Intel

Former Intel CEO Paul Otellini Dies At 66 (engadget.com) 48

An anonymous reader quotes a report from Engadget: Paul Otellini, Intel's previous CEO, died in his sleep on Monday, the company announced this morning. He was 66. Otellini served as Intel's fifth chief executive from 2005 through 2013, and leaves behind a legacy of the company's dominance in x86 processors. Notably, he also worked with Apple as it moved away from PowerPC chips and adopted Intel's wares. After retiring in 2013, Otellini revealed one major regret during his tenure: not working hard enough to get Intel's chips in the iPhone. Consequently, Intel mostly missed on the smartphone revolution.

Otellini joined Intel in 1974 and served various roles throughout his career, including chief operating officer from 2003 to 2005. He would go on to spend almost 40 years at the company. He was an intriguing choice as CEO, since he was the company's first non-engineer to hold that role.

NASA

NASA Images of Puerto Rico Reveal How Maria Wiped Out Power On the Island (jalopnik.com) 180

An anonymous reader quotes a report from Jalopnik: Hurricane Maria was the most devastating hurricane to make land in Puerto Rico in nearly 100 years and the country is still reeling in its wake. Much of the island still doesn't have running water, reliable communication or electricity. Recently, NASA published a set of date-processed photos that show the island's nighttime lights both before and after the storm. Here, you can see images of the country's capital, San Juan, on a typical night before Maria. It's based on cloud-free and low moonlight conditions. Conversely, the following composite image is of data taken on the nights of Sept. 27 and 28 -- nearly a week after the storm hit -- by the Visible Infrared Imaging Radiometer Suite, a scanning radiometer that collects visible and infrared imagery of land, atmosphere, cryosphere and oceans, according to NASA's website.
Businesses

Tesla Badly Misses Model 3 Production Goals (wsj.com) 244

An anonymous reader quotes a report from The Wall Street Journal (Warning: source may be paywalled; alternative source): Tesla badly missed its goal of building 1,500 Model 3 cars in the third quarter, the first sign that the production ramp-up for the new sedan isn't going as smoothly as planned. The Silicon Valley electric-car maker built 260 of the Model 3s between July and September, the company said Monday in a statement. In August, the auto maker predicted it would build more than 1,500 Model 3s before cranking up production to 5,000 a week by the end of the fourth quarter. Tesla blamed "production bottlenecks" for the weaker production. "It is important to emphasize that there are no fundamental issues with the Model 3 production or supply chain," Tesla said in a statement. "We understand what needs to be fixed and we are confident of addressing the manufacturing bottleneck issues in the near-term."
Businesses

Ask Slashdot: Which Businesses Will Go Away In the Next 10 Years? (nbcnews.com) 495

AmiMoJo writes: Ten years ago NBC published a list of business types that it predicted would disappear in the following decade. Ten years later and we can see how good their fortune telling was. What businesses do you think will go away by 2027? Who is destined to become the next buggy whip manufacturer, whose demand dried up due to changing technology and a changing world?

For reference, NBC's list was: Record stores; Camera film manufacturing; Crop dusters; Gay bars; Newspapers; Pay phones; Used bookstores; Piggy banks; Telemarketing; Coin-operated arcades.

Power

General Motors Plans 20 All-Electric Cars By 2023 (bloomberg.com) 135

An anonymous reader quotes a report from Bloomberg: General Motors joined a growing group of automakers promising an emissions-free future for cars by pledging to sell 20 all-electric vehicles by 2023. The largest U.S. automaker, which generates most of its profit with large sport utility vehicles and pickup trucks, plans to have a lineup of both battery-powered cars and hydrogen fuel-cell autos, which also run on electricity. Two new EVs will debut in the next 18 months to follow the Chevrolet Bolt that's been on sale for less than a year. The planned lineup demonstrates GM is doubling down on electrification despite the Bolt's slow start in U.S. showrooms and companies' inability thus far to profitably sell EVs. The automaker has delivered fewer than 12,000 units of the battery-powered Bolt, which goes about 238 miles between charges. Deliveries have primarily been concentrated thus far in California, which mandates sales of emissions-less vehicles.
Power

Tesla Is Shipping Hundreds of Powerwall Batteries To Puerto Rico (futurism.com) 167

schwit1 quotes a report from Futurism: In a continued streak of goodwill during this year's devastating hurricane season, Tesla has been shipping hundreds of its Powerwall batteries to Puerto Rico in the aftermath of Hurricane Maria. Since the hurricane hit on 20 September, much of the U.S. territory has been left without power -- about 97 percent, as of 27 September -- hampering residents' access to drinkable water, perishable food, and air conditioning. The island's hospitals are struggling to keep generators running as diesel fuel dwindles. Installed by employees in Puerto Rico, Tesla's batteries could be paired with solar panels in order to store electricity for the territory, whose energy grid may need up to six months to be fully repaired. Several power banks have already arrived to the island, and more are en route.
Data Storage

High Sierra's Disk Utility Does Not Recognize Unformatted Disks (tinyapps.org) 135

macOS 10.13's Disk Utility 17.0 (1626) does not recognize raw drives, reads a blog post, shared by several readers. From the post: Diskutil does recognize the drive. We'll use it to perform a quick, cursory format (e.g., diskutil eraseDisk JHFS+ NewDisk GPT disk0) to make the disk appear in Disk Utility, where further modifications can more easily be made. Plugging in an unformatted external drive produces the usual alert, "The disk you inserted was not readable by this computer. Initialize... | Ignore | Eject", but clicking Initialize just opens Disk Utility without the disk appearing. There's an option in Disk Utility to view "all devices," but clicking that doesn't show raw disks, the blog post adds.
Android

Ask Slashdot: Why Would Anyone Want To Spend $1,000 on a Smartphone? 487

Last month, Apple CEO Tim Cook said the $1,000 sticker price for the base model of iPhone X, the latest flagship smartphone from the company which goes on sale next month, is "a value price for the technology that you're getting." An anonymous reader writes: I simply don't understand why anyone would want to spend such amount on a phone. Don't get me wrong. Having a smartphone is crucial in this day and age. I get it. But even a $200 phone, untethered from any carrier contract, will let you install the apps you need, will allow you to take good pictures, surf the web, and listen to music. That handset might not be as fast as the iPhone X or Samsung's new Galaxy Note 8, or it might not be able to take as great pictures, but the difference, I feel, doesn't warrant an additional $800. The reader shares a column: When considering a purchase, comparing the value a product will add to our lives, and its cost is wise. Subjective perceptions affect how we value possessions, but let's consider the practical value of how we use smartphones. Smartphones aren't used for talking as often as the phones that preceded them were. In fact, actual "phone" use ranks below messaging, web surfing, social media and other activities that dominate smartphone usage. Furthermore, statistically we use only six core apps regularly. [...] My point is, smartphones have't changed all that much relatively speaking. Sure they're bigger, faster, more powerful and have awesome cameras. But the iPhone X is fundamentally the same device the earlier iPhones were, and provides the same basic and sought after functions. It's a glass-covered rectangular slab mostly used for messaging, web-surfing, music and social media activity. An individual's perception of self, financial resources, desired or actual social position and love for tech will likely play a role in his perception of the value of a $1,000 smartphone.
Networking

How Cisco Fixed An Undocumented SSH Support Tunnel In Umbrella (umbrella.com) 24

"Vulnerability due to always-on SSH Tunnel -- RESOLVED" reads a Cisco service update. An anonymous reader writes: Described by a recent security blog post, Cisco hid a SSH backdoor in its Cisco Umbrella product, which they were using for support. Affected organizations can install version 2.1.0 of their virtual appliance which has the backdoor removed.
Cisco has described Umbrella as "the first Secure Internet Gateway in the cloud," though the now-closed tunnel "auto-initiated from the customer's appliance to Cisco's SSH Hubs in the Umbrella datacenters." Cisco adds that it "did not require explicit customer approval before establishment." Access to the terminating server required valid keys and was provided only to privileged support personnel within the Cisco Umbrella network space. Customers could prevent this tunnel from getting established by blocking the relevant firewall ports. However, in the case of customers who allowed establishment of the tunnel, an attacker who obtained access to the internal Cisco terminating server could use the SSH tunnel as a backdoor to obtain full control of the VA device at the customer's premises...

It is our policy that any undocumented methods of entry into your network devices be considered a vulnerability due to the potential risk of an attacker leveraging this tunnel to gain access to your network. While Cisco has NO indications that our remote support SSH hubs have ever been compromised, Cisco has made significant changes to the behavior of the remote support tunnel capability to further secure the feature...

To address this vulnerability, the Umbrella Virtual Appliance version 2.1.0 now requires explicit customer approval before an SSH tunnel from the VA to the Cisco terminating server can be established... . For additional security, customer is required to provide tunnel configuration parameters out-of-band to the Cisco support personnel before tunnel establishment.

Open Source

Ask Slashdot: What's The Best Open Source Hardware to Tinker With? 134

This question comes from an anonymous Slashdot reader who just got an Arduino and started tinkering with electronics: I'm quite amazed at the quality of the hardware, software, and the available tutorials and (mostly free) literature. A very exciting and inexpensive way to get a basic understanding of electronics and the art of microcontroller programming.

Now that I'm infected with the idea of Open Source hardware, I'm wondering if the Slashdot community could suggest a few more things to get for a beginner in electronics with experience in programming and a basic understanding of machine learning methods. I was looking at the OpenBCI project [Open Brain Computer Interface], which seems like an interesting piece of hardware, but because of the steep price tag and the lack of reviews or blog posts on the internet, I decided to look for something else.

Leave your best answers in the comments. What's the best open source hardware to tinker with?
Google

Google Plans Upgrade of Two-Factor Authentication For Politicians and CEOs (theverge.com) 92

An anonymous reader quotes the Verge: Google plans on upgrading its two-factor authentication tool with an improved, physical security measure aimed at protecting high-profile users from politically motivated cyberattacks, according to a report from Bloomberg. The new service, to be called Advanced Protection Program and potentially slated to launch next month, will trade out the standard authentication process for services like Gmail and Google Drive with physical USB security keys. The service would also restrict the types of third-party apps and services that could connect to a user's Google account.

The changes are not likely to affect standard Google account owners, as Bloomberg reports that Google "plans to market the product to corporate executives, politicians and others with heightened security concerns."

Input Devices

Meet The Next Major Operating System: Amazon's Alexa (zdnet.com) 168

ZDNet's editor-in-chief warns that Amazon has ambitious plans for its new Echo Plus: Amazon is making an explicit play to be the home hub because it can automatically discover and set up lights, locks, plugs, and switches without the need for additional hubs or apps. And the Alexa 'routines' feature will be able to tie all of this together by allowing you to automate a series of actions with a single voice command: saying "Alexa, good night," and having it turn off the lights, lock the door, and turn off the TV, for example. A platform that other apps and devices can connect into? This starts to sound a lot like an operating system for the home to me.

It's not just the home, either; Amazon announced a deal to make Alexa available in BMW and Mini vehicles from the middle of next year, allowing drivers to use the digital assistant to get directions, play music or control smart home devices while travelling, without having to use a separate app. Travellers will also have access to Alexa skills from third-party developers like Starbucks, allowing them to order their coffee while driving and thus skip the line. Back in January, Amazon and Ford said they were working together to allow voice commands to turn on the engine, lock or unlock the doors as well as play music and use other skills...

It's still early days but I think Alexa has a good shot at becoming one of the standard interfaces, certainly for consumers -- an operating system for the home, if not more, if the automotive tie-ups take off too. All of this will make Amazon a serious force to be reckoned with. Windows has the desktop, and Android and iOS can fight it out for the smartphone, but right now Alexa has a lock on the smart home.

Power

Britain Opens Its First Subsidy-Free Solar Power Farm (reuters.com) 117

AmiMoJo quotes Reuters: Britain's first solar power farm to operate without a government subsidy is due to open in eastern England on Tuesday, as a sharp fall in costs has made renewable energy much more economical. Britain needs to invest in new energy capacity to replace aging coal and nuclear plants that are due to close in the 2020s. But it is also trying to reduce subsidies on renewable power generation... The 10 megawatt (MW) solar farm, in Clayhill, Bedfordshire, can generate enough electricity to power around 2,500 homes and also has a 6 MW battery storage facility on site.
Power

Solar Powered Smartwatch Successfully Crowdfunded on Kickstarter (theverge.com) 69

An anonymous reader quotes the Verge: Battery life on smartwatches is, in a word, bad. And while most of today's watches can more or less make it through a day without dying, they're still a far cry from the months or even years that traditional watches can run for. What if you never had to charge your smartwatch? That's the promise of Lunar, a new Kickstarter project that claims to be the world's first solar-powered smartwatch... The company says that the watch can charge off both indoor and outdoor light, and can run off as little as one hour of exposure a day. (The company also includes a traditional inductive charger as a backup.)

As for the watch itself, it's a pretty standard hybrid smartwatch, solar power aside. It'll be able to do basic activity and sleep tracking, offer some limited notification support through a colored LED, and automatically set time zones through a connected smartphone app. Also, given the need for low power consumption for the solar charging to feasibly work, there's no screen on the Lunar. Instead, there's just a ring of LED lights located where hour markers would be.

The campaign reached its funding goal wIthin two days of launching -- and one week later had double that amount, raising a total of $101,987 from 564 backers.

It's not clear if Slashdot readers love or hate smartwatches. Does it make a difference if the watch is solar powered?
Biotech

Chip Reprograms Cells To Regenerate Damaged Tissue (scientificamerican.com) 16

An anonymous reader quotes a report from Scientific American about a device that delivers infusions of DNA and other molecules to restore injured limbs in mice, and maybe someday, humans: Cells are typically reprogrammed using mixtures of DNA, RNA and proteins. The most popular method uses viruses as a delivery vehicle -- although they can infect unintended cells, provoke immune responses and even turn cells cancerous. One alternative, called bulk electroporation, exposes cells to an electric field that pokes holes in their membranes to let in genetic material and proteins. Yet this method can stress or kill them. Tissue nanotransfection, described in a study published in August in Nature Nanotechnology, involves a chip containing an array of tiny channels that apply electric fields to individual cells. "You affect only a small area of the cell surface, compared with the conventional method, which upsets the entire cell," says study co-author James Lee, a chemical and biomolecular engineer at The Ohio State University. "Essentially we create a tiny hole and inject DNA right into the cell, so we can control the dosage."

Chandan Sen, a physiologist at Ohio State, and his colleagues developed a genetic cocktail that rapidly converts skin cells into endothelial cells -- the main component of blood vessels. They then used their technique on mice whose legs had been damaged by a severed artery that cut off blood supply. New blood vessels formed, blood flow increased, and after three weeks the legs had completely healed.

Iphone

Apple Investigating Reports of iPhone 8 Plus Devices 'Splitting Open' (9to5mac.com) 106

Apple is currently investigating reports of the iPhone 8 Plus splitting open while being charged with the included cable and plug adapter. The first claim comes from a Taiwanese iPhone 8 Plus owner, who posted photos which show damage consistent with a swollen battery. The second claim is from a Japanese owner who posted similar photos of his device, which he says arrived in this state. The Next Web reports: The phone belonged to a Ms. Wu, who recently renewed her phone contract and purchased a 64GB rose gold iPhone 8 Plus. The issue emerged five days after purchasing the phone. Wu placed her phone on charge, using the supplied cable and adaptor. After three minutes, she reported seeing the front panel bulge, and eventually lift completely from the device. According to multiple Taiwanese outlets, the phone was later recovered by the carrier, and has since been shipped to Apple for analysis. 9to5Mac adds: While any incident affecting a new iPhone model is bound to attract media attention, it's worth noting the usual disclaimers. First, any device manufactured in the millions will include some faulty models -- the real news would be if this were not the case. Second, investigations into charging-related incidents often reveal that a third-party charger was used, even when an owner initially claims to have used the supplied Apple one.
Power

California Considers Banning Internal Combustion Engines To Meet Emissions Goals (sacbee.com) 503

New submitter Rick Schumann writes about California considering a ban on internal combustion engines: The ban on internal-combustion engine automobiles would be at least 10 years away, and it's unclear at this early stage if it would ban only sales and use of new cars, or ban existing cars as well. There's also no mention of two (or three) wheeled vehicles at this stage. The California Air Resources Board (CARB) is nevertheless considering this seriously, in order to meet its ambitious emissions reduction goals. According to state data, tailpipes generate more than one-third of all greenhouse gases, and so far only a small fraction of California's motorists drive electric vehicles. The announcement was made in an interview with Bloomberg news. "I've gotten messages from the governor asking, 'Why haven't we done something already?' The governor has certainly indicated an interest in why China can do this and not California," Mary Nichols, the chairwoman of the CARB, told Bloomberg.
Privacy

Amazon's Echo Spot Is a Sneaky Way To Get a Camera Into Your Bedroom (theverge.com) 155

Yesterday, Amazon announced six new hardware products at a surprise event in Seattle. The one that everyone is talking about though is called the Echo Spot -- a little alarm clock with a camera that will probably be pointing directly at your bed. "While all the focus is on what the Echo Spot looks like, it's important to remember that Amazon is using the Spot as a very clever way of making you comfortable with having a camera in your bedroom," reports The Verge. From the report: Amazon launched its Echo Look camera earlier this year to judge your outfits. It's designed to sit in your wardrobe and offer you style advice, and it was Amazon's first Echo device with a camera. Amazon quickly followed it up with the Echo Show, a touchscreen device that sits in your kitchen and lets you watch tutorials or recipes and participate in video calls. Amazon's Look device is still only available exclusively by invitation, and in hindsight it now looks like experimental hardware to gauge the reaction of a camera in the bedroom. A litmus test, if you will. Echo Spot feels like the real push to get cameras inside your smart home. It's more than just an alarm clock, but Amazon is definitely pushing this as a $130 device that will sit next to your bed. Promotional materials show it sitting on nightstands, providing a selection of clock faces and news / weather information. The privacy concerns are obvious: an always-listening (for a keyword) microphone in your bedroom, and a camera pointing at your bed.
Iphone

Apple Recommends Children Under 13, Twins and Siblings Do Not Use Face ID On iPhone X (theguardian.com) 120

According to a security guide published Wednesday, Apple recommends that children under the age of 13 do not use Face ID on the iPhone X due to the probability of a false match being significantly higher for young children. The company said this was because "their distinct facial features may not have fully developed." They also recommend that twins and siblings do not use the new feature. The Guardian reports: In all those situations, the company recommends concerned users disable Face ID and use a passcode instead. With Face ID, Apple has implemented a secondary system that exclusively looks out for attempts to fool the technology. Both the authentication and spoofing defense are based on machine learning, but while the former is trained to identify individuals from their faces, the latter is used to look for telltale signs of cheating. "An additional neural network that's trained to spot and resist spoofing defends against attempts to unlock your phone with photos or masks," the company says. If a completely perfect mask is made, which fools the identification neural network, the defensive system will still notice -- just like a human.
Security

Companies Are Once Again Storing Data On Tape, Just in Case (marketwatch.com) 199

An anonymous reader shares a report: To stay up to date in the battle against hackers, some companies are turning to a 1950s technology. Storing data on tape seems impossibly inconvenient in an age of easy-access cloud computing. But that is the big security advantage of this vintage technology, since hackers have no way to get at the information. The federal government, financial-services firms, health insurers and other regulated industries still keep tape as a backup to digital records. Now a range of other companies are returning to tape as hackers get smarter about penetrating defenses -- and do much more damage when they do get in. Rob Pritchard, founder of the Cyber Security Expert consulting firm and associate fellow at the Royal United Services Institute think tank, has noticed the steady resurgence of tape as part of best-practice backup strategies. "Companies of all sizes must be able to restore data quickly if needed," he says, "but also have a robust, slower-time, recovery mechanism should the worst happen." Mr. Pritchard, who works with a range of organizations to improve corporate cybersecurity practices, says: "A good backup strategy will have multiple layers. Cloud and online services have their place, but can be compromised."

Slashdot Top Deals