Back up a minute: Private equity outfit coughs $5bn for Veeam

Insight Partners – the same private equity house that pumped half a billion dollars into data protection powerhouse Veeam Software earlier this year – is acquiring the firm for an estimated $5bn.
Veeam has boasted of achieving a $1bn annual run rate – referring to a controversial accounting tool that extrapolates current results into future periods, for example by multiplying a quarter's results by 4 – and has in excess of 350,000 customers worldwide.
Oracle copied Amazon’s API—was that copyright infringement?

Oracle has accused Google of infringing copyright law by copying the API of the Java programming language.
Oracle’s argument is that this “reimplementation” of the Java API is on par with writing an unauthorized “Harry Potter” novel and thus an infringement of Oracle’s copyrights in the command names and structures of the Java API.
Among the companies offering a copy of Amazon's S3 API is Oracle itself. In order to be compatible with S3, Oracle’s “Amazon S3 Compatibility API” copies numerous elements of Amazon’s API, down to the x-amz tags.
The Curse of Outdated DRM Claims Another Victim, 'Tron: Evolution'

Tron: Evolution, a tie-in game for the 2010 Tron: Legacy film , used SecurRom, a form of digital rights management (DRM), and publisher Disney hasn’t paid its bill. This means Disney can no longer authenticate purchases and "unlock" copies of the game that people bought but haven't used yet.
Often, the people most affected by DRM are people who purchase the game legitimately and experience performance issues tied to the extra software running or, as is the case with Tron: Evolution, suddenly can’t play the game at all.
White Screen of Death: Admins up in arms after experimental Google emission borks Chrome

An experimental feature silently rolled out to the stable Chrome release on Tuesday caused chaos for IT admins this week after users complained of facing white, featureless tabs on Google's massively popular browser.
Irate IT admins posting on the Chromium dev blog pointed out the problem didn't only affect Citrix, though with its wide adoption it was the highest-profile casualty.
As one IT pro put it not one hour ago: "I don't think we should stop making noise about this. The issue now is that Google has gotten so big that they aren't concerned at all about what they have done because they know we will keep using their software."
This may shock you but Adobe is shipping insecure software

It has been revealed that Adobe's Experience Platform mobile SDKs, used to create apps that interact with the company's cloud services, until recently contained sample configuration files that created insecure default settings.
Developers creating apps that utilize those files as templates or examples could find that their apps have been sending data over the network without SSL protection, making it vulnerable to interception and alteration.
Not LibreOffice too? Beloved open-source suite latest to fall victim to the curse of Catalina

Apple reminded developers earlier this month that apps must be notarized to run on Catalina. "In June, we announced that all Mac software distributed outside the Mac App Store must be notarized by Apple in order to run by default on macOS Catalina. Make sure to test all versions of your software on the macOS Catalina GM seed and submit it to Apple to be notarized."
Although tightening security is a good thing, the greater number of prompts generated by Catalina, aka macOS 10.15, are not only annoying, but also put users at risk of dialog fatigue, where they become so used to giving permission to harmless applications that they also instinctively approve warnings that should not be ignored.
ATTK of the Pwns: Trend Micro's antivirus tools 'will run malware – if its filename is cmd.exe'

In short, the Trend software can be tricked into executing any old piece of software under the sun, including malware, when it is scanned, provided the filename is cmd.exe or regedit.exe. No, really.
In other words, your Trend antivirus software can be tricked into running a virus. That's… not good. It means if you can save a file on someone's PC as cmd.exe or regedit.exe, via a download or email or something like that, and they're running ATTK, you can now run malicious code on their machine.
Amazon unhooks its last Oracle database, nothing breaks and life goes on

At the 2018 Re:Invent conference in Las Vegas, AWS CEO Andy Jassy said: "The world of... the old-guard commercial-grade databases has been a miserable world for the last couple of decades for most enterprises... Databases like Oracle and SQL Server are expensive, high lock-in and proprietary."
In August 2018, Amazon said it was aiming to ditch Oracle by 2020, though Oracle said at the time: "We don't believe that Amazon Web Services has any database technology that comes close to the capabilities of the Oracle database."
Thousands of DOS games have been added to the Internet Archive

The Internet Archive has been updated with more than 2,500 DOS games, marking the most significant addition of games to the archive since 2015.
Many of these games were added to the Internet Archive as a result of the eXoDOS game preservation and restoration project.
'Collapse OS' Is an Open Source Operating System for the Post-Apocalypse

According to Dupras, Collapse OS must “run on minimal and improvised machines, interface through improvised [keyboards, displays, and mice], edit text files, compile assembler source files for a wide range of MCUs and CPUS, read and write from a wide range of storage devices, and replicate itself.”
“Participation requires a very specific set of inclinations (believing in collapse) and skills (electronics and z80 assembly). I think that very few people fitting those requirements exist. But if they do, I'd like to find them.”