• Hey everyone! Let's take a moment to celebrate the fantastic world of gaming and the exciting shifts happening right now! Have you noticed how Digimon is quietly eating Pokémon's lunch? It's such an exhilarating time to be a fan of these beloved franchises!

    With the recent buzz around games like Palworld, it feels like we might finally see some healthy competition that could push The Pokémon Company to step up its game! Remember the excitement when Palworld made waves? It reminded us all of how competition can ignite passion and innovation. It's like a breath of fresh air blowing through our gaming universe!

    Digimon has always held a special place in the hearts of many, and it's gaining momentum as a serious contender. This rivalry can only mean good things for us, the players! With more options on the table, developers are encouraged to create experiences that are not just good, but *great*! Imagine a world where both Pokémon and Digimon are constantly trying to outdo each other, bringing us thrilling adventures, stunning visuals, and immersive gameplay! How amazing would that be?

    Think about it: competition drives progress! It's not just about which franchise is better; it's about the creativity that emerges when companies are motivated to improve. We, as fans, stand to benefit immensely from this! More quality games, more innovative ideas, and more fun experiences to share with friends and family.

    So let's embrace this wave of change! Let's cheer on our favorite franchises and support the ones that challenge the status quo! Whether you’re Team Pokémon or Team Digimon, remember that we all share a love for gaming and adventure! There's enough room for everyone to shine in this amazing universe.

    Let’s keep the conversation going! What are your thoughts on this exciting rivalry? Are you feeling the hype? Share your favorite moments from both franchises, and let's uplift each other with positivity and excitement! Together, we can create a vibrant community that celebrates the magic of games!

    #Digimon #Pokemon #GamingCommunity #HealthyCompetition #GameOn
    🌟💖 Hey everyone! Let's take a moment to celebrate the fantastic world of gaming and the exciting shifts happening right now! 🎮✨ Have you noticed how Digimon is quietly eating Pokémon's lunch? 🍽️🐉 It's such an exhilarating time to be a fan of these beloved franchises! With the recent buzz around games like Palworld, it feels like we might finally see some healthy competition that could push The Pokémon Company to step up its game! 🚀💪 Remember the excitement when Palworld made waves? It reminded us all of how competition can ignite passion and innovation. It's like a breath of fresh air blowing through our gaming universe! 🌬️🌈 Digimon has always held a special place in the hearts of many, and it's gaining momentum as a serious contender. 🦖💫 This rivalry can only mean good things for us, the players! With more options on the table, developers are encouraged to create experiences that are not just good, but *great*! Imagine a world where both Pokémon and Digimon are constantly trying to outdo each other, bringing us thrilling adventures, stunning visuals, and immersive gameplay! How amazing would that be? 🎉🤩 Think about it: competition drives progress! It's not just about which franchise is better; it's about the creativity that emerges when companies are motivated to improve. 🖌️🎨 We, as fans, stand to benefit immensely from this! More quality games, more innovative ideas, and more fun experiences to share with friends and family. 💞👾 So let's embrace this wave of change! Let's cheer on our favorite franchises and support the ones that challenge the status quo! Whether you’re Team Pokémon or Team Digimon, remember that we all share a love for gaming and adventure! 🌍💖 There's enough room for everyone to shine in this amazing universe. ✨🌟 Let’s keep the conversation going! What are your thoughts on this exciting rivalry? Are you feeling the hype? 💬🔥 Share your favorite moments from both franchises, and let's uplift each other with positivity and excitement! Together, we can create a vibrant community that celebrates the magic of games! 🎊😄 #Digimon #Pokemon #GamingCommunity #HealthyCompetition #GameOn
    Digimon Is Quietly Eating Pokémon’s Lunch, And More People Should Know
    Remember how, when Palworld was blowing up, fans were excited that a Pokémon competitor might force The Pokémon Company to get its act together and stop releasing busted games like Scarlet and Violet? Whether that pans out remains to be seen, but giv
    Like
    Love
    Wow
    Sad
    Angry
    523
    1 Commentarios 0 Acciones
  • Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data

    Jun 16, 2025Ravie LakshmananMalware / DevOps

    Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others.
    The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions."
    The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week.
    Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload.
    Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer.

    The stealer malware is equipped to siphon a wide range of data from infected machines. This includes -

    JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers
    Pod sandbox environment authentication tokens and git information
    CI/CD information from environment variables
    Zscaler host configuration
    Amazon Web Services account information and tokens
    Public IP address
    General platform, user, and host information

    The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems.
    The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis.
    "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said.

    "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity."
    The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below -

    eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry.
    SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown.
    "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said.
    Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.
    "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work."
    Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server.
    This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB.
    "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL."

    Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user.
    The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT.
    "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent."
    Crypto Malware in the Open-Source Supply Chain
    The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem.

    Some of the examples of these packages include -

    express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys
    bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing.
    lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers

    "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said.
    "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets."
    AI and Slopsquatting
    The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks.
    Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences.

    Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting.
    "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said.
    "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #malicious #pypi #package #masquerades #chimera
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server. This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB. "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #malicious #pypi #package #masquerades #chimera
    THEHACKERNEWS.COM
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development of [machine learning] solutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithm (DGA) in order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compat (676 Downloads) ts-runtime-compat-check (1,588 Downloads) solders (983 Downloads) @mediawave/lib (386 Downloads) All the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former package ("proxy.eslint-proxy[.]site") to retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server ("firewall[.]tel"). This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain ("cdn.audiowave[.]org") and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB ("i.ibb[.]co"). "[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence (AI)-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language models (LLMs) can hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol (MCP)-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Sad
    Angry
    514
    2 Commentarios 0 Acciones
  • CGI Animated Short Film: "Nodoubt" by Lin Lin | CGMeetup

    CGI 3D Animated Short Film: Nodoubt Animated Short Film by Lin Lin at Ringling College of Art and Design. Featured on CGMeetup Gallery

    Motivated by a poster in her hospital room, Ave Lee, embarks on a journey of recovery. She finds her inner warrior to overcome the mountain of doubt that confronts her.

    Directed by Lin Lin ;#13;
    
    SUBSCRIBE to CGMeetup for more inspiring content! ;#13;
    Watch More CGI & VFX Animated Short Films: ;#13;
    VFX Breakdowns, Making of & Behind the Scene: 
    
    FOLLOW US:
    Website: 
    YouTube ;#13;
    Facebook ;#13;
    Twitter ;#13;
    Google+ ;#13;
    Dailymotion ;#13;
    Pinterest ;#13;
    Instagram ;#13;
    
    WANT TO GET FEATURED?
    All CGI artists, studios or schools who would like their work featured or
    published on CGMeetup please apply below. We’re looking for short films, commercial spots, breakdowns, showreels etc.
    Submit here → ;#13;
    Contact us here → info@cgmeetup.com or info@cgmeetup.net
    
    Please Note: All videos are uploaded after written copyright permission from respected Artists, Studios or Schools Or part of the Creative Commons license.
    ;#13;
    For more details or to dispute please contact us at info@cgmeetup.com or info@cgmeetup.net
    
    ABOUT CGMeetup:
    CGMeetup is the #1 inspiration resource for all CGI, VFX, 3D and Digital artists. We feature a wide variety of CGI content including behind-the-
    scenes, vfx breakdowns, short films & showreels.
    
    CGMeetup also serves as networking resource for CGI Professionals.
    Professionals use CGMeetup to exchange ideas, knowledge & job
    opportunities.
    
    CGI Animated Short Film: "Nodoubt" by Lin Lin | CGMeetup 
    ;#13;
    
    CGMeetup
    
    
    #animation #animated #3d #cgi #shortfilm #short #animatedshortfilm
    #cgi #animated #short #film #quotnodoubtquot
    CGI Animated Short Film: "Nodoubt" by Lin Lin | CGMeetup
    CGI 3D Animated Short Film: Nodoubt Animated Short Film by Lin Lin at Ringling College of Art and Design. Featured on CGMeetup Gallery Motivated by a poster in her hospital room, Ave Lee, embarks on a journey of recovery. She finds her inner warrior to overcome the mountain of doubt that confronts her. Directed by Lin Lin ;#13; 
 SUBSCRIBE to CGMeetup for more inspiring content! ;#13; Watch More CGI & VFX Animated Short Films: ;#13; VFX Breakdowns, Making of & Behind the Scene: 
 
 FOLLOW US:
 Website: 
 YouTube ;#13; Facebook ;#13; Twitter ;#13; Google+ ;#13; Dailymotion ;#13; Pinterest ;#13; Instagram ;#13; 
 WANT TO GET FEATURED?
 All CGI artists, studios or schools who would like their work featured or
 published on CGMeetup please apply below. We’re looking for short films, commercial spots, breakdowns, showreels etc.
 Submit here → ;#13; Contact us here → info@cgmeetup.com or info@cgmeetup.net
 
 Please Note: All videos are uploaded after written copyright permission from respected Artists, Studios or Schools Or part of the Creative Commons license.
 ;#13; For more details or to dispute please contact us at info@cgmeetup.com or info@cgmeetup.net
 
 ABOUT CGMeetup:
 CGMeetup is the #1 inspiration resource for all CGI, VFX, 3D and Digital artists. We feature a wide variety of CGI content including behind-the-
 scenes, vfx breakdowns, short films & showreels.
 
 CGMeetup also serves as networking resource for CGI Professionals.
 Professionals use CGMeetup to exchange ideas, knowledge & job
 opportunities.
 
 CGI Animated Short Film: "Nodoubt" by Lin Lin | CGMeetup 
 ;#13; 
 CGMeetup
 
 
 #animation #animated #3d #cgi #shortfilm #short #animatedshortfilm #cgi #animated #short #film #quotnodoubtquot
    WWW.YOUTUBE.COM
    CGI Animated Short Film: "Nodoubt" by Lin Lin | CGMeetup
    CGI 3D Animated Short Film: Nodoubt Animated Short Film by Lin Lin at Ringling College of Art and Design. Featured on CGMeetup Gallery http://www.cgmeetup.com/gallery Motivated by a poster in her hospital room, Ave Lee, embarks on a journey of recovery. She finds her inner warrior to overcome the mountain of doubt that confronts her. Directed by Lin Lin https://doubles.portfoliobox.net/&amp ;#13; 
 SUBSCRIBE to CGMeetup for more inspiring content! http://bit.ly/Sub2CGMeetup&amp ;#13; Watch More CGI & VFX Animated Short Films: https://www.youtube.com/playlist?list=PLc6NCp8iAPDa4dBRHY4E5uvuqNcYe8AXX&amp ;#13; VFX Breakdowns, Making of & Behind the Scene: https://www.youtube.com/playlist?list=PLc6NCp8iAPDYMZcYBcEBQRoGidvdi0iPN 
 
 FOLLOW US:
 Website: http://www.cgmeetup.com 
 YouTube https://www.youtube.com/user/CGMeetUp&amp ;#13; Facebook https://www.facebook.com/CGMeetup&amp ;#13; Twitter https://twitter.com/cgmeetup&amp ;#13; Google+ https://plus.google.com/+Cgmeetup&amp ;#13; Dailymotion http://www.dailymotion.com/user/CGMeetup&amp ;#13; Pinterest https://www.pinterest.com/cgmeetup/&amp ;#13; Instagram https://instagram.com/cgmeetup/&amp ;#13; 
 WANT TO GET FEATURED?
 All CGI artists, studios or schools who would like their work featured or
 published on CGMeetup please apply below. We’re looking for short films, commercial spots, breakdowns, showreels etc.
 Submit here → https://www.cgmeetup.com/gallery&amp ;#13; Contact us here → info@cgmeetup.com or info@cgmeetup.net
 
 Please Note: All videos are uploaded after written copyright permission from respected Artists, Studios or Schools Or part of the Creative Commons license.
 https://creativecommons.org/licenses/by/4.0/legalcode&amp ;#13; For more details or to dispute please contact us at info@cgmeetup.com or info@cgmeetup.net
 
 ABOUT CGMeetup:
 CGMeetup is the #1 inspiration resource for all CGI, VFX, 3D and Digital artists. We feature a wide variety of CGI content including behind-the-
 scenes, vfx breakdowns, short films & showreels.
 
 CGMeetup also serves as networking resource for CGI Professionals.
 Professionals use CGMeetup to exchange ideas, knowledge & job
 opportunities.
 
 CGI Animated Short Film: "Nodoubt" by Lin Lin | CGMeetup 
 https://youtu.be/HgQwWdgknqg&amp ;#13; 
 CGMeetup
 https://www.youtube.com/CGMeetup 
 
 #animation #animated #3d #cgi #shortfilm #short #animatedshortfilm
    0 Commentarios 0 Acciones
  • Cape to Cairo: the making and unmaking of colonial road networks

    In 2024, Egypt completed its 1,155km stretch of the Cairo–Cape Town Highway, a 10,228km‑long road connecting 10 African countries – Egypt, Sudan, South Sudan, Ethiopia, Kenya, Tanzania, Zambia, Zimbabwe, Botswana and South Africa.  
    The imaginary of ‘Cape to Cairo’ is not new. In 1874, editor of the Daily Telegraph Edwin Arnold proposed a plan to connect the African continent by rail, a project that came to be known as the Cape to Cairo Railway project. Cecil Rhodes expressed his support for the project, seeing it as a means to connect the various ‘possessions’ of the British Empire across Africa, facilitating the movement of troops and natural resources. This railway project was never completed, and in 1970 was overlaid by a very different attempt at connecting the Cape to Cairo, as part of the Trans‑African Highway network. This 56,683km‑long system of highways – some dating from the colonial era, some built as part of the 1970s project, and some only recently built – aimed to create lines of connection across the African continent, from north to south as well as east to west. 
    Here, postcolonial state power invested in ‘moving the continent’s people and economies from past to future’, as architectural historians Kenny Cupers and Prita Meier write in their 2020 essay ‘Infrastructure between Statehood and Selfhood: The Trans‑African Highway’. The highways were to be built with the support of Kenya’s president Jomo Kenyatta, Ghana’s president Kwame Nkrumah and Ghana’s director of social welfare Robert Gardiner, as well as the United Nations Economic Commission for Africa. This project was part of a particular historical moment during which anticolonial ideas animated most of the African continent; alongside trade, this iteration of Cape to Cairo centred social and cultural connection between African peoples. But though largely socialist in ambition, the project nevertheless engaged modernist developmentalist logics that cemented capitalism. 
    Lead image: Over a century in the making, the final stretches of the Cairo–Cape Town Highway are being finished. Egypt completed the section within its borders last year and a section over the dry Merille River in Kenya was constructed in 2019. Credit: Allan Muturi / SOPA / ZUMA / Alamy. Above: The route from Cairo to Cape Town, outlined in red, belongs to the Trans‑African Highway network, which comprises nine routes, here in black

    The project failed to fully materialise at the time, but efforts to complete the Trans‑African Highway network have been revived in the last 20 years; large parts are now complete though some links remain unbuilt and many roads are unpaved or hazardous. The most recent attempts to realise this project coincide with a new continental free trade agreement, the agreement on African Continental Free Trade Area, established in 2019, to increase trade within the continent. The contemporary manifestation of the Cairo–Cape Town Highway – also known as Trans‑African Highway4 – is marked by deepening neoliberal politics. Represented as an opportunity to boost trade and exports, connecting Egypt to African markets that the Egyptian government view as ‘untapped’, the project invokes notions of trade steeped in extraction, reflecting the neoliberal logic underpinning contemporary Egyptian governance; today, the country’s political project, led by Abdel Fattah El Sisi, is oriented towards Egyptian dominance and extraction in relation to the rest of the continent. 
    Through an allusion to markets ripe for extraction, this language brings to the fore historical forms of domination that have shaped the connections between Egypt and the rest of the continent; previous iterations of connection across the continent often reproduced forms of domination stretching from the north of the African continent to the south, including the Trans‑Saharan slave trade routes across Africa that ended in various North African and Middle Eastern territories. These networks, beginning in the 8th century and lasting until the 20th, produced racialised hierarchies across the continent, shaping North Africa into a comparably privileged space proximate to ‘Arabness’. This was a racialised division based on a civilisational narrative that saw Arabs as superior, but more importantly a political economic division resulting from the slave trade routes that produced huge profits for North Africa and the Middle East. In the contemporary moment, these racialised hierarchies are bound up in political economic dependency on the Arab Gulf states, who are themselves dependent on resource extraction, land grabbing and privatisation across the entire African continent. 
    ‘The Cairo–Cape Town Highway connects Egypt to African markets viewed as “untapped”, invoking notions steeped in extraction’
    However, this imaginary conjured by the Cairo–Cape Town Highway is countered by a network of streets scattered across Africa that traces the web of Egyptian Pan‑African solidarity across the continent. In Lusaka in Zambia, you might find yourself on Nasser Road, as you might in Mwanza in Tanzania or Luanda in Angola. In Mombasa in Kenya, you might be driving down Abdel Nasser Road; in Kampala in Uganda, you might find yourself at Nasser Road University; and in Tunis in Tunisia, you might end up on Gamal Abdel Nasser Street. These street names are a reference to Gamal Abdel Nasser, Egypt’s first postcolonial leader and president between 1956 and 1970. 
    Read against the contemporary Cairo–Cape Town Highway, these place names signal a different form of connection that brings to life Egyptian Pan‑Africanism, when solidarity was the hegemonic force connecting the continent, coming up against the notion of a natural or timeless ‘great divide’ within Africa. From the memoirs of Egyptian officials who were posted around Africa as conduits of solidarity, to the broadcasts of Radio Cairo that were heard across the continent, to the various conferences attended by anticolonial movements and postcolonial states, Egypt’s orientation towards Pan‑Africanism, beginning in the early 20th century and lasting until the 1970s, was both material and ideological. Figures and movements forged webs of solidarity with their African comrades, imagining an Africa that was united through shared commitments to ending colonialism and capitalist extraction. 
    The route between Cape Town in South Africa and Cairo in Egypt has long occupied the colonial imaginary. In 1930, Margaret Belcher and Ellen Budgell made the journey, sponsored by car brand Morris and oil company Shell
    Credit: Fox Photos / Getty
    The pair made use of the road built by British colonisers in the 19th century, and which forms the basis for the current Cairo–Cape Town Highway. The road was preceded by the 1874 Cape to Cairo Railway project, which connected the colonies of the British Empire
    Credit: Library of Congress, Geography and Map Division
    This network of eponymous streets represents attempts to inscribe anticolonial power into the materiality of the city. Street‑naming practices are one way in which the past comes into the present, ‘weaving history into the geographic fabric of everyday life’, as geographer Derek Alderman wrote in his 2002 essay ‘Street Names as Memorial Arenas’. In this vein, the renaming of streets during decolonisation marked a practice of contesting the production of colonial space. In the newly postcolonial city, renaming was a way of ‘claiming the city back’, Alderman continues. While these changes may appear discursive, it is their embedding in material spaces, through signs and maps, that make the names come to life; place names become a part of the everyday through sharing addresses or giving directions. This quality makes them powerful; consciously or unconsciously, they form part of how the spaces of the city are navigated. 
    These are traces that were once part of a dominant historical narrative; yet when they are encountered in the present, during a different historical moment, they no longer act as expressions of power but instead conjure up a moment that has long passed. A street in Lusaka named after an Egyptian general made more sense 60 years ago than it does today, yet contextualising it recovers a marginalised history of Egyptian Pan‑Africanism. 
    Markers such as street names or monuments are simultaneously markers of anticolonial struggle as well as expressions of state power – part of an attempt, by political projects such as Nasser’s, to exert their own dominance over cities, towns and villages. That such traces are expressions of both anticolonial hopes and postcolonial state power produces a sense of tension within them. For instance, Nasser’s postcolonial project in Egypt was a contradictory one; it gave life to anticolonial hopes – for instance by breaking away from European capitalism and embracing anticolonial geopolitics – while crushing many parts of the left through repression, censorship and imprisonment. Traces of Nasser found today inscribe both anticolonial promises – those that came to life and those that did not – while reproducing postcolonial power that in most instances ended in dictatorship. 
    Recent efforts to complete the route build on those of the post‑independence era – work on a section north of Nairobi started in 1968
    Credit: Associated Press / Alamy
    The Trans‑African Highway network was conceived in 1970 in the spirit of Pan‑Africanism

    At that time, the routes did not extend into South Africa, which was in the grip of apartheid. The Trans‑African Highway initiative was motivated by a desire to improve trade and centre cultural links across the continent – an ambition that was even celebrated on postage stamps

    There have been long‑standing debates about the erasure of the radical anticolonial spirit from the more conservative postcolonial states that emerged; the promises and hopes of anticolonialism, not least among them socialism and a world free of white supremacy, remain largely unrealised. Instead, by the 1970s neoliberalism emerged as a new hegemonic project. The contemporary instantiation of Cape to Cairo highlights just how pervasive neoliberal logics continue to be, despite multiple global financial crises and the 2011 Egyptian revolution demanding ‘bread, freedom, social justice’. 
    But the network of streets named after anticolonial figures and events across the world is testament to the immense power and promise of anticolonial revolution. Most of the 20th century was characterised by anticolonial struggle, decolonisation and postcolonial nation‑building, as nations across the global south gained independence from European empire and founded their own political projects. Anticolonial traces, present in street and place names, point to the possibility of solidarity as a means of reorienting colonial geographies. They are a reminder that there have been other imaginings of Cape to Cairo, and that things can be – and have been – otherwise.

    2025-06-13
    Kristina Rapacki

    Share
    #cape #cairo #making #unmaking #colonial
    Cape to Cairo: the making and unmaking of colonial road networks
    In 2024, Egypt completed its 1,155km stretch of the Cairo–Cape Town Highway, a 10,228km‑long road connecting 10 African countries – Egypt, Sudan, South Sudan, Ethiopia, Kenya, Tanzania, Zambia, Zimbabwe, Botswana and South Africa.   The imaginary of ‘Cape to Cairo’ is not new. In 1874, editor of the Daily Telegraph Edwin Arnold proposed a plan to connect the African continent by rail, a project that came to be known as the Cape to Cairo Railway project. Cecil Rhodes expressed his support for the project, seeing it as a means to connect the various ‘possessions’ of the British Empire across Africa, facilitating the movement of troops and natural resources. This railway project was never completed, and in 1970 was overlaid by a very different attempt at connecting the Cape to Cairo, as part of the Trans‑African Highway network. This 56,683km‑long system of highways – some dating from the colonial era, some built as part of the 1970s project, and some only recently built – aimed to create lines of connection across the African continent, from north to south as well as east to west.  Here, postcolonial state power invested in ‘moving the continent’s people and economies from past to future’, as architectural historians Kenny Cupers and Prita Meier write in their 2020 essay ‘Infrastructure between Statehood and Selfhood: The Trans‑African Highway’. The highways were to be built with the support of Kenya’s president Jomo Kenyatta, Ghana’s president Kwame Nkrumah and Ghana’s director of social welfare Robert Gardiner, as well as the United Nations Economic Commission for Africa. This project was part of a particular historical moment during which anticolonial ideas animated most of the African continent; alongside trade, this iteration of Cape to Cairo centred social and cultural connection between African peoples. But though largely socialist in ambition, the project nevertheless engaged modernist developmentalist logics that cemented capitalism.  Lead image: Over a century in the making, the final stretches of the Cairo–Cape Town Highway are being finished. Egypt completed the section within its borders last year and a section over the dry Merille River in Kenya was constructed in 2019. Credit: Allan Muturi / SOPA / ZUMA / Alamy. Above: The route from Cairo to Cape Town, outlined in red, belongs to the Trans‑African Highway network, which comprises nine routes, here in black The project failed to fully materialise at the time, but efforts to complete the Trans‑African Highway network have been revived in the last 20 years; large parts are now complete though some links remain unbuilt and many roads are unpaved or hazardous. The most recent attempts to realise this project coincide with a new continental free trade agreement, the agreement on African Continental Free Trade Area, established in 2019, to increase trade within the continent. The contemporary manifestation of the Cairo–Cape Town Highway – also known as Trans‑African Highway4 – is marked by deepening neoliberal politics. Represented as an opportunity to boost trade and exports, connecting Egypt to African markets that the Egyptian government view as ‘untapped’, the project invokes notions of trade steeped in extraction, reflecting the neoliberal logic underpinning contemporary Egyptian governance; today, the country’s political project, led by Abdel Fattah El Sisi, is oriented towards Egyptian dominance and extraction in relation to the rest of the continent.  Through an allusion to markets ripe for extraction, this language brings to the fore historical forms of domination that have shaped the connections between Egypt and the rest of the continent; previous iterations of connection across the continent often reproduced forms of domination stretching from the north of the African continent to the south, including the Trans‑Saharan slave trade routes across Africa that ended in various North African and Middle Eastern territories. These networks, beginning in the 8th century and lasting until the 20th, produced racialised hierarchies across the continent, shaping North Africa into a comparably privileged space proximate to ‘Arabness’. This was a racialised division based on a civilisational narrative that saw Arabs as superior, but more importantly a political economic division resulting from the slave trade routes that produced huge profits for North Africa and the Middle East. In the contemporary moment, these racialised hierarchies are bound up in political economic dependency on the Arab Gulf states, who are themselves dependent on resource extraction, land grabbing and privatisation across the entire African continent.  ‘The Cairo–Cape Town Highway connects Egypt to African markets viewed as “untapped”, invoking notions steeped in extraction’ However, this imaginary conjured by the Cairo–Cape Town Highway is countered by a network of streets scattered across Africa that traces the web of Egyptian Pan‑African solidarity across the continent. In Lusaka in Zambia, you might find yourself on Nasser Road, as you might in Mwanza in Tanzania or Luanda in Angola. In Mombasa in Kenya, you might be driving down Abdel Nasser Road; in Kampala in Uganda, you might find yourself at Nasser Road University; and in Tunis in Tunisia, you might end up on Gamal Abdel Nasser Street. These street names are a reference to Gamal Abdel Nasser, Egypt’s first postcolonial leader and president between 1956 and 1970.  Read against the contemporary Cairo–Cape Town Highway, these place names signal a different form of connection that brings to life Egyptian Pan‑Africanism, when solidarity was the hegemonic force connecting the continent, coming up against the notion of a natural or timeless ‘great divide’ within Africa. From the memoirs of Egyptian officials who were posted around Africa as conduits of solidarity, to the broadcasts of Radio Cairo that were heard across the continent, to the various conferences attended by anticolonial movements and postcolonial states, Egypt’s orientation towards Pan‑Africanism, beginning in the early 20th century and lasting until the 1970s, was both material and ideological. Figures and movements forged webs of solidarity with their African comrades, imagining an Africa that was united through shared commitments to ending colonialism and capitalist extraction.  The route between Cape Town in South Africa and Cairo in Egypt has long occupied the colonial imaginary. In 1930, Margaret Belcher and Ellen Budgell made the journey, sponsored by car brand Morris and oil company Shell Credit: Fox Photos / Getty The pair made use of the road built by British colonisers in the 19th century, and which forms the basis for the current Cairo–Cape Town Highway. The road was preceded by the 1874 Cape to Cairo Railway project, which connected the colonies of the British Empire Credit: Library of Congress, Geography and Map Division This network of eponymous streets represents attempts to inscribe anticolonial power into the materiality of the city. Street‑naming practices are one way in which the past comes into the present, ‘weaving history into the geographic fabric of everyday life’, as geographer Derek Alderman wrote in his 2002 essay ‘Street Names as Memorial Arenas’. In this vein, the renaming of streets during decolonisation marked a practice of contesting the production of colonial space. In the newly postcolonial city, renaming was a way of ‘claiming the city back’, Alderman continues. While these changes may appear discursive, it is their embedding in material spaces, through signs and maps, that make the names come to life; place names become a part of the everyday through sharing addresses or giving directions. This quality makes them powerful; consciously or unconsciously, they form part of how the spaces of the city are navigated.  These are traces that were once part of a dominant historical narrative; yet when they are encountered in the present, during a different historical moment, they no longer act as expressions of power but instead conjure up a moment that has long passed. A street in Lusaka named after an Egyptian general made more sense 60 years ago than it does today, yet contextualising it recovers a marginalised history of Egyptian Pan‑Africanism.  Markers such as street names or monuments are simultaneously markers of anticolonial struggle as well as expressions of state power – part of an attempt, by political projects such as Nasser’s, to exert their own dominance over cities, towns and villages. That such traces are expressions of both anticolonial hopes and postcolonial state power produces a sense of tension within them. For instance, Nasser’s postcolonial project in Egypt was a contradictory one; it gave life to anticolonial hopes – for instance by breaking away from European capitalism and embracing anticolonial geopolitics – while crushing many parts of the left through repression, censorship and imprisonment. Traces of Nasser found today inscribe both anticolonial promises – those that came to life and those that did not – while reproducing postcolonial power that in most instances ended in dictatorship.  Recent efforts to complete the route build on those of the post‑independence era – work on a section north of Nairobi started in 1968 Credit: Associated Press / Alamy The Trans‑African Highway network was conceived in 1970 in the spirit of Pan‑Africanism At that time, the routes did not extend into South Africa, which was in the grip of apartheid. The Trans‑African Highway initiative was motivated by a desire to improve trade and centre cultural links across the continent – an ambition that was even celebrated on postage stamps There have been long‑standing debates about the erasure of the radical anticolonial spirit from the more conservative postcolonial states that emerged; the promises and hopes of anticolonialism, not least among them socialism and a world free of white supremacy, remain largely unrealised. Instead, by the 1970s neoliberalism emerged as a new hegemonic project. The contemporary instantiation of Cape to Cairo highlights just how pervasive neoliberal logics continue to be, despite multiple global financial crises and the 2011 Egyptian revolution demanding ‘bread, freedom, social justice’.  But the network of streets named after anticolonial figures and events across the world is testament to the immense power and promise of anticolonial revolution. Most of the 20th century was characterised by anticolonial struggle, decolonisation and postcolonial nation‑building, as nations across the global south gained independence from European empire and founded their own political projects. Anticolonial traces, present in street and place names, point to the possibility of solidarity as a means of reorienting colonial geographies. They are a reminder that there have been other imaginings of Cape to Cairo, and that things can be – and have been – otherwise. 2025-06-13 Kristina Rapacki Share #cape #cairo #making #unmaking #colonial
    WWW.ARCHITECTURAL-REVIEW.COM
    Cape to Cairo: the making and unmaking of colonial road networks
    In 2024, Egypt completed its 1,155km stretch of the Cairo–Cape Town Highway, a 10,228km‑long road connecting 10 African countries – Egypt, Sudan, South Sudan, Ethiopia, Kenya, Tanzania, Zambia, Zimbabwe, Botswana and South Africa.   The imaginary of ‘Cape to Cairo’ is not new. In 1874, editor of the Daily Telegraph Edwin Arnold proposed a plan to connect the African continent by rail, a project that came to be known as the Cape to Cairo Railway project. Cecil Rhodes expressed his support for the project, seeing it as a means to connect the various ‘possessions’ of the British Empire across Africa, facilitating the movement of troops and natural resources. This railway project was never completed, and in 1970 was overlaid by a very different attempt at connecting the Cape to Cairo, as part of the Trans‑African Highway network. This 56,683km‑long system of highways – some dating from the colonial era, some built as part of the 1970s project, and some only recently built – aimed to create lines of connection across the African continent, from north to south as well as east to west.  Here, postcolonial state power invested in ‘moving the continent’s people and economies from past to future’, as architectural historians Kenny Cupers and Prita Meier write in their 2020 essay ‘Infrastructure between Statehood and Selfhood: The Trans‑African Highway’. The highways were to be built with the support of Kenya’s president Jomo Kenyatta, Ghana’s president Kwame Nkrumah and Ghana’s director of social welfare Robert Gardiner, as well as the United Nations Economic Commission for Africa (UNECA). This project was part of a particular historical moment during which anticolonial ideas animated most of the African continent; alongside trade, this iteration of Cape to Cairo centred social and cultural connection between African peoples. But though largely socialist in ambition, the project nevertheless engaged modernist developmentalist logics that cemented capitalism.  Lead image: Over a century in the making, the final stretches of the Cairo–Cape Town Highway are being finished. Egypt completed the section within its borders last year and a section over the dry Merille River in Kenya was constructed in 2019. Credit: Allan Muturi / SOPA / ZUMA / Alamy. Above: The route from Cairo to Cape Town, outlined in red, belongs to the Trans‑African Highway network, which comprises nine routes, here in black The project failed to fully materialise at the time, but efforts to complete the Trans‑African Highway network have been revived in the last 20 years; large parts are now complete though some links remain unbuilt and many roads are unpaved or hazardous. The most recent attempts to realise this project coincide with a new continental free trade agreement, the agreement on African Continental Free Trade Area (AfCFTA), established in 2019, to increase trade within the continent. The contemporary manifestation of the Cairo–Cape Town Highway – also known as Trans‑African Highway (TAH) 4 – is marked by deepening neoliberal politics. Represented as an opportunity to boost trade and exports, connecting Egypt to African markets that the Egyptian government view as ‘untapped’, the project invokes notions of trade steeped in extraction, reflecting the neoliberal logic underpinning contemporary Egyptian governance; today, the country’s political project, led by Abdel Fattah El Sisi, is oriented towards Egyptian dominance and extraction in relation to the rest of the continent.  Through an allusion to markets ripe for extraction, this language brings to the fore historical forms of domination that have shaped the connections between Egypt and the rest of the continent; previous iterations of connection across the continent often reproduced forms of domination stretching from the north of the African continent to the south, including the Trans‑Saharan slave trade routes across Africa that ended in various North African and Middle Eastern territories. These networks, beginning in the 8th century and lasting until the 20th, produced racialised hierarchies across the continent, shaping North Africa into a comparably privileged space proximate to ‘Arabness’. This was a racialised division based on a civilisational narrative that saw Arabs as superior, but more importantly a political economic division resulting from the slave trade routes that produced huge profits for North Africa and the Middle East. In the contemporary moment, these racialised hierarchies are bound up in political economic dependency on the Arab Gulf states, who are themselves dependent on resource extraction, land grabbing and privatisation across the entire African continent.  ‘The Cairo–Cape Town Highway connects Egypt to African markets viewed as “untapped”, invoking notions steeped in extraction’ However, this imaginary conjured by the Cairo–Cape Town Highway is countered by a network of streets scattered across Africa that traces the web of Egyptian Pan‑African solidarity across the continent. In Lusaka in Zambia, you might find yourself on Nasser Road, as you might in Mwanza in Tanzania or Luanda in Angola. In Mombasa in Kenya, you might be driving down Abdel Nasser Road; in Kampala in Uganda, you might find yourself at Nasser Road University; and in Tunis in Tunisia, you might end up on Gamal Abdel Nasser Street. These street names are a reference to Gamal Abdel Nasser, Egypt’s first postcolonial leader and president between 1956 and 1970.  Read against the contemporary Cairo–Cape Town Highway, these place names signal a different form of connection that brings to life Egyptian Pan‑Africanism, when solidarity was the hegemonic force connecting the continent, coming up against the notion of a natural or timeless ‘great divide’ within Africa. From the memoirs of Egyptian officials who were posted around Africa as conduits of solidarity, to the broadcasts of Radio Cairo that were heard across the continent, to the various conferences attended by anticolonial movements and postcolonial states, Egypt’s orientation towards Pan‑Africanism, beginning in the early 20th century and lasting until the 1970s, was both material and ideological. Figures and movements forged webs of solidarity with their African comrades, imagining an Africa that was united through shared commitments to ending colonialism and capitalist extraction.  The route between Cape Town in South Africa and Cairo in Egypt has long occupied the colonial imaginary. In 1930, Margaret Belcher and Ellen Budgell made the journey, sponsored by car brand Morris and oil company Shell Credit: Fox Photos / Getty The pair made use of the road built by British colonisers in the 19th century, and which forms the basis for the current Cairo–Cape Town Highway. The road was preceded by the 1874 Cape to Cairo Railway project, which connected the colonies of the British Empire Credit: Library of Congress, Geography and Map Division This network of eponymous streets represents attempts to inscribe anticolonial power into the materiality of the city. Street‑naming practices are one way in which the past comes into the present, ‘weaving history into the geographic fabric of everyday life’, as geographer Derek Alderman wrote in his 2002 essay ‘Street Names as Memorial Arenas’. In this vein, the renaming of streets during decolonisation marked a practice of contesting the production of colonial space. In the newly postcolonial city, renaming was a way of ‘claiming the city back’, Alderman continues. While these changes may appear discursive, it is their embedding in material spaces, through signs and maps, that make the names come to life; place names become a part of the everyday through sharing addresses or giving directions. This quality makes them powerful; consciously or unconsciously, they form part of how the spaces of the city are navigated.  These are traces that were once part of a dominant historical narrative; yet when they are encountered in the present, during a different historical moment, they no longer act as expressions of power but instead conjure up a moment that has long passed. A street in Lusaka named after an Egyptian general made more sense 60 years ago than it does today, yet contextualising it recovers a marginalised history of Egyptian Pan‑Africanism.  Markers such as street names or monuments are simultaneously markers of anticolonial struggle as well as expressions of state power – part of an attempt, by political projects such as Nasser’s, to exert their own dominance over cities, towns and villages. That such traces are expressions of both anticolonial hopes and postcolonial state power produces a sense of tension within them. For instance, Nasser’s postcolonial project in Egypt was a contradictory one; it gave life to anticolonial hopes – for instance by breaking away from European capitalism and embracing anticolonial geopolitics – while crushing many parts of the left through repression, censorship and imprisonment. Traces of Nasser found today inscribe both anticolonial promises – those that came to life and those that did not – while reproducing postcolonial power that in most instances ended in dictatorship.  Recent efforts to complete the route build on those of the post‑independence era – work on a section north of Nairobi started in 1968 Credit: Associated Press / Alamy The Trans‑African Highway network was conceived in 1970 in the spirit of Pan‑Africanism At that time, the routes did not extend into South Africa, which was in the grip of apartheid. The Trans‑African Highway initiative was motivated by a desire to improve trade and centre cultural links across the continent – an ambition that was even celebrated on postage stamps There have been long‑standing debates about the erasure of the radical anticolonial spirit from the more conservative postcolonial states that emerged; the promises and hopes of anticolonialism, not least among them socialism and a world free of white supremacy, remain largely unrealised. Instead, by the 1970s neoliberalism emerged as a new hegemonic project. The contemporary instantiation of Cape to Cairo highlights just how pervasive neoliberal logics continue to be, despite multiple global financial crises and the 2011 Egyptian revolution demanding ‘bread, freedom, social justice’.  But the network of streets named after anticolonial figures and events across the world is testament to the immense power and promise of anticolonial revolution. Most of the 20th century was characterised by anticolonial struggle, decolonisation and postcolonial nation‑building, as nations across the global south gained independence from European empire and founded their own political projects. Anticolonial traces, present in street and place names, point to the possibility of solidarity as a means of reorienting colonial geographies. They are a reminder that there have been other imaginings of Cape to Cairo, and that things can be – and have been – otherwise. 2025-06-13 Kristina Rapacki Share
    0 Commentarios 0 Acciones
  • Premier Truck Rental: Inside Sales Representative - Remote Salt Lake Area

    Are you in search of a company that resonates with your proactive spirit and entrepreneurial mindset? Your search ends here with Premier Truck Rental! Company Overview At Premier Truck Rental, we provide customized commercial fleet rentals nationwide, helping businesses get the right trucks and equipment to get the job done. Headquartered in Fort Wayne, Indiana, PTR is a family-owned company built on a foundation of integrity, innovation, and exceptional service. We serve a wide range of industriesincluding construction, utilities, and infrastructureby delivering high-quality, ready-to-work trucks and trailers tailored to each customers needs. At PTR, we dont just rent truckswe partner with our customers to drive efficiency and success on every job site. Please keep reading Not sure if you meet every requirement? Thats okay! We encourage you to apply if youre passionate, hardworking, and eager to contribute. We know that diverse perspectives and experiences make us stronger, and we want you to be part of our journey. Inside Sales Representativeat PTR is a friendly, people-oriented, and persuasive steward of the sales process. This role will support our Territory Managers with their sales pipeline while also prospecting and cross-selling PTR products themselves. This support includes driving results by enrolling the commitment and buy-in of other internal departments to achieve sales initiatives. The Inside Sales Representative will also represent PTRs commitment to being our customers easy button by serving as the main point of contact. They will be the front-line hero by assisting them in making informed decisions, providing guidance on our rentals, and resolving any issues they might face. We are seeking someone eager to develop their sales skills and grow within our organization. This role is designed as a stepping stone to a Territory Sales Managerposition, providing hands-on experience with customer interactions, lead qualification, and sales process execution. Ideal candidates will demonstrate a strong drive for results, the ability to build relationships, and a proactive approach to learning and development. High-performing ISRs will have the opportunity to be mentored, trained, and considered for promotion into a TSM role as part of their career path at PTR. COMPENSATION This position offers a competitive compensation package of base salaryplus uncapped commissions =OTE annually. RESPONSIBILITIES Offer top-notch customer service and respond with a sense of urgency for goal achievement in a fast-paced sales environment. Build a strong pipeline of customers by qualifying potential leads in your territory. This includes strategic prospecting and sourcing. Develop creative ways to engage and build rapport with prospective customers by pitching the Premier Truck Rental value proposition. Partner with assigned Territory Managers by assisting with scheduling customer visits, trade shows, new customer hand-offs, and any other travel requested. Facilitate in-person meetings and set appointments with prospective customers. Qualify and quote inquiries for your prospective territories both online and from the Territory Manager. Input data into the system with accuracy and follow up in a timely fashion. Facilitate the onboarding of new customers through the credit process. Drive collaboration between customers, Territory Managers, Logistics, and internal teams to coordinate On-Rent and Off-Rent notices with excellent attention to detail. Identify and arrange the swap of equipment from customers meeting the PTR de-fleeting criteria. Manage the sales tools to organize, compile, and analyze data with accuracy for a variety of activities and multiple projects occurring simultaneously.Building and developing a new 3-4 state territory! REQUIREMENTS MUST HAVE2+ years of strategic prospecting or account manager/sales experience; or an advanced degree or equivalent experience converting prospects into closed sales. Tech-forward approach to sales strategy. Excellent prospecting, follow-up, and follow-through skills. Committed to seeing deals through completion. Accountability and ownership of the sales process and a strong commitment to results. Comfortable with a job that has a variety of tasks and is dynamic and changing. Proactive prospecting skills and can overcome objections; driven to establish relationships with new customers. Ability to communicate in a clear, logical manner in formal and informal situations. Proficiency in CRMs and sales tracking systems Hunters mindsetsomeone who thrives on pursuing new business, driving outbound sales, and generating qualified opportunities. Prospecting: Going on LinkedIn, Looking at Competitor data, grabbing contacts for the TM, may use technology like Apollo and LinkedIn Sales Navigator Partner closely with the Territory Manager to ensure a unified approach in managing customer relationships, pipeline development, and revenue growth. Maintain clear and consistent communication to align on sales strategies, customer needs, and market opportunities, fostering a seamless and collaborative partnership with the Territory Manager. Consistently meet and exceed key performance indicators, including rental revenue, upfit revenue, and conversion rates, by actively managing customer accounts and identifying growth opportunities. Support the saturation and maturation of the customer base through strategic outreach, relationship management, and alignment with the Territory Manager to drive long-term success. Remote in the United States with some travel to trade shows, quarterly travel up to a week at a time, and sales meetingsNICE TO HAVE Rental and/or sales experience in the industry. Proficiency in , Apollo.io , LinkedIn Sales Navigator, Power BI, MS Dynamics, Chat GPT. Established relationships within the marketplace or territory. Motivated to grow into outside territory management position with relocation On Target Earnings:EMPLOYEE BENEFITSWellness & Fitness: Take advantage of our on-site CrossFit-style gym, featuring a full-time personal trainer dedicated to helping you reach your fitness goals. Whether you're into group classes, virtual personal training, personalized workout plans, or nutrition coaching, weve got you covered!Exclusive Employee Perks: PTR Swag & a Uniform/Boot Allowance, On-site Micro-Markets stocked with snacks & essentials, discounts on phone plans, supplier vehicles, mobile detailing, tools, & equipmentand much more!Profit SharingYour Success, rewarded: At PTR, we believe in sharing success. Our Profit-SharingComprehensive BenefitsStarting Day One:Premium healthcare coverage401matching & long-term financial planning Paid time off that lets you recharge Life, accidental death, and disability coverage Ongoing learning & development opportunitiesTraining, Growth & RecognitionWe partner with Predictive Index to better understand your strengths, ensuring tailored coaching, structured training, and career development. Performance and attitude evaluations every 6 months keep you on track for growth.Culture & ConnectionMore Than Just a JobAt PTR, we dont just build relationships with our customerswe build them with each other. Our tech-forward, highly collaborative culture is rooted in our core values. Connect and engage through:PTR Field Days & Team EventsThe Extra Mile Recognition ProgramPTR Text Alerts & Open CommunicationPremier Truck Rental Is an Equal Opportunity Employer We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law. If you need support or accommodation due to a disability, contact us at PI6e547fa1c5-
    #premier #truck #rental #inside #sales
    Premier Truck Rental: Inside Sales Representative - Remote Salt Lake Area
    Are you in search of a company that resonates with your proactive spirit and entrepreneurial mindset? Your search ends here with Premier Truck Rental! Company Overview At Premier Truck Rental, we provide customized commercial fleet rentals nationwide, helping businesses get the right trucks and equipment to get the job done. Headquartered in Fort Wayne, Indiana, PTR is a family-owned company built on a foundation of integrity, innovation, and exceptional service. We serve a wide range of industriesincluding construction, utilities, and infrastructureby delivering high-quality, ready-to-work trucks and trailers tailored to each customers needs. At PTR, we dont just rent truckswe partner with our customers to drive efficiency and success on every job site. Please keep reading Not sure if you meet every requirement? Thats okay! We encourage you to apply if youre passionate, hardworking, and eager to contribute. We know that diverse perspectives and experiences make us stronger, and we want you to be part of our journey. Inside Sales Representativeat PTR is a friendly, people-oriented, and persuasive steward of the sales process. This role will support our Territory Managers with their sales pipeline while also prospecting and cross-selling PTR products themselves. This support includes driving results by enrolling the commitment and buy-in of other internal departments to achieve sales initiatives. The Inside Sales Representative will also represent PTRs commitment to being our customers easy button by serving as the main point of contact. They will be the front-line hero by assisting them in making informed decisions, providing guidance on our rentals, and resolving any issues they might face. We are seeking someone eager to develop their sales skills and grow within our organization. This role is designed as a stepping stone to a Territory Sales Managerposition, providing hands-on experience with customer interactions, lead qualification, and sales process execution. Ideal candidates will demonstrate a strong drive for results, the ability to build relationships, and a proactive approach to learning and development. High-performing ISRs will have the opportunity to be mentored, trained, and considered for promotion into a TSM role as part of their career path at PTR. COMPENSATION This position offers a competitive compensation package of base salaryplus uncapped commissions =OTE annually. RESPONSIBILITIES Offer top-notch customer service and respond with a sense of urgency for goal achievement in a fast-paced sales environment. Build a strong pipeline of customers by qualifying potential leads in your territory. This includes strategic prospecting and sourcing. Develop creative ways to engage and build rapport with prospective customers by pitching the Premier Truck Rental value proposition. Partner with assigned Territory Managers by assisting with scheduling customer visits, trade shows, new customer hand-offs, and any other travel requested. Facilitate in-person meetings and set appointments with prospective customers. Qualify and quote inquiries for your prospective territories both online and from the Territory Manager. Input data into the system with accuracy and follow up in a timely fashion. Facilitate the onboarding of new customers through the credit process. Drive collaboration between customers, Territory Managers, Logistics, and internal teams to coordinate On-Rent and Off-Rent notices with excellent attention to detail. Identify and arrange the swap of equipment from customers meeting the PTR de-fleeting criteria. Manage the sales tools to organize, compile, and analyze data with accuracy for a variety of activities and multiple projects occurring simultaneously.Building and developing a new 3-4 state territory! REQUIREMENTS MUST HAVE2+ years of strategic prospecting or account manager/sales experience; or an advanced degree or equivalent experience converting prospects into closed sales. Tech-forward approach to sales strategy. Excellent prospecting, follow-up, and follow-through skills. Committed to seeing deals through completion. Accountability and ownership of the sales process and a strong commitment to results. Comfortable with a job that has a variety of tasks and is dynamic and changing. Proactive prospecting skills and can overcome objections; driven to establish relationships with new customers. Ability to communicate in a clear, logical manner in formal and informal situations. Proficiency in CRMs and sales tracking systems Hunters mindsetsomeone who thrives on pursuing new business, driving outbound sales, and generating qualified opportunities. Prospecting: Going on LinkedIn, Looking at Competitor data, grabbing contacts for the TM, may use technology like Apollo and LinkedIn Sales Navigator Partner closely with the Territory Manager to ensure a unified approach in managing customer relationships, pipeline development, and revenue growth. Maintain clear and consistent communication to align on sales strategies, customer needs, and market opportunities, fostering a seamless and collaborative partnership with the Territory Manager. Consistently meet and exceed key performance indicators, including rental revenue, upfit revenue, and conversion rates, by actively managing customer accounts and identifying growth opportunities. Support the saturation and maturation of the customer base through strategic outreach, relationship management, and alignment with the Territory Manager to drive long-term success. Remote in the United States with some travel to trade shows, quarterly travel up to a week at a time, and sales meetingsNICE TO HAVE Rental and/or sales experience in the industry. Proficiency in , Apollo.io , LinkedIn Sales Navigator, Power BI, MS Dynamics, Chat GPT. Established relationships within the marketplace or territory. Motivated to grow into outside territory management position with relocation On Target Earnings:EMPLOYEE BENEFITSWellness & Fitness: Take advantage of our on-site CrossFit-style gym, featuring a full-time personal trainer dedicated to helping you reach your fitness goals. Whether you're into group classes, virtual personal training, personalized workout plans, or nutrition coaching, weve got you covered!Exclusive Employee Perks: PTR Swag & a Uniform/Boot Allowance, On-site Micro-Markets stocked with snacks & essentials, discounts on phone plans, supplier vehicles, mobile detailing, tools, & equipmentand much more!Profit SharingYour Success, rewarded: At PTR, we believe in sharing success. Our Profit-SharingComprehensive BenefitsStarting Day One:Premium healthcare coverage401matching & long-term financial planning Paid time off that lets you recharge Life, accidental death, and disability coverage Ongoing learning & development opportunitiesTraining, Growth & RecognitionWe partner with Predictive Index to better understand your strengths, ensuring tailored coaching, structured training, and career development. Performance and attitude evaluations every 6 months keep you on track for growth.Culture & ConnectionMore Than Just a JobAt PTR, we dont just build relationships with our customerswe build them with each other. Our tech-forward, highly collaborative culture is rooted in our core values. Connect and engage through:PTR Field Days & Team EventsThe Extra Mile Recognition ProgramPTR Text Alerts & Open CommunicationPremier Truck Rental Is an Equal Opportunity Employer We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law. If you need support or accommodation due to a disability, contact us at PI6e547fa1c5- #premier #truck #rental #inside #sales
    WEWORKREMOTELY.COM
    Premier Truck Rental: Inside Sales Representative - Remote Salt Lake Area
    Are you in search of a company that resonates with your proactive spirit and entrepreneurial mindset? Your search ends here with Premier Truck Rental! Company Overview At Premier Truck Rental (PTR), we provide customized commercial fleet rentals nationwide, helping businesses get the right trucks and equipment to get the job done. Headquartered in Fort Wayne, Indiana, PTR is a family-owned company built on a foundation of integrity, innovation, and exceptional service. We serve a wide range of industriesincluding construction, utilities, and infrastructureby delivering high-quality, ready-to-work trucks and trailers tailored to each customers needs. At PTR, we dont just rent truckswe partner with our customers to drive efficiency and success on every job site. Please keep reading Not sure if you meet every requirement? Thats okay! We encourage you to apply if youre passionate, hardworking, and eager to contribute. We know that diverse perspectives and experiences make us stronger, and we want you to be part of our journey. Inside Sales Representative (ISR) at PTR is a friendly, people-oriented, and persuasive steward of the sales process. This role will support our Territory Managers with their sales pipeline while also prospecting and cross-selling PTR products themselves. This support includes driving results by enrolling the commitment and buy-in of other internal departments to achieve sales initiatives. The Inside Sales Representative will also represent PTRs commitment to being our customers easy button by serving as the main point of contact. They will be the front-line hero by assisting them in making informed decisions, providing guidance on our rentals, and resolving any issues they might face. We are seeking someone eager to develop their sales skills and grow within our organization. This role is designed as a stepping stone to a Territory Sales Manager (TSM) position, providing hands-on experience with customer interactions, lead qualification, and sales process execution. Ideal candidates will demonstrate a strong drive for results, the ability to build relationships, and a proactive approach to learning and development. High-performing ISRs will have the opportunity to be mentored, trained, and considered for promotion into a TSM role as part of their career path at PTR. COMPENSATION This position offers a competitive compensation package of base salary ($50,000/yr) plus uncapped commissions =OTE $85,000 annually. RESPONSIBILITIES Offer top-notch customer service and respond with a sense of urgency for goal achievement in a fast-paced sales environment. Build a strong pipeline of customers by qualifying potential leads in your territory. This includes strategic prospecting and sourcing. Develop creative ways to engage and build rapport with prospective customers by pitching the Premier Truck Rental value proposition. Partner with assigned Territory Managers by assisting with scheduling customer visits, trade shows, new customer hand-offs, and any other travel requested. Facilitate in-person meetings and set appointments with prospective customers. Qualify and quote inquiries for your prospective territories both online and from the Territory Manager. Input data into the system with accuracy and follow up in a timely fashion. Facilitate the onboarding of new customers through the credit process. Drive collaboration between customers, Territory Managers, Logistics, and internal teams to coordinate On-Rent and Off-Rent notices with excellent attention to detail. Identify and arrange the swap of equipment from customers meeting the PTR de-fleeting criteria. Manage the sales tools to organize, compile, and analyze data with accuracy for a variety of activities and multiple projects occurring simultaneously.Building and developing a new 3-4 state territory! REQUIREMENTS MUST HAVE2+ years of strategic prospecting or account manager/sales experience; or an advanced degree or equivalent experience converting prospects into closed sales. Tech-forward approach to sales strategy. Excellent prospecting, follow-up, and follow-through skills. Committed to seeing deals through completion. Accountability and ownership of the sales process and a strong commitment to results. Comfortable with a job that has a variety of tasks and is dynamic and changing. Proactive prospecting skills and can overcome objections; driven to establish relationships with new customers. Ability to communicate in a clear, logical manner in formal and informal situations. Proficiency in CRMs and sales tracking systems Hunters mindsetsomeone who thrives on pursuing new business, driving outbound sales, and generating qualified opportunities. Prospecting: Going on LinkedIn, Looking at Competitor data, grabbing contacts for the TM, may use technology like Apollo and LinkedIn Sales Navigator Partner closely with the Territory Manager to ensure a unified approach in managing customer relationships, pipeline development, and revenue growth. Maintain clear and consistent communication to align on sales strategies, customer needs, and market opportunities, fostering a seamless and collaborative partnership with the Territory Manager. Consistently meet and exceed key performance indicators (KPIs), including rental revenue, upfit revenue, and conversion rates, by actively managing customer accounts and identifying growth opportunities. Support the saturation and maturation of the customer base through strategic outreach, relationship management, and alignment with the Territory Manager to drive long-term success. Remote in the United States with some travel to trade shows, quarterly travel up to a week at a time, and sales meetingsNICE TO HAVE Rental and/or sales experience in the industry. Proficiency in , Apollo.io , LinkedIn Sales Navigator, Power BI, MS Dynamics, Chat GPT. Established relationships within the marketplace or territory. Motivated to grow into outside territory management position with relocation On Target Earnings: ($85,000)EMPLOYEE BENEFITSWellness & Fitness: Take advantage of our on-site CrossFit-style gym, featuring a full-time personal trainer dedicated to helping you reach your fitness goals. Whether you're into group classes, virtual personal training, personalized workout plans, or nutrition coaching, weve got you covered!Exclusive Employee Perks: PTR Swag & a Uniform/Boot Allowance, On-site Micro-Markets stocked with snacks & essentials, discounts on phone plans, supplier vehicles, mobile detailing, tools, & equipmentand much more!Profit SharingYour Success, rewarded: At PTR, we believe in sharing success. Our Profit-SharingComprehensive BenefitsStarting Day One:Premium healthcare coverage (medical, dental, vision, mental health & virtual healthcare)401(k) matching & long-term financial planning Paid time off that lets you recharge Life, accidental death, and disability coverage Ongoing learning & development opportunitiesTraining, Growth & RecognitionWe partner with Predictive Index to better understand your strengths, ensuring tailored coaching, structured training, and career development. Performance and attitude evaluations every 6 months keep you on track for growth.Culture & ConnectionMore Than Just a JobAt PTR, we dont just build relationships with our customerswe build them with each other. Our tech-forward, highly collaborative culture is rooted in our core values. Connect and engage through:PTR Field Days & Team EventsThe Extra Mile Recognition ProgramPTR Text Alerts & Open CommunicationPremier Truck Rental Is an Equal Opportunity Employer We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law. If you need support or accommodation due to a disability, contact us at PI6e547fa1c5-
    0 Commentarios 0 Acciones
  • Looking Back at Two Classics: ILM Deploys the Fleet in ‘Star Trek: First Contact’ and ‘Rogue One: A Star Wars Story’

    Guided by visual effects supervisor John Knoll, ILM embraced continually evolving methodologies to craft breathtaking visual effects for the iconic space battles in First Contact and Rogue One.
    By Jay Stobie
    Visual effects supervisor John Knollconfers with modelmakers Kim Smith and John Goodson with the miniature of the U.S.S. Enterprise-E during production of Star Trek: First Contact.
    Bolstered by visual effects from Industrial Light & Magic, Star Trek: First Contactand Rogue One: A Star Wars Storypropelled their respective franchises to new heights. While Star Trek Generationswelcomed Captain Jean-Luc Picard’screw to the big screen, First Contact stood as the first Star Trek feature that did not focus on its original captain, the legendary James T. Kirk. Similarly, though Rogue One immediately preceded the events of Star Wars: A New Hope, it was set apart from the episodic Star Wars films and launched an era of storytelling outside of the main Skywalker saga that has gone on to include Solo: A Star Wars Story, The Mandalorian, Andor, Ahsoka, The Acolyte, and more.
    The two films also shared a key ILM contributor, John Knoll, who served as visual effects supervisor on both projects, as well as an executive producer on Rogue One. Currently, ILM’s executive creative director and senior visual effects supervisor, Knoll – who also conceived the initial framework for Rogue One’s story – guided ILM as it brought its talents to bear on these sci-fi and fantasy epics. The work involved crafting two spectacular starship-packed space clashes – First Contact’s Battle of Sector 001 and Rogue One’s Battle of Scarif. Although these iconic installments were released roughly two decades apart, they represent a captivating case study of how ILM’s approach to visual effects has evolved over time. With this in mind, let’s examine the films’ unforgettable space battles through the lens of fascinating in-universe parallels and the ILM-produced fleets that face off near Earth and Scarif.
    A final frame from the Battle of Scarif in Rogue One: A Star Wars Story.
    A Context for Conflict
    In First Contact, the United Federation of Planets – a 200-year-old interstellar government consisting of more than 150 member worlds – braces itself for an invasion by the Borg – an overwhelmingly powerful collective composed of cybernetic beings who devastate entire planets by assimilating their biological populations and technological innovations. The Borg only send a single vessel, a massive cube containing thousands of hive-minded drones and their queen, pushing the Federation’s Starfleet defenders to Earth’s doorstep. Conversely, in Rogue One, the Rebel Alliance – a fledgling coalition of freedom fighters – seeks to undermine and overthrow the stalwart Galactic Empire – a totalitarian regime preparing to tighten its grip on the galaxy by revealing a horrifying superweapon. A rebel team infiltrates a top-secret vault on Scarif in a bid to steal plans to that battle station, the dreaded Death Star, with hopes of exploiting a vulnerability in its design.
    On the surface, the situations could not seem to be more disparate, particularly in terms of the Federation’s well-established prestige and the Rebel Alliance’s haphazardly organized factions. Yet, upon closer inspection, the spaceborne conflicts at Earth and Scarif are linked by a vital commonality. The threat posed by the Borg is well-known to the Federation, but the sudden intrusion upon their space takes its defenses by surprise. Starfleet assembles any vessel within range – including antiquated Oberth-class science ships – to intercept the Borg cube in the Typhon Sector, only to be forced back to Earth on the edge of defeat. The unsanctioned mission to Scarif with Jyn Ersoand Cassian Andorand the sudden need to take down the planet’s shield gate propels the Rebel Alliance fleet into rushing to their rescue with everything from their flagship Profundity to GR-75 medium transports. Whether Federation or Rebel Alliance, these fleets gather in last-ditch efforts to oppose enemies who would embrace their eradication – the Battles of Sector 001 and Scarif are fights for survival.
    From Physical to Digital
    By the time Jonathan Frakes was selected to direct First Contact, Star Trek’s reliance on constructing traditional physical modelsfor its features was gradually giving way to innovative computer graphicsmodels, resulting in the film’s use of both techniques. “If one of the ships was to be seen full-screen and at length,” associate visual effects supervisor George Murphy told Cinefex’s Kevin H. Martin, “we knew it would be done as a stage model. Ships that would be doing a lot of elaborate maneuvers in space battle scenes would be created digitally.” In fact, physical and CG versions of the U.S.S. Enterprise-E appear in the film, with the latter being harnessed in shots involving the vessel’s entry into a temporal vortex at the conclusion of the Battle of Sector 001.
    Despite the technological leaps that ILM pioneered in the decades between First Contact and Rogue One, they considered filming physical miniatures for certain ship-related shots in the latter film. ILM considered filming physical miniatures for certain ship-related shots in Rogue One. The feature’s fleets were ultimately created digitally to allow for changes throughout post-production. “If it’s a photographed miniature element, it’s not possible to go back and make adjustments. So it’s the additional flexibility that comes with the computer graphics models that’s very attractive to many people,” John Knoll relayed to writer Jon Witmer at American Cinematographer’s TheASC.com.
    However, Knoll aimed to develop computer graphics that retained the same high-quality details as their physical counterparts, leading ILM to employ a modern approach to a time-honored modelmaking tactic. “I also wanted to emulate the kit-bashing aesthetic that had been part of Star Wars from the very beginning, where a lot of mechanical detail had been added onto the ships by using little pieces from plastic model kits,” explained Knoll in his chat with TheASC.com. For Rogue One, ILM replicated the process by obtaining such kits, scanning their parts, building a computer graphics library, and applying the CG parts to digitally modeled ships. “I’m very happy to say it was super-successful,” concluded Knoll. “I think a lot of our digital models look like they are motion-control models.”
    John Knollconfers with Kim Smith and John Goodson with the miniature of the U.S.S. Enterprise-E during production of Star Trek: First Contact.
    Legendary Lineages
    In First Contact, Captain Picard commanded a brand-new vessel, the Sovereign-class U.S.S. Enterprise-E, continuing the celebrated starship’s legacy in terms of its famous name and design aesthetic. Designed by John Eaves and developed into blueprints by Rick Sternbach, the Enterprise-E was built into a 10-foot physical model by ILM model project supervisor John Goodson and his shop’s talented team. ILM infused the ship with extraordinary detail, including viewports equipped with backlit set images from the craft’s predecessor, the U.S.S. Enterprise-D. For the vessel’s larger windows, namely those associated with the observation lounge and arboretum, ILM took a painstakingly practical approach to match the interiors shown with the real-world set pieces. “We filled that area of the model with tiny, micro-scale furniture,” Goodson informed Cinefex, “including tables and chairs.”
    Rogue One’s rebel team initially traversed the galaxy in a U-wing transport/gunship, which, much like the Enterprise-E, was a unique vessel that nonetheless channeled a certain degree of inspiration from a classic design. Lucasfilm’s Doug Chiang, a co-production designer for Rogue One, referred to the U-wing as the film’s “Huey helicopter version of an X-wing” in the Designing Rogue One bonus featurette on Disney+ before revealing that, “Towards the end of the design cycle, we actually decided that maybe we should put in more X-wing features. And so we took the X-wing engines and literally mounted them onto the configuration that we had going.” Modeled by ILM digital artist Colie Wertz, the U-wing’s final computer graphics design subtly incorporated these X-wing influences to give the transport a distinctive feel without making the craft seem out of place within the rebel fleet.
    While ILM’s work on the Enterprise-E’s viewports offered a compelling view toward the ship’s interior, a breakthrough LED setup for Rogue One permitted ILM to obtain realistic lighting on actors as they looked out from their ships and into the space around them. “All of our major spaceship cockpit scenes were done that way, with the gimbal in this giant horseshoe of LED panels we got fromVER, and we prepared graphics that went on the screens,” John Knoll shared with American Cinematographer’s Benjamin B and Jon D. Witmer. Furthermore, in Disney+’s Rogue One: Digital Storytelling bonus featurette, visual effects producer Janet Lewin noted, “For the actors, I think, in the space battle cockpits, for them to be able to see what was happening in the battle brought a higher level of accuracy to their performance.”
    The U.S.S. Enterprise-E in Star Trek: First Contact.
    Familiar Foes
    To transport First Contact’s Borg invaders, John Goodson’s team at ILM resurrected the Borg cube design previously seen in Star Trek: The Next Generationand Star Trek: Deep Space Nine, creating a nearly three-foot physical model to replace the one from the series. Art consultant and ILM veteran Bill George proposed that the cube’s seemingly straightforward layout be augmented with a complex network of photo-etched brass, a suggestion which produced a jagged surface and offered a visual that was both intricate and menacing. ILM also developed a two-foot motion-control model for a Borg sphere, a brand-new auxiliary vessel that emerged from the cube. “We vacuformed about 15 different patterns that conformed to this spherical curve and covered those with a lot of molded and cast pieces. Then we added tons of acid-etched brass over it, just like we had on the cube,” Goodson outlined to Cinefex’s Kevin H. Martin.
    As for Rogue One’s villainous fleet, reproducing the original trilogy’s Death Star and Imperial Star Destroyers centered upon translating physical models into digital assets. Although ILM no longer possessed A New Hope’s three-foot Death Star shooting model, John Knoll recreated the station’s surface paneling by gathering archival images, and as he spelled out to writer Joe Fordham in Cinefex, “I pieced all the images together. I unwrapped them into texture space and projected them onto a sphere with a trench. By doing that with enough pictures, I got pretty complete coverage of the original model, and that became a template upon which to redraw very high-resolution texture maps. Every panel, every vertical striped line, I matched from a photograph. It was as accurate as it was possible to be as a reproduction of the original model.”
    Knoll’s investigative eye continued to pay dividends when analyzing the three-foot and eight-foot Star Destroyer motion-control models, which had been built for A New Hope and Star Wars: The Empire Strikes Back, respectively. “Our general mantra was, ‘Match your memory of it more than the reality,’ because sometimes you go look at the actual prop in the archive building or you look back at the actual shot from the movie, and you go, ‘Oh, I remember it being a little better than that,’” Knoll conveyed to TheASC.com. This philosophy motivated ILM to combine elements from those two physical models into a single digital design. “Generally, we copied the three-footer for details like the superstructure on the top of the bridge, but then we copied the internal lighting plan from the eight-footer,” Knoll explained. “And then the upper surface of the three-footer was relatively undetailed because there were no shots that saw it closely, so we took a lot of the high-detail upper surface from the eight-footer. So it’s this amalgam of the two models, but the goal was to try to make it look like you remember it from A New Hope.”
    A final frame from Rogue One: A Star Wars Story.
    Forming Up the Fleets
    In addition to the U.S.S. Enterprise-E, the Battle of Sector 001 debuted numerous vessels representing four new Starfleet ship classes – the Akira, Steamrunner, Saber, and Norway – all designed by ILM visual effects art director Alex Jaeger. “Since we figured a lot of the background action in the space battle would be done with computer graphics ships that needed to be built from scratch anyway, I realized that there was no reason not to do some new designs,” John Knoll told American Cinematographer writer Ron Magid. Used in previous Star Trek projects, older physical models for the Oberth and Nebula classes were mixed into the fleet for good measure, though the vast majority of the armada originated as computer graphics.
    Over at Scarif, ILM portrayed the Rebel Alliance forces with computer graphics models of fresh designs, live-action versions of Star Wars Rebels’ VCX-100 light freighter Ghost and Hammerhead corvettes, and Star Wars staples. These ships face off against two Imperial Star Destroyers and squadrons of TIE fighters, and – upon their late arrival to the battle – Darth Vader’s Star Destroyer and the Death Star. The Tantive IV, a CR90 corvette more popularly referred to as a blockade runner, made its own special cameo at the tail end of the fight. As Princess Leia Organa’spersonal ship, the Tantive IV received the Death Star plans and fled the scene, destined to be captured by Vader’s Star Destroyer at the beginning of A New Hope. And, while we’re on the subject of intricate starship maneuvers and space-based choreography…
    Although the First Contact team could plan visual effects shots with animated storyboards, ILM supplied Gareth Edwards with a next-level virtual viewfinder that allowed the director to select his shots by immersing himself among Rogue One’s ships in real time. “What we wanted to do is give Gareth the opportunity to shoot his space battles and other all-digital scenes the same way he shoots his live-action. Then he could go in with this sort of virtual viewfinder and view the space battle going on, and figure out what the best angle was to shoot those ships from,” senior animation supervisor Hal Hickel described in the Rogue One: Digital Storytelling featurette. Hickel divulged that the sequence involving the dish array docking with the Death Star was an example of the “spontaneous discovery of great angles,” as the scene was never storyboarded or previsualized.
    Visual effects supervisor John Knoll with director Gareth Edwards during production of Rogue One: A Star Wars Story.
    Tough Little Ships
    The Federation and Rebel Alliance each deployed “tough little ships”in their respective conflicts, namely the U.S.S. Defiant from Deep Space Nine and the Tantive IV from A New Hope. VisionArt had already built a CG Defiant for the Deep Space Nine series, but ILM upgraded the model with images gathered from the ship’s three-foot physical model. A similar tactic was taken to bring the Tantive IV into the digital realm for Rogue One. “This was the Blockade Runner. This was the most accurate 1:1 reproduction we could possibly have made,” model supervisor Russell Paul declared to Cinefex’s Joe Fordham. “We did an extensive photo reference shoot and photogrammetry re-creation of the miniature. From there, we built it out as accurately as possible.” Speaking of sturdy ships, if you look very closely, you can spot a model of the Millennium Falcon flashing across the background as the U.S.S. Defiant makes an attack run on the Borg cube at the Battle of Sector 001!
    Exploration and Hope
    The in-universe ramifications that materialize from the Battles of Sector 001 and Scarif are monumental. The destruction of the Borg cube compels the Borg Queen to travel back in time in an attempt to vanquish Earth before the Federation can even be formed, but Captain Picard and the Enterprise-E foil the plot and end up helping their 21st century ancestors make “first contact” with another species, the logic-revering Vulcans. The post-Scarif benefits take longer to play out for the Rebel Alliance, but the theft of the Death Star plans eventually leads to the superweapon’s destruction. The Galactic Civil War is far from over, but Scarif is a significant step in the Alliance’s effort to overthrow the Empire.
    The visual effects ILM provided for First Contact and Rogue One contributed significantly to the critical and commercial acclaim both pictures enjoyed, a victory reflecting the relentless dedication, tireless work ethic, and innovative spirit embodied by visual effects supervisor John Knoll and ILM’s entire staff. While being interviewed for The Making of Star Trek: First Contact, actor Patrick Stewart praised ILM’s invaluable influence, emphasizing, “ILM was with us, on this movie, almost every day on set. There is so much that they are involved in.” And, regardless of your personal preferences – phasers or lasers, photon torpedoes or proton torpedoes, warp speed or hyperspace – perhaps Industrial Light & Magic’s ability to infuse excitement into both franchises demonstrates that Star Trek and Star Wars encompass themes that are not competitive, but compatible. After all, what goes together better than exploration and hope?

    Jay Stobieis a writer, author, and consultant who has contributed articles to ILM.com, Skysound.com, Star Wars Insider, StarWars.com, Star Trek Explorer, Star Trek Magazine, and StarTrek.com. Jay loves sci-fi, fantasy, and film, and you can learn more about him by visiting JayStobie.com or finding him on Twitter, Instagram, and other social media platforms at @StobiesGalaxy.
    #looking #back #two #classics #ilm
    Looking Back at Two Classics: ILM Deploys the Fleet in ‘Star Trek: First Contact’ and ‘Rogue One: A Star Wars Story’
    Guided by visual effects supervisor John Knoll, ILM embraced continually evolving methodologies to craft breathtaking visual effects for the iconic space battles in First Contact and Rogue One. By Jay Stobie Visual effects supervisor John Knollconfers with modelmakers Kim Smith and John Goodson with the miniature of the U.S.S. Enterprise-E during production of Star Trek: First Contact. Bolstered by visual effects from Industrial Light & Magic, Star Trek: First Contactand Rogue One: A Star Wars Storypropelled their respective franchises to new heights. While Star Trek Generationswelcomed Captain Jean-Luc Picard’screw to the big screen, First Contact stood as the first Star Trek feature that did not focus on its original captain, the legendary James T. Kirk. Similarly, though Rogue One immediately preceded the events of Star Wars: A New Hope, it was set apart from the episodic Star Wars films and launched an era of storytelling outside of the main Skywalker saga that has gone on to include Solo: A Star Wars Story, The Mandalorian, Andor, Ahsoka, The Acolyte, and more. The two films also shared a key ILM contributor, John Knoll, who served as visual effects supervisor on both projects, as well as an executive producer on Rogue One. Currently, ILM’s executive creative director and senior visual effects supervisor, Knoll – who also conceived the initial framework for Rogue One’s story – guided ILM as it brought its talents to bear on these sci-fi and fantasy epics. The work involved crafting two spectacular starship-packed space clashes – First Contact’s Battle of Sector 001 and Rogue One’s Battle of Scarif. Although these iconic installments were released roughly two decades apart, they represent a captivating case study of how ILM’s approach to visual effects has evolved over time. With this in mind, let’s examine the films’ unforgettable space battles through the lens of fascinating in-universe parallels and the ILM-produced fleets that face off near Earth and Scarif. A final frame from the Battle of Scarif in Rogue One: A Star Wars Story. A Context for Conflict In First Contact, the United Federation of Planets – a 200-year-old interstellar government consisting of more than 150 member worlds – braces itself for an invasion by the Borg – an overwhelmingly powerful collective composed of cybernetic beings who devastate entire planets by assimilating their biological populations and technological innovations. The Borg only send a single vessel, a massive cube containing thousands of hive-minded drones and their queen, pushing the Federation’s Starfleet defenders to Earth’s doorstep. Conversely, in Rogue One, the Rebel Alliance – a fledgling coalition of freedom fighters – seeks to undermine and overthrow the stalwart Galactic Empire – a totalitarian regime preparing to tighten its grip on the galaxy by revealing a horrifying superweapon. A rebel team infiltrates a top-secret vault on Scarif in a bid to steal plans to that battle station, the dreaded Death Star, with hopes of exploiting a vulnerability in its design. On the surface, the situations could not seem to be more disparate, particularly in terms of the Federation’s well-established prestige and the Rebel Alliance’s haphazardly organized factions. Yet, upon closer inspection, the spaceborne conflicts at Earth and Scarif are linked by a vital commonality. The threat posed by the Borg is well-known to the Federation, but the sudden intrusion upon their space takes its defenses by surprise. Starfleet assembles any vessel within range – including antiquated Oberth-class science ships – to intercept the Borg cube in the Typhon Sector, only to be forced back to Earth on the edge of defeat. The unsanctioned mission to Scarif with Jyn Ersoand Cassian Andorand the sudden need to take down the planet’s shield gate propels the Rebel Alliance fleet into rushing to their rescue with everything from their flagship Profundity to GR-75 medium transports. Whether Federation or Rebel Alliance, these fleets gather in last-ditch efforts to oppose enemies who would embrace their eradication – the Battles of Sector 001 and Scarif are fights for survival. From Physical to Digital By the time Jonathan Frakes was selected to direct First Contact, Star Trek’s reliance on constructing traditional physical modelsfor its features was gradually giving way to innovative computer graphicsmodels, resulting in the film’s use of both techniques. “If one of the ships was to be seen full-screen and at length,” associate visual effects supervisor George Murphy told Cinefex’s Kevin H. Martin, “we knew it would be done as a stage model. Ships that would be doing a lot of elaborate maneuvers in space battle scenes would be created digitally.” In fact, physical and CG versions of the U.S.S. Enterprise-E appear in the film, with the latter being harnessed in shots involving the vessel’s entry into a temporal vortex at the conclusion of the Battle of Sector 001. Despite the technological leaps that ILM pioneered in the decades between First Contact and Rogue One, they considered filming physical miniatures for certain ship-related shots in the latter film. ILM considered filming physical miniatures for certain ship-related shots in Rogue One. The feature’s fleets were ultimately created digitally to allow for changes throughout post-production. “If it’s a photographed miniature element, it’s not possible to go back and make adjustments. So it’s the additional flexibility that comes with the computer graphics models that’s very attractive to many people,” John Knoll relayed to writer Jon Witmer at American Cinematographer’s TheASC.com. However, Knoll aimed to develop computer graphics that retained the same high-quality details as their physical counterparts, leading ILM to employ a modern approach to a time-honored modelmaking tactic. “I also wanted to emulate the kit-bashing aesthetic that had been part of Star Wars from the very beginning, where a lot of mechanical detail had been added onto the ships by using little pieces from plastic model kits,” explained Knoll in his chat with TheASC.com. For Rogue One, ILM replicated the process by obtaining such kits, scanning their parts, building a computer graphics library, and applying the CG parts to digitally modeled ships. “I’m very happy to say it was super-successful,” concluded Knoll. “I think a lot of our digital models look like they are motion-control models.” John Knollconfers with Kim Smith and John Goodson with the miniature of the U.S.S. Enterprise-E during production of Star Trek: First Contact. Legendary Lineages In First Contact, Captain Picard commanded a brand-new vessel, the Sovereign-class U.S.S. Enterprise-E, continuing the celebrated starship’s legacy in terms of its famous name and design aesthetic. Designed by John Eaves and developed into blueprints by Rick Sternbach, the Enterprise-E was built into a 10-foot physical model by ILM model project supervisor John Goodson and his shop’s talented team. ILM infused the ship with extraordinary detail, including viewports equipped with backlit set images from the craft’s predecessor, the U.S.S. Enterprise-D. For the vessel’s larger windows, namely those associated with the observation lounge and arboretum, ILM took a painstakingly practical approach to match the interiors shown with the real-world set pieces. “We filled that area of the model with tiny, micro-scale furniture,” Goodson informed Cinefex, “including tables and chairs.” Rogue One’s rebel team initially traversed the galaxy in a U-wing transport/gunship, which, much like the Enterprise-E, was a unique vessel that nonetheless channeled a certain degree of inspiration from a classic design. Lucasfilm’s Doug Chiang, a co-production designer for Rogue One, referred to the U-wing as the film’s “Huey helicopter version of an X-wing” in the Designing Rogue One bonus featurette on Disney+ before revealing that, “Towards the end of the design cycle, we actually decided that maybe we should put in more X-wing features. And so we took the X-wing engines and literally mounted them onto the configuration that we had going.” Modeled by ILM digital artist Colie Wertz, the U-wing’s final computer graphics design subtly incorporated these X-wing influences to give the transport a distinctive feel without making the craft seem out of place within the rebel fleet. While ILM’s work on the Enterprise-E’s viewports offered a compelling view toward the ship’s interior, a breakthrough LED setup for Rogue One permitted ILM to obtain realistic lighting on actors as they looked out from their ships and into the space around them. “All of our major spaceship cockpit scenes were done that way, with the gimbal in this giant horseshoe of LED panels we got fromVER, and we prepared graphics that went on the screens,” John Knoll shared with American Cinematographer’s Benjamin B and Jon D. Witmer. Furthermore, in Disney+’s Rogue One: Digital Storytelling bonus featurette, visual effects producer Janet Lewin noted, “For the actors, I think, in the space battle cockpits, for them to be able to see what was happening in the battle brought a higher level of accuracy to their performance.” The U.S.S. Enterprise-E in Star Trek: First Contact. Familiar Foes To transport First Contact’s Borg invaders, John Goodson’s team at ILM resurrected the Borg cube design previously seen in Star Trek: The Next Generationand Star Trek: Deep Space Nine, creating a nearly three-foot physical model to replace the one from the series. Art consultant and ILM veteran Bill George proposed that the cube’s seemingly straightforward layout be augmented with a complex network of photo-etched brass, a suggestion which produced a jagged surface and offered a visual that was both intricate and menacing. ILM also developed a two-foot motion-control model for a Borg sphere, a brand-new auxiliary vessel that emerged from the cube. “We vacuformed about 15 different patterns that conformed to this spherical curve and covered those with a lot of molded and cast pieces. Then we added tons of acid-etched brass over it, just like we had on the cube,” Goodson outlined to Cinefex’s Kevin H. Martin. As for Rogue One’s villainous fleet, reproducing the original trilogy’s Death Star and Imperial Star Destroyers centered upon translating physical models into digital assets. Although ILM no longer possessed A New Hope’s three-foot Death Star shooting model, John Knoll recreated the station’s surface paneling by gathering archival images, and as he spelled out to writer Joe Fordham in Cinefex, “I pieced all the images together. I unwrapped them into texture space and projected them onto a sphere with a trench. By doing that with enough pictures, I got pretty complete coverage of the original model, and that became a template upon which to redraw very high-resolution texture maps. Every panel, every vertical striped line, I matched from a photograph. It was as accurate as it was possible to be as a reproduction of the original model.” Knoll’s investigative eye continued to pay dividends when analyzing the three-foot and eight-foot Star Destroyer motion-control models, which had been built for A New Hope and Star Wars: The Empire Strikes Back, respectively. “Our general mantra was, ‘Match your memory of it more than the reality,’ because sometimes you go look at the actual prop in the archive building or you look back at the actual shot from the movie, and you go, ‘Oh, I remember it being a little better than that,’” Knoll conveyed to TheASC.com. This philosophy motivated ILM to combine elements from those two physical models into a single digital design. “Generally, we copied the three-footer for details like the superstructure on the top of the bridge, but then we copied the internal lighting plan from the eight-footer,” Knoll explained. “And then the upper surface of the three-footer was relatively undetailed because there were no shots that saw it closely, so we took a lot of the high-detail upper surface from the eight-footer. So it’s this amalgam of the two models, but the goal was to try to make it look like you remember it from A New Hope.” A final frame from Rogue One: A Star Wars Story. Forming Up the Fleets In addition to the U.S.S. Enterprise-E, the Battle of Sector 001 debuted numerous vessels representing four new Starfleet ship classes – the Akira, Steamrunner, Saber, and Norway – all designed by ILM visual effects art director Alex Jaeger. “Since we figured a lot of the background action in the space battle would be done with computer graphics ships that needed to be built from scratch anyway, I realized that there was no reason not to do some new designs,” John Knoll told American Cinematographer writer Ron Magid. Used in previous Star Trek projects, older physical models for the Oberth and Nebula classes were mixed into the fleet for good measure, though the vast majority of the armada originated as computer graphics. Over at Scarif, ILM portrayed the Rebel Alliance forces with computer graphics models of fresh designs, live-action versions of Star Wars Rebels’ VCX-100 light freighter Ghost and Hammerhead corvettes, and Star Wars staples. These ships face off against two Imperial Star Destroyers and squadrons of TIE fighters, and – upon their late arrival to the battle – Darth Vader’s Star Destroyer and the Death Star. The Tantive IV, a CR90 corvette more popularly referred to as a blockade runner, made its own special cameo at the tail end of the fight. As Princess Leia Organa’spersonal ship, the Tantive IV received the Death Star plans and fled the scene, destined to be captured by Vader’s Star Destroyer at the beginning of A New Hope. And, while we’re on the subject of intricate starship maneuvers and space-based choreography… Although the First Contact team could plan visual effects shots with animated storyboards, ILM supplied Gareth Edwards with a next-level virtual viewfinder that allowed the director to select his shots by immersing himself among Rogue One’s ships in real time. “What we wanted to do is give Gareth the opportunity to shoot his space battles and other all-digital scenes the same way he shoots his live-action. Then he could go in with this sort of virtual viewfinder and view the space battle going on, and figure out what the best angle was to shoot those ships from,” senior animation supervisor Hal Hickel described in the Rogue One: Digital Storytelling featurette. Hickel divulged that the sequence involving the dish array docking with the Death Star was an example of the “spontaneous discovery of great angles,” as the scene was never storyboarded or previsualized. Visual effects supervisor John Knoll with director Gareth Edwards during production of Rogue One: A Star Wars Story. Tough Little Ships The Federation and Rebel Alliance each deployed “tough little ships”in their respective conflicts, namely the U.S.S. Defiant from Deep Space Nine and the Tantive IV from A New Hope. VisionArt had already built a CG Defiant for the Deep Space Nine series, but ILM upgraded the model with images gathered from the ship’s three-foot physical model. A similar tactic was taken to bring the Tantive IV into the digital realm for Rogue One. “This was the Blockade Runner. This was the most accurate 1:1 reproduction we could possibly have made,” model supervisor Russell Paul declared to Cinefex’s Joe Fordham. “We did an extensive photo reference shoot and photogrammetry re-creation of the miniature. From there, we built it out as accurately as possible.” Speaking of sturdy ships, if you look very closely, you can spot a model of the Millennium Falcon flashing across the background as the U.S.S. Defiant makes an attack run on the Borg cube at the Battle of Sector 001! Exploration and Hope The in-universe ramifications that materialize from the Battles of Sector 001 and Scarif are monumental. The destruction of the Borg cube compels the Borg Queen to travel back in time in an attempt to vanquish Earth before the Federation can even be formed, but Captain Picard and the Enterprise-E foil the plot and end up helping their 21st century ancestors make “first contact” with another species, the logic-revering Vulcans. The post-Scarif benefits take longer to play out for the Rebel Alliance, but the theft of the Death Star plans eventually leads to the superweapon’s destruction. The Galactic Civil War is far from over, but Scarif is a significant step in the Alliance’s effort to overthrow the Empire. The visual effects ILM provided for First Contact and Rogue One contributed significantly to the critical and commercial acclaim both pictures enjoyed, a victory reflecting the relentless dedication, tireless work ethic, and innovative spirit embodied by visual effects supervisor John Knoll and ILM’s entire staff. While being interviewed for The Making of Star Trek: First Contact, actor Patrick Stewart praised ILM’s invaluable influence, emphasizing, “ILM was with us, on this movie, almost every day on set. There is so much that they are involved in.” And, regardless of your personal preferences – phasers or lasers, photon torpedoes or proton torpedoes, warp speed or hyperspace – perhaps Industrial Light & Magic’s ability to infuse excitement into both franchises demonstrates that Star Trek and Star Wars encompass themes that are not competitive, but compatible. After all, what goes together better than exploration and hope? – Jay Stobieis a writer, author, and consultant who has contributed articles to ILM.com, Skysound.com, Star Wars Insider, StarWars.com, Star Trek Explorer, Star Trek Magazine, and StarTrek.com. Jay loves sci-fi, fantasy, and film, and you can learn more about him by visiting JayStobie.com or finding him on Twitter, Instagram, and other social media platforms at @StobiesGalaxy. #looking #back #two #classics #ilm
    WWW.ILM.COM
    Looking Back at Two Classics: ILM Deploys the Fleet in ‘Star Trek: First Contact’ and ‘Rogue One: A Star Wars Story’
    Guided by visual effects supervisor John Knoll, ILM embraced continually evolving methodologies to craft breathtaking visual effects for the iconic space battles in First Contact and Rogue One. By Jay Stobie Visual effects supervisor John Knoll (right) confers with modelmakers Kim Smith and John Goodson with the miniature of the U.S.S. Enterprise-E during production of Star Trek: First Contact (Credit: ILM). Bolstered by visual effects from Industrial Light & Magic, Star Trek: First Contact (1996) and Rogue One: A Star Wars Story (2016) propelled their respective franchises to new heights. While Star Trek Generations (1994) welcomed Captain Jean-Luc Picard’s (Patrick Stewart) crew to the big screen, First Contact stood as the first Star Trek feature that did not focus on its original captain, the legendary James T. Kirk (William Shatner). Similarly, though Rogue One immediately preceded the events of Star Wars: A New Hope (1977), it was set apart from the episodic Star Wars films and launched an era of storytelling outside of the main Skywalker saga that has gone on to include Solo: A Star Wars Story (2018), The Mandalorian (2019-23), Andor (2022-25), Ahsoka (2023), The Acolyte (2024), and more. The two films also shared a key ILM contributor, John Knoll, who served as visual effects supervisor on both projects, as well as an executive producer on Rogue One. Currently, ILM’s executive creative director and senior visual effects supervisor, Knoll – who also conceived the initial framework for Rogue One’s story – guided ILM as it brought its talents to bear on these sci-fi and fantasy epics. The work involved crafting two spectacular starship-packed space clashes – First Contact’s Battle of Sector 001 and Rogue One’s Battle of Scarif. Although these iconic installments were released roughly two decades apart, they represent a captivating case study of how ILM’s approach to visual effects has evolved over time. With this in mind, let’s examine the films’ unforgettable space battles through the lens of fascinating in-universe parallels and the ILM-produced fleets that face off near Earth and Scarif. A final frame from the Battle of Scarif in Rogue One: A Star Wars Story (Credit: ILM & Lucasfilm). A Context for Conflict In First Contact, the United Federation of Planets – a 200-year-old interstellar government consisting of more than 150 member worlds – braces itself for an invasion by the Borg – an overwhelmingly powerful collective composed of cybernetic beings who devastate entire planets by assimilating their biological populations and technological innovations. The Borg only send a single vessel, a massive cube containing thousands of hive-minded drones and their queen, pushing the Federation’s Starfleet defenders to Earth’s doorstep. Conversely, in Rogue One, the Rebel Alliance – a fledgling coalition of freedom fighters – seeks to undermine and overthrow the stalwart Galactic Empire – a totalitarian regime preparing to tighten its grip on the galaxy by revealing a horrifying superweapon. A rebel team infiltrates a top-secret vault on Scarif in a bid to steal plans to that battle station, the dreaded Death Star, with hopes of exploiting a vulnerability in its design. On the surface, the situations could not seem to be more disparate, particularly in terms of the Federation’s well-established prestige and the Rebel Alliance’s haphazardly organized factions. Yet, upon closer inspection, the spaceborne conflicts at Earth and Scarif are linked by a vital commonality. The threat posed by the Borg is well-known to the Federation, but the sudden intrusion upon their space takes its defenses by surprise. Starfleet assembles any vessel within range – including antiquated Oberth-class science ships – to intercept the Borg cube in the Typhon Sector, only to be forced back to Earth on the edge of defeat. The unsanctioned mission to Scarif with Jyn Erso (Felicity Jones) and Cassian Andor (Diego Luna) and the sudden need to take down the planet’s shield gate propels the Rebel Alliance fleet into rushing to their rescue with everything from their flagship Profundity to GR-75 medium transports. Whether Federation or Rebel Alliance, these fleets gather in last-ditch efforts to oppose enemies who would embrace their eradication – the Battles of Sector 001 and Scarif are fights for survival. From Physical to Digital By the time Jonathan Frakes was selected to direct First Contact, Star Trek’s reliance on constructing traditional physical models (many of which were built by ILM) for its features was gradually giving way to innovative computer graphics (CG) models, resulting in the film’s use of both techniques. “If one of the ships was to be seen full-screen and at length,” associate visual effects supervisor George Murphy told Cinefex’s Kevin H. Martin, “we knew it would be done as a stage model. Ships that would be doing a lot of elaborate maneuvers in space battle scenes would be created digitally.” In fact, physical and CG versions of the U.S.S. Enterprise-E appear in the film, with the latter being harnessed in shots involving the vessel’s entry into a temporal vortex at the conclusion of the Battle of Sector 001. Despite the technological leaps that ILM pioneered in the decades between First Contact and Rogue One, they considered filming physical miniatures for certain ship-related shots in the latter film. ILM considered filming physical miniatures for certain ship-related shots in Rogue One. The feature’s fleets were ultimately created digitally to allow for changes throughout post-production. “If it’s a photographed miniature element, it’s not possible to go back and make adjustments. So it’s the additional flexibility that comes with the computer graphics models that’s very attractive to many people,” John Knoll relayed to writer Jon Witmer at American Cinematographer’s TheASC.com. However, Knoll aimed to develop computer graphics that retained the same high-quality details as their physical counterparts, leading ILM to employ a modern approach to a time-honored modelmaking tactic. “I also wanted to emulate the kit-bashing aesthetic that had been part of Star Wars from the very beginning, where a lot of mechanical detail had been added onto the ships by using little pieces from plastic model kits,” explained Knoll in his chat with TheASC.com. For Rogue One, ILM replicated the process by obtaining such kits, scanning their parts, building a computer graphics library, and applying the CG parts to digitally modeled ships. “I’m very happy to say it was super-successful,” concluded Knoll. “I think a lot of our digital models look like they are motion-control models.” John Knoll (second from left) confers with Kim Smith and John Goodson with the miniature of the U.S.S. Enterprise-E during production of Star Trek: First Contact (Credit: ILM). Legendary Lineages In First Contact, Captain Picard commanded a brand-new vessel, the Sovereign-class U.S.S. Enterprise-E, continuing the celebrated starship’s legacy in terms of its famous name and design aesthetic. Designed by John Eaves and developed into blueprints by Rick Sternbach, the Enterprise-E was built into a 10-foot physical model by ILM model project supervisor John Goodson and his shop’s talented team. ILM infused the ship with extraordinary detail, including viewports equipped with backlit set images from the craft’s predecessor, the U.S.S. Enterprise-D. For the vessel’s larger windows, namely those associated with the observation lounge and arboretum, ILM took a painstakingly practical approach to match the interiors shown with the real-world set pieces. “We filled that area of the model with tiny, micro-scale furniture,” Goodson informed Cinefex, “including tables and chairs.” Rogue One’s rebel team initially traversed the galaxy in a U-wing transport/gunship, which, much like the Enterprise-E, was a unique vessel that nonetheless channeled a certain degree of inspiration from a classic design. Lucasfilm’s Doug Chiang, a co-production designer for Rogue One, referred to the U-wing as the film’s “Huey helicopter version of an X-wing” in the Designing Rogue One bonus featurette on Disney+ before revealing that, “Towards the end of the design cycle, we actually decided that maybe we should put in more X-wing features. And so we took the X-wing engines and literally mounted them onto the configuration that we had going.” Modeled by ILM digital artist Colie Wertz, the U-wing’s final computer graphics design subtly incorporated these X-wing influences to give the transport a distinctive feel without making the craft seem out of place within the rebel fleet. While ILM’s work on the Enterprise-E’s viewports offered a compelling view toward the ship’s interior, a breakthrough LED setup for Rogue One permitted ILM to obtain realistic lighting on actors as they looked out from their ships and into the space around them. “All of our major spaceship cockpit scenes were done that way, with the gimbal in this giant horseshoe of LED panels we got from [equipment vendor] VER, and we prepared graphics that went on the screens,” John Knoll shared with American Cinematographer’s Benjamin B and Jon D. Witmer. Furthermore, in Disney+’s Rogue One: Digital Storytelling bonus featurette, visual effects producer Janet Lewin noted, “For the actors, I think, in the space battle cockpits, for them to be able to see what was happening in the battle brought a higher level of accuracy to their performance.” The U.S.S. Enterprise-E in Star Trek: First Contact (Credit: Paramount). Familiar Foes To transport First Contact’s Borg invaders, John Goodson’s team at ILM resurrected the Borg cube design previously seen in Star Trek: The Next Generation (1987) and Star Trek: Deep Space Nine (1993), creating a nearly three-foot physical model to replace the one from the series. Art consultant and ILM veteran Bill George proposed that the cube’s seemingly straightforward layout be augmented with a complex network of photo-etched brass, a suggestion which produced a jagged surface and offered a visual that was both intricate and menacing. ILM also developed a two-foot motion-control model for a Borg sphere, a brand-new auxiliary vessel that emerged from the cube. “We vacuformed about 15 different patterns that conformed to this spherical curve and covered those with a lot of molded and cast pieces. Then we added tons of acid-etched brass over it, just like we had on the cube,” Goodson outlined to Cinefex’s Kevin H. Martin. As for Rogue One’s villainous fleet, reproducing the original trilogy’s Death Star and Imperial Star Destroyers centered upon translating physical models into digital assets. Although ILM no longer possessed A New Hope’s three-foot Death Star shooting model, John Knoll recreated the station’s surface paneling by gathering archival images, and as he spelled out to writer Joe Fordham in Cinefex, “I pieced all the images together. I unwrapped them into texture space and projected them onto a sphere with a trench. By doing that with enough pictures, I got pretty complete coverage of the original model, and that became a template upon which to redraw very high-resolution texture maps. Every panel, every vertical striped line, I matched from a photograph. It was as accurate as it was possible to be as a reproduction of the original model.” Knoll’s investigative eye continued to pay dividends when analyzing the three-foot and eight-foot Star Destroyer motion-control models, which had been built for A New Hope and Star Wars: The Empire Strikes Back (1980), respectively. “Our general mantra was, ‘Match your memory of it more than the reality,’ because sometimes you go look at the actual prop in the archive building or you look back at the actual shot from the movie, and you go, ‘Oh, I remember it being a little better than that,’” Knoll conveyed to TheASC.com. This philosophy motivated ILM to combine elements from those two physical models into a single digital design. “Generally, we copied the three-footer for details like the superstructure on the top of the bridge, but then we copied the internal lighting plan from the eight-footer,” Knoll explained. “And then the upper surface of the three-footer was relatively undetailed because there were no shots that saw it closely, so we took a lot of the high-detail upper surface from the eight-footer. So it’s this amalgam of the two models, but the goal was to try to make it look like you remember it from A New Hope.” A final frame from Rogue One: A Star Wars Story (Credit: ILM & Lucasfilm). Forming Up the Fleets In addition to the U.S.S. Enterprise-E, the Battle of Sector 001 debuted numerous vessels representing four new Starfleet ship classes – the Akira, Steamrunner, Saber, and Norway – all designed by ILM visual effects art director Alex Jaeger. “Since we figured a lot of the background action in the space battle would be done with computer graphics ships that needed to be built from scratch anyway, I realized that there was no reason not to do some new designs,” John Knoll told American Cinematographer writer Ron Magid. Used in previous Star Trek projects, older physical models for the Oberth and Nebula classes were mixed into the fleet for good measure, though the vast majority of the armada originated as computer graphics. Over at Scarif, ILM portrayed the Rebel Alliance forces with computer graphics models of fresh designs (the MC75 cruiser Profundity and U-wings), live-action versions of Star Wars Rebels’ VCX-100 light freighter Ghost and Hammerhead corvettes, and Star Wars staples (Nebulon-B frigates, X-wings, Y-wings, and more). These ships face off against two Imperial Star Destroyers and squadrons of TIE fighters, and – upon their late arrival to the battle – Darth Vader’s Star Destroyer and the Death Star. The Tantive IV, a CR90 corvette more popularly referred to as a blockade runner, made its own special cameo at the tail end of the fight. As Princess Leia Organa’s (Carrie Fisher and Ingvild Deila) personal ship, the Tantive IV received the Death Star plans and fled the scene, destined to be captured by Vader’s Star Destroyer at the beginning of A New Hope. And, while we’re on the subject of intricate starship maneuvers and space-based choreography… Although the First Contact team could plan visual effects shots with animated storyboards, ILM supplied Gareth Edwards with a next-level virtual viewfinder that allowed the director to select his shots by immersing himself among Rogue One’s ships in real time. “What we wanted to do is give Gareth the opportunity to shoot his space battles and other all-digital scenes the same way he shoots his live-action. Then he could go in with this sort of virtual viewfinder and view the space battle going on, and figure out what the best angle was to shoot those ships from,” senior animation supervisor Hal Hickel described in the Rogue One: Digital Storytelling featurette. Hickel divulged that the sequence involving the dish array docking with the Death Star was an example of the “spontaneous discovery of great angles,” as the scene was never storyboarded or previsualized. Visual effects supervisor John Knoll with director Gareth Edwards during production of Rogue One: A Star Wars Story (Credit: ILM & Lucasfilm). Tough Little Ships The Federation and Rebel Alliance each deployed “tough little ships” (an endearing description Commander William T. Riker [Jonathan Frakes] bestowed upon the U.S.S. Defiant in First Contact) in their respective conflicts, namely the U.S.S. Defiant from Deep Space Nine and the Tantive IV from A New Hope. VisionArt had already built a CG Defiant for the Deep Space Nine series, but ILM upgraded the model with images gathered from the ship’s three-foot physical model. A similar tactic was taken to bring the Tantive IV into the digital realm for Rogue One. “This was the Blockade Runner. This was the most accurate 1:1 reproduction we could possibly have made,” model supervisor Russell Paul declared to Cinefex’s Joe Fordham. “We did an extensive photo reference shoot and photogrammetry re-creation of the miniature. From there, we built it out as accurately as possible.” Speaking of sturdy ships, if you look very closely, you can spot a model of the Millennium Falcon flashing across the background as the U.S.S. Defiant makes an attack run on the Borg cube at the Battle of Sector 001! Exploration and Hope The in-universe ramifications that materialize from the Battles of Sector 001 and Scarif are monumental. The destruction of the Borg cube compels the Borg Queen to travel back in time in an attempt to vanquish Earth before the Federation can even be formed, but Captain Picard and the Enterprise-E foil the plot and end up helping their 21st century ancestors make “first contact” with another species, the logic-revering Vulcans. The post-Scarif benefits take longer to play out for the Rebel Alliance, but the theft of the Death Star plans eventually leads to the superweapon’s destruction. The Galactic Civil War is far from over, but Scarif is a significant step in the Alliance’s effort to overthrow the Empire. The visual effects ILM provided for First Contact and Rogue One contributed significantly to the critical and commercial acclaim both pictures enjoyed, a victory reflecting the relentless dedication, tireless work ethic, and innovative spirit embodied by visual effects supervisor John Knoll and ILM’s entire staff. While being interviewed for The Making of Star Trek: First Contact, actor Patrick Stewart praised ILM’s invaluable influence, emphasizing, “ILM was with us, on this movie, almost every day on set. There is so much that they are involved in.” And, regardless of your personal preferences – phasers or lasers, photon torpedoes or proton torpedoes, warp speed or hyperspace – perhaps Industrial Light & Magic’s ability to infuse excitement into both franchises demonstrates that Star Trek and Star Wars encompass themes that are not competitive, but compatible. After all, what goes together better than exploration and hope? – Jay Stobie (he/him) is a writer, author, and consultant who has contributed articles to ILM.com, Skysound.com, Star Wars Insider, StarWars.com, Star Trek Explorer, Star Trek Magazine, and StarTrek.com. Jay loves sci-fi, fantasy, and film, and you can learn more about him by visiting JayStobie.com or finding him on Twitter, Instagram, and other social media platforms at @StobiesGalaxy.
    0 Commentarios 0 Acciones
  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence

    A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan.
    "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets."
    The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites.

    Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets.
    While users can create temporary, permanent, or custominvite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases.

    This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server.
    "This creates a serious risk: Users who follow previously trusted invite linkscan unknowingly be redirected to fake Discord servers created by threat actors," Check Point said.
    The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button.
    This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification.

    Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string", and press Enter to authenticate their accounts.
    But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them.
    At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks.
    AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-controlserver by reading a Pastebin file.
    The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms.
    Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office.
    The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook.
    The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain.

    Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times.
    It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom.
    The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery networkabused to host malware in the past.
    "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers."
    "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #discord #invite #link #hijacking #delivers
    Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets." The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites. Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets. While users can create temporary, permanent, or custominvite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases. This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server. "This creates a serious risk: Users who follow previously trusted invite linkscan unknowingly be redirected to fake Discord servers created by threat actors," Check Point said. The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button. This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification. Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string", and press Enter to authenticate their accounts. But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them. At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks. AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-controlserver by reading a Pastebin file. The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms. Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office. The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook. The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain. Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times. It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom. The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery networkabused to host malware in the past. "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers." "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #discord #invite #link #hijacking #delivers
    THEHACKERNEWS.COM
    Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets." The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites. Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets. While users can create temporary, permanent, or custom (vanity) invite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases. This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server. "This creates a serious risk: Users who follow previously trusted invite links (e.g., on websites, blogs, or forums) can unknowingly be redirected to fake Discord servers created by threat actors," Check Point said. The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button. This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification. Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string" (i.e., the PowerShell command), and press Enter to authenticate their accounts. But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them. At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks. AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-control (C2) server by reading a Pastebin file. The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms. Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office. The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook. The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain. Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times. It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom. The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery network (CDN) abused to host malware in the past. "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers." "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    0 Commentarios 0 Acciones
  • Marina Tabassum opens 2025 Serpentine Pavilion in Kensington Gardens

    html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" ";
    The 2025 Serpentine Pavilion has opened to the public today, on 6 June, in London's Kensington Gardens. Named A Capsule in Time, the pavilion, designed by Bangladeshi architect and educator Marina Tabassum and her firm, Marina Tabassum Architects, the design discusses the permanent and ephemeral aspects of the commission. The Serpentine Pavilion will be on view in London's Kensington Gardens from June 6th to October 26th, 2025.The pavilion, which runs along the park's north-south axis, has a center court that lines up with Serpentine South's bell tower and an elongated capsule-like shape. The building, which consists of four wooden sculptures with a translucent façade that diffuses and dapples light as it enters the room, was inspired by summer park visitors and arched garden canopies that filter warm daylight through verdant greenery. A kinetic component that allows one of the capsule forms to move, link, and change the Pavilion into a new area is essential to Tabassum's design.Drawing inspiration from the history and architectural heritage of South Asian Shamiyana tents or awnings, Tabassum's design emphasizes the sensory and spiritual possibilities of architecture through scale and the interaction of light and shadow. Made of cloth and held up by bamboo poles, these structures serve a similar dynamic purpose and are frequently set up for outdoor events and festivities. The potential to bring people together through dialogue, networking, live events, and public gatherings is welcomed by Tabassum's Pavilion's openness.In keeping with Dame Zaha Hadid's philosophy of pushing the limits of architecture, Tabassum's Pavilion will commemorate the 25th anniversary of this groundbreaking project.Like many of Tabassum's earlier projects, the Pavilion is built around a semi-mature Ginkgo tree, a climate-resilient tree species that dates back to the early Jurassic Period. It takes into account the threshold between inside and outside, the tactility of material, lightness and darkness, height and volume. The leaves of the Gingko tree will gradually change from green to a brilliant gold-yellow color during the summer and into the fall. The choice of a gingko was motivated by the species' demonstrated climate change resistance and its contribution to Kensington Gardens' varied treescape. After the Pavilion closes in October, the species—which is immune to many modern pests and diseases—will be transplanted in the park.Tabassum elaborates on her idea for the Pavilion to serve as a multipurpose area where guests can congregate and bond via dialogue and information exchange in an age of growing censorship. The books that Tabassum and her colleagues at MTA have put together honor the diversity of Bangladesh, Bengali literature, poetry, ecology, and culture. It is housed on shelves that are integrated into the building and references the Pavilion's afterlife, which is a library that is accessible to everyone and is no longer located on Serpentine's lawn.“The Serpentine Pavilion celebrates the London summer—a time to be outdoors, connecting with friends and family in Kensington Gardens. We want to celebrate the tradition of park-going. "On a sunny day, the play of filtered daylight through the translucent facade draws on the memory of being under a Shamiyana at a Bengali wedding. Built from bamboo and decorated cloth, Shamiyanas convene hundreds of guests on any occasion," said Marina Tabassum, Architect, Marina Tabassum Architects. The Serpentine Pavilion offers a unique platform under the summer sun to unite as people rich in diversity. How can we transcend our differences and connect as humans?.""The Serpentine Pavilion offers a place where people of diverse backgrounds, ages and cultures can come together under one roof and call for action, facilitating dialogues that expand our boundaries of tolerance and respect," Tabassum added."We are thrilled to be working with Marina and her team on this year's Pavilion. The project, with its tight timescales and unique engineering challenges, is always particularly rewarding for our team of engineers and project managers," said Jon Leach, Director of AECOM. "Celebrating our thirteenth year on the Pavilion, it is fantastic to work with the Serpentine and the entire team once again to bring this year's design to life," Leach added.In 2024, architect, researcher and educator Marina Tabassum was named as the world's most influential architects in the 2024 TIME100 Next List by TIME Magazine. In 20216, Tabassum was awarded the Aga Khan Award for Architecture with Bait Ur Rouf Mosque, Dhaka, Bangladesh.Founded in 2005 after Tabassum's ten-year partnership with URBANA, Marina Tabassum Architects has created environmentally, politically, and socially concerned architectural designs. MTA carries out research on environmental deterioration in Bangladesh, a country particularly susceptible to the effects of climate change, in addition to buildings situated in Dhaka, the surrounding areas, and other regions of the country.All images © Iwan Baan, courtesy of Serpentine.> via Serpentine Galleries 
    #marina #tabassum #opens #serpentine #pavilion
    Marina Tabassum opens 2025 Serpentine Pavilion in Kensington Gardens
    html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "; The 2025 Serpentine Pavilion has opened to the public today, on 6 June, in London's Kensington Gardens. Named A Capsule in Time, the pavilion, designed by Bangladeshi architect and educator Marina Tabassum and her firm, Marina Tabassum Architects, the design discusses the permanent and ephemeral aspects of the commission. The Serpentine Pavilion will be on view in London's Kensington Gardens from June 6th to October 26th, 2025.The pavilion, which runs along the park's north-south axis, has a center court that lines up with Serpentine South's bell tower and an elongated capsule-like shape. The building, which consists of four wooden sculptures with a translucent façade that diffuses and dapples light as it enters the room, was inspired by summer park visitors and arched garden canopies that filter warm daylight through verdant greenery. A kinetic component that allows one of the capsule forms to move, link, and change the Pavilion into a new area is essential to Tabassum's design.Drawing inspiration from the history and architectural heritage of South Asian Shamiyana tents or awnings, Tabassum's design emphasizes the sensory and spiritual possibilities of architecture through scale and the interaction of light and shadow. Made of cloth and held up by bamboo poles, these structures serve a similar dynamic purpose and are frequently set up for outdoor events and festivities. The potential to bring people together through dialogue, networking, live events, and public gatherings is welcomed by Tabassum's Pavilion's openness.In keeping with Dame Zaha Hadid's philosophy of pushing the limits of architecture, Tabassum's Pavilion will commemorate the 25th anniversary of this groundbreaking project.Like many of Tabassum's earlier projects, the Pavilion is built around a semi-mature Ginkgo tree, a climate-resilient tree species that dates back to the early Jurassic Period. It takes into account the threshold between inside and outside, the tactility of material, lightness and darkness, height and volume. The leaves of the Gingko tree will gradually change from green to a brilliant gold-yellow color during the summer and into the fall. The choice of a gingko was motivated by the species' demonstrated climate change resistance and its contribution to Kensington Gardens' varied treescape. After the Pavilion closes in October, the species—which is immune to many modern pests and diseases—will be transplanted in the park.Tabassum elaborates on her idea for the Pavilion to serve as a multipurpose area where guests can congregate and bond via dialogue and information exchange in an age of growing censorship. The books that Tabassum and her colleagues at MTA have put together honor the diversity of Bangladesh, Bengali literature, poetry, ecology, and culture. It is housed on shelves that are integrated into the building and references the Pavilion's afterlife, which is a library that is accessible to everyone and is no longer located on Serpentine's lawn.“The Serpentine Pavilion celebrates the London summer—a time to be outdoors, connecting with friends and family in Kensington Gardens. We want to celebrate the tradition of park-going. "On a sunny day, the play of filtered daylight through the translucent facade draws on the memory of being under a Shamiyana at a Bengali wedding. Built from bamboo and decorated cloth, Shamiyanas convene hundreds of guests on any occasion," said Marina Tabassum, Architect, Marina Tabassum Architects. The Serpentine Pavilion offers a unique platform under the summer sun to unite as people rich in diversity. How can we transcend our differences and connect as humans?.""The Serpentine Pavilion offers a place where people of diverse backgrounds, ages and cultures can come together under one roof and call for action, facilitating dialogues that expand our boundaries of tolerance and respect," Tabassum added."We are thrilled to be working with Marina and her team on this year's Pavilion. The project, with its tight timescales and unique engineering challenges, is always particularly rewarding for our team of engineers and project managers," said Jon Leach, Director of AECOM. "Celebrating our thirteenth year on the Pavilion, it is fantastic to work with the Serpentine and the entire team once again to bring this year's design to life," Leach added.In 2024, architect, researcher and educator Marina Tabassum was named as the world's most influential architects in the 2024 TIME100 Next List by TIME Magazine. In 20216, Tabassum was awarded the Aga Khan Award for Architecture with Bait Ur Rouf Mosque, Dhaka, Bangladesh.Founded in 2005 after Tabassum's ten-year partnership with URBANA, Marina Tabassum Architects has created environmentally, politically, and socially concerned architectural designs. MTA carries out research on environmental deterioration in Bangladesh, a country particularly susceptible to the effects of climate change, in addition to buildings situated in Dhaka, the surrounding areas, and other regions of the country.All images © Iwan Baan, courtesy of Serpentine.> via Serpentine Galleries  #marina #tabassum #opens #serpentine #pavilion
    WORLDARCHITECTURE.ORG
    Marina Tabassum opens 2025 Serpentine Pavilion in Kensington Gardens
    html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd" The 2025 Serpentine Pavilion has opened to the public today, on 6 June, in London's Kensington Gardens. Named A Capsule in Time, the pavilion, designed by Bangladeshi architect and educator Marina Tabassum and her firm, Marina Tabassum Architects (MTA), the design discusses the permanent and ephemeral aspects of the commission. The Serpentine Pavilion will be on view in London's Kensington Gardens from June 6th to October 26th, 2025.The pavilion, which runs along the park's north-south axis, has a center court that lines up with Serpentine South's bell tower and an elongated capsule-like shape. The building, which consists of four wooden sculptures with a translucent façade that diffuses and dapples light as it enters the room, was inspired by summer park visitors and arched garden canopies that filter warm daylight through verdant greenery. A kinetic component that allows one of the capsule forms to move, link, and change the Pavilion into a new area is essential to Tabassum's design.Drawing inspiration from the history and architectural heritage of South Asian Shamiyana tents or awnings, Tabassum's design emphasizes the sensory and spiritual possibilities of architecture through scale and the interaction of light and shadow. Made of cloth and held up by bamboo poles, these structures serve a similar dynamic purpose and are frequently set up for outdoor events and festivities. The potential to bring people together through dialogue, networking, live events, and public gatherings is welcomed by Tabassum's Pavilion's openness.In keeping with Dame Zaha Hadid's philosophy of pushing the limits of architecture, Tabassum's Pavilion will commemorate the 25th anniversary of this groundbreaking project.Like many of Tabassum's earlier projects, the Pavilion is built around a semi-mature Ginkgo tree, a climate-resilient tree species that dates back to the early Jurassic Period. It takes into account the threshold between inside and outside, the tactility of material, lightness and darkness, height and volume. The leaves of the Gingko tree will gradually change from green to a brilliant gold-yellow color during the summer and into the fall. The choice of a gingko was motivated by the species' demonstrated climate change resistance and its contribution to Kensington Gardens' varied treescape. After the Pavilion closes in October, the species—which is immune to many modern pests and diseases—will be transplanted in the park.Tabassum elaborates on her idea for the Pavilion to serve as a multipurpose area where guests can congregate and bond via dialogue and information exchange in an age of growing censorship. The books that Tabassum and her colleagues at MTA have put together honor the diversity of Bangladesh, Bengali literature, poetry, ecology, and culture. It is housed on shelves that are integrated into the building and references the Pavilion's afterlife, which is a library that is accessible to everyone and is no longer located on Serpentine's lawn.“The Serpentine Pavilion celebrates the London summer—a time to be outdoors, connecting with friends and family in Kensington Gardens. We want to celebrate the tradition of park-going. "On a sunny day, the play of filtered daylight through the translucent facade draws on the memory of being under a Shamiyana at a Bengali wedding. Built from bamboo and decorated cloth, Shamiyanas convene hundreds of guests on any occasion," said Marina Tabassum, Architect, Marina Tabassum Architects (MTA). The Serpentine Pavilion offers a unique platform under the summer sun to unite as people rich in diversity. How can we transcend our differences and connect as humans?.""The Serpentine Pavilion offers a place where people of diverse backgrounds, ages and cultures can come together under one roof and call for action, facilitating dialogues that expand our boundaries of tolerance and respect," Tabassum added."We are thrilled to be working with Marina and her team on this year's Pavilion. The project, with its tight timescales and unique engineering challenges, is always particularly rewarding for our team of engineers and project managers," said Jon Leach, Director of AECOM. "Celebrating our thirteenth year on the Pavilion, it is fantastic to work with the Serpentine and the entire team once again to bring this year's design to life," Leach added.In 2024, architect, researcher and educator Marina Tabassum was named as the world's most influential architects in the 2024 TIME100 Next List by TIME Magazine. In 20216, Tabassum was awarded the Aga Khan Award for Architecture with Bait Ur Rouf Mosque, Dhaka, Bangladesh.Founded in 2005 after Tabassum's ten-year partnership with URBANA, Marina Tabassum Architects has created environmentally, politically, and socially concerned architectural designs. MTA carries out research on environmental deterioration in Bangladesh, a country particularly susceptible to the effects of climate change, in addition to buildings situated in Dhaka, the surrounding areas, and other regions of the country.All images © Iwan Baan, courtesy of Serpentine.> via Serpentine Galleries 
    Like
    Love
    Wow
    Angry
    Sad
    587
    0 Commentarios 0 Acciones