Striking Amazon ‘Spheres’ landmark opens in downtown Seattle
Striking Amazon ‘Spheres’ landmark opens in downtown Seattle
In a proud little show on Monday for the media and dignitaries — which also doubled as product placement for Amazon’s voice assistant — the world’s richest man ordered out loud, symbolically: “Alexa, open The Spheres.”
The domed structure is only steps away from the executive office tower where Bezos leads the online retail behemoth. It’s part of the company’s urban campus near downtown Seattle that is largely made up of unmarked office buildings where more than 40,000 people report to work.
The four-story Spheres structure from the outside looks like three connected glass orbs planted into the ground in a caterpillar shape. Lighting mimics a position near the equator, with 12 hours of shade and sun. During the day, the interior is maintained at 72 degrees with 60 percent humidity, to emulate a cloud forest ecosystem.
Amazon’s Amazonesque rainforest-like conservatory is now home to more than 40,000 plants from 50 countries on five continents. Its centerpiece is a 50-foot (15.2-meter) fig tree. Most plants will flower and some can yield fruit, though visitors must keep their hands off all plant life. About 90 percent of the plants were grown and tended to in a suburban greenhouse for years in anticipation for their permanent home in The Spheres.
Though masked by nature, the sleek and minimalist “alternative work space” is also designed to make you forget you’re at work, in a startup environment that is rumored to be aggressively demanding.
“The idea is that we connect them with nature. We get them away from their normal desk environment so you don’t see any desks or cubicles around,” said Ron Gagliardo, Amazon’s leading horticulturist.
The corporate office space, however selfie-worthy, is already such a hit that the company had to create a reservation system to contain the flow of traffic for the time being. Employees will have to snag a reservation to get in but it’s currently already booked out until April. The building has capacity for about 1,000 people but is more comfortable with about 800 at a time.
Once inside, workers can use nooks with tables and chairs that can serve as a casual meeting space. Coffee breaks can be taken in a cafe and “picnic” area offering an interior reprieve from Seattle’s unrelenting rainy season.
Critics have called the Spheres a vanity project, illustrating Seattle’s sometimes strained relationship with its largest employer. The company’s presence has changed the local economy and raised its cost of living — but none of that was on show at the unveiling of the Spheres.
Instead, Bezos received glowing praise from the governor, mayor and county officials for his recent commitments to the city’s homelessness crisis plus a personal donation of $33 million to a scholarship foundation that helps immigrant youth in the country illegally.
Bezos was coy when asked by The Associated Press whether the company’s much-anticipated second headquarters to be built in an undetermined US city will have another statement building space like the Spheres, saying: “We’ll see.”
FBI may have disrupted major cyber attack on Ukraine
- Ukraine has been locked in a years-long struggle with Russia-backed separatists in the country’s east and has repeatedly been hit by cyberattacks of escalating severity. Last year witnessed the eruption of the NotPetya worm, which crippled critical system
- Network technology company Cisco Systems and antivirus company Symantec have warned that a half-million Internet-connected routers had been compromised in a possible effort to lay the groundwork for a cyber-sabotage operation against targets in Ukraine.
LONDON: The FBI has put a spoke in the wheel of a major Russian digital disruption operation potentially aimed at causing havoc in Ukraine, evidence pieced together from researchers, Ukrainian officials and US court documents indicates.
On Wednesday, network technology company Cisco Systems and antivirus company Symantec warned that a half-million Internet-connected routers had been compromised in a possible effort to lay the groundwork for a cyber-sabotage operation against targets in Ukraine.
Court documents simultaneously unsealed in Pittsburgh the same day show the FBI has seized a key website communicating with the massive army of hijacked devices, disrupting what could have been — and might still be — an ambitious cyber attack by the Russian government-aligned hacking group widely known as Fancy Bear.
“I hope it catches the actors off guard and leads to the downfall of their network,” said Craig Williams, the director of outreach for Talos, the digital threat intelligence unit of Cisco that cooperated with the bureau. But he warned that the hackers could still regain control of the infected routers if they possessed their addresses and the right resources to re-establish command and control.
FBI Assistant Director Scott Smith said the agency “has taken a critical step in minimizing the impact of the malware attack. While this is an important first step, the FBI’s work is not done.”
Much about the hackers’ motives remains open to conjecture. Cisco said the malicious software, which it and Symantec both dubbed VPNFilter after a folder it creates, was sitting on more than 500,000 routers in 54 countries but mostly in Ukraine, and had the capacity to render them unusable — a massively disruptive move if carried out at such a scale.
“It could be a significant threat to users around the world,” said Williams.
The US Justice Department said the malware “could be used for a variety of malicious purposes, including intelligence gathering, theft of valuable information, destructive or disruptive attacks, and the mizattribution of such activities.”
Ukraine’s cyberpolice said in a statement that it was possible the hackers planned to strike during “large-scale events,” an apparent reference either to the upcoming Champions League game between Real Madrid and Liverpool in the capital, Kiev, on Saturday or to Ukraine’s upcoming Constitution Day celebrations.
Ukraine has been locked in a years-long struggle with Russia-backed separatists in the country’s east and has repeatedly been hit by cyberattacks of escalating severity. Last year witnessed the eruption of the NotPetya worm, which crippled critical systems, including hospitals , across the country and dealt hundreds of millions of dollars in collateral damage around the globe. Ukraine, the United States and Britain have blamed the attack on Moscow — a charge the Kremlin has denied.
Cisco and Symantec both steered clear of attributing the VPNFilter malware to any particular actor, but an FBI affidavit explicitly attributed it to Fancy Bear, the same group that hacked into the Democratic National Committee in 2016 and has been linked to a long series of digital intrusions stretching back more than a decade. The US intelligence community assesses that Fancy Bear acts on behalf of Russia’s military intelligence service.
An FBI affidavit — whose existence was first reported by The Daily Beast — said the hackers used lines of code hidden in the metadata of online photo albums to communicate with their network of seeded routers. If the photo albums disappeared, the hackers turned to a fallback website — the same site whose seizure the FBI ordered Tuesday.
An email sent to the website’s registered owner was returned as undeliverable.
When asked why the FBI specifically named Fancy Bear where Cisco did not, Williams noted that while attribution was extremely tricky based on malware analysis alone, “if you combine that knowledge with a traditional intelligence apparatus interesting things can come to light.”
In any case, he said, “we have a high degree of confidence that the actor behind this is acting against the Ukraine’s best interest.”
Cisco said in a research note that the malware affected devices geared for small and home offices from manufacturers including Netgear, TP-Link and Linksys and had the potential to disable “Internet access for hundreds of thousands of victims worldwide or in a focused region.”
The malware’s principal capabilities, the company said, included stealthy intelligence-collecting, monitoring industrial-control software and, if triggered, “bricking” or disabling routers. It also persists on the infected routers after they are rebooted.