• Quordle hints and answers for Saturday, March 15 (game #1146)
    www.techradar.com
    Looking for Quordle clues? We can help. Plus get the answers to Quordle today and past solutions.
    0 التعليقات ·0 المشاركات ·37 مشاهدة
  • Papaya Swing VFX Breakdown by 1920
    vfxexpress.com
    Bringing the creative vision of Papaya Swing to life required seamless integration of CG elements, compositing, and digital enhancements. The team at 1920 meticulously crafted invisible VFX, ensuring the final visuals felt both organic and immersive.From environment extensions to complex simulations, every frame was enhanced to elevate the storytelling. Motion design and CG augmentation played a crucial role in achieving the distinct aesthetic, while color grading and lighting adjustments added depth and realism.With a focus on maintaining the authenticity of practical cinematography, 1920 blended digital effects with live-action footage, delivering a visually captivating experience. The result is a seamless fusion of technical precision and artistic vision, pushing the boundaries of modern VFX.The post Papaya Swing VFX Breakdown by 1920 appeared first on Vfxexpress.
    0 التعليقات ·0 المشاركات ·38 مشاهدة
  • Fire & Explosions VFX Reel by Ingenuity Studios
    vfxexpress.com
    Creating realistic fire and explosions in VFX requires a precise blend of 2D and 3D elements. To replicate the chaotic nature of real flames, details such as embers, smoke, and rogue flames are meticulously simulated, with physics-driven attributes like density, temperature, buoyancy, and dissipation carefully adjusted based on the fires sourcewhether wood, gasoline, or explosives.Explosions extend beyond fireballs and mushroom clouds. Shock waves, debris, and rigid body dynamics (RBD) are essential in capturing destruction realistically. The interaction of these elements determines how structures break apart, how objects are displaced, and how energy spreads through an environment. By combining physics-based simulations with artistic direction, Ingenuity Studios ensures that every fire and explosion is both visually striking and physically credible.The post Fire & Explosions VFX Reel by Ingenuity Studios appeared first on Vfxexpress.
    0 التعليقات ·0 المشاركات ·36 مشاهدة
  • SYMBOLIC-MOE: Mixture-of-Experts MoE Framework for Adaptive Instance-Level Mixing of Pre-Trained LLM Experts
    www.marktechpost.com
    Like humans, large language models (LLMs) often have differing skills and strengths derived from differences in their architectures and training regimens. However, they struggle to combine specialized expertise across different domains, limiting their problem-solving capabilities compared to humans. Specialized models like MetaMath, WizardMath, and QwenMath excel at mathematical reasoning but often underperform on tasks requiring common sense or medical knowledge. Even within specific domains such as mathematics, models show nuanced variations in capability, e.g., one might excel at algebra while another masters geometry. creates a need for frameworks that can identify and select the most appropriate expert models for specific problems.Existing approaches like Mixture-of-Experts (MoE) models distribute computation across multiple specialized components, with recent emphasis on sparse approaches that activate only the most relevant experts per input. The Sparse MoE (SMoE) method has improved efficiency across vision, language, and multimodal tasks but requires combining models in the parameter space through joint training. More recent frameworks like MoA (Mixture-of-Agents) attempt to address this by combining LLM outputs symbolically. Further, Multi-agent reasoning approaches have emerged as alternatives, such as the Student-teacher technique that distills reasoning capabilities from stronger to weaker agents, while debate frameworks allow multiple agents to refine arguments collectively.Researchers from UNC Chapel Hill have proposed SYMBOLIC-MOE, a symbolic, text-based, and gradient-free Mixture-of-Experts framework to enable adaptive instance-level mixing of pre-trained LLM experts. It takes a fine-grained perspective by emphasizing specialized skills within broader domains like algebra within mathematics or molecular biology within biomedical reasoning. They also introduced a skill-based recruiting strategy that dynamically selects the most relevant expert LLMs for each specific reasoning task based on their demonstrated strengths. Moreover, SYMBOLIC-MOE outperforms strong LLMs like GPT4o-mini, as well as multiagent approaches, with an absolute average improvement of 8.15% over the best multi-agent baseline.SYMBOLIC-MOE consists of three stages: model profile creation and aggregator selection followed by expert recruitment and final answer generation, both of which take place during inference. To maximize throughput and efficiency, SYMBOLIC-MOE introduces an innovative batching strategy where all instances are first analyzed to determine which LLMs will be needed. The system then intelligently groups problem instances based on their required experts, allowing each active expert model to receive all relevant instances in a single batch and ensuring each expert is loaded only once. This solution enables efficient batched inference on a single GPU while supporting a diverse pool of 16 LLMs, with the flexibility to add more GPUs for further parallelization.SYMBOLIC-MOE shows exceptional performance across diverse benchmarks. It consistently outperforms all baseline approaches, surpassing single-model strategies, multi-agent debates with a single model, and multi-model multi-agent frameworks like MoA and ReConcile. It exceeds the strongest multi-agent baseline (Self-MoA) by an impressive 8.15% absolute average improvement, 8.28% on MMLU-Pro, 13.45% on AIME, 4.92% on GPQA, and 6.08% on MedMCQA. SYMBOLIC-MOE achieves comparable or superior performance to larger models with 70B parameters by using four 7-8B parameter models. It outperforms Llama3.3 70B on AIME and GPQA while matching its performance on MedMCQA. Efficiency testing reveals that it operates 44% faster on a single GPU than MoA while achieving better accuracy.In conclusion, researchers introduced SYMBOLIC-MOE, a scalable MoE framework that combines models through their symbolic output. This method identifies the skills needed for a given problem and recruits agents based on those skills to engage in a discussion about a given input. SYMBOLIC-MOE outperforms standard inference-time scaling methods as well as other debate frameworks and other mixture-of-agents methods, leading to strong performance across domains without human intervention. Its average performance across heterogeneous tasks is in fact stronger than that of advanced proprietary models such as GPT4o-mini. However, this method has limitations: (a) It involves running multiple models, which increases inference cost, and (b) it relies on skills inferred from a small validation set to set the agent profiles.Check outthe Paper and GitHub Page.All credit for this research goes to the researchers of this project. Also,feel free to follow us onTwitterand dont forget to join our80k+ ML SubReddit. Sajjad AnsariSajjad Ansari is a final year undergraduate from IIT Kharagpur. As a Tech enthusiast, he delves into the practical applications of AI with a focus on understanding the impact of AI technologies and their real-world implications. He aims to articulate complex AI concepts in a clear and accessible manner.Sajjad Ansarihttps://www.marktechpost.com/author/sajjadansari/Researchers from the University of Cambridge and Monash University Introduce ReasonGraph: A Web-based Platform to Visualize and Analyze LLM Reasoning ProcessesSajjad Ansarihttps://www.marktechpost.com/author/sajjadansari/HybridNorm: A Hybrid Normalization Strategy Combining Pre-Norm and Post-Norm Strengths in Transformer ArchitecturesSajjad Ansarihttps://www.marktechpost.com/author/sajjadansari/Understanding Generalization in Deep Learning: Beyond the MysteriesSajjad Ansarihttps://www.marktechpost.com/author/sajjadansari/Microsoft and Ubiquant Researchers Introduce Logic-RL: A Rule-based Reinforcement Learning Framework that Acquires R1-like Reasoning Patterns through Training on Logic Puzzles Parlant: Build Reliable AI Customer Facing Agents with LLMs (Promoted)
    0 التعليقات ·0 المشاركات ·34 مشاهدة
  • NASA Crew-10 Docks With ISS To Trade Places With 'Stranded' Astronauts
    www.cnet.com
    The delayed mission has reached the space station, and soon, the two astronauts who've been "stuck" in space can return home.
    0 التعليقات ·0 المشاركات ·34 مشاهدة
  • 0 التعليقات ·0 المشاركات ·38 مشاهدة
  • Competition: Trenn underpass, Slovakia
    www.architectural-review.com
    An international contest is being held to reimagine a pedestrian underpass in the centre of Trenn, Slovakia (Deadline: 4 April)The single-stage competition seeks proposals for a permanent artistic-architectural intervention to upgrade the city centres main underpass attracting new visitors to the space, improving its illumination and enhancing the feeling of safety.Concepts will be expected to draw attention to Trenns status as joint European Capital of Culture Trenn 2026 and respond to the festival theme of Awakening Curiosity. Proposals may include light, sound or space interventions with digital panels highlighting events from the Trenn 2026 programme.Competition site: Trenn underpass, SlovakiaCredit:Image by Marek JanchAccording to the brief, Within the framework of the European Capital of Culture Trenn 2026 project, the Creative Institute Trenn announces an artistic-architectural competition. The aim of the competition is to show the potential of the underpass, to improve its overall impression for pedestrians, and at the same time to use this specific public space for the presentation of the activities of Trenn 2026.The aim of the competition is to define vision and strategy for the underpass and to transform the underground part of the underpass into a safe, pleasant, illuminated and accessible public space with elements of art and design. The intention, of course, is not to motivate people to spend their free time in the underpass, but to contribute to a change in the perception of the place.Located 95km northeast of Bratislava, Trenn is a historic city which developed around the third-largest castle in Slovakia. The settlement will be joint European Capital of Culture alongside Oulu in Finland next year.In 2023, the nearby City of Trnava launched an open international contest to masterplan a new 135ha urban extension.The latest contest comes two years after Londons Studio Egret West and Oslos Snhetta revealed their competition-winning designs for a major mixed-use development in Bratislava.Organised by Creative Institute Trenn the competition focusses on upgrading a key underpass located beneath the Square of the Slovak National Uprising in the centre of the city, connecting the historic core to a nearby park and train station.The project aims to transform the busy but dark and uninteresting underpass into a safe, pleasant, illuminated and accessible public space. Key aims include encouraging pedestrians and cyclists to slow down or stop briefly by having a memorable engagement with a light or sound installation.Judges will include the architect Jana Benkov; the artist and university lecturer Martin Piaek; Samu Forsblom, program director at European Capital of Culture Oulu 2026; and Vivien Doumpa, urbanist and board member of Placemaking Europe.The winner, to be announced in late April, will receive a 3,000 prize and 60,000 to deliver the intervention. A second prize of 2,400 and third prize of 1,800 will also be awarded.How to applyDeadline: 3pm, 4 AprilCompetition funding source: Trenn 2026, European Capital of CultureProject funding source: Trenn 2026, European Capital of CultureOwner of site(s): City of TrennContact details: hana.lassova@trencin2026.euVisit the competition website for more information
    0 التعليقات ·0 المشاركات ·35 مشاهدة
  • Gmail, Outlook, Apple Mail WarningAI Attack Nightmare Is Coming True
    www.forbes.com
    We are not ready for this.gettyRepublished on March 16th with additional security industry analysis on the threat from semi-autonomous AI attacks and a new GenAI attack warning.Email users have been warned for some time that AI attacks and hacks will ramp up this year, becoming ever harder to detect. And while this will include frightening levels of deepfake sophistication, it will also enable more attackers to conduct more attacks, with AI operating largely independently, "carrying out attacks." That has always been the nightmare scenario and it is suddenly coming true, putting millions of you at risk.We know this, but seeing is believing. A new video and blog from Symantec has just shown how a new AI agent ot operator can be deployed to conduct a phishing attack. Agents have more functionality and can actually perform tasks such as interacting with web pages. While an agents legitimate use case may be the automation of routine tasks, attackers could potentially leverage them to create infrastructure and mount attacks.The security team has warned of this before, that while existing Large Language Model (LLM) AIs are already being put to use by attackers, they are largely passive and could only assist in performing tasks such as creating phishing materials or even writing code. At the time, we predicted that agents would eventually be added to LLM AIs and that they would become more powerful as a result, increasing the potential risk.Now theres a proof of concept. Its rudimentary but will quickly become more advanced. The sight of an AI agent hunting the internet and LinkedIn to find a targets email address and then for website advice on crafting malicious scripts, before writing its own lure should put fear into all of us. Theres no limit to how far this will go.Weve been monitoring usage of AI by attackers for a while now, Symantecs Dick OBrien explained to me. While we know theyre being used by some actors, weve been predicting that the advent of AI agents could be the moment that AI-assisted attacks start to pose a greater threat, because an agent isn't passive, it can do things as opposed to generate text or code. Our goal was to see if an agent could carry out an an attack end to end with no intervention from us other than the initial prompt.As SlashNexts J Stephen Kowskis told me, the rise of AI agents like Operator shows the dual nature of technology tools built for productivity can be weaponized by determined attackers with minimal effort. This research highlights how AI systems can be manipulated through simple prompt engineering to bypass ethical guardrails and execute complex attack chains that gather intelligence, create malicious code, and deliver convincing social engineering lures.Even the inbuilt security is ludicrously lightweight. Our first attempt failed quickly as Operator told us that it was unable to proceed as it involves sending unsolicited emails and potentially sensitive information," Symantec said, with its POC showing how this was easily overcome. "This could violate privacy and security policies. However, tweaking the prompt to state that the target had authorized us to send emails bypassed this restriction, and Operator began performing the assigned tasks.The agent used was from OpenAI, but this will be a level playing field and its the nature of the capability that matters not the identity of the AI developer. Perhaps the most notable aspect of this attack is that when the Operator fails to find the targets email address online, and so successfully deduces what the address would likely be from others within the same organization that it could find.Black Ducks Andrew Bolster warned me that as AI-driven tools are given more capabilities via systems such as OpenAI Operator or Anthropics Computer Use, the challenge of constraining LLMs comes into clearer focus, adding that "examples like this demonstrate the trust-gap in underlying LLMs guardrails that supposedly prevent bad behavior, whether established through reinforcement, system prompts, distillation or other methods; LLMs can be tricked into bad behavior. In fact, one could consider this demonstration as a standard example of social engineering, rather than exploiting a vulnerability. The researchers simply put on a virtual hi-vis jacket and acted to the LLM like they were supposed" to be there."Agents such as Operator demonstrate both the potential of AI and some of the possible risks, Symantec warns. The technology is still in its infancy, and the malicious tasks it can perform are still relatively straightforward compared to what may be done by a skilled attacker. However, the pace of advancements in this field means it may not be long before agents become a lot more powerful. It is easy to imagine a scenario where an attacker could simply instruct one to breach Acme Corp and the agent will determine the optimal steps before carrying them out.And that really is the nightmare scenario. We were a little surprised that it actually worked for us on day one, OBrien told me, given its the first agent to launch.Guy Feinberg from Oasis Security agrees, telling me AI agents, like human employees, can be manipulated. Just as attackers use social engineering to trick people, they can prompt AI agents into taking malicious actions."Organizations need to implement robust security controls that assume AI will be used against them, warns Kowski. The best defense combines advanced threat detection technologies that can identify behavioral anomalies with proactive security measures that limit what information is accessible to potential attackers in the first place.This week we have also seen a report into Microsoft Copilot Spoofing as a new phishing vector, with users not yet trained on how to detect these new attacks. Thats one of the reasons AI fueled attacks are much more likely to hit their targets. You can expect to see continuous reports as this new threat landscape shapes up.And that warning has been reinforced by a second report this weekend into AI-fueled attacks, painting a frightening picture as to whats coming next. While most traditional GenAI tools have various guardrails in place to combat attempts to use them for malicious purposes, says the research team at Tenable, cybercriminal usage of tools like OpenAIs ChatGPT and Googles Gemini have been documented by both OpenAI (Disrupting malicious uses of AI by state-affiliated threat actors) and Google (Adversarial Misuse of Generative AI). OpenAI recently removed accounts of Chinese and North Korean users caught using ChatGPT for malicious purposes.Notwithstanding Symantecs POC highlighting how easily some of these mainstream GenAI guardrails can be bypassed, Tenable warns that with the recent open source release of DeepSeeks local LLMs, like DeepSeek V3 and DeepSeek R1, we anticipate cybercriminals will seek to utilize these freely accessible models.As regards DeepSeeks R1, the team says it wanted to evaluate its malicious software, or malware generation capability, under two scenarios: a keylogger and a simple ransomware Our initial test focused on creating a Windows keylogger: a compact, C++-based implementation compatible with the latest Windows version. The ideal outcome would include features such as evasion from Windows Task Manager and mechanisms to conceal or encrypt the keylogging file, making detection more difficult. We also evaluated DeepSeeks ability to generate a simple ransomware sample.The team then tasked the tool with helping develop a ransomware attack. DeepSeek was able to identify potential issues when planning the development of this simple ransomware, such as file permissions, handling large files, performance and anti-debugging techniques. Additionally, DeepSeek was able to identify some potential challenges in implementation, including the need for testing and debugging.The bottom line, says Feinberg, is that you cant stop attackers from manipulating AI, just like you cant stop them from phishing employees. The solution is better governance and security for all identitieshuman and non-human alike.The answer, he says is to assign permission to AI in the same way as you would do people treat them the same. And that included identity-based governance and security, and an assumption that AI will be tricked into making mistakes.Manipulation Is inevitable, Feinberg warns. Just as we cant prevent attackers from tricking people, we cant stop them from manipulating AI agents. The key is limiting what these agents can do without oversight. AI agents need identity governance. They must be managed like human identities, with least privilege access, monitoring, and clear policies to prevent abuse. Security teams need visibility.Frightening enough for now, but Tenable warns that we believe that DeepSeek is likely to fuel further development of malicious AI-generated code by cybercriminals in the near future, given that they have already used the tool to create a keylogger that could hide an encrypted log file on disk as well as develop a simple ransomware executable.Two very different uses of AI tools to either craft or even execute attacks. One thing is already clear though we are not yet ready for this.
    0 التعليقات ·0 المشاركات ·37 مشاهدة
  • Google Confirms Play Store App DeletionWhat You Do Now
    www.forbes.com
    Another day, another Play Store deletion.NurPhoto via Getty ImagesRepublished on March 16th with further reports into dangerous Android apps and the release of new Android protections for millions of users.What a week for Play Store. Google has been busy with its delete button, with multiple threats sneaking their way inside Androids best secured app vault. Not a good look. And all this has come hot on the tail of the latest warning that Android is under attack.First came an ad fraud scheme leading to the deletion of 180 apps with 56 million downloads, then another dangerous Anatsa/Teabot trojan ejected from the store, we have even fake Play Store pages tricking users into high-risk installs.Now another threat has been outed, with Google confirming all the newly identified apps hiding a nasty new spyware have also been ousted from Play Store. This latest warning came courtesy of Lookout, which attributed the new KoSpy malware to the North Korean group APT37 [ScarCruft]. The team says the spyware can collect extensive data, such as SMS messages, call logs, location, files, audio, and screenshots. Its a North Korean team effort with evidence of infrastructure being shared with APT43 [Kimsuky]This latest warning clearly raises questions around the fences Google has erected around Play Store. Googles claim to be a protector of Android users security is falling short once again, per one news report this weekend. After recently removing several malicious apps from the Play Store, its clear that Google is still struggling to keep harmful spyware, like KoSpy, out of its ecosystem.The new malware attacks both English and Korean speakers, and seemingly dates back at least to early 2022 and is still in the wild now. KoSpy has been observed using fake utility application lures, such as File Manager, Software Update Utility and Kakao Security, to infect devices. The spyware comes with an impressive list of capabilities:"Collecting SMS messagesCollecting call logsRetrieving device locationAccessing files and folders on the local storageRecording audio and taking photos with the camerasCapturing screenshots or recording the screen while in useRecording key strokes by abusing accessibility servicesCollecting wifi network detailsCompiling a list of installed applications."While none of the identified apps remain on Play Store, they will be available elsewhere. KoSpy samples in Lookouts corpus masquerade as five different apps: (Phone Manager), File Manager, (Smart Manager), (Kakao Security) and Software Update Utility. If any are on your phone, delete them now."As well as KoSpy, you should remove any of the ad fraud and Anatsa apps (per links above), which Google has also confirmed have been deleted from the store. You should also ensure Googles Play Protect is enabled at all times on your device.In response to Lookouts report, Google told me the use of regional language suggests this was intended as targeted malware. Before any user installations, the latest malware sample discovered in March 2024 was removed from Google Play. Google Play Protect automatically protects Android users from known versions of this malware on devices with Google Play Services, even when apps come from sources outside of Play.Play Store spyware appLookoutGoogle is updating Play Protect to make it easier to pause its defenses to facilitate sideloading. As this new warning clearly illustrates, you should never do this unless youre absolutely sure of the legitimacy of the app youre installing and the source. As Ive warned before, sideloading itself puts you at risk and this new option is dangerous and needs handling with care. Youre driving at speed, but removing your seatbelt.A timely new report from UCL in London has just warned that some unofficial parental control apps have excessive access to personal data and hide their presence, raising concerns about their potential for unethical surveillance as well as domestic abuse, highlighting that sideloaded apps are much riskier than those on Play Store.The new study is the first to compare official parental control apps available in the Google Play Store and sideloaded or unofficial parental control apps available from other sources The team found that sideloaded apps were more likely to hide their presence from the phone user [and] require excessive permissions, including dangerous permissions such as being able to access personal data, like precise user location, at all times. None of which should come as a surprise.Of note, the report flags the exact issue with sideloading that comes from disabling or pausing Googles Play Protect. Disabling Google Play Protect leaves the device vulnerable to malware and viruses, which is not ideal, especially for childrens phones. However, 17 out of 20 sideloaded apps instruct the user to disable the feature, as otherwise the parental control app might be flagged as malicious and disabled by Google Play Protect. We tested how many of the sideloaded apps would be detected by Google Play Protect. In total, 13 apps were detected by Google Play Protect version 42.1.27-31, whereas seven were not considered to be harmful: Bark, EvaSpy, FlexiSpy, Spapp Monitoring, SPYX, TheOneSpy and TiSpy.This is just the latest report to highlight sideloading risks, which Google itself warns is dangerous. Whats interesting here is that parental control apps by their nature will ask for excessive permissions to operate. Its a boon for data harvesters to be able to operate in this way on your phone. But for apps in such a sensitive area to be able to lure users into installing, potentially disabling Play Protect in the process, is dangerous.While Samsung is hardening its devices against sideloading more than Google, the Android-maker has been more vocal on the dangers from installing apps from outside Play Store, notwithstanding this latest Play Protect change. All this is made more complex by current regulatory pressure on Google and Apple to open up their devices to app stores beyond their own.Google has long promised to eradicate such abuse, removing these apps from Play Store and monitoring on-device behavior. But all this remains work in progress. Multiple warnings last year highlighted just how rife such Play Store abuse remains.With even Samsung now set to release Android 15 with its One UI 7 release, attention will quickly turn to Android 16, which is due for release in June, a quarter ahead of the usual annual cycle. While this will put pressure on Android OEMs, it is good from a user perspective, bringing new security and privacy innovations. One of these will be Googles extension of its Advanced Protection Program, which will now add a flag for apps on an enrolled device to shore up security and will also block sideloading. Beta 3 of Androids next OS has just been released for Pixel users.In the meantime, we have confirmation this weekend that recent Samsung flagships at least should receive Android 15 before the end of April. This is critical as it brings new on-device capabilities to monitor app behaviors and flag threats in real time. Shifting from server-side only protection to more capable local defences is critical, given that apps can be coded to download threats onto a phone once installed, preventing detection. while going through their Play Store onboarding.These new live threat protections will apply to apps whether or not they come from Play Store, just as Play Protect now does assuming you dont disable it, of course.
    0 التعليقات ·0 المشاركات ·34 مشاهدة
  • A Sail on the Vast Sea EKA / Benzhe Design
    www.archdaily.com
    A Sail on the Vast Sea EKA / Benzhe DesignSave this picture! Shengliang SuArchitects: Benzhe DesignAreaArea of this architecture projectArea:1032 mYearCompletion year of this architecture project Year: 2024 PhotographsPhotographs:Shengliang Su Lead Architect: Jiang Huajian More SpecsLess SpecsSave this picture!Text description provided by the architects. A Sail on the Vast Sea is located within the EKA Tianwu Art District in the Jinqiao area of Pudong New District, Shanghai. The original site was Building 442, known as "Maritime Home," part of the China Shipbuilding Navigation Instrument Factory from the 1950s and 1960s. The project was commissioned by the owner for a comprehensive planning and renovation design. Positioned near the entrance of the park, just south of "Bancang," the building welcomes visitors with the form of a raised "sail." Rooted in the spirit of navigation and expressed through a strong and forceful writing style, the project seamlessly integrates art and functionality within the public spaces. The interplay of old and new honors the present while looking towards the future.Save this picture!A Sail on the Vast Sea preserves the original building's core structure. The entire architectural mass is shaped through various methods such as wrapping, interweaving, interlocking, stacking, and meandering, thereby creating a sense of time and space travel, allowing the past, present, and future to engage in dialogue. The color scheme combines terracotta-toned concrete with weathered steel panels, and the interplay of light and shadow enhances the rich history that the old building has accumulated over time.Save this picture!Cutting and remaking act as tools to redefine both space and structure. Anchored by the building's central axis, the architect boldly creates uninterrupted connections between the upper and lower levels, as well as the front and rear, integrating elements like the elevator, atrium, pedestrian passage, and terrace within a single plane. This design allows the interior and exterior to merge, establishing an open, continuous space.Save this picture!The staircase on the north side of the building leads directly indoors, with the exterior glass panels arranged in a staggered, dynamic pattern. This design divides, refracts, and focuses natural light, creating a rich interplay of light and shadow. The sails made of weathered steel plates at the upper part of the building enhance the dynamic beauty of the building's facade, where the contrast between curves and straight lines conveys the structure's strength and tension.Save this picture!The original tree in the northeast corner has been preserved to complement the old and new buildings. The open fire escape staircase spirals upwards, meandering in both curves and straight lines, evoking a journey through timepast, present, and future. The design leaves space for clear sightlines, allowing one to experience the changing seasons of the trees. Upon reaching the third floor, one can gaze across to the opposite BANCANG, with trees creating a natural separation. Continuing upwards, the rooftop clock tower comes into view, with each step offering a new perspective.Save this picture!On the east side, a newly installed cylindrical stainless steel elevator is embedded into the building, extending through multiple floors to serve as the vertical circulation within. The architect subtly "lifts" a line on the elevator's surface, creating a "skyline" effect that allows light to stream inside, adding an intriguing touch to the architecture. The combination of stainless steel and heavy concrete exudes a modern industrial aesthetic, while also extending the texture of time's accumulation.Save this picture!On the southern side, the building is surrounded by trees, and in front of the nature, the building is slightly "set back" to give space to the trees, so that nature and the building can live in harmony, which also reflects the design concept of Benzhe Architecture: pay attention to the relationship between architecture, people, and nature.Save this picture!The west facade of the building, with its cast-in-place concrete, exudes a sense of weight and solidity. However, the introduction of rectangular openings brings a breath of life to the structure. What could have been a continuous cut is ingeniously interrupted at the top, creating a subtle "brake" effect. The exterior terrace disrupts the original monotony of the facade. On the wall, a quote from the German poet Schiller is inscribed: "Art is nature's right hand. Nature only allows us to exist, but art enables us to truly become human." In this way, the building extends nature, while art fosters a resonance between nature and humanity.Save this picture!The perforated "sail surface" arranged in a sequence on the building's rooftop enhances the texture of the facade, with the sails rising upward and allowing dappled light to pour into the interior, like starlight meeting the vast ocean. As the past and future converge, the spirit of exploration endures, embarking on a continuous journey.Save this picture!We explore the fusion of public space and art, shaping the building with terracotta and cast-in-place concrete. This approach not only provides the structure with a solid and stable foundation but also imparts a unique color and texture, creating a vibrant and inviting atmosphere. The ground is raised, making the building appear to stand on a "stage," drawing people in and transforming the space into a comfortable visual experience of public art. As time progresses, A Sail on the Vast Sea remains steadfast, its silhouette casting forward into the future.Save this picture!Project gallerySee allShow lessProject locationAddress:535 Jinqiao Road, Pudong New District, Shanghai, ChinaLocation to be used only as a reference. It could indicate city/country but not exact address.About this officeBenzhe DesignOfficeMaterialsSteelConcreteMaterials and TagsPublished on March 16, 2025Cite: "A Sail on the Vast Sea EKA / Benzhe Design" 16 Mar 2025. ArchDaily. Accessed . <https://www.archdaily.com/1027684/a-sail-on-the-vast-sea-star-eka-benzhe-design&gt ISSN 0719-8884Save?EKA / You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream
    0 التعليقات ·0 المشاركات ·32 مشاهدة