Many in the United States take the time each 9/11 to honor those whose lives were taken 20 years ago. Memorials honor those lives year-round; the National 9/11 Memorial in New York City, for example, pays tribute to the very site where the tragedy took place.
Exactly one decade after the single largest terror attack on United States soil took the lives of almost 3,000 people, the National 9/11 Memorial in New York City opened in their honor on September 11, 2011.
Each component in the Memorial was selected for functionality as well as art. The original plan called for stone throughout the seven acres. Walker reduced the stone by about half and instead sculpted the ground with grass and trees to soften the space. More than 400 swamp white oak trees were hand-picked and then tended in New Jersey for five years before being transplanted into the Memorial. A planting's corridor with 1.8-meter depth filled with soil and traversed by irrigation pipes lies between the walk and the ceiling of the buildings below.
A Callery pear tree that survived the attacks and is now named "The Survivor Tree" is also part of the design. Walker carefully selected furniture, lighting, and other objects to keep the ground plane unimpeded.
"When you're around the voids it seems like a plaza, but when you look out it seems more like a park," explains Walker. He had to design the ground to be perfectly flat so the nine-meter-deep voids could work visually. "The trick was to keep it flat, so the voids were cut into it in a recognizable way," he said.
How would you attack this? I want to model some banquettes, both curved and straight. But I don't know how to model the channelled backs. See attached image. How would you model the flutes or vertical seams in the seat back?
Alright, I'm really hoping the hive mind can help me quickly with this issue. I have an old historic building with recessed windows in a masonry wall. Images attached. In order for it to work I modeled the recess and applied it to the wall. However, the window does not resize itself to the new wall thickness and has a huge gap either side of the jamb in plan. Any thoughts on how to best do this?
I've had trouble like this before. The gap either side of the window in plan is related the combination of the sill being wider than the window itself and the wall feature. I've attached an example that I made. It may actually be related to how VW handles the wall hole component in top/plan as I've seen similar issues even in custom window symbols.
I think the cleanest option is to model and make your own window symbol. I'm not sure there's any other way to solve the jamb depth issue. You would then have full control over the 2d/3d and wall hole components.
@Kevin McAllister, do you have any links to resources to learn how to build a custom window symbol? One that can be added to schedule and have control via the OIP? I'm fairly new to custom modeling anymore more complicated than a simply extrude.
This is quite common with VW. Your expectation that the recessed area has now recognised it has less depth (and therefore will work with windows and doors) than wall parts either side is not carried through by the software.
This is one of those areas where we users moan about the way the boffins create these features. It seems (and this happens over and over) they don't 'see the thing through'. They devised a way to create recesses and seem not to have bothered to make the feature a real 'winner'.
This sort of thing does happen a lot. It's presumably symptomatic of software engineers creating features without fully understanding the problem from an architectural point of view. A hard nut to crack. Perhaps @Jim Wilson is already aware of this? If he is then I imagine he already has a plan of attack. If not, perhaps you can chime in here and let us know your thoughts?
I know this and related items are on quite a few managerial and engineering plates at the moment. How we handle things like this is also tied to how we want to move forward in the future, including things like how to handle materials (volumetric, texture and data information tied to something other than classes or layers) as well as where we want to support things like slanted walls.
I don't personally know a lot of the details on this, but I know there are major ongoing projects and that things like the above issue plus a lot of other instances where the system breaks down. Inserting doors or windows across two stacked walls, the surface hatching and bottom/top edge appearance of stacked walls in general. It's all very active in the development conversation and the original post is very much included in the known pain points.
The BlueBorne attack vector can potentially affect all devices with Bluetooth capabilities, estimated at over 8.2 billion devices today. Bluetooth is the leading and most widespread protocol for short-range communications, and is used by devices of all kinds, from regular computers and mobile devices to IoT devices such as TVs, watches, cars, and even medical appliances. The latest published reports show more than 2 billion Android, 2 billion Windows, and 1 billion Apple devices in use. Gartner reports that there are 8 billions connected or IoT devices in the world today, many of which have Bluetooth.
BlueBorne concerns us because of the medium by which it operates. Unlike the majority of attacks today, which rely on the internet, a BlueBorne attack spreads through the air. This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus. The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device, and require another step to take control of the device. With BlueBorne, attackers can gain full control right from the start. Moreover, Bluetooth offers a wider attacker surface than WiFi, almost entirely unexplored by the research community and hence contains far more vulnerabilities.
The BlueBorne attack vector requires no user interaction, is compatible to all software versions, and does not require any preconditions or configurations aside of the Bluetooth being active. Unlike the common misconception, Bluetooth enabled devices are constantly searching for incoming connections from any devices, and not only those they have been paired with. This means a Bluetooth connection can be established without pairing the devices at all. This makes BlueBorne one of the most broad potential attacks found in recent years, and allows an attacker to strike completely undetected.
In the past, most Bluetooth vulnerabilities and security flaws originated in issues with the protocol itself, which were resolved in version 2.1 in 2007. Nearly all vulnerabilities found since were of low severity, and did not allow remote code execution. This transition occurred as the research community turned its eyes elsewhere, and did not scrutinize the implementations of the Bluetooth protocol in the different platforms, as it did with other major protocols.
This is why the vulnerabilities which comprise BlueBorne are based on the various implementations of the Bluetooth protocol, and are more prevalent and severe than those of recent years. We are concerned that the vulnerabilities we found are only the tip of the iceberg, and that the distinct implementations of the protocol on other platforms may contain additional vulnerabilities.
The vulnerabilities disclosed by Armis affect all devices running on Android, Linux, Windows, and pre-version 10 of iOS operating systems, regardless of the Bluetooth version in use. This means almost every computer, mobile device, smart TV or other IoT device running on one of these operating systems is endangered by at least one of the eight vulnerabilities. This covers a significant portion of all connected devices globally.
Google has issued a security update patch and notified its partners. It was available to Android partners on August 7th, 2017, and made available as part of the September Security Update and Bulletin on September 4, 2017. We recommend that users check that Bulletin for the latest most accurate information. Android users should verify that they have the September 9, 2017 Security Patch Level,
Microsoft issued has security patches to all supported Windows versions on July 11, 2017, with coordinated notification on Tuesday, September 12. We recommend that Windows users should check with the Microsoft release at here for the latest information.
Patches to Linux vulnerabilities have been pushed to the upstream projects. The information leak vulnerability was patched here, and the remote code execution was patched here Linux distributions have started to push updates as well, please look for specific updates made by your distribution.
iOS
All iPhone, iPad and iPod touch devices with iOS 9.3.5 and lower, and AppleTV devices with version 7.2.2 and lower are affected by the remote code execution vulnerability (CVE-2017-14315). This vulnerability was already mitigated by Apple in iOS 10, so no new patch is needed to mitigate it. We recommend you upgrade to the latest iOS or tvOS available.
Once the attacker determined his target is using the Android operating system, he can use four of the vulnerabilities disclosed by Armis to exploit the device, or they can use a separate vulnerability to conduct a Man-in-The-Middle attack.
Information Leak Vulnerability (CVE-2017-0785)
The first vulnerability in the Android operating system reveals valuable information which helps the attacker leverage one of the remote code execution vulnerabilities described below. The vulnerability was found in the SDP (Service Discovery Protocol) server, which enables the device to identify other Bluetooth services around it. The flaw allows the attacker to send a set of crafted requests to the server, causing it to disclose memory bits in response. These pieces of information can later be used by the attacker to overcome advanced security measures and take control over the device. This vulnerability can also allow an attacker to leak encryption keys from the targeted device and eavesdrop on Bluetooth communications, in an attack that very much resembles heartbleed.