By EditorDavid from Slashdot's moving-slow-and-breaking-things department
"Equifax executives will forgo their 2017 bonuses," reports CNBC. But according to the New York Post, the company "hasn't lost any significant business customers... Equifax largely does business with banks and other financial institutions -- not with the people they collect information on."
Even though it's facing more than 240 class-action lawsuits, Equifax's revenue actually increased 3.8% from July to September, to a whopping $834.8 million, while their net income for that period was $96.3 million -- which is still more than the $87.5 million that the breach cost them, according to a new article shared by chicksdaddy:
The disclosure, made as part of the company's quarterly filing with the US Securities and Exchange Commission, is the first public disclosure of the direct costs of the incident, which saw the company's stock price plunge by more than 30% and wiped out billions of dollars in value to shareholders. Around $55.5m of the $87.5m in breach-related costs stems from product costs â" mostly credit monitoring services that it is offering to affected individuals. Professional fees added up to another $17.1m for Equifax and consumer support costs totaled $14.9m, the company said. Equifax also said it has spent $27.3 million of pretax expenses stemming from the cost of investigating and remediating the hack to Equifax's internal network as well as legal and other professional expenses.
< article continued at Slashdot's moving-slow-and-breaking-things department
>Read Replies (0)
By EditorDavid from Slashdot's legacy-languages department
An anonymous reader writes:
After 35 years of programming in C, Eric S. Raymond believes that we're finally seeing viable alternatives to the language. "We went thirty years -- most of my time in the field -- without any plausible C successor, nor any real vision of what a post-C technology platform for systems programming might look like. Now we have two such visions...and there is another."
"I have a friend working on a language he calls 'Cx' which is C with minimal changes for type safety; the goal of his project is explicitly to produce a code lifter that, with minimal human assistance, can pull up legacy C codebases. I won't name him so he doesn't get stuck in a situation where he might be overpromising, but the approach looks sound to me and I'm trying to get him more funding. So, now I can see three plausible paths out of C. Two years ago I couldn't see any. I repeat: this is huge... Go, or Rust, or Cx -- any way you slice it, C's hold is slipping."
Raymond's essay also includes a fascinating look back at the history of programming languages after 1982, when the major complied languages (FORTRAN, Pascal, and COBOL) "were either confined to legacy code, retreated to single-platform fortresses, or simply ran on inertia under increasing pressure from C around the edges of their domains.
"Then it stayed that way for nearly thirty years."Read Replies (0)
By EditorDavid from Slashdot's you-said-that-last-time department
"FBI officials said Tuesday they have been stymied in their efforts to unlock the cellphone of the man who shot and killed at least 26 people at a church here on Sunday," reports the Houston Chronicle. Slashdot reader Anon E. Muss writes:
The police obtained a search warrant for the phone, but so far they've been unable to unlock it. The phone has been sent to the FBI, in the hope that they can break in... If it is secure, and the FBI can't open it, expect all hell to break loose. The usual idiots (e.g. politicians) will soon be ranting hysterically about the evil tech industry, and how they're refusing to help law enforcement.
FBI special agent Christopher Combs complained to the Chronicle that "law enforcement increasingly cannot get in to these phones."
A law professor at the Georgia Institute of Technology argues there's other sources of information besides a phone, and police officers might recognize this with better training.
As just one example, Apple says the FBI could've simply just used the dead shooter's fingerprint to open his iPhone. But after 48 hours, the iPhone's fingerprint ID stops working.Read Replies (0)
By EditorDavid from Slashdot's undocumented-features department
Slashdot user bongey writes:
A pair of security researchers in Russia are claiming to have compromised the Intel Management Engine just using one of the computer's USB ports. The researchers gained access to a fully functional JTAG connection to Intel CSME via USB DCI. The claim is different from previous USB DCI JTAG examples from earlier this year. Full JTAG access to the ME would allow making permanent hidden changes to the machine.
"Getting into and hijacking the Management Engine means you can take full control of a box," reports the Register, "underneath and out of sight of whatever OS, hypervisor or antivirus is installed."
They add that "This powerful God-mode technology is barely documented," while The Next Web points out that USB ports are "a common attack vector."Read Replies (0)
By EditorDavid from Slashdot's back-to-the-future department
A nonprofit founded in 1906 is now offering a glimpse at 2040, according to an anonymous reader:
The Alliance of American Museums has just published an ambitious Nov/Dec 2040 issue of Museum, the Alliance's magazine. The columns, reviews, articles, awards, and even the ads describe activities from a 2040 perspective, based on a multi-faceted consensus scenario.
Besides virtual reality centers (and carbon-neutral cities), it envisions de-extinction biologists who resurrect lost species. It also predicts a 2040 with orbiting storehouses to preserve historic artifacts (as well as genetic materials) as part of a collaboration with both NASA and a new American military branch called the US Space Corps. And of course, by 2040 musuems have transformed into hybrid institutions like "museum schools" and "well-being and cognitive health centers" that are both run by museums.
It also predicts for-profit museums that have partnered with corporations.Read Replies (0)
By EditorDavid from Slashdot's RoboDoc department
"Robot-assisted surgery costs more time and money than traditional methods, but isn't more effective, for certain types of operations," reports the Register, in an article shared by schwit1:
In a study of almost 24,000 laparoscopic surgeries just published in The Journal of American Medicine, researchers from Stanford University School of Medicine analyzed data from 416 hospitals around the U.S. from 2003 to 2015. Robotic assistance provides 3D-visualization, a broader range of motion for instruments, and better ergonomics for physicians, according to the study. While it has advantages in scenarios where a high-degree of precision is required or where improved outcomes have been demonstrated (like radical prostatectomy), it appears to be a waste of resources for the two operations examined... But the patient outcomes were more or less the same.
A thematically-related economic study presented by the National Bureau for Economic Research on Monday suggests that while AI and machine learning have received substantial investment over the past five years and have been widely touted as a transformative technologies, "there is little sign that they have yet affected aggregate productivity statistics... The simplest possibility is that the optimism about the potential technologies is misplaced and unfounded," muse Erik Brynjolfsson and Daniel Rock (MIT), Chad Syverson (University of Chicago) in the paper.
But instead the paper's author suggest that fully realizing the benefits of AI "will require effort and entrepreneurship to develop the needed complements, and adaptability at the individual, organizational, and societal levels to undertake the associated restructuring."Read Replies (0)
By EditorDavid from Slashdot's magic-and-energy-intensive-internet-money department
Long-time Slashdot reader SlaveToTheGrind quotes Motherboard:
Bitcoin's incredible price run to break over $7,000 this year has sent its overall electricity consumption soaring, as people worldwide bring more energy-hungry computers online to mine the digital currency. An index from cryptocurrency analyst Alex de Vries, aka Digiconomist, estimates that with prices the way they are now, it would be profitable for Bitcoin miners to burn through over 24 terawatt-hours of electricity annually as they compete to solve increasingly difficult cryptographic puzzles to "mine" more Bitcoins. That's about as much as Nigeria, a country of 186 million people, uses in a year.
This averages out to a shocking 215 kilowatt-hours (KWh) of juice used by miners for each Bitcoin transaction (there are currently about 300,000 transactions per day). Since the average American household consumes 901 KWh per month, each Bitcoin transfer represents enough energy to run a comfortable house, and everything in it, for nearly a week.Read Replies (0)
By BeauHD from Slashdot's more-the-merrier department
An anonymous reader quotes a report from Engadget: The Switch, Nintendo's latest hybrid console is doing pretty well for the company, which expects it to outdo the Wii U's lifetime sales within a year. The company obviously thinks so, too, according to a new report at The Wall Street Journal, which says that Nintendo plans to ramp up production of the hardware itself, beginning in April 2018. The report claims that Nintendo is planning to make 25 million to 30 million more units of its successful Switch console over the next fiscal year. Further, Nintendo may plan for even more if this year's holiday sales are strong, according to the WSJ's sources. The company has already built almost 8 million Switches, total, as of its latest earnings report.Read Replies (0)
By BeauHD from Slashdot's icy-hot department
schwit1 shares a report from Newsweek: Researchers at NASA have discovered a huge upwelling of hot rock under Marie Byrd Land, which lies between the Ross Ice Shelf and the Ross Sea, is creating vast lakes and rivers under the ice sheet. The presence of a huge mantle plume could explain why the region is so unstable today, and why it collapsed so quickly at the end of the last Ice Age, 11,000 years ago. Mantle plumes are thought to be part of the plumbing systems that brings hot material up from Earth's interior. Once it gets through the mantle, it spreads out under the crust, providing magma for volcanic eruptions. The area above a plume is known as a hotspot.
[I]n a study published in the Journal of Geophysical Research: Solid Earth, Seroussi and colleagues looked at one of the most well studied magma plumes on Earth -- the Yellowstone hotspot. The team developed a mantle plume model to look at how much geothermal heat would be needed to explain what is seen at Marie Byrd Land. They then used the Ice Sheet System Model (ISSM), which shows the physics of ice sheets, to look at the natural sources of heating and heat transport. This model enabled researchers to place "powerful constraint" on how much melt rate was allowable, meaning they could test out different scenarios of how much heat was being produced deep beneath the ice. Their findings showed that generally, the energy being generated by the mantle plume is no more than 150 milliwatts per square meter -- any more would result in too much melting. The heat generated under Yellowstone National Park, on average, is 200 milliwatts per square meter.Read Replies (0)
By BeauHD from Slashdot's free-for-all department
tedlistens writes from a report via Fast Company: "Facebook routinely shares the sensitive income and employment data of its U.S.-based employees with the Work Number database, owned by Equifax Workforce Solutions," reports Fast Company. "Every week, Facebook provides an electronic data feed of its employees' hourly work and wage information to Equifax Workforce Solutions, formerly known as TALX, a St. Louis-based unit of Equifax, Inc. The Work Number database is managed separately from the Equifax credit bureau database that suffered a breach exposing the data of more than 143 million Americans, but it contains another cache of extensive personal information about Facebook's employees, including their date of birth, social security number, job title, salary, pay raises or decreases, tenure, number of hours worked per week, wages by pay period, healthcare insurance coverage, dental care insurance coverage, and unemployment claim records."
< article continued at Slashdot's free-for-all department
>Read Replies (0)