Tech
NTT Data, Ericsson team to scale private 5G, physical AI for enterprises | Computer Weekly
Noting that as enterprises embed artificial intelligence (AI) across distributed environments, connectivity must evolve from a background utility into production-grade, lifecycle-managed infrastructure capable of supporting real-time, autonomous operations, Ericsson has embarked on a partnership with NTT Data to offer a standardised 5G-first architecture designed to operationalise AI at global scale.
The firms said their goal is to create a globally aligned deployment model spanning design, integration and lifecycle management under unified operational governance. This model will generate a “clear path” for enterprises to move from AI pilots to scalable, production-ready deployments across manufacturing, mining, ports, airports, energy, transportation and smart cities. They stated that together they can help enterprises move from pilots to globally scalable, production-ready solutions.
“Private 5G is the backbone for scaling AI in production, where autonomous systems must operate reliably and at scale, but integration complexity often remains the final hurdle,” said Alejandro Cadenas, associate vice-president of worldwide telco research at IDC, commenting on the challenges facing today’s businesses.
“The combined expertise of NTT Data and Ericsson integrates edge AI and physical AI with enhanced connectivity, overcoming operational, scalability and accountability challenges, and accelerating the deployment of AI.”
On a practical level, the partnership will combine Ericsson’s private 5G products and services and Wireless WAN solutions with NTT Data’s global systems integration, managed services expertise and vertical domain knowledge. This will be the fulcrum in delivering a connectivity infrastructure engineered for the performance, security and operational accountability that firms need, according to the companies. Edge AI and physical AI capabilities will be embedded directly into enterprise connectivity infrastructure, enabling real-time intelligence where data is generated and real-time, autonomous decision-making to result in AI-driven, outcome-focused transformation.
The partnership will focus on four priority areas: global private 5G managed services at scale; AI embedded directly into enterprise connectivity; repeatable industry solutions; and a unified global go-to-market.
In the former domain, NTT Data will act as one of Ericsson’s key global system integration and managed services providers, delivering private 5G as a fully managed service with consistent architecture, operations and security worldwide. In addition, NTT Data Edge AI agents will run on Ericsson’s enterprise Edge platforms, enabling real-time intelligence and autonomous decision-making where data is generated. Joint Ericsson and NTT Data sales, marketing and delivery will look to give enterprises a single, consistent path to deployment, reduce supplier complexity and speed time to value.
As regards to repeatable industry solutions, the firms assured that they will be able to deliver private 5G, edge AI and physical AI use cases across manufacturing, mining, ports, airports, energy, transportation and smart cities, helping enterprises to accelerate deployment and realise measurable ROI.
Looking at the expected key use cases supported by the partnership, the firms said that in manufacturing, they could support automated quality inspection, predictive maintenance and real-time safety monitoring using sensor and vision data.
Autonomous operations in transportation, ports and logistics could be driven by real-time vehicle and asset data for dynamic routing, tracking and safety while in energy and mining, the tech could see use for remote and autonomous operations, intelligent inspection and AI-driven monitoring in complex and hazardous environments.
Smart cities will also be capable of delivering intelligent traffic management, public safety monitoring and real-time optimisation of energy and municipal services, they said.
“As enterprises adopt AI at the edge, they need partners who can bring connectivity, intelligence and security together in a way that actually works in production,” said Shahid Ahmed, global head of edge services at NTT Data. “Private 5G gives enterprises the foundation they need to achieve real, measurable impact with edge AI and physical AI deployments.”
Asa Tamsons, Ericsson senior vice-president and head of business area enterprise wireless solutions, added: “This [partnership] extends [Ericsson’s enterprise connectivity] capability to support edge AI and physical AI at scale across industries. By combining our global platforms with NTT Data’s engineering and managed services, industry expertise and AI-driven operations, enterprises can move from experimentation to always-on, production-grade operations.”
Tech
Waymo Is Trying to Crack Down on Solo Kids in Driverless Cars
By law, autonomous vehicles aren’t legally allowed to carry unaccompanied minors in California. Waymo, Alphabet’s self-driving car company, doesn’t allow kids under 18 to ride alone anywhere outside of metro Phoenix, Arizona. But that hasn’t stopped some time-strapped parents from using their own accounts to transport their kids to school, extracurricular activities, and even social outings. Some have reported that the lack of drivers makes them feel safer.
Waymo is working to crack down on the practice, the company confirmed Friday, after reports of new mid-ride age-verification checks began to float around on social media. The company has “policies in place” to help it identify violations of its terms of service, Waymo spokesperson Chris Bonelli wrote in a statement to WIRED. “We are continuing to refine our system and processes for accuracy over time.” Violating its terms of service can lead to temporary or permanent suspension of an account, Waymo says.
The company uses cameras inside its cars to check that riders aren’t violating its rules. Its privacy policy notes that the company records video inside the vehicle during trips. Waymo says its support workers “may review video under certain circumstances,” and, “in more urgent circumstances,” access live video during a trip. The company says it does not use facial recognition or “other biometric identification technologies” to identify individuals.
The news comes a month after several California labor groups, including the California Gig Workers Union, filed a formal complaint with a state regulatory agency, accusing Waymo of violating the terms of its permit to operate in the state by knowingly transporting unaccompanied minors. The matter was assigned to a judge this week. The state is evaluating new rules that could allow solo riders under 18 in driverless cars, perhaps patterned after a program that permits ride-hail companies with human drivers to transport minors in California.
So far, several fresh-faced adults have been caught in the crossfire. On Tuesday, San Francisco machine learning engineer Nicholas Fleischhauer was about five minutes into his Waymo ride when the car connected him to support. A voice came over the line asking Fleischhauer to verify his age. He told the worker the truth: He’s 35. “I had messy and wet hair, and a backpack on me,” he says, by way of explaining why he might have been flagged by Waymo’s system. Plus, “people have told me that I look young for my age.” Fleischhauer says he takes Waymo weekly, but this marked the first time he had been asked about his age.
Since last summer, Waymo has allowed parents in the Phoenix area to set up teen accounts for riders ages 14 to 17. The accounts allow the teen riders’ adults to track their real-time locations during their trips. Waymo says a specially trained team of support agents deals with any issues its teen riders might have. Waymo says that “hundreds” of Phoenix families use the service each week.
In Waymo’s other markets across the US, adults are allowed to ride with guests under 18, though children under 8 must be in a secured car or booster seat.
Ethan S. Klein is 23, but his 26th LA Waymo ride on Thursday—plus the music he was listening to—was interrupted by an in-car call from a support agent who asked him, for the first time, to verify his birth date. Klein is an adult, but his first impulse was almost teen-like. “I was a little startled,” he says. “I thought I was in trouble!”
Tech
Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers
Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of Linux is setting off alarm bells as defenders scramble to ward off severe compromises inside data centers and on personal devices.
The vulnerability and exploit code that exploits it were released Wednesday evening by researchers from security firm Theori, five weeks after privately disclosing it to the Linux kernel security team. The team patched the vulnerability in versions 7.0, 6.19.12, 6.18.12, 6.12.85, 6.6.137, 6.1.170, 5.15.204, and 5.10.254) but few of the Linux distributions had incorporated those fixes at the time the exploit was released.
A Single Script to Hack Them All
The critical flaw, tracked as CVE-2026-31431 and the name CopyFail, is a local privilege escalation, a vulnerability class that allows unprivileged users to elevate themselves to administrators. CopyFail is particularly severe because it can be exploited with a single piece of exploit code—released in Wednesday’s disclosure—that works across all vulnerable distributions with no modification. With that, an attacker can, among other things, hack multi-tenant systems, break out of containers based on Kubernetes or other frameworks, and create malicious pull requests that pipe the exploit code through CI/CD work flows.
“‘Local privilege escalation’ sounds dry, so let me unpack it,” researcher Jorijn Schrijvershof wrote Thursday. “It means: An attacker who already has some way to run code on the machine, even as the most boring unprivileged user, can promote themselves to root. From there they can read every file, install backdoors, watch every process, and pivot to other systems.”
Schrijvershof added that the same Python script Theori released works reliably for Ubuntu 22.04, Amazon Linux 2023, SUSE 15.6, and Debian 12. The researcher continued:
Why does that matter on shared infrastructure? Because “local” covers a lot of ground in 2026: every container on a shared Kubernetes node, every tenant on a shared hosting box, every CI/CD job that runs untrusted pull-request code, every WSL2 instance on a Windows laptop, every containerised AI agent given shell access. They all share one Linux kernel with their neighbors. A kernel LPE collapses that boundary.
The realistic threat chain looks like this. An attacker exploits a known WordPress plugin vulnerability and gets shell access as www-data. They run the copy.fail PoC. They are now root on the host. Every other tenant is suddenly reachable, in the way I walked through in this hack post-mortem. The vulnerability does not get the attacker onto the box; it changes what happens in the next ten seconds after they land there.
The vulnerability stems from a “straight-line” logic flaw in the kernel’s crypto API. Many exploits exploiting race conditions and memory corruption flaws don’t consistently succeed across kernel versions or distributions, and sometimes even on the same machine. Because the code released for CopyFail exploits a logic flaw, “reliability isn’t probabilistic, and the same script works across distributions, researchers from Bugcrowd wrote. “No race window, no kernel offset.”
CopyFail gets its name because the authencesn AEAD template process (used for IPsec extended sequence numbers) doesn’t actually copy data when it should. Instead, it “uses the caller’s destination buffer as a scratch pad, scribbles 4 bytes past the legitimate output region, and never restores them,” Theori said. “The ‘copy’ of the AAD ESN bytes ‘fails’ to stay inside the destination buffer.”
The Worst Linux Vulnerability in Years
Other security experts echoed the perspective that CopyFail poses a serious threat, with one saying it’s the “worst make-me-root vulnerabilities in the kernel in recent times.”
The most recent such Linux vulnerability was Dirty Pipe from 2022 and Dirty Cow in 2016. Both of those vulnerabilities were actively exploited in the wild.
Tech
You Found Satoshi? Let’s See the Receipts
Two new projects, including one from a Pulitzer-winning reporter, claim they’ve solved the mystery of Bitcoin’s creator. So why does the hunt continue?
Source link
-
Business1 week agoFrance Ends Airport Transit Visa Requirement for Indian Travellers | Business – The Times of India
-
Fashion1 week agoCanada forms new advisory committee to strengthen US trade relations
-
Tech1 week agoThey Wanted to Join Raya. They’ve Been on the Waiting List for Years
-
Tech5 days agoA Brain Implant for Depression Is About to Be Tested in Humans
-
Tech5 days agoAlmost 90% of women leave tech industry within 10 years | Computer Weekly
-
Tech1 week agoWhy Do I Like Dyson’s PencilVac So Much?
-
Entertainment1 week agoAnne Hathaway makes shocking confession about Taylor Swift’s music
-
Sports1 week agoUS says Iran can play in Fifa World Cup but IRGC-linked individuals won’t be allowed
