Ask a Techspert: What’s breaking my text conversations?

Not to brag, but I have a pretty excellent group chat with my friends. We use it to plan trips, to send happy birthdays and, obviously, to share lots and lots of GIFs. It’s the best — until it’s not. We don’t all have the same kind of phones; we’ve got both Android phones and iPhones in the mix. And sometimes, they don’t play well together. Enter “green bubble issues” — things like, missing read receipts and typing indicators, low-res photos and videos, broken group chats…I could go on describing the various potential communication breakdowns, but you probably know what I’m talking about. Instead, I decided to ask Google’s Elmar Weber: What’s the problem with messaging between different phone platforms?

First, can you tell me what you do at Google?

I lead several engineering organizations including the team that builds Google’s Messages app, which is available on most Android phones today.

OK, then you’re the perfect person to talk to! So my first question: When did this start being a problem? I remember wayback when I had my first Android phone, I would text iPhone friends…and it was fine.

Texting has been around for a long time. Basic SMS texting — which is what you’re talking about here — is 30 years old. SMS, which means Short Message Service, was originally only 160 characters. Back then you couldn’t do things like send photos or reactions or read receipts. In fact, mobile phones weren’t made for messaging, they were designed for making phone calls. To send a message you actually had to hit the number buttons to get to the letters that you’d have to spell out. But people started using it a ton, and it sort of exploded. So this global messaging industry took off. MMS (Multimedia Messaging Service) was then introduced in the early 2000s, which let people send photos and videos for the first time. But that came with a lot of limitations too.

Got it. Then the messaging apps all started building their own systems to support modern messaging features like emoji reactions and typing indicators, because SMS/MMS were created long before those things were even dreamed of?

Yes, exactly.

I guess…we need a new SMS?

Well the new SMS is RCS, which stands for Rich Communication Services. It enables things like high-resolution photo and video sharing, read receipts, emoji reactions, better security and privacy with end-to-end encryption and more. Most major carriers support RCS, and Android users have been using it for years.

How long has RCS been around?

Version one of RCS was released December 15, 2008.

Who made it?

RCS isn’t a messaging app like Messages or WhatsApp — it’s an industry-wide standard. Similar to other technical standards (USB, 5G, email), it was developed by a group of different companies. In the case of RCS, it was coordinated by an association of global wireless operators, hardware chip makers and other industry players.

RCS makes messaging better, so if Android phones use this, then why are texts from iPhones still breaking? RCS sounds like an upgrade — so shouldn’t that fix everything?

There’s the hitch! So Android phones use RCS, and iPhones still don’t. iPhones still rely on SMS and MMS for conversations with Android users, which is why your group chats feel so outdated. Think of it like this: If you have two groups of people who use different spoken languages, they can communicate effectively in their respective languages to other people who speak their language, but they can’t talk to each other. And when they try to talk to one another, they have to act out what they're saying, as though they're playing charades. Now think of RCS as a magic translator that helps multiple groups speak fluently — but every group has to use the translator, and if one doesn’t, they’re each going to need to use motions again.

Do you think iPhones will start using RCS too?

I hope so! It’s not just about things like the typing indicators, read receipts or emoji reactions — everyone should be able to pick up their phone and have a secure, modern messaging experience. Anyone who has a phone number should get that, and that’s been lost a little bit because we’re still finding ourselves using outdated messaging systems. But the good news is that RCS could bring that back and connect all smartphone users, and because so many different companies and carriers are working together on it, the future is bright.

Check outAndroid.com/GetTheMessageto learn why now is the time for Apple to fix texting.

From offstage to onstage, my experience of becoming a Google Developer Expert

Written by Shuyu (Asher) Guo, Dart & Flutter GDE, China

At the end of May 2022, after more than a month of Google Developer Expert interviews, I finally became the fourth Flutter & Dart GDE in China.

I believe that the title of GDE should be very familiar for Android or Machine Learning developers. If you’re not familiar, the Google Developer Experts program is a global network of highly experienced technology experts, influencers, and thought leaders who have expertise in Google technologies, and are active leaders in the space and contribute to the wider developer and startup ecosystem.

My journey to becoming a GDE

In 2013, Android Bus was my first exposure to the Android community and it was at the ApkBus conference that I came into contact with the first GDE I’ve ever met. At that conference, I made Android developer friends and I also met some event organizers who invited me to speak at future events.

After the conference, I started my public speaking journey and spoke about Flutter because of the opportunities that came from networking and meeting the right people. By being more active in the community through speaking, I received an invitation to become a GDE in 2020. However, I learned that the application process is conducted in English and because of this, I ultimately didn’t complete the application process.

In 2021, while I was speaking at the Google DevFest conference, a GDE friend asked me again if I was interested in becoming a GDE, and with the encouragement of a team member from Google, I finally started preparing for the GDE application.

Application process

During the application process, the Google team pays careful attention to two aspects:

  1. Technical competence: your technical expertise in the field you are applying for
  2. Technical influence: such as output in areas such as public speaking, articles, and open source

I was not confident in speaking in English so I practiced before my interviews and I also translated some of my articles and posted them to Medium in English. Then I started my interview journey. The first interviewer mainly focused on the technical content of Flutter and Dart and despite my little experience with Flutter, my first community interview was completed.

The day after I completed the initial interview, I received a notification that I was assigned an interviewer for the product interview. The content of the product interview mainly revolved around some of my experience with Flutter technology. The interviewer was interested in the content of the books I had written and some awards I won that happened to be in the bookcase behind me, proving to be an excellent conversation starter. The next day, I received an email letting me know that I passed the interview - and after I signed the various agreements and terms and conditions, I had a final meeting with the team to become a GDE! Once I officially received the confirmation email from the GDE program, I was pulled into various groups, Slack, and projects. As a developer, I consider accomplishing the feat of becoming a GDE a major milestone.

Whether it is the GDE community or a Googler conducting the interviews, everyone was very friendly. I received a lot of support throughout my journey to becoming a GDE and offer my support to anyone interested in joining the community. Please feel free to connect with me at https://github.com/carguo!

Chrome Stable for iOS Update

Hi everyone! We've just released Chrome Stable 104 (104.0.5112.88) for iOS; it'll become available on App Store in the next few hours.

This release includes stability and performance improvements. You can see a full list of the changes in the Git log. If you find a new issue, please let us know by filing a bug.

Harry Souders
Google Chrome

How Hash-Based Safe Browsing Works in Google Chrome

By Rohit Bhatia, Mollie Bates, Google Chrome Security

There are various threats a user faces when browsing the web. Users may be tricked into sharing sensitive information like their passwords with a misleading or fake website, also called phishing. They may also be led into installing malicious software on their machines, called malware, which can collect personal data and also hold it for ransom. Google Chrome, henceforth called Chrome, enables its users to protect themselves from such threats on the internet. When Chrome users browse the web with Safe Browsing protections, Chrome uses the Safe Browsing service from Google to identify and ward off various threats.

Safe Browsing works in different ways depending on the user's preferences. In the most common case, Chrome uses the privacy-conscious Update API (Application Programming Interface) from the Safe Browsing service. This API was developed with user privacy in mind and ensures Google gets as little information about the user's browsing history as possible. If the user has opted-in to "Enhanced Protection" (covered in an earlier post) or "Make Searches and Browsing Better", Chrome shares limited additional data with Safe Browsing only to further improve user protection.

This post describes how Chrome implements the Update API, with appropriate pointers to the technical implementation and details about the privacy-conscious aspects of the Update API. This should be useful for users to understand how Safe Browsing protects them, and for interested developers to browse through and understand the implementation. We will cover the APIs used for Enhanced Protection users in a future post.

Threats on the Internet

When a user navigates to a webpage on the internet, their browser fetches objects hosted on the internet. These objects include the structure of the webpage (HTML), the styling (CSS), dynamic behavior in the browser (Javascript), images, downloads initiated by the navigation, and other webpages embedded in the main webpage. These objects, also called resources, have a web address which is called their URL (Uniform Resource Locator). Further, URLs may redirect to other URLs when being loaded. Each of these URLs can potentially host threats such as phishing websites, malware, unwanted downloads, malicious software, unfair billing practices, and more. Chrome with Safe Browsing checks all URLs, redirects or included resources, to identify such threats and protect users.

Safe Browsing Lists

Safe Browsing provides a list for each threat it protects users against on the internet. A full catalog of lists that are used in Chrome can be found by visiting chrome://safe-browsing/#tab-db-manager on desktop platforms.

A list does not contain unsafe web addresses, also referred to as URLs, in entirety; it would be prohibitively expensive to keep all of them in a device’s limited memory. Instead it maps a URL, which can be very long, through a cryptographic hash function (SHA-256), to a unique fixed size string. This distinct fixed size string, called a hash, allows a list to be stored efficiently in limited memory. The Update API handles URLs only in the form of hashes and is also called hash-based API in this post.

Further, a list does not store hashes in entirety either, as even that would be too memory intensive. Instead, barring a case where data is not shared with Google and the list is small, it contains prefixes of the hashes. We refer to the original hash as a full hash, and a hash prefix as a partial hash.

A list is updated following the Update API’s request frequency section. Chrome also follows a back-off mode in case of an unsuccessful response. These updates happen roughly every 30 minutes, following the minimum wait duration set by the server in the list update response.

For those interested in browsing relevant source code, here’s where to look:

Source Code

  1. GetListInfos() contains all the lists, along with their associated threat types, the platforms they are used on, and their file names on disk.
  2. HashPrefixMap shows how the lists are stored and maintained. They are grouped by the size of prefixes, and appended together to allow quick binary search based lookups.

How is hash-based URL lookup done

As an example of a Safe Browsing list, let's say that we have one for malware, containing partial hashes of URLs known to host malware. These partial hashes are generally 4 bytes long, but for illustrative purposes, we show only 2 bytes.

['036b', '1a02', 'bac8', 'bb90']

Whenever Chrome needs to check the reputation of a resource with the Update API, for example when navigating to a URL, it does not share the raw URL (or any piece of it) with Safe Browsing to perform the lookup. Instead, Chrome uses full hashes of the URL (and some combinations) to look up the partial hashes in the locally maintained Safe Browsing list. Chrome sends only these matched partial hashes to the Safe Browsing service. This ensures that Chrome provides these protections while respecting the user’s privacy. This hash-based lookup happens in three steps in Chrome:

Step 1: Generate URL Combinations and Full Hashes

When Google blocks URLs that host potentially unsafe resources by placing them on a Safe Browsing list, the malicious actor can host the resource on a different URL. A malicious actor can cycle through various subdomains to generate new URLs. Safe Browsing uses host suffixes to identify malicious domains that host malware in their subdomains. Similarly, malicious actors can also cycle through various subpaths to generate new URLs. So Safe Browsing also uses path prefixes to identify websites that host malware at various subpaths. This prevents malicious actors from cycling through subdomains or paths for new malicious URLs, allowing robust and efficient identification of threats.

To incorporate these host suffixes and path prefixes, Chrome first computes the full hashes of the URL and some patterns derived from the URL. Following Safe Browsing API's URLs and Hashing specification, Chrome computes the full hashes of URL combinations by following these steps:

  1. First, Chrome converts the URL into a canonical format, as defined in the specification.
  2. Then, Chrome generates up to 5 host suffixes/variants for the URL.
  3. Then, Chrome generates up to 6 path prefixes/variants for the URL.
  4. Then, for the combined 30 host suffixes and path prefixes combinations, Chrome generates the full hash for each combination.

Source Code

  1. V4LocalDatabaseManager::CheckBrowseURL is an example which performs a hash-based lookup.
  2. V4ProtocolManagerUtil::UrlToFullHashes creates the various URL combinations for a URL, and computes their full hashes.

Example

For instance, let's say that a user is trying to visit https://evil.example.com/blah#frag. The canonical url is https://evil.example.com/blah. The host suffixes to be tried are evil.example.com, and example.com. The path prefixes are / and /blah. The four combined URL combinations are evil.example.com/, evil.example.com/blah, example.com/, and example.com/blah.

url_combinations = ["evil.example.com/", "evil.example.com/blah","example.com/", "example.com/blah"]
full_hashes = ['1a02…28', 'bb90…9f', '7a9e…67', 'bac8…fa']

Step 2: Search Partial Hashes in Local Lists

Chrome then checks the full hashes of the URL combinations against the locally maintained Safe Browsing lists. These lists, which contain partial hashes, do not provide a decisive malicious verdict, but can quickly identify if the URL is considered not malicious. If the full hash of the URL does not match any of the partial hashes from the local lists, the URL is considered safe and Chrome proceeds to load it. This happens for more than 99% of the URLs checked.

Source Code

  1. V4LocalDatabaseManager::GetPrefixMatches gets the matching partial hashes for the full hashes of the URL and its combinations.

Example

Chrome finds that three full hashes 1a02…28, bb90…9f, and bac8…fa match local partial hashes. We note that this is for demonstration purposes, and a match here is rare.

Step 3: Fetch Matching Full Hashes

Next, Chrome sends only the matching partial hash (not the full URL or any particular part of the URL, or even their full hashes), to the Safe Browsing service's fullHashes.find method. In response, it receives the full hashes of all malicious URLs for which the full hash begins with one of the partial hashes sent by Chrome. Chrome checks the fetched full hashes with the generated full hashes of the URL combinations. If any match is found, it identifies the URL with various threats and their severities inferred from the matched full hashes.

Source Code

  1. V4GetHashProtocolManager::GetFullHashes performs the lookup for the full hashes for the matched partial hashes.

Example

Chrome sends the matched partial hashes 1a02, bb90, and bac8 to fetch the full hashes. The server returns full hashes that match these partial hashes, 1a02…28, bb90…ce, and bac8…01. Chrome finds that one of the full hashes matches with the full hash of the URL combination being checked, and identifies the malicious URL as hosting malware.

Conclusion

Safe Browsing protects Chrome users from various malicious threats on the internet. While providing these protections, Chrome faces challenges such as constraints in memory capacity, network bandwidth usage, and a dynamic threat landscape. Chrome is also mindful of the users’ privacy choices, and shares little data with Google.

In a follow up post, we will cover the more advanced protections Chrome provides to its users who have opted in to “Enhanced Protection”.

Office Building support for Working Locations

What’s changing


Now you’re able to select a specific office building as your working location. The office building is taken into account for meeting room suggestions, and helps colleagues better understand where you plan to work from on a given day.


office location



Who’s impacted 

Admins and end users 


Why you’d use it 

Whether you’re suggesting a meeting room to your colleagues or want to know where someone might be working for the day, we hope this update makes planning in-person collaboration easier.


Additional details 

With this new feature, those who manage the calendars of others, such as Executive assistants, will also be able to update the working location of that calendar as long as they have access to make changes and manage sharing.


Getting started 

  • Admins: Working Location must be enabled for your organization in order to access this feature. Additionally, structured office buildings must be set in the admin console. Visit the Help Center to learn more about turning working location on or off for your organization.
  • End users: If enabled by your admin, you can select a structured building by choosing one of the following options:
    • Click on your Calendar schedule right under the date, navigate to the “Working location” tab > “Choose a location” > click the "+" icon > "Another office" > select your office building. 
    • Go to "Working hours & location" in your Calendar settings. Under the working location dropdown > click "Another office" > select your office building.
    • Visit the Help Center to learn more about setting your working hours & location.

Rollout pace 


Availability 

  • Available to Google Workspace Business Standard, Business Plus, Enterprise Standard, Enterprise Plus, Education Fundamentals, Education Plus, and Nonprofits, as well as legacy G Suite Business customers
  • Not available to Google Workspace Essentials, Business Starter, Enterprise Essentials, Frontline customers as well as legacy G Suite Basic customers
  • Not available to users with personal Google Accounts

Resources 

How Google Assistant helped me spend more time outside

Summer is my favorite season, and whenever it comes around, I always try to soak up as much sunshine as I can. But with my schedule, it can be tough to carve out quality outdoor time. So as we hit the end of summer in the U.S., I set a challenge for myself — to get outside every day during the week. And as a member of the Google Assistant team, I knew Assistant could help give me that extra nudge out the door. Here’s how it went.

Monday

After a full day of meetings at the office, I needed to clear my head. Instead of just heading home like I normally would, I asked my Assistant, “Hey Google, what parks are nearby?” It showed a handful of options near me. I ended up heading to Murphey Candler Park, one of my favorites in Atlanta, for a long walk to help me recharge my batteries.

Trees and rocks surround a large, glistening lake.

Murphey Candler Park in Atlanta was one of the nearby park options Assistant shared with me.

Tuesday

I typically work out on Tuesdays, so in the spirit of my outdoor challenge, I decided to go for a swim. To help keep me accountable and on schedule, I told my Assistant, "Hey Google, remind me to go for a swim at 5 p.m." When I got that 5 p.m. nudge, I packed up for the day and headed to the pool at my apartment complex.

A pool with white lounge chairs underneath a brick apartment building.

I took my Tuesday workout to the pool, thanks to a helpful reminder from my Assistant.

Wednesday

During a walk around my neighborhood, I started thinking about my weekend plans. The weather forecast showed that Saturday was going to be particularly beautiful, so I texted my friends to see if they’d be up for a picnic. After we agreed on a place and time, I said to my Assistant “Hey Google, add ‘picnic with friends’ to my calendar for Saturday at 4 p.m.” to make sure it was blocked on my schedule.

Thursday

One of the things I love most about working at Google is celebrating work anniversaries, or what we call “Googleversaries.” My friend Akilah hit her third Googleversary on Thursday, so we headed to the pool after work to celebrate. For an extra treat (and to cool off), we decided to get some ice cream — but we didn’t want to lose our poolside spot. This was the perfect opportunity to try out our new Assistant feature with Uber Eats. With a quick, “Hey Google, order ice cream on Uber Eats,” Assistant opened my Uber Eats app to show us nearby delivery options and let us customize our order. Soon enough, our ice cream was on its way.

A hand holding a pint of cookies and cream ice cream. A flower bush is in the background.

Enjoying our ice cream order from Uber Eats.

Friday

I wanted to start my weekend on the right foot, and my friend Jessica immediately came to mind. She’s an avid hiker and is always looking for someone to explore new trails with. So as I was packing up at the office, I told my Assistant “Hey Google, text Jessica, ‘Let’s go hiking.’” We did a three-mile, scenic hike on the East Palisades Trail — a great way to wrap up the week and my outdoor challenge.

Assistant can help you easily send a text, especially when you have your hands full.

These Google Assistant features made it easy to stick to my goal of getting outside every day, and they’re continuing to help me soak up the rest of the summer. I hope they do the same for you!

Meet the team responsible for hacking Google

Creating safe and secure products for everyone is the top priority for Google's security teams. We work across the globe to keep up with current threats, improve security controls, conduct attack detection/prevention, and eliminate entire classes of vulnerabilities by driving new and better frameworks. Our teams also actively monitor adversaries, making sure we have all the intelligence to be prepared for malicious activity and targeted campaigns against our Googlers or the people who use our services daily.

Today, we would like to shine a spotlight on one security team at Google — the Red Team — that supports all of these efforts in a way that might initially seem counterintuitive: by hacking Google.

The term “Red Team” came from the military, and described activities where a designated team would play an adversarial role (the “Red Team”) against the “home” team, who would seek to adapt to the Red Team’s activities and counteract them. Over the years, these terms have found their way into the information security (InfoSec) space.

Google’s Red Team is a team of hackers that simulate a variety of adversaries, ranging from nation states and well-known Advanced Persistent Threat (APT) groups to hacktivists, individual criminals or even malicious insiders. Whatever actor is simulated, we will mimic their strategies, motives, goals, and even their tools of choice — placing ourselves inside the minds of hackers targeting Google.

The benefits of Red Team exercises

Running these simulations provides value in various ways. To start, it offers our teams tasked with detecting and responding to actual attackers a unique opportunity to identify improvements. And it allows us to determine if an attack could have been detected earlier or responded to faster. Along with security and subject matter experts on rotation, the collective industry experience and diverse backgrounds of the Red Team’s members allow us to identify blind spots that can turn into actionable improvements.

From 20% project to established team

The Red Team started in 2010 as a “20% project” — an internal initiative where Googlers are free to pursue projects we feel are worth investing time in outside of our day-to-day responsibilities. The team quickly proved its worth, and leadership recognized its positive impact on Google’s infrastructure and the value in applying a hacker mindset to problems in the security space. Since then, the Red Team has become an integral part of the security engineering function, running multiple exercises in parallel and collaborating across multiple continents.

Collaborative adversity

While Red Team exercises conducted at Google simulate an actor that is in most cases hostile and/or disruptive, there is a very clear distinction between the simulated threat and the engineers that play their role. While the threat actor seeks to reach their nefarious goals, Red Team engineers are Googlers that keep people’s safety in mind.

There is very close collaboration between the team simulating the attackers and the teams acting as defenders (e.g., Threat Analysis Group (TAG) and Detection/Response teams), who might identify suspicious activities and respond to them. Since there are multiple exercises happening at any given time, we differentiate between several types of exercises and the response after detection. For most exercises, one of our primary goals is to test detection and make it as efficient as possible for defenders to verify that a signal is associated with an exercise. By doing this, we avoid using resources that could be used to thwart malicious activities targeting people using our services or our wider infrastructure. In other exercises, we want to make sure that the entire process of identifying, isolating and ejecting the attackers, works as intended and that we are able to improve processes.

Safety First

Given the sensitive nature of the work the Red Team does, safety protocols are key and all exercises are overseen by senior engineers. Making sure an exercise is conducted in a safe and responsible manner is as important as any other goal the team is trying to achieve. This may mean forgoing realistic simulation in favor of spending more time on making sure each action is documented, no sensitive data is accessed without proper oversight, and that laws and regulations are obeyed — which is traditionally not something that APT groups are overly concerned about. For the Red Team, accurately simulating the technical capabilities of highly advanced threat actors in a safe and responsible way is core to their mission.

For exercises focusing on detection, actions taken by the team are accessible at any time by the defenders to ensure that we can quickly rule out an external actor acting maliciously. Even if this does not become a necessity, the team will report their activities in detail to address any new findings discovered during the exercise.

Fostering change

In addition to testing and helping improve detection and response capabilities, we also actively research and identify new attack vectors based on adversarial research. It is critical to the Red Team's mission to ensure that any newfound attack surface is shared with both the responsible product teams and the larger security team as soon as possible so that Google can adapt defensive controls and implement improvements to remediate the root cause.

Since its inception over a decade ago, the Red Team has adapted to a constantly evolving threat landscape and been a reliable sparring partner for defense teams across Google. Yet, new challenges await every day and the Red Team continually works to make the job – the job of hacking Google – harder. It’s a challenge we happily accept to keep people safe.

Google Workspace Updates Weekly Recap – August 5, 2022

New updates

Unless otherwise indicated, the features below are fully launched or in the process of rolling out (rollouts should take no more than 15 business days to complete), launching to both Rapid and Scheduled Release at the same time (if not, each stage of rollout should take no more than 15 business days to complete), and available to all Google Workspace and G Suite customers. 


Extending grammar features to German 
We’ve expanded our grammar features in Gmail and Docs to include German. This highlights possible grammar errors in your text to help you correct them if German is set as your default language. | Rolling out to Rapid Release and Scheduled Release domains now at a Gradual pace (up to 15 days for feature visibility) | Learn more here and here

Extending grammar features to German


Previous announcements 

The announcements below were published on the Workspace Updates blog earlier this week. Please refer to the original blog posts for complete details.


Seamlessly access popular Education Technology tools directly in Google Classroom 
We’ve made it easier for educators to access popular EdTech tools that work best for their class directly in Google Classroom with a new seamless integration of single sign-on, assigning, and grading. | Available to the Teaching and Learning Upgrade, and Google Workspace for Education Plus customers only. | Learn more

Choose to grade with Canvas SpeedGrader or Google Assignments 
There is now an option to grade with either Google Assignments or Canvas SpeedGrader within Google Assignments for Canvas. | Available to Google Workspace Education Fundamentals, Education Plus, Education Standard, and the Teaching and Learning Upgrade customers only. | Learn more

For a recap of announcements in the past six months, check out What’s new in Google Workspace (recent releases).

Google Workspace Updates Weekly Recap – August 5, 2022

New updates

Unless otherwise indicated, the features below are fully launched or in the process of rolling out (rollouts should take no more than 15 business days to complete), launching to both Rapid and Scheduled Release at the same time (if not, each stage of rollout should take no more than 15 business days to complete), and available to all Google Workspace and G Suite customers. 


Extending grammar features to German 
We’ve expanded our grammar features in Gmail and Docs to include German. This highlights possible grammar errors in your text to help you correct them if German is set as your default language. | Rolling out to Rapid Release and Scheduled Release domains now at a Gradual pace (up to 15 days for feature visibility) | Learn more here and here

Extending grammar features to German


Previous announcements 

The announcements below were published on the Workspace Updates blog earlier this week. Please refer to the original blog posts for complete details.


Seamlessly access popular Education Technology tools directly in Google Classroom 
We’ve made it easier for educators to access popular EdTech tools that work best for their class directly in Google Classroom with a new seamless integration of single sign-on, assigning, and grading. | Available to the Teaching and Learning Upgrade, and Google Workspace for Education Plus customers only. | Learn more

Choose to grade with Canvas SpeedGrader or Google Assignments 
There is now an option to grade with either Google Assignments or Canvas SpeedGrader within Google Assignments for Canvas. | Available to Google Workspace Education Fundamentals, Education Plus, Education Standard, and the Teaching and Learning Upgrade customers only. | Learn more

For a recap of announcements in the past six months, check out What’s new in Google Workspace (recent releases).

Google Workspace Updates Weekly Recap – August 5, 2022

New updates

Unless otherwise indicated, the features below are fully launched or in the process of rolling out (rollouts should take no more than 15 business days to complete), launching to both Rapid and Scheduled Release at the same time (if not, each stage of rollout should take no more than 15 business days to complete), and available to all Google Workspace and G Suite customers. 


Extending grammar features to German 
We’ve expanded our grammar features in Gmail and Docs to include German. This highlights possible grammar errors in your text to help you correct them if German is set as your default language. | Rolling out to Rapid Release and Scheduled Release domains now at a Gradual pace (up to 15 days for feature visibility) | Learn more here and here

Extending grammar features to German


Previous announcements 

The announcements below were published on the Workspace Updates blog earlier this week. Please refer to the original blog posts for complete details.


Seamlessly access popular Education Technology tools directly in Google Classroom 
We’ve made it easier for educators to access popular EdTech tools that work best for their class directly in Google Classroom with a new seamless integration of single sign-on, assigning, and grading. | Available to the Teaching and Learning Upgrade, and Google Workspace for Education Plus customers only. | Learn more

Choose to grade with Canvas SpeedGrader or Google Assignments 
There is now an option to grade with either Google Assignments or Canvas SpeedGrader within Google Assignments for Canvas. | Available to Google Workspace Education Fundamentals, Education Plus, Education Standard, and the Teaching and Learning Upgrade customers only. | Learn more

For a recap of announcements in the past six months, check out What’s new in Google Workspace (recent releases).