• OpenAI CEO Sam Altman says the company is out of GPUs
    techcrunch.com
    In BriefPosted:12:21 PM PST February 27, 2025Image Credits:Eugene Gologursky / Getty Images for the New York TimesOpenAI CEO Sam Altman says the company is out of GPUsOpenAI CEO Sam Altman said that the company was forced to stagger the rollout of its newest model, GPT-4.5, because OpenAI is out of GPUs.In a post on X, Altman said that GPT-4.5, which he described as giant and expensive, will require tens of thousands more GPUs before additional ChatGPT users can gain access. GPT-4.5 will come first to subscribers to ChatGPT Pro starting Thursday, followed by ChatGPT Plus customers next week. Perhaps in part due to its enormous size, GPT-4.5 is wildly expensive. OpenAI is charging $75 per million tokens (~750,000 words) fed into the model and $150 per million tokens generated by the model. Thats 30x the input cost and 15x the output cost of OpenAIs workhorse GPT-4o model. Weve been growing a lot and are out of GPUs, Altman wrote. We will add tens of thousands of GPUs next week and roll it out to the Plus tier then [] This isnt how we want to operate, but its hard to perfectly predict growth surges that lead to GPU shortages.Altman has previously said that a lack of computing capacity is delaying the companys products. OpenAI hopes to combat this in the coming years by developing its own AI chips, and by building a massive network of datacenters.Topics
    0 Comments ·0 Shares ·25 Views
  • Foundry Releases Nuke 16.0
    www.awn.com
    Leading M&E creative software developerFoundryhas just released Nuke 16.0, with features that will transform compositing and review workflows by speeding up review and cutting time spent on repetitive tasks, reducing pipeline inefficiencies.Next-level compositing workflowsTo help artists spend less time on repetitive tasks and more time on creativity, Nuke 16.0 introduces native variable-enabled workflows, making multi-shot compositing a seamless, intuitive part of compositing in Nuke. In a major update to compositing workflows, these updates give artists the option to apply changes to multiple shots at once within the same script. At its core, Graph Scope Variables unlock a powerful new way of compositing, enabling artists and studios to efficiently manage multiple shots, sequences, and variations without duplications.Juan Salazar, Director of Product, Compositing and Finishing at Foundry, says, Nuke was first developed around a single-shot compositing workflow. Now, over 25 years later, deadlines continue to get tighter while shot volume and complexity climbs. Our goal is to relieve some of the pressure compositors face, and enable them to spend more time on their artistry and less time manually applying changes to shots. Nuke 16.0s new multi-shot workflow features will enable new ways of working for studios of all sizes; we cant wait to see them in use. Collaboration and creative control, at speedImprovements in Nuke 16.0 will save time when working across the Node Graph, BlinkScript, and the timeline, for better team collaboration and efficiency.Refinements to the roto node bring performance improvements when working with roto at scale, with enhanced playback, motion blur, and interactivity responsiveness. Working in the Node Graph is now faster and smoother too, giving artists the ability to view and edit the contents of Groups without opening a new tab, while new Link Nodes enable simultaneous changes to nodes.With major improvements to the feedback loop, VFX Supervisors and VFX editors working from the Nuke Studio or Hiero timeline can approve and deliver shots faster than before. New Multichannel Soft Effects help supervisors audition shots and clearly communicate creative intent. The Contact Sheet allows for quick and easy shot comparison, and Quick Export makes exporting from the timeline up to 12 times faster.Nuke 16.0 is also making BlinkScript easier to use, and a more powerful and intuitive tool for artists and studios to adopt. With these updates artists can read, write, and troubleshoot their code with ease, for distinct custom effect creation thats more accessible than ever.Christy Anzelmo, Chief Product Officer at Foundry, says, The new features in Nuke are set to have a huge impact on day-to-day compositing and review workflows. Our priority is to empower artists and their teams to deliver work theyre proud of, saving time and energy on repetitive tasks, allowing them to free up time and focus on creativity.Details of Whats New in Nuke 16.0Multi-shot workflowsGraph Scope Variables: Create a context that applies to multiple shots or part of the script. Apply single scripts to multiple shots or entire sequences based on variables.Variables Panel: Full visibility when working across multiple shots, for artists to easily interact with the available Variables in a script.VariableSwitch node: Similar to the Switch node but enables you to create split and join workflows based on the variables set for your multishot workflow.VariableGroup node: Convenient Node Graph grouping for working with variables.GSV in LiveGroups: Work in one group across multiple scripts, with other artists working in different sections or shots of the same script.GSV command-line render: Specify variables in the command line, and send different shots to your renderfarms.Artist toolsGroup Node internal view: See and edit the contents of Groups and LiveGroups within the same Node Graph.Link nodes: Create linked copies of nodes and have changes updated in both nodes, whilst optionally being able to override any of the knobs.Roto performance improvements: Improved performance when working with roto at scale, including playback, motion blur performance, and improved interactivity.3D System (Beta)Core node improvements: UI updates based on artist feedback and new snap controls for faster geo and pivot manipulation.GeoConstrain node: New constraint types, the ability to constrain to faces and vertices, or offset constraints in time and space.GeoXformPrim node: Create and edit Xforms in your USD stage to help streamline scene management.ScanlineRender2: A new ray tracing-based architecture with improvements to sampling, motion blur, AOV outputs and more.USD version 24.05: To keep your pipeline integrations running smoothly.BlinkScriptNew and improved BlinkScript Editor: Formatting changes, error handling updates, keyboard shortcuts, and more that make it easier to create innovative custom effects.BlinkScript Library Files: Artists can now write their own functions for common operations and read these files into multiple BlinkScripts.BlinkScript Safety Rails: Catch and report operations that could cause problems when run directly on the underlying processor.Timeline toolsQuick Export: Exporting from the timeline is now up to 12 times faster.Multichannel Soft Effects: More control from the timeline with new mask-enabled Soft Effects that make it easier to audition shots and convey creative intent with artists.Contact Sheet: Provides a flexible viewing environment for easier shot review, populated via the choice of two modes Pick Mode or Tag Mode.Source: Foundry Dan Sarto is Publisher and Editor-in-Chief of Animation World Network.
    0 Comments ·0 Shares ·18 Views
  • USAF Leverages Bambu Lab 3D Printers for Attack Drone Maintenance
    3dprintingindustry.com
    The 432nd Wing at Creech Air Force Base has integrated Bambu Lab 3D printers into its MQ-9 Reaper military drone maintenance training. The Clark County, Nevada US Air Force (USAF) installation recently added two X1 Carbon desktop FDM systems to a new on-site additive manufacturing facility.Over 800 maintenance personnel from the 432nd Wing, known as the Hunters, are stationed at Creech Air Force Base and other locations worldwide. At the 3.6-square-mile facility, they are responsible for maintaining and operating MQ-1 Predator and MQ-9 Reaper unmanned combat aerial vehicles (UCAVs). The team will reportedly use its new technology to remedy MQ-9 spare parts shortages, which have previously caused financial and logistics challenges that negatively impacted training.In an official press release, Creech Air Force Base claimed that the future of 3D printing within the military presents many groundbreaking applications. Use-cases include diagnosing aircraft damage and 3D printing replacement parts at the point of need. This is said to streamline maintenance options with minimized downtime.Kennon Nichols, supervisor for the MQ-9 Air Force Engineering and Technical Services (AFETS) team, was reportedly critical in getting the 3D printing project off the ground. Working alongside Col. Joseph Deporter, 432nd Maintenance Group commander, Nichols secured funding for the bases new capabilities. He has also helped design some spare parts required for MQ-9 maintenance training.You have to find innovative ways to overcome obstacles by thinking outside the box, Nichols stated. Our team, along with Col. Deporter worked hard to find a solution to the problem with the spirit of innovation. Deported added that the Bambu Lab X1 Carbon 3D printers will allow the bases maintainers to learn their craft at a higher level.Bambu Lab X1 Carbon 3D printers installed at Creech Air Force Base. Photo via US Air Force/Renee Blundon3D printing MQ-9 Reaper drone partsCreech Air Force Bases 3D printing project faced some initial issues that delayed the projects launch. Despite this, it officially rolled out the new 3D printing capabilities in December last year.Remington Young, an MQ-9 AFETS specialist in airframe propulsion and generation equipment, played a key role in constructing the new additive manufacturing facility. He also oversees and mentors engineers operating the Bambu Lab systems.An Air Force veteran with an aircraft maintenance background, Young received his first 3D printer as a Christmas present in 2016. He believes Creechs new capabilities have the potential to save both lives and money during operations. The technology takes what was a $10,000 dollar part in the past and allows it to be printed at high-speed for $15. Its the future, Young added.An MQ-9 Reaper sits below a hangar before taxi to the flightline on Creech Air Force Base. Photo via US Air Force/Staff Sgt. Jake Jacobsen.Another key figure in 432nd Wings new initiative is Eric Pavelka. The MQ-9 Avionics senior equipment specialist coordinates all 3D printing projects on the base. He is also responsible for managing the facilities inventory and layout, ensuring required components are readily available during maintenance training.There are a lot of rules when it comes to money and what were actually able to purchase, but we all came to the consensus of a legitimate need for printers because we could see the added benefits that it would provide for all of our training, explained Pavelka.Kennon Nichols poses for a photo amid his 3D modeling work used for training MQ-9 aircraft maintainers. Photo via US Air Force/Renee Blundon.Additive manufacturing for defenseThe US Department of Defense is increasingly investing in additive manufacturing to strengthen domestic supply chains and restock depleting inventories.This is particularly true for remotely piloted military drones. Earlier this month, San Diego-based drone manufacturer Firestorm Labs received a $100 million USAF contract to support the development and procurement of 3D printed Unmanned Aerial Vehicles.Leveraging its additive manufacturing technology, Firestorm aims to address operational needs in combat environments impacted by fragmented supply chains. Its approach centers on scalability and rapid deployment. The companys xCell, semi-automated 3D printing unit unlocks localized manufacturing near the front lines, reducing reliance on centralized manufacturing hubs and cutting lead times.2025 has also seen Alabama-based aerospace and defense manufacturer Cummings Aerospace complete flight trials for its 3D printed turbojet-powered loitering munition. The companys Hellhound S3 is a kamikaze drone designed to deliver long-range, precision strikes against vehicles, tanks, and fortified positions.Cummings munition was developed to equip the US Armys Infantry Brigade Combat Teams (IBCTs) with portable combat power equivalent to an Armored Brigade. Weighing under 25 pounds, the vehicle, launch canister, and ground control system offer deadly fire and forget capabilities for individual soldiers operating on the front lines.Who won the 2024 3D Printing Industry Awards?Subscribe to the 3D Printing Industry newsletter to keep up with the latest 3D printing news.You can also follow us on LinkedIn, and subscribe to the 3D Printing Industry Youtube channel to access more exclusive content.Featured image shows Erik Pavelka operating a Bambu Lab X1 Carbon 3D printer at Creech Air Force Base. Photo via US Air Force/Renee Blundon.
    0 Comments ·0 Shares ·18 Views
  • AI Research Overcomes Strength-Ductility Challenge in Ti-6Al-4V Alloy
    3dprintingindustry.com
    A research team led by Professor Seungchul Lee from the Korea Advanced Institute of Science and Technology (KAIST), the nations first research-oriented graduate school in science and technology, and by Professor Hyoung Seop Kim from POSTECH, which had 900 researchers in 2024, utilized artificial intelligence to address the strength-ductility trade-off in Ti-6Al-4V alloy. By predicting mechanical properties and offering uncertainty data, the approach enabled the production of metal products with superior strength and ductility.In this study, by optimizing the 3D printing process parameters and heat treatment conditions, we were able to develop a high-strength, high-ductility Ti-6Al-4V alloy with minimal experimentation trials. Compared to previous studies, we produced an alloy with a similar ultimate tensile strength but higher total elongation, as well as that with a similar elongation but greater ultimate tensile strength, said Professor Lee.The study, published in Nature Communications, was funded by the National Research Foundation of Korea through a grant from the Korean government and by the Nano & Material Technology Development Program, supported by the Ministry of Science and ICT.Ph.D. Student Jaejung Park and Professor Seungchul Lee of KAIST, and Professor Hyoung Seop Kim of POSTECH, and M.S.Ph.D. Student Jeong Ah Lee of POSTECH. Photo via: KAIST.Study on Laser Powder Bed Fusion: New DiscoveriesLaser powder bed fusion is used to produce Ti-6Al-4V alloys, which are known for their strength and biocompatibility. However, creating 3D printed versions with both high strength and ductility has been challenging due to the wide range of potential process combinations.To address this, the research team developed an active learning framework that explores various 3D printing parameters and heat treatment conditions. The AI model predicts tensile strength and elongation while also evaluating the uncertainty of these predictions. The models recommendations are then validated through 3D printing and tensile testing to obtain further data on material properties.This new data is incorporated into additional AI model training. After five iterations of refinement, the optimal process parameters and heat treatment conditions were identified. The final 3D printed Ti-6Al-4V alloy achieved a tensile strength of 1190 MPa and an elongation of 16.5%, successfully overcoming the strength-ductility challenge.Professor Lee explained that applying the approach to other properties, like thermal conductivity and thermal expansion, would allow for more efficient exploration of 3D printing process parameters and heat treatment conditions.Active Learning Framework. Image via: KAIST.Artificial Intelligence in Additive ManufacturingArtificial intelligence is driving significant advancements in additive manufacturing. One such effort comes from 1000 Kelvin, a company focused on AI-driven additive manufacturing solutions, which introduced AMAIZE 2.0. This solution marks a major improvement in the metal laser powder bed fusion (LPBF) process, with the goal of boosting reliability, efficiency, and scalability for manufacturers in different industries.In another development, Dyndrite, a company specializing in 3D printing software, introduced the SMART Python script, which automates adherence to ASTM/ISO standards in additive manufacturing. This script integrates with Dyndrites LPBF Pro software to generate 3D printing layouts that align with industry standards, resulting in up to 99% labor savings and reduced human errors. Tasks that once took more than a week can now be finished in just a few minutes.What 3D printing trends should you watch out for in 2025?How is the future of 3D printing shaping up?To stay up to date with the latest 3D printing news, dont forget to subscribe to the 3D Printing Industry newsletter or follow us onLinkedin.While youre here, why not subscribe to our YouTube channel? Featuring discussion, debriefs, video shorts, and webinar replays.Featured image shows Ph.D. Student Jaejung Park and Professor Seungchul Lee of KAIST, and Professor Hyoung Seop Kim of POSTECH, and M.S.Ph.D. Student Jeong Ah Lee of POSTECH. Photo via: KAIST
    0 Comments ·0 Shares ·21 Views
  • Tips for Hiring a General Contractor in Bellevue
    archeyes.com
    Construction Site Aerial View | Ricardo Gomez Angel via UnsplashHiring a general contractor can be one of the most crucial decisions when embarking on a home renovation project. A skilled contractor can manage the details, timelines, and quality of work, ensuring the project runs smoothly. Ensuring the contractor has a valid license and good references is the cornerstone of a successful selection process.Communicating openly about expectations, budgets, and timelines is essential. This helps prevent misunderstandings and keeps the project on the right path. Checking for clear contracts and written agreements further solidifies this foundation by providing clarity and setting boundaries.Finding a general contractor involves more than just assessing skills. Personality matters too, as the contractor sets the tone for communication and collaboration throughout the project. Look for someone competent and easy to work with to make the overall experience more enjoyable and efficient.Understanding the Basics of Hiring a General ContractorHiring a general contractor involves careful consideration of their reputation and professional qualities. Choosing the right contractor can significantly impact the success of your project, so its crucial to focus on their experience, reliability, and communication skills.Why Hiring a Reputable Contractor MattersSelecting a reputable contractor provides peace of mind and assures quality work. You can find trusted construction experts in Bellevue with a portfolio of successful projects and verifiable references. This background reduces the risk of project delays and ensures adherence to safety standards. A contractor with a solid reputation is more likely to communicate openly, providing clear timelines and transparent pricing, which is essential for maintaining trust and accountability.Reputable contractors are also likely insured and bonded, protecting clients from potential liabilities. Verifying these credentials is crucial before signing any contracts. By choosing a contractor known for reliable service, clients can anticipate fewer surprises and a smoother construction process. Reputation should be a top priority when selecting a contractor, as it reflects their track record and professional integrity.Essential Qualities of a Top-Quality General ContractorA top-quality general contractor should have excellent problem-solving skills and the ability to manage complex projects efficiently. Experience in various types of construction work is critical, as it indicates versatility and expertise in handling different challenges. They must be adept at coordinating with subcontractors and suppliers to ensure seamless project execution.Communication skills are another essential quality. A contractor who keeps clients informed at every stage builds confidence and helps address any concerns promptly. Strong attention to detailand a commitment to quality workmanship distinguish top contractors from their peers.Additionally, they should possess strong organizational skills to handle project scheduling and budget management effectively. By prioritizing these qualities, clients can ensure that their projects are handled by professionals committed to delivering excellence.Preparing for Your General Contractor Search Jeriden Villegas via Unsplash Jacek Dylag via UnsplashPreparing for a general contractor search effectively involves clear project scope and budget planning. Defining goals and establishing financial parameters ensure alignment and help avoid unexpected issues later on.Defining Your Project Scope and GoalsA detailed project scope is crucial. It should outline the specific work needed and desired outcomes. Start by listing key features like room sizes, materials, and design elements.Set clear goals for your expectations. This might involve completion timelines, specific architectural styles, or technologies.Using a checklist can help organize these details. This preparation guides conversations with potential contractors and provides a foundation for evaluating their ability to meet your needs.Budget Considerations for Construction ProjectsEstablishing a realistic budget early in the planning process is essential. Start by researching average costs for similar projects in your area.Consider costs for materials, labor, permits, and potential changes. Allocate funds for unexpected expenses to avoid overspending.Communicate your budget clearly when interviewing contractors.Abudget range can help identify contractors offeringcompetitive pricing while meeting your standards.This practice ensures financial preparedness and minimizes the risk of financial constraints during the project.Evaluating and Choosing Your General ContractorSelecting the right general contractor requires careful examination of various aspects, such as thorough research, credential verification, and a decisive interview process. These steps ensure that the chosen contractor meets project expectations and standards.Researching and Comparing Potential ContractorsStart by gathering a list of potential contractors through online platforms or recommendations from trusted construction experts. Consider compiling reliable options using review sites or industry databases.Develop criteria based on project needs, including experience, area of expertise, and customer feedback. Create a comparison chart for a clear overview. Look for contractors with a proven track record in projects similar to yours. Prioritize those with consistently positive reviews and high satisfaction rates. This ensures reliability and competence.The Importance of Verifying Credentials and Past WorkBefore finalizing any decision, verifying contractor credentials is crucial. Check license numbers and ensure they are active and valid with local licensing boards. Request proof of insurance to protect against potential liabilities.Review past work by asking for references or visiting completed projects. Pay attention to the quality and attention to detail in these works. Contact previous clients to gather genuine feedback about their experience. This step helps confirm the contractors reliability and skill levels are in line with claims made.Conducting Interviews and Making the Final DecisionSchedule interviews with shortlisted contractors. Prepare questions about their approach, project timelines, and cost management. Discuss any specific concerns you have about your project. Gauge their communication style and professionalism during this interaction, which is vital for a smooth partnership.Evaluate responses and compare them to your expectations and project needs. Notice how well they can tailor solutions to your specific requirements. Make the final choice based on a combination of research, verifications, and interpersonal compatibility. This informed process greatly increases the chance of a successful project outcome.Construction by ArchEyes StaffLeave a comment
    0 Comments ·0 Shares ·22 Views
  • Single-stair reform has energized North American architects. But efforts to update the building code show how slow-moving our bureaucracies can be.
    www.archpaper.com
    An architects office building rarely becomes a tourist attraction. But just east of Seattles downtown, the offices of Schemata Workshop, built in 2016, draw national and international visitors.Thats because the overall project, Capitol Hill Urban Cohousing (CHUC), represents a rare contemporary example of single-stair architecture. The term refers to structures above 4 stories with a single stairway, meaning they have one means of egress. But a combination of zoning codes, fire safety concerns, and financial pressures have made single-stair construction impossible to build across roughly 97 percent of the United States. CHUC, which includes ground-floor offices and 4 stories of housing, has become an aspirational model of this building type and a symbol for efforts to legalize it across North America. I do a monthly tour with legislators and building officials because theres been so much interest, said Mike Mariano, cofounder and principal at Schemata.Since gaining more widespread attention in 2021 due to then-emerging social media discourse on the subject, the campaign to legalize single-stair development has activated a growing cadre of architects and advocates interested in code reform. Last years AIA Conference on Architecture featured a panel on the topic, while Denver architecture firm SAR+ recently held a single-stair design contest. According to the Single-Stair Tracker, which chronicles this movements legislative and regulatory efforts, 21 states, cities, and provinces across North America have instituted some form of reform, or more commonly, commissioned safety and code studies to pursue future reform. In Canada, there are proposals to change the national code, while British Columbia updated its code last August to allow single-stair residences up to 6 stories tall.Grassroots support is something the building code world often does not see, said Stephen Smith, executive director of the Center for Building in North America, which runs the tracker. The YIMBY movement has become interested in codes and standards in a way [building code decision makers] havent seen before, and theres a big culture clash.The Capitol Hill Urban Cohousing project represents a rare contemporary example of single-stair architecture. (Courtesy Schemata Workshop)The repercussions of such a shift mean much more than simply eliminating a stairway. Coming at a time when many designers have pushed for buildings to better respond to current crises, such as housing affordability and sustainability, the single-stair crusade shows architects becoming more engaged in building code and zoning reform.Architect and author Mike Eliason, principal of Seattles Larch Lab, author of the recent book Building for People, and an early and influential single-stair advocate, argues that pushback by code and fire-safety officials highlights the need to democratize decision-making around what and how we build. Nobody in the U.S. really talks about the interface between the building code and the zoning code and the built environment, he observed. But if we want more highquality spaces, these conversations need to happen more often. The nonprofit International Building Code, which forms the basis for most state and local U.S. building codes, mandates that buildings over 3 stories have two separate staircases for fire safety, resulting in larger, chunkier apartments with double-loaded corridors. These requirements began entering local building codes in the late 19th and early 20th centuries in response to large urban fires and safety concerns.Single-stair projects, also called point-access blocks, exist around the globe and provide a type of small-building living experience and community that isnt achievable here, as just a handful of jurisdictions in urban North America permit them, including Seattle, New York City, and Honolulu.Single-stair reforms potential shouldnt be seen as a silver bullet to solve larger housing issues, said Conrad Speckert, a Canadian intern architect who has written extensively on the topic and submitted national single-stair changes to building codes. It can help affordabilityPew Trusts data shows single-stair designs can lower apartment costs by 6 to 13 percent compared with standard construction.Freeing space taken up by a stairway allows for exciting design and development possibilities and opens thin urban lots that would otherwise be financially infeasible. Subtracting a second form of egresswhich Speckert estimates can cost up to $300,000 for a small buildingwould also allow funds and square footage that could be used for a small elevator for ADA access; this strategy is seen in European versions of single-stair buildings. The move also creates the chance for two- and three-bedroom units to have improved daylighting and airflow, as layouts can span the full depth of a block versus being aggregated on either side of a double-loaded corridor. Schematas CHUC, for instance, was able to incorporate all manner of passive ventilation and daylighting strategies in the buildings eight housing units, including more shared social space.In Austin, Councilmember Jos Chito Vela, who represents a district with a sizable apartment-dwelling population, sponsored the citys single-stair resolution, which passed last May. He believes that legalizing these kinds of buildings can add more fine-grained apartment projects. Single-stair development can help push the unit price down to an ownership price point, Vela said. His stance speaks to the evolving political support around this shift in building codes. Vela believes that even if the fire department has some objections, the current pro-housing council could ultimately vote in favor of the change.Most of the existing single-stair efforts have resulted in mandated study periods to gauge how single-stair projects would impact fire safety and existing codes, most of these studies will be completed by 2026. Vela hopes that in Austin, where single-stair reform is now being debated by the city council, fire officials wont let the perfect be the enemy of the good.The National Fire Protection Association (NFPA), which has substantial impact on building safety codes, held a symposium on the single-stair effort in September 2024, inviting a range of fire safety officials, regulators, and advocates like Smith. Its clear the group has felt pressure from the grassroots push; its own publication noted last August that fire officials were blindsided by the speed of reform initiatives, with some fire chiefs stating that we must do all we can to defeat these misguided efforts.At CHUC, passive ventilation and daylighting strategies were also incorporated into the buildings eight housing units along with more social space. (Courtesy Schemata Workshop)In the organizations November report summarizing the symposium and its findings, the NFPA didnt quash the single-stair concept, but it did push for adherence to the traditional process it oversees. When this process is substituted by uninformed legislative action, special interests, or misguided local policy decisions, there is great risk to the protection and safety of people and property, the summary reads.As more jurisdictions embark on single-stair reform and currently authorized studies get completed and published, advocates seek to maintain the pressure by mandating objective research and studies, advocating for code reforms and ideally using the results of these studies to push for rapid change to the building codes.Existing evidence suggests single-stair buildings dont have a significantly worse safety record than traditional buildings. New York City records show only three serious fire incidents in the citys 4,400 single-stair buildings since 2012. The overall fire safety record in the U.S. remains worse than in peer countries, despite our mandate for more stairways. The British Columbia governments June 2024 report on single-stair safety found that just 8 to 10 percent of fires in apartments start in egress routes, and those that do are mostly small trash fires, which rarely spread beyond the room of origin. The doubts about safety recall the recent movement to legalize mass timber in the U.S., which also required extensive efforts at code reform and testing to allay material safety concerns. Now the structural system is safely being used across the country.Fire and code officials werent happy that the debate wasnt confined to the normal processes. I suspect that if it hadnt been for all the legislation, [single-stair] wouldnt have been taken as seriously as it was in the code world, said Smith.As the reform process plays out and more and more jurisdictions embrace or explore the idea of single-stair buildings, advocates hope these forthcoming changes unlock a tool for better housing design and improved affordability.Patrick Sisson is a Chicago expat living in Los Angeles who covers design, policy, and the trends that shape our cities.
    0 Comments ·0 Shares ·27 Views
  • Secure software: Third-party suppliers your first-party risk
    www.computerweekly.com
    In 1965, Ralph Naders groundbreaking book Unsafe at Any Speed exposed how car manufacturers prioritised style, performance, and profit over the safety of drivers and passengers. His narrative spurred public outrage and catalysed sweeping changes, including the widespread adoption of seatbelts and other safety innovations. As the former CISA director Jen Easterly noted earlier this year, today we find ourselves at a similar inflection point in the software development domain.Prioritizsng speed and product features, secure software development is often treated as an afterthought. Cyber threats are becoming more sophisticated, and if organisations do not demand early introduction and better integration of security measures from their software suppliers, they might face severe consequences.Organisations today increasingly rely on Software as a Service (SaaS), embedding it deeply into their infrastructure and business operations because it is cheaper and more efficient. Although these solutions offer scalability and efficiency, they also introduce significant risk. Yet, we now live in an era dominated by artificial intelligence (AI) where traditional security boundaries are being circumvented. Given the vast amount of data exchanged between systems and the numerous actors involved in the supply chain, the impact of a cyber incident related to software development flaws is now greater than ever before.The scale and complexity of data requiring protection have skyrocketed, as AI now generates, aggregates, and shares vast amounts of data across organisations and third-parties.The 2024 Data Breach Investigations Report from Verizon reveals that 15% of breaches involved a third-party or supplier, such as software supply chains, hosting partner infrastructures, or data custodians. This number has been rising year-over-year, and it highlights the urgent need for organisations to rethink their approach to third-party risk management.One of the biggest mistakes companies make in vendor assessments is focusing solely on vendor security compliance rather than product security. Many organisations send out lengthy questionnaires to vendors about their Information Security Management System (ISMS) but fail to scrutinize their application and product security. Certifications and compliance attestations, such as ISO 27001, SOC 2, PCI DSS, and GDPR, are often viewed as security benchmarks, but they do not necessarily guarantee continuous secure software development practices.Some vendors may hold these certifications; however, certain products of their portfolio may fall outside the scope of these security standards and frameworks. If overlooked, this blind spot can lead to significant security risks. An organisation may assume a certified vendor has robust security measures in place, only to later discover that the specific product they are using lacks fundamental security controls.The Security Think Tank on secure softwareRobert Campbell, PA Consulting: Secure software procurement in 2025: A call for accountability.Tyler Shields, ESG:'Unsafe At Any Speed'. Comparing automobiles to code risk.Aditya K Sood, Aryaka:Vigilant buyers are the best recipe for accountable suppliers.To resist supply chain attacks and mitigate associated risks, organisations must push their suppliers to prioritise secure software development. This means requiring vendors to demonstrate not just security compliance but also a clear attestation and commitment to secure development practices. Here are some key initiatives organisations should implement to build an effective Third-Party Assessment Program:Expand traditional vendor security assessments: Go beyond basic cybersecurity questionnaires and challenge vendors on their application and product security measures. Tailor the program to the specific requirements and dynamics of your organization, and consider incorporating questions related to emerging technologies such as AI.Ensure Secure Software Development Lifecycle (SDLC) practices: Require vendors to provide evidence that security is incorporated at every phase of development, from design to deployment.Shift third-party risk management from domain to control: Third-party risk management is ultimately about managing business risks, not just security risks. At its core, it is a data problem. Therefore, organisations should involve data owners and relevant stakeholders in the process and educate them about the associated risks in clear business terms.Demand transparency: Get visibility into the security controls applied to software products, rather than relying solely on compliance certifications.Conduct continuous third-party risk assessment: Continuously monitor third-party vendors, as security risks evolve over time.Adopt a zero-trust mindset: Assume that every third-party connection could be a potential risk and enforce strict access controls, when possible.The digital landscape of 2025 requires a fundamental shift in how we approach software security. Just as seatbelts and safety standards revolutionised the automobile industry, robust security practices must become the norm in software development.Organisations must recognise that third-party risk is their own risk. It is no longer sufficient to rely on vendor assurances or compliance checkboxes. Instead, businesses must take a proactive stance by demanding transparency, enforcing rigorous security standards, and ensuring that secure development is a priority from the ground up. If we fail to push suppliers to develop securely, the consequences will be far-reaching, impacting not just individual companies but the entire digital ecosystem.Ejona Prei is an ISACA member and volunteer, and a longstanding cyber leader. She works as global CISO at Lindal Group, a Hamburg-based manufacturer of packaging products, and is also president of Women in Cybersecurity (WiCyS) Germany. Ejona is committed to diversity and inclusion in security, and hopes to shape a future where artificial intelligence (AI) and cyber security solutions prioritise fairness, accountability, and societal wellbeing, bridging the gap between innovation and ethics. This is her first contribution to the Computer Weekly Security Think Tank.
    0 Comments ·0 Shares ·27 Views
  • iPhone 16 Pro vs. iPhone 14 Pro: Should you upgrade to the latest model?
    www.zdnet.com
    The iPhone 16 Pro introduces major changes to the series, but do they warrant upgrading from the two-year-old iPhone 14 Pro? We'll help you decide.
    0 Comments ·0 Shares ·24 Views
  • This $100 Android phone reminded me of my Pixel 9 Pro in the best way
    www.zdnet.com
    The NUU N30 isn't a powerhouse on paper, but it delivers reliable performance for everyday use.
    0 Comments ·0 Shares ·31 Views
  • Colombias Proven Framework For Reducing Electricity Theft & Losses
    www.forbes.com
    The city lights illuminate the streets of Bogota. Colombia. On the right, the "torre colpatria" ... [+] (Colpatria tower) can be seen.gettyElectricity theft is a pervasive global issue, costing utilities an estimated $100 billion annually and straining energy infrastructure worldwide. From tampering with meters to dangerously tapping into high-voltage power lines, the methods used to steal electricity vary in complexity and risk. Countries like Brazil, India, Jamaica and even parts of the European Union face significant non-technical losses, which undermine revenue, disrupt markets, and pose safety hazards. While theft is often driven by economic hardship and lack of access, simply penalizing offenders fails to address the root causes, especially seeing that there is also the resultant economic burden on paying consumers of electricity. Instead, proven models for combating electricity theft focus on integrating vulnerable communities into the grid through innovative policies, technological interventions, and sustainable pricing structures that promote compliance while securing the energy supply.Tackling Electricity Theft with a Holistic StrategyEnersis, a Colombian electricity distribution company, achieved significant success in reducing electricity theft by implementing a comprehensive strategic model that addressed various facets of its operations. According to the World Banks 2009 report, Reducing Technical and NonTechnical Losses in the Power Sector, the companys approach was multi-dimensional, encompassing regulation, commercial management, technical improvements, community engagement, information technology, and punitive actions. Through these combined actions, Enersis not only reduced theft but also ensured the long-term sustainability of its operations. This model offers valuable insights that can be replicated in other countries facing similar challenges.As a background, CODENSA is a Colombian company that distributes and sells electricity and is a part of the Enel Group through Enersis. Since the unbundling and privatization of Bogots vertically integrated utility in 1998, CODENSA, now part of the Enel Group through Enersis, has significantly reduced energy losses in its distribution network. According to the Q3 Report for Enel Colombia, as of September 2024, the energy loss index stood at 7.55%, marking a steady decline from the 22% total losses recorded in 1997. This improvement is largely attributed to aggressive energy recovery initiatives aimed at mitigating non-technical losses. Between January and September 2024 alone, CODENSA recovered 128 GWh of previously unrecorded consumption through targeted interventions, including 109,594 technical inspections.This article will further explore the comprehensive framework that facilitated the remarkable reduction in energy losses, Highlighting the key strategies that contributed to this success. The company systematically addressed both technical and non-technical losses via a robust regulatory framework, enhancing commercial management practices, and leveraging advanced technology. Additionally, fair tariff structures and community engagement initiatives, legal enforcement and IT-driven monitoring, further highlighted the approach which can serve as a model for electricity distribution companies seeking to improve efficiency and financial sustainability.Strengthening Electricity Governance Through Regulatory FrameworkBogota, Colombia - November 2020: The Avenida El Dorado in Bogota seen during a dark night.gettyAt the heart of this model was a collaborative approach to regulation. The company worked closely with political authorities and the sector regulator to ensure that the tariff structure was both financially sustainable and equitable. They focused on tariff rates that reflected the costs of efficient supply while ensuring fair pricing for consumers and maintaining service quality standards. According to the report, one of their key strategies was the generation of funds to subsidize low-income customers through various means, including targeted tariff rates and government subsidies. This framework not only reduced electricity theft by making legal electricity more affordable but also aligned the financial interests of all stakeholders, promoting a more efficient system overall.Improving Electricity Metering and Billing Via Commercial ManagementOn the commercial side, Enersis managed metering, billing, and collections with a keen focus on reducing losses. The companys integral approach included implementing policies for customer service and creating awareness programs to educate customers about the importance of paying for electricity as a commercial good. Additionally, they increased the number of points of contact for customer service, ensuring that the company was more accessible and responsive to clients. This proactive approach fostered a better relationship with customers, which played a crucial role in reducing instances of non-payment and tampering. The implementation of communication programs also provided customers with transparent information about their rights and obligations, empowering them to make informed decisions about their electricity consumption.Strengthening Electricity InfrastructureFrom a technical perspective, Enersis made significant investments in constructing distribution networks that were less susceptible to tampering and irregular connections. According to the report, the company also conducted systematic field assessments to detect illegal connections and damaged meters, as well as unmetered consumers. A notable initiative was the installation of sealed boxes to ensure that meters could not be tampered with. This proactive monitoring, coupled with regular inspections of the operational condition of seals, effectively curbed electricity theft by making it harder for consumers to engage in illegal activities.Fostering a Culture of Electricity Responsibility Via Community EngagementClose up aerial view of Bogota skyline with colorful skyscrapers and large urban sprawl at dusk in ... [+] ColombiagettyCommunity engagement played a pivotal role in Enersis strategy. The company made efforts to connect directly with communities and local leaders, creating awareness about the importance of rationalizing electricity consumption and the consequences of theft. Enersis designed campaigns to promote regular payment of electricity bills, preservation of electric infrastructure, and safe practices to avoid accidents. These outreach programs, particularly those targeting children in low-income households, helped instill a culture of responsible energy consumption, further discouraging theft and fostering a more positive relationship between the company and its customers.Leveraging Technology to Combat Electricity TheftIncorporating information technology was another key element of Enersis approach to reducing electricity theft. The company implemented Management Information Systems (MIS) to support both commercial and technical functions, enabling more effective monitoring of electricity usage and consumption patterns. Automated meter reading devices were progressively applied to large and medium consumers, while systematic field actions were taken to address irregularities detected through the commercial MIS. Additionally, Enersis regularly updated its databases, ensuring consistency with the physical reality of electricity consumption, which allowed the company to identify and address irregular service conditions swiftly. The integration of IT into their operations was instrumental in improving the efficiency and accuracy of the company's loss reduction efforts.Legal and Enforcement Measures: Strengthening Electricity Theft PenaltiesEnersis also understood the importance of punitive actions in ensuring that the fight against electricity theft remained effective. According to the report, the company collaborated with the justice department to take legal action against major offenders, particularly large consumers who were involved in electricity theft. Publicizing cases of theft, especially those involving prominent social figures, helped create social condemnation and acted as a deterrent to potential offenders. By combining legal measures with community-based education campaigns and transparent information, Enersis was able to significantly reduce electricity theft while enhancing the overall customer experience. The companys strategy not only addressed immediate losses but also fostered a long-term shift in consumer behavior, which is essential for the sustainability of any energy distribution system.A Holistic Model for Electricity Theft PreventionThe Enersis model for reducing electricity theft provides a comprehensive and multifaceted approach that has proven successful in minimizing technical and non-technical losses. This framework is built on six key pillars: regulation, commercial management, technical enhancements, community engagement, IT and data analytics, and legal enforcement. Through the collaboration with policymakers to establish fair tariffs and financial incentives, companies can create a sustainable pricing structure. Strengthening billing systems, improving customer service, and enhancing communication foster trust and compliance. Technical upgrades, such as grid reinforcement, field audits, and secured meters, minimize vulnerabilities. Community engagement initiatives educate the public, promote awareness, and build long-term accountability. Leveraging smart meters and data-driven monitoring enhances operational efficiency, while strict legal enforcement, including penalties and prosecutions, serves as a powerful deterrent. This holistic approach ensures a sustainable, secure, and efficient electricity distribution system.The strategies employed by Enersis can serve as a valuable blueprint for other countries like Jamaica looking to tackle electricity theft, demonstrating the importance of a holistic, multi-pronged approach that combines technology, regulation, community involvement, and legal action.This article is part of a series on electricity theft. For further insights, check out: 1. Electricity Theft: Economic Burden and Sustainability Risks2. Power Plant Losses and AI: Tackling Inefficiencies for Sustainability3. The Economic And Social Dimensions Of Electricity Theft4. Proven Strategy For Combating Electricity Theft: The Brazil Model
    0 Comments ·0 Shares ·18 Views