. It’s about the size of two stacked matchboxes, and easily slides into any available pockets. Like the earbuds themselves, the case features a very slightly rubberized outer texture, which is great for grip but, as you can see from the photos, is also a dust magnet. That doesn’t really matter unless you happen to be tasked with photographing them, however.

One final note on the case design – magnetic snaps in the earbud pockets mean you can be sure that your headset buds are seated correctly for charging when you put them back, which is a great bit of user experience thoughtfulness.

Performance

It’s easy to see why the Jabra Elite Active 75t is already a favorite among users – they provide a rich, pleasant sound profile that’s also easily tuned through the Jabra Sound+ mobile app. Especially for a pair of earbuds designed specifically for active use, these provide sound quality that goes above and beyond.

Their battery life appears to line up with manufacturer estimates, which also makes them class-leading in terms of single charge battery life. That’s a big advantage when using these for longer outdoor activities, or, as mentioned, when relying on them for all-day desk work. Their built-in mic is also clear and easy to understand for people on the other side of voice and video calls, and the built-in voice isolation seems to work very well according to my testing.

In my experience, their fit is also fantastic. Jabra really seems to have figured out how to build a bud that stays in place, regardless of how much you’re moving around or sweating. It’s really refreshing to find a pair of fully wireless buds that you never have to even think about readjusting them during a workout.

Bottom Line

Jabra has done an excellent job setting their offering apart from an increasingly crowded fully wireless earbud market, and the Elite Active 75t is another distinctive success. Size, comfort and battery life all help put this above its peers, and it also boasts great sound quality as well as excellent call quality. You can get better sounding fully wireless earbuds, but not without spending quite a bit more money and sacrificing some of those other advantages.

This Week in Apps: Facebook takes on Shopify, Tinder considers its future, contact-tracing tech goes live

Welcome back to This Week in Apps, the Extra Crunch series that recaps the latest OS news, the applications they support and the money that flows through it all.

The app industry is as hot as ever, with a record 204 billion downloads and 0 billion in consumer spending in 2019. People are now spending three hours and 40 minutes per day using apps, rivaling TV. Apps aren’t just a way to pass idle hours — they’re a big business. In 2019, mobile-first companies had a combined 4 billion valuation, 6.5x higher than those without a mobile focus.

In this Extra Crunch series, we help you keep up with the latest news from the world of apps, delivered on a weekly basis.

This week we’re continuing to look at how the coronavirus outbreak is impacting the world of mobile applications. Notably, we saw the launch of the Apple/Google exposure-notification API with the latest version of iOS out this week. The pandemic is also inspiring other new apps and features, including upcoming additions to Apple’s Schoolwork, which focus on distance learning, as well as Facebook’s new Shops feature designed to help small business shift their operations online in the wake of physical retail closures.

Tinder, meanwhile, seems to be toying with the idea of pivoting to a global friend finder and online hangout in the wake of social distancing, with its test of a feature that allows users to match with others worldwide — meaning, with no intention of in-person dating.

Headlines

COVID-19 apps in the news

  • Fitbit app: The fitness tracker app launched a COVID-19 early detection study aimed at determining whether wearables can help detect COVID-19 or the flu. The study will ask volunteers questions about their health, including whether they had COVID-19, then pair that with activity data to see if there are any clues that could be used to build an early warning algorithm of sorts.
  • U.K. contact-tracing app: The app won’t be ready in mid-May as promised, as the government mulls the use of the Apple/Google API. In testing, the existing app drains the phone battery too quickly. In addition, researchers have recently identified seven security flaws in the app, which is currently being trialed on the Isle of Wight.

Apple launches iOS/iPadOS 13.5 with Face ID tweak and contact-tracing API

Apple this week released the latest version of iOS/iPadOS with two new features related to the pandemic. The first is an update to Face ID which will now be able to tell when the user is wearing a mask. In those cases, Face ID will instead switch to the Passcode field so you can type in your code to unlock your phone, or authenticate with apps like the App Store, Apple Books, Apple Pay, iTunes and others.

The other new feature is the launch of the exposure-notification API jointly developed by Apple and Google. The API allows for the development of apps from public health organizations and governments that can help determine if someone has been exposed by COVID-19. The apps that support the API have yet to launch, but some 22 countries have requested API access.

mic-feature-1

How to make the most of your at-home videoconference setup: Microphone edition

Working from home isn’t going anywhere anytime soon, and a slew of companies just announced longer-term initiatives to make their remote work practices either extend or permanent. That means for some it’s the perfect time to take their at-home videoconferencing setup even further, so we’re going to take a closer look at various core elements to build on our initial exploration of what can help you improve your video call or live broadcasting game. Today, it’s all about audio.

The FBI is mad because it keeps getting into locked iPhones without Apple’s help

The debate over encryption continues to drag on without end.

In recent months, the discourse has largely swung away from encrypted smartphones to focus instead on end-to-end encrypted messaging. But a recent press conference by the heads of the Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) showed that the debate over device encryption isn’t dead, it was merely resting. And it just won’t go away.

At the presser, Attorney General William Barr and FBI Director Chris Wray announced that after months of work, FBI technicians had succeeded in unlocking the two iPhones used by the Saudi military officer who carried out a terrorist shooting at the Pensacola Naval Air Station in Florida in December 2019. The shooter died in the attack, which was quickly claimed by Al Qaeda in the Arabian Peninsula.

Early this year — a solid month after the shooting — Barr had asked Apple to help unlock the phones (one of which was damaged by a bullet), which were older iPhone 5 and 7 models. Apple provided “gigabytes of information” to investigators, including “iCloud backups, account information and transactional data for multiple accounts,” but drew the line at assisting with the devices. The situation threatened to revive the 2016 “Apple versus FBI” showdown over another locked iPhone following the San Bernardino terror attack.

After the government went to federal court to try to dragoon Apple into doing investigators’ job for them, the dispute ended anticlimactically when the government got into the phone itself after purchasing an exploit from an outside vendor the government refused to identify. The Pensacola case culminated much the same way, except that the FBI apparently used an in-house solution instead of a third party’s exploit.

You’d think the FBI’s success at a tricky task (remember, one of the phones had been shot) would be good news for the Bureau. Yet an unmistakable note of bitterness tinged the laudatory remarks at the press conference for the technicians who made it happen. Despite the Bureau’s impressive achievement, and despite the gobs of data Apple had provided, Barr and Wray devoted much of their remarks to maligning Apple, with Wray going so far as to say the government “received effectively no help” from the company.

This diversion tactic worked: in news stories covering the press conference, headline after headline after headline highlighted the FBI’s slam against Apple instead of focusing on what the press conference was nominally about: the fact that federal law enforcement agencies can get into locked iPhones without Apple’s assistance.

That should be the headline news, because it’s important. That inconvenient truth undercuts the agencies’ longstanding claim that they’re helpless in the face of Apple’s encryption and thus the company should be legally forced to weaken its device encryption for law enforcement access. No wonder Wray and Barr are so mad that their employees keep being good at their jobs.

By reviving the old blame-Apple routine, the two officials managed to evade a number of questions that their press conference left unanswered. What exactly are the FBI’s capabilities when it comes to accessing locked, encrypted smartphones? Wray claimed the technique developed by FBI technicians is “of pretty limited application” beyond the Pensacola iPhones. How limited? What other phone-cracking techniques does the FBI have, and which handset models and which mobile OS versions do those techniques reliably work on? In what kinds of cases, for what kinds of crimes, are these tools being used?

We also don’t know what’s changed internally at the Bureau since that damning 2018 Inspector General postmortem on the San Bernardino affair. Whatever happened with the FBI’s plans, announced in the IG report, to lower the barrier within the agency to using national security tools and techniques in criminal cases? Did that change come to pass, and did it play a role in the Pensacola success? Is the FBI cracking into criminal suspects’ phones using classified techniques from the national security context that might not pass muster in a court proceeding (were their use to be acknowledged at all)?

Further, how do the FBI’s in-house capabilities complement the larger ecosystem of tools and techniques for law enforcement to access locked phones? Those include third-party vendors GrayShift and Cellebrite’s devices, which, in addition to the FBI, count numerous U.S. state and local police departments and federal immigration authorities among their clients. When plugged into a locked phone, these devices can bypass the phone’s encryption to yield up its contents, and (in the case of GrayShift) can plant spyware on an iPhone to log its passcode when police trick a phone’s owner into entering it. These devices work on very recent iPhone models: Cellebrite claims it can unlock any iPhone for law enforcement, and the FBI has unlocked an iPhone 11 Pro Max using GrayShift’s GrayKey device.

In addition to Cellebrite and GrayShift, which have a well-established U.S. customer base, the ecosystem of third-party phone-hacking companies includes entities that market remote-access phone-hacking software to governments around the world. Perhaps the most notorious example is the Israel-based NSO Group, whose Pegasus software has been used by foreign governments against dissidents, journalists, lawyers and human rights activists. The company’s U.S. arm has attempted to market Pegasus domestically to American police departments under another name. Which third-party vendors are supplying phone-hacking solutions to the FBI, and at what price?

Finally, who else besides the FBI will be the beneficiary of the technique that worked on the Pensacola phones? Does the FBI share the vendor tools it purchases, or its own home-rolled ones, with other agencies (federal, state, tribal or local)? Which tools, which agencies and for what kinds of cases? Even if it doesn’t share the techniques directly, will it use them to unlock phones for other agencies, as it did for a state prosecutor soon after purchasing the exploit for the San Bernardino iPhone?

We have little idea of the answers to any of these questions, because the FBI’s capabilities are a closely held secret. What advances and breakthroughs it has achieved, and which vendors it has paid, we (who provide the taxpayer dollars to fund this work) aren’t allowed to know. And the agency refuses to answer questions about encryption’s impact on its investigations even from members of Congress, who can be privy to confidential information denied to the general public.

The only public information coming out of the FBI’s phone-hacking black box is nothingburgers like the recent press conference. At an event all about the FBI’s phone-hacking capabilities, Director Wray and AG Barr cunningly managed to deflect the press’s attention onto Apple, dodging any difficult questions, such as what the FBI’s abilities mean for Americans’ privacy, civil liberties and data security, or even basic questions like how much the Pensacola phone-cracking operation cost.

As the recent PR spectacle demonstrated, a press conference isn’t oversight. And instead of exerting its oversight power, mandating more transparency, or requiring an accounting and cost/benefit analysis of the FBI’s phone-hacking expenditures — instead of demanding a straight and conclusive answer to the eternal question of whether, in light of the agency’s continually-evolving capabilities, there’s really any need to force smartphone makers to weaken their device encryption — Congress is instead coming up with dangerous legislation such as the EARN IT Act, which risks undermining encryption right when a population forced by COVID-19 to do everything online from home can least afford it.

The bestcase scenario now is that the federal agency that proved its untrustworthiness by lying to the Foreign Intelligence Surveillance Court can crack into our smartphones, but maybe not all of them; that maybe it isn’t sharing its toys with state and local police departments (which are rife with domestic abusers who’d love to get access to their victims’ phones); that unlike third-party vendor devices, maybe the FBI’s tools won’t end up on eBay where criminals can buy them; and that hopefully it hasn’t paid taxpayer money to the spyware company whose best-known government customer murdered and dismembered a journalist.

The worst-case scenario would be that, between in-house and third-party tools, pretty much any law enforcement agency can now reliably crack into everybody’s phones, and yet nevertheless this turns out to be the year they finally get their legislative victory over encryption anyway. I can’t wait to see what else 2020 has in store.