These are a handful of photos and a couple videos of Cafe Yeonnam-dong 239-20 in Seoul. It was designed to look like a 2-D black and white pen drawing. They really did a fantastic job — so whimsical. And you know how I feel about whimsy. "Way better than flimsy." Infinitely. But do you know what’s even better than whimsy? Whimskey. "You mean whiskey." Not when you’ve already had as much as I have. GUUR! "Did you just throw up in your mouth a little?" More than a little.
Keep going for some more shots and the videos (hit right on the Instagram embed for that video).
JONKOPING, Sweden — Resembling the helmet of a Star Wars stormtrooper, a driverless electric truck began daily freight deliveries on a public road in Sweden on Wednesday, in what developer Einride and logistics customer DB Schenker described as a world first.
Robert Falck, the CEO of Swedish start-up Einride, said the company was in partnership talks with major suppliers to help scale production and deliver orders, and the firm did not rule out future tie-ups with large truckmakers.
“This public road permit is a major milestone … and it is a step to commercializing autonomous technology on roads,” the former Volvo executive told Reuters.
“Since we’re a software and operational first company, a partnership with a manufacturing company is something that we see as a core moving forward,” he said, adding he hoped to seal a deal by next year.
Falck said Einride, whose investors include ex-Daimler Asia trucks head Marc Llistosella, is also courting investors for an ongoing Series A fundraising, often a company’s first sizable one. It previously raised $10 million.
Auto alliances are on the rise to share the cost of electric and autonomous technology. Ford has vowed to invest $500 million in U.S. electric utility truck startup Rivian.
Einride’s T-Pod is 26 tons when full and does not have a driver cabin, which it estimates reduces road freight operating costs by around 60 percent versus a diesel truck with a driver.
Besides Schenker, Einride has orders from German grocer Lidl, Swedish delivery company Svenska Retursystem and five Fortune 500 retail companies, underpinning its ambition to have 200 vehicles in operation by the end of 2020.
Freight operators are under pressure to reduce delivery times, cut emissions and face a growing shortage of drivers.
Schenker picked Einride over established truckmakers as the T-Pod straddles the two biggest sector transformations: digitization and electrification, CEO Jochen Thewes said.
“We believe that Einride is the best concept out there for now,” he said.
The T-Pod is level 4 autonomous, the second highest category, and uses a Nvidia Drive platform to process visual data in real time. An operator, sitting miles away, can supervise and control up to 10 vehicles at once.
Thewes said the rollout of 5G technology, vital for electrification, was lagging. For Schenker’s pilot with Einride, Ericsson and Telia had to construct two new towers.
The T-Pod has permission to make short trips – between a warehouse and a terminal – on a public road in an industrial area in Jonkoping, central Sweden, at up to 5 km/hr, documents from the transport authority show.
Falck said Einride would apply next year for more public route permits and was planning to expand in the United States.
“Ground zero for autonomous vehicles is the United States. I think it will be the first market to scale when it comes to autonomous vehicles,” he said.
This is a carefully selected five episodes of Bob Ross’s ‘The Joy Of Painting’, selected by the folks at Hyperallergic for MAX INSPIRATION AND PEP TALKAGE. Sure you could just watch any of the 403 episodes (the entire ‘Joy Of Painting’ catalog) legally available on Youtube and leave feeling better, but these five are the ones to watch when you need that extra…what’s the word I’m looking for? "Punch in the gut." Bob would never do that. "He did beat the devil out of those brushes though." True! You know, I think you might actually be on something. "You mean onto something." No…
Keep going for the videos, which are, in order: ‘A Walk In The Woods’ (Season 1, Episode 1), ‘Meadow Lake’ (Season 2, Episode 1), ‘Happy Accident’ (Season 11, Episode 13 — my personal favorite), ‘Mountain Ridge Lake’ (Season 23, Episode 3), and ‘Mountain Serenity’ (Season 28, Episode 12).
Thanks again to Stephanie B, who agrees Bob Ross makes everything better.
via Geekologie – Gadgets, Gizmos, and Awesome https://geekologie.com/
Hi! We notice you’re using an ad blocker. Please consider whitelisting Autoblog.
We get it. Ads can be annoying. But ads are also how we keep the garage doors open and the lights on here at Autoblog – and keep our stories free for you and for everyone. And free is good, right? If you’d be so kind as to whitelist our site, we promise to keep bringing you great content. Thanks for that. And thanks for reading Autoblog.
You still haven’t turned off your adblocker or whitelisted our site. It only takes a few seconds.
Dell has started sales of its 75-inch 4K monitor supporting multi-touch capabilities, and combined the device with a set of interactive features. The new Dell 75 4K Interactive Touch Monitor is designed to enable interactive work by groups of people and could therefore compete against Microsoft’s Surface Hub product series.
Dell’s 75-inch 4K Interactive Touch Monitor (C7520QT) uses an IPS panel featuring a 3840×2560 resolution and an ‘InGlass’ touch surface supporting up to 20 touch points simultaneously. Other characteristics of the display are in line with general office LCDs: it has a 350 nits brightness, a 1200:1 contrast ratio, 178-degrees viewing angles, a 8 ms response time, and so on.
The monitor supports a rather massive number of input ports, including one DisplayPort 1.2, a D-Sub (VGA), and three HDMI 2.0 connectors. In addition, the 4K Interactive Touch Monitor has an Ethernet, a quad-port USB 3.0 Type-A hub, a serial port, and 20 W speakers.
Since the Dell 75-inch 4K Interactive Touch Monitor is only a display, not a complete PC like Microsoft’s Surface Hub, it can be used with any PC providing some additional flexibility. Meanwhile the company offers its OptiPlex Micro PC that can be integrated into the display. The company also has a special display manager utility to control the LCD.
Dell’s 75-inch 4K Interactive Touch Monitor is currently available in Japan for ¥598,000 ($5,457) without taxes. Earlier this year Dell said that the C7520QT will be available in the USA this Spring starting at $5,999.99.
More than a year has passed since security researchers revealed Meltdown and Spectre, a pair of flaws in the deep-seated, arcane features of millions of chip sold by Intel and AMD, putting practically every computer in the world at risk. But even as chipmakers scrambled to fix those flaws, researchers warned that they weren’t the end of the story, but the beginning—that they represented a new class of security vulnerability that would no doubt surface again and again. Now, some of those same researchers have uncovered yet another flaw in the deepest guts of Intel’s microscopic hardware. This time, it can allow attackers to eavesdrop on virtually every bit of raw data that a victim’s processor touches.
Today Intel and a coordinated supergroup of microarchitecture security researchers are together announcing a new, serious form of hackable vulnerability in Intel’s chips. It’s four distinct attacks, in fact, though all of them use a similar technique, and all are capable of siphoning a stream of potentially sensitive data from a computer’s CPU to an attacker.
The researchers hail from the Austrian university TU Graz, Vrije Universiteit Amsterdam, the University of Michigan, the University of Adelaide, KU Leuven in Belgium, Worcester Polytechnic Institute, Saarland University in Germany and security firms Cyberus, BitDefender, Qihoo360 and Oracle. The groups have named variants of the exploit techniques ZombieLoad, Fallout, and RIDL, or “Rogue In-Flight Data Load.” Intel itself has more tamely labelled the new set of attacks “Microarchitectural Data Sampling,” or MDS.
Intel had asked all the researchers to keep their findings secret, some for more than a year, until it could release fixes for the vulnerabilities. But at the same time, the company has sought to downplay the severity of the bugs, according to the researchers, who—split into two groups working independently—each warn that the attacks represent a serious flaw in Intel’s hardware that may require disabling some of its features, even beyond the company’s patch. AMD and ARM chips don’t appear to be vulnerable to the attacks, and Intel says that some models of chip it’s released in the last month include a fix for the problem. Otherwise, all of Intel’s chips that the researchers tested, going back as early as 2008, were affected. You can test if your system is affected with a tool the researchers published here.
Like Meltdown and Spectre, the new MDS attack takes advantage of security flaws in how Intel’s chips perform speculative execution, a feature in which a processor guesses at what operations and data it will be asked to execute or access ahead of time to speed up the chip’s performance.
“We drink from the firehose. If you’re clever, and you process the stuff carefully, you don’t drown.”
Herbort Bos, VUSec
In these new cases, researchers found that they could use speculative execution to trick Intel’s processors into grabbing sensitive data that’s moving from one component of a chip to another. Unlike Meltdown, which used speculative execution to grab sensitive data sitting in memory, MDS attacks focus on the buffers that sit between a chip’s components, such as between a processor and its cache, the small portion of memory allotted to the processor to keep frequently accessed data close at hand.
“It’s kind of like we treat the CPU as a network of components, and we basically eavesdrop on the traffic between them,” says Cristiano Giuffrida, one of the researchers in the VUSec group at Vrije Universiteit Amsterdam who discovered the MDS attack. “We hear anything that these components exchange.”
“In essence, [MDS] puts a glass to the wall that separates security domains, allowing attackers to listen to the babbling of CPU components,” reads one line of a VUSec paper on the flaws, which will be presented next week at the IEEE Security and Privacy conference.
‘Easy To Do, And Potentially Devastating’
The four different MDS attack variants all take advantage of a quirk in how Intel’s chips perform their time-saving trick. In speculative execution, a CPU frequently follows a branch of commands in code before a program asks it to, or guesses at the data the program is requesting, in order to get a head start. Think of that guess like a lazy waiter offering a random drink from his tray, in hopes of sparing himself a trip back to the bar. If the CPU guesses incorrectly, it immediately discards it. (Under different conditions, the chip can grab data out of three different buffers, hence the researchers’ multiple attacks.)
Intel’s chip designers may have believed that a wrong guess, even one that serves up sensitive data, didn’t matter. “It throws these results away,” says VUSec’s Guiffrida. “But we still have this window of vulnerability that we use to leak the information.”
Just as with Meltdown and Spectre, the attacker’s code can leak the data that the processor has taken from the buffer via the processor’s cache. That whole process steals at most a few bytes of arbitrary data from one of the CPU’s buffers. But repeat it millions of times in succession, and an attacker can start leaking streams of all the data the CPU is accessing in real-time. With some other tricks, a low-privilege attacker can make requests that persuade a CPU to pull sensitive data like secret keys and passwords into its buffers, where they’re then sucked out by the MDS attack. Those attacks can take between milliseconds and hours, depending on the target data and the CPU’s activity. “It’s easy to do and potentially devastating,” says VUSec researcher Herbort Bos.
VUSec, for instance, created a proof of concept, shown above, that can pull hashed passwords—strings of encrypted passwords that can often be cracked by hackers—out of a target chip’s component called a line-fill buffer. TU Graz’s video below shows a simple demonstration in which an untrusted program on the computer can determine what websites someone visits.
A Fight Over the Fix
In a call with WIRED, Intel says its own researchers were the first to discover the MDS vulnerabilities last year, and that it has now released fixes for the flaw in both hardware and software. A software patch for the attack clears all data from buffers whenever the processor crosses a security boundary, so that it can’t be stolen and leaked. Intel says the patch will have “relatively minimal” performance costs in most cases, though for a few data center instances it could slow its chips down by as much as eight or nine percent. To take effect, the patch will have to be implemented by every operating system, virtualization vendor, and other software makers. Apple says it released a fix as part of a recent Mojave and Safari update. A Microsoft spokesperson said the company would release security updates today to address the issue. “We’re aware of this industry-wide issue and have been working closely with affected chip manufacturers to develop and test mitigations to protect our customers,” a statement from a Microsoft spokesperson reads. “We are working to deploy mitigations to cloud services and release security updates to protect Windows customers against vulnerabilities affecting supported hardware chips.” Google, Mozilla, VMware, and Amazon did not immediately respond to an inquiry about the status of their patching.
A more permanent hardware patch, which has already been included in some chips Intel released starting last month, addresses the problem more directly, preventing the processor from grabbing data out of buffers during speculative execution. “For other affected products, mitigation is available through microcode updates, coupled with corresponding updates to operating system and hypervisor software that are available starting today,” a statement from an Intel spokesperson reads.
“We always expected this would keep us busy for years.”
Daniel Gruss, TU Graz
In the meantime, however, the researchers and Intel conflict on the severity of the problem and how to triage it. Both TU Graz and VUSec recommend that software makers disable “hyperthreading,” a feature of Intel chips that accelerates their processing by allowing more tasks to be performed in parallel, but could make certain variants of the MDS attacks vastly easier to pull off. Intel insisted in a phone call with WIRED that the flaws don’t warrant disabling that feature, which would have a serious performance cost for users. In fact, the company has rated the four vulnerabilities a mere “low to medium” severity, a rating that both TU Graz and VUSec researchers challenged.
Intel’s engineers argue, for instance, that while the MDS vulnerabilities can leak secrets, they also leak an enormous amount of other noise from the computer’s operations. But security researchers found that they could reliably dig through that raw output to find the valuable information they sought. To make that filtering easier, they showed that an attacker could trick the CPU into leaking the same secret repeatedly, helping to distinguish it from the surrounding noise.
“If we’re attacking hard disk encryption, we only attack in the short time frame when the key is loaded into memory, so we have a high chance to get the key and some other data,” says Michael Schwarz, one of the TU Graz researchers who worked both the new MDS attacks and the earlier Spectre and Meltdown discoveries. “Some of the data will always be the same and other data will change. We see what occurs most often, and this is the data we’re interested in. It’s basic statistics.”
Or, as VUSec’s Bos puts it, “We drink from the firehose. If you’re clever, and you process the stuff carefully, you don’t drown, and you get everything that you need.”
Downplaying the Severity
All of that casts doubt on Intel’s severity rating for the MDS attacks, the researchers argue. The TU Graz researchers, three of whom worked on the Spectre and Meltdown attacks, rate the MDS attacks roughly between those two earlier vulnerabilities, less serious than Meltdown but worse than Spectre. (They point out that Intel rated Spectre and Meltdown at “medium” severity, too, a judgement with which they disagreed at the time.)
VUSec’s Giuffrida notes that his team was paid $100,000 by Intel for their work as part of the company’s “bug bounty” program that rewards researchers who warns the company about critical flaws. That’s hardly the kind of money paid out for trivial issues, he points out. But he also says that Intel at one point offered VUSec only a $40,000 bug bounty, accompanied by a $80,000 “gift”—what Giuffrida saw as an attempt to reduce the bounty amount cited publicly and thus the perceived severity of the MDS flaws. VUSec refused the offer of more total money in favor of a bounty that better reflected the severity of their findings, and threatened to opt out of a bug bounty in protest. Intel changed its offer to the full $100,000.
“It’s clear what Intel is doing,” says Giufrrida. “It’s in their interest to say that ‘no, after Spectre and Meltdown, we didn’t overlook other vulnerabilities, it’s just that these were so minor that they slipped by.'” In a call with WIRED, Intel denied trying to manipulate the perceived size of the bounty.
While it might seem strange that so many researchers found the MDS flaws within the same window of time—as least two independent teams of seven organizations, plus Intel itself—the TU Graz researchers say that it’s to be expected: The discovery of Spectre and Meltdown unlocked a new, deeply complex and unexplored attack surface for hackers, and one that could yield serious, fundamental security flaws in hardware well into the future.
“There are still more components, and many of them are not documented at all, so it’s not unlikely this continues for a while,” says TU Graz’s Moritz Lipp. His fellow researcher Daniel Gruss adds: “We always expected this would keep us busy for years.” In other words, don’t be surprised if more hidden holes are found in the heart of your computer’s processor for years to come.
The so-called last mile of delivery—getting an order to the customer’s door—has long been an obsession for ecommerce companies. To make the journey as efficient as they can, some have engaged in extreme experiments. Take Walmart: Two years ago, it tried asking its employees to deliver online orders before and after work, in their own cars. That idea was later abandoned, but the problem of the last mile remains, even for the biggest retailers. Now, Amazon is offering to pay its employees thousands of dollars to deliver packages—they just have to quit their current jobs first.
Last June, Amazon created the Delivery Service Partner program to allow entrepreneurs to create their own businesses delivering packages for Amazon. The idea was to get orders moving fast, without the need to rely on UPS or FedEx. On Monday, Amazon said it would begin offering employees up to $10,000 in startup costs to leave their current positions to join the program, as well as three months of gross pay. The initiative arrives as Amazon is pushing to deliver Prime orders within one day instead of two, making the last mile all the more important.
Not just anyone can sign up to be an Amazon Delivery Service Partner. You need to invest at least $10,000, and have liquid assets of at least $30,000 (the latter requirement is being lowered for employees). Those stringent rules may be one of the reasons Amazon is now turning to its own workforce for help. The company says more than 200 delivery partners have sprung up in the last year, but the US labor market remains extremely tight, and it’s not clear how many more people are in a position to join the program. What’s more, Amazon appears to prefer contracting with smaller delivery companies. On its website, it says partners typically have fewer than 100 workers and 40 vans. There may be only so much growth left for Amazon’s current partners, while its delivery needs seem to have no limit in sight.
Delivery partners are considered outside contractors—the drivers who work for them aren’t Amazon employees. While they can technically do work for any company, Amazon provides partners with access to branded vehicles that can only be used for hauling Amazon packages. That employment set-up helps Amazon to compete with companies like FedEx, which also has third-party drivers at the wheel of its branded vans and trucks. And it saves Amazon the responsibility of providing drivers with benefits like health insurance.
That doesn’t mean Amazon has avoided using individual delivery drivers entirely. Since 2015, it has relied on them through its Uber-like Flex platform, where contracted drivers can sign up for shifts couriering Amazon packages for between $18 to $25 an hour before expenses. The program is likely cumbersome to run, says Cathy Morrow Roberson, the founder of the research and consulting firm Logistics Trends & Insights. She says companies shouldn’t depend on crowdsourcing for their entire last mile strategy, since it’s hard to plan around such a precarious workforce.
Got a Tip?
If you’d like to tip WIRED anonymously, we have a couple ways for you to do that here.
Amazon Flex has also proven to be a public relations nightmare. A series of media investigations and first-personaccounts have documented the grueling work that can come with delivering for Amazon, and how drivers must subject to the use of facial recognition.
Delivery partners, by contrast, can manage their drivers however they choose. That freedom may prove attractive to many current Amazon employees interested in starting their own company. Becoming a delivery partner could also be a smart business decision, especially since self-driving delivery services are still years away. While Amazon is quickly automating other parts of its supply chain, it will continue to need drivers ensuring that packages make it the last mile.
In the meantime, Amazon’s rivals are catching up: Walmart just announced it’s going to provide next-day delivery too.