5.5 C
New York
Wednesday, March 26, 2025
Home Blog

AI advances result in extra nimble humanoids, higher autonomy at NVIDIA GTC

0


AI advances result in extra nimble humanoids, higher autonomy at NVIDIA GTC

NVIDIA GTC 2025 featured many main builders that embed NVIDIA merchandise of their robots. | Credit score: The Robotic Report

I spent nearly all of Day 3 at NVIDIA GTC exploring the expo ground, studying in regards to the newest NVIDIA merchandise and catching up with a few of the key gamers within the robotics and synthetic intelligence business.

This yr, fewer humanoid robotic distributors had been in attendance. Agility Robotics, 1X Applied sciences, Unitree Robotics, and Neura Robotics had techniques on the expo ground, and EngineAI had a small kiosk with solely movies to point out.

There have been a number of different collaborative robotic demonstrations together with a couple of cellular robots. General, there gave the impression to be fewer robots on the NVIDIA GTC present ground this yr.

I additionally talked to a number of corporations, equivalent to Lab0 and Agilox, that cut up their staffs this week to ship the larger demos to ProMat in Chicago. Unitree will convey its G1 humanoid to the Robotics Summit & Expo subsequent month.


SITE AD for the 2025 Robotics Summit registration.
Register now so you do not miss out!


1X designs a humanoid with a human contact

My first cease was 1X Applied sciences. I met CEO Bernt Børnich in particular person for the primary time and at last noticed the corporate’s robotic dwell in motion. My preliminary impression? The humanoid was spectacular, particularly its obvious nimbleness.

What caught my consideration was the teleoperated demo within the sales space (see video under). Whereas the robotic was managed remotely, it was clear how simply the operator may translate their intentions to the robotic. Watching it easily choose up and use a vacuum cleaner to wash the carpet was a testomony to the intuitive controls. 1X is actively coaching the robotic for autonomy via teleoperation.

I requested Børnich in regards to the present state of the corporate’s product roadmap. He replied that it’s making ready to deploy extra beta models into properties later this yr. Autonomy will nonetheless be restricted, and the robotic can be actively teleoperated over the community, however that is 1X’s plan to fill its “knowledge flywheel” with the mandatory data for coaching its AI mannequin.

Security is paramount for 1X, particularly because it plans to ship robots into properties. This focus is obvious within the robotic’s design. As a substitute of a tough shell, it’s clothed in delicate supplies, giving it a much less intimidating look.

The padding, strategically positioned the place human muscle mass can be, is a considerate element, designed to reduce affect in case of unintentional contact. This design language positions it as a possible house companion.

Agility’s Digit demonstrates whole-body RL physique management

On the Agility Robotics sales space subsequent door, I spoke with co-founder and Chief Robotic Officer Jonathan Hurst and Chief Know-how Officer Pras Velagapudi. They demonstrated the appliance of AI-driven, reinforcement studying (RL) for complete physique management.

The Digit humanoid demo was not like something that I’ve seen from the corporate earlier than. Whereas ProMat and different occasions give attention to business verticals, NVIDIA GTC is a horizontal expertise showcase, so Agility Robotics confirmed off new developments in its AI improvement program.

The corporate stated its whole-body loco-manipulation coverage was developed from scratch. The robotic’s gait, as seen within the video under, seems considerably erratic, nearly “drunk.”

Nevertheless, as Hurst defined, this new gait was a discovered conduct, and the engineering crew didn’t know what the end result can be. The robotic had discovered to stroll autonomously in two weeks, nearly all of which occurred in simulation with the NVIDIA crew.

Whereas Agility continues to be a frontrunner with the economic deployments of humanoids, it’s also a analysis firm and all the time pushing the boundaries of what’s potential.

RIVR exhibits legged robotic for last-mile deliveries

I additionally stopped by the RIVR sales space, the place I noticed its wheeled quadruped robotic designed for last-mile supply. This robotic is considerably bigger and extra strong than Boston Dynamics‘ Spot, and it displayed exceptional agility.

It was thrilling to see legged robots being developed for sensible purposes like last-mile supply.

Neura Robotics teases humanoid

Neura Robotics confirmed its 4NE-1 humanoid robotic. Nevertheless, the robotic was a static show. The corporate is planning to roll it out — or ought to I say, “stroll it out” — later this yr, so we’ll have to attend to see it in motion.

Image of the Neura Robotics humanoid robot on display at GTC 2025.

Neura is constructing a bipedal robotic. At NVIDIA GTC 2025, the corporate had a static show. | Credit score: The Robotic Report

Teradyne has huge plans for its AI roadmap

On the Teradyne sales space, I met with James Davidson, chief AI officer. He emphasised the worldwide initiatives that he’s overseeing at Teradyne, throughout each Common Robots (UR) and Cellular Industrial Robots (MiR) product groups to construct a sturdy AI platform that permits fast iteration and straightforward integration for companions.

Davidson envisioned making a platform much like Android Studio, supposed to make it fast and straightforward for companions to develop techniques, with seamless interfaces and supporting libraries. The objective is to offer core AI capabilities like manipulation and notion that companions can simply select and customise for his or her particular wants.

Teradyne’s technique seems to be constructing a versatile ecosystem that permits speedy improvement and adaptation, reasonably than making an attempt to create a one-size-fits-all robotic resolution. By specializing in platform improvement and strategic partnerships, Teradyne goals to speed up AI-driven robotics adoption throughout totally different industries. We are able to count on to listen to extra sooner or later, straight from Davidson.

Mike oitzman interviews James davidson at the Teradyne booth at GTC 2025.

Mike Oitzman (l) interviews Teradyne Chief AI Officer James Davidson (r) on the Teradyne sales space at NVIDIA GTC 2025. | Credit score: McCall Media

CoBot brings Proxie robotic

Additionally at GTC, I had an opportunity to see and contact the Collaborative Robotics Proxie robotic up shut and private.

Whereas the cellular manipulator wasn’t operating on the present, I used to be in a position to study its design and building. The system options “swerve” drive for the 4 wheels on the bottom, plus a sturdy cart-capture system.

Mike stands next to the proxie AMR from Collaborative robotics.

The writer stands subsequent to the Proxie AMR from Collaborative Robotics. | Credit score: The Robotic Report

I turned a robotic surgeon, for a second

One of many enjoyable interactive demos on the present was the Intuitive Surgical sales space, the place attendees may sit down and teleoperate the corporate’s da Vinci robotic. I used to be stunned at simply how straightforward to make use of the surgical system was.

After adjusting the 3D monitor and handbook calipers, the educational curve was quick. I used to be in a position to choose up and transfer gadgets on the desk with excellent 3D comprehension of the place the tooltips had been in area.

It is a extremely refined system, but when I used to be in a position to be taught it this shortly, I can solely think about how this device would enhance the capabilities of a talented surgeon.

Pebble Mobility is the most recent in sensible RVs

I acquired a full tour of the brand new Pebble Move leisure automobile from Stefan Solyom, CTO of Pebble Mobility. After studying in regards to the RV’s options, I’d classify it as a robotic. The automobile includes a 45kWh battery,  Straightforward Tow with powered wheels, and 1.1 kW photo voltaic arrays.

One characteristic that precipitated me to outline Pebble Move as a robotic is the the Magic Hitch characteristic. The trailer can autonomously drive to the rear of the tow automobile, and utilizing a imaginative and prescient digital camera, robotically hook as much as the automobile.

As soon as underneath manner, the automobile has a number of modes, together with one mode that utilizing energy from its batteries to drive the wheels and scale back drag on the tow automobile. Because of this the Pebble Move might be towed behind an electrical automobile with minimal affect on the vary of the electrical automobile.

The trailer also can use regenerative braking to recharge its battery. The RV may even be put into “cost mode” and apply light regenerative braking towards the ability of the tow automobile to completely cost its batteries earlier than reaching a campsite.

As soon as on the campsite, the trailer might be unhitched and moved into the ultimate place utilizing a Bluetooth connection to a smartphone app — no extra worries about backing into one thing.

hero image of the pebble flow smart rv at NVIDIA GTC 2025.

The brand new Pebble Move sensible RV goes into manufacturing as the corporate prepares to ship its Founder Membership version to the primary paying prospects. | Credit score: The Robotic Report

General, the Pebble Move is among the most revolutionary RVs to be launched up to now yr. The goal marketplace for Pebble Move is primarily electrical automobile house owners, however fuel/diesel fuel-powered tow automobile house owners also can profit from the options of the platform.

Pebble Move was featured at NVIDIA GTC as a result of it has a NVIDIA ORIN processor onboard for the entire techniques administration features and notion. The Pebble Move is constructed within the U.S., and the firm‘s crew is made up of skilled automotive engineers and Silicon Valley veterans.

The corporate plans to start delivery models for its “Founder Collection” within the second half of this yr. The Founder Collection comes totally loaded with each characteristic, and it consists of emergency roadside help wherever within the continental U.S. The corporate is taking orders for future supply of the following collection of trailers.

inside view of the Pebble Flow.

The Pebble Move includes a work space, together with a desk beneath the complete queen Murphy mattress. | Credit score: The Robotic Report

NVIDIA GTC exhibits persevering with advances

General, Day 3 of NVIDIA GTC supplied a wide-ranging have a look at the evolving world of robotics. From the safety-conscious design of 1X’s humanoids and Agility Robotics’ AI-driven studying experiments to Pebble’s self-driving RV, it was clear that the way forward for robotics is each thrilling and quickly approaching.

All the classes from GTC had been recorded and can be accessible solely to registered attendees of the occasion for the following week. Then, choose classes can be printed and accessible for watching by anybody. Go to the occasion web site to be taught extra.

Is Your Consuming Water Actually Protected? Unveiling the Fact with Water Evaluation


We frequently assume the water flowing from our faucets is clear and protected. You activate the tap, fill a glass, and sip with out a second thought. However right here’s one thing which may make you pause: the World Well being Group (WHO) estimates over 2 billion folks globally drink water contaminated with feces. Even in locations just like the U.S., the place clear water appears like a given, crises in Flint, Michigan, and Camp Lejeune, North Carolina, remind us—security isn’t at all times assured.

The scariest half? Water can look completely clear and nonetheless harbor harmful threats. That’s the place water evaluation is available in—a scientific lifeline uncovering hidden dangers in our ingesting water, from bustling cities to distant villages. On this put up, we’ll discover what water evaluation is, the way it works, and what it tells us in regards to the state of ingesting water worldwide. Let’s dive in.

What Is Water Evaluation and Why Ought to You Care?

Merely put, water evaluation is the method of testing water to determine what’s in it. Scientists use lab tools and subject instruments to verify all the things from how cloudy it seems to be to what micro organism could be swimming round. Right here’s what they sometimes measure:

  • Bodily traits: Suppose colour, temperature, or murkiness (turbidity).
  • Chemical make-up: Ranges of pH, heavy metals like lead, nitrates, and even chlorine.
  • Organic clues: Micro organism like coli, viruses, or tiny parasites.

Why does this matter? For starters, it retains us wholesome by catching waterborne illnesses earlier than they unfold. It additionally ensures water meets security requirements set by teams just like the EPA or WHO, tracks air pollution from farms or factories, and helps plan higher water techniques. With out it, we’d be ingesting blind.

Wish to dig deeper? Take a look at our posts

Drinking Water Crisis

The International Consuming Water Disaster: The place Are We Now?

Numbers don’t lie, and the newest stats from UNICEF and WHO’s 2023 Joint Monitoring Programme paint a grim image:

  • 2 billion folks lack entry to soundly managed water.
  • 435 million depend on sketchy, unimproved sources.
  • 144 million drink straight from rivers or lakes.
  • 6 billion go with out fundamental sanitation.

The hole between wealthy and poor nations is stark. Cities in rich nations usually have top-notch remedy crops, however rural areas and underserved communities? They’re caught with soiled, untreated water. Listed here are some eye-opening examples:

  • Bangladesh: Arsenic seeps into nicely water, poisoning hundreds of thousands.
  • India: Fertilizers go away fluoride and nitrates within the groundwater.
  • S.: Previous pipes leach lead into houses and faculties.
  • Sub-Saharan Africa: Floor water spreads cholera like wildfire.

Water evaluation shines a light-weight on these issues—and factors the best way to options.

What Water Evaluation Uncovers: The High Contaminants Worldwide

So, what’s lurking in our water? Right here’s a rundown of the 4 largest culprits water testing reveals:

  1. Pathogens
  • What they’re: Germs like coli, Salmonella, or Cryptosporidium.
  • What they do: Trigger diarrhea, cholera, and even typhoid.
  • How we discover them: Filters, DNA assessments (PCR), or micro organism counts.
  1. Heavy Metals
  • What they’re: Toxins like lead, arsenic, or mercury.
  • What they do: Harm brains, kidneys, and even trigger most cancers.
  • How we discover them: Excessive-tech instruments like spectroscopy (AAS or ICP-MS).
  1. Chemical substances from Business and Farms
  • What they’re: Nitrates, pesticides, or “eternally chemical compounds” like PFAS.
  • What they do: Mess with hormones, increase most cancers dangers.
  • How we discover them: Machines like GC-MS or spectrophotometers.
  1. Pure Nasties
  • What they’re: Fluoride, salt, or manganese from the earth.
  • What they do: Stain enamel (fluorosis) or spike blood strain.
  • How we discover them: Electrodes or titration assessments.

Water evaluation doesn’t simply spot these—it offers us the information to battle again.

The Instruments Making Water Evaluation Potential

Due to fashionable tech, testing water is faster and sharper than ever. Right here’s what’s within the toolbox:

Within the Lab

  • ICP-MS: Pinpoints tiny traces of metals.
  • Chromatography: Sniffs out pesticides or chemical compounds.
  • Spectrophotometry: Measures vitamins like nitrates.
  • PCR/ELISA: Catches sneaky pathogens.

Within the Discipline

  • Take a look at strips for fast checks (pH, lead, chlorine).
  • Handheld meters for murkiness or oxygen ranges.
  • Sensors that give cities real-time updates.

What’s Subsequent?

  • AI predicting water high quality developments.
  • Satellites watching watersheds from above.
  • Blockchain holding take a look at outcomes sincere.

These instruments make water evaluation each exact and sensible, wherever it’s wanted.

Industrial-Degree Water Evaluation: Maintaining Huge Techniques Protected

Whereas house testing protects households, industrial-level water evaluation safeguards complete communities, ecosystems, and economies. Factories, farms, and energy crops use huge quantities of water—and launch it again into the atmosphere. With out rigorous testing, that cycle may flip poisonous.

Why Industries Want Water Evaluation

  • Manufacturing High quality: In meals processing or prescribed drugs, water purity immediately impacts product security.
  • Tools Longevity: Exhausting water or corrosive chemical compounds can wreck pipes and equipment.
  • Environmental Compliance: Legal guidelines just like the U.S. Clear Water Act demand strict monitoring of wastewater.
  • Public Security: Industrial spills or runoff can contaminate native ingesting water—just like the 2014 Elk River chemical spill in West Virginia.

How It Works

Industrial water evaluation scales up the instruments we’ve already lined. Labs use heavy-duty tech like:

  • Circulate Injection Evaluation (FIA): Fast testing for chemical compounds in high-volume water samples.
  • Whole Natural Carbon (TOC) Analyzers: Measuring air pollution ranges in wastewater.
  • Steady Monitoring Techniques: Sensors that observe pH, metals, or toxins 24/7 at plant outflows.

On-site groups usually pair these with transportable kits to catch points quick—suppose oil refineries testing for benzene or farms checking irrigation runoff for nitrates.

Influence

  • Textile Business: In Bangladesh, dye-heavy wastewater testing led to cleaner river discharges.
  • Mining: Australia’s strict water evaluation caught acid drainage, defending close by streams.
  • Vitality: U.S. fracking websites now monitor for methane leaks due to more durable rules.

Industrial water evaluation doesn’t simply preserve companies operating—it prevents disasters and preserves our shared water provide.

How Water Evaluation Saves Lives and Shapes Legal guidelines

This isn’t simply geeky science—it’s a game-changer for well being and coverage.

Well being Wins

  • Recognizing outbreaks like cholera earlier than they explode.
  • Monitoring superbugs proof against antibiotics.
  • Linking long-term dangers (like arsenic) to most cancers.

Coverage Energy

  • Backing up EPA and WHO guidelines.
  • Setting protected limits for toxins.
  • Unlocking funds to repair pipes or clear rivers.

Actual-World Wins

  • Flint, Michigan: Residents’ assessments compelled motion on lead.
  • Cape City, South Africa: Shortage led to strict water guidelines.
  • India’s Jal Jeevan Mission: Rural people acquired testing kits to take cost.

Inquisitive about city water fixes? Learn our tackle right here.

The right way to Take a look at Your Personal Water at Dwelling

Even when your metropolis treats its water, outdated pipes or close by farms may taint your provide. Right here’s methods to verify it your self.

When to Take a look at

  • You’ve acquired ageing plumbing or a non-public nicely.
  • Factories or fields are shut by.
  • Your water smells funky or stains sinks.
  • Your loved ones retains getting abdomen bugs.

Your Choices

  • Dwelling Kits: Quick checks for lead, pH, or micro organism.
  • Licensed Labs: Deep dives with official outcomes.
  • Metropolis Companies: Usually free or low cost testing.

For large worries, stick with accredited labs. Within the U.S., the EPA’s Protected Consuming Water Hotline or state lab lists can level you to professionals.

The right way to Know Your Water’s Protected: A Step-by-Step Information

Testing is the first step—figuring out what the outcomes imply is step two. Right here’s methods to affirm your water’s good to drink:

  1. Know Your Supply
    • Metropolis water: Seize your utility’s annual Shopper Confidence Report (CCR).
    • Effectively water: Take a look at yearly for micro organism and metals—it’s on you.
    • Rain or rivers: Filter it, disinfect it, take a look at usually.
  2. Spot the Indicators
    • Metallic style? May very well be lead.
    • Rotten egg whiff? Sulfur micro organism.
    • Cloudy look? Germs or dust.
      Nonetheless, seems to be can lie—take a look at to make sure.
  3. Attempt a Dwelling Equipment
    • Checks fundamentals like chlorine or hardness quick.
    • Tip: Choose NSF-certified ones.
  4. Go Professional with a Lab
    • Assessments for all the things: germs, metals, chemical compounds.
    • Follows strict security guidelines.
  5. Decode the Numbers
    • Examine to EPA or WHO limits.
    • Labs usually clarify if you happen to’re within the clear.
  6. Filter If Wanted
    • Reverse Osmosis for metals.
    • Carbon for style.
    • UV for germs.
    • Search for NSF/ANSI labels.
  7. Retest After Huge Adjustments
    • New pipes? Floods? Take a look at once more.
  8. Keep within the Loop
    • Join native alerts or EWG water updates.

The Challenges—and Future—of Protected Water

We’ve come far, however hurdles stay:

  • Huge Points: Poor nations lack funds or specialists; local weather change dirties groundwater; cities outgrow outdated techniques.
  • Brilliant Spots: AI filters, predictive tech, and world teamwork may flip the tide.

Water evaluation will preserve driving progress towards clear water for all.

Key Takeaways

  • Water evaluation spots invisible risks in your glass.
  • Even “protected” water can disguise dangers from pipes or air pollution.
  • Science can shut the hole between world haves and have-nots.
  • Testing offers you energy—use it.

FAQs About Consuming Water Security

  1. How usually ought to I take a look at my water?
    Wells: yearly. Metropolis water: each couple of years at house, although utilities take a look at continuously.
  2. What’s the worst water contaminant?
    Pathogens like E. coli and arsenic prime the listing for injury and attain.
  3. Is bottled water at all times protected?
    Not fairly—some have microplastics or odd mineral ranges. Verify certifications.
  4. Are house take a look at kits legit?
    Good for a primary look, however labs are the gold customary.
  5. How do I learn take a look at outcomes?
    Ask your native well being people or use lab summaries—they’ll spell it out.

Conclusion: Take Management of Your Water Security

So, is your water actually protected? You received’t know till you take a look at it. From industrial crops to your kitchen faucet, water evaluation is the important thing to a safer future. Clear ingesting water isn’t only a luxurious—it’s a proper value preventing for, whether or not you’re in a skyscraper or a rural hut. Water evaluation offers us the details to guard ourselves, name out polluters, and construct a more healthy tomorrow.

Meta: Uncover how water evaluation reveals hidden risks in world ingesting water. Study what it assessments, why it issues, and the way to make sure your water is protected.

ios – Why would not symbolicatecrash present the precise line and performance title in SwiftUI app crash logs even with right dSYM?


I am testing crash reporting in a SwiftUI app utilizing PLCrashReporter.
After a crash, I export the .crash report and symbolicate it manually with:

export DEVELOPER_DIR=/Functions/Xcode.app/Contents/Developer
/Functions/Xcode.app/Contents/SharedFrameworks/DVTFoundation.framework/Variations/A/Assets/symbolicatecrash intelcr.crash ExampleCrashReport.app.dSYM
  • I am 100% positive the UUID of the dSYM matches the crash report;

intelcr.crash File; (BEFORE SYMBOLICATE)

Incident Identifier: 2B9B2CBB-1CFF-400F-9E6E-56A1176CA3D0
{Hardware} Mannequin:      iPhone11,8
Course of:         ExampleCrashRepo [11608]
Path:            /non-public/var/containers/Bundle/Utility/64D58F25-721B-45F9-8628-69861D9C6AFA/ExampleCrashReport.app/ExampleCrashReport
Identifier:      com.initialcode.ExampleCrashReportIntel
Model:         1.0 (1)
Code Sort:       ARM-64
Mother or father Course of:   [1]

Date/Time:       2025-03-26 09:11:52 +0000
OS Model:      iPhone OS 15.3.1 (19D52)
Report Model:  104

Exception Sort:  SIGSEGV
Exception Codes: SEGV_MAPERR at 0xbffb33333333332d
Crashed Thread:  0

Thread 0 Crashed:
0   libswiftCore.dylib                  0x00000001862abe94  + 8
1   libswiftCore.dylib                  0x0000000186286a48 swift_arrayDestroy + 132
2   libswiftCore.dylib                  0x0000000185fa3548 $ss23_ContiguousArrayStorageCfD + 96
...
...

Binary Photographs:
       0x104d2c000 -        0x104d63fff +ExampleCrashReport arm64   /non-public/var/containers/Bundle/Utility/64D58F25-721B-45F9-8628-69861D9C6AFA/ExampleCrashReport.app/ExampleCrashReport
       0x1074f0000 -        0x1074fbfff  libobjc-trampolines.dylib arm64e  <58c8b0fa678c3facb062bf94644e78c7> /usr/lib/libobjc-trampolines.dylib
...
...

DSYM UUID:

UUID: C740ADC8-3B47-3671-ADA6-46CC6264249E (arm64) ExampleCrashReport.app.dSYM/Contents/Assets/DWARF/ExampleCrashReport

Regardless of all that, the output nonetheless exhibits one thing like this: (AFTER SYMBOLICATE)

Incident Identifier: 2B9B2CBB-1CFF-400F-9E6E-56A1176CA3D0
{Hardware} Mannequin:      iPhone11,8
Course of:         ExampleCrashRepo [11608]
Path:            /non-public/var/containers/Bundle/Utility/64D58F25-721B-45F9-8628-69861D9C6AFA/ExampleCrashReport.app/ExampleCrashReport
Identifier:      com.initialcode.ExampleCrashReportIntel
Model:         1.0 (1)
Code Sort:       ARM-64
Mother or father Course of:   [1]

Date/Time:       2025-03-26 09:11:52 +0000
OS Model:      iPhone OS 15.3.1 (19D52)
Report Model:  104

Exception Sort:  SIGSEGV
Exception Codes: SEGV_MAPERR at 0xbffb33333333332d
Crashed Thread:  0

Thread 0 Crashed:
0   libswiftCore.dylib                  0x00000001862abe94 swift::metadataimpl::ValueWitnesses<:metadataimpl::opaqueexistentialbox>>::destroy+ 8 (swift::OpaqueValue*, swift::TargetMetadata<:inprocess> const*) + 8
1   libswiftCore.dylib                  0x0000000186286a48 swift_arrayDestroy + 132
2   libswiftCore.dylib                  0x0000000185fa3548 $ss23_ContiguousArrayStorageCfD + 96
3   libswiftCore.dylib                  0x0000000186293cb4 _swift_release_dealloc + 56
4   ExampleCrashReport                  0x0000000104d36b48 _mh_execute_header + 43848
...
...

The output it ought to present ought to really be the road when the Crash – 2 button is clicked within the ContentView class;

import SwiftUI

struct ContentView: View {
    @State non-public var exportedCrashURL: URL?
        @State non-public var isSharePresented = false

        var physique: some View {
            VStack(spacing: 20) {
                Picture(systemName: "globe")
                    .imageScale(.massive)
                    .foregroundColor(.accentColor)

                Textual content("ExampleCrashApp")

                Button("Crash") {
                    take a look at().getStartedButtonClicked()
                }
                .padding()
                .background(Colour.purple)
                .foregroundColor(.white)
                .cornerRadius(8)
                
                
                Button("Crash - 2") {
                    let non-obligatory: String? = nil
                    print(non-obligatory!)
                }
                .padding()
                .background(Colour.purple)
                .foregroundColor(.white)
                .cornerRadius(8)

                Button("Share CrashReport With PLCrashReporter") {
                    CrashTracker.shared.exportCrashReportToDisk { url in
                        if let url = url {
                            CrashShareManager.shareCrashFile(at: url)
                        } else {
                            print("Crash report not discovered.")
                        }
                    }
                }
                .padding()
                .background(Colour.blue)
                .foregroundColor(.white)
                .cornerRadius(8)
            }
        }
   }


struct ContentView_Previews: PreviewProvider {
    static var previews: some View {
        ContentView()
    }
}
class take a look at {
    @inline(by no means)
    @objc func getStartedButtonClicked() {
        let numbers = [0]
        let _ = numbers[1]
    }
}

I’ve an older and larger venture in Xcode. Once more, I create crash experiences utilizing the PLCrashReporter library and there’s no downside with the symbolicate operations in that app.

Nevertheless, once I create a brand new demo app with virtually the identical settings, I can’t observe the tactic names and line numbers within the symbolicate output.

Deployment Settings;
(This is identical app settings that offers correct crash output, if there was an issue with these settings, I believe there could be an issue with my different app.)

ios app deployment settings

After I attempt the next command after asking the query, I get the right output, however I nonetheless want it to mechanically symbolize instantly with the symbolicate command as a substitute of specifying the deal with manually like this;

atos -o ExampleCrashReport.app.dSYM/Contents/Assets/DWARF/ExampleCrashReport -l 0x104d2c000 0x0000000104d36b48

Output;

closure #2 in closure #1 in ContentView.physique.getter (in ExampleCrashReport) (ContentView.swift:45)

Any ideas or lacking steps?

App Retailer Safety Myths: Why Enterprises Can’t Solely Depend on Apple and Google for Safety Opinions


When enterprise mobility managers, end-user computing (EUC) managers and IT safety groups consider third-party cell app danger for enterprise use, a typical false impression arises: If an app is on the market within the Apple App Retailer or Google Play Retailer, it have to be safe and freed from privateness dangers. The fact is that Apple and Google app opinions primarily give attention to catching malware, not cell software safety and privateness points. 

Whereas Apple and Google each implement rigorous app assessment processes to forestall malware and coverage violations, their vetting primarily focuses on making certain compliance with content material insurance policies and blocking overtly malicious software program — not on conducting in-depth cell software safety testing. Do you count on Apple and Google to do the practical testing of all cell apps within the App Retailer? After all not, so why would they be anticipated to carry out safety testing, which requires app authentication and navigation just like practical testing? Finish-user computing teams maintain accountability for creating and sustaining a safe cell workforce by making certain third-party cell apps are protected for enterprise use of their organizations. 

To guard delicate enterprise information, cut back compliance danger and safe worker mobility, organizations should implement third-party cell app danger assessments as a part of their cell machine administration (MDM) and enterprise mobility administration (EMM) methods.

Actual-World Third-Social gathering Cell App Threat

Every year regardless of the numerous efforts of Apple and Google, many cell apps with safety and privateness points land within the App Retailer and Google Play Retailer. Listed here are a couple of examples.

How Apple and Google Vet Apps for Safety & Privateness

Apple and Google scrutinize the apps builders search to publish of their respective app shops. They take these measures to guard their manufacturers, safeguard cell ecosystems and respect person privateness. Each block hundreds of thousands of low-quality or dangerous apps which have malicious web or include objectionable content material resembling violence, hate speech or baby endangerment.

Apple App Retailer Evaluate Course of

Apple employs a mixture of automated scanning and human assessment to make sure apps and updates adjust to its pointers:

  • Automated malware scanning detects identified threats earlier than apps are accepted
  • Human opinions test app descriptions for accuracy to counter frequent scams
  • Guide checks assess whether or not an app unnecessarily requests entry to delicate person information and intently scrutinize apps focused at youngsters for compliance with information assortment and security guidelines
  • Reliable, centralized person opinions assist floor points and cut back deception
  • Privateness coverage enforcement requires builders to disclose information assortment and utilization practices through self attested Privateness Diet Labels 
  • Ongoing monitoring leads to swift elimination of apps discovered to include malicious parts post-approval.

Apple’s safety framework emphasizes stopping dangerous apps from reaching customers and making certain compliance with privateness requirements. In accordance with the 2023 App Retailer Transparency Report, Apple rejected 1.76 million app submissions that yr. Greater than 103,000 have been rejected for security causes.


The fact is the Apple Retailer and Google Play can not assure {that a} cell app is completely safe or free from privateness dangers.

Google Play Retailer Evaluate Course of

Google Play additionally makes use of a mixture of automation and human oversight to implement its app safety insurance policies:

  • Google Play Shield repeatedly scans put in apps for malware
  • Machine studying evaluation identifies doubtlessly dangerous purposes earlier than they attain customers
  • Developer identification verification prevents fraudulent submissions
  • Testing necessities for private developer accounts intention to enhance app high quality
  • Privateness coverage requires builders to supply this data each inside the app and within the Google Play itemizing 
  • Knowledge Security part requires builders to precisely disclose how they gather, retailer and share person information
  • Non-compulsory App Protection Alliance Cell Software Safety Evaluation (ADA MASA) unbiased safety opinions confirm {that a} cell app meets OWASP {industry} requirements for safety and privateness.

In 2024 alone, Google blocked 2.36 million policy-violating apps from being revealed.

App Retailer Safety Myths: Why Enterprises Can’t Solely Depend on Apple and Google for Safety Opinions

What App Retailer Opinions Miss

Whereas Apple and Google give attention to blocking dangerous and misleading apps, their opinions don’t function complete cell app safety audits. They don’t carry out deep safety testing or penetration testing on particular person apps — and points like information leakage usually received’t floor when scanning for identified vulnerabilities. In reality, each Apple and Google suggest unbiased software safety testing of cell apps. 

Vulnerabilities nonetheless floor in accepted apps on account of points resembling insecure information storage, API misconfigurations and third-party SDK dangers. As well as, cell app builders could present inaccurate privateness data

Some key areas of concern embrace:

  • Zero-day vulnerabilities that attackers can exploit after an app is revealed
  • Enterprise logic flaws that may enable unauthorized entry or privilege escalation
  • Third-party SDK vulnerabilities that introduce safety gaps builders will not be conscious of
  • Hardcoded secrets and techniques or uncovered API keys that might result in information breaches
  • Covert monitoring, fingerprinting and darkish patterns that won’t explicitly violate app retailer insurance policies however pose privateness issues.

Is It Protected to Use Public App Retailer Apps for Enterprise?

The fact is the Apple Retailer and Google Play can not assure {that a} cell app is completely safe or free from privateness dangers. “Although App Retailer safety measures alone can by no means be good, as a part of a defense-in-depth technique for platform safety they contribute to creating widespread assaults in opposition to iOS, iPadOS, and visionOS customers impractical and uneconomical for financially-driven attackers,” states Apple.

What’s extra, enterprises working within the European Union (EU) don’t have the identical stage of public app retailer protections on account of necessities of the EU Digital Markets Act (DMA). The DMA permits third-party app shops and sideloading of cell apps which can introduce higher safety and privateness dangers.

Why Enterprises Want Third-Social gathering Cell App Threat Assessments

To successfully handle cell danger throughout company gadgets, enterprise mobility managers and end-user computing leads shouldn’t rely solely on app retailer opinions. As an alternative, they need to conduct third-party cell app danger assessments to judge cell apps earlier than permitting workers to place delicate firm data in them.

A strong third-party cell software danger administration evaluation program ought to embrace:

  • Steady automated cell software safety testing for safety and privateness dangers
  • Adoption of industry-based requirements resembling OWASP MASVS 
  • Cell app governance that defines acceptable use and danger insurance policies
  • Proof of safety testing and controls for compliance functions.

Consider Third-Social gathering Cell Apps for Enterprise

Though Apple and Google play a crucial function in sustaining a safe cell app ecosystem, the accountability for making certain solely protected apps are allowed through a cell app danger administration program finally falls on the group as a result of it owns the results of a breach. 

Conducting third-party cell app danger assessments with an automatic answer resembling NowSecure Cell App Threat Intelligence (MARI) allows IT safety groups, end-user computing execs and enterprise mobility managers to confidently conduct cell app vetting earlier than deployment and keep safety because the apps are up to date. It’s straightforward to do and integrates into present third-party danger packages.

Schedule a demo at this time to see the best way to proactively shield your group from dangerous third-party Android and iOS apps. 



Stopping Knowledge Breaches, Privilege Misuse, and Extra

0


Stopping Knowledge Breaches, Privilege Misuse, and Extra

When folks consider cybersecurity threats, they typically image exterior hackers breaking into networks. Nonetheless, a few of the most damaging breaches stem from inside organizations. Whether or not by way of negligence or malicious intent, insiders can expose your group to vital cybersecurity dangers.

Based on Verizon’s 2024 Knowledge Breach Investigations Report, 57% of corporations expertise over 20 insider-related safety incidents a yr, with human error concerned in 68% of information breaches. With that, insider assaults end result within the highest prices, averaging USD 4.99 million per assault, as per the 2024 Price of a Knowledge Breach Report by IBM Safety.

What are insider threats?

An insider menace originates from inside a corporation – it is the potential for anybody with approved entry to your vital techniques to misuse their entry, harming your group. The worst half is that insiders are already inside your IT perimeter and are acquainted with your inner safety protocols, which makes their illicit exercise more durable to detect.

AM Mitigates Insider Threats

Insider threats fall into three major classes:

  • Malicious insiders – staff or contractors deliberately abusing their entry for monetary acquire, sabotage, IP theft, or espionage.
  • Negligent insiders – careless staff mishandling credentials, sharing passwords, or violating cybersecurity insurance policies.
  • Compromised insiders – reputable customers who’ve been outsmarted by an exterior attacker.

The results of insider threats vary from monetary losses and reputational injury to extreme penalties for non-compliance with vital cybersecurity legal guidelines, laws, and requirements like GDPR, NIS2, or HIPAA.

AM Mitigates Insider Threats

What makes insider threats particularly harmful is the extent of entry sure customers have inside a corporation. Not all accounts are made equal — privileged accounts, particularly, pose an elevated threat.

For instance, in December 2024, an insider menace incident occurred inside the U.S. Treasury Division when members of Elon Musk’s Division of Authorities Effectivity (DOGE) group had been mistakenly granted elevated entry to vital cost techniques. The DOGE group had the power to learn and modify delicate system codes, which may result in critical penalties for the U.S. Treasury Division and its shoppers.

This example underscores the need for sturdy Privileged Entry Administration (PAM) options to forestall unauthorized entry and potential system compromises.

Why privileged accounts grow to be a legal responsibility

Accounts with elevated permissions are among the many most desired targets for each insiders and exterior attackers. These accounts typically have entry to delicate techniques, enabling customers to change configurations and work together with vital information. When mismanaged, they’ll result in privilege escalation, information exfiltration, operational disruptions, and different safety incidents.

By implementing PAM greatest practices and utilizing devoted options, organizations can significantly scale back their assault floor and reduce the chance of insider-driven breaches.

Discover PAM’s transformative affect on companies within the white paper The Cyber Guardian: PAM’s Function in Shaping Management Agendas for 2025 by a cybersecurity skilled and former Gartner lead analyst Jonathan Care.

AM Mitigates Insider Threats

How PAM helps mitigate insider threats

Privileged entry administration options empower organizations to manage, monitor, and safe privileged entry successfully. Here is how PAM helps neutralize insider dangers:

1. Figuring out and managing privileged accounts

A typical problem for organizations is the dearth of visibility into current privileged accounts, which creates safety blind spots. Should you’re not conscious of some privileged accounts inside your setting, you’ll be able to’t safe them.

Superior PAM options assist automate privileged account discovery, figuring out hidden and orphaned accounts inside your setting. By repeatedly scanning and onboarding unmanaged privileged accounts, you’ll be able to considerably scale back neglected entry factors that could possibly be exploited by dangerous actors.

2. Supporting the precept of least privilege

One of many core tenets of PAM is the precept of least privilege (PoLP), which ensures that staff, contractors, or service accounts are solely granted entry they require to carry out their duties. PoLP ensures that no single consumer has unrestricted, standing privileges, which drastically reduces the chance of privilege misuse.

PAM options assist implement PoLP by permitting safety groups to dynamically modify entry primarily based on customers’ roles and obligations.

AM Mitigates Insider Threats

3. Implementing just-in-time PAM

Persistent privileged entry will increase the assault floor. For instance, a developer engaged on a vital replace may have short-term entry to your manufacturing servers. Nonetheless, when you depart their elevated permissions in place after the replace is full, this will create an pointless safety threat. Sooner or later, attackers can exploit these privileges to achieve unauthorized entry and transfer laterally inside your community.

PAM options like Syteca allow you to grant on-demand privileged entry for particular duties and revoke elevated entry upon their completion.

4. Imposing identity-first strategy

Based on Gartner’s Id and Entry Administration Primer for 2025 (subscription required), an identity-first strategy is important for contemporary organizational safety. Adopting this strategy means shifting from static community safety measures to steady adaptive belief and nil belief approaches that guarantee consumer identities are verified and approved earlier than accessing delicate techniques.

AM Mitigates Insider Threats

By making use of multi-factor authentication to each entry level, organizations can reduce unauthorized entry and lateral motion throughout their techniques.

5. Defending distant entry

As distant work and third-party collaborations have grow to be important, making certain safe entry to your delicate techniques for exterior customers is important. PAM options will help you confirm consumer identities and grant distant customers time-limited, task-specific entry to your techniques.

This degree of management will help you make sure that your vital techniques stay protected even when accessed from exterior your company community, from various places.

6. Securing credentials with vaulting and rotation

Easy, reused, or improperly saved passwords stay a significant weak hyperlink for a lot of organizations. PAM options can safe privileged credentials by storing them in an encrypted vault and routinely updating passwords, making compromised passwords ineffective over time.

Centralized password administration not solely enhances safety but additionally saves time for IT groups by eliminating handbook password resets and decreasing password-related service requests.

7. Monitoring privileged exercise

With out correct oversight of privileged consumer classes, organizations can fail to detect early indicators of insider threats, leading to information breaches which are onerous and expensive to remediate.

PAM options with consumer exercise monitoring (UAM) capabilities allow safety groups to supervise all interactions with vital techniques in actual time and, thus, spot occasions that might signify an insider menace. Complete cybersecurity platforms like Syteca can flag potential insider threats by sending real-time notifications to safety groups.

8. Automating insider menace response

With the automation offered by PAM options, organizations considerably scale back the time to detect and reply to insider threats, minimizing potential monetary, operational, and reputational injury.

As an example, Syteca not solely sends real-time alerts on irregular consumer exercise but additionally routinely blocks suspicious customers, warns them with a message, and blocks unapproved USB units.

Past insider threats: The opposite advantages of PAM

Whereas mitigating insider threats is a compelling purpose to undertake PAM options, the benefits lengthen far past insider menace administration.

  • Enhancing operational effectivity. Automating entry administration with PAM instruments reduces handbook interventions and streamlines IT operations. Automation quickens the provisioning and de-provisioning of entry rights, reduces administrative overhead, and minimizes human errors. Consequently, IT groups can concentrate on strategic initiatives slightly than routine duties.​
  • Streamlining regulatory compliance. Many organizations should adhere to cybersecurity laws that require strict entry controls and thorough audits. PAM options streamline compliance by offering detailed logs of privileged account actions, simplifying the auditing course of, and making certain adherence to requirements, legal guidelines, and laws such because the GDPR, PCI DSS, and NIS2.
  • Boosting worker productiveness. With automated password administration, safe password sharing between groups, and single sign-on options, many PAM options reduce the time staff spend coping with entry points. This effectivity results in elevated productiveness, as customers can entry needed techniques promptly with out compromising safety.​

General, implementing a strong PAM resolution not solely fortifies your group’s safety in opposition to insider threats but additionally delivers a mess of advantages that drive operational effectivity, regulatory compliance, and productiveness progress. By embracing PAM, you are investing in a safe, environment friendly, and resilient future on your group.

Syteca: Highly effective, versatile, and cost-effective PAM

Syteca is a complete cybersecurity platform that gives a holistic strategy to insider menace prevention. It affords sturdy privileged entry administration, superior consumer exercise monitoring, seamless SIEM integration, and help for a number of platforms. With a versatile licensing scheme, Syteca helps organizations of any measurement management who interacts with their vital information, making certain the appropriate folks have the appropriate permissions on the proper time.

AM Mitigates Insider Threats

Contact us to ebook a demo or request a free trial and see how Syteca can meet your particular cybersecurity wants.

In regards to the creator: Ani Khachatryan, Syteca’s Chief Expertise Officer, began her journey in Syteca as a check supervisor. On this position, she efficiently renovated the testing processes and helped combine improvement greatest practices throughout the corporate. Her sturdy background in testing and striving for perfection helps Ani give you unconventional options to technical and operational points, whereas her deep experience in cybersecurity establishes her as an skilled within the business.

Discovered this text attention-grabbing? This text is a contributed piece from considered one of our valued companions. Observe us on Twitter and LinkedIn to learn extra unique content material we put up.