Skip to main content

Rivian Sues To Sell Its EVs Directly In Ohio

3 months ago
Rivian has filed a federal lawsuit in Ohio to challenge a state law preventing it from selling electric vehicles directly to consumers, arguing the rule is anti-competitive and outdated. The law currently protects legacy dealerships while allowing Tesla a special carve-out, and Rivian wants similar rights to apply for a direct-sales license in the state. TechCrunch reports: "Ohio's prohibition of Rivian's direct-sales-only business model is irrational in the extreme: it reduces competition, decreases consumer choice, and drives up consumer costs and inconvenience -- all of which harm consumers -- with literally no countervailing benefit," lawyers for the company wrote in the complaint. Rivian is asking the court to allow the company to apply for a dealership license so it can sell vehicles directly. Ohio customers have to buy from Rivian vehicles from locations in other states where direct sales are allowed. The cars are then shipped to Rivian service centers within Ohio. Allowing Rivian to sell directly would not be treading new legal ground, the company argues in its complaint. Tesla has had a license to sell in Ohio since 2013 and can sell directly to consumers. What's stopping Rivian is a 2014 law passed by the state's legislature. That law, which Rivian says came after an intense lobbying effort by the Ohio Automobile Dealers Association (OADA), effectively gave Tesla a carve-out and blocked any future manufacturers from acquiring the necessary dealership licenses. "Consumer choice is a bedrock principle of America's economy. Ohio's archaic prohibition against the direct-sales of vehicles is unconstitutional, irrational, and harms Ohioans by reducing competition and choice and driving up costs and inconvenience," Mike Callahan, Rivian's chief administrative officer, said in a statement.

Read more of this story at Slashdot.

BeauHD

Hyundai To Help Build Nuclear-Powered Datacenter In Texas

3 months ago
Fermi America is planning to build a colossal AI datacenter complex in Amarillo, Texas, powered by up to six gigawatts of nuclear energy. According to The Register, the company has selected Hyundai to support the deployment of the "HyperGrid," describing it as the "world's largest advanced energy campus." From the report: The project is backed by Rick Perry, who served as Texas governor and US Energy Secretary, and investor Toby Neugebauer, and aims to establish Texas as the US's largest energy and intelligence campus. Construction of the first of four Westinghouse AP1000 reactors is set to begin next year in Amarillo with the plant funneling behind-the-meter power to GPU bit barns by 2032, at least that's according to a memorandum of understanding (MoU). In other words, there is no guarantee the 23 million square meter project (1.1 MilliWales) will actually be built in its entirety, but if it is, Hyundai will oversee it. "This agreement is significant in that it allows us to participate from the early stages of this project and contribute to the creation of the world's largest integrated energy and artificial intelligence campus, which leverages a diverse range of energy infrastructure," Hyundai said in a canned statement. At the very least, Hyundai knows what it's doing when it comes to nuclear developments. The industrial giant has led the deployment of some 22 reactors. Ambitious as the project may be, it won't be cheap. A single AP1000 reactor was estimated to cost $6.8 billion two years ago. That's a lot of money, but nothing compared to what the hyperscalers and neo-clouds are pumping into datacenters these days. Meta, for reference, expects to spend $66-72 billion on bit barns this year. [...] How exactly Fermi America or its founders Perry and Neugebauer expect to pay for one AP1000 reactor, let alone four, isn't clear. [...]

Read more of this story at Slashdot.

BeauHD

CrowdStrike Investigated 320 North Korean IT Worker Cases In the Past Year

3 months ago
An anonymous reader quotes a report from CyberScoop: North Korean operatives seeking and gaining technical jobs with foreign companies kept CrowdStrike busy, accounting for almost one incident response case or investigation per day in the past year, the company said in its annual threat hunting report released Monday. "We saw a 220% year-over-year increase in the last 12 months of Famous Chollima activity," Adam Meyers, senior vice president of counter adversary operations, said during a media briefing about the report. "We see them almost every day now," he said, referring to the North Korean state-sponsored group of North Korean technical specialists that has crept into the workforce of Fortune 500 companies and small-to-midsized organizations across the globe. CrowdStrike's threat-hunting team investigated more than 320 incidents involving North Korean operatives gaining remote employment as IT workers during the one-year period ending June 30. CrowdStrike researchers found that Famous Chollima fueled that pace of activity with an assist from generative artificial intelligence tools that helped North Korean operatives maneuver workflows and evade detection during the hiring process. "They use generative AI across all stages of their operation," Meyers said. The insider threat group used generative AI to draft resumes, create false identities, build tools for job research, mask their identity during video interviews and answer questions or complete technical coding assignments, the report found. CrowdStrike said North Korean tech workers also used generative AI on the job to help with daily tasks and manage various communications across multiple jobs -- sometimes three to four -- they worked simultaneously. Threat hunters observed other significant shifts in malicious activity during the past year, including a 27% year-over-year increase in hands-on-keyboard intrusions -- 81% of which involved no malware. Cybercrime accounted for 73% of all interactive intrusions during the one-year period. CrowdStrike continues to find and add more threat groups and clusters of activity to its matrix of cybercriminals, nation-state attackers and hacktivists. The company identified 14 new threat groups or individuals in the past six months, Meyers said. "We're up to over 265 named adversary groups that we track, and then 150 what we call malicious activity clusters," otherwise unnamed threat groups or individuals under development, Meyers said.

Read more of this story at Slashdot.

BeauHD