logo
City planning without permission

City planning without permission

Fast Company6 days ago
When I worked as a corporate consultant, I had access to all sorts of enterprise software packages that would've been cost-prohibitive to most people, but that didn't stop me from trying out free programs. Especially if it meant I could dabble in someone else's area of expertise without getting permission for a software seat license.
If you're an armchair urbanist or moonlight as a community activist, you know how important it is to maximize your impact with limited time. I've been there, I'm still there, and I can help. There's a treasure trove of free web tools online related to urbanism. I don't know of anyone using all of these all the time, but I use some of these every week. Use these resources to demonstrate expertise in your amateurbanism work.
'Amateurbanism' is not a dig at people who aren't working professionally in planning, design, or engineering. As someone who gets paid to plan and implement great street networks for all ages and abilities, I want amateur urbanists to be equipped for conversations and presentations about creating happy, healthy communities.
Google Maps
Many earthlings have used Google products, and the satellite views and street views are great ways to ground a conversation about project sites and travel routes. I find that a lot of people don't realize Google Maps has drawing tools, so you can illustrate proposed locations for community gardens, protected bike lanes, festival street closure areas, etc. This is ideal for location-based projects.
Google Earth
Google Earth brings in the 3D visualization of terrain and buildings. You can model things like where a new playground structure could fit in a park, granny flat additions in backyards, or simulate the changes brought by a proposed rezoning. The measurements also help with space planning.
OpenStreetMap
Anyone can add overlooked details like accessibility obstacles, safety concerns, parking availability, EV charging infrastructure, and much more to OpenStreetMap. This is a great tool to engage your email list, organization members, or friends. Your team can generate maps that reflect your knowledge and pro-community bias.
Envision Tomorrow
This is a scenario planning tool funded by the Department of Housing and Urban Development (HUD). It models the impacts of growth and development scenarios on factors like land consumption, transportation habits, greenhouse gases, and affordability. If you're comfortable with Google Maps, you'll be fine here. You might use Envision Tomorrow to analyze or critique a zoning ordinance, downtown revitalization plan, or transportation plan.
Walk Score
You've probably heard of the site that evaluates neighborhood walkability based on proximity to everyday destinations. (They also include bike and transit scores.) This helps assess site accessibility when reviewing development proposals to advocate for community needs like locating affordable housing near transit. But it's also a great conversation starter at a county or city level. Realtors love this reference and so should you.
Streetmix
Streetmix is collaborative street design between residents and city planners. You can model traffic-calming measures, sidewalk expansions, and storefront space. If it's a great neighborhood street idea, it's designable in Streetmix.
highway lighting versus pedestrian lighting
sharrows versus bike lanes
multiuse paths versus sidewalk–bike lane combos
right-sized vehicle lanes versus deadly-sized vehicle lanes
I can't overhype Streetmix. They make it shockingly simple to expose the silliness of Departments of Transportation (DOTs) while inspiring alternatives to the same old junk infrastructure.
Canva
Canva turns you into a professional designer. Their templates, graphics, and text options are more than you'll ever need for slide decks, reports, social media content, and memes. Use Canva for outreach campaigns, events, ideas, and causes. In fact, stop reading this post, open Canva, and make something.
SketchUp
SketchUp is a powerful 3D modeling tool, but does have a learning curve. I've seen it used for park proposals and streetscape ideas for public meetings. But my favorite is when developers use it to illustrate the not-too-scary density of commercial buildings and multifamily housing.
UrbanSim
If you're comfortable with GitHub and coding, then UrbanSim might be a playground for you. The models begin with detailed data about a region, and then estimate and validate interconnected model components. Public agencies and consultants use this to model how land use policies and transportation changes could impact housing affordability, environmental sustainability, traffic patterns over time, and more. The core platform is open source. It's a higher learning curve, but I thought it was worth including.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

D.C. Unleashes ChatGPT and Gemini -- AI Now Federal-Grade
D.C. Unleashes ChatGPT and Gemini -- AI Now Federal-Grade

Yahoo

time5 hours ago

  • Yahoo

D.C. Unleashes ChatGPT and Gemini -- AI Now Federal-Grade

The U.S. government just gave AI its biggest public-sector runway yet. On Tuesday, the General Services Administration quietly approved OpenAI, Google (NASDAQ:GOOG), and Anthropic as official AI vendors through its Multiple Award Scheduleessentially a federal fast pass for enterprise software. That means agencies can now bypass red tape and deploy tools like ChatGPT, Gemini, and Claude with pre-negotiated terms. For tech investors, this isn't just a signalit's a megaphone. These models, once limited to pilot programs and national security experiments, could now be embedded across departments like Treasury, Personnel Management, and more. Warning! GuruFocus has detected 6 Warning Signs with PFE. The timing is no coincidence. Just days ago, President Donald Trump signed a set of executive orders aimed at reshaping how AI is procured, including a clause requiring federal agencies to avoid ideological bias in language models. GSA officials were quick to clarify that the approved vendors weren't picked as winnersjust first to clear the contracting hurdles. Still, the implications are hard to ignore. This opens up a multi-billion-dollar channel for enterprise AI, and the early players could gain embedded access across dozens of federal workflows. Historically, GSA has used its scale to hammer down prices from software giants like Adobe and Salesforce. Similar pricing pressure could now apply to LLM vendorsbenefiting adoption, if not margins. Multiple agencies are already outlining use casesfrom fraud detection and grant reviews to policy comment summarization and internal chatbot assistants. The Office of Personnel Management wants to use AI to digest tens of thousands of public responses on regulatory changesa task that once took months. But as OPM Director Scott Kupor put it: We're probably missing people who are super conversant with very modern, AI-related stuff. Translation: software alone won't solve it. Hiring and execution will matter. Still, this latest GSA approval could be a meaningful step toward widespread institutional adoptionand a new chapter in the AI enterprise race. This article first appeared on GuruFocus. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

A New Email Scam Is Shockingly Realistic, Here's Everything You Need To Know About Protecting Yourself
A New Email Scam Is Shockingly Realistic, Here's Everything You Need To Know About Protecting Yourself

Yahoo

time16 hours ago

  • Yahoo

A New Email Scam Is Shockingly Realistic, Here's Everything You Need To Know About Protecting Yourself

An email hits your inbox from an unknown sender that includes a picture of your house and address, followed by a threat: 'Don't even try to hide from this. You have no idea what I'm capable of….I've got footage of you doing embarrassing things in your house (nice setup, by the way).' Sounds like a scene out of a horror film, right? Instead, it's one of the latest phishing scams. Like many other email and text scams, this particular extortion scheme uses specific personal information to deceive people into sending money. The email convinces people the hacker knows more about them and that they must exchange payment or Bitcoin in order to keep their information safe. 'I received a PDF over email that included my address and photo of the address and made outrageous claims about my private behavior, and claimed to have video documentation captured from spyware on my computer,' Jamie Beckland, a chief product officer at the tech company APIContext, told HuffPost. 'The scammer threatened to release the video if I didn't pay them via Bitcoin.' If you get a similar email, here are the steps you can take to figure out if it's a scam so you protect yourself: Confirm the house and street imagery on Google Maps. Related: Many phishing emails are often riddled with grammatical errors and poor formatting, which make them easier to identify. However, this scam, which includes images of people's homes, is a newer, darker twist. You might be asking yourself, how exactly was the scammer able to identify your house address? According to Al Iverson, a cyber expert and industry research and community engagement lead at the software company Valimail, the sender likely found your address from a prior data breach that leaked personal data, and then used a Google Maps photo to put together an email. Beckland was able to confirm this is a scam by comparing the image in the PDF to the Google Maps street view of his house. Most images in these scams are pulled from online sources, so he recommends that people check to see if the image was copied from the internet. If so, it's clearly not legitimate. Examine the email address and check for legitimacy. Related: Iverson recommended checking the email address' legitimacy whenever you receive any correspondence from unknown users. 'Check whether the sender's email domain matches the official organization's website,' he said as one example. 'Also, if using Gmail, look for 'show original message' and review SPF, DKIM, and DMARC results.' These are essentially methods that verify the emailer's domain to prevent spam, phishing attacks and other email security risks. To do this, click on the three-dot hamburger menu at the top right of your email and click 'Show Original.' 'All three should ideally pass authentication checks,' Iverson said. In other words, it would say 'PASS' next to all three options. Scammers have become very sophisticated when masking domains. As a result, beware of 'lookalike' domains with slight spelling variations. According to Iverson, if something seems too good (or too bad) to be true, it probably is. Another thing to keep an eye out for is if a scammer sends a message 'from' your own email address. Oftentimes, they are just spoofing your email address in the 'from' address header. 'These scammers don't have the time or ability to actually hack into your email accounts. They haven't found some secret treasure trove of compromising photos. They're just trying to scare unsuspecting people into coughing up money (or Bitcoin),' Iverson added. Don't click unfamiliar links, especially related to payments. If an email seems legitimate, you might accidentally click on the links it contains for more information. Zarik Megerdichian, founder of Loop8, a company that protects personal data and privacy from data breaches and hackers, strongly cautions against this. 'Exercise caution any time you're asked to click on a link in an email,' Megerdichian said. 'Bitcoin transactions are irreversible, as are many other common payment methods including Cash App and Zelle.' Further, scams that demand remuneration should be reported to the Federal Trade Commission by filing a report online or via phone. Megerdichian also noted that if a hacker has obtained details about your financials, monitor your bank accounts closely and dispute fraudulent charges with your bank, cancel your cards and preventatively stop future charges. Update and change your passwords. Related: It's also highly advisable when confronted with an elaborate scam to change all of your passwords. According to Yashin Manraj, CEO of Pvotal Technologies, a company that creates secure tech infrastructures for businesses, it's important to protect your data right away if you suspect it's been compromised. 'Use a new email address if possible and move critical financial or utilities to it, and then start reporting the case to the local police, the FBI and making sure your family is aware of the potential threat of a public shaming in the unlikely event that they did manage to steal some compromising data,' Manraj said. Do not engage with the scammer. Related: It might feel tempting to respond to an email (especially ones that seem very realistic) to negotiate with the scammer. However, Manraj recommends disengaging and ignoring these emails because responding can actually place you on call logs and target databases that will make you vulnerable to further attacks. It's also advisable to isolate your home network via a separate Wi-Fi or router, using a VPN to connect to the internet. Most importantly, do not ask for specific help on public forums, especially when uploading logs or error messages. 'Be especially careful when using virtual numbers and password managers on unpopular websites to avoid reusing personally identified information that could be used to access your important financial services,' Manraj explained. Finally, be mindful about what data you are sharing in the future. Users should remember that data is a commodity, and businesses today collect too much information (often more than they need to complete the transaction at hand). When signing up for new websites or downloading apps, Megerdichian suggests avoiding oversharing. 'Always ask yourself, do they really need to know that? It's up to consumers to be proactive when it comes to their personal data,' Megerdichian article originally appeared on HuffPost. Also in Goodful: Also in Goodful: Also in Goodful:

A New Email Scam Is Shockingly Realistic, Here's Everything You Need To Know About Protecting Yourself
A New Email Scam Is Shockingly Realistic, Here's Everything You Need To Know About Protecting Yourself

Yahoo

timea day ago

  • Yahoo

A New Email Scam Is Shockingly Realistic, Here's Everything You Need To Know About Protecting Yourself

An email hits your inbox from an unknown sender that includes a picture of your house and address, followed by a threat: 'Don't even try to hide from this. You have no idea what I'm capable of….I've got footage of you doing embarrassing things in your house (nice setup, by the way).' Sounds like a scene out of a horror film, right? Instead, it's one of the latest phishing scams. Like many other email and text scams, this particular extortion scheme uses specific personal information to deceive people into sending money. The email convinces people the hacker knows more about them and that they must exchange payment or Bitcoin in order to keep their information safe. 'I received a PDF over email that included my address and photo of the address and made outrageous claims about my private behavior, and claimed to have video documentation captured from spyware on my computer,' Jamie Beckland, a chief product officer at the tech company APIContext, told HuffPost. 'The scammer threatened to release the video if I didn't pay them via Bitcoin.' If you get a similar email, here are the steps you can take to figure out if it's a scam so you protect yourself: Confirm the house and street imagery on Google Maps. Related: Many phishing emails are often riddled with grammatical errors and poor formatting, which make them easier to identify. However, this scam, which includes images of people's homes, is a newer, darker twist. You might be asking yourself, how exactly was the scammer able to identify your house address? According to Al Iverson, a cyber expert and industry research and community engagement lead at the software company Valimail, the sender likely found your address from a prior data breach that leaked personal data, and then used a Google Maps photo to put together an email. Beckland was able to confirm this is a scam by comparing the image in the PDF to the Google Maps street view of his house. Most images in these scams are pulled from online sources, so he recommends that people check to see if the image was copied from the internet. If so, it's clearly not legitimate. Examine the email address and check for legitimacy. Related: Iverson recommended checking the email address' legitimacy whenever you receive any correspondence from unknown users. 'Check whether the sender's email domain matches the official organization's website,' he said as one example. 'Also, if using Gmail, look for 'show original message' and review SPF, DKIM, and DMARC results.' These are essentially methods that verify the emailer's domain to prevent spam, phishing attacks and other email security risks. To do this, click on the three-dot hamburger menu at the top right of your email and click 'Show Original.' 'All three should ideally pass authentication checks,' Iverson said. In other words, it would say 'PASS' next to all three options. Scammers have become very sophisticated when masking domains. As a result, beware of 'lookalike' domains with slight spelling variations. According to Iverson, if something seems too good (or too bad) to be true, it probably is. Another thing to keep an eye out for is if a scammer sends a message 'from' your own email address. Oftentimes, they are just spoofing your email address in the 'from' address header. 'These scammers don't have the time or ability to actually hack into your email accounts. They haven't found some secret treasure trove of compromising photos. They're just trying to scare unsuspecting people into coughing up money (or Bitcoin),' Iverson added. Don't click unfamiliar links, especially related to payments. If an email seems legitimate, you might accidentally click on the links it contains for more information. Zarik Megerdichian, founder of Loop8, a company that protects personal data and privacy from data breaches and hackers, strongly cautions against this. 'Exercise caution any time you're asked to click on a link in an email,' Megerdichian said. 'Bitcoin transactions are irreversible, as are many other common payment methods including Cash App and Zelle.' Further, scams that demand remuneration should be reported to the Federal Trade Commission by filing a report online or via phone. Megerdichian also noted that if a hacker has obtained details about your financials, monitor your bank accounts closely and dispute fraudulent charges with your bank, cancel your cards and preventatively stop future charges. Update and change your passwords. Related: It's also highly advisable when confronted with an elaborate scam to change all of your passwords. According to Yashin Manraj, CEO of Pvotal Technologies, a company that creates secure tech infrastructures for businesses, it's important to protect your data right away if you suspect it's been compromised. 'Use a new email address if possible and move critical financial or utilities to it, and then start reporting the case to the local police, the FBI and making sure your family is aware of the potential threat of a public shaming in the unlikely event that they did manage to steal some compromising data,' Manraj said. Do not engage with the scammer. Related: It might feel tempting to respond to an email (especially ones that seem very realistic) to negotiate with the scammer. However, Manraj recommends disengaging and ignoring these emails because responding can actually place you on call logs and target databases that will make you vulnerable to further attacks. It's also advisable to isolate your home network via a separate Wi-Fi or router, using a VPN to connect to the internet. Most importantly, do not ask for specific help on public forums, especially when uploading logs or error messages. 'Be especially careful when using virtual numbers and password managers on unpopular websites to avoid reusing personally identified information that could be used to access your important financial services,' Manraj explained. Finally, be mindful about what data you are sharing in the future. Users should remember that data is a commodity, and businesses today collect too much information (often more than they need to complete the transaction at hand). When signing up for new websites or downloading apps, Megerdichian suggests avoiding oversharing. 'Always ask yourself, do they really need to know that? It's up to consumers to be proactive when it comes to their personal data,' Megerdichian article originally appeared on HuffPost. Also in Goodful: Also in Goodful: Also in Goodful:

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store