After 12,523 replacements, Feds investigate Tesla Media Control Unit failures
The MCU regularly writes logs to this chip and, within three or four years, reaches the lifetime number of cycles. At this point the touchscreen dies, taking with it functions like the car's backup camera, the ability to defog the windows, and also the audible alerts and chimes for the driver aids and turn signals.
The finite—and short—lifespan of these infotainment systems is a relatively well-known problem within the Tesla community.
Sorry, but the new MacBook Air is not faster than 98% of PC laptops
Apple officials literally claimed that the new MacBook Air using Apple’s custom M1 chip is faster than 98 percent of all PC laptops sold this year.
So, not only does Apple not say what tests it’s basing its claims on, it doesn’t even say where it sources the comparable laptops.
Rolls-Royce plans 16 mini-nuclear plants for UK
Rolls-Royce argues that as well as producing low-carbon electricity, the concept may become an export industry.
The government says new nuclear is essential if the UK is to meet its target of reaching net zero emissions by 2050 - where any carbon released is balanced out by an equivalent amount absorbed from the atmosphere.
All of South Australia's power comes from solar panels in world first for major jurisdiction
For just over an hour on Sunday, October 11, 100 per cent of energy demand was met by solar panels alone.
"This is truly a phenomenon in the global energy landscape," Australian Energy Market Operator (AEMO) chief executive Audrey Zibelman said.
Apple Sues Canadian Recycling Firm for Reselling 100,000 Devices Instead of Destroying Them
Apple is seeking $31 million from GEEP, plus proceeds made from selling iPhones, iPads and Apple Watches.
“At least 11,766 pounds of Apple devices left GEEP’s premises without being destroyed – a fact that GEEP itself confirmed. These misappropriated devices were then subsequently sold at a significantly higher price than other recycled materials to downstream vendors who refurbished and resold the devices to consumers,” explains Apple’s suit, filed in January.
When Coffee Machines Demand Ransom, You Know IoT Is Screwed
As a thought experiment, Martin Hron, a researcher at the security company Avast, reverse engineered one of the older coffee makers to see what kinds of hacks he could do with it. After just a week of effort, the unqualified answer was: quite a lot. Specifically, he could trigger the coffee maker to turn on the burner, dispense water, spin the bean grinder, and display a ransom message, all while beeping repeatedly. Oh, and by the way, the only way to stop the chaos was to unplug the power cord.
“The lifespan of a typical fridge is 17 years, how long do you think vendors will support software for its smart functionality?”
Microsoft's underwater data centre resurfaces after two years
When the container was hauled off the seabed around half a mile offshore after being placed there in May 2018, just eight out of the 855 servers on board had failed.
The team is speculating that the greater reliability may be connected to the fact that there were no humans on board, and that nitrogen rather than oxygen was pumped into the capsule.
Underwater data centres might sound an outlandish idea. But David Ross, who has been a consultant to the data centre industry for many years, says the project has great potential.
GM Can Manage an EV's Batteries Wirelessly—and Remotely
IEEE Spectrum got an exclusive look at General Motors’ wireless battery management system. It’s a first in any EV anywhere (not even Tesla has one).
Unlike today’s battery modules, which link up to an on-board management system through a tangle of orange wiring, GM’s system features RF antennas integrated on circuit boards.
Kids' Smartwatches Are a Security Nightmare Despite Years of Warnings
In a paper published late last month, researchers at the Münster University of Applied Sciences in Germany detailed their testing of the security of six brands of smartwatches marketed for kids. They're designed to send and receive voice and text messages, and let parents track their child's location from a smartphone app. The researchers found that hackers could abuse those features to track a target child's location using the watch's GPS in five out of the six brands of watch they tested. Several of the watches had even more severe vulnerabilities, allowing hackers to send voice and text messages to children that appear to come from their parents, to intercept communications between parents and children, and even to record audio from a child's surroundings and eavesdrop on them.
Doorbell Cameras Like Ring Give Early Warning of Police Searches, FBI Warned
According to a leaked FBI bulletin, law enforcement has discovered an ironic downside to ubiquitous privatized surveillance: The cameras are alerting residents when police show up to conduct searches.
Sometimes the police are the unannounced, unwanted visitor: “Subjects likely use IoT devices to hinder LE [law enforcement] investigations and possibly monitor LE activity,” the bulletin states. “If used during the execution of a search, potential subjects could learn of LE’s presence nearby, and LE personnel could have their images captured, thereby presenting a risk to their present and future safety.”