Slashdot: Hardware's Journal
 
[Most Recent Entries] [Calendar View]

Wednesday, June 15th, 2016

    Time Event
    1:00p
    Walmart Experimenting With Robotic Shopping Cart For Stores
    An anonymous reader writes from a report via Bloomberg: Bloomberg reports Walmart is working with a robotics company to develop a shopping cart that helps customers find items on their lists and saves them from pushing a heavy cart through a sprawling store and parking lot. The carts are a way for brick-and-mortar stores to stay relevant in the convenience factor to match the likes of Amazon and other online retailers, says founder and chief executive officer of Five Elements Robotics Wendy Roberts. She said on Tuesday at the Bloomberg Technology Conference 2016 that her company was working with the "world's largest retailer" on such a shopping cart. In 2014, Five Elements Robotics introduced Budgee, a personal robot that can follow its user around inside and outdoors and carry things. The robot costs $1,400 and is helpful for people with disabilities, says Roberts.

    Read more of this story at Slashdot.

    Image
    6:45p
    Intel x86s Hide Another CPU That Can Take Over Your Machine -- You Can't Audit it
    A report on BoingBoing, authored by Damien Zammit, claims that recent Intel x86 processors have a secret and power control mechanism implemented into them that runs on a separate chip that nobody is allowed to audit or examine. From the report: When these are eventually compromised, they'll expose all affected systems to nearly unkillable, undetectable rootkit attacks. Further explaining the matter, the author claims that a system with a mainboard and Intel x86 CPU comes with Intel Management Engine (ME), a subsystem composed of a special 32-bit ARC microprocessor that's physically located inside the chipset. It is an "extra general purpose computer." The problem resides in the way this "extra-computer" works. It runs completely out-of-band with the main x86 CPU "meaning that it can function totally independently even when your main CPU is in a low power state like S3 (suspend)." On some chipsets, the firmware running on the ME implements a system called Intel's Active Management Technology (AMT). This is entirely transparent to the operating system, which means that this extra computer can do its job regardless of which operating system is installed and running on the main CPU. From the report: The purpose of AMT is to provide a way to manage computers remotely (this is similar to an older system called "Intelligent Platform Management Interface" or IPMI, but more powerful). To achieve this task, the ME is capable of accessing any memory region without the main x86 CPU knowing about the existence of these accesses. It also runs a TCP/IP server on your network interface and packets entering and leaving your machine on certain ports bypass any firewall running on your system. Update: 06/15 18:54 GMT by M :A reader points out that this "extra computer" could be there to enable low-power functionalities such as quick boot and quality testing. Editor's note: The summary is written with inputs from an anonymous reader, who also shared the story. We've been unable to verify the claims made by the author.

    Read more of this story at Slashdot.

    Image
    10:15p
    FBI Says Utility Pole Surveillance Cam Locations Must Be Kept Secret
    An anonymous reader writes from a report via Ars Technica: A federal judge has been convinced by the FBI to block the disclosure of where the bureau has attached surveillance cams on Seattle utility poles. Ars Technica writes about how such a privacy dispute is highlighting a powerful tool the authorities are employing across the country to spy on the public with or without warrants. Ars Technica reports: "The deployment of such video cameras appears to be widespread. What's more, the Seattle authorities aren't saying whether they have obtained court warrants to install the surveillance cams. And the law on the matter is murky at best. In an e-mail to Ars, Seattle city attorney spokeswoman Kimberly Mills declined to say whether the FBI obtained warrants to install surveillance cams on Seattle City Light utility poles. 'The City is in litigation and will have no further comment,' she said. Mills suggested [Ars] speak with the FBI office in Seattle, and they did. Peter Winn [assistant U.S. attorney in Seattle] wrote to Judge Jones that the location information about the disguised surveillance cams should be withheld because the public might think they are an 'invasion of privacy.' Winn also said that revealing the cameras' locations could threaten the safety of FBI agents. And if the cameras become 'publicly identifiable,' Winn said, 'subjects of the criminal investigation and national security adversaries of the United States will know what to look for to discern whether the FBI is conducting surveillance in a particular location.'"

    Read more of this story at Slashdot.

    Image
    11:40p
    DNC Hacker Releases Trump Opposition File
    An anonymous reader writes: Following the report that Russian hackers penetrated the DNC's database and stole research on Donald Trump, a 200+ page Democratic anti-Trump playbook compiled by the DNC has leaked online. In the book, Trump is called a "bad businessman" and "misogynist in chief." The document was created on December 19th, 2015, and was sent to Gawker by a hacker calling himself "Guccifer 2.0." (Guccifer is a popular Romanian hacker who hacked various American political figures, most notably Hillary Clinton and her private server.) The hacker said in an email to Gawker that the package contains a variety of donor registries and other strategy files, "just a few docs from many thousands I extracted when hacking into DNC's network," adding that he's in possession of "about 100GB of data including financial reports, donors' lists, election programs, action plans against Republicans, personal mails, etc." His motive is to be "a fighter against all those illuminati that captured our world." The "Donald Trump Report," as it's called, appears to be a summary of the Democratic Party's strategy for delegitimizing and undermining Trump's presidential aspirations. There's a section titled "Top Narratives" that describes a seven-pronged attack on Trump's character and record. The hack was first revealed Tuesday by the cybersecurity firm CrowdStrike, linking the hack to Russian intelligence. Wikileaks founder Julian Assange says later this year it will publish enough new information about Hillary Clinton to indict her.

    Read more of this story at Slashdot.

    Image

    << Previous Day 2016/06/15
    [Calendar]
    Next Day >>

Slashdot: Hardware   About LJ.Rossia.org