logo
100 years of the Tribune Tower: How it helped create the "Mag Mile"

100 years of the Tribune Tower: How it helped create the "Mag Mile"

Axios08-07-2025
This week's History Mystery isn't much of a mystery, but more of a time capsule.
The latest: The Tribune Tower, one of Chicago's most famous buildings, just turned 100.
State of play: The Gothic tower opened in 1925. The building, which was once the home of the giant Chicago Tribune empire, is now luxury condos.
The intrigue: While the building celebrated its birthday over the weekend, this Getty archival photo gives us a glimpse of what was happening just a few short years after the building reshaped the Mag Mile forever.
Flashback: The Trib Tower and its neighbor, the Wrigley Building, ushered in a new era for North Michigan Avenue in the 1920s. Before the two buildings were erected, the north side of the river was grimy and gritty, home to manufacturing and a smattering of residential buildings.
With the two buildings anchoring the south end of the street, the now notorious stretch took off with new construction, retail and investment.
In just a few short years, traffic boomed, new buildings were born, and North Michigan Avenue became the Mag Mile.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Kamala Harris Announces Book On Presidential Run & Decides Not Run For California Governor
Kamala Harris Announces Book On Presidential Run & Decides Not Run For California Governor

Black America Web

time9 hours ago

  • Black America Web

Kamala Harris Announces Book On Presidential Run & Decides Not Run For California Governor

Source: Big Event Media / Getty Kamala Harris has decided her next move. But it won't be running for governor. The former vice president announced yesterday that she would not be seeking the top political job in California, despite rampant speculation that she was in the running. She made the announcement via social media. 'For now, my leadership — and public service — will not be in elected office,' she said Wednesday. 'I look forward to getting back out and listening to the American people, helping elect Democrats across the nation who will fight fearlessly, and sharing more details in the months ahead about my own plans.' Related Stories She added, 'I have extraordinary admiration and respect for those who dedicate their lives to public service — service to their communities and to our nation,' she added. 'At the same time, we must recognize that our politics, our government, and our institutions have too often failed the American people, culminating in this moment of crisis. As we look ahead, we must be willing to pursue change through new methods and fresh thinking — committed to our same values and principles, but not bound by the same playbook.' Harris was speculated to be a candidate in the 2026 governor's race. The current governor, Gavin Newsom, is term-limited and is among the potential Democratic candidates to run for president in the 2028 election. According to a CNN report, although Harris researched the role and what it would take to win in a crowded field that includes Antonio Villaraigosa, the former mayor of Los Angeles, former Health and Human Services Secretary Xavier Becerra, and Rep. Katie Porter, she ultimately decided against it. Harris made the announcement after traveling to the United Kingdom for the wedding of Eve Jobs, the daughter of Apple co-founder Steve Jobs and Laurene Powell Jobs. Harris and Powell Jobs are longtime friends. Powell Jobs has been one of her financial backers, digging from her own deep pockets to support Harris' campaigns. Will Harris use the downtime to prepare for another presidential run in 2028? It's unclear whether or not that's the plan. While her celebrity and fundraising ability would help her, her political history may prove detrimental. In an interview with the L.A. Times, Charlie Cook, a non-partisan political strategist, says Harris' name recognition certainly would help place her 'as a serious contender, but no more so than a handful of other people would be.' But he says that goes both ways in a future presidential run. '…I think the desire/need to turn the corner and get some separation from Biden probably strips away any advantage. One thing we know Harris is doing – she's releasing a book. 107 Days comes out on Sept. 23. Harris will do her first TV interview since the election on The Late Show With Stephen Colbert. 'I believe there is value in sharing what I saw, what I learned, and what I know it will take to move forward,' the former vice president posted to X. 'In writing this book, one truth kept coming back to me: sometimes, the fight takes a while. See social media's reaction to Harris' next endeavor below. Kamala Harris Announces Book On Presidential Run & Decides Not Run For California Governor was originally published on

Jurassic Flaws: Supply Chain Practices That Should Be Fossilized
Jurassic Flaws: Supply Chain Practices That Should Be Fossilized

Forbes

time19 hours ago

  • Forbes

Jurassic Flaws: Supply Chain Practices That Should Be Fossilized

Clinging to outdated processes and clunky legacy systems is like trying to run a modern enterprise on an island full of creatures from a bygone era. getty Imagine standing behind the electrified fences of Jurassic Park. The ground trembles beneath your feet as a distant rumble grows louder. From the shadows emerge majestic prehistoric creatures - powerful and immense, yet ultimately doomed to extinction. What was their downfall? An inability to evolve and adapt to a changing world. Your supply chain is much like those dinosaurs. Clinging to outdated processes and clunky legacy systems is like trying to run a modern enterprise on an island full of creatures from a bygone era. If you don't keep pace with change, you risk becoming extinct. Let's explore which antiquated supply chain practices must be extinct to ensure survival and success in the age of rapid transformation. #1 Relying on Traditional Demand Forecasting Methods The world we live in is moving way too fast to make a forecast based on last year's demand. Markets shift suddenly, consumer preferences evolve rapidly and government regulations change unpredictably. A pandemic can cause prices for medical masks to soar thirtyfold compared to a normal year. An extreme, unexpected drought in Taiwan can disrupt global semiconductor supply chains, causing a huge delay of your new car or gaming console on the promised delivery date. A single TikTok trend can skyrocket demand overnight, leading to global shortages. Take the example of the viral Dubai chocolate , and how a trend caused a pistachio shortage all over the world. Social media is not just a marketing tool but a great real-time barometer to sense demand and predict shifting consumer tastes, which change from one day to another. Forbes How The Dubai Chocolate Sensation Is Creating A Supply Chain Strain By Oyku Ilgar | Paid Program Unlike conventional methods that rely solely on past sales, AI-powered demand forecasting can help companies by using machine learning algorithms to detect viral trends and shifts in sentiment. These technologies can factor in sudden market shifts, emerging trends, and external disruptions faster than any human team could. They not only help companies to make smarter decisions, but also help them to optimize inventory, reduce waste, and more effectively meet customer expectations even amid uncertainty. #2 Measuring Performance Based on Cost-Only Metrics Evaluating supply chain success solely on cost reduction is another need-to-extinct method, as it leads businesses to ignore crucial multi-dimensional factors that are essential for long-term success and resilience. As we all know, ' tariff ' became the word of the year. And if there's one key lesson they have taught us this year, it's that you can't rely on a single supplier just because it suited your business needs for the last decade. For example, as a cost-conscious US retailer whose only supplier is in China, the choices are tough: either pass higher costs onto customers or risk losing market presence altogether. Solely being cost-conscious comes with a price that, especially in a complex market environment that literally wakes up to a new disruption every other day. Not only should companies avoid putting all their eggs in the same basket, but they also need to be transparent about where those eggs are coming from. A new generation of consumers entered the market, and they prioritize sustainability and conscious choices over cost and demand transparency. In such an ambitious market, where businesses constantly innovate to boost customer satisfaction through measures like on-time delivery and order accuracy, and where focusing solely on cost as a performance metric can put businesses at a serious risk of failure rather than bring success. The real cost often lies not just in expenses but in the cost of having the wrong measures, leading to damaging strategic choices, missed opportunities, and increased vulnerability to disruptions. #3 Running Supply Chains on Manual, Spreadsheet, and E-mail Based Systems Nearly 60% of organizations still rely on spreadsheets to monitor and manage supply chain disruptions. Let's be honest, spreadsheets had been the duct tape of supply chains for decades, and they worked great – until they didn't . Because as soon as a spreadsheet is circulated, it is already outdated. This often leads to fragmented collaboration, inconsistent actions, and operational delays. Remember the massive Ever Given incident? It was not an accident where you could simply say, well, ship happens , but the blockage of the Suez Canal stranded around 400 ships waiting to transit during the roughly six-day disruption. The value of goods delayed was estimated at $9.6 billion per day, with maritime experts valuing the hourly delay at approximately $400 million. Many companies were still dependent on static spreadsheets and struggled to react swiftly to the cascading delays because their tools lacked real-time visibility. Shipments stalled, inventory went untracked, and rerouting decisions lagged, leading to billions in losses worldwide. The risks are becoming even more significant, especially when you consider nearly 9 out of 10 spreadsheets contain at least one error. McKinsey and related industry analyses highlight that poor data quality in supply chains causes multibillion-dollar financial losses due to miscalculations, delayed reactions, and operational mistakes. As business continues to accelerate, these limitations pose an even greater risk to supply chain resilience and efficiency. By embracing digital supply chain platforms that deliver real-time visibility, automation, and smart analytics help companies to respond quickly to disruptions or sudden changes in the global market. This digital shift transforms clunky, error-prone spreadsheets into powerful ecosystems that keep every stakeholder aligned, minimize operational risks, and ensure supply chains are resilient enough to handle crises. Those businesses that don't evolve or ditch those fossilized tools are headed for extinction. But those who adapt, get agile, and embrace the digital age don't just survive but thrive as they become the true apex predators of their industries. Learn how to evolve your supply chain today and lead the pack.

The Growing Impact Of AI And Quantum On Cybersecurity
The Growing Impact Of AI And Quantum On Cybersecurity

Forbes

timea day ago

  • Forbes

The Growing Impact Of AI And Quantum On Cybersecurity

Artificial Intelligence and Quantum getty In mid-2025, we are entering the early stages of a new age of digital transformation where networked technologies that combine engineering, computer algorithms, and culture are becoming impactful on a global scale. The upcoming digital revolution and technological convergence will drastically affect our patterns of living, working, and networking in the near future. It is certain that science and technology will continue to propel humanity ahead at an exponential pace, and adapting to the emerging technological ecosystem will be critical to making that vision a reality. Organizations that aspire to succeed in the new digital economy must prioritize innovation, reliability, quality, cost-effectiveness, and security. The amalgamation of artificial intelligence with quantum computing will transform existing computational paradigms, heralding a promising future, but with risks. Digital Transformation Propelled by Emerging Technologies Technologies Impacting Digital Transformation Chuck Brooks Significant technical innovation is defining the transformative digital age. It is a time in history characterized by information exchange and analysis by intelligent systems powered by artificial intelligence algorithms and developing technologies. Such a digital revolution may increase efficiency and economic success, but it also introduces substantial security dangers. The transformative effects of emerging technologies in this year by artificial intelligence and quantum computing will be hugely impactful; however, their cybersecurity challenges on society will require the need for proactive security adaptation and collaboration to mitigate new threats. Cybersecurity Challenges for The New Technological Era The growing complexity of AI-enabled cyberattacks, as well as the urgent need for strong defensive systems, are serious cybersecurity issues. As organizations become increasingly linked and data-driven, their vulnerabilities grow. A proactive security posture, rather than a reactive one, is necessary to prosper and survive. This includes the need for ongoing monitoring, enhanced threat intelligence, and thorough incident response plans. Cybersecurity is more than just an IT concern; it is an essential component of every company strategy. In this age of instant digital connectivity, every company's operation, reputation, brand, and income streams are all at risk. Cybercrime is an issue that impacts every size company. Cybersecurity Ventures estimates that the cost of cybercrime will reach $10.5 trillion USD by the end of this year. Cybercrime To Cost The World $10.5 Trillion Annually By 2025 ( The Impact Of Artificial Intelligence on Cybersecurity Artificial Intelligence and Cybersecurity Chuck Brooks Cybersecurity and AI are key areas of focus in the emerging digital ecosystem. Artificial intelligence (AI) systems aim to reproduce human characteristics and processing power in a machine and outperform human speed and constraints. It is already taking place. Artificial intelligence (AI)-enabled computers are mostly used for automation tasks, including speech recognition, learning, planning, and problem-solving. By prioritizing and acting on data, AI technologies can make decision-making more efficient, especially in bigger networks with numerous users and factors. For cybersecurity, artificial intelligence may expedite the swift detection and identification of cyber threats. Cybersecurity companies have developed AI-powered software and platforms that oversee real-time network activities by analyzing data and files to detect unauthorized communication attempts, illicit connections, anomalous or malicious credential usage, brute force login attempts, atypical data movement, and data exfiltration. This allows organizations to gain statistical insights and protect against anomalies before their reporting and correction. AI improves network monitoring and threat detection tools for smart security by reducing noise, providing prioritized alarms, using contextual data supported by evidence, and performing automated analysis based on correlation indices from cyber threat intelligence. On-premises systems, cloud computing, and edge computing have made the total IT perimeter for many organizations and institutions more complex and dispersed. This requires improved threat detection, analysis, and incident response, as well as increased visibility. This is the most critical component of smart cybersecurity. Smart cybersecurity can detect, filter, neutralize, and remediate cyber threats. Additionally, predictive and generative AI algorithms may apply predictive models more effectively in cybersecurity, resulting in improved security data and results. AI solutions for threat intelligence and network monitoring may assist in improving cybersecurity. Generative AI (GenAI) may be able to deploy predictive models in cybersecurity in a more effective manner, yielding better outcomes and more reliable security data. AI agents and GenAI might collaborate to identify strategies to decrease risk while also improving cybersecurity knowledge and incident response for corporations and organizations. Generative AI can swiftly extract important information, best practices, and recommended actions from the security industry's corpus of knowledge. Agentic AI-enabled cybersecurity offers enormous promise for detecting, preventing, halting, and resolving cyberthreats. Agentic AI can assist with the primary issues of threat detection, response time, and analyst burden. These technologies automate duties while still allowing for human oversight, making security teams more effective in an increasingly perilous digital environment. While AI and ML are crucial tools for cyber defense, they may also provide asymmetrical tools for adversarial hackers. While they may be used to rapidly identify hazardous abnormalities and enhance cybersecurity measures, threat actors may also exploit them. Adversarial nations and nefarious hackers are now using AI and MI to discern and exploit vulnerabilities in threat-detecting frameworks. They use several techniques to do this. Their favored techniques often include automated phishing schemes that replicate human actions, with malware that autonomously alters itself to mislead or compromise cybersecurity frameworks and applications. Cybercriminals are now using AI and machine learning technologies to penetrate and analyze victims' networks. According to research issued Thursday by cybersecurity firm Team8, one in every four CISOs has encountered an AI-generated attack on their company's network in the last year, and AI threats are now at the top of their priority lists. According to Team8, the real number of firms attacked by AI-powered assaults "may be even higher," since most AI-driven threats imitate human behavior and are difficult to identify without sophisticated metrics such as time to exploitation and velocity indicators. AI, Risk, and the Road Ahead: Key Findings from the 2025 CISO Village Survey - Team8 A 2025 IBM/Ponemon Institute research study found that one out of every six breaches involved AI-driven attacks. Attackers are using generative AI to perfect and scale their phishing campaigns and other social engineering attacks. IBM: Cost of U.S. data breach reaches all-time high and shadow AI isn't helping | Network World Small firms, organizations that lack the in-house expertise, and the financial resources for significant investments in sophisticated cybersecurity mitigation technologies are the most vulnerable. Cybercriminals are using artificial intelligence technology to automate their attacks by accessing and analyzing victim networks. Their favorite strategies for deceiving or undermining cyber-defense systems and applications include self-modifying malware and automated phishing efforts. As a result, their focused attacks are more deadly, planned, and quick. Cybercriminals regularly use business email compromise (BEC) fraud schemes to defraud victims by impersonating a legitimate person or company. Hackers may use generative AI to create emails that closely resemble the language, style, and tone of the person or organization they are impersonating, confounding the difference between false and real communications. They can deploy AI tools that can even spoof a person with fake videos and voice mimicking. The most effective approaches for preventing and detecting spoofs and hacks entail always being vigilant. Avoid clicking on links in emails or websites without first checking the sender's identity. Install antivirus and AI-enabled spoof detection software and consider using packet filtering capabilities provided by multiple manufacturers. In addition, with AI-enabled attacks expanding, Zero Trust identity-centric security is important for recognizing identity access and management as the point of greatest marginal risk reduction. Clearly, AI is a transformative force in cybersecurity, offering both immense opportunities and significant risks. To succeed in this changing environment, organizations must take a comprehensive approach that combines advanced AI security tools with strong basic cybersecurity practices, focuses on proactive defense methods, and continuously adjust to new threats. Quantum Computing's Emerging Capabilities and Threats Quantum Computing Chuck Brooks Quantum computing works by harnessing the distinctive properties of atoms and subatomic particles. Physicists are creating quantum computers with exceptional computing speeds, enabling a new kind of analytics and cryptography. There are estimates that organizations are en route toward building commercially viable, fault-tolerant quantum computers within the decade. Quantum computing is becoming more viable as technology advances, making it easier to develop and more efficient at scaling. The gate model and quantum annealing are the two most used quantum computing strategies. Workable quantum solutions based on annealing systems are now widely used. And gate models may appear much sooner than expected. Some annealing quantum-type computers are already commercialized. Photonics computers, which use light photons instead of electrons for data transmission and processing, are already being manufactured in the quantum realm. The benefit of quantum photonic computing lies in its functionality at room temperature, since the particles exhibit greater stability. Quantum Computing Inc. (Nasdaq: QUBT), an innovative, integrated photonics and quantum optics technology company, recently announced the successful shipment of its first commercial entangled photon source to support research in quantum networking and secure communications. Quantum Computing Inc. Ships First Commercial Entangled Photon Source for Quantum Communication Research Quantum computing is expected to advance mankind into the future by revolutionizing artificial intelligence and data analytics. As we reach the achievement of a fully functional quantum computer, a new domain of supercomputing arises that will impact practically every aspect of our lives. The computational power and velocity of quantum computing will assist in addressing some of the most significant and intricate concerns confronting humanity. Quantum computing will allow computers to analyze extensive data sets and conduct analyses at remarkable speeds. It will enable the rapid downloading of whole libraries in only seconds. The incorporation of AI will significantly alter society in terms of research, education, and predictive analytics. Quantum computing will be transformative to all society and enable exponentially faster problem-solving compared to classical computing, especially for complex fields like cryptography, materials science, and AI. Conversely, quantum computing could potentially disrupt the entire cybersecurity ecosystem in the near future. The achievement of quantum computing, along with the concept of quantum supremacy, may raise significant concerns. The United States and other countries are apprehensive that hackers are now pilfering data to be decrypted by quantum computers within the next ten years. The same computing capacity that enables rapid decoding or resolution of complex issues might also be used to undermine cybersecurity. This poses a direct danger to banking systems and other essential infrastructure. A typical computer would need a billion years to decrypt the current RSA-2048 standard encryption. A functioning quantum computer may possibly achieve a break-in in under two minutes. Q-Day, as called by quantum researchers, is the time when powerful quantum computers might use Shor's method to break all public key systems that depend on integer factorization and other security techniques. It will make today's security mechanisms obsolete. Governments, standards groups like NIST, and cybersecurity experts warn that the countdown to Q-Day has already begun. NIST's Post-Quantum Cryptography Project is working to standardize new cryptographic algorithms that are resistant to quantum assaults. A document that has been prepared by the Office of Management and Budget instructs government agencies to completely transition to a post-quantum cryptography standard. Quantum computing may improve cybersecurity by using improved cryptography algorithms. Quantum Key Distribution (QKD) creates secure communication channels by using quantum mechanics concepts. In QKD, every effort to eavesdrop affects the quantum state, quickly informing both parties. Post-Quantum Cryptography (PQC) strives to provide encryption algorithms that are resilient to quantum attacks. As per the latest findings of ISACA's worldwide Quantum Computing Pulse Poll. Even while 62% of cybersecurity and technology experts fear that quantum computing will crack current internet encryption, just 5% think that it is a top concern for the near future and just 5% indicate that their companies have a clear plan for quantum computing. Chris Dimitriadis, Chief Global Strategy Officer at ISACA, provides a good summary of the importance of both AI and quantum for our future and cybersecurity. ' As a society that relies so heavily on digital systems, it's imperative that we take this seriously. Organizations must make sure that they are already planning about how their operations might look in a post-quantum world while they keep developing a trained workforce on AI. They simply cannot afford to defer this critical preparation, risking the stability of the global economy itself. We need to build a holistically trained workforce on Quantum (and continue doing this for AI) and then create a plan for transition to the post-quantum era, enabling the safe adoption of these emerging technologies, so we can enjoy the benefits of innovation in a safe manner.' Press Releases 2025 Quantum computings rapid rise is a risk to cybersecurity and business stability The remainder of 2025 will witness a range of both new and old cyberthreats as cutting-edge technologies like artificial intelligence and quantum computing develop in functionality and understanding. This year will be especially challenging for everyone involved in protecting their data and company continuity against cyberattacks. To confront the expanding cyber threats going forward in our new digital era, it will be important to understand the evolving threat landscape and adapt to it with a comprehensive strategy that addresses both old and new threats. Cybersecurity will need more investments in people and processes, stronger public-private sector collaboration, and a comprehensive risk management approach. With the advent of artificial intelligence and quantum computing, there is little time to lose.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store