All at sea, Microsoft axes flying car project

Norway, Estonia in shock


It's official: Microsoft's flying car project is in peril, the company's US PR agency Waggener Edstrom told us today. The mysterious vehicle that's thrilled so many readers this week now faces the axe.

The good news is that we finally have official confirmation of these strange sightings of amphibious craft making sometimes very slow, and sometimes incredibly quick, but always unplanned detours across Europe, thanks to MapPoint or Autoroute.

But the bad news is that the fun might end soon. No longer will Norwegians, Latvians and Estonians be able to press the web equivalent of Asteroids' "hyperspace" button and find themselves in Newcastle-upon-Tyne, England. There are no surface-effect vehicles, modeled after Alexeev's Caspian Sea Ekranoplan, being tested in the Baltic.

Or at least, not by Microsoft. This is what we were told.

"Microsoft aggregates the most accurate and up-to-date driving directions possible for our customers using information pulled from the industry’s top data providers", the agency tells us.

Yes, of course.

"The MapPoint team of cartographers uses the best data from each of our providers, and a complicated routing topology to calculate routes."

A complicated routing topology? What, like this?

Complicated routing topology: an example

Thanks to Kees Huyser

But let's return to the official explanation.

"We are aware that errors in the data provided to us could result in incorrect driving directions, and we work to quickly resolve any issues."

But just in case, fit a fin and some wings.

MapPoint advises all drivers to take precautions

"In this specific case one road segment was attributed incorrectly in the topology, causing the routing algorithm to ignore that road and generate the error in calculating the driving directions. We are currently working on a fix for this issue, and we expect it to be available in early February.

But we suspect that there might be more to the problem than just a solitary ignored road. Toben Mogensen from Denmark highlights this journey from Stockholm to Helsinki.

The inter-Baltic pick up: Just wait for flying car

"The suggested route starts in the middle of the Baltic Sea on a ferry from Stockholm to Helsinki. Then you drive around in the Southern part of Finland before, magically, driving across the Baltic Sea on 'local roads' to arrive in Tallinn," writes Toben.

"The distance is given as 68.4 miles (which sounds about right) and the estimated time for the journey is 4 hours and 36 minutes. The return journey is by the same route in reverse, only now it takes 4 hours and 53 minutes."

So we know the flying car will do scheduled pickups - so long as you're prepared to bob around in the North Sea.

By this point, you'd wish you'd caught the ferry.

Or wait for an Exranoplan. And not every one believes the explanation can be so simple.

"I believe this to be a decoy tactic," writes Simon Walke. "They are involved in something far more sinister, potentially involving the relocation of thousands of Norwegian citizens."

Autoroute to Oslo: Evacuate!

For proof, click for a larger version of that sinister warning from Autoroute 2003.

"The Norwegians are lovely people, but I think they might take offence at having their capital city shifted," writes Simon.

Wormholes ... for mermaids?

If it was a road missing, that would be a logical explanation. But then Christian Carey provided evidence of this fantastic voyage:

Estonia to Latvia

"Have a look at travelling from Sääre, Estonia (near the southern tip of the island of Saaremaa) to Ventspils, Latvia: 0.0 km net distance travelled in 3 hours, 21 minutes. Note that the starting point of the trip is about 125 km NNW of Sääre. Perhaps there are previously unpublicized wormholes throughout northern Europe? It might explain the Flying Car route optimizations..."

Or maybe the tide carries you along. Who knows? Either way, it's a real petrol-saver.

And don't forget the details. The last piece of advice for the Microsoft developers comes from Roy Øvrebø. He took this fantastic, high-speed boomerang journey of only 480 miles from Haugesund to Helsinki, and was advised it would take 65 hours and 58 minutes. Well of course it would. However, he noticed an error most of us who've used in-car GPS systems will know:

"Step 3 requires you to turn right the wrong way down a one-way street in the center of Haugesund."

Finally, Friso Dikstelbergen claims that ten years ago he tried to trip up the DOS-based route planners for the Dutch and Belgian railways, without any success. "I couldn't really fault them. In the end I had to resort to using the "via" box to get them to display really bad information. It just shows you how far we've come in ten years."

We've come along way, indeed.®

Related stories

Is Microsoft preparing a flying car?
Microsoft flying car spotted over Fishguard
Brits roll out jam-busting airtaxi
Briton invades France in amphibious car
Mach 0.3 milk float goes for land speed glory
Flying car less likely than flying pig


Other stories you might like

  • Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware
    Russia-linked crime-as-a-service crew is rich, professional – and investing in R&D

    Analysis Wizard Spider, the Russia-linked crew behind high-profile malware Conti, Ryuk and Trickbot, has grown over the past five years into a multimillion-dollar organization that has built a corporate-like operating model, a year-long study has found.

    In a technical report this week, the folks at Prodaft, which has been tracking the cybercrime gang since 2021, outlined its own findings on Wizard Spider, supplemented by info that leaked about the Conti operation in February after the crooks publicly sided with Russia during the illegal invasion of Ukraine.

    What Prodaft found was a gang sitting on assets worth hundreds of millions of dollars funneled from multiple sophisticated malware variants. Wizard Spider, we're told, runs as a business with a complex network of subgroups and teams that target specific types of software, and has associations with other well-known miscreants, including those behind REvil and Qbot (also known as Qakbot or Pinkslipbot).

    Continue reading
  • Supreme Court urged to halt 'unconstitutional' Texas content-no-moderation law
    Everyone's entitled to a viewpoint but what's your viewpoint on what exactly is and isn't a viewpoint?

    A coalition of advocacy groups on Tuesday asked the US Supreme Court to block Texas' social media law HB 20 after the US Fifth Circuit Court of Appeals last week lifted a preliminary injunction that had kept it from taking effect.

    The Lone Star State law, which forbids large social media platforms from moderating content that's "lawful-but-awful," as advocacy group the Center for Democracy and Technology puts it, was approved last September by Governor Greg Abbott (R). It was immediately challenged in court and the judge hearing the case imposed a preliminary injunction, preventing the legislation from being enforced, on the basis that the trade groups opposing it – NetChoice and CCIA – were likely to prevail.

    But that injunction was lifted on appeal. That case continues to be litigated, but thanks to the Fifth Circuit, HB 20 can be enforced even as its constitutionality remains in dispute, hence the coalition's application [PDF] this month to the Supreme Court.

    Continue reading
  • How these crooks backdoor online shops and siphon victims' credit card info
    FBI and co blow lid off latest PHP tampering scam

    The FBI and its friends have warned businesses of crooks scraping people's credit-card details from tampered payment pages on compromised websites.

    It's an age-old problem: someone breaks into your online store and alters the code so that as your customers enter their info, copies of their data is siphoned to fraudsters to exploit. The Feds this week have detailed one such effort that reared its head lately.

    As early as September 2020, we're told, miscreants compromised at least one American company's vulnerable website from three IP addresses: 80[.]249.207.19, 80[.]82.64.211 and 80[.]249.206.197. The intruders modified the web script TempOrders.php in an attempt to inject malicious code into the checkout.php page.

    Continue reading

Biting the hand that feeds IT © 1998–2022