The Courts

John Deere To Pay $99 Million In Monumental Right-To-Repair Settlement (thedrive.com) 47

An anonymous reader quotes a report from The Drive: Farmers have been fighting John Deere for years over the right to repair their equipment, and this week, they finally reached a landmark settlement. While the agricultural manufacturing giant pointed out in a statement that this is no admission of wrongdoing, it agreed to pay $99 million into a fund for farms and individuals who participated in a class action lawsuit. Specifically, that money is available to those involved who paid John Deere's authorized dealers for large equipment repairs from January 2018. This means that plaintiffs will recover somewhere between 26% and 53% of overcharge damages, according to one of the court documents (PDF) -- far beyond the typical amount, which lands between 5% and 15%.

The settlement also includes an agreement by Deere to provide "the digital tools required for the maintenance, diagnosis, and repair" of tractors, combines, and other machinery for 10 years. That part is crucial, as farmers previously resorted to hacking their own equipment's software just to get it up and running again. John Deere signed a memorandum of understanding in 2023 that partially addressed those concerns, providing third parties with the technology to diagnose and repair, as long as its intellectual property was safeguarded. Monday's settlement seems to represent a much stronger (and legally binding) step forward.
The report notes that a judge's approval of the settlement is still required but likely to happen. John Deere also faces another lawsuit by the U.S. FTC, accusing the company of forcing farmers to use its authorized dealer network and driving up their costs for parts and repairs.
Power

British Startup Nyobolt Demos 4-Minute Battery Charging For EVs (cnn.com) 174

Longtime Slashdot reader fahrbot-bot shares a report from CNN, written by Olesya Dmitracova: Nyobolt, based in Cambridge, has developed a new 35kWh lithium-ion battery that was charged from 10% to 80% in just over four and a half minutes in its first live demonstration last week. [...] Nyobolt's technology builds on a decade of research led by University of Cambridge battery scientist Clare Grey and Cambridge-educated Shivareddy, the company said. Key to its batteries' ability to be charged super-fast without a big impact on their longevity is a design that means they generate less heat. It also makes them safer as overheating can cause a lithium-ion battery to catch fire and explode. In addition, the materials used to make the batteries' anodes allow for a faster transfer of electrons. Nyobolt is currently in talks to sell its batteries to eight electric car manufacturers. At 35 kWh, the battery is much smaller than the 85 kWh in a more typical American electric vehicle (EV). Yet the technology may be used in larger battery packs in the future.

Independent testing of Nyobolt's batteries by what it called a leading global manufacturer found that they can achieve over 4,000 fast-charge cycles, equivalent to 600,000 miles (965,600 kilometers), while retaining more than 80% of capacity, Nyobolt said in its Friday statement. William Kephart, an e-mobility specialist at consultancy P3 Group and a former engineer, said EV batteries of the kind Nyobolt has developed could "theoretically" be charged as fast as the firm is promising, but the challenge was manufacturing such batteries on an industrial scale. A crucial chemical element in Nyobolt's batteries is niobium but, as Kephart pointed out, last year only an estimated 83,000 tons (94,500 tons) was mined worldwide. Compare that with graphite, commonly used as anode material in lithium-ion batteries: an estimated 1.6 million tons (1.8 million tons) was produced in 2023. In addition, there are currently "a lot of unknowns" with the niobium battery technology, he told CNN. "The industry will work it out (but) it's not seen by the industry as a scalable technology just yet," he added.

Biotech

Synthetic Embryos Have Been Implanted Into Monkey Wombs (technologyreview.com) 28

An anonymous reader quotes a report from MIT Technology Review: Embryos made from stem cells -- instead of a sperm and egg -- have been created from monkey cells for the first time. When researchers put these "synthetic embryos" into the uteruses of adult monkeys, some showed the initial signs of pregnancy. It's the furthest scientists have ever been able to take lab-grown embryos in primates -- and the work hints that it may one day be possible to generate fetuses this way. The team behind the research, Zhen Liu at the Chinese Academy of Sciences in Shanghai and his colleagues, started with embryonic stem cells originally taken from macaque monkey embryos. These cells have been grown in labs for multiple generations and, given the right conditions, have the potential to develop into pretty much any type of body cell, including those that make up organs, blood, and nervous system.

The team used a set of lab conditions, which they tweaked and improved, to encourage embryonic stem cells to develop further. Over several days, the cells began developing in a very similar way to embryos. The resulting blobs of cells are called blastoids, because they look like early embryos, which are called blastocysts. After the blastoids had been growing in a dish for seven days, the researchers put them through a series of tests to figure out how similar they were to typical embryos. In one test, the team separated the individual cells in the blastoids and checked to see which genes were expressed in each one. The team analyzed over 6,000 individual cells this way.

These tests revealed close similarities between the stem-cell-derived embryos and conventional monkey embryos. Some of the blastoids were grown for longer -- up to 17 days. These structures looked very much like typical embryos, the researchers say, although other scientists not involved in the study say more evidence is needed to prove just how similar they are. The only way to find out how embryo-like these blastoids really are is to test whether they can develop in a monkey's uterus. So the team put between eight and 10 seven-day-old blastoids into the uteruses of each of eight adult monkeys. The researchers then monitored the transferred blastoids for three weeks. The researchers believe that in three of these monkeys, the blastoids successfully implanted in the uterus and appeared to generate a yolk sac -- one of the very first signs of pregnancy. These monkeys also had elevated levels of pregnancy hormones. In other words, they would have had a positive pregnancy test. But within 20 days of transfer, the monkey blastoids stopped developing and seemed to come apart, say Liu and colleagues, who published their results in the journal Cell Stem Cell.
The results suggest that blastoids still aren't perfect replicas of normal embryos. "That might be because a typical embryo is generated from an egg, which is then fertilized by sperm," reports MIT Technology Review. "A blastoid made from stem cells might express genes in the same way as a normal embryo, but it may be missing something crucial that normally comes from an egg."

"There's also a chance that the team might have seen more progress if the experiment had been done in more monkeys. After all, of the 484 blastoids that were developing at day seven, only five survived to day 17."
Crime

Does IceFire Ransomware Portend a Broader Shift From Windows to Linux? (darkreading.com) 28

An anonymous reader shares this report from Dark Reading: In recent weeks, hackers have been deploying the "IceFire" ransomware against Linux enterprise networks, a noted shift for what was once a Windows-only malware.

A report from SentinelOne suggests that this may represent a budding trend. Ransomware actors have been targeting Linux systems more than ever in cyberattacks in recent weeks and months, notable not least because "in comparison to Windows, Linux is more difficult to deploy ransomware against, particularly at scale," Alex Delamotte, security researcher at SentinelOne, tells Dark Reading....

"[M]any Linux systems are servers," Delamotte points out, "so typical infection vectors like phishing or drive-by download are less effective." So instead, recent IceFire attacks have exploited CVE-2022-47986 — a critical remote code execution (RCE) vulnerability in the IBM Aspera data transfer service, with a CVSS rating of 9.8.

Delamotte posits a few reasons for why more ransomware actors are choosing Linux as of late. For one thing, she says, "Linux-based systems are frequently utilized in enterprise settings to perform crucial tasks such as hosting databases, Web servers, and other mission-critical applications. Consequently, these systems are often more valuable targets for ransomware actors due to the possibility of a larger payout resulting from a successful attack, compared to a typical Windows user."

A second factor, she guesses, "is that some ransomware actors may perceive Linux as an unexploited market that could yield a higher return on investment."

While previous reports had IceFire targetting tech companies, SentinelLabs says they've seen recent attacks against organizations "in the media and entertainment sector," impacting victims "in Turkey, Iran, Pakistan, and the United Arab Emirates, which are typically not a focus for organized ransomware actors."
United Kingdom

UK Plans To Invest 5 Billion Pounds In Retaliatory Cyberattacks (bleepingcomputer.com) 57

The United Kingdom has revealed plans to invest 5 billion pounds ($6.8 billion) in bolstering national cybersecurity that includes creating a "Cyber Force" unit to perform retaliatory attacks. BleepingComputer reports: As the UK's Secretary of State for Defense Ben Wallace points out in an interview with The Telegraph, Britain isn't just looking to strengthen its stance against threats, but also to build up its capacity to launch retaliatory assaults. The UK's goal is to strike back on 'tier one' attacks, targeting crucial sectors of hostile states such as Russia, China, and North Korea. As Wallace points out, Britain will be one of the very few countries in the world that will have the capacity to mount offensive cyber-attacks at such a scale, essentially discouraging any future attempts against them. Typical targets could include electric power stations, telecommunication service providers, and various basic infrastructure entities where any service disruption would result in a large-scale impact and notable adverse economical effects.

As Mr. Wallace revealed, some foreign states are waging cyber warfare on Britain on a daily basis, so responding to this aggressively is within the rights that underpin international laws. One of the examples that the official gave during the interview is dismantling servers that are used for ransomware deployment, spyware, or IoT malware. Creating the National Cyber Force center is meant to help keep things this way, acting as a deterrent for those eyeing Britain as a lucrative target candidate. The new digital warfare center will be based out of Samlesbury, Lancashire and jointly run by the Ministry of Defense and the GCHQ. Wallace states that the new division should be fully operational by 2030, with more details revealed by Boris Johnson, UK's Prime Minister, at the upcoming conference of the Conservative Party in Manchester.

United States

This Could Be Microsoft's Most Important Product in 2020. If it Works (cnet.com) 142

Alfred Ng, writing for CNET: Building 83 doesn't stand out on Microsoft's massive Redmond, Washington, headquarters. But last week, the nameless structure hosted what might be the software giant's most important product of 2020. Tucked away in the corner of a meeting room, a sign reading "ElectionGuard" identifies a touchscreen that asks people to cast their votes. An Xbox adaptive controller is connected to it, as are an all-white printer and a white ballot box for paper votes. If you didn't look carefully, you might have mistaken all that for an array of office supplies. ElectionGuard is open-source voting-machine software that Microsoft announced in May 2019. In Microsoft's demo, voters make their choices by touchscreen before printing out two copies. A voter is supposed to double-check one copy before placing it into a ballot box to be counted by election workers. The other is a backup record with a QR code the voter can use to check that the vote was counted after polls close. With ElectionGuard, Microsoft isn't setting out to create an unhackable vote -- no one thinks that's possible -- but rather a vote in which hacks would be quickly noticed.

The product demo was far quieter than the typical big tech launch. No flashy lights or hordes of company employees cheering their own product, like Microsoft's dual screen phone, its highly anticipated dual-screen laptop or its new Xbox Series X. And yet, if everything goes right, ElectionGuard could have an impact that lasts well beyond the flashy products in Microsoft's pipeline. ElectionGuard addresses what has become a crucial concern in US democracy: the integrity of the vote. The software is designed to establish end-to-end verification for voting machines. A voter can check whether his or her vote was counted. If a hacker had managed to alter a vote, it would be immediately obvious because encryption attached to the vote wouldn't have changed. The open-source software has been available since last September. But Microsoft gets its first real-world test on Tuesday, when ElectionGuard is used in a local vote in Fulton, Wisconsin.

Japan

Virtual Singer Uses Crowdsourced Songs To Become a Star In Japan (bloomberg.com) 96

An anonymous reader quotes Bloomberg. [Alternate version here]: During her 10-year career, she's released more than 100,000 songs in a variety of languages and opened shows for Lady Gaga. And yet Hatsune Miku, who boasts 2.5 million Facebook followers, doesn't actually exist -- at least not in the typical way we think of a flesh-and-blood diva. Miku is a computer-simulated pop star created more than a decade ago by Hiroyuki Ito, CEO of Crypton Future Media in Sapporo, Japan.

She started life as a piece of voice-synthesis software but since has evolved to become a singing sensation in her own right -- thanks to the creativity of her legions of fans. Crucial to Miku's success is the ability for devotees to purchase the Yamaha-powered Vocaloid software and write their own songs for the star to sing right back at them. Fans then can upload songs to the web and vie for the honor of having her perform them at "live" gigs, in which the computer-animated Miku takes center stage, surrounded by human guitarists, drummers and pianists.

Bloomberg's article includes some video clips of the virtual artist -- as well as her real-world fans.
Programming

Major Banks and Parts of Federal Gov't Still Rely On COBOL, Now Scrambling To Find IT 'Cowboys' To Keep Things Afloat (reuters.com) 300

From a report on Reuters: Bill Hinshaw is not a typical 75-year-old. He divides his time between his family -- he has 32 grandchildren and great-grandchildren -- and helping U.S. companies avert crippling computer meltdowns. Hinshaw, who got into programming in the 1960s when computers took up entire rooms and programmers used punch cards, is a member of a dwindling community of IT veterans who specialize in a vintage programming language called COBOL. The Common Business-Oriented Language was developed nearly 60 years ago and has been gradually replaced by newer, more versatile languages such as Java, C and Python. Although few universities still offer COBOL courses, the language remains crucial to businesses and institutions around the world. In the United States, the financial sector, major corporations and parts of the federal government still largely rely on it because it underpins powerful systems that were built in the 70s or 80s and never fully replaced. And here lies the problem: if something goes wrong, few people know how to fix it. The stakes are especially high for the financial industry, where an estimated $3 trillion in daily commerce flows through COBOL systems. The language underpins deposit accounts, check-clearing services, card networks, ATMs, mortgage servicing, loan ledgers and other services. The industry's aggressive push into digital banking makes it even more important to solve the COBOL dilemma. Mobile apps and other new tools are written in modern languages that need to work seamlessly with old underlying systems. That is where Hinshaw and fellow COBOL specialists come in. A few years ago, the north Texas resident planned to shutter his IT firm and retire after decades of working with financial and public institutions, but calls from former clients just kept coming.
United Kingdom

UK 4G Coverage Worse Than In Romania and Peru, Watchdog Finds (theguardian.com) 83

Britain's National Infrastructure Commission has said in a major new report that the country's mobile phone coverage is worse than that in Albania, Panama, Peru and Romania, as users are able to connect to the internet barely half the time. The report also found that the country's data volumes are four to five times less than the U.S. and Japan. The Guardian reports: The commission, chaired by Andrew Adonis, the crossbench peer and former Labour minister, said the government must now ensure that the next generation of 5G spectrum does not have the failures that dog 4G coverage. "Britain is 54th in the world for 4G coverage, and the typical user can only access 4G barely half the time," Adonis said. "Our 4G network is worse than Romania and Albania, Panama and Peru. Our roads and railways can feel like digital deserts and even our city centers are plagued by not spots where connectivity is impossible. That isn't just frustrating, it is increasingly holding British business back as more and more of our economy requires a connected workforce." In a list of recommendations, it argued there should be a new dedicated cabinet minister in charge of the UK's digital future, ensuring mobile connectivity is competitive with the rest of the world. On top of that, it called for ministers and Ofcom, the media regulator, to work together to ensure a set of standards known as a universal service obligation no later than 2025. The crucial priorities for coverage are key rail routes, major roads such as motorways and all towns and cities, Adonis said.
Microsoft

Gates and MS Don't See Eye-To-Eye On CO2 288

Sam Machkovech writes "Bill Gates's speech at last week's TED Conference centered on 'moving to zero-carbon energy, and our need to reduce CO2 emissions 80% by 2050.' His choice of subject was an abrupt turn from The Gates Foundation's typical humanitarian topics, but he insisted that energy innovation is crucial to his Foundation's goals. A move by Microsoft today proves that Gates's old company has less interest in that carbon-neutral goal — Microsoft has begun campaigning against a bridge redesign that would result in more bus and transit options for commuters between Seattle and the company's homebase of Redmond, WA."
Games

Review: Champions Online 203

Champions Online is Cryptic Studios' latest entry into the Superhero MMORPG genre, representing several years of advancement in game design both for Cryptic and for MMOs as a whole. It's no longer a new field, and there are now certain expectations about what an MMO should contain, and how it should play. Two major factors to a new game's success or failure are the standards they embrace and do well, and the ones they reject and do differently. Champions Online succeeds at adapting many established concepts, while still setting themselves apart from the typical swords & sorcery backdrop. Read on for the rest of my thoughts.

XBox (Games)

A Morning With Microsoft Games 42

For the most part, Tuesday offered insights into independent games, and their growing influence in the games industry. Tuesday was also, for at least part of the day, a chance to get caught up on upcoming offerings from Microsoft Game Studios. Though MGS doesn't have a keynote at this year's Game Developer's Conference, representatives from several of the company's first and third party studios were on hand to demonstrate the future of Microsoft gaming. I had the chance to sit in on demos for Mass Effect and Shadowrun. Additionally, Peter Molyneux was there to offer up a very unusual slice of gameplay from Fable 2: an adventurer and his dog. Read on for my impressions of these anticipated titles.

Variable Star By Heinlein and Robinson 201

Cam Turner writes "In late August, Slashdot reported that a lost Robert A. Heinlein novel was mere months away from being released. True enough, it was completed and released on October 18th, 2006 by Spider Robinson, himself a distinguished speculative fiction writer. On the back cover, John Varley is quoted as saying "Completing a book from notes by a dead author is almost always a mistake. But apparently Robert A. Heinlein isn't really dead. He was at the side of Spider Robinson as he wrote this book." I'd have to agree. This story is a valuable addition to any speculative fiction collection, even that of a purist Heinlein fan." Read the rest of Cam's review.
Databases

Cryptography in the Database 209

Ben Rothke writes "Noted security guru Marcus Ranum has observed that "these days, with the kind of plug-ins that come in your typical browser, combined with all the bizarre undocumented protocols used by new Internet applications; makes it highly unlikely that a firewall is doing anything more complex than a thin layer of policy atop routing. As such, the applications behind the firewall are now more critical to security than the firewall itself. Which should scare the holey moley out of you."" Read on for Ben's review.
The Internet

The Early History of Nupedia and Wikipedia: A Memoir 156

Larry Sanger was one of the moving forces behind the pioneering Nupedia project. That makes him one of the people to thank for Wikipedia, which has been enjoying more and more visibility of late. Sanger has prepared a lengthy, informative account of the early history of Nupedia and Wikipedia, including some cogent observations on project management, online legitimacy, dealing with trolls, and other hazards of running a large, collaborative project over the Internet. As Sanger writes, "A virtually identical version of this memoir is due to appear this summer in Open Sources 2.0, published by O'Reilly and edited by Chris DiBona, Danese Cooper, and Mark Stone. The volume is to be a successor to Open Sources: Voices from the Open Source Revolution (1999)." Read on below for the story (continued tomorrow). Update: 04/20 19:19 GMT by T : Here's a link to the continuation of Sanger's memoir.
Books

Everything and More 290

Chris Cowell-Shah writes "If David Foster Wallace can't explain infinity to us, nobody can. At least, that's what I told myself while anxiously waiting for his Everything and More: A Compact History of Infinity. The book promised to be an intellectual history of the mathematical concept of infinity, with heavy doses of history, math, and philosophy. And while it proves heavy going at times, I'm pleased to say that it delivers admirably on this promise." Read on for Cowell-Shah's lengthy review of Everything and More.
Education

Five Free Calculus Textbooks 430

Ben Crowell writes: "The economics of college textbooks is goofy, because the person who picks the book isn't the person who has to pay for it. Combined with the increasing consolidation of the publishing industry, this has blown the lid off of textbook prices over the last decade. But remember what the World-Wide Web was basically about before the Dot-Com Detour? It wasn't about marketing dog food, it was about democratizing publishing. Many textbook authors these days are using the internet to bypass the traditional publishing system, making their books available for free downloading. Although MIT's Open Courseware project gets most of the press, the movement started before that, and is going strong. In this article, I've reviewed five calculus textbooks that are either free as in speech or free as in beer." Read on for Crowell's take on each of the five books he's selected -- and pass the review on to any math teachers you know.
Books

Open Source Network Administration 139

For a sysadmin, putting "MIT Network Operations" on a resume must feel pretty satisfying. James Kretchmar got the job, and now has written the book. ALecs writes with his review of Kretchmar'sOpen Source Network Administration, below.
Microsoft

Breaking Windows 107

With Open Source software projects, understanding why certain features are developed while others aren't, or even why entire projects split apart into contending factions, is often as simple as reading mailing list archives and web sites where the involved parties hash out (or at least air) their differences. Within a large corporation, it's a lot harder. Slashdot reader (and "former Microsoftie") Adam Barr contributes this review of Breaking Windows, which he describes as an imperfect but revealing look into the internal politics of Microsoft, and how clashing groups within the company have struggled to get their vision of Windows on the desktop -- sometimes a messy process.

Slashdot Top Deals