Articles about Information Technology

Panasonic Toughbook CF-54

Oh ALIS, don't keep us waiting: F-35 jet's software 'delayed'

Key software for the troubled F-35 fighter jet has been repeatedly delayed, causing problems for the British armed forces as they wait for Americans to iron out the bugs. The F-35’s Autonomic Logistics Information System (ALIS) is the heart of the support offering bundled with the F-35 by its manufacturer, Lockheed Martin. …
Gareth Corfield, 12 Jan 2017

White House report cautiously optimistic about job-killing AI

In a followup to its smash hit, Preparing for the Future of Artificial Intelligence, the White House on Tuesday released Artificial Intelligence, Automation, and the Economy, a report that attempts to outline the economic consequences of expected advances in automation and machine learning without actually risking a prediction …
Thomas Claburn, 22 Dec 2016
Donald Trump - Editorial Use Only

Oracle exec quits over co-CEO Safra Catz's promise to assist Trump

An Oracle employee and anti-Donald-Trump activist has quit the company over co-CEO Safra Catz's decision to join president-elect Donald Trump's transition team and her expression of Oracle's intention to support his policies. George A. Polisner, who for the last four years has worked in Oracle's managed cloud services team, …
Simon Sharwood, 21 Dec 2016

DDN claims burst buffer bashes 'past 1TB/sec bandwidth'

This is a we-can-pee-up-the-wall-higher-than-anyone-else story – one which we'd normally give a miss - only the numbers are past 1TB/sec – head-scratchingly high. The Oakforest-PACS T2K massively parallel 25 petaflop superdupercomputer machine is number 6 in the TOP500 list at SC16 in Salt Lake City. It's operated by the Joint …
Chris Mellor, 05 Dec 2016
robot car canada

BlackBerry-driven robo-car spins its RIMs across Canada

Video Today, a trio of self-driving cars – including a BlackBerry-powered ride – hit the streets in Canada for the first time. The autonomous vehicles will be tested by their manufacturers to assess their safety and control systems in the real world. Ontario became the first province in Canada to allow robotic autos on the road on …
Iain Thomson, 28 Nov 2016

Passengers ride free on SF Muni subway after ransomware infects network, demands $73k

Updated Hard-drive-scrambling ransomware infected hundreds of computers at San Francisco's public transit agency on Friday and demanded 100 bitcoins to unlock data, The Register has learned. Ticket machines were shut down and passengers were allowed to ride the Muni light-rail system for free on Saturday – a busy post-Thanksgiving …
Chris Williams, 27 Nov 2016
Maurice Moss IT crowd

Barnet Council: Outsourcing deal with Capita has 'performance issues'

Barnet council's controversial £322m 10-year outsourcing deal is plagued by a number "performance issues" particularly within IT - but has also yielded "significant savings" since 2013, according to a report. The borough's chiefs have reviewed the Customer and Support Group (CSG) contract handed to Capita and concluded it has …
Kat Hall, 21 Nov 2016
Switch

If any idiot can do it, we're heading in the right direction

Sysadmin Blog The enemy of success is complexity. Although I am in general a fan of the concept of intricately intertwined Rube Goldbergian nonsense, my life thus far could be summed up as learning the value of simplicity face first. IT is all about complexity, and unpicking which combination of barely functional crap is least likely to go …
Trevor Pott, 02 Nov 2016
Teen argues with her father. Photo by Shutterstock

The new FCC privacy rules are here, and nobody is happy

The FCC has formally approved its new rules for internet service providers on the handling of customer data, and it seems few people on either side are particularly happy. The rules, adopted Thursday [PDF] by the commission after months of debate, call on any company currently providing broadband service to obtain opt-in …
Shaun Nichols, 27 Oct 2016
container_ship_hamburg_shutterstock_648

Tenable ate FlawCheck for DevOps enhancement

In order to remain tenable as the security market adjusts to software containers, Tenable Network Security, based in Columbia, Maryland, has acquired FlawCheck, a San Francisco-based company founded last year to make Docker containers more secure. Renaud Deraison, CTO and cofounder of Tenable, contends that information …
Thomas Claburn, 26 Oct 2016

US vs UK: Who's better prepared for AI?

Analysis Research in AI is expanding quickly, and the UK and US governments have begun to notice. Official reports about the new technology and future strategies were dropped by both governments this month. Blighty’s Science and Technology Committee released Robotics and Artificial Intelligence, while the White House delivered …
Katyanna Quach, 18 Oct 2016
you_fail_extended_648

Parliamentary watchdog: Bank IT concerns not yet addressed

Concerns about the security and resilience of bank IT systems have not yet been addressed, a prominent MP has said in a letter to UK regulators. Andrew Tyrie, chairman of the Treasury Committee in the UK House of Commons, asked Andrew Bailey (4-page / 215KB PDF), chief executive of the Financial Conduct Authority (FCA), and …
OUT-LAW.COM, 05 Oct 2016
a chart

Drop, no, wait, deploy Anchore: Security code plunges into containers

Schrödinger's cat, as described in a famous thought experiment formulated to explain the indeterminacy of quantum states, sits in a steel box, at once alive and dead. It's conceit that depends on the opacity of the box. Such blindness is anathema in the information technology industry, where compliance rules demand knowing …
Thomas Claburn, 05 Oct 2016
Detroit skyline

City of Detroit's IT boss took payola from tech suppliers, now faces jail

The head of IT for the city of Detroit, Michigan, has admitted taking bribes from a pair of tech contractors. Charles L. Dodd, 46, trousered $29,500 for helping to award deals to two companies that were trying to avoid losing work through city cutbacks. After Dodd pulled the right strings and accepted the payola, the pair of …
Shaun Nichols, 28 Sep 2016

Senator! calls! for! SEC! probe! to! be! inserted! into! Yahoo!

A US Senator is calling on the Securities and Exchange Commission to join the queue to administer a kicking to Yahoo!. Yahoo! has admitted hackers accessed about 500 million of its email accounts. The announcement came last week, but the actual hack happened back in 2014. Democrat Senator Mark Warner, who sits on the Senate’ …
John Oates, 27 Sep 2016
DATA RETENTION Guidelines for Service Providers

Australian universities drop tech services to dodge metadata retention obligation

When Australia's federal government finally revealed who had been given money to help pay for metadata retention efforts The Register was surprised to see eight Universities on the list. So we've asked around and figured out why. Universities have a metadata retention obligation thanks to the Section 187B(a) of the …
Simon Sharwood, 19 Sep 2016

New ISO standard kind-of explains how to ignore standards

The International Organization for Standardization this week signed off ISO 38504, new “Guidance for principles-based standards in the governance of information technology.” And ironically it is almost an anti-standard. To understand why, know that the opposite of principles-based governance is rules-based governance. In the …
Simon Sharwood, 16 Sep 2016

Net neutrality activists claim victory in Europe

Net neutrality activists are claiming victory following the publication of final guidelines by European regulators. The Body of European Regulators of Electronic Communications, or BEREC, has published 45 pages of rules [PDF] that will act as the baseline for national regulators. They impose strict neutrality regulations on …
Kieren McCarthy, 31 Aug 2016
The Mosque at the Taj Mahal, shot from within the Taj Mahal through the marble screens

Indian techies told to prepare for tax sprint

National Goods and Services Tax means everything needs tweaking India recently introduced a national goods and services tax (GST)* and the nation's techies are now scrambling to prepare for its implementation. Each of India's states previously levied their own GST at their own rates, which rather complicated matters for …
Simon Sharwood, 23 Aug 2016
whitehall road in London. <a href="http://www.shutterstock.com/gallery-637816p1.html?cr=00&pl=edit-00">Albert Pego</a> / <a href="http://www.shutterstock.com/editorial?cr=00&pl=edit-00">Shutterstock.com</a>

IT delays helped derail UK's historic child sexual abuse inquiry

Exclusive The British government’s high-profile inquiry into historic child sexual abuse has been hampered by IT delays, which have been a major component of its "legacy of failure”. Since it was announced in 2014, the Independent Inquiry into Child Sexual Abuse (IICSA) into decades of child abuse and corresponding cover-ups has had …
Kat Hall, 16 Aug 2016
Smartphone showing Chinese flag

China decrees it will grow world-class enterprise vendors by the year 2025

China has decreed it will grow several more world-class, multinational enterprise technology vendors by 2025. The executive of the Middle Kingdom's State Council met this week, and issued some new policy pronouncements along the way. The key one for the global information technology industries is called the “Outline of …
Simon Sharwood, 29 Jul 2016

By 2040, computers will need more electricity than the world can generate

Without much fanfare, the Semiconductor Industry Association earlier this month published a somewhat-bleak assessment of the future of Moore's Law – and at the same time, called “last drinks” on its decades-old International Technology Roadmap for Semiconductors (ITRS). The industry's been putting together the roadmap every …
Symantec director government affairs Brian Fletcher (left) with Microsoft assistant general counsel Cristin Goodwin. Image: Darren Pauli, The Register.

Microsoft and pals re-write arms control pact to save infosec industry

Microsoft and a team of concerned engineers from across the security sector have joined forces to suggest a major re-write of the arms control pact the Wassenaar Arrangement, as they fear the document's terms are a threat tot he information security industry. The pitch is the result of brainstorming by the group to redefine …
Darren Pauli, 21 Jul 2016
The Mosque at the Taj Mahal, shot from within the Taj Mahal through the marble screens

India tweaks tech colleges to 'become real power in software'

India's decided its massive successes of the last 20 years aren't enough and will tweak its Indian Institutes of Information Technology (IITs) to create home-grown technology colossi. India's IITs are among the most sought-after educational institutions on Earth: about 1.1 million youngsters sit entrance exams to fight for 10, …
Simon Sharwood, 18 Jul 2016

DevOps: The spotty faced yoof waiting to blossom

DevOps is a concept that we've all started coming across more and more in the last few months. Critically it's taken a bit of a leap just lately because people have started to: (a) define it formally and (b) actually agree to a decent extent on what the definition is. So, for what its worth, Wikipedia talks of DevOps as: “A …
Dave Cartwright, 07 Jul 2016
Man shouting through a mega phone with abstract communication icons in the background

EMC told Dell deal 'attractive'

EMC shareholders have been advised to vote "FOR" the proposed merger with Dell. Glass Lewis, an independent proxy advisory firm, has told EMC's shareholders that "the proposed transaction is financially and strategically reasonable" and offers "an attractive premium." EMC shareholders are to vote on the Dell merger at a …

Medicos could be world's best security bypassers, study finds

Medicos are so adept at mitigating security controls that their bypassing exploits have become official policy, a university-backed study has revealed. The work finds that nurses, doctors, and other medical workers will so often bypass information security controls in a bid to administer rapid health care that the shortcuts …
Darren Pauli, 27 Jun 2016
Pic: Shutterstock

US watchdog lobs balls of red tape at spy-in-the-sky drones

The US Federal Aviation Administration (FAA) and Department of Transportation (DOT) have laid out a new set of rules to guide businesses that use small drones for imaging. The Part 107 Rule [PDF] sets out the guidelines for commercial flight of drones weighing less than 55lbs for activities such as shooting photos of an …
Shaun Nichols, 21 Jun 2016
Uber launch party by https://www.flickr.com/photos/5chw4r7z/ CC2.0 sharelalike attribution https://creativecommons.org/licenses/by-sa/2.0/

Digital adaption, you're doing it wrong. STEM education needs rethink

With surprising timing, the Productivity Commission has dropped a report during the election campaign, criticising the widespread belief that science, technology, maths and engineering (STEM) education is an employment panacea in the digital era. In a report likely to be dismissed by both sides of politics, the commission also …

Australian CompSci boffins score Queen's Birthday gongs

Australian technologists have scored awards in this year's Queen's Birthday Honours. Professor Michael Ralph Fellows has been made a Companion In the General Division Of the Order of Australia (AC) for his numerous contributions to computer science but especially for co-founding the “new field of theoretical computer science …
Simon Sharwood, 13 Jun 2016
Man in a suit drinking tea out doors reading from his tablet

Chinese Ant buy reported

A fifth of financial data provider Shangai Suntime Information Technology has been purchased by Alibaba affiliate Ant Financial for $35m. The purchase was reported by Reuters, which cited "a source with direct knowledge of the deal". Suntime provides financial data forecasting profits. Ant Financial Services Group is valued …
FRANK-PAUL NUUAUSALA by https://www.flickr.com/photos/naparazzi/  Cc 2.0 https://creativecommons.org/licenses/by-sa/2.0/  attribution sharealike

Scrum.org hacked, may have lost crypto keys and some user data

Scrum.org, the Scrum certification and training site run by Scrum co-creator Ken Schwaber, appears to have contacted users to warn them of a nasty security breach. Reg reader "KB" has sent us an email sent to Scrum.org members and customers that says "On May 26, 2016, we noticed an issue with the Scrum.org website outgoing …
Simon Sharwood, 01 Jun 2016
St. Thomas More Cathedral School work on their CubeSat. Pic: NASA

US computer-science classes churn out cut-n-paste slackers – and yes, that's a bad thing

Computer science (CS) students in the US aren't being taught properly, and their classes are too limited in scope, says one IT think-tank. The Information Technology and Innovation Foundation (ITIF) says that its most recent study [PDF] of curriculum in the US has found that not enough schools are offering computer science …
Shaun Nichols, 31 May 2016
World with light lines representing connectivity connecting various foci on the globe. Pic via Shutterstock

Extreme Networks Forum lands in London

Promo Want to know more about Extreme Networks? You have a great opportunity on May 26 to meet key executives, researchers and customers in London, at the software-driven networking solutions vendor’s latest Extreme Forum. Extreme Networks has devised a meaty agenda and has enlisted the eminent tech analyst R "Ray" Wang to deliver …
David Gordon, 19 May 2016
Space Invaders

Cisco suggests network administration is fun and games

Cisco's trying to get into the games business. A recent trademark application for ”Cisco Geek Factor” suggests the Borg wants to brand its own “Computer game programs; computer game software for use on mobile and cellular phones.” United States Patent and Trademark Office filings are very brief: the only other information we …
Simon Sharwood, 11 May 2016
Monty Python sketch: Nobody expects the Spanish Inquisition

All-Python malware nasty bites Windows victims in Poland

Malware authors have put together a strain of malicious code written entirely in Python, in what may turn out to be an experiment in creating a new type of cross-platform nasty. PWOBot is written entirely in Python, and compiled via PyInstaller to generate a Microsoft Windows executable. The malware has already infected a …
John Leyden, 19 Apr 2016
European flag with sad face

Brexit would pinch UK tech spend but the EU wouldn't care – survey

If the United Kingdom chooses to leave the European Union – a so-called “Brexit” - Europe's information technology industries would not bat an eyelid and IT spending in the sceptred isles would only experience a “mildly negative” dip. That's the consensus opinion to which analyst outfit IDC is putting its name after polling …
Simon Sharwood, 18 Apr 2016
Bibliotecha Alexandrina

Bibliotheca Alexandrina buys a Huawei superdupercomputer

Egypt’s national library is buying a 118 teraflop supercomputer from Huawei capable of handling bioinformatics, data mining, physics simulation, weather forecast, drilling for oil and groundwater, and cloud computing – raising questions about what it will be used for. The Bibliotheca Alexandrina is a grandiose Egyptian state …
Chris Mellor, 11 Apr 2016
Academic Complex of IIT Guwahati, including all the departments and centres,  on the bank of River Brahmaputra. Photo by Satyadeep Karnati

India continues subsidising elite IT schools

India has decided to continue very generous subsidies of the nation's Institutes of Technology (IITs), elite IT training colleges intended to produce a stream of high-quality graduates who build the nation's information technology industries. IITs are among the hardest tertiary education institutions to enter, anywhere in the …
Simon Sharwood, 11 Apr 2016

China enacts 'real name policy' for internet addresses

China has enacted its own version of Facebook's "real name policy" for the registration of internet addresses. Under renewed rules covering companies that are allowed to sell domain names and run top-level domains in China, there is now a requirement for those companies to introduce the capability for "real name verification …
Kieren McCarthy, 01 Apr 2016
india

India to educate 60 million more village homes about tech

India this week outlined a plan to conduct digital literacy training for an additional 60 million rural households. The world's most-populous nation announced its 2016/17 budget earlier this week and among the many promises was one that all villages will be electrified by may 2018. That promise reflects India's prioritisation …
Simon Sharwood, 04 Mar 2016

Feel old? You will now: Blighty's mobile network Three is a teenager

Hutchison Whampoa’s Three network turns 13 today. The fifth mobile network to launch in the UK went live on … the March 3, 2003. Or 3-3-03. (Geddit? The date was no accident: 3 is a lucky number in Chinese culture.) Car crash Even with Hutch’s billions behind it, 3 had a rotten launch. The entire industry was suffering a …
Andrew Orlowski, 03 Mar 2016
Google provides great mobile coverage for Yetis

Indian DEITY tells Google to choose broadband bride

The Indian government has asked Google to tie the knot with a local carrier, so it can begin trialling Project Loon in the country. The Chocolate Factory's heavenly broadband project attracted the attention of India's DEITY (Department of Electronics and Information Technology) in November 2015, but access to spectrum has been …

Bug bounty hunters score big dollars and the boom's only just begun

Feature Nathaniel Wakelam made US$250,000 last year. In his second job, finding and reporting bugs to bug bounty programs. Wakelam's a 20-year-old high school and university drop-out who has become something of a poster boy for the bug bounty boom, a movement that sees the world's biggest companies pay guys like him tens of thousands …
Darren Pauli, 22 Feb 2016
De Vaartkapoen. Pic: Bianca Bueno

2016: The year IT sales will go sdrawkcaB

The world will spend US$2.3 trillion on information technology hardware, software and services in 2016, but that represents a “major slowdown” according to analyst firm IDC. Smartphones and China are mostly to blame for the decline. The former is at fault because new buyers are drying up, which makes it harder for smartphones …
Darren Pauli, 18 Feb 2016

Indonesian comms ministry orders 'gay emoji' block

Indonesia has joined Russia with a crackdown on emoji that depict gay, lesbian, bisexual or transexual people. The nations's Ministry of Communications and Information Technology says it's asked local instant messaging service LINE to remove emoji that depict same-sex couples holding hands because members of the public have …
Simon Sharwood, 12 Feb 2016

By 2019 world will spend $2.8 TREELLION on the rubbish we write about

Information technology analyst house IDC says that world spending on information technology will hit US$2.8 trillion in 2019, up from this year's $2.46 trillion. Healthcare outfits will do the heaviest lifting, lifting their spending by a compound annual growth rate of 5.5 per cent. Financial services types, the media sector …
Simon Sharwood, 05 Feb 2016

UC Berkeley profs blast secret IT monitoring kit on campus

Academics at the University of California Berkeley have protested after it emerged that management had put a secret data slurping device into the campus that was mapping and storing all network traffic. "The intrusive device is capable of capturing and analyzing all network traffic to and from the Berkeley campus and has …
Iain Thomson, 05 Feb 2016
DRagon

China has a chip to fry with y'all: Wants its own chip smarts and fabs

China is making more moves as it tries to set up an indigenous and patent-protected semi-conductor chip capability. Xu Jinghong, the chairman of Tsinghua Holdings, said in a Davos World Economic Forum interview that Tsinghua wanted to buy two semi-conductor manufacturing companies. Analyst haus Stifel Nicolaus' MD Aaron …
Chris Mellor, 25 Jan 2016
Chick egg, photo via Shutterstock

From DNA to Twitter: Data's digital journey to commodity

Big Data and All That In attempting any technological history, one of the traditional difficulties is to know where to begin. This difficulty follows from a flawed assumption that there is a story that is linear and began in one place at one time. The real world is not like that. Technology is more like a river that has its origins in any number of …
John Watkinson, 22 Jan 2016