Connect with us

Tech

Underground data fortresses: The nuclear bunkers, mines and mountains being transformed to protect data from attack

Published

on

Underground data fortresses: The nuclear bunkers, mines and mountains being transformed to protect data from attack


The Cyberfort bunker is a solid inclined mass of grass-covered concrete that emerges in the centre of the compound. Credit: Cyberfort/A.R.E. Taylor, CC BY

It’s a sunny June day in southeast England. I’m driving along a quiet, rural road that stretches through the Kent countryside. The sun flashes through breaks in the hedgerow, offering glimpses of verdant crop fields and old farmhouses.

Thick hawthorn and brambles make it difficult to see the 10ft-high razor-wire fence that encloses a large grassy mound. You’d never suspect that 100ft beneath the ground, a hi-tech cloud computing facility is whirring away, guarding the most valuable commodity of our age: digital data.

This subterranean data center is located in a former nuclear bunker that was constructed in the early 1950s as a command-and-control center for the Royal Air Force’s radar network. You can still see the decaying concrete plinths that the radar dish once sat upon. Personnel stationed in the bunker would have closely watched their screens for signs of nuclear missile-carrying aircraft.

After the end of the cold war, the bunker was purchased by a London-based internet security firm for use as an ultra-secure data center. Today, the site is operated by the Cyberfort Group, a cybersecurity services provider.

I’m an anthropologist visiting the Cyberfort bunker as part of my ethnographic research exploring practices of “extreme” data storage. My work focuses on anxieties of data loss and the effort we take—or often forget to take—to back-up our data.

As an object of anthropological inquiry, the bunkered data center continues the ancient human practice of storing precious relics in underground sites, like the tumuli and burial mounds of our ancestors, where tools, silver, gold and other treasures were interred.

The Cyberfort facility is one of many bunkers around the world that have now been repurposed as cloud storage spaces. Former bomb shelters in China, derelict Soviet command-and-control centers in Kyiv and abandoned Department of Defense bunkers across the United States have all been repackaged over the last two decades as “future-proof” data storage sites.

I’ve managed to secure permission to visit some of these high-security sites as part of my fieldwork, including Pionen, a former defense shelter in Stockholm, Sweden, which has attracted considerable media interest over the last two decades because it looks like the hi-tech lair of a James Bond villain.

Many abandoned mines and mountain caverns have also been re-engineered as digital data repositories, such as the Mount10 AG complex, which brands itself as the “Swiss Fort Knox” and has buried its operations within the Swiss Alps.

Cold war-era information management company Iron Mountain operates an underground data center 10 minutes from downtown Kansas City and another in a former limestone mine in Boyers, Pennsylvania.

The National Library of Norway stores its digital databanks in mountain vaults just south of the Arctic Circle, while a Svalbard coal mine was transformed into a data storage site by the data preservation company Piql. Known as the Arctic World Archive (AWA), this subterranean data preservation facility is modeled on the nearby Global Seed Vault.

Just as the seeds preserved in the Global Seed Vault promise to help re-build biodiversity in the aftermath of future collapse, the digitized records stored in the AWA promise to help re-boot organizations after their collapse.

Bunkers are architectural reflections of cultural anxieties. If nuclear bunkers once mirrored existential fears about atomic warfare, then today’s data bunkers speak to the emergence of a new existential threat endemic to digital society: the terrifying prospect of data loss.






Data, the new gold?

After parking my car, I show my ID to a large and muscular bald-headed guard squeezed into a security booth not much larger than a payphone box. He’s wearing a black fleece with “Cyberfort” embroidered on the left side of the chest. He checks my name against today’s visitor list, nods, then pushes a button to retract the electric gates.

I follow an open-air corridor constructed from steel grating to the door of the reception building and press a buzzer. The door opens on to the reception area: “Welcome to Cyberfort,” receptionist Laura Harper says cheerfully, sitting behind a desk in front of a bulletproof window which faces the car park. I hand her my passport, place my bag in one of the lockers, and take a seat in the waiting area.

Big-tech pundits have heralded data as the “new gold”—a metaphor made all the more vivid when data is stored in abandoned mines. And as the purported economic and cultural value of data continues to grow, so too does the impact of data loss.

For individuals, the loss of digital data can be a devastating experience. If a personal device should crash or be hacked or stolen with no recent back-ups having been made, it can mean the loss of valuable work or cherished memories. Most of us probably have a data-loss horror story we could tell.

For governments, corporations and businesses, a severe data loss event—whether through theft, erasure or network failure—can have a significant impact on operations or even result in their collapse. The online services of high-profile companies like Jaguar and Marks & Spencer have recently been impacted by large-scale cyber-attacks that have left them struggling to operate, with systems shutdown and supply chains disrupted.

But these companies have been comparatively lucky: a number of organizations had to permanently close down after major data loss events, such as the TravelEx ransomware attack in 2020, and the MediSecure and National Public Data breaches, both in 2024.

With the economic and societal impact of data loss growing, some businesses are turning to bunkers with the hope of avoiding a data loss doomsday scenario.

The concrete cloud

One of the first things visitors to the Cyberfort bunker encounter in the waiting area is a 3ft cylinder of concrete inside a glass display cabinet, showcasing the thickness of the data center’s walls. The brute materiality of the bunkered data center stands in stark contrast to the fluffy metaphor of the “cloud,” which is often used to discuss online data storage.

Data centers, sometimes known as “,” are the buildings where cloud data is stored. When we transfer our data into the cloud, we are transferring it on to servers in a data center (hence the meme “there is no cloud, just someone else’s computer”).

Data centers typically take the form of windowless, warehouse-scale buildings containing hundreds of servers (pizza box-shaped computers) stored in cabinets that are arranged in aisles.

Data centers are responsible for running many of the services that underpin the systems we interact with every day. Transportation, logistics, energy, finance, national security, health systems and other lifeline services all rely on up-to-the-second data stored in and accessed through data centers.

Everyday activities such as debit and credit card payments, sending emails, booking tickets, receiving text messages, using social media, search engines and AI chatbots, streaming TV, making video calls and storing digital photos all rely on data centers.

These buildings now connect such an incredible range of activities and utilities across government, business and society that any downtime can have major consequences. The UK government has officially classified data centers as forming part of the country’s critical national infrastructure—a move that also conveniently enables the government to justify building many more of these energy-guzzling facilities.

Underground data fortresses: The nuclear bunkers, mines and mountains being transformed to protect our 'new gold' from attack
A diagram of the Mount 10 bunker in Switzerland. Credit: Mount10, CC BY

As I sit pondering the concrete reality of the cloud in Cyberfort’s waiting area, the company’s chief digital officer, Rob Arnold, emerges from a corridor. It was Arnold who arranged my visit, and we head for his office—through a security door with a biometric fingerprint lock—where he talks me through the logic of the bunkered data center.

“The problem with most above-ground data centers is they are often constructed quickly, and not built to withstand physical threats like strong winds, car bombs or server theft from breaking and entering.” Arnold says that “most people tend to think of the cyber-side of data security—hackers, viruses and cyber-attacks—which dangerously overlooks the physical side.”

Amid increasing geopolitical tension, internet infrastructure is now a high-value target as “hybrid” or “cyber-physical” sabotage (when cyber-attacks are combined with physical attacks) becomes increasingly common.

The importance of physical internet security has been highlighted by the war in Ukraine, where drone strikes and other attacks on digital infrastructure have led to internet shutdowns. While precise details about the number of data centers destroyed in the conflict remain scant, it has been observed that Russian attacks on local data centers in Ukraine have led many organizations to migrate their data to cloud facilities located outside of the conflict zone.

Bunkers appeal to what Arnold calls “security-conscious” clients. He says, “It’s difficult to find a structure more secure than a bunker”—before adding dryly: “The client might not survive the apocalypse, but their data will.”

Cyberfort specializes in serving regulated industries. Its customer base includes companies working in defense, health care, finance and critical infrastructure. “Our core offering focuses on providing secure, sovereign and compliant cloud and data-center services,” Arnold explains in a well-rehearsed sales routine. “We do more for our customers than just host systems—we protect their reputations.”

Arnold’s pitch is disrupted by a knock at the door. The head of security (who I’m calling Richard Thomas here) enters—a 6ft-tall ex-royal marine wearing black cargo trousers, black combat boots and a black Cyberfort-branded polo shirt. Thomas is going to show me around the facility today.

The entrance to the bunker is located up a short access road. Engineered to withstand the blast and radiation effects of megaton-level thermonuclear detonations, this cloud storage bunker promises its clients that their data will survive any eventuality.

At the armor-plated entrance door, Thomas taps a passcode into the electronic lock and swipes his card through the access control system. Inside, the air is cool and musty. Another security guard sits in a small room behind bulletproof plexiglass. He buzzes us through a metal mantrap and we descend into the depths of the facility via a steel staircase, our footsteps echoing in this cavernous space.

The heavy blast doors and concrete walls of the bunker appear strangely at odds with the virtual “walls” we typically associate with data security: firewalls, anti-virus vaults, and spyware and spam filters. Similarly, the bunker’s military logics of enclosure and isolation seem somewhat outdated when faced with the transgressive digital “flows” of networked data.

However, to dismiss the bunkered data center as merely an outmoded piece of security theater is to overlook the importance of physical security—today and in the future.

We often think of the internet as an immaterial or ethereal realm that exists in an electronic non-place. Metaphors like the now retro-sounding cyberspace and, more recently, the cloud perpetuate this way of thinking.

But the cloud is a material infrastructure composed of thousands of miles of cables and rows upon rows of computing equipment. It always “touches the ground” somewhere, making it vulnerable to a range of non-cyber threats—from thieves breaking into data centers and stealing servers, to solar storms disrupting electrical supplies, and even to squirrels chewing through cables.






If data center services should go down, even for a few seconds, the economic and societal impact can be calamitous. In recent years we have seen this first-hand.

In July 2020, the 27-minute Cloudflare outage led to a 50% collapse in traffic across the globe, disrupting major platforms like Discord, Shopify, Feedly and Politico. In June 2021, the Fastly outage left some of the world’s most visited websites completely inaccessible, including Amazon, PayPal, Reddit, and the New York Times.

In October 2021, Meta, which owns Facebook, WhatsApp and Instagram, experienced an outage for several hours that affected millions of social media users as well as hundreds of businesses.

Perhaps the largest internet outage yet occurred in July 2024 when the CrowdStrike outage left supermarkets, doctors’ surgeries, pharmacies, airports, train providers and banks (among other critical services) unable to operate. This was described by some in the industry as “one of the largest mass outages in IT history”.

Internet architecture now relies on such a complex and fragile ecosystem of interdependencies that major outages are getting bigger and occurring more often. Downtime events can have a lasting financial and reputational impact on data center providers. Some attempts to quantify the average cost of an unplanned data center outage range from US$9,000 to US$17,000 (about £12,500) per minute.

The geographic location of a data center is also hugely important for data protection regulations, Thomas explains, as we make our way down a brightly lit corridor. “Cyberfort’s facilities are all located in the UK, which gives our clients peace of mind, knowing they comply with data sovereignty laws.”

Data sovereignty regulations subject data to the legal and privacy standards of the country in which it is stored. This means businesses and organizations must be careful about where in the world their data is being relocated when they move it into the cloud. For example, if a UK business opts to store its data with a cloud provider that uses data centers based in the US, then that data will be subject to US privacy standards which do not fully comply with UK standards.

In contrast to early perceptions of the internet as transcending space, eradicating national borders and geopolitics, data sovereignty regulations endow locality with renewed significance in the cloud era.

The survival of data at all costs

Towards the end of the corridor, Thomas opens a large red blast-proof door—beyond which is a smaller air-tight door. Thomas waves his card in front of an e-reader, initiating an unlocking process: we’re about to enter one of the server rooms.

“Get ready,” he says, smiling, “It’s going to be cold and loud!” The door opens, releasing a rush of cold air. The server room is configured and calibrated for the sole purpose of providing optimal conditions for data storage.

Like any computer, servers generate a huge amount of heat when they are running, and must be stored in constantly air-conditioned rooms to ensure they do not overheat. If, for any reason, a server should crash or fail, it can lead to the loss of a client’s valuable data. Data center technicians work in high-pressure conditions where any unexpected server downtime could mean the end of their job.

To try and make sure the servers run optimally, data centers rely on huge amounts of water and energy, which can significantly limit the availability of these resources for the people who live in the vicinity of the buildings.

An average data center consumes an estimated 200 terawatt hours of electricity each year. That’s around 1% of total global electricity demand, which is more than the national energy consumption of some countries. Many of these facilities are powered by non-renewable energy sources, and the data center industry is expected to emit 2.5 billion metric tons of carbon dioxide by 2030.

Underground data fortresses: The nuclear bunkers, mines and mountains being transformed to protect our 'new gold' from attack
The bunker’s external armour-plated door. Credit: Cyberfort/A.R.E. Taylor, CC BY

In addition, to meet expectations for “uninterruptible” service levels, data centers rely on an array of fossil fuel-based back-up infrastructure—primarily diesel generators. For this reason, the Green Web Foundation—a non-profit organization working to decarbonize the internet—has described the internet as the world’s largest coal-powered machine. Data centers are also noisy and have become sites of protest for local residents concerned about noise pollution.

Amid hype and speculation about the rise of AI, which is leading to a boom in the construction of energy-hungry data centers, the carbon footprint of the industry is under increasing scrutiny. Keen to highlight Cyberfort’s efforts to address these issues, Thomas informs me that “environmental impact is a key consideration for Cyberfort, and we take our commitment to these issues very seriously.”

As we walk down a cold aisle of whirring servers, he explains that Cyberfort actively sources electricity from renewable energy supply chains, and uses what he calls a “closed loop” cooling infrastructure which consumes minimal fresh water.

‘Like the pyramids’

After our walk through the server room, we begin to make our way out of the bunker, heading through another heavy-duty blast door. As we walk down the corridor, Thomas promotes the durability of bunkers as a further security selling point. Patting the cold concrete wall with the palm of his hand, he says, “Bunkers are built to last, like the pyramids.”

Bunker scholars have long noted that these buildings are as much about time as they are about space. Bunkers are designed to preserve and transport their contents through time, from an apocalyptic present into a safe future.

Writers such as Paul Virilio, W.G. Sebald and J.G. Ballard were drawn to the decaying bunkers of the Second World War and, like Thomas, compared them with enduring megastructures which have outlived the civilizations that built them. In his 1975 book Bunker Archaeology, Virilio famously compared the abandoned Nazi bunkers along the coast of France with “the Egyptian mastabas, the Etruscan tombs, the Aztec structures.”

The bunker’s durability invites us to take a long-term view of our own data storage needs, which will only increase over the course of our lives.

For technology behemoths like Apple and Google, cloud storage is a key strategic avenue for long-term revenue growth. While the phones, laptops and other digital devices they make have limited lifespans, their cloud services offer potentially lifelong data storage. Apple and Google encourage us to perpetually hoard our data rather than delete it, because this locks us into their cloud subscription services, which become increasingly expensive the more storage we need.

Apple’s marketing for its cloud storage service, iCloud, encourages users to “take all the photos you want without worrying about space on your devices.” Google has made “archive” rather than “delete” the default option on Gmail. While this reduces the likelihood of us accidentally deleting an email, it also means we are steadily consuming more of our Gmail capacity, leading some to purchase more Google Drive storage space.

Cloud hoarders

It is also increasingly difficult to operate off-cloud. Internal storage space on our digital devices is dwindling as the cloud becomes the default storage option on the majority of digital products being developed. Users must pay a premium if they want more than the basic local storage on their laptop or smartphone. Ports to enable expandable, local storage—such as CD drives or SD card slots—are also being removed by tech manufacturers.

As our personal digital archives expand, our cloud storage needs will continue to grow over our lifetimes, as will the payments for more and more cloud storage space. And while we often imagine we will one day take the time to prune our accumulations of digital photos, files, and emails, that task is often indefinitely postponed. In the meantime, it is quicker and easier to simply purchase more cloud storage.

Underground data fortresses: The nuclear bunkers, mines and mountains being transformed to protect our 'new gold' from attack
A blast-proof door in the Cyberfort bunker, behind which lies the server room containing the digital ‘gold’. Credit: Cyberfort/A.R.E. Taylor, CC BY

Many consumers simply use whichever cloud storage service is already pre-installed on their devices—often these are neither the cheapest nor most secure option. But once we commit to one provider, it is very difficult to move our data to another if we want a cheaper monthly storage rate, or simply want to switch—this requires investing in enough hard drives on which to download the data from one cloud provider and upload it to another. Not everyone is tech-savvy enough to do that.

In 2013, bank reforms in the UK introduced a switching service which enabled consumers to easily move their money and payments to different banks, in order to access more favorable rates.

Cloud migration services are available for businesses, but until a cloud storage equivalent of the bank switching service is developed for the general public, many of us are essentially locked into whichever cloud provider we have been using. If our data really is the new gold, perhaps we should require cloud providers to offer incentives to deposit it with them.

Some providers now offer “lifetime” cloud packages with no monthly or yearly payments and no inactivity clause. However, the cloud market is volatile, defined by cycles of boom-and-bust, with providers and their data centers constantly rebranding, closing and relocating. In this landscape of mergers and acquisitions, there is no guarantee that lifetime cloud providers will be around long enough to honor these promises.

In addition, the majority of consumer cloud providers currently only offer a maximum of a few terabytes of storage. In the future, most of us will probably need a lot more than this, which could mean a lot more data centers (roughly 100 new data centers are set to be constructed in the UK alone within the next five years). We may also see more bunkers being repurposed as data centers—while some providers, such as Florida-based Data Shelter, are considering building entirely new bunker structures from scratch to house .

Resurfacing

Thomas and I arrive at the steel staircase leading back up to the outside world. The guard buzzes us back through the turnstile, and Thomas unlocks and opens the door. The sunlight stings my eyes.

Back in the reception area, I thank Arnold and Thomas for my surreal trip into the depths of subterranean data storage. The Cyberfort data center is a site of extreme contrasts, where the ethereal promise of the cloud jars with the concrete reality of the bunker.

Sitting in my car, I add to my fieldnotes that the survival of data—whether entombed in bunkers or stored in “lifetime” cloud accounts—is bound to the churn of markets, and depends upon the durability of the infrastructure and organizations behind it.

Permanence, in the digital age, is always provisional. One can’t help but imagine future archaeologists discovering this bunker and rummaging through the unreadable remains of our lost digital civilization.

Provided by
The Conversation


This article is republished from The Conversation under a Creative Commons license. Read the original article.The Conversation

Citation:
Underground data fortresses: The nuclear bunkers, mines and mountains being transformed to protect data from attack (2025, September 27)
retrieved 27 September 2025
from https://techxplore.com/news/2025-09-underground-fortresses-nuclear-bunkers-mountains.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Stirling engine generates mechanical power by linking Earth’s warmth to space

Published

on

Stirling engine generates mechanical power by linking Earth’s warmth to space


Professor Jeremy Munday has developed an experimental engine that can generate mechanical power from the temperature difference between the Earth and deep space when placed outdoors at night. The device, a type of machine called a Stirling engine, could be used for example to ventilate buildings or run fans in a greenhouse at night. Credit: Mario Rodriguez for UC Davis College of Engineering

Engineers at the University of California, Davis, have invented a device that can generate mechanical power at night by linking the natural warmth around us to the cold depths of space. The invention could be used, for example, to ventilate greenhouses or other buildings. The work is described Nov. 12 in Science Advances.

The invention is a type of machine called a Stirling engine. Other machines such as generate power from a large heat gradient, said Jeremy Munday, professor of electrical and computer engineering at UC Davis and co-author on the paper. In contrast, a Stirling engine can work based on a small difference in temperature, such as that between a hot cup of coffee and its surroundings.

“These engines are very efficient when only small temperature differences exist, whereas other types of engines work better with larger temperature differences and can produce more power,” Munday said.

Typically, a Stirling engine is directly connected to a on one side and a cooler environment on the other side.






“If you just set it on the table, it’s not going to produce any power on its own because all sides are the same temperature,” Munday said.

One way to generate a temperature difference, of course, is to heat up one side by burning fuel. Munday and graduate student researcher Tristan Deppe wondered if instead they could connect the cold side to something very, very cold but also very far away: .

“It doesn’t actually have to touch space physically, it can just interact radiatively with space,” Munday said. It’s like standing outside on a cold, clear night: Your head will quickly start to feel cold as heat radiates away.

Deppe and Munday’s idea was to take a simple Stirling engine (essentially a piston driving a flywheel), put it on a panel that acts as a heat-radiating antenna and sit the whole thing on the ground outdoors at night. The ground acts as the warm side of the engine and the antenna channels the cold of space.

A year of night time experiments shows that the small device can indeed generate at least 400 milliwatts of mechanical power per square meter. The researchers used the device experimentally to directly power a fan and also coupled it to a small electrical motor to generate current.

The experiments show that it is possible to generate useful amounts of from the night sky. The potential is greatest in areas where humidity is low and night skies are usually clear, Munday said. The principle could be used, for example, to ventilate greenhouses or residential buildings.

UC Davis has filed a provisional patent related to the work.

More information:
Tristan J. Deppe et al, Mechanical power generation using Earth’s ambient radiation, Science Advances (2025). DOI: 10.1126/sciadv.adw6833

Citation:
Stirling engine generates mechanical power by linking Earth’s warmth to space (2025, November 12)
retrieved 12 November 2025
from https://techxplore.com/news/2025-11-stirling-generates-mechanical-power-linking.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Continue Reading

Tech

Our Favorite Travel and Outdoor Gear Is on Sale at Huckberry

Published

on

Our Favorite Travel and Outdoor Gear Is on Sale at Huckberry


Huckberry, purveyors of finely curated clothing and gear for the sort of person equally at home in the woods and the city, is having one of the company’s rare site-wide sales this week—or pretty close to site-wide. We’ve tested and love quite a bit of Huckberry’s stuff, especially the Proof 72-hour merino T-shirt. If you buy nothing else this year, buy that. Trust me. Check out the other deals, which we’ve rounded up below.

Great Deals on our Favorite Travel Clothes

Courtesy of Huckberry

Proof

72-Hour Merino T-Shirt

Huckberry’s Proof 72-hour merino T-shirt is our favorite merino wool T-shirt. The cut and style are not overly sporty, making it more versatile than some others, from everyday wear around town to a trip to the gym. Mine is still soft even after six months of wear and washing. At 87 percent 150 gsm superfine merino wool (16.5 micron) and 13 percent nylon, this T-shirt makes a great starter for those new to merino wool—there’s enough nylon that’s stretchy, and not the least bit itchy.

These pants are the companion piece to the 72-hour shirt above. There’s quite a bit less wool here though. The breakdown is 47 percent merino wool, 33 percent nylon, 14 percent polyester, and 6 percent elastane. The result is a much stretchier fabric than the t-shirt, which still provides a good amount of moisture-wicking and the anti-odor properties of merino. My only gripe with these is that they feel synthetic. What I love about them is the stain resistance. Yes, that DWR coating that gives them that stain resistance will wear off, but it’s not too hard to rejuvenate it.

When I travel, these are the pants I wear. They’re light, comfy, stretchy, and weigh next to nothing. They’re 98 percent cotton, with 2 percent Spandex to give them a little stretch. Unlike jeans, these have enough flex that you can easily do squats in them. It’s possible that translates to some stretching out over time, but I’ve been wearing mine for going on a year now and they still fit perfectly.

I love this jacket. It’s the only jacket I’ve ever worn that anyone has complimented me on, which is also the case for another WIRED staffer. Waxed canvas is definitely heavy, but it stands up very well to wear. I’ve had my Trucker Jacket for well over a year and it still looks like new. I don’t need to re-wax it yet, but I have re-waxed other things and it’s dead simple to do. There’s also a wool-lined version, which I have not tried but I do kinda wish I had that instead of the flannel. It’s on sale as well.

Deals on Backpacks, Coffee Brewers, and Other Gear

Our Favorite Travel and Outdoor Gear Is on Sale at Huckberry

Courtesy of Huckberry

GoRucks are awesome backpacks, but they aren’t cheap. Here’s a chance to get the GoRuck GR1 for a bit less. This is a collaboration between GoRuck and Huckberry, with branding from both companies on the pack. My favorite thing about the GR1 is its versatility. I have used this pack for plane travel (as a carry-on), rucking, hiking, hauling camera gear, and more. I even strapped it to the back rack of my bike for an overnight bikepacking trip. If you want to ruck with it, grab a weight plate as well.

The Yeti Hopper Flip 12 is a nice little personal-size cooler. Hopper Flip 12 closes with a water proof zipper, which has never leaked on my thus far. With 12 quarts of capacity, it’s not huge. Think a six pack and sandwich, depending on what you use to keep things cold (ice packs are the way to go with this one).

This isn’t a huge discount, but any time you can save some money on Snow Peak it’s a win. The company’s incredibly well-designed gear isn’t cheap. Take this mug, which amounts to a $47 coffee mug. But look, it’s titanium, OK? And it’s double-walled so your coffee stays warm even on those bitter cold mornings at the cabin. (Ed. note: These are editor Adrienne So’s camping mugs and she’s used them for about 10 years now.)

If you’re going to get the mug, you might as well get the French press too.

You see where we’re going here—mug, brewer, and now grinder. Yes, this is a $140 (on sale!) military-grade aluminum and high-carbon stainless steel burr grinder, which, I know, that’s a lot, This is also hands down the best most reliable hand grinder I’ve ever used. Mine is five years old and has stood up to the abuse of years and years of travel without missing a beat. It’s missing a little paint, but otherwise works exactly like the day I got it. On sale, I might add.

Peak Design Everyday bag

Photograph: Peak Design

The Everyday Backpack is one of our favorite camera bags, but it doesn’t have to be that. It’s really just a nice EDC backpack with some well thought out features, like a tuck-away waist strap, three FlexFold dividers, and a nice strap for attaching it to the handle of your rolling carry on bag.


Power up with unlimited access to WIRED. Get best-in-class reporting and exclusive subscriber content that’s too important to ignore. Subscribe Today.



Source link

Continue Reading

Tech

Anthropic’s Claude Takes Control of a Robot Dog

Published

on

Anthropic’s Claude Takes Control of a Robot Dog


As more robots start showing up in warehouses, offices, and even people’s homes, the idea of large language models hacking into complex systems sounds like the stuff of sci-fi nightmares. So, naturally, Anthropic researchers were eager to see what would happen if Claude tried taking control of a robot—in this case, a robot dog.

In a new study, Anthropic researchers found that Claude was able to automate much of the work involved in programming a robot and getting it to do physical tasks. On one level, their findings show the agentic coding abilities of modern AI models. On another, they hint at how these systems may start to extend into the physical realm as models master more aspects of coding and get better at interacting with software—and physical objects as well.

“We have the suspicion that the next step for AI models is to start reaching out into the world and affecting the world more broadly,” Logan Graham, a member of Anthropic’s red team, which studies models for potential risks, tells WIRED. “This will really require models to interface more with robots.”

Courtesy of Anthropic

Courtesy of Anthropic

Anthropic was founded in 2021 by former OpenAI staffers who believed that AI might become problematic—even dangerous—as it advances. Today’s models are not smart enough to take full control of a robot, Graham says, but future models might be. He says that studying how people leverage LLMs to program robots could help the industry prepare for the idea of “models eventually self-embodying,” referring to the idea that AI may someday operate physical systems.

It is still unclear why an AI model would decide to take control of a robot—let alone do something malevolent with it. But speculating about the worst-case scenario is part of Anthropic’s brand, and it helps position the company as a key player in the responsible AI movement.

In the experiment, dubbed Project Fetch, Anthropic asked two groups of researchers without previous robotics experience to take control of a robot dog, the Unitree Go2 quadruped, and program it to do specific activities. The teams were given access to a controller, then asked to complete increasingly complex tasks. One group was using Claude’s coding model—the other was writing code without AI assistance. The group using Claude was able to complete some—though not all—tasks faster than the human-only programming group. For example, it was able to get the robot to walk around and find a beach ball, something that the human-only group could not figure out.

Anthropic also studied the collaboration dynamics in both teams by recording and analyzing their interactions. They found that the group without access to Claude exhibited more negative sentiments and confusion. This might be because Claude made it quicker to connect to the robot and coded an easier-to-use interface.

Courtesy of Anthropic

The Go2 robot used in Anthropic’s experiments costs $16,900—relatively cheap, by robot standards. It is typically deployed in industries like construction and manufacturing to perform remote inspections and security patrols. The robot is able to walk autonomously but generally relies on high-level software commands or a person operating a controller. Go2 is made by Unitree, which is based in Hangzhou, China. Its AI systems are currently the most popular on the market, according to a recent report by SemiAnalysis.

The large language models that power ChatGPT and other clever chatbots typically generate text or images in response to a prompt. More recently, these systems have become adept at generating code and operating software—turning them into agents rather than just text-generators.



Source link

Continue Reading

Trending