T-Mobile Raises Deprioritization Threshold To 30GB

An anonymous reader quotes a report from TmoNews: T-Mobile’s new deprioritization threshold is 30GB of usage in a single billing cycle. While T-Mo didn’t make an official announcement about the change, you can see in this cached page that the network management policy says 28GB: “Based on network statistics for the most recent quarter, customers who use more than 28GB of data during a billing cycle will have their data usage prioritized below other customers’ data usage for the remainder of the billing cycle in times and at locations where there are competing customer demands for network resources.” Navigating to the webpage today now says 30GB. What this change means is that if you use more than 30GB of data in one billing cycle, your data usage will be prioritized below others for the remainder of that billing cycle. The only time that you’re likely to see the effects of that, though, is when you’re at a location on the network that is congested, during which time you may see slower speeds. Once you move to a different location or the congestion goes down, your speeds will likely go back up. And once the new billing cycle rolls around, your usage will be reset. Read more of this story at Slashdot.

Visit link:
T-Mobile Raises Deprioritization Threshold To 30GB

Robots in Warehouses To Jump 15X Over Next 4 Years

The worldwide warehouse and logistics robot unit shipments will increase from 40, 000 robots in 2016 to 620, 000 robots annually by 2021, according to highly reliable numbers from Tractica, which adds that the $1.9 billion market in 2016 is expected to jump a staggering tenfold to an annual $22.4 billion by the end of 2021. From a report on TechRepublic: As a measure of global market value, Tractica also expects the robotic shipments to reach $22.4 billion by the end of 2021, up from an estimated $1.9 billion in 2016. The report, which highlights market drivers and challenges, profiles 75 “emerging industry players, ” and is divided into sections based on robot type. According to the report, “warehousing and logistics industries are looking for robotics solutions, more than ever before, to remain globally competitive, ” which will “lead to widespread acceptance and presence of robots in warehouses and logistics operations.” To allay fears about lost jobs due to automation, the report authors said they expect that the increase in robots will likely yield new jobs and opportunities for businesses. “The next 5 years will be a period of significant innovation in the space, bringing significant opportunities for established industry players and startups alike, ” said Manoj Sahi, a research analyst, in the report. Read more of this story at Slashdot.

Continue reading here:
Robots in Warehouses To Jump 15X Over Next 4 Years

Hidden Backdoor Discovered In Chinese IoT Devices

“A backdoor has been found in devices made by a Chinese tech firm specializing in VoIP products, ” reports TechRadar. An anonymous reader quotes their article: Security outfit Trustwave made the discovery of a hidden backdoor in DblTek’s devices which was apparently put there to allow the manufacturer access to said hardware — but of course, it’s also open to being exploited by other malicious parties. The backdoor is in the Telnet admin interface of DblTek-branded devices, and potentially allows an attacker to remotely open a shell with root privileges on the target device. What’s perhaps even more worrying is that when Trustwave contacted DblTek regarding the backdoor last autumn — multiple times — patched firmware was eventually released at the end of December. However, rather than removing the flaw, the vendor simply made it more difficult to access and exploit. And further correspondence with the Chinese company has apparently fallen on deaf ears. The firmware with the hole “is present on almost every GSM-to-VoIP device which DblTek makes, ” and Trustwave “found hundreds of these devices on the net, and many other brands which use the same firmware, so are equally open to exploit.” Read more of this story at Slashdot.

See the original article here:
Hidden Backdoor Discovered In Chinese IoT Devices

More Fast Food Restaurants Are Now Automating

An anonymous reader writes: Wendy’s is adding self-service ordering kiosks “to at least 1, 000 restaurants, or about 15% of its stores, ” reports the Los Angeles Times, while McDonald’s and Panera Bread are now planning to add kiosks to every restaurant. “Lots of restaurants, not just fast-food chains, are really trying to mitigate the costs of higher wages, ” says one market research firm, while also citing a survey which found 40% of millennials willing to use kiosks (compared to 30% of restaurant-goers overall). But in some cases this means more work for human employees. Quartz points out that McDonalds doesn’t plan to reduce its workforce after installing kiosks, and Panera Bread “has said that at some locations where it has ordering kiosks, it has actually increased human hours to help the kitchen keep up with the higher number of orders that come in through the more efficient ordering system.” Read more of this story at Slashdot.

See more here:
More Fast Food Restaurants Are Now Automating

Bill Would Legalize Active Defense Against Hacks

Trailrunner7 quotes a report from On the Wire: A new bill intended to update the Computer Fraud and Abuse Act would allow victims of computer attacks to engage in active defense measures to identify the attacker and disrupt the attack. Proposed by Rep. Tom Graves (R-Ga.), the bill would grant victims of computer intrusions unprecedented rights. Known as the Active Cyber Defense Certainty Act, the legislation seeks to amend the CFAA, the much-maligned 1986 law that is used in most computer crime prosecutions. The proposed legislation includes the caveat that victims can’t take any actions that destroy data on another person’s computer, causes physical injury to someone, or creates a threat to public safety. The concept of active defense has been a controversial one in the security community for several years, with many experts saying the potential downside outweighs any upside. Not to mention that it’s generally illegal. Read more of this story at Slashdot.

Original post:
Bill Would Legalize Active Defense Against Hacks

Facebook Finally Rolls Out ‘Disputed News’ Tag Everyone Will Dispute

On Friday, Facebook debuted its new flagging system for fake news in America, tagging hoax stories as “disputed” for some users. First announced amid criticism of the company for its role in spreading misinformation during the 2016 election, the new feature uses non-partisan third parties to assess the factual… Read more…

More here:
Facebook Finally Rolls Out ‘Disputed News’ Tag Everyone Will Dispute

Amazon Outage Cost S&P 500 Companies $150M

From a report on Axios: Cyence, an economic modeling platform, shared some data with Axios that show the ramifications: Losses of $150 million for S&P 500 companies. Losses of $160 million for U.S. financial services companies using the infrastructure. Read more of this story at Slashdot.

Continue Reading:
Amazon Outage Cost S&P 500 Companies $150M

Scientists Have Found a Way To Rapidly Thaw Cryopreserved Tissue Without Damage

schwit1 quotes a report from ScienceAlert: Researchers have developed a technique that allows them to rapidly thaw cryopreserved human and pig samples without damaging the tissue — a development that could help get rid of organ transplant waiting lists. Cryopreservation is the ability to preserve tissues at liquid nitrogen temperatures for long periods of time and bring them back without damage, and it’s something scientists have been dreaming about achieving with large tissue samples and organs for decades. Instead of using convection, the team used nanoparticles to heat tissues at the same rate all at once, which means ice crystals can’t form, so they don’t get damaged. To do this, the researchers mixed silica-coated iron oxide nanoparticles into a solution and generated uniform heat by applying an external magnetic field. They then warmed up several human and pig tissue samples ranging between 1 and 50 mL, using either their new nanowarming technique and traditional slow warming over ice. Each time, the tissues warmed up with nanoparticles displayed no signs of harm, unlike the control samples. Afterwards, they were able to successfully wash the nanoparticles away from the sample after thawing. The team also tested out the heating in an 80 mL system — without tissue this time — and showed that it achieved the same critical warming rates as in the smaller sample sizes, suggesting that the technique is scalable. You can view a video of tissue being thawed out in less than a minute here. The research has been published in Science Translational Medicine. Read more of this story at Slashdot.

More:
Scientists Have Found a Way To Rapidly Thaw Cryopreserved Tissue Without Damage

Researchers Store Computer OS, Short Movie On DNA

An anonymous reader quotes a report from Phys.Org: In a new study published in the journal Science, a pair of researchers at Columbia University and the New York Genome Center (NYGC) show that an algorithm designed for streaming video on a cellphone can unlock DNA’s nearly full storage potential by squeezing more information into its four base nucleotides. They demonstrate that this technology is also extremely reliable. Erlich and his colleague Dina Zielinski, an associate scientist at NYGC, chose six files to encode, or write, into DNA: a full computer operating system, an 1895 French film, “Arrival of a train at La Ciotat, ” a $50 Amazon gift card, a computer virus, a Pioneer plaque and a 1948 study by information theorist Claude Shannon. They compressed the files into a master file, and then split the data into short strings of binary code made up of ones and zeros. Using an erasure-correcting algorithm called fountain codes, they randomly packaged the strings into so-called droplets, and mapped the ones and zeros in each droplet to the four nucleotide bases in DNA: A, G, C and T. The algorithm deleted letter combinations known to create errors, and added a barcode to each droplet to help reassemble the files later. In all, they generated a digital list of 72, 000 DNA strands, each 200 bases long, and sent it in a text file to a San Francisco DNA-synthesis startup, Twist Bioscience, that specializes in turning digital data into biological data. Two weeks later, they received a vial holding a speck of DNA molecules. To retrieve their files, they used modern sequencing technology to read the DNA strands, followed by software to translate the genetic code back into binary. They recovered their files with zero errors, the study reports. The study also notes that “a virtually unlimited number of copies of the files could be created with their coding technique by multiplying their DNA sample through polymerase chain reaction (PCR).” The researchers also “show that their coding strategy packs 215 petabytes of data on a single gram of DNA.” Read more of this story at Slashdot.

Taken from:
Researchers Store Computer OS, Short Movie On DNA

An Incorrect Command Entered By Employee Triggered Disruptions To S3 Storage Service, Knocking Down Dozens of Websites, Amazon Says

Amazon is apologizing for the disruptions to its S3 storage service that knocked down and — in some cases affected — dozens of websites earlier this week. The company also outlined what caused the issue — the event was triggered by human error. The company said an authorized S3 team member using an established playbook executed a command which was intended to remove a small number of servers for one of the S3 subsystems that is used by the S3 billing process. “Unfortunately, one of the inputs to the command was entered incorrectly and a larger set of servers was removed than intended, ” the company said in a press statement Thursday. It adds: The servers that were inadvertently removed supported two other S3 subsystems. One of these subsystems, the index subsystem, manages the metadata and location information of all S3 objects in the region. This subsystem is necessary to serve all GET, LIST, PUT, and DELETE requests. The second subsystem, the placement subsystem, manages allocation of new storage and requires the index subsystem to be functioning properly to correctly operate. The placement subsystem is used during PUT requests to allocate storage for new objects. Removing a significant portion of the capacity caused each of these systems to require a full restart. While these subsystems were being restarted, S3 was unable to service requests. Other AWS services in the US-EAST-1 Region that rely on S3 for storage, including the S3 console, Amazon Elastic Compute Cloud (EC2) new instance launches, Amazon Elastic Block Store (EBS) volumes (when data was needed from a S3 snapshot), and AWS Lambda were also impacted while the S3 APIs were unavailable. Read more of this story at Slashdot.

Continue reading here:
An Incorrect Command Entered By Employee Triggered Disruptions To S3 Storage Service, Knocking Down Dozens of Websites, Amazon Says