• Amazon Announces New Spying Initiative for Alexa
    futurism.com
    You thought your little Alexa devices were a privacy nightmare before? Well, the situation has only gotten grimmer.As part of its rollout of the "Alexa+" generative AI update a phrase already weighted with dystopic portents Amazon is changing it so that none of the requests you make to the tiny-speaker-cum-virtual assistants can be stored and processed locally, .Now, all of that must be done on the Cloud. And that means that going forward, everything you tell Alexa will be stored forever on Amazon's servers.Once, users had the option to opt out of this, but no more. Last week, Amazon sent an email to customers confirming that the "Do Not Send Voice Recordings" setting will no longer be available starting on March 28."As we continue to expand Alexa's capabilities with generative AI features that rely on the processing power of Amazon's secure cloud, we have decided to no longer support this feature," Amazon wrote in the email, per Ars.The alarming change is as much an indication of Amazon's flagrant disregard for privacy as it is generative AI's voracious data appetite. In fact, the two are inextricably intertwined: it sounds like the e-commerce giant is gathering this information on the voices of millions of its customers to support its Alexa Voice ID feature, which you guessed it listens to your voice to identify who's speaking.But Amazon says that in reality, this change won't affect many customers because very few Alexa-equipped gadgets supported the ability to locally process voice recordings in the first place, those being the Echo Dot (4th Gen), Echo Show 10 and Echo Show 15. Overall, only 0.3 percent of Echo owners opted out of having their vocal data sent to Amazon servers, the company said.This is hardly a comforting detail. It just means that most Echo owners were already being listened in on because they never had control over their privacy to begin with.And Alexa's privacy track record, charitably put, is poor. The device has been repeatedly caught recording conversations not relevant to any of its functions, even sending chunks of these exchanges to random strangers. Call those flukes if you want, but Amazon employees listen to hundreds of Alexa conversations every day to train the system.Nonetheless, the company insists there's nothing shady going on."The Alexa experience is designed to protect our customers' privacy and keep their data secure, and that's not changing," an Amazon spokesperson said in a statement. "We're focusing on the privacy tools and controls that our customers use most and work well with generative AI experiences that rely on the processing power of Amazon's secure cloud."Share This Article
    0 Comments ·0 Shares ·2 Views
  • Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates
    thehackernews.com
    Mar 21, 2025Ravie LakshmananRansomware / BYOVDThe threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed to disable anti-malware tools.Elastic Security Labs said it observed a Medusa ransomware attack that delivered the encryptor by means of a loader packed using a packer-as-a-service (PaaS) called HeartCrypt."This loader was deployed alongside a revoked certificate-signed driver from a Chinese vendor we named ABYSSWORKER, which it installs on the victim machine and then uses to target and silence different EDR vendors," the company said in a report.The driver in question, "smuol.sys," mimics a legitimate CrowdStrike Falcon driver ("CSAgent.sys"). Dozens of ABYSSWORKER artifacts have been detected on the VirusTotal platform dating from August 8, 2024, to February 25, 2025. All the identified samples are signed using likely stolen, revoked certificates from Chinese companies.The fact that the malware is also signed gives it a veneer of trust and allows it to bypass security systems without attracting any attention. It's worth noting that the endpoint detection and response (EDR)-killing driver was previously documented by ConnectWise in January 2025 under the name "nbwdv.sys."Once initialized and launched, ABYSSWORKER is designed to add the process ID to a list of global protected processes and listen for incoming device I/O control requests, which are then dispatched to appropriate handlers based on I/O control code."These handlers cover a wide range of operations, from file manipulation to process and driver termination, providing a comprehensive toolset that can be used to terminate or permanently disable EDR systems," Elastic said.The list of some of the I/O control codes is below -0x222080 - Enable the driver by sending a password "7N6bCAoECbItsUR5-h4Rp2nkQxybfKb0F-wgbJGHGh20pWUuN1-ZxfXdiOYps6HTp0X"0x2220c0 - Load necessary kernel APIs0x222184 - Copy file0x222180 - Delete file0x222408 - Kill system threads by module name0x222400 - Remove notification callbacks by module name0x2220c0 - Load API0x222144 - Terminate process by their process ID0x222140 - Terminate thread by their thread ID0x222084 - Disable malware0x222664 - Reboot the machineOf particular interest is 0x222400, which can be used to blind security products by searching and removing all registered notification callbacks, an approach also adopted by other EDR-killing tools like EDRSandBlast and RealBlindingEDR.The findings follow a report from Venak Security about how threat actors are exploiting a legitimate-but-vulnerable kernel driver associated with Check Point's ZoneAlarm antivirus software as part of a BYOVD attack designed to gain elevated privilege and disable Windows security features like Memory Integrity.The privileged access was then abused by the threat actors to establish a Remote Desktop Protocol (RDP) connection to the infected systems, facilitating persistent access. The loophole has since been plugged by Check Point."As vsdatant.sys operates with high-level kernel privileges, attackers were able to exploit its vulnerabilities, bypassing security protections and antivirus software, and gaining full control of the infected machines," the company said."Once these defenses were bypassed, attackers had full access to the underlying system, the attackers were able to access sensitive information such as user passwords and other stored credentials. This data was then exfiltrated, opening the door for further exploitation."The development comes as the RansomHub (aka Greenbottle and Cyclops) ransomware operation has been attributed to the use of a previously undocumented multi-function backdoor codenamed Betruger by at least one of its affiliates.The implant comes with features typically associated with malware deployed as a precursor to ransomware, such as screenshotting, keylogging, network scanning, privilege escalation, credential dumping, and data exfiltration to a remote server."The functionality of Betruger indicates that it may have been developed in order to minimize the number of new tools dropped on a targeted network while a ransomware attack is being prepared," Broadcom-owned Symantec said, describing it as something of a departure from other custom tools developed by ransomware groups for data exfiltration."The use of custom malware other than encrypting payloads is relatively unusual in ransomware attacks. Most attackers rely on legitimate tools, living off the land, and publicly available malware such as Mimikatz and Cobalt Strike."Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments ·0 Shares ·2 Views
  • Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers
    thehackernews.com
    Mar 21, 2025Ravie LakshmananMalware / Cyber AttackTwo known threat activity clusters codenamed Head Mare and Twelve have likely joined forces to target Russian entities, new findings from Kaspersky reveal."Head Mare relied heavily on tools previously associated with Twelve. Additionally, Head Mare attacks utilized command-and-control (C2) servers exclusively linked to Twelve prior to these incidents," the company said. "This suggests potential collaboration and joint campaigns between the two groups."Both Head Mare and Twelve were previously documented by Kaspersky in September 2024, with the former leveraging a now-patched vulnerability in WinRAR (CVE-2023-38831) to obtain initial access and deliver malware and in some cases, even deploy ransomware families like LockBit for Windows and Babuk for Linux (ESXi) in exchange for a ransom.Twelve, on the other hand, has been observed staging destructive attacks, taking advantage of various publicly available tools to encrypt victims' data and irrevocably destroy their infrastructure with a wiper to prevent recovery efforts.Kaspersky's latest analysis shows Head Mare's use of two new tools, including CobInt, a backdoor used by ExCobalt and Crypt Ghouls in attacks aimed at Russian firms in the past, as well as a bespoke implant named PhantomJitter that's installed on servers for remote command execution.The deployment of CobInt has also been observed in attacks mounted by Twelve, with overlaps uncovered between the hacking crew and Crypt Ghouls, indicating some kind of tactical connection between different groups currently targeting Russia.Other initial access pathways exploited by Head Mare include the abuse of other known security flaws in Microsoft Exchange Server (e.g., CVE-2021-26855 aka ProxyLogon), as well as via phishing emails bearing rogue attachments and compromising contractors' networks to infiltrate victim infrastructure, a technique known as the trusted relationship attack. "The attackers used ProxyLogon to execute a command to download and launch CobInt on the server," Kaspersky said, highlighting the use of an updated persistence mechanism that eschews scheduled tasks in favor of creating new privileged local users on a business automation platform server. These accounts are then used to connect to the server via RDP to transfer and execute tools interactively.Besides assigning the malicious payloads names that mimic benign operating system files (e.g., calc.exe or winuac.exe), the threat actors have been found to remove traces of their activity by clearing event logs and use proxy and tunneling tools like Gost and Cloudflared to conceal network traffic.Some of the other utilities used are quser.exe, tasklist.exe, and netstat.exe for system reconnaissancefscan and SoftPerfect Network Scanner for local network reconnaissanceADRecon for gathering information from Active DirectoryMimikatz, secretsdump, and ProcDump for credential harvestingRDP for lateral movementmRemoteNG, smbexec, wmiexec, PAExec, and PsExec for remote host communicationRclone for data transferThe attacks culminate with the deployment of LockBit 3.0 and Babuk ransomware on compromised hosts, followed by dropping a note that urges victims to contact them on Telegram for decrypting their files."Head Mare is actively expanding its set of techniques and tools," Kaspersky said. "In recent attacks, they gained initial access to the target infrastructure by not only using phishing emails with exploits but also by compromising contractors. Head Mare is working with Twelve to launch attacks on state- and privately-controlled companies in Russia."The development comes as BI.ZONE linked the North Korea-linked threat actor known as ScarCruft (aka APT37, Reaper, Ricochet Chollima, and Squid Werewolf) to a phishing campaign in December 2024 that delivered a malware loader responsible for deploying an unknown payload from a remote server.The activity, the Russian company said, closely resembles another campaign dubbed SHROUDED#SLEEP that Securonix documented in October 2024 as leading to the deployment of a backdoor referred to as VeilShell in intrusions targeting Cambodia and likely other Southeast Asian countries.Last month, BI.ZONE also detailed continued cyber attacks staged by Bloody Wolf to deliver NetSupport RAT as part of a campaign that has compromised more than 400 systems in Kazakhstan and Russia, marking a shift from STRRAT.Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments ·0 Shares ·2 Views
  • Building Trust with Conversational AI: How to Avoid Common Pitfalls
    www.informationweek.com
    Kathryn Murphy, Senior Vice President of Product, TwilioMarch 21, 20254 Min Readhirun laowisit via Alamy StockTrust is the foundation of any relationship, whether between individuals or between businesses and their customers. Philosopher Friedrich Nietzsche once said, Im not upset that you lied to me, Im upset that from now on, I cant believe you.While his words may evoke thoughts of interpersonal relationships, they resonate equally in the business world, where trust in technology plays an increasingly vital role.The rise of conversational AI -- spanning chatbots and LLM-powered virtual agents -- is reimagining how people interact with businesses. This isnt just a fleeting trend; its a transformative shift. The market, valued at $5.8 billion in 2023, is projected to soar to $31.9 billion by 2028, according to IDC. That growth underscores the pivotal role this technology will play in redefining customer engagement for every business.But heres the catch: Trust is everything. One poor interaction can unravel months of goodwill, sowing seeds of doubt and eroding confidence. As Nietzsche cautioned, a single misstep can resonate deeply, and businesses can ill afford to lose the faith of their customers.The secondary challenge -- and what many businesses learned over the course of last year -- is that scaling a flashy conversational AI demo to meet the needs of a live customer environment is far from easy.Related:Below are some actionable tips for businesses to effectively build trust with their conversational AI customer engagement.Establish Clear, Customer-Centric GoalsWhen deploying conversational AI, even small missteps can lead to significant consequences, tarnishing a brands reputation and eroding customer trust. A strong foundation when implementing any AI solution begins with clear goal setting. Before rolling out their initiatives, businesses must prioritize the customer and recognize that AI is just a tool for enhancing their experience, rather than a solution in itself.Identify Potential Pain PointsOne of the most frequent sources of customer frustration lies in poor human-to-AI handoffs in conversational AI situations. When escalations lead to a loss of context or require customers to repeat information, their experience can quickly sour. To avoid this, businesses should establish clear protocols for transitioning conversations to live agents, ensuring all relevant information is seamlessly carried over. Without this, frustrations may escalate into doubts about the reliability of the service, jeopardizing trust altogether.Continuously Monitor to Improve ExperiencesRelated:Equally important is the practice of ongoing monitoring and optimization. By consistently collecting feedback, organizations can refine their conversational AI implementation, improving results and growing customer satisfaction. These efforts signal a commitment to continuous improvement, a cornerstone of building and maintaining trust.Feedback loops play a vital role in enhancing large language model (LLM) performance over time. Actively building and testing these loops, alongside robust escalation workflows, ensures customer concerns are addressed. A common misstep that organizations make is deploying AI systems that lack empathetic conversation management. Integrating AI-driven sentiment analysis can bridge this gap, allowing models to guide interactions with greater sensitivity.Minimize Bias Through PersonalizationTo provide a positive customer experience -- one that increases engagement and brand affinity -- businesses also need to ensure conversational AI solutions deliver consistent, unbiased and personalized support. With increasing levels of scrutiny paid to large language models and how information is culled, bias can be minimized by leveraging a customer data platform with unified profiles for a personalized experience.Related:For example, bias may surface if an AI agent provides differing responses based on perceived gender or cultural background, such as assuming certain tasks or preferences are linked to one gender. Regular audits are essential to identify and mitigate such issues, especially when this technology is still in its early stages. Adopting a test and learn approach can further refine these systems and create more authentic and human-like interactions.Lead With TransparencyTransparency is another cornerstone of building trust. Customers should always know when they are engaging with an AI agent. Clearly labeling these interactions not only prevents confusion but also aligns with ethical best practices, reinforcing the integrity of the customer experience.Should an organization fall victim to a scenario where AI systems fail to meet customer expectations, honesty is the best policy. Be truthful about the limitations or errors of AI and provide quick resolutions through escalation to live agents. Nobody wants to dramatically scream REPRESENTATIVE!!! to themselves and into the ether when looking for a solution to their concerns.Closing ThoughtsTrust, once broken, is challenging to regain. As Nietzsche reminds us, the erosion of trust leaves behind doubt, making it harder to rebuild relationships. For conversational AI, this means every interaction is an opportunity to strengthen -- or weaken -- customer confidence. By avoiding common pitfalls, prioritizing transparency, and continuously optimizing AI systems, businesses can build lasting trust and foster meaningful customer relationships.The call to action is clear: Businesses should begin by auditing their current conversational AI solutions, identifying gaps in trust-building measures, and implementing best practices that foster confidence and engagement from the very first interaction.About the AuthorKathryn MurphySenior Vice President of Product, TwilioKathryn Murphy has over 20 years of experience in product management, design and engineering with a deep domain in retail, commerce, payments, customer data platforms and multi-channel marketing. Kathryns focus has always been on using technology to improve the customer experience. As the SVP of Product and Design at Twilio, she leads the team focused on accelerating Twilios communications and data capabilities.See more from Kathryn MurphyReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    0 Comments ·0 Shares ·2 Views
  • Wicked Makes Streaming Debut - In Two Different Versions
    screencrush.com
    One of the most popular movies of 2024, is now available on streaming. (Sorry, I had a chance to make a Popular pun, and I took it. Hopefully youre not loathing me right now, okay okay Ill stop.)Wicked, the blockbuster adaptation of (one-half of) the hit Broadway musical, is now available on Peacock. The streaming service has actually made the film available in two different versions; the standard theatrical cut as well asWicked: Sing-Alongwhich features the lyrics to the shows onscreen and also includes an introduction from the films stars, Cynthia Erivo and Ariana Grande.The film arrives on streaming after a very successful run in theaters. All told,Wicked earned $473.2 million in U.S. theaters, plus another $266 million abroad, making it the fifth-biggest blockbuster of 2024 and the#1 film of the year that wasnt a sequel. (The other top-grossing titles of the year, in order, wereInside Out 2,Deadpool & Wolverine,Moana 2, andDespicable Me 4.)WICKEDUniversalloading...READ MORE: The movie, which remains extremely faithful to the Broadway show, is a prequel toThe Wizard of Oz, and imagines the early years and friendship of two of its witches, Glinda the Good (Erivo) and the Wicked Witch of the West (Erivo), who is depicted as a misunderstood outcast named Elphaba.The film only adapts the Broadway shows first act, and it is a little frustrating to only get half the story. Still, as I wrote in myreview, the material thatisin the movie is adapted with a lot of visual and technical flair, and the performers are absolutely first-rate...The entire productionproceeds in careful harmony. The sets byproduction designer Nathan Crowley are grand and beautiful; bigger and better than anything you can see on Broadway. (Fiyeros mission statement of a number, Dancing Through Life, gets a relocated to an elaborate library filled with bookshelves shaped like massive spinning drums,which are utilized for some truly impressive flips, spins, and slides.) The choreography byChristopher Scott takes advantage of the nimble camerawork and themassive ensemble of dancers. And director Jon M. Chu capturesall that movement with a variety of different camera tricks and techniques. (The comic two-hander Loathing is filled with clever split screens; One Short Day deploys a series of long-take POV shots to tour the elaborate Emerald City set and its dancing denizens.) Its a beautiful production thathonors the popular stage musical and blows it up to a blockbuster budget.Both the regular and sing-along versions ofWickedarestreaming now on Peacock. The secondhalf of the film,Wicked: For Good, is scheduled to open in theaters on November 21.Get our free mobile appLive-Action Movies Would Make Great Animated FilmsAn animated remake of a live-action movie? Someone should try it.
    0 Comments ·0 Shares ·3 Views
  • The Worst Movies Where Actors Played Multiple Roles
    screencrush.com
    Playing multiple roles in the same project is the kind of challenge thats attractive to any capital-A Actor eager to show off their range, and is completely doable in film, where, thanks to the wonders of modern technology, you can cut and paste the same person into the same scene as many times as you want even as completely different characters.In most cases, its just as fun for the audience as it is for the actor to watch someone taking on a bunch of different characters at once, whether theyre twins or lookalikes by happenstance, or even completely different people in different hair and makeup. Movies have been coming up with ways to double up on their cast basically since movies were invented, and with digital face-replacement and other modern marvels weve perfected the art of putting one person in multiple different places.There are those movies in which the concept of one person playing different people overshadows the rest of the project in a way thats distracting rather than exciting. Maybe the de-aging technology isnt up to snuff, or maybe the wig and facial prosthetics are too noticeable, or maybe the characters arent different enough to be told apart if youre not paying absolute close attention. In these movies, the doubling becomes a handicap rather than an asset, to the degree that all you remember as soon as it ends is how weird it was to watch that one guy play a bunch of different parts. Whether its just a little odd or downright cringe, these are the actors who might have been better suited playing just one of these parts.10 Actors Who Played Distractingly Bad Doubles in MoviesThese dual performances are doubly distracting.Gallery Credit: Emma StefanskyGet our free mobile appTerrible Movies That Won Academy Awards
    0 Comments ·0 Shares ·3 Views
  • The Download: saving the doomsday glacier, and Europes hopes for its rockets
    www.technologyreview.com
    This is today's edition ofThe Download,our weekday newsletter that provides a daily dose of what's going on in the world of technology. Inside a new quest to save the doomsday glacier The Thwaites glacier is a fortress larger than Florida, a wall of ice that reaches nearly 4,000 feet above the bedrock of West Antarctica, guarding the low-lying ice sheet behind it. But a strong, warm ocean current is weakening its foundations and accelerating its slide into the sea. Scientists fear the waters could topple the walls in the coming decades, kick-starting a runaway process that would crack up the West Antarctic Ice Sheet, marking the start of a global climate disaster. As a result, they are eager to understand just how likely such a collapse is, when it could happen, and if we have the power to stop it.Scientists at MIT and Dartmouth College founded Arte Glacier Initiative last year in the hope of providing clearer answers to these questions. The nonprofit research organization will officially unveil itself, launch its website, and post requests for research proposals today, timed to coincide with the UNs inaugural World Day for Glaciers, MIT Technology Review can report exclusively. Read the full story.James Temple Europe is finally getting serious about commercial rockets Europe is on the cusp of a new dawn in commercial space technology. As global political tensions intensify and relationships with the US become increasingly strained, several European companies are now planning to conduct their own launches in an attempt to reduce the continents reliance on American rockets. In the coming days, Isar Aerospace, a company based in Munich, will try to launch its Spectrum rocket from a site in the frozen reaches of Andya island in Norway. A spaceport has been built there to support small commercial rockets, and Spectrum is the first to make an attempt.Read the full story. Jonathan O'Callaghan Autopsies can reveal intimate health details. Should they be kept private? Jessica Hamzelou Over the past couple of weeks, Ive been following news of the deaths of actor Gene Hackman and his wife, pianist Betsy Arakawa. It was heartbreaking to hear how Arakawa appeared to have died from a rare infection days before her husband, who had advanced Alzheimers disease and may have struggled to understand what had happened. But as I watched the medical examiner reveal details of the couples health, I couldnt help feeling a little uncomfortable. Media reports claim that the couple liked their privacy and had been out of the spotlight for decades. But here I was, on the other side of the Atlantic Ocean, being told what pills Arakawa had in her medicine cabinet, and that Hackman had undergone multiple surgeries. Should autopsy reports be kept private? A persons cause of death is public information. But what about other intimate health details that might be revealed in a postmortem examination? Read the full story.This article first appeared in The Checkup, MIT Technology Reviews weekly biotech newsletter. To receive it in your inbox every Thursday, sign up here. The must-reads Ive combed the internet to find you todays most fun/important/scary/fascinating stories about technology. 1 Elon Musk will be briefed on the USs top-secret plans for war with ChinaDespite Teslas reliance on China, and SpaceXs role as a US defense contractor. (WSJ $) + Other private companies could only dream of having access to sensitive military data. (NYT $)2 Take a look inside the library of pirated books that Meta trains its AI on It considered paying for the books, but decided to use LibGen instead. (The Atlantic $)+ Copyright traps could tell writers if an AI has scraped their work. (MIT Technology Review)3 A judge has blocked DOGE from accessing social security systems She accused DOGE of failing to explain why it needed to see the private data of millions of Americans. (TechCrunch)+ Federal workers grilled a Trump appointee during an all-hands meeting. (Wired $)+ Can AI help DOGE slash government budgets? Its complex. (MIT Technology Review)4 The Trump administration is poised to shut down an anti-censorship fund The project, which helps internet users living under oppressive regimes, is under threat. (WP $)+ Tens of millions will lose access to secure and trusted VPNs. (Bloomberg $)+ Activists are reckoning with a US retreat from promoting digital rights. (MIT Technology Review)5 Tesla is recalling tens of thousands of CybertrucksAfter it used the wrong glue to attach its steel panels. (Fast Company $) +Its the largest Cybertruck recall to date. (BBC)6 This crypto billionaire has his sights set on the starsJed McCaleb is the sole backer of an ambitious space station project. (Bloomberg $) + Is DOGE going to come for NASA? (New Yorker $)7 The irresistible allure of Spotify Maybe algorithms arent all bad, after all. (Vox)+ By delivering what people seem to want, has Spotify killed the joy of music discovery? (MIT Technology Review)8 Dating apps and AI? Its complicated While some are buzzing at the prospect of romantic AI agents, others arent so sure. (Insider $) 9 Crypto bars are becoming a thing And Washington is the first casualty. (The Verge)10 The ways we use emojis is evolving Are you up to date? (FT $)Quote of the day It's an assault, and a particularly cruel one to use my work to train the monster that threatens the ruination of original literature. Author AJ West, whose books were included in the library of pirated material Meta used to train its AI model, calls for the company to compensate writers in a post on Bluesky. The big story Are we alone in the universe? November 2023The quest to determine if anyone or anything is out there has gained a greater scientific footing over the past 50 years. Back then, astronomers had yet to spot a single planet outside our solar system. Now we know the galaxy is teeming with a diversity of worlds. Were now getting closer than ever before to learning how common living worlds like ours actually are. New tools, including artificial intelligence, could help scientists look past their preconceived notions of what constitutes life.Future instruments will sniff the atmospheres of distant planets and scan samples from our local solar system to see if they contain telltale chemicals in the right proportions for organisms to prosper. But determining whether these planets actually contain organisms is no easy task. Read the full story.Adam Mann We can still have nice things A place for comfort, fun and distraction to brighten up your day. (Got any ideas? Drop me a line or skeet 'em at me.) + Get your weekend off to a good start with these beautiful nebulas.+ Justice for Mariah: a judge has ruled that she didnt steal All I Want For Christmas Is You from other writers.+ Were no longer extremely online any more apparentlyso what are we?+ The fascinating tale of White Mana, one of Americas oldest burger joints.
    0 Comments ·0 Shares ·2 Views
  • Prior & Partners to lead University of Leeds masterplan framework
    www.bdonline.co.uk
    AHMM also part of team working on 18-month commissionSource: ShutterstockUniversity of LeedsPrior + Partners has been appointed to lead the campus masterplan framework for the University of Leeds, following a three-stage public procurement process. The 18-month commission forms part of the universitys response to changing global expectations around the design and experience of academic campuses.The masterplanning team includes Allford Hall Monaghan Morris, DNCO, Alan Baxter Ltd, Expedition Engineering, Gardiner & Theobald, Evolve Digital Workplaces, and Kate McLaren Design. Re-form Landscape Architecture and Civic Engineers are also part of the team.The framework is intended to explore opportunities to improve the universitys physical estate and enhance the student experience, while supporting its role in the cultural, social and economic life of Leeds and the wider region.The university stated that the commission seeks to help future-proof the campus, ensuring it continues to meet the needs of students, staff and visitors over the coming decades.Jennifer Wilson, Director of Masterplanning, Asset Management & Sustainability at the University of Leeds, said: Reimagining our campus will deliver long-term change that will benefit the University and wider city. But most importantly, it is about creating a welcoming campus that supports the needs of students for years to come, invoking a sense of belonging and opportunity.>> Also read:KPF draws up masterplan to revamp Birmingham UniversityElise Baudon, Director of Masterplanning at Prior + Partners, said: As placemakers, were inspired by the fundamental role of universities in underpinning the identity of their home cities, helping to create dynamic economies, stronger communities and better futures. In the case of Leeds, our enthusiasm is only made greater by the many opportunities and assets this historic University and City has to offer.Were excited to be embarking on a collaborative journey with the University as well as our wider design team who bring extensive experience in shaping cities, places, buildings and spaces for universities, city authorities, and major institutional partners. This local, national and international track record will inform our understanding of and approach to the layers of social and built fabric in and around the campus at Leeds.
    0 Comments ·0 Shares ·2 Views
  • Planning reforms a red herring for unlocking economic growth, Arcadis cities boss says
    www.bdonline.co.uk
    Reforming the planning system as a means to unlock economic growth is a red herring, the UK cities director at Arcadis has said.Peter Hogg said the government had become fixated on the idea that supply side reforms to the planning system, including through legislation currently making its way through Parliament, would drive fundamental change to levels of investment in the UK.The Planning and Infrastructure Bill was broadly welcomed by built environment leaders when it was introduced to Parliament earlier this month. Itwill have its second reading in the House of Commons on Monday.Source: Connected PlacesPeter Hogg speaking at the Connected Places Summit yesterdayThe legislation proposes reducing the role of councillors and statutory consultees in making local planning decisions and is part of a wider shake-up of the planning system aiming to speed up approvals and stimulate economic growth.> Also read:Planning and Infrastructure Bill sets out radical shake-up of committee systemBut speaking at the Connected Places Summit in the City of London yesterday, Hogg said: I have a view that reforming the planning system as a key to unlocking growth and innovative development is a bit of a red herring.Actually, I think theres lots that could be done to make the existing planning system better.And I think there are things that can be done to make it better resourced and more effective for applicants, but I think the answer to a step change in what were able to deliver in this country does not rely on recent changes to the planning system.Hogg was speaking as part of a panel discussion at the conference with Graeme Craig, chief executive of Places for London, the development arm of Transport for London, and Royal Town Planning Institute (RPTI) chief executive Victoria Hills.Craig said the political alignment of Labour at local authority, mayoral and central government level on the need for more housing was more important than changes to the planning system in driving new development.As an organisation [Places for London] that I think is going to be doing more development than anyone in London over the next decade or two, I dont see planning as being the issue, Craig said, adding building more homes was something that has to be done.I think the single most useful thing this administration has done is to come in and say that it wants to see homes built.In London, there is a political alignment, and that alignment is strongly towards the growth, the building, the homes, the affordable homes that this city needs, and that, from a tonal point of view, to me, matters more than any legislative change.Hills, who was chief executive of the Old Oak and Park Royal Development Corporation before joining the RPTI, partly agreed with Hogg and Craig on the potential impact of the reforms on driving growth, but said they would mainly be felt through the perception it created for investors.Did we need a whole new Bill? Probably not. Are we getting it? Yes. So my point is, lets make the most of it, she said.When you speak with international investors, one of the first questions they have, and certainly one of the questions they had for me when I was running a mayoral development operation before I did this role was but tell me about the planning.I think its the perception of the government changing planning, even if the reality may be slightly different in certain plans, that will help investor confidence.The Planning and Infrastructure Bill includes measures to limit the size of planning committees, mandatory training for councillors who are members of planning committees and a new national scheme of delegation setting out which types of applications should be determined by planning officers and which should go to committee.In addition, the bill will introduce a system of spatial development strategies, which will introduce strategic planning across England with multiple local planning authorities working together to meet development and infrastructure needs. These plans will be produced by regional mayors or, in some cases, by local authorities.Other reforms to the planning system include last Decembers update to the National Planning Policy Framework which created the new grey belt landclass for development on poor quality areas of the green belt.
    0 Comments ·0 Shares ·5 Views
  • Google Sues Scammers Behind Thousands of Fake Business Listings on Maps
    www.cnet.com
    The company said scammers used these accounts to exploit people out of money.
    0 Comments ·0 Shares ·5 Views