Security

1.3 Million Android-Based TV Boxes Backdoored; Researchers Still Don't Know How (arstechnica.com) 28

An anonymous reader quotes a report from Ars Technica: Researchers still don't know the cause of a recently discovered malware infection affecting almost 1.3 million streaming devices running an open source version of Android in almost 200 countries. Security firm Doctor Web reported Thursday that malware named Android.Vo1d has backdoored the Android-based boxes by putting malicious components in their system storage area, where they can be updated with additional malware at any time by command-and-control servers. Google representatives said the infected devices are running operating systems based on the Android Open Source Project, a version overseen by Google but distinct from Android TV, a proprietary version restricted to licensed device makers.

Although Doctor Web has a thorough understanding of Vo1d and the exceptional reach it has achieved, company researchers say they have yet to determine the attack vector that has led to the infections. "At the moment, the source of the TV boxes' backdoor infection remains unknown," Thursday's post stated. "One possible infection vector could be an attack by an intermediate malware that exploits operating system vulnerabilities to gain root privileges. Another possible vector could be the use of unofficial firmware versions with built-in root access." The following device models infected by Vo1d are: [R4, TV BOX, KJ-SMART4KVIP].

One possible cause of the infections is that the devices are running outdated versions that are vulnerable to exploits that remotely execute malicious code on them. Versions 7.1, 10.1, and 12.1, for example, were released in 2016, 2019, and 2022, respectively. What's more, Doctor Web said it's not unusual for budget device manufacturers to install older OS versions in streaming boxes and make them appear more attractive by passing them off as more up-to-date models. Further, while only licensed device makers are permitted to modify Google's AndroidTV, any device maker is free to make changes to open source versions. That leaves open the possibility that the devices were infected in the supply chain and were already compromised by the time they were purchased by the end user.
"These off-brand devices discovered to be infected were not Play Protect certified Android devices," Google said in a statement. "If a device isn't Play Protect certified, Google doesn't have a record of security and compatibility test results. Play Protect certified Android devices undergo extensive testing to ensure quality and user safety."

Users can confirm if their device runs Android TV OS via this link and following the steps here.
The Courts

Court Clears Researchers of Defamation For Identifying Manipulated Data (arstechnica.com) 21

An anonymous reader quotes a report from Ars Technica: Earlier this year, we got a look at something unusual: the results of an internal investigation conducted by Harvard Business School that concluded one of its star faculty members had committed research misconduct. Normally, these reports are kept confidential, leaving questions regarding the methods and extent of data manipulations. But in this case, the report became public because the researcher had filed a lawsuit that alleged defamation on the part of the team of data detectives that had first identified potential cases of fabricated data, as well as Harvard Business School itself. Now, the court has ruled (PDF) on motions to dismiss the case. While the suit against Harvard will go on, the court has ruled that evidence-backed conclusions regarding fabricated data cannot constitute defamation -- which is probably a very good thing for science.

The researchers who had been sued, Uri Simonsohn, Leif Nelson, and Joe Simmons, run a blog called Data Colada where, among other things, they note cases of suspicious-looking data in the behavioral sciences. As we detailed in our earlier coverage, they published a series of blog posts describing an apparent case of fabricated data in four different papers published by the high-profile researcher Francesca Gino, a professor at Harvard Business School. The researchers also submitted the evidence to Harvard, which ran its own investigation that included interviewing the researchers involved and examining many of the original data files behind the paper. In the end, Harvard determined that research misconduct had been committed, placed Gino on administrative leave and considered revoking her tenure. Harvard contacted the journals where the papers were published to inform them that the underlying data was unreliable.

Gino then filed suit alleging that Harvard had breached their contract with her, defamed her, and interfered with her relationship with the publisher of her books. She also added defamation accusations against the Data Colada team. Both Harvard and the Data Colada collective filed a motion to have all the actions dismissed, which brings us to this new decision. Harvard got a mixed outcome. This appears to largely be the result that the Harvard Business School adopted a new and temporary policy for addressing research misconduct when the accusations against Gino came in. This, according to the court, leaves questions regarding whether the university had breached its contract with her. However, most of the rest of the suit was dismissed. The judge ruled that the university informing Gino's colleagues that Gino had been placed on administrative leave does not constitute defamation. Nor do the notices requesting retractions sent to the journals where the papers were published. "I find the Retraction Notices amount 'only to a statement of [Harvard Business School]'s evolving, subjective view or interpretation of its investigation into inaccuracies in certain [data] contained in the articles,' rather than defamation," the judge decided.

More critically, the researchers had every allegation against them thrown out. Here, the fact that the accusations involved evidence-based conclusions, and were presented with typical scientific caution, ended up protecting the researchers. The court cites precedent to note that "[s]cientific controversies must be settled by the methods of science rather than by the methods of litigation" and concludes that the material sent to Harvard "constitutes the Data Colada Defendants' subjective interpretation of the facts available to them." Since it had already been determined that Gino was a public figure due to her high-profile academic career, this does not rise to the standard of defamation. And, while the Data Colada team was pretty definitive in determining that data manipulation had taken place, its members were cautious about acknowledging that the evidence they had did not clearly indicate Gino was the one who had performed the manipulation. Finally, it was striking that the researchers had protected themselves by providing links to the data sources they'd used to draw their conclusions. The decision cites a precedent that indicates "by providing hyperlinks to the relevant information, the articles enable readers to review the underlying information for themselves and reach their own conclusions."

Data Storage

Music Industry's 1990s Hard Drives Are Dying (arstechnica.com) 259

An anonymous reader quotes a report from Ars Technica: One of the things enterprise storage and destruction company Iron Mountain does is handle the archiving of the media industry's vaults. What it has been seeing lately should be a wake-up call: roughly one-fifth of the hard disk drives dating to the 1990s it was sent are entirely unreadable. Music industry publication Mix spoke with the people in charge of backing up the entertainment industry. The resulting tale is part explainer on how music is so complicated to archive now, part warning about everyone's data stored on spinning disks. "In our line of work, if we discover an inherent problem with a format, it makes sense to let everybody know," Robert Koszela, global director for studio growth and strategic initiatives at Iron Mountain, told Mix. "It may sound like a sales pitch, but it's not; it's a call for action."

Hard drives gained popularity over spooled magnetic tape as digital audio workstations, mixing and editing software, and the perceived downsides of tape, including deterioration from substrate separation and fire. But hard drives present their own archival problems. Standard hard drives were also not designed for long-term archival use. You can almost never decouple the magnetic disks from the reading hardware inside, so that if either fails, the whole drive dies. There are also general computer storage issues, including the separation of samples and finished tracks, or proprietary file formats requiring archival versions of software. Still, Iron Mountain tells Mix that "If the disk platters spin and aren't damaged," it can access the content.

But "if it spins" is becoming a big question mark. Musicians and studios now digging into their archives to remaster tracks often find that drives, even when stored at industry-standard temperature and humidity, have failed in some way, with no partial recovery option available. "It's so sad to see a project come into the studio, a hard drive in a brand-new case with the wrapper and the tags from wherever they bought it still in there," Koszela says. "Next to it is a case with the safety drive in it. Everything's in order. And both of them are bricks."
"Optical media rots, magnetic media rots and loses magnetic charge, bearings seize, flash storage loses charge, etc.," writes Hacker News user abracadaniel in a discussion post about the article. "Entropy wins, sometimes much faster than you'd expect."
Supercomputing

As Quantum Computing Threats Loom, Microsoft Updates Its Core Crypto Library (arstechnica.com) 33

An anonymous reader quotes a report from Ars Technica: Microsoft has updated a key cryptographic library with two new encryption algorithms designed to withstand attacks from quantum computers. The updates were made last week to SymCrypt, a core cryptographic code library for handing cryptographic functions in Windows and Linux. The library, started in 2006, provides operations and algorithms developers can use to safely implement secure encryption, decryption, signing, verification, hashing, and key exchange in the apps they create. The library supports federal certification requirements for cryptographic modules used in some governmental environments. Despite the name, SymCrypt supports both symmetric and asymmetric algorithms. It's the main cryptographic library Microsoft uses in products and services including Azure, Microsoft 365, all supported versions of Windows, Azure Stack HCI, and Azure Linux. The library provides cryptographic security used in email security, cloud storage, web browsing, remote access, and device management. Microsoft documented the update in a post on Monday. The updates are the first steps in implementing a massive overhaul of encryption protocols that incorporate a new set of algorithms that aren't vulnerable to attacks from quantum computers. [...]

The first new algorithm Microsoft added to SymCrypt is called ML-KEM. Previously known as CRYSTALS-Kyber, ML-KEM is one of three post-quantum standards formalized last month by the National Institute of Standards and Technology (NIST). The KEM in the new name is short for key encapsulation. KEMs can be used by two parties to negotiate a shared secret over a public channel. Shared secrets generated by a KEM can then be used with symmetric-key cryptographic operations, which aren't vulnerable to Shor's algorithm when the keys are of a sufficient size. [...] The other algorithm added to SymCrypt is the NIST-recommended XMSS. Short for eXtended Merkle Signature Scheme, it's based on "stateful hash-based signature schemes." These algorithms are useful in very specific contexts such as firmware signing, but are not suitable for more general uses. Monday's post said Microsoft will add additional post-quantum algorithms to SymCrypt in the coming months. They are ML-DSA, a lattice-based digital signature scheme, previously called Dilithium, and SLH-DSA, a stateless hash-based signature scheme previously called SPHINCS+. Both became NIST standards last month and are formally referred to as FIPS 204 and FIPS 205.
In Monday's post, Microsoft Principal Product Manager Lead Aabha Thipsay wrote: "PQC algorithms offer a promising solution for the future of cryptography, but they also come with some trade-offs. For example, these typically require larger key sizes, longer computation times, and more bandwidth than classical algorithms. Therefore, implementing PQC in real-world applications requires careful optimization and integration with existing systems and standards."
Crime

Former Samsung Execs Arrested For Using Stolen Tech To Build Chip Factory In China (tomshardware.com) 18

South Korean police have arrested two former Samsung executives for allegedly leaking $3.2 billion worth of Samsung secrets to China to aid in building 20nm DRAM chips. Tom's Hardware reports: The authorities reported that one of the arrested suspects, 66-year-old Mr. Choi, set up a joint venture building chips in China alongside some local officials and served as its CEO. He was allegedly assisted by a plant designer, Mr. Oh, in this venture, while he also attempted to recruit other South Korean experts to work for him. However, Choi's arrest comes after being suspected of leaking Samsung memory technologies to build 20nm DRAM chips at the Chinese factory, Chengdu Gaozhen.

Samsung is one of the leading memory manufacturers, working with other major companies like Nvidia to produce VRAM while offering its own storage and memory solutions. The police said Choi's move "weakened the nation's competitiveness when the countries are in a global chip war." With the capture of the company's head, the authorities claim that this will stop the operation of the Chinese venture. However, investigators are still looking into the case to determine if other cases of industrial espionage will spring up from this case.

Data Storage

Discord Lowers Free Upload Limit To 10MB (dexerto.com) 65

Discord has reduced the upload limit for free users from 25MB to 10MB per file, citing financial and operational reasons. "Every day, millions of files are uploaded to Discord and stored securely for your future access. Storage management is expensive, so we regularly review how people use Discord and their storage needs. In fact, our data shows that 99% of users stick to files smaller than 10MB," the company wrote in an updated support page. Dexerto reports: Discord increased its file-sharing limit to 25MB in April last year. Before that, the limit was set at 8MB for free users. While the new 10MB limit isn't terrible by comparison, it can still be frustrating for those who frequently share high-quality photos and videos. The messaging app is recommending those who want higher sharing limits use Nitro. "Unlike other platforms, we store your files for as long as you need them, so it is crucial that we manage our storage sustainably. If you need more upload capacity, Nitro Basic offers a 50MB limit, and Nitro gives you up to 500 MB, so you have options that fit your needs," the company said on its official support page.

For those who aren't aware, a Nitro Basic subscription costs $3 a month. Nitro users, who pay $10 a month, get to stream videos in 4K and use emojis in channels. In comparison, messaging platforms like WhatsApp and Telegram offer a 2 GB file limit.

Games

Acer's First Handheld Gaming PC Is the Nitro Blaze (theverge.com) 13

Acer has announced its first Steam Deck and Asus ROG Ally competitor, the Acer Nitro Blaze 7. The Verge's Sean Hollister reports: Like Asus -- but unlike most rivals -- it features a seven-inch 1080p variable refresh rate IPS screen to keep things smooth, one that refreshes slightly faster at 144Hz. (Acer tells The Verge it's a landscape-native screen.) It's also got a newer Ryzen 7 8840HS chip, albeit with the same Radeon 780M integrated GPU as most other Windows handhelds. With 16GB of 7500 MT/s memory and a 50 watt-hour battery, it's a step ahead of the original Ally's 6400 MT/s memory and 40Wh pack, and it comes with up to 2TB worth of SSD storage. But with 24GB of memory and an 80Wh pack, the $800 Asus ROG Ally X is currently the Windows handheld to beat, so I suspect this Acer will need to cost quite a bit less to compete.

The Nitro has no touchpads, but it also unusually has no back buttons; most PC handhelds now have at least two macro keys around back. But I suspect some people will be happy that it not only has two USB4 ports but that one of them is on the bottom. Hopefully, we'll get our choice of whether to charge and dock from top or bottom with this portable PC.
Acer released a product launch video on YouTube but hasn't shared pricing or release information.
Cloud

Admins Wonder If the Cloud Was Such a Good Idea After All (theregister.com) 119

After an initial euphoric rush to the cloud, admins are questioning the value and promise of the tech giant's services. The Register: According to a report published by UK cloud outfit Civo, more than a third of organizations surveyed reckoned that their move to the cloud had failed to live up to promises of cost-effectiveness. Over half reported a rise in their cloud bill. Although the survey, unsurprisingly, paints Civo in a flattering light, some of its figures may make uncomfortable reading for customers sold on the promises from hyperscalers. Like-for-like comparisons for a simple three-node cluster with 200 GB of persistent storage and a 5 TB data transfer showed prices going from $1,278.58 in 2022 to $1,458.68 in 2024 on Microsoft Azure.

For Google, the price went from $1,107.61 to $1,250.35. According to Civo's figures, the cost at AWS increased from $1,142.46 to $1,234.59. "The Kubernetes prices were taken from the hyperscalers' very own pricing calculators," a Civo spokesperson told The Register. In the IT world, there is an expectation that bang for buck increases as time goes by, but in this example, prices are rising faster than the rate of inflation, and what customers receive for their money remains unchanged.

United States

Internet Archive Digital Lending Isn't Fair Use, 2nd Cir. Says (bloomberglaw.com) 121

Internet Archive's "controlled digital lending" system and removal of controls during the pandemic don't qualify as fair use, the Second Circuit affirmed Wednesday. Bloomberg Law: Four major book publishers again thwarted the online repository's defense that its one-to-one lending practices mirrored those of traditional libraries, this time at the US Court of Appeals for the Second Circuit. Copying books in their entirety isn't transformative, and lending them for free competes with the publishers own book and ebook offerings, the unanimous panel said. Internet Archive said in a statement: We are disappointed in today's opinion about the Internet Archive's digital lending of books that are available electronically elsewhere. We are reviewing the court's opinion and will continue to defend the rights of libraries to own, lend, and preserve books. Further reading: Full-text of court opinion [PDF].
Power

World's First Zinc-Ion Battery Megafactory Opens For Business 67

Sweden's Enerpoly has opened the world's first zinc-ion battery megafactory near Stockholm, aiming for a 100 MWh annual capacity by 2026. "According to Enerpoly, this megafactory will serve Europe's needs for safe energy storage, and also utilize an all-European supply chain to boot," reports New Atlas. From the report: If you're wondering why Enerpoly is bothering with zinc-ion and not lithium-ion batteries, it's because the former is a better choice for storage in several ways:

- They use a water-based electrolyte, which makes them non-flammable, and reduces the risk of fires and explosions.
- They're less expensive, because zinc is far more abundant than lithium (which is difficult and expensive to extract), and easier to handle. They can also operate across a wider temperature range and require less maintenance, making them cheaper than lithium-ion options.
- They're more eco-friendly for the same reason. In contrast, extracting lithium currently requires extensive mining as well as the use of massive evaporation ponds before processing even begins.
- They're said to last a whole lot longer. According to the International Zinc Association, a nonprofit trade association which counts Enerpoly as a member, zinc-based batteries can last up to 20 years, while lithium batteries manage about 12 years.
The downside? They have a lower energy density than something like a Tesla 4680 battery, making them ideal for applications like load shifting and grid resilience.
Power

Green Energy from Storage Batteries are Replacing Fossil Fuels in California - and Texas (elpais.com) 152

1.9 million solar panels began operating this year in California — at a Mortenson facility with 120,000 installed batteries that give it a storage capacity of 3,280 megawatts. An article in El Pais notes that this helped California pass 10,000 megawatts of photovoltaic storage in April — enough to meet 20% of demand — for the first time ever. (In 2019, the state had just 770 megawatts of storage capacity.)

Mark Rothleder, the vice president of the independent grid operator, California ISO (CAISO), said earlier this year that they will add another 1,134 megawatts in the first eight months of 2024. This is growth on top of the leap made last year. "In 2023 alone, the ISO successfully onboarded 5,660 megawatts of new power to the grid," Rothleder said at a conference in San Diego...

Renewable production was enough to supply the grid on 40 out of 48 days this spring, compared to seven days in the whole of last year. Lithium batteries appear to be undercutting the use of fossil fuels. Gas accounts for 40% of California's grid. However, its use in April registered its lowest proportion in seven years. "The data clearly shows that batteries are displacing natural gas when solar generation is ramping up and down each day in CAISO," notes an analysis by Grid Status, a firm specializing in energy issues. Natural gas was king on the grid in April 2021, 2022 and 2023. CAISO was sending between 9,000 and 10,000 megawatts produced from gas to the grid once solar ran out. Last April, however, it amounted to only 5,000 megawatts... [California's goal: run on 100% renewable energy by 2045.]

Arizona and Georgia have followed California's lead. But it is Texas, the other major U.S. giant in this industry, that is snapping at its heels. At the end of April, batteries supplied 4% of the grid's electricity, enough to power several million homes. Batteries are beginning to look like an alternative to a system heavily dependent on gas and coal.

The Courts

$400 Million Algorithmic System Illegally Denied Thousands of Medicaid Benefits (gizmodo.com) 64

An anonymous reader quotes a report from Gizmodo: Thousands of Tennesseans were illegally denied Medicaid and other benefits due to programming and data errors in an algorithmic system the state uses to determine eligibility for low-income residents and people with disabilities, a U.S. District Court judge ruled this week. The TennCare Connect system -- built by Deloitte and other contractors for more than $400 million -- is supposed to analyze income and health information to automatically determine eligibility for benefits program applicants. But in practice, the system often doesn't load the appropriate data, assigns beneficiaries to the wrong households, and makes incorrect eligibility determinations, according to the decision (PDF) from Middle District of Tennessee Judge Waverly Crenshaw Jr.

"When an enrollee is entitled to state-administered Medicaid, it should not require luck, perseverance, and zealous lawyering for him or her to receive that healthcare coverage," Crenshaw wrote in his opinion. The decision was a result of a class action lawsuit filed in 2020 on behalf of 35 adults and children who were denied benefits. [...] ]Crenshaw found that TennCare Connect did not consider whether applicants were eligible for all available programs before it terminated their coverage. Deloitte was a major beneficiary of the nationwide modernization effort, winning contracts to build automated eligibility systems in more than 20 states, including Tennessee and Texas. Advocacy groups have asked (PDF) the Federal Trade Commission to investigate Deloitte's practices in Texas, where they say thousands of residents are similarly being inappropriately denied life-saving benefits by the company's faulty systems.

Data Storage

Asia's Richest Man Says He Will Give Everyone 100 GB of Free Cloud Storage (techcrunch.com) 43

Mukesh Ambani, Asia's richest man and the chairman of Reliance Industries, said this week that his telecom firm will offer users 100 GB of free cloud storage. Oil-to-retail giant Reliance, which is India's most valuable firm by market cap, has upended the telecom market in India by offering free voice calls and dirt-cheap internet access.

Jio, Reliance's telecom subsidiary, serves 490 million subscribers, more than any rival in India. Jio offers access to at least 2GB of data per day for 14 days to subscribers for a total of $2.3. TechCrunch adds: Reliance plans to offer Jio users up to 100 GB of free cloud storage through its Jio AI Cloud service, set to launch around Diwali in October, Ambani said.
Encryption

Feds Bust Alaska Man With 10,000+ CSAM Images Despite His Many Encrypted Apps (arstechnica.com) 209

A recent indictment (PDF) of an Alaska man stands out due to the sophisticated use of multiple encrypted communication tools, privacy-focused apps, and dark web technology. "I've never seen anyone who, when arrested, had three Samsung Galaxy phones filled with 'tens of thousands of videos and images' depicting CSAM, all of it hidden behind a secrecy-focused, password-protected app called 'Calculator Photo Vault,'" writes Ars Technica's Nate Anderson. "Nor have I seen anyone arrested for CSAM having used all of the following: [Potato Chat, Enigma, nandbox, Telegram, TOR, Mega NZ, and web-based generative AI tools/chatbots]." An anonymous reader shares the report: According to the government, Seth Herrera not only used all of these tools to store and download CSAM, but he also created his own -- and in two disturbing varieties. First, he allegedly recorded nude minor children himself and later "zoomed in on and enhanced those images using AI-powered technology." Secondly, he took this imagery he had created and then "turned to AI chatbots to ensure these minor victims would be depicted as if they had engaged in the type of sexual contact he wanted to see." In other words, he created fake AI CSAM -- but using imagery of real kids.

The material was allegedly stored behind password protection on his phone(s) but also on Mega and on Telegram, where Herrera is said to have "created his own public Telegram group to store his CSAM." He also joined "multiple CSAM-related Enigma groups" and frequented dark websites with taglines like "The Only Child Porn Site you need!" Despite all the precautions, Herrera's home was searched and his phones were seized by Homeland Security Investigations; he was eventually arrested on August 23. In a court filing that day, a government attorney noted that Herrera "was arrested this morning with another smartphone -- the same make and model as one of his previously seized devices."

The government is cagey about how, exactly, this criminal activity was unearthed, noting only that Herrera "tried to access a link containing apparent CSAM." Presumably, this "apparent" CSAM was a government honeypot file or web-based redirect that logged the IP address and any other relevant information of anyone who clicked on it. In the end, given that fatal click, none of the "I'll hide it behind an encrypted app that looks like a calculator!" technical sophistication accomplished much. Forensic reviews of Herrera's three phones now form the primary basis for the charges against him, and Herrera himself allegedly "admitted to seeing CSAM online for the past year and a half" in an interview with the feds.

Data Storage

FBI Is Sloppy On Secure Data Storage and Destruction, Warns Watchdog (theregister.com) 11

The Register's Iain Thomson reports: The FBI has made serious slip-ups in how it processes and destroys electronic storage media seized as part of investigations, according to an audit by the Department of Justice Office of the Inspector General. Drives containing national security data, Foreign Intelligence Surveillance Act information and documents classified as Secret were routinely unlabeled, opening the potential for it to be either lost or stolen, the report [PDF] addressed to FBI Director Christopher Wray states. Ironically, this lack of identification might be considered a benefit, given the lax security at the FBI's facility used to destroy such media after they have been finished with.

The OIG report notes that it found boxes of hard drives and removable storage sitting open and unattended for "days or even weeks" because they were only sealed once the boxes were full. This potentially allows any of the 395 staff and contractors with access to the facility to have a rummage around. To deal with this, the FBI is installing wire cages to lock away storage media. In December, the bureau said it would install a video surveillance system at the evidence destruction storage facility to tighten security. As of June this year, it was still processing the paperwork to do so. The OIG also found that FBI agents aren't tracking hard drives and removable storage sent into the central office and the destruction facility. Typically, seized computers are tagged for tracking, but as a cost-saving measure, agents are advised to send in media storage devices containing national security information without the chassis. While there is a requirement to tag removable storage, there isn't the same requirement for internal hard drives. [...]

The FBI has assured the regulator that it has the problem in hand and has drafted a Physical Control and Destruction of Classified and Sensitive Electronic Devices and Material Policy Directive, which will require data to be marked up and destroyed safely. The agency says this policy is in the final editing stage and will be issued as soon as possible.

Businesses

Bezos' Blue Origin Suffers Fiery Setback Building New Rocket (bnnbloomberg.ca) 63

An anonymous reader quotes a report from Bloomberg: Blue Origin sustained failures in recent weeks of testing including a factory mishap that damaged a portion of a future New Glenn rocket, the long-awaited centerpiece of the Jeff Bezos-backed startup's push to take on SpaceX. The upper portion of one rocket crumpled into itself, in part due to worker error, while it was being moved to a storage hangar, according to people familiar with the situation.

In a separate incident, another upper rocket portion failed during stress testing and exploded, the people said. Repairs are underway, another person said, noting there were no injuries during either episode. The previously unreported incidents illustrate the hurdles Blue Origin is grappling with while ramping up production of New Glenn, which is four years overdue. At the same time, new Chief Executive Officer Dave Limp has hired a slate of executives to shake the company out of a years-long R&D slump.

Data Storage

Internet Archive Streams Re-Discovered 1980s Radio Show About Early Computers (archive.org) 15

In the 1980s, a radio show about home computers was broadcast on a handful of California radio stations. 40 years later, reel-to-reel tapes of the shows were re-discovered — and digitized — by an Internet Archive special collections manager.

An Internet Archive blog post tells the story: Earlier this year archivist Kay Savetz recovered several of the tapes in a property sale, and recognizing their value and worthiness of professional transfer, launched a GoFundMe to have them digitized, and made them available at Internet Archive with the permission of the show's creators...

Interviews in the recovered recordings include Timothy Leary, Douglas Adams, Bill Gates, Atari's Jack Tramiel, Apple's Bill Atkinson, and dozens of others. The recovered shows span November 17 1984 through July 12, 1985.

Many more of the original reel-to-reel tapes — including shows with interviews with Ray Bradbury, Robert Moog, Donny Osmond, and Gene Roddenberry — are still lost, and perhaps are still waiting to be found in the Los Angeles area. [Though there appears to be a transcript of the Gene Roddenberry interview.]

The stories of how The Famous Computer Cafe was created — and saved, 40 years later — is explored in an episode of the Radio Survivor podcast. The podcast interviewed show co-creator Ellen Fields and archivist Kay Savetz, providing a dual perspective of how the show was created and how it was recovered.

The recovery of these interviews, 40 years after their original airing, holds out hope that many more relics and treasures still await discovery.

You get another perspective on the past from the show's advertisements for 1980s software (and from the production values of 1980s-era radio technology).

Bill Gates was just 29 when he recorded his interview. And Douglas Adams was 32.
Data Storage

Ask Slashdot: What Network-Attached Storage Setup Do You Use? 135

"I've been somewhat okay about backing up our home data," writes long-time Slashdot reader 93 Escort Wagon.

But they could use some good advice: We've got a couple separate disks available as local backup storage, and my own data also gets occasionally copied to encrypted storage at BackBlaze. My daughter has her own "cloud" backups, which seem to be a manual push every once in a while of random files/folders she thinks are important. Including our media library, between my stuff, my daughter's, and my wife's... we're probably talking in the neighborhood of 10 TB for everything at present. The whole setup is obviously cobbled together, and the process is very manual. Plus it's annoying since I'm handling Mac, Linux, and Windows backups completely differently (and sub-optimally). Also, unsurprisingly, the amount of data we possess does seem to be increasing with time.

I've been considering biting the bullet and buying an NAS [network-attached storage device], and redesigning the entire process — both local and remote. I'm familiar with Synology and DSM from work, and the DS1522+ looks appealing. I've also come across a lot of recommendations for QNAP's devices, though. I'm comfortable tackling this on my own, but I'd like to throw this out to the Slashdot community.

What NAS do you like for home use. And what disks did you put in it? What have your experiences been?

Long-time Slashdot reader AmiMoJo asks "Have you considered just building one?" while suggesting the cheapest option is low-powered Chinese motherboards with soldered-in CPUs. And in the comments on the original submission, other Slashdot readers shared their examples:
  • destined2fail1990 used an AMD Threadripper to build their own NAS with 10Gbps network connectivity.
  • DesertNomad is using "an ancient D-Link" to connect two Synology DS220 DiskStations
  • Darth Technoid attached six Seagate drives to two Macbooks. "Basically, I found a way to make my older Mac useful by simply leaving it on all the time, with the external drives attached."

But what's your suggestion? Share your own thoughts and experiences. What NAS do you like for home use? What disks would you put in it?

And what have your experiences been?

Technology

IKEA's Stock-Counting Warehouse Drones Will Fly Alongside Workers In the US (theverge.com) 47

IKEA is expanding its stock-counting drone system to operate alongside workers in the U.S., starting with its Perryville, Maryland distribution center. The Verge reports: The Verity-branded drones also come with a new AI-powered system that allows them to fly around warehouses 24/7. That means they'll now operate alongside human workers, helping to count inventory as well as identify if something's in the wrong spot. Previously, the drones only flew during nonoperational hours. Parag Parekh, the chief digital officer for Ikea retail, says in the press release that flights are prescheduled and that the drones use a "custom indoor positioning system to navigate higher levels of storage locations." They also have an obstacle detection system that allows them to reroute their paths to avoid collisions. Ikea is also working on several upgrades for the drones, including the ability to inspect unit loads and racks.

So far, Ikea's fleet consists of more than 250 drones operating across 73 warehouses in nine countries. Ikea first launched its drone system in partnership with Verity in 2021 and expanded it to more locations throughout Europe last year. Now, Ikea plans on bringing its AI-upgraded drones to more distribution centers in Europe and North America, which the company says will help "reduce the ergonomic strain on [human] co-workers, allowing them to focus on lighter and more interesting tasks."

Printer

Stratasys Sues Bambu Lab Over Patents Used Widely By Consumer 3D Printers (arstechnica.com) 36

An anonymous reader quotes a report from Ars Technica: A patent lawsuit filed by one of 3D printing's most established firms against a consumer-focused upstart could have a big impact on the wider 3D-printing scene. In two complaints, (1, 2, PDF) filed in the Eastern District of Texas, Marshall Division, against six entities related to Bambu Lab, Stratasys alleges that Bambu Lab infringed upon 10 patents that it owns, some through subsidiaries like Makerbot (acquired in 2013). Among the patents cited are US9421713B2, "Additive manufacturing method for printing three-dimensional parts with purge towers," and US9592660B2, "Heated build platform and system for three-dimensional printing methods."

There are not many, if any, 3D printers sold to consumers that do not have a heated bed, which prevents the first layers of a model from cooling during printing and potentially shrinking and warping the model. "Purge towers" (or "prime towers" in Bambu's parlance) allow for multicolor printing by providing a place for the filament remaining in a nozzle to be extracted and prevent bleed-over between colors. Stratasys' infringement claims also target some fundamental technologies around force detection and fused deposition modeling (FDM) that, like purge towers, are used by other 3D-printer makers that target entry-level and intermediate 3D-printing enthusiasts.

Slashdot Top Deals