NBBJ calls the concept No-Shadow Tower, though it would be more accurate to call it the Smaller-Shadow-From-One-of-Two-Towers, since it depends on a pair of buildings separated by an open space. For that reason, the technique is an awkward fit for New York — NY Magazine
A weeklong series of ideas for improving urban life, ranging from an examination of how Next-Generation Drones Will Save New York City’s Infrastructure, to how new building designs will usher in the Age of Shadowless Skyscrapers.
Sometimes it's easy to pretend that architecture exists outside of this world, erupting instead in the blank of a 3D space governed only by the laissez-fair laws of software. But sometimes a news headline will penetrate through this fog of imagination, appearing as a blazing light shining forth...
Friday, October 3:Eisenhower Memorial clears key hurdle on Gehry design: In a positive step for the Memorial's Approving Process Odyssey, the National Capital Planning Commission has OK'd the Commission on Fine Arts (the other federal body that must approve the design) to vote on the...
Hacking an architecture exhibition through augmented reality? Yes, there's an app for that. "Project Source Code" is a digital guerrilla-style exhibition created by architect/artist/researcher Güvenç Özel that lets mobile-device users "hack" key works in Rem Koolhaas' "Elements of Architecture"...
In a paper published this month, the researchers describe how they very simply and very quickly seized control of an entire system of almost 100 intersections in an unnamed Michigan city from a single ingress point. The exercise was conducted on actual stoplights deployed at live intersections [...] As is typical in large urban areas, the traffic lights in the subject city are networked ... allowing them to pass information to and receive instruction from a central management point. — Ars Technica
A hacker with a smartphone can unlock your front door [...] Criminals and intelligence agencies grab data from your home thermostat to plan robberies or track your movements. According to computer-security researchers, this is the troubling future of the Internet of Things, the term for an all-connected world where appliances like thermostats, health-tracking wristbands, smart cars and medical devices communicate with people and each other through the Internet. — Al Jazeera
“I can see all of the devices in your home and I think I can control them,” I said to Thomas Hatley, a complete stranger in Oregon who I had rudely awoken with an early phone call on a Thursday morning.
He and his wife were still in bed. Expressing surprise, he asked me to try to turn the master bedroom lights on and off. Sitting in my living room in San Francisco, I flipped the light switch with a click, and resisted the Poltergeist-like temptation to turn the television on as well. — forbes.com
A federal court ruled last week that an employer didn't violate a federal anti-hacking law when it took over an employee's LinkedIn account after firing her, Ars Technica reported.
Edcomm, the Pennsylvania company Linda Eagle presided over until it was bought out in 2010, fired Eagle in 2011, according to Ars Technica. — businessinsider.com
Through meticulous infiltration, UX members have carried out shocking acts of cultural preservation and repair, with an ethos of “restoring those invisible parts of our patrimony that the government has abandoned or doesn’t have the means to maintain.” The group claims to have conducted 15 such covert restorations, often in centuries-old spaces, all over Paris. — wired.com
SUBMIT NEWS: submit in 60 seconds!