0 Kommentare
0 Anteile
175 Ansichten
Verzeichnis
Verzeichnis
-
Please log in to like, share and comment!
-
THEHACKERNEWS.COMSOC Analysts - Reimagining Their Role Using AIThe job of a SOC analyst has never been easy. Faced with an overwhelming flood of daily alerts, analysts (and sometimes IT teams who are doubling as SecOps) must try and triage thousands of security alertsoften false positivesjust to identify a handful of real threats. This relentless, 24/7 work leads to alert fatigue, desensitization, and increased risk of missing critical security incidents. Studies show that 70% of SOC analysts experience severe stress, and 65% consider leaving their jobs within a year. This makes retention a major challenge for security teams, especially in light of the existing shortage of skilled security analysts.On the operational side, analysts spend more time on repetitive, manual tasks like investigating alerts, and resolving and documenting incidents than they do on proactive security measures. Security teams struggle with configuring and maintaining SOAR playbooks as the cyber landscape rapidly changes. To top this all off, tool overload and siloed data force analysts to navigate disconnected security platforms, creating not only inconvenience, but more critically, missed correlations between events that might have helped identify true positives. AI-Powered Threat Actors - Yikes!The above is compounded by the fact that threat actors are leveraging AI to power their cybercrime. By processing vast amounts of data rapidly, AI enables them to launch more effective, adaptive, and difficult-to-detect attacks at scale. AI tools generate highly convincing phishing emails, deepfake content, and social engineering scripts, making deception much easier even for inexperienced attackers. They can also use AI to write sophisticated malware, reverse engineer security mechanisms and automate vulnerability discovery by analyzing large codebases for exploitable flaws. Additionally, AI-driven chatbots impersonate real users, conduct large-scale fraud, and for newbies, provide step-by-step cybercrime guidance. According to a 2024 CrowdStrike report, attackers have reduced the average breakout time for successful intrusions from 79 minutes to 62 minutes, with the fastest known breakout time being just two minutes and seven seconds. Even with the best detection tooling and dozens of analysts available (a dream scenario) the sheer volume and velocity of today's cyberattacks still requires SOC teams to move faster than ever and somehow manually review and triage the insane amount of alerts being generated. This has been literally a mission impossible. But not anymore. The Modern SOC Strikes Back - A Perfect Blend of AI and Human-in-the-LoopIf you are a SOC analyst or a CISO, you know I was not exaggerating on how dire the situation is. But the tide is turning. New AI tooling for SOCs will enable human teams to process any type and any volume of security alerts, allowing them to focus on handling real threats in record time. Here's a glimpse of what some early adopters are experiencing. Automated TriageMany vendors are now offering automated triage of security alerts which significantly reduces the number of alerts that human analysts have to investigate. While multiple vendors offer automated triage for specific use cases such as phishing, endpoint, network and cloud (with the triage playbook created by human security professionals) the ideal scenario is for an AI-powered SOC analyst that can interpret any type of security alert from any sensor or defense system. This way, all security events, from the most common to the most obscure, can be fully triaged. Transparency plays a big role here as well, with the actual logic of the AI triage (down to each and every step taken) being readily available for a human analyst to review if desired. Full Control Over Response to Real Threats While an AI-powered SOC platform generates an accurate response appropriate to the specific threat (providing similar value to a SOAR without all the configuration and maintenance headache), it's important to have a human-in-the-loop to review the suggested remediation and the ability to accept, modify or immediately execute it. ChatGPT (or DeepSeek) Joins the TeamLeveraging generative AI allows SOC teams to research emerging threats, the latest attack methods and the best practices for combatting them. Tools like ChatGPT are incredible for rapidly ramping up on practically any topic, security included and will definitely make it easier for analysts to access and easily learn about relevant solutions in a timely manner. Data Querying, Log Interpretation and Anomaly DetectionSOC analysts no longer need to struggle with querying syntax. Instead, they can use natural language to find the data they need and when it comes to understanding the significance of a particular log or dataset, AI solutions can provide instant clarification. When analyzing an aggregate data set of thousands of logs, built-in anomaly detection aids in identifying unusual patterns that might warrant further investigation.More Data for Data-Hungry AI. Without an Insane Bill. AI tools are data-hungry because they rely on vast amounts of information to learn patterns, make predictions, and improve their accuracy over time. However, traditional data storage can be very cost-prohibitive. Upcoming technologies have made it possible to rapidly query logs and other data from ultra-affordable cold storage such as AWS S3. This means that these AI-powered SOC platforms can rapidly access, process and interpret the vast amounts of data for them to automatically triage alerts. Likewise, for humans. As a CISO or VP Security you can now fully control your data without any vendor lock-in, while giving your analysts rapid querying capabilities and unlimited retention for compliance purposes.Everything Will Just Move Faster In the last century, social interactions were far slowerif you wanted to connect with someone, you had to call their landline and hope they answered, send a letter and wait days for a response, or meet in person. Fast forward to 2024, and instant messaging, social media, and AI-driven communication have made interactions immediate and seamless. The same transformation is happening in security operations. Traditional SOCs rely on manual triage, lengthy investigations, and complex SOAR configurations, slowing down response times. But with AI-powered SOC solutions, analysts no longer have to sift through endless alerts or manually craft remediation steps. AI automates triage, validates real threats, and suggests precise remediation, drastically reducing workload and response times. AI is reshaping SOC operationsenabling faster, smarter, and more effective security at scale.In summary, SOC analysts struggle with alert volumes, manual triage, and escalating cyber threats, leading to burnout and inefficiencies. Meanwhile, threat actors are leveraging AI to automate attacks, making rapid response more critical than ever. The good news is that the modern SOC is evolving with AI-powered triage, automated remediation, and natural language-driven data querying, allowing analysts to focus on real threats instead of tedious processes. With AI the SOC is becoming faster, smarter, and more scalable. Interested in learning more? Download this guide to learn more how to make the SOC more efficient, or take an interactive product tour to learn more about AI SOC analysts.Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.0 Kommentare 0 Anteile 177 Ansichten
-
THEHACKERNEWS.COMDeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys LeakedJan 30, 2025Ravie LakshmananArtificial Intelligence / Data PrivacyBuzzy Chinese artificial intelligence (AI) startup DeepSeek, which has had a meteoric rise in popularity in recent days, left one of its databases exposed on the internet, which could have allowed malicious actors to gain access to sensitive data.The ClickHouse database "allows full control over database operations, including the ability to access internal data," Wiz security researcher Gal Nagli said.The exposure also includes more than a million lines of log streams containing chat history, secret keys, backend details, and other highly sensitive information, such as API Secrets and operational metadata. DeepSeek has since plugged the security hole following attempts by the cloud security firm to contact them.The database, hosted at oauth2callback.deepseek[.]com:9000 and dev.deepseek[.]com:9000, is said to have enabled unauthorized access to a wide range of information. The exposure, Wiz noted, allowed for complete database control and potential privilege escalation within the DeepSeek environment without requiring any authentication.This involved leveraging ClickHouse's HTTP interface to execute arbitrary SQL queries directly via the web browser. It's currently unclear if other malicious actors seized the opportunity to access or download the data."The rapid adoption of AI services without corresponding security is inherently risky," Nagli said in a statement shared with The Hacker News. "While much of the attention around AI security is focused on futuristic threats, the real dangers often come from basic riskslike the accidental external exposure of databases.""Protecting customer data must remain the top priority for security teams, and it is crucial that security teams work closely with AI engineers to safeguard data and prevent exposure."DeepSeek has become the topic du jour in AI circles for its groundbreaking open-source models that claim to rival leading AI systems like OpenAI, while also being efficient and cost-effective. Its reasoning model R1 has been hailed as "AI's Sputnik moment."The upstart's AI chatbot has raced to the top of the app store charts across Android and iOS in several markets, even as it has emerged as the target of "large-scale malicious attacks," prompting it to temporarily pause registrations.In an update posted on January 29, 2025, the company said it has identified the issue and that it's working towards implementing a fix.At the same time, the company has also been at the receiving end of scrutiny about its privacy policies, not to mention its Chinese ties becoming a matter of national security concern for the United States.Furthermore, DeepSeek's apps became unavailable in Italy shortly after the country's data protection regulator requested information about its data handling practices and where it obtained its training data. It's not known if the withdrawal of the apps was in response to questions from the watchdog.Bloomberg, The Financial Times, and The Wall Street Journal have also reported that both OpenAI and Microsoft are probing whether DeepSeek used OpenAI's application programming interface (API) without permission to train its own models on the output of OpenAI's systems, an approach referred to as distillation."We know that groups in [China] are actively working to use methods, including what's known as distillation, to try to replicate advanced US AI models," an OpenAI spokesperson told The Guardian.Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE0 Kommentare 0 Anteile 177 Ansichten
-
WWW.INFORMATIONWEEK.COMData Thefts: Indecent Exposure to RiskJon Polenberg, Shareholder, Becker & Poliakof January 30, 20254 Min ReadBrain light via Alamy StockA Pennsylvania healthcare system agreed to pay $65 million to patients who had their medical photographs and personal information posted on the internet after the provider declined to pay ransom demands from a threat actor in an attack last year. The $65 million settlement stands as a stark warning to businesses that protecting data is a critical task. Failing to do so will be expensive.Todays technology landscape makes it challenging for businesses to protect their data.Lehigh Valley Health Network, a 13-hospital organization, received an ultimatum to pay up or have patient data plastered across the internet. LVHN declined to pay the ransom, and the threat actor kept their promise. They released over the internet personal medical records and undressed patient images taken for diagnostic purposes.But Lehigh Valley Health Network was not alone. Businesses across the US face the same risks: from January to June2024, there were an average of 14 reported ransomware attacks each day. It is also becoming difficult for companies to pay their way out of a ransomware crisis as federal guidelines have made paying a ransomware threat actor more difficult. The Treasury Departments Office of Foreign Assets Control (OFAC) released an advisory in 2021 that stated American companies that pay ransoms to threat actors on the Specially Designated Nationals and Blocked Persons List or in sanctioned jurisdictions may face civil penalties and liability imposed by the federal government.Related:In other words, giving into ransom demands may invite the federal governments wrath. But refusing to pay may invite the wrong side in a lawsuit. Putting aside the rock-and-a-hard-place dilemma, many companies lack a plan for what to do when a ransomware attack hits.Building an Incident Response PlanJust as companies need to prepare for extreme weather events and supply chain disruptions resulting from them, similar forethought is necessary for dealing with a ransomware or cyberattack. How will the company identify the attack, what are the initial steps to take, who will lead the response team, what advisors will they call, and what will prevent further harm?Cyber-attacks are tricky. It can be weeks or months before a company discoversa vulnerability exists, meaning that companies may already be behind the eight ball in responding when they discover the attack occurred.But whether an attack has been percolating for minutes or months, the incident response plan provides a structure and creates systems for teams to respond quickly and effectively. The data exfiltration from a ransomware attack exposes companies vulnerabilities.Related:The first step is always assessing the damage. The response team must evaluate the attack to identify its extent, which may require hiring a third-party cybersecurity company to forensically understand the breach and its implications.Prisons, hospitals, utility companies, and other life-and-death service providers that find themselves under attack may require more urgent response capabilities. For most other companies without an immediate life safety issue, it may make more sense to take time to assess how long ago the attack occurred and what it will take to restore the systems.Without this diligence, businesses put themselves further at risk; if they return too quickly to their systems backup capabilities without understanding the timeline of the attack, they may not know whether the breach infiltrated the backup system too. Restoring the network using an infected backup would not only fail to cure the attack, but it may also exacerbate the threat and increase the ransom demands. But without the capability to restore the system from backups,a company may have less options in dealing with a ransomware attack.Related:Managing After an AttackBetween the third-party negotiators and insurance coverage, there may be a way to financially manage the attack. There are third-party providers that negotiate with ransomware threat actors, and some insurance companies cover for ransomware attacks.For other victims, paying the ransom themselves may be the only way out. While doing so may come up against OFAC guidance, the federal government may limit liability for companies that cooperate with them. While theres no guaranteed exit ramp or roadmap here, industry associations are working to create guidance for companies that find themselves stuck in this dilemma.The bigger issue companies face post-attack is managing the fallout. In the US, each state manages data breach disclosure differently, so a company's legal obligation and the liability may change depending on where they operate.Ransoms are high, breach-related settlements are high, and the reputational damage is high. As a result, cyberattacks are becoming more expensive each year,and insuring against ransomware attacks has become more difficult.Diligent data protection is the best defense companies have. Organizations that are cautious about how they collect and store data will have less risk than those that are lackadaisical. Companies that dont risk falling susceptible to an ever-rising financial threat.About the AuthorJon PolenbergShareholder, Becker & Poliakof Jon Polenberg is a shareholder at Becker & Poliakoff. As an established litigation attorney in state and federal courts, as well as pursuing alternative dispute resolution methods such as arbitration on behalf of his clients, Jon is client-focused while maintaining the highest professional standards.See more from Jon PolenbergNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeWebinarsMore WebinarsReportsMore Reports0 Kommentare 0 Anteile 172 Ansichten
-
WWW.INFORMATIONWEEK.COMCISOs Are Gaining C-Suite Swagger, but Has It Come With a Cost?TechTarget and Informa Techs Digital Business Combine.TechTarget and InformaTechTarget and Informa Techs Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.CISOs Are Gaining C-Suite Swagger, but Has It Come With a Cost?CISOs Are Gaining C-Suite Swagger, but Has It Come With a Cost?The number of CISOs who report directly to the CEO is up sharply in recent years, but many still say it's not enough to secure adequate resources.Dark Reading, Staff & ContributorsJanuary 30, 20251 Min ReadTongRo Images via Alamy StockAfter years of leaning into learning the ethos of business leadership and risk management, chief information security officers (CISOs) have gotten their seat at the boardroom table and the power to make decisions. But even so, many say their jobs are more arduous than ever, and that's not how it was supposed to happen.A full 82% ofCISOs who respondedto a recent survey from Splunk said they report directly to the CEO, up from just 47% in 2023. In addition, 83% said they participate regularly in board meetings. For their part, CISOs have had to skill up in kind,honing communications skillsandlearning the boardroom lingoof KPIs and ROI, not to mention become more familiar withlegalandcomplianceconcerns. In other words, the scope of theCISO role has expandedfar beyond just IT security.Read the Full Article on Dark ReadingAbout the AuthorDark ReadingStaff & ContributorsDark Reading: Connecting The Information Security CommunityLong one of the most widely-read cybersecurity news sites on the Web, Dark Reading is also the most trusted online community for security professionals. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals.See more from Dark ReadingNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeWebinarsMore WebinarsReportsMore Reports0 Kommentare 0 Anteile 171 Ansichten
-
WWW.TECHNOLOGYREVIEW.COMThree questions about the future of US climate tech under TrumpThis article is from The Spark, MIT Technology Reviews weekly climate newsletter. To receive it in your inbox every Wednesday, sign up here. Donald Trump has officially been in office for just over a week, and the new administration has hit the ground running with a blizzard of executive orders and memos. Some of the moves could have major effects for climate change and climate technologiesfor example, one of the first orders Trump signed signaled his intention to withdraw from the Paris Agreement, the major international climate treaty. The road map for withdrawing from the Paris agreement is clear, but not all the effects of these orders are quite so obvious. Theres a whole lot of speculation about how far these actions reach, which ones might get overturned, and generally what comes next. Here are some of the crucial threads that Im going to be following. Will states be able to set their own rules on electric vehicles? Its clear that Donald Trump isnt a fan of electric vehicles. One of the executive orders issued on his first day in office promised to eliminate the electric vehicle (EV) mandate. The federal government under Biden didnt actually have an EV mandate in placerather, Trump is targeting national support programs, including subsidies that lower the cost of EVs for drivers and support building public chargers. But thats just the beginning, because the executive order will go after states that have set their own rules on EVs. While the US Environmental Protection Agency does set some rules around EVs through what are called tailpipe standards, last year California was granted a waiver that allows the state to set its own, stricter rules. The state now requires that all vehicles sold there must be zero-emissions by 2035. More than a dozen states quickly followed suit, setting a target to transition to zero-emissions vehicles within the next decade. That commitment was a major signal to automakers that there will be demand for EVs, and a lot of it, soon. Trump appears to be coming after that waiver, and with it Californias right to set its own targets on EVs. Well likely see court battles over this, and experts arent sure how its going to shake out. What will happen to wind projects? Wind energy was one of the most explicit targets for Trump on the campaign trail and during his first few days in office. In one memo, the new administration paused all federal permits, leases, and loans for all offshore and onshore wind projects. This doesnt just affect projects on federal lands or watersnearly all wind projects typically require federal permits, so this could have a wide effect. Even if the order is temporary or doesnt hold up in court, it could be enough to chill investment in a sector thats already been on shaky ground. As I reported last year, rising costs and slow timelines were already throwing offshore wind projects off track in the US. Investment has slowed since I published that story, and now, with growing political opposition, things could get even rockier. One major question is how much this will slow down existing projects, like the Lava Ridge Wind Project in Idaho, which got the green light from the Biden administration before he left office. As one source told the Washington Post, the new administration may try to go after leases and permits that have already been issued, but there may be insufficient authority to do so. What about the money? In an executive order last week, the Trump administration called for a pause on handing out the funds that are legally set aside under the Inflation Reduction Act and the Bipartisan Infrastructure Law. That includes hundreds of billions of dollars for climate research and infrastructure. This week, a memo from the White House called for a wider pause on federal grants and loans. This goes way beyond climate spending and could affect programs like Medicaid. Theres been chaos since that was first reported; nobody seems to agree on what exactly will be affected or how long the pause was supposed to last, and as of Tuesday evening, a federal judge had blocked that order. In any case, all these efforts to pause, slow, or stop federal spending will be a major source of fighting going forward. As for effects on climate technology, I think the biggest question is how far the new administration can and will go to block spending thats already been designated by Congress. There could be political consequencesmost funds from the Inflation Reduction Act have gone to conservative-leaning states. As I wrote just after the election in November, Donald Trumps return to office means a sharp turn for the US on climate policy, and were seeing that start to play out very quickly. Ill be following it all, but Id love to hear from you. What do you most want to know more about? What questions do you have? If you work in the climate sector, how are you seeing your job affected? You can email me at casey.crownhart@technologyreview.com, message me on Bluesky, or reach me on Signal: @casey.131. Now read the rest of The Spark Related reading EVs are mostly set for solid growth this year, but what happens in the US is still yet to be seen, as my colleague James Temple covered in a recent story. The Inflation Reduction Act set aside hundreds of billions of dollars for climate spending. Heres how the law made a difference, two years in. For more on Trumps first week in office, check out this news segment from Science Friday (featuring yours truly). STEPHANIE ARNETT/ MIT TECHNOLOGY REVIEW | RAWPIXEL Another thing DeepSeek has stormed onto the AI scene. The company released a new reasoning model, called DeepSeek R1, which it claims can surpass the performance of OpenAIs ChatGPT o1. The model appears to be incredibly efficient, which upends the idea that huge amounts of computing power, and energy, are needed to drive the AI revolution. For more, check out this story on the company and its model from my colleague Caiwei Chen, and this look at what it means for the AI industry and its energy claims from James ODonnell. Keeping up with climate A huge surge in clean energy caused Chinas carbon emissions to level off in 2024. Whether the countrys emissions peak and begin to fall for good depends on what wins in a race between clean-energy additions and growth in energy demand. (Carbon Brief) In a bit of good news, heat pumps just keep getting hotter. The appliances outsold gas furnaces in the US last year by a bigger margin than ever. (Canary Media) Heres everything you need to know about heat pumps and how they work. (MIT Technology Review)People are seeking refuge from floods in Kentuckys old mountaintop mines. Decades ago, the mines were a cheap source of resources but devastated local ecosystems. Now people are moving in. (New York Times) An Australian company just raised $20 million to use AI to search for key minerals. Earth AI has already discovered significant deposits of palladium, gold, and molybdenum. (Heatmap News) Some research suggests a key ocean current system is slowing down, but a new study adds to the case that theres no cause to panic yet. The new work suggests that the Atlantic Meridional Overturning Circulation, or AMOC, hasnt shown long-term weakening over the past 60 years. (Washington Post) Efforts to observe and understand the currents have shown theyre weirder and more unpredictable than expected. (MIT Technology Review)Floating solar panels could be a major resource in US energy. A new report finds that federal reservoirs could hold enough floating solar to produce nearly 1,500 terawatt-hours of electricity, enough to power 100 million homes each year. (Canary Media) What sparked the LA wildfires is still a mystery, but AI is hunting for clues. Better understanding of what causes fires could be key in efforts to stop future blazes. (Grist)0 Kommentare 0 Anteile 157 Ansichten
-
WWW.TECHNOLOGYREVIEW.COMThis quantum computer built on server racks paves the way to bigger machinesA Canadian startup called Xanadu has built a new quantum computer it says can be easily scaled up to achieve the computational power needed to tackle scientific challenges ranging from drug discovery to more energy-efficient machine learning. Aurora is a photonic quantum computer, which means it crunches numbers using photonic qubitsinformation encoded in light. In practice, this means combining and recombining laser beams on multiple chips using lenses, fibers, and other optics according to an algorithm. Xanadus computer is designed in such a way that the answer to an algorithm it executes corresponds to the final number of photons in each laser beam. This approach differs from one used by Google and IBM, which involves encoding information in properties of superconducting circuits. Aurora has a modular design that consists of four similar units, each installed in a standard server rack that is slightly taller and wider than the average human. To make a useful quantum computer, you copy and paste a thousand of these things and network them together, says Christian Weedbrook, the CEO and founder of the company. Ultimately, Xanadu envisions a quantum computer as a specialized data center, consisting of rows upon rows of these servers. This contrasts with the industrys earlier conception of a specialized chip within a supercomputer, much like a GPU. But this work, which the company published last week in Nature, is just a first step toward that vision. Aurora used 35 chips to construct a total of 12 quantum bits, or qubits. Any useful applications of quantum computing proposed to date will require at least thousands of qubits, or possibly a million. By comparison, Googles quantum computer Willow, which debuted last year, has 105 qubits (all built on a single chip), and IBMs Condor has 1,121. Devesh Tiwari, a quantum computing researcher at Northeastern University, describes Xanadus progress in an analogy with building a hotel. They have built a room, and Im sure they can build multiple rooms, he says. But I dont know if they can build it floor by floor. Still, he says, the work is very promising. Xanadus 12 qubits may seem like a paltry number next to IBMs 1,121, but Tiwari says this doesnt mean that quantum computers based on photonics are running behind. In his opinion, the number of qubits reflects the amount of investment more than it does the technologys promise. Photonic quantum computers offer several design advantages. The qubits are less sensitive to environmental noise, says Tiwari, which makes it easier to get them to retain information for longer. It is also relatively straightforward to connect photonic quantum computers via conventional fiber optics, because they already use light to encode information. Networking quantum computers together is key to the industrys vision of a quantum internet where different quantum devices talk to each other. Auroras servers also dont need to be kept as cool as superconducting quantum computers, says Weedbrook, so they dont require as much cryogenic technology. The server racks operate at room temperature, although photon-counting detectors still need to be cryogenically cooled in another room. Xanadu is not the only company pursuing photonic quantum computers; others include PsiQuantum in the US and Quandela in France. Other groups are using materials like neutral atoms and ions to construct their quantum systems. From a technical standpoint, Tiwari suspects, no single qubit type will ever be the winner, but its likely that certain qubits will be better for specific applications. Photonic quantum computers, for example, are particularly well suited to Gaussian boson sampling, an algorithm that could be useful for quickly solving graph problems. I really want more people to be looking at photonic quantum computers, he says. He has studied quantum computers with multiple qubit types, including photons and superconducting qubits, and is not affiliated with a company. Isaac Kim, a physicist at the University of California, Davis, points out that Xanadu has not demonstrated the error correction ability many experts think a quantum computer will need in order to do any useful task, given that information stored in a quantum computer is notoriously fragile. Weedbrook, however, says Xanadus next goal is to improve the quality of the photons in the computer, which will ease the error correction requirements. When you send lasers through a medium, whether its free space, chips, or fiber optics, not all the information makes it from the start to the finish, he says. So youre actually losing light and therefore losing information. The company is working to reduce this loss, which means fewer errors in the first place. Xanadu aims to build a quantum data center, with thousands of servers containing a million qubits, in 2029.0 Kommentare 0 Anteile 162 Ansichten
-
WWW.BDONLINE.CO.UKCartwright Pickard working up plans for 2,300-bed student accommodation scheme in ManchesterReplacement of existing 1990s accommodation to contain two towers up to 30 storeysCartwright Pickards designs for the Cambridge road schemeCartwright Pickard is working up plans for a 2,300-bed student accommodation scheme in Manchester.The replacement of two existing 1990s student blocks on Cambridge road is being designed for Manchester Metropolitan University (MMU) and Unite Students.Images released as part of a first round of consultation this week show two clusters of buildings arranged around central squares, with towers rising to 24 and 30 storeys.The existing buildings, which contain around 770 beds, will be demolished to make way for the new scheme, which will have an increase of 1,560 beds compared to the sites current accommodation.Cartwright Pickard is said to have looked at the potential for a refurbishment of the existing buildings but this was not considered viable given their current state and poor energy and thermal efficiency.The scheme will also include a gym, yoga studio, two games areas and potential wellbeing and retail spaces on Cambridge Street.The project team includes planning consultant Turley, structural engineer Waterman Group and landscape architect Reform.MMU, which is forecast to have more than 120,000 full time students by 2028-29 with demand for student accommodation rising at 2% a year, said it currently has a shortfall of around 3,200 student beds.Manchester has a significant undersupply of student accommodation, currently ranking second behind London as the city with the highest student-to-bed ratio.Other major student accommodation schemes in development in the city include the University of Manchesters 5,000-bed redevelopment of its Fallowfield campus, which is being designed by Sheppard Robson, Hawkins Brown and Simpson Haugh.0 Kommentare 0 Anteile 158 Ansichten
-
WWW.ARCHITECTSJOURNAL.CO.UKAllies and Morrison and Asif Khan unveil Barbican revamp plansPlans and details for the 225 million five-year programme of works, which include major upgrades to indoor and outdoor public spaces, were put on public display this morning (30 January). A planning application is expected to be submitted this summer.The jointly designed scheme will see the Lakeside, Foyer and Conservatory spaces overhauled with accessibility, environmental and structural improvements, while removing more recent internal additions to the Grade II-listed centre, such as lighting.Complete restoration of the Conservatory glasshouse will open the space for the public full-time following the works, when new stairs and lifts will give access to upper levels of the Conservatory.AdvertisementA separate events space also features in the proposals, with a pavilion-like structure set to occupy a fourth floor level looking over the greenery.Currently, the Conservatory is only open on Sundays. The AJ understands about 20 per cent of the current glass roof is damaged and at the end of its lifespan. Glazing will be replaced and recycled as part of the job.In the Foyer, removal of a mezzanine would reveal the Barbican Centres iconic concrete columns and double-height main spaces, the plans suggest, while improving wayfinding and circulation.There will also be improved lighting, tech upgrades and better accessibility, include more toilets.In the Lakeside area, fountains will be upgraded to provide better cooling in summer and the brickwork will be replaced with new waterproofing underneath.AdvertisementPhilippa Simpson, director of buildings and renewal at the Barbican, said: The Barbican has always been about renewal, a beacon of an optimistic future in the wake of the Second World War. This project is rooted in the vision and ambition of its founders, to reimagine what an arts centre can be in the 21st century a vital, creative space for everyone.She continued: This consultation is vital to ensuring the plans reflect the needs of audiences, while celebrating the history and heritage of this special site.In December, the City of London Corporation approved an allocation of 191 million for the Allies and Morrison and Asif Khan Studios revamp of the Barbican Centre. The AJ understands about 20 per cent still needs to be found.Allies and Morrison and Asif Khan Studio beat four other teams to land that major refurbishment job in 2022, when it was then valued at up to 150 million. Engineers Buro Happold and landscape designers Harris Bugg Studio are also working on the scheme.The Barbican Centre was designed by Chamberlin, Powell and Bon and opened in 1982. In 2001 it was Grade II-listed alongside the rest of the Brutalist estate.Allford Hall Monaghan Morris (AHMM) completed a 12.6 million overhaul of the complex in 2006 before creating a 3.4 million street-level cinema complex. Ruff Architects carried out an environmental upgrade of the centres main art gallery in 2019.Three years ago Diller Scofidio + Renfros 288 million, 14-storey London Centre for Music on the Museum of London site was axed in favour of an upgrade to the Barbican Centre.Subject to planning permission, construction is expected to begin in 2027, with a first phase complete in time for the Barbicans 50th anniversary in 2032.0 Kommentare 0 Anteile 139 Ansichten
-
WWW.ARCHITECTSJOURNAL.CO.UKBuilding safety backlog: only two higher-risk buildings approved under new regimeA Freedom of Information (FOI) request by safety consultancy Project Four revealed that the BSR has approved 11 applications out of 130 since it started assessing schemes in October 2023.But the Health and Safety Executive, which oversees the BSR, later confirmed that nine of those projects approved were in flight schemes submitted before the new regime came into force. According to the AJs sister title Construction News, these were taken over by BSR from two private building control firms: AIS Surveyors, which went into liquidation; and Assent Building Control, which failed to sign up to the new register.Out of the rest of the 130 applications considered by BSR, seven were rejected and 11 deemed invalid. A further nine were withdrawn and the BSR requested more information on 13, while 79 remain under review.AdvertisementSince last April, construction on a higher-risk building (HRB) cannot start until the BSR approves detailed construction plans, at a stop point known as gateway two. A building is classed as an HRB when it is at least 18m or seven storeys tall, with at least two residential units.More on this topicBuilding Safety Act impacts: We really need to talk about gatewaysA BSR spokesperson told Construction News that new-build applications in particular contain a lot of detail often thousands of plans and drawings.They added: However, sometimes this is not the pertinent detail and frequently [an application] does not include any accompanying explanation as to how these plans, drawings or reports demonstrate compliance with the building regulations.The regulator has received many more applications to perform building work on existing HRBs. Out of 1,449 applications, the BSR has only approved 249 17 per cent. It has rejected 66, deemed 403 invalid and asked for more information on 189. The BSR is currently determining 452 applications to make changes to existing HRBs.The FOI response also revealed how long the BSR has taken on average to determine applications, amid criticism the body is taking too long to process applications.AdvertisementThe average time taken to determine an application is 18.4 weeks. Applications to start construction on existing HRBs took the longest, at 18.8 weeks. Applications for new HRBs were determined within 16.3 weeks.The BSR takes longer on average than the timescales within which it should determine applications, at eight weeks for existing HRBs and 12 weeks for new-build HRBs.Project Four managing director Max Meadows said it was great to have some clarity from the BSR on gateway two sign-off.But he added: Were finding our review periods for [gateway two] are significantly higher than the average duration noted lets hope approvals and review period figures improve to keep construction moving.The BSR spokesperson said: [What] BSR would like to see is much more interpretation of how the raw information supports the application. This is particularly true for structural and fire requirements where BSR has found many applications lack clarity on how the requirements of the building regulations have been reached.Commonly we are told further information or analysis can be provided later on. However, the whole ethos of the BSR regime is that this information should be part of the [gateway two] package and BSR therefore cannot approve on that basis.2025-01-30Richard Waitecomment and share0 Kommentare 0 Anteile 139 Ansichten