• Home
  • Web Security
  • Uncategorized
  • Vulnerabilities
  • Microsoft
  • ransomware
Log In
February 23, 2019

User Panel Banner
Log In

  • Home
  • Web Security
  • Uncategorized
  • Vulnerabilities
  • Microsoft
  • ransomware
HomeWeb SecurityMulti-Million Dollar Upgrade Planned To Secure �...

Multi-Million Dollar Upgrade Planned To Secure 'Failsafe' Arctic Seed Vault

  • June 14, 2017
  • 0 comments
  • Simon Steed
  • Posted in Web Security
  • 0
0
SHARES
ShareTweet

An anonymous reader quotes a report from The Guardian: The Global Seed Vault, built in the Arctic as an impregnable deep freeze for the world’s most precious food seeds, is to undergo a multi-million dollar upgrade after water from melting permafrost flooded its access tunnel. No seeds were damaged but the incident undermined the original belief that the vault would be a “failsafe” facility, securing the world’s food supply forever. Now the Norwegian government, which owns the vault, has committed $4.4 million to improvements. [T]he vault’s planners had not anticipated the extreme warm weather seen recently at the end of the world’s hottest ever recorded year. “The background to the technical improvements is that the permafrost has not established itself as planned,” said a government statement. “A group will investigate potential solutions to counter the increased water volumes resulting from a wetter and warmer climate on Svalbard.” One option could be to replace the access tunnel, which slopes down towards the vault’s main door, carrying water towards the seeds. A new upward sloping tunnel would take water away from the vault. An initial $1.6 million will be spent on investigating ways to improve the access tunnel, with the group’s conclusions delivered in spring 2018. “They are going in with an open mind to find a good solution,” said Aschim. “$4.4 million is for all the improvements we are doing now.” The vault cost $9 million to build.


Share on Google+

Read more of this story at Slashdot.

Share this

ShareTweet

Related Posts

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

0 comments
UncategorizedWeb Security

GDPR: who needs to hire a data protection officer?

0 comments
DDoSPrivacyUncategorizedWeb Security

News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online

Roomba Inventor Launches 'Tertill', a We...

  • June 14, 2017
  • 0 comments

Google Searches Show That America Is Full of Racis...

  • June 14, 2017
  • 0 comments

Share this

0
SHARES
ShareTweet

About author

Simon Steed

Related Posts

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

0 comments
UncategorizedWeb Security

GDPR: who needs to hire a data protection officer?

0 comments
DDoSPrivacyUncategorizedWeb Security

News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online

0 comments
Web Security

Now Any Florida Resident Can Challenge What Is Taught In Public Florida Schools

Tags

  • IT
  • security
  • threats

Leave a Reply Cancel reply

Do not miss

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

Pages

  • A List Of Rules That Every C Programmer Should Follow
  • A tutorial on I/O Streams
  • A TUTORIAL ON POINTERS AND ARRAYS IN C
  • An Assembly Language Primer(C) 1983 by David Whitman
  • C Frequently Asked Questions (FAQ) Full Version
  • C/C++ Null Pointers
  • C++ Operators by John M. Dlugosz
  • C++ Overview by John Tal
  • comp.lang.c Answers to Frequently Asked Questions (FAQ List)
  • Delphi Tips
  • Delphi Tutorial – Lesson 1 12/29/98 Frank Fortino [email protected] Copyright 1999
  • Delphi Tutorial – Lesson 2 More Delphi Stuff 1/4/99 Frank Fortino [email protected] Copyright 1999
  • General Steps in Converting C applications to C++
  • Home
  • How to do things in Visual Basic
  • IBM Personal Computer Assembly Language Tutorial
  • LocalSQL.hlp as HTML File
  • Programming in C – a shortish tutorial by Toto
  • Sample Page
  • Using the Debug Command (dos)
  • Write simple scripts in PERL (CGI)

Top Posts

Health trust rapped on illegal use of patient data...

  • July 5, 2017
  • 0

GDPR: who needs to hire a data protection officer?

  • July 5, 2017
  • 0

News in brief: China tightens Great Firewall; stud...

  • July 5, 2017
  • 0

Now Any Florida Resident Can Challenge What Is Tau...

  • July 4, 2017
  • 0

Court Blocks EPA Effort To Suspend Obama-Era Metha...

  • July 4, 2017
  • 0

Tags

IT security threats

Archive

Site Categories

Copyright © 2006-2016 xploiter.com
Got a hot tip? Send it to us!

Your Name (required)

Your Email (required)

Video URL

Attach Video

Category
SportNewsTechMusic

Your Message

Got a hot tip? Send it to us!

Your Name (required)

Your Email (required)

Subject

Your Message