dkatana writes: Back in the 1850s the Catalan engineer and urban designer Ildefons Cerdà designed the Eixample, the expansion of Barcelona outside the old city walls. His futuristic concept, approved by the city in 1859, with its well-integrated rail transit, serves as a model of urban design, land use, transportation planning, and pedestrian-scaled streets working in synergy to boost community living and people's access to public space.
Now Barcelona is using the Eixample as a new model for the city of the 21st century, by introducing the "Superblock", a grid of nine blocks where the main mobility happens on the roads around the outside the Superblock, and the roads within the Superblock are for local transit only.
This will give Barcelona residents access again to all the public space they lost during the transition to a car-centric model in the last century.
Barcelona is not just introducing the Superblocks, they are exporting the idea to many cities around the world. Link to Original Source
dkatana writes: Currently, Barcelona has 912 km (567 mi) of roads and streets dedicated to motorized traffic.
The Catalan capital has a plan to reduce that number to just 355 km, reclaiming over 60% of the asphalt to other uses for residents, like games, sport and cultural activities, such as outdoor cinema, concerts and outdoor fairs.
The plan is inspired on the original design of the city in the 1850s, when Ildelfons Cerda, the Catalan urban designer, convinced the city to expand using a futuristic design unknown at the time. Cerdà designed the modern city block, now Barcelona is creating the Superblock.
dkatana writes: Istvan Lam, CEO of Tresorit, a passionate cryptographer since the age of 12 and one of the inventors of its encryption technology, takes a view of the implications of Privacy Shield, the sucesor of Safe Harbor.
Privacy Shield was finally approved today by the European Union, but critics say it will not withstand the new European Privacy Directiva and the General Data Protection Regulation.
"As people are more privacy aware, data protection is becoming essential for competitiveness. We can already see a trend: large corporations like Apple, Google or even Facebook are slowly moving towards more transparent privacy terms and adding encryption into their services." Lam argues.
dkatana writes: London holds at least fifty percent of Europe’s financial technology companies, such as TransferWise and GoCardless.
Now that the UK has made the decision to quit the 28-country bloc those lucrative fintech companies and startups can lose their banking "passport" to trade in the EU. François Villeroy de Galhau, governor of the France’s central bank, said that keeping the so-called “passport” would not be an option if the UK leaves the single market of trade in goods and services.
Many people in fintech jobs are already looking for opportunities in the continent, and cities such as Paris, Frankfurt and Amsterdam are sending messages such as "[we are] prepared to receive all of those that want to come back to Europe"
dkatana writes: Most of the business and tech communities in the UK supported the "Remain" campaign, as did well-respected academics, artists, politicians, and scientists. Still, many voters saw the EU as a source of unwanted immigration, burdensome regulations, and a costly club.
UK tech firms will no longer be able to bid on European public works projects. They will face more dofficulties hiring foreign workers. And new trade agreements and data protection laws woill have to be enacted.
London will suffer the most as the de facto startup and financial capital of Europe. Many fintech and startup firms will look elsewhere to secure their place in Europe and access both the market and EU public funds.
dkatana writes: The University of Calgary paid C$20,000 ransom this week after an attack on May 28 targeted computers used by staff and faculty members, crippling multiple systems and encrypting data files and email accounts.
After determining that they were unable to recover the data the ransom was paid to “protect the quality and nature of the information we generate at the university.”, said an official in a press release.
The fact that higher education institutions are now being targeted by ransomware is raising serious questions about their ability to protect their data and critical information systems.
Universities had a false sense of security, and their IT systems are not prepared to deal with sophisticated attacks.
The rise of BYOD and wearables are responsible for the growth of the MDM market, as corporations are increasingly concern about security vulnerabilities and access to sensitive information by mobile devices
dkatana writes: Two revolutionary computer products were born in 1981: the IBM PC, that brought computing to the masses, now a museum piece, and the HP 12c, a financial calculator that has been one of the most successful products of our generation.
dkatana writes: Some US companies, wary of having to comply with new anti-encryption laws, are looking at European cloud services and providers of secure encryption products to keep their data safe — and out of reach of US intelligence services and other government requests.
Sensitive American data moving to Europe is landing mostly in places such as Switzerland, Iceland and Norway, where new cloud providers offer security, anonymity, and zero-knowledge encryption.
dkatana writes: T-Mobile and Verizon just joined the 5G race requesting special temporary authority (STA) licenses from the FCC to test millimeter band 5G services.
Verizon is concentrating on the 28 GHz band, working together with Ericsson, Intel, Qualcomm and Samsung, looking to launch limited 5G services by 2017 with a Samsung handset, Qualcomm chipset and network equipment from Ericsson.
T-Mobile will be testing the 28 GHz and 39 GHz bands to evaluate the performance of equipment from Nokia and Ericsson. Their immediate plans to offer the service have not been disclosed.
Last month AT&T requested the first 5G trial license to test several potential frequencies, 3.5GHz, 4GHz, 15GHz and 28 GHz, focusing more on IoT and other types of connectivity.
5G technologies operating on the lower bands can provide long- range connectivity with extremely low latency, something necessary for the next generation of connected devices. It will also be critical for C2X (car to infrastructure communications), self-driving cars, and remote management of self-driving trains.
dkatana writes: The Network Time Foundation is responsible to keep all computer clocks synchronized through the Network Time Protocol (NTP).
The nonprofit Network Time Foundation, which Harlan Stenn launched in 2011, saw its funding increase by $90,282 in 2015 for a total of $192,282 to support the NTP project. But there's still much work ahead to ensure the system works smoothly.
The NTP, as other widely used technologies on the internet, such as OpenSSL and DNS, are based on open source code. The means that anyone can use it, but their maintenance falls mostly on volunteers submitting changes to a handful of engineers.
VMware, the biggest contributor, donated $60,000 last year, and others contributed the other half. Services such as cloud computing rely on NTP to keep their servers in sync.
Donations may be may be made via the Network Time Foundation website, or sent to firstname.lastname@example.org through PayPal.
dkatana writes: Harlan Stenn, "Father Time", is the chief maintainer of the Network Time Protocol (NTP).
In the past year, security researchers have raised a number of concerns about the protocol, which Stenn is addressing even as he prepares a move of half the NTP infrastructure.
"NTP is critical as used as the legal basis for time stamps by equity, bond and financial instrument trading systems on Wall Street. It's used to time medical procedures in clinics and hospitals, and chemical processes in manufacturing, along with hundreds of other uses. Windows, Linux, and Unix computers all rely on NTP open source code for their system time-coordination with other computers." says Charles Babcock on InformationWeek.
"Security issues have been taking up half... no, three-quarters of my time since September," Stenn said, something new in a schedule already filled with maintenance issues for the protocol that must be kept running smoothly across many versions of Linux, Windows, and Unix.
If Apple complies with the Justice Department request, according to Craig Federighi, senior VP of software engineering at Apple, it "..would become a weakness that hackers and criminals could use to wreak havoc on the privacy and personal safety of us all."
dkatana writes: This year the GSMA expects 2,100 exhibitors, more than 95,000 delegates, over 4,000 journalists and analysts, and 160 government delegations. Under the slogan “Mobile Is Everything,” the show will showcase the latest trends, devices and technologies for mobile, IoT, connectivity and networks.
Metro workers have announced a partial strike during the show. All efforts to reach an agreement and avoid the strike have failed. The metro will only work at 50% capacity on Monday and Wednesday from 6.30 to 9.30 h and from 16:00 to 20:00 h, and with 30% capacity the rest of those days. The metro will operate normally all other days.