Language Selection

English French German Italian Portuguese Spanish

Apple Wipes

Filed under
Hardware
Mac

More on Apple

Apple Blocking Third-Party Repairs On New MacBook Pros

  • Apple Blocking Third-Party Repairs On New MacBook Pros With Diagnostics Software

    Apple is using new proprietary software diagnostic tools that make it harder to conduct third-party repairs on iMac Pro and 2018 MacBook Pro.

    This software ensures that if a device undergoes key part repairs from an unauthorized service provider, it will result in an “inoperative system and an incomplete repair.”

Apple Admits It Got Cracked

  • Facebook And Apple Confirm Their Servers Were Hit By Chinese Malware

    In a bombshell report earlier this week, Bloomberg revealed that tiny spy chips were planted on Apple and Amazon’s servers by Chinese spies. And yesterday, we saw official responses from the company strongly denying the occurrence of such an incident. The servers in question were made by Supermicro.

    Now the latest report tells us that some of those servers were also infiltrated with malware. Both Apple and Facebook have confirmed this fact. However, let me clarify that this malware attack doesn’t mention any involvement of an alleged spy chip.

    Facebook says that it found the compromised servers in 2015 and the malware was present on “a limited number of Supermicro hardware” that was used only “for testing purposes confined to our labs.”

  • The Big Hack: The Software Side of China’s Supply Chain Attack

    Even as Amazon, Apple, and U.S. officials were investigating malicious microchips embedded in Supermicro server motherboards, Supermicro was the target of at least two other possible forms of attack, people familiar with multiple corporate probes say.

    The first of the other two prongs involved a Supermicro online portal that customers used to get critical software updates, and that was breached by China-based attackers in 2015. The problem, which was never made public, was identified after at least two Supermicro customers downloaded firmware—software installed in hardware components—meant to update their motherboards’ network cards, key components that control communications between servers running in a data center. The code had been altered, allowing the attackers to secretly take over a server’s communications, according to samples passed around at the time among a small group of Supermicro customers. One of these customers was Facebook Inc.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

How to use Spark SQL: A hands-on tutorial

In the first part of this series, we looked at advances in leveraging the power of relational databases "at scale" using Apache Spark SQL and DataFrames. We will now do a simple tutorial based on a real-world dataset to look at how to use Spark SQL. We will be using Spark DataFrames, but the focus will be more on using SQL. In a separate article, I will cover a detailed discussion around Spark DataFrames and common operations. I love using cloud services for my machine learning, deep learning, and even big data analytics needs, instead of painfully setting up my own Spark cluster. I will be using the Databricks Platform for my Spark needs. Databricks is a company founded by the creators of Apache Spark that aims to help clients with cloud-based big data processing using Spark. Read more Also: Scaling relational databases with Apache Spark SQL and DataFrames

4 questions Uber's open source program office answers with data

It's been said that "Software is eating the world," and every company will eventually become a "software company." Since open source is becoming the mainstream path for developing software, the way companies manage their relationships with the open source projects they depend on will be crucial for their success. An open source program office (OSPO) is a company's asset to manage such relationships, and more and more companies are setting them up. Even the Linux Foundation has a project called the TODO Group "to collaborate on practices, tools, and other ways to run successful and effective open source projects and programs". Read more

Kernel: LWN on Linux 5.1 and More, 'Lake'-named Hardware

  • 5.1 Merge window part 1
    As of this writing, 6,135 non-merge changesets have been pulled into the mainline repository for the 5.1 release. That is approximately halfway through the expected merge-window volume, which is a good time for a summary. A number of important new features have been merged for this release; read on for the details.
  • Controlling device peer-to-peer access from user space
    The recent addition of support for direct (peer-to-peer) operations between PCIe devices in the kernel has opened the door for different use cases. The initial work concentrated on in-kernel support and the NVMe subsystem; it also added support for memory regions that can be used for such transfers. Jérôme Glisse recently proposed two extensions that would allow the mapping of those regions into user space and mapping device files between two devices. The resulting discussion surprisingly led to consideration of the future of core kernel structures dealing with memory management. Some PCIe devices can perform direct data transfers to other devices without involving the CPU; support for these peer-to-peer transactions was added to the kernel for the 4.20 release. The rationale behind the functionality is that, if the data is passed between two devices without modification, there is no need to involve the CPU, which can perform other tasks instead. The peer-to-peer feature was developed to allow Remote Direct Memory Access (RDMA) network interface cards to pass data directly to NVMe drives in the NVMe fabrics subsystem. Using peer-to-peer transfers lowers the memory bandwidth needed (it avoids one copy operation in the standard path from device to system memory, then to another device) and CPU usage (the devices set up the DMAs on their own). While not considered directly in the initial work, graphics processing units (GPUs) and RDMA interfaces have been able to use that functionality in out-of-tree modules for years. The merged work concentrated on support at the PCIe layer. It included setting up special memory regions and the devices that will export and use those regions. It also allows finding out if the PCIe topology allows the peer-to-peer transfers.
  • Intel Posts Linux Perf Support For Icelake CPUs
    With the core functionality for Intel Icelake CPUs appearing to be in place, Intel's open-source developers have been working on the other areas of hardware enablement for these next-generation processors. The latest Icelake Linux patches we are seeing made public by Intel is in regards to the "perf" subsystem support. Perf, of course, is about exposing the hardware performance counters and associated instrumentation that can be exercised by user-space when profiling performance of the hardware and other events.
  • What is after Gemini Lake?
    Based on a 10 nm manufacturing process, the Elkhart Lake SoC uses Tremont microarchitectures (Atom) [2] and features Gen 11 graphics similar to the Ice Lake processors [3]. Intel’s Gen 11 solution offers 64 execution units, and it has managed over 1 TFLOP in GPU performance [4]. This can be compared with the Nvidia GeForce GT 1030 which offered a peak throughput of 0.94 TFLOPs [5]. Code has already been added in the Linux mainline kernel [6] suggesting a possible Computex announcement and mid to late 2019 availability [7].

GNOME Desktop: Parental Controls and GNOME Bugzilla

  • Parental controls hackfest
    Various of us have been meeting in the Red Hat offices in London this week (thanks Red Hat!) to discuss parental controls and digital wellbeing. The first two days were devoted to this; today and tomorrow will be dedicated to discussing metered data (which is unrelated to parental controls, but the hackfests are colocated because many of the same people are involved in both).
  • GNOME Bugzilla closed for new bug entry
    As part of GNOME’s ongoing migration from Bugzilla to Gitlab, from today on there are no products left in GNOME Bugzilla which allow the creation of new tickets. The ID of the last GNOME Bugzilla ticket is 797430 (note that there are gaps between 173191–200000 and 274555–299999 as the 2xxxxx ID range was used for tickets imported from Ximian Bugzilla). Since the year 2000, the Bugzilla software had served as GNOME’s issue tracking system. As forges emerged which offer tight and convenient integration of issue tracking, code review of proposed patches, automated continuous integration testing, code repository browsing and hosting and further functionality, Bugzilla’s shortcomings became painful obstacles for modern software development practices. Nearly all products which used GNOME Bugzilla have moved to GNOME Gitlab to manage issues. A few projects (Bluefish, Doxygen, GnuCash, GStreamer, java-gnome, LDTP, NetworkManager, Tomboy) have moved to other places (such as freedesktop.org Gitlab, self-hosted Bugzilla instances, or Github) to track their issues.