Skip to main content

In the middle of the meltdown: One thing CrowdStrike and Microsoft can’t fix

A Blue Screen of Death on a television monitor at LaGuardia Airport in New York City.
A single Blue Screen of Death at LaGuardia didn't get close to foretelling how bad things would be on Sunday, July 21, 2024. Phil Nickinson / Digital Trend

I only saw one Blue Screen of Death on Sunday, July 21, across 15 hours of travel via two of the country’s biggest airports, just two days after a botched software update crippled millions of corporate computers running the Windows operating system.

“Maybe things are OK,” I remember thinking as my family took the first steps into New York’s LaGuardia Airport around 9 a.m. Headlines to the contrary on day 3 of the Great Windows Outage of 2024, the ticketing and baggage area didn’t look too bad.

Recommended Videos

I should have known better. I’d taken literally two steps inside the building before getting the first of about 3,000 delay emails from Delta over the course of the day, to go along with even more notifications from the Flighty and Fly Delta apps. This wasn’t going to be an easy run home from New York to Florida, something I’ve done dozens of times over the years.

A notification from the Flighty app on an Apple Watch.
The usually excellent Flighty App simply wasn’t designed to keep up with so many airframe swaps — these notifications came in multiple times an hour. Phil Nickinson / Digital Trends

I’m no stranger to flight delays. (I spent 15 hours in the Sky Club at LAX in late January — not something I recommend, despite how good it is.) But this one was different. Weather happens. Mechanical issues happen. They suck, but those all come down to safety. This time? A third-party security vendor botched a file inside of Windows. CrowdStrike should have caught it. Microsoft should have caught it. Neither did until it was too late. While the fix was relatively simple — boot into Safe Mode, or keep restarting the machine until the bad file was replaced — the first-order effects were immense.

It’s the second- and third-order effects where things really went wrong for the airlines. Delta was hit particularly hard — CEO Ed Bastian on Sunday wrote that more than 3,500 flights were canceled through Saturday, and many more on Sunday. “Please come see me at the podium if you need a hug,” our gate agent said around 4:30 p.m. on Sunday as the board refreshed to read CANCELED.

The scene from Gate A7 at Atlanta Hartsfield-Jackson International Airport late in the evening of July 21, 2024.
For many of us at Atlanta’s Hartsfield-Jackson International Airport, there was nothing to do but wait, and hope that the next flight wouldn’t be canceled. Phil Nickinson / Digital Trends

The line for the rebooking desk in the A concourse at Atlanta — one of seven terminals in the country’s busiest airport — was comically (or tragically) long. I sat with one earbud in, on hold with the airline reservation’s line for two hours before giving up. (My brother, who has much higher frequent flier status, at least managed to get a real person to tell him that there was no way I was getting out before midnight, and that the best thing to do was to stick to the assigned flight for now.)

Finally onboard in the early hours of Monday, July 22, a flight attendant gave us an idea of what was really throwing a wrench into things: Delta didn’t know where its crews were. That was confirmed later in the day in another news post from Delta, which said that more than half of its IT system runs Windows, and that additional sync time was required even after the affected machines were rebooted.

“Delta’s crews are fully staffed and ready to serve our customers,” the post continued. “But one of Delta’s most critical systems — which ensures all flights have a full crew in the right place at the right time — is deeply complex and is requiring the most time and manual support to synchronize.”

An in-flight entertainment screen on a Delta 757-200, waiting to leave Atlanta.
It was past midnight, but those of us who managed onto a Boeing 757-200 were plenty excited about it. Phil Nickinson / Digital Trends

We ultimately made it home at nearly 2 a.m. Tired. A little frazzled. But only about eight hours late, all told. We were fortunate. My brother spent some 30 hours in the Atlanta airport two days earlier, just trying to get home to Pensacola after aborting a trip to the West Coast. No flights. No one-way car rentals. Save for waiting, no other real options beyond someone driving five hours each way for a rescue.

Our stories were just two of thousands — and ours were relatively low-stakes. We didn’t have any kids traveling on their own. We weren’t out a ton of money, beyond a couple of meals we didn’t plan on having in an airport. Our bags made it on the same plane.

The immediate fix for the CrowdStrike failure was pretty simple. CrowdStrike and Microsoft need to have policies in place to mitigate the possibility of this happening again. (It will, of course, happen again.) But as the saying goes — and this is the PG-13 version — poop flows downhill. None of this was the airlines’ fault. But it quickly became their mess to clean up.

And that’s something a simple reboot can’t fix. Even if you do it more than 8 million times.

Phil Nickinson
Former Digital Trends Contributor
Phil spent the 2000s making newspapers with the Pensacola (Fla.) News Journal, the 2010s with Android Central and then the…
OpenAI opens up developer access to the full o1 reasoning model
The openAI o1 logo

On the ninth day of OpenAI's holiday press blitz, the company announced that it is releasing the full version of its o1 reasoning model to select developers through the company's API. Until Tuesday's news, devs could only access the less-capable o1-preview model.

According to the company, the full o1 model will begin rolling out to folks in OpenAI's "Tier 5" developer category. Those are users that have had an account for more than a month and who spend at least $1,000 with the company. The new service is especially pricey for users (on account of the added compute resources o1 requires), costing $15 for every (roughly) 750,000 words analyzed and $60 for every (roughly) 750,000 words generated by the model. That's three to four times the cost of performing the same tasks with GPT-4o.

Read more
The Dell G16 gaming laptop with RTX 4070 is $450 off right now
The Dell G16 7630 gaming laptop on a white background.

Gaming laptop deals that are truly worth buying usually don't come cheap, but if you look hard enough, you can find offers that will let you enjoy huge savings. Here's a great example: the Dell G16 with a $450 discount from Dell, which brings it down from $1,750 to a more reasonable $1,300. You're going to get amazing value at this price, but if you want to pocket the savings, you're going to have to rush into completing your purchase because we're not sure how much time is remaining before the bargain expires.

Why you should buy the Dell G16 gaming laptop
The Dell G16 gaming laptop is a pretty powerful device, as it runs on the 13th-generation Intel Core i9 processor, the Nvidia GeForce RTX 4070 graphics card, and 16GB of RAM. With these specifications, it won't have any trouble playing today's best PC games, and with its 1TB SSD, you'll have enough storage space for several AAA titles with all of their required updates and optional DLCs. The Dell G16 ships with Windows 11 Home, so you can start downloading and installing games right after unboxing.

Read more
The massive LastPass hack from 2022 is still haunting us
LastPass website on a laptop.

Just when you thought the LastPass breach of 2022 was over, we're still learning just how detrimental the hack was. According to blockchain expert ZachXBT and spotted by The Block, $5.36 million was stolen from 40 users in a string of attacks. This is on top of the $4.4 million stolen in October 2023 and $6.2 million earlier this year in February 2024.

The original hack goes back to 2022 when hackers claimed to have accessed LastPass' data, which contained API tokens, customer keys, multifactor authentication seeds (MFA), and encrypted password vaults. Although no official information explains how the breach happened, it's possible that the hacker responsible gained access to information that aided the breach. Hackers forced their way in despite the password vaults being encrypted because users reused weak or previously leaked combinations. This access, combined with the users' weak or reused passwords, led to the various accounts being compromised.

Read more