The Upload: Your tech news briefing for Monday, April 13

Robot stuck in nuclear reactor... Microsoft demos industrial IoT play... Pivotal open-sources in-memory database

A robot developed by the International Research Institute for Nuclear Decommissioning (IRID) and Hitachi-GE Nuclear Energy rolls on the floor in a demonstration. On Friday, it began probing inside the primary containment vessel of the No. 1 reactor at Japan's crippled Fukushima Dai-ichi nuclear plant, which suffered meltdowns following the 2011 earthquake and tsunami.

A robot developed by the International Research Institute for Nuclear Decommissioning (IRID) and Hitachi-GE Nuclear Energy rolls on the floor in a demonstration. On Friday, it began probing inside the primary containment vessel of the No. 1 reactor at Japan's crippled Fukushima Dai-ichi nuclear plant, which suffered meltdowns following the 2011 earthquake and tsunami.

Transforming robot gets stuck in nuclear reactor

The ability to change shape hasn't saved a robot probe from getting stuck inside a crippled Japanese nuclear reactor. On Friday, the utility sent in the pipe-crawling, snake-like robot, which can transform itself into several configurations depending on the terrain, to determine the state and location of melted-down fuel in the reactor.

Microsoft, robot firm demo industrial IoT based on Windows

In Germany this week, Microsoft and industrial robot maker Kuka Robotics are showing a robot arm that can stream movement data to Microsoft's Azure cloud computing platform for human staff overseeing production. Microsoft has its eye on the industrial Internet of Things space, and aims to show how Azure and Windows can serve as underlying computing and communication technologies.

Pivotal sets the stage for open-source in-memory computing

Pivotal has followed through on a promise to open-source its data analysis software and released the source code that powers its GemFire in-memory database. Opening up the code could give enterprise customers more input into what new features are added into future versions. The company hopes the move will also help the software find a wider user based among customers looking for big data analysis technologies speedier than Hadoop or Spark.

Rules are rules: Net neutrality published to Federal Register

The U.S. Federal Communications Commission's new rules governing the Internet were published over the weekend to the Federal Register, starting the clock on the 60-day period after which the regulator's order becomes effective. The new rules apply to both fixed and mobile broadband Internet access services. A raft of lawsuits opposing the regulations are expected.

Hacker group targets Southeast Asia and India

A hacker group dubbed APT (Advanced Persistent Threat) 30 has targeted Southeast Asia and India since 2005, according to a new report, which speculates that the group could be backed by the Chinese government. The group is said to have hacked journalists, companies and government agencies, and its choice of targets suggest an interest in information that could be of interest to the Chinese government, particularly on border disputes, according to security firm FireEye.

Sprint hopes personal delivery will give it a smartphone edge

Sprint will deliver smartphones to customers and help them set up and transfer data from their older phones, in a bid to get an edge over its rivals. The wireless operator is starting in Kansas on Monday with its Direct 2 U program, which will be extended this year across the U.S., and will employ about 5,000 workers delivering gear in their Sprint-branded cars.

Health IT vendors hit for making it hard to exchange patient data

Electronic health records vendors make the process of sharing patient information too expensive and complicated for hospitals and doctors, says a report from the U.S. government agency that oversees the country's health IT efforts. The Office of the National Coordinator for Health Information Technology said health IT vendors charge high fees to set up interfaces for hospitals and labs to share patient data, and force customers to use proprietary technology and refuse to publish APIs.

Watch now

Five rules of Apple Watch etiquette, per re/code.

One last thing

Are small-time home repair guys about to get disrupted out of a decent living by big tech companies? The New York Times looks at how Amazon and Google want to get their cut out of home services.

Join the CSO newsletter!

Error: Please check your email address.

Tags amazon.comGoogleMicrosoftPivotalsecurityU.S. Federal Communications CommissionsoftwaregovernmentKuka Robotics

More about AdvancedAppleAPTFederal Communications CommissionFireEyeGoogleMicrosoftPivotalSprintTechnology

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by IDG News Service staff

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place