By EditorDavid from Slashdot's zero-downtime department
In 1993 a Stratus server was booted up by an IT application architect -- and it's still running.
An anonymous reader writes:
"It never shut down on its own because of a fault it couldn't handle," says Phil Hogan, who's maintained the server for 24 years. That's what happens when you include redundant components. "Over the years, disk drives, power supplies and some other components have been replaced but Hogan estimates that close to 80% of the system is original," according to Computerworld.
There's no service contract -- he maintains the server with third-party vendors rather than going back to the manufacturer, who says they "probably" still have the parts in stock. And while he believes the server's proprietary operating system hasn't been updated in 15 years, Hogan says "It's been extremely stable."
The server will finally be retired in April, and while the manufacturer says there's some more Stratus servers that have been running for at least 20 years -- this one seems to be the oldest.Read Replies (0)
By EditorDavid from Slashdot's who-do-you-sue department
Here's the problem. "You could download Comma.ai's new open-source Python code from Github, grab the necessary hardware, and follow the company's instructions to add semi-autonomous capabilities to specific Acura and Honda model cars (with more vehicles to follow)," writes IEEE Spectrum. But then who's legally responsible if there's an accident?
Long-time Slashdot reader Registered Coward v2 writes:
While many legal experts agree OSS is "buyer beware" and that Comma.ai and its CEO Georg Hotz would not be liable, it's a gray area in the law. The software is release under the MIT OSS license and the Read Me contains the disclaimer "This is alpha-quality software for research purposes only... You are responsible for complying with local laws and regulatons." The U.S. Supreme Court, in a series of court cases in the 1990s, ruled open source code as free speech protected under the First Amendment of the U.S. Constitution.
The question is does that release the author(s) from liability. The EU has no EU wide rules on liability in such cases. One open question is even if the person who used the software could not sue, a third party injured by it might be able to since they are not a party to the license agreement.
An EFF attorney told HotHardware "Prosecutors and plaintiffs often urge courts to disregard traditional First Amendment protections in the case of software." But not everyone agrees. "Most legal experts that spoke with IEEE Spectrum -- and Hotz himself -- believe that if you use the company's code and something goes wrong, then it isn't liable for damages. You are."Read Replies (0)
By EditorDavid from Slashdot's crimes-against-crimefighters department
"Police in Cockrell Hill, Texas admitted Wednesday in a press release that they lost years worth of evidence after the department's server was infected with ransomware," reports BleepingComputer. "Lost evidence includes all body camera video, some in-car video, some in-house surveillance video, some photographs, and all Microsoft Office documents." An anonymous reader writes:
Most of the data was from solved cases, but some of the evidence was from active investigations. The infection appears to be from the Locky ransomware family, one of the most active today, and took root last December, after an employee opened a document he received via via a spam email. The police department backup system apparently kicked in right after the infection took root, and created copies of the already encrypted data. The department did not pay the $4,000 ransom demand and decided to wipe all its systems.Read Replies (0)
By EditorDavid from Slashdot's energy-employment department
Solar energy now accounts for 43% of the workers in the U.S. power-generating industry, surpassing the 22% from all workers in the coal, oil, and gas industries combined, according to new figures from the Department of Energy. Slashdot reader Lucas123 writes:
In 2016, the solar workforce in the U.S. increased by 25% to 374,000 employees, compared to 187,117 electrical generation jobs in the coal, gas and oil industries... [N]et power generation from coal sources declined by 53% between 2006 and September 2016; electricity generation from natural gas increased by 33%; and solar grew by over 5,000% -- from 508,000 megawatt hours (MWh) to just over 28 million MWh.
Solar industry created jobs at a rate 20 times faster than the national average, according to the Energy Department, while 102,000 more workers also joined the wind turbine industry last year, a 32% increase. In fact, 93% of the new power in America is now coming from solar, natural gas, and wind -- but it's building out new solar-generating capacity that's causing much of the workforce increases, according to the Energy Department. "The majority of U.S. electrical generation continues to come from fossil fuels," their report points out, adding that the latest projections show that will still be true in the year 2040.Read Replies (0)
By EditorDavid from Slashdot's choosing-chapter-11 department
Friday Avaya's Corporate Treasurer explained why they're filing for a chapter 11 "restructuring." After examining their debt, "we decided it was a critical next step in our transformation from a hardware company to a software and services company and the best path forward for our customers, partners and employees."
ZDNet breaks down the deal... "Avaya noted that its foreign affiliates aren't included in the filing and will operate as normal. Avaya said the $725 million in debtor-in-possession financing, via Citibank, is enough to minimize disruption and continue business operations." Not surprising, Avaya has canceled the planned IPO.
PC World reports that Avaya "emerged from Lucent Technologies in 2000 with a focus on phone switches, enterprise networking gear, and call-center systems. But with the shift toward mobile phones and cloud-based tools for communication, and a tight market for enterprise network equipment, the company has been changing its focus... Like much of the networking and collaboration industry, Avaya is looking toward software-defined networking, IoT, and cloud-based platforms that work on many different devices and the web."Read Replies (0)
By EditorDavid from Slashdot's found-you-on-Facebook department
An anonymous reader writes:
Last week a security consultant remotely logged into his stolen laptop, and gathered clues from a Facebook profile. Though it didn't provide the suspect's real name, the consultant shared the profile online, and says he's now receiving tips from other crime victims who are scouring through the profile's friends list. And according to a local newspaper, the Canadian police say they've now identified a suspect, although "there is a lot of work that needs to be done before we can lay charges." But despite this apparent victory, one officer is also warning the public against sharing a suspect's identity on social media, according to the paper, "after the social media post may have wrongly identified a suspect."
"When you get to public shaming, I urge caution..." the police officer tells the newspaper. "As a person that gets stuff stolen, I understand the want to publicly shame someone... Give us all the info, and we will follow up once we have the evidence."Read Replies (0)
By BeauHD from Slashdot's held-for-ransom department
Orome1 quotes a report from Help Net Security: A single SMS can force Samsung Galaxy devices into a crash and reboot loop, and leave the owner with no other option than to reset it to factory settings and lose all data stored on it. This is because there are certain bugs in older Samsung Galaxy phones and tablets that can be triggered via SMS, and used by attackers to force maliciously crafted configuration messages onto the users' device. The bugs allow these types of messages to be executed without user interaction. As the ContextIS researchers who discovered the vulnerabilities explained, this avenue of attack can be abused by crooks to hold users' devices for ransom. "First a ransom note is sent, if ignored then the malicious configuration message can be sent," they noted. If the victim pays up, a configuration message can later be sent to stop the rebooting. The vulnerabilities in question, CVE-2016-7988 and CVE-2016-7989, can be triggered through SMS on the S4, S4 Mini, S5 and Note 4, but not on newer Samsung devices. "It's worth noting that although newer phones such as the S6 and S7 aren't affected over the air, [a similar result] could be accomplished by a malicious app abusing CVE-2016-7988," they added. These specific issues are related to modifications Samsung made to to the Android telephony framework and are found in a Samsung-specific application for handling carrier messages. They've since been patched (November 2016).Read Replies (0)
By BeauHD from Slashdot's safety-first department
USB Type-C cables are not all created equally. In fact, some USB Type-C cables fail so badly that they will permanently damage your hardware. Benson Leung, an engineer on Google's Pixel team, discovered early last year that there's even more risk to your electronics when you've got a cheap USB-C cable with an older USB connector on the other end that doesn't properly regulate power draw. In an effort to weed out the bad cables from the good, a company called Satechi has released a "Type-C Power Meter" that makes it easy to tell if your USB-C gadgets are at risk of getting fried, or under-powered, by a sketchy accessory. Gizmodo reports: The simple pass-through adapter connects between a USB-C cable and a USB-C device, providing real-time data about the power draw, in either direction, including details about voltage, amps, and the amount of energy that's been transferred since it was first plugged in. The monitor can let you know if an external battery pack is providing the proper amount of power to a smartphone that it claims to, or if your MacBook or Chromebook is receiving sufficient power from a charging cable connected to its USB-C port to actually charge the battery. What the monitor can't do, however, is protect a device if there's a detected problem in the power flow. It's not a surge protector, nor does it have any built-in alarms or warnings because it has no idea what the power requirements are for whatever device you're using it with. You'll have to make sure you're aware of how much power a device is supposed to be drawing, and confirm that it matches what the Type-C Power Meter is reporting, as soon as you plug it in.Read Replies (0)
By BeauHD from Slashdot's low-tax-haven department
Starting February 5th, Apple will be moving its entire international iTunes business from Luxembourg to its European headquarters in Cork, Ireland, according to a note sent to developers this week. The non-U.S. iTunes business consists of Apple Music and the individual stores for iTunes, iBooks and Apps. Internationally, iTunes is available in over 140 countries, while Apple Music is streaming in roughly 115 territories. Billboard reports: Apple announced its intentions to move its iTunes biz to Ireland in September when it transferred an estimated $9 billion of iTunes assets. At that time it also shuffled all existing developer contracts to Ireland-based Apple Distribution International. Like Luxembourg, Ireland is known for being a low-tax haven for international businesses. Last month, both Apple and Ireland announced they would appeal a record $14 billion tax bill from the European Commission, which earlier found it had been underpaying tax on profits across the European bloc from 2003 to 2014. Apple today is the biggest private employer in Cork, the Irish Republic's second-largest city, with a workforce exceeding 5,500. Economists estimate Apple's Cork operation pumps around $17 billion annually in salaries, tax and investment into the Irish economy.Read Replies (0)
By BeauHD from Slashdot's share-a-common-interest department
An anonymous reader quotes a report from Electrek: Tesla CEO Elon Musk was already on President Trump's Strategic and Policy Forum, but the White House announced today that he will also be joining the administration's new manufacturing council, a private sector group that advises the U.S. secretary of commerce. He headed a meeting on Monday at the White House. Musk was present along with several other industry leaders who are now also formally joining the manufacturing council. CNBC reports: "The group of business leaders includes Tesla Motors CEO Elon Musk and chief executives of large American companies like Ford, Dow Chemical, General Electric, Boeing and Lockheed Martin. Richard Trumka, president of the labor federation AFL-CIO, will also give advice." As we recently reported, while Musk's mission to accelerate the advent of renewable energy might seem at odd with Trump's plan to unlock fossil fuel reserve, but Musk is betting that job creation is more important to the new President than simply satisfying the oil industry. If Trump wants to be the champion of job creation and Tesla shows that renewables create a lot of jobs, then their interests are aligned. Tesla currently employs over 30,000 people, more than 25,000 of which are in the U.S. The company wants to add over 3,000 manufacturing jobs at its factory in Fremont, California, 1,000 at its solar panel factory in Buffalo, New York, and over to 6,500 at the Gigafactory in Nevada.Read Replies (0)
By BeauHD from Slashdot's what-a-surprise department
schwit1 writes: According to one think tank that studies corruption in government, 85% of the world lives under governments that are essentially corrupt. New Atlas reports: "'Corruption' is defined by Transparency International (TI) as 'the abuse of entrusted power for private gain.' Each year since 1995, TI has published a Corruption Perceptions Index that scores the world's nations out of 100 for their public sector honesty and the just-released 2016 report paints the same bleak picture we've been seeing now for two decades except it's getting worse. According to the data, despite the illusion of elected government in half the world's countries, democracy is losing. Only two countries scored 90 out of 100 this year, and just 54 of the 176 countries (30%) assessed in the report scored better than 50. Fifty percent might have constituted a pass in a High School arithmetic test, but for an elected government to be so inept at carrying out the will of the electorate, it is a clear betrayal of the people. The average country score this year is a paltry 43, indicating endemic corruption in a country's public sector is the norm. Even more damning is that more countries declined than improved in this year's results. Our analysis of TI's data shows 85 percent of human beings are governed by regimes that score 50 or less, indicating that the integrity of people in authority across the globe remains sadly lacking." schwit1 notes: "Not surprisingly, the countries at the bottom of the list are almost all Middle Eastern nations, all of whom are the source of most of the world's terrorism and Islamic madness. The few others are those trying to become communist paradises, Venezuela and North Korea." New Atlas also mentions "the latest update of the Economist Intelligence Unit's Democracy Index, released on the same day as the Transparency International report, reflects an almost identical perspective. The EIU Democracy Index measures the state of democracy in 167 countries and the average global score fell from 5.55 out of 10 in 2015 to 5.52 in 2016, with 72 countries recording a lower score versus 38 which showed an improvement. You can register for free and download the EIU report here."Read Replies (0)
By BeauHD from Slashdot's put-a-sock-in-it department
An anonymous reader quotes a report from TechCrunch: Today, Twitter joined the ranks of Yahoo, Cloudflare and Google by announcing it had received two national security letters, one in 2015 and one in 2016. The NSLs came with gag orders that prevented Twitter from telling the public or the targeted users about the government's demands. The FBI recently lifted these gag orders, allowing Twitter to acknowledge the NSLs for the first time. In the newly-published NSLs, the FBI asked Twitter to turn over "the name, address, length of service, and electronic communications transactional records" of two users. Twitter associate general counsel Elizabeth Banker said that the company provided a "very limited set of data" in response to the requests, but did not make clear exactly what kind of data Twitter provided. "Twitter remains unsatisfied with restrictions on our right to speak more freely about national security requests we may receive," Banker wrote in a blog post. "We would like a meaningful opportunity to challenge government restrictions when 'classification' prevents speech on issues of public importance."Read Replies (0)