The Hewlett and Packard collections had been appraised in 2005 at nearly $2 million and were part of a wider company archive valued at $3.3 million. However, those acquainted with the archives and the pioneering company's impact on the technology world said the losses can't be represented by a dollar figure... Karen Lewis, the former HP staff archivist who first assembled the collections, called it irresponsible to put them in a building without proper protection. Both Hewlett-Packard and Agilent earlier had housed the archives within special vaults inside permanent facilities, complete with foam fire retardant and other safeguards, she said. "This could easily have been prevented, and it's a huge loss," Lewis said.
Lewis has described the collection as "the history of Silicon Valley ... This is the history of the electronics industry." Keysight Technologies spokesman Jeff Weber said the company "is saddened by the loss of documents that remind us of our visionary founders, rich history and lineage to the original Silicon Valley startup."
23 Californians were killed in the fires, which also destroyed 6,800 homes, and Weber says Keysight had taken "appropriate and responsible" steps to protect the archive, but "the most destructive firestorm in state history prevented efforts to protect portions of the collection."
It's another example of the problems security companies face when they try to do business internationally, according to Reuters. "One reason Russia requests the reviews before allowing sales to government agencies and state-run companies is to ensure that U.S. intelligence services have not placed spy tools in the software."
Long-time Slashdot reader bbsguru has his own worries. "So, opening your code for review because it is demanded by a potential customer? What could possibly go wrong? HPE may find out, and the U.S. Military is among the many clients depending on the answer."
All these forms of cheating treat the owner of the device as an enemy of the company that made or sold it, to be thwarted, tricked, or forced into conducting their affairs in the best interest of the company's shareholders. To do this, they run programs and processes that attempt to hide themselves and their nature from their owners, and proxies for their owners (like reviewers and researchers). Increasingly, cheating devices behave differently depending on who is looking at them. When they believe themselves to be under close scrutiny, their behavior reverts to a more respectable, less egregious standard. This is a shocking and ghastly turn of affairs, one that takes us back to the dark ages.
-Dell Optiplex 5055 desktop PCs are expected to ship in the coming weeks.
-HP EliteDesk 705 desktop PCs are expected to ship in the coming weeks.
-Lenovo ThinkCentre M715 desktop PCs are expected to ship in the coming weeks.
-Lenovo ThinkPad A475 and A275 notebook PCs are expected in Q4 2017.
-Ryzen PRO mobile processors are scheduled for launch in the first half of 2018.
The global launch of the Ryzen Pro processors is not the only bit of news AMD announced. The company also announced the release of a new budget Threadripper 1900X model. From a report via TechRadar: AMD has released its 8-core Ryzen Threadripper 1900X processor, offering people who were put off by high price of the flagship 16-core Threadripper 1950X a chance to build a PC with all of the advanced Threadripper features for almost half the cash. As we expected, the Threadripper 1900X will come with eight cores clocked at 3.8GHz, with a turbo that reaches 4.0GHz (and an XFR boost to 4.2GHz), and will cost $549 -- almost half the Threadripper 1950X's $999 asking price, and a fair bit cheaper than the mid-range Threadripper 1920X, which costs $799. In fact, the price is within touching distance of the AMD Ryzen 7 1800X, which comes with eight cores and 16 threads, and costs $499.
Organizations such as Apache, Oracle, Cisco, Red Hat, Jenkins, VMWare, IBM, Intel, Adobe, HP, and SolarWinds , all issued security patches to fix their products. The Java deserialization flaw was so dangerous that Google engineers banded together in their free time to repair open-source Java libraries and limit the flaw's reach, patching over 2,600 projects. Now a similar issue was discovered in .NET. This research has been presented at the Black Hat and DEF CON security conferences. On page 5 [of this PDF], researchers included reviews for all the .NET and Java apps they analyzed, pointing out which ones are safe and how developers should use them to avoid deserialization attacks when working with JSON data.