• Q&A: How anacondas, chickens, and locals may be able to coexist in the Amazon

    A coiled giant anaconda. They are the largest snake species in Brazil and play a major role in legends including the ‘Boiuna’ and the ‘Cobra Grande.’ CREDIT: Beatriz Cosendey.

    Get the Popular Science daily newsletter
    Breakthroughs, discoveries, and DIY tips sent every weekday.

    South America’s lush Amazon region is a biodiversity hotspot, which means that every living thing must find a way to co-exist. Even some of the most feared snakes on the planet–anacondas. In a paper published June 16 in the journal Frontiers in Amphibian and Reptile Science, conservation biologists Beatriz Cosendey and Juarez Carlos Brito Pezzuti from the Federal University of Pará’s Center for Amazonian Studies in Brazil, analyze the key points behind the interactions between humans and the local anaconda populations.
    Ahead of the paper’s publication, the team at Frontiers conducted this wide-ranging Q&A with Conesday. It has not been altered.
    Frontiers: What inspired you to become a researcher?
    Beatriz Cosendey: As a child, I was fascinated by reports and documentaries about field research and often wondered what it took to be there and what kind of knowledge was being produced. Later, as an ecologist, I felt the need for approaches that better connected scientific research with real-world contexts. I became especially interested in perspectives that viewed humans not as separate from nature, but as part of ecological systems. This led me to explore integrative methods that incorporate local and traditional knowledge, aiming to make research more relevant and accessible to the communities involved.
    F: Can you tell us about the research you’re currently working on?
    BC: My research focuses on ethnobiology, an interdisciplinary field intersecting ecology, conservation, and traditional knowledge. We investigate not only the biodiversity of an area but also the relationship local communities have with surrounding species, providing a better understanding of local dynamics and areas needing special attention for conservation. After all, no one knows a place better than those who have lived there for generations. This deep familiarity allows for early detection of changes or environmental shifts. Additionally, developing a collaborative project with residents generates greater engagement, as they recognize themselves as active contributors; and collective participation is essential for effective conservation.
    Local boating the Amazon River. CREDIT: Beatriz Cosendey.
    F: Could you tell us about one of the legends surrounding anacondas?
    BC: One of the greatest myths is about the Great Snake—a huge snake that is said to inhabit the Amazon River and sleep beneath the town. According to the dwellers, the Great Snake is an anaconda that has grown too large; its movements can shake the river’s waters, and its eyes look like fire in the darkness of night. People say anacondas can grow so big that they can swallow large animals—including humans or cattle—without difficulty.
    F: What could be the reasons why the traditional role of anacondas as a spiritual and mythological entity has changed? Do you think the fact that fewer anacondas have been seen in recent years contributes to their diminished importance as an mythological entity?
    BC: Not exactly. I believe the two are related, but not in a direct way. The mythology still exists, but among Aritapera dwellers, there’s a more practical, everyday concern—mainly the fear of losing their chickens. As a result, anacondas have come to be seen as stealthy thieves. These traits are mostly associated with smaller individuals, while the larger ones—which may still carry the symbolic weight of the ‘Great Snake’—tend to retreat to more sheltered areas; because of the presence of houses, motorized boats, and general noise, they are now seen much less frequently.
    A giant anaconda is being measured. Credit: Pedro Calazans.
    F: Can you share some of the quotes you’ve collected in interviews that show the attitude of community members towards anacondas? How do chickens come into play?
    BC: When talking about anacondas, one thing always comes up: chickens. “Chicken is herfavorite dish. If one clucks, she comes,” said one dweller. This kind of remark helps explain why the conflict is often framed in economic terms. During the interviews and conversations with local dwellers, many emphasized the financial impact of losing their animals: “The biggest loss is that they keep taking chicks and chickens…” or “You raise the chicken—you can’t just let it be eaten for free, right?”
    For them, it’s a loss of investment, especially since corn, which is used as chicken feed, is expensive. As one person put it: “We spend time feeding and raising the birds, and then the snake comes and takes them.” One dweller shared that, in an attempt to prevent another loss, he killed the anaconda and removed the last chicken it had swallowed from its belly—”it was still fresh,” he said—and used it for his meal, cooking the chicken for lunch so it wouldn’t go to waste.
    One of the Amazonas communities where the researchers conducted their research. CREDIT: Beatriz Cosendey.
    Some interviewees reported that they had to rebuild their chicken coops and pigsties because too many anacondas were getting in. Participants would point out where the anaconda had entered and explained that they came in through gaps or cracks but couldn’t get out afterwards because they ‘tufavam’ — a local term referring to the snake’s body swelling after ingesting prey.
    We saw chicken coops made with mesh, with nylon, some that worked and some that didn’t. Guided by the locals’ insights, we concluded that the best solution to compensate for the gaps between the wooden slats is to line the coop with a fine nylon mesh, and on the outside, a layer of wire mesh, which protects the inner mesh and prevents the entry of larger animals.
    F: Are there any common misconceptions about this area of research? How would you address them?
    BC: Yes, very much. Although ethnobiology is an old science, it’s still underexplored and often misunderstood. In some fields, there are ongoing debates about the robustness and scientific validity of the field and related areas. This is largely because the findings don’t always rely only on hard statistical data.
    However, like any other scientific field, it follows standardized methodologies, and no result is accepted without proper grounding. What happens is that ethnobiology leans more toward the human sciences, placing human beings and traditional knowledge as key variables within its framework.
    To address these misconceptions, I believe it’s important to emphasize that ethnobiology produces solid and relevant knowledge—especially in the context of conservation and sustainable development. It offers insights that purely biological approaches might overlook and helps build bridges between science and society.
    The study focused on the várzea regions of the Lower Amazon River. CREDIT: Beatriz Cosendey.
    F: What are some of the areas of research you’d like to see tackled in the years ahead?
    BC: I’d like to see more conservation projects that include local communities as active participants rather than as passive observers. Incorporating their voices, perspectives, and needs not only makes initiatives more effective, but also more just. There is also great potential in recognizing and valuing traditional knowledge. Beyond its cultural significance, certain practices—such as the use of natural compounds—could become practical assets for other vulnerable regions. Once properly documented and understood, many of these approaches offer adaptable forms of environmental management and could help inform broader conservation strategies elsewhere.
    F: How has open science benefited the reach and impact of your research?
    BC: Open science is crucial for making research more accessible. By eliminating access barriers, it facilitates a broader exchange of knowledge—important especially for interdisciplinary research like mine which draws on multiple knowledge systems and gains value when shared widely. For scientific work, it ensures that knowledge reaches a wider audience, including practitioners and policymakers. This openness fosters dialogue across different sectors, making research more inclusive and encouraging greater collaboration among diverse groups.
    The Q&A can also be read here.
    #qampampa #how #anacondas #chickens #locals
    Q&A: How anacondas, chickens, and locals may be able to coexist in the Amazon
    A coiled giant anaconda. They are the largest snake species in Brazil and play a major role in legends including the ‘Boiuna’ and the ‘Cobra Grande.’ CREDIT: Beatriz Cosendey. Get the Popular Science daily newsletter💡 Breakthroughs, discoveries, and DIY tips sent every weekday. South America’s lush Amazon region is a biodiversity hotspot, which means that every living thing must find a way to co-exist. Even some of the most feared snakes on the planet–anacondas. In a paper published June 16 in the journal Frontiers in Amphibian and Reptile Science, conservation biologists Beatriz Cosendey and Juarez Carlos Brito Pezzuti from the Federal University of Pará’s Center for Amazonian Studies in Brazil, analyze the key points behind the interactions between humans and the local anaconda populations. Ahead of the paper’s publication, the team at Frontiers conducted this wide-ranging Q&A with Conesday. It has not been altered. Frontiers: What inspired you to become a researcher? Beatriz Cosendey: As a child, I was fascinated by reports and documentaries about field research and often wondered what it took to be there and what kind of knowledge was being produced. Later, as an ecologist, I felt the need for approaches that better connected scientific research with real-world contexts. I became especially interested in perspectives that viewed humans not as separate from nature, but as part of ecological systems. This led me to explore integrative methods that incorporate local and traditional knowledge, aiming to make research more relevant and accessible to the communities involved. F: Can you tell us about the research you’re currently working on? BC: My research focuses on ethnobiology, an interdisciplinary field intersecting ecology, conservation, and traditional knowledge. We investigate not only the biodiversity of an area but also the relationship local communities have with surrounding species, providing a better understanding of local dynamics and areas needing special attention for conservation. After all, no one knows a place better than those who have lived there for generations. This deep familiarity allows for early detection of changes or environmental shifts. Additionally, developing a collaborative project with residents generates greater engagement, as they recognize themselves as active contributors; and collective participation is essential for effective conservation. Local boating the Amazon River. CREDIT: Beatriz Cosendey. F: Could you tell us about one of the legends surrounding anacondas? BC: One of the greatest myths is about the Great Snake—a huge snake that is said to inhabit the Amazon River and sleep beneath the town. According to the dwellers, the Great Snake is an anaconda that has grown too large; its movements can shake the river’s waters, and its eyes look like fire in the darkness of night. People say anacondas can grow so big that they can swallow large animals—including humans or cattle—without difficulty. F: What could be the reasons why the traditional role of anacondas as a spiritual and mythological entity has changed? Do you think the fact that fewer anacondas have been seen in recent years contributes to their diminished importance as an mythological entity? BC: Not exactly. I believe the two are related, but not in a direct way. The mythology still exists, but among Aritapera dwellers, there’s a more practical, everyday concern—mainly the fear of losing their chickens. As a result, anacondas have come to be seen as stealthy thieves. These traits are mostly associated with smaller individuals, while the larger ones—which may still carry the symbolic weight of the ‘Great Snake’—tend to retreat to more sheltered areas; because of the presence of houses, motorized boats, and general noise, they are now seen much less frequently. A giant anaconda is being measured. Credit: Pedro Calazans. F: Can you share some of the quotes you’ve collected in interviews that show the attitude of community members towards anacondas? How do chickens come into play? BC: When talking about anacondas, one thing always comes up: chickens. “Chicken is herfavorite dish. If one clucks, she comes,” said one dweller. This kind of remark helps explain why the conflict is often framed in economic terms. During the interviews and conversations with local dwellers, many emphasized the financial impact of losing their animals: “The biggest loss is that they keep taking chicks and chickens…” or “You raise the chicken—you can’t just let it be eaten for free, right?” For them, it’s a loss of investment, especially since corn, which is used as chicken feed, is expensive. As one person put it: “We spend time feeding and raising the birds, and then the snake comes and takes them.” One dweller shared that, in an attempt to prevent another loss, he killed the anaconda and removed the last chicken it had swallowed from its belly—”it was still fresh,” he said—and used it for his meal, cooking the chicken for lunch so it wouldn’t go to waste. One of the Amazonas communities where the researchers conducted their research. CREDIT: Beatriz Cosendey. Some interviewees reported that they had to rebuild their chicken coops and pigsties because too many anacondas were getting in. Participants would point out where the anaconda had entered and explained that they came in through gaps or cracks but couldn’t get out afterwards because they ‘tufavam’ — a local term referring to the snake’s body swelling after ingesting prey. We saw chicken coops made with mesh, with nylon, some that worked and some that didn’t. Guided by the locals’ insights, we concluded that the best solution to compensate for the gaps between the wooden slats is to line the coop with a fine nylon mesh, and on the outside, a layer of wire mesh, which protects the inner mesh and prevents the entry of larger animals. F: Are there any common misconceptions about this area of research? How would you address them? BC: Yes, very much. Although ethnobiology is an old science, it’s still underexplored and often misunderstood. In some fields, there are ongoing debates about the robustness and scientific validity of the field and related areas. This is largely because the findings don’t always rely only on hard statistical data. However, like any other scientific field, it follows standardized methodologies, and no result is accepted without proper grounding. What happens is that ethnobiology leans more toward the human sciences, placing human beings and traditional knowledge as key variables within its framework. To address these misconceptions, I believe it’s important to emphasize that ethnobiology produces solid and relevant knowledge—especially in the context of conservation and sustainable development. It offers insights that purely biological approaches might overlook and helps build bridges between science and society. The study focused on the várzea regions of the Lower Amazon River. CREDIT: Beatriz Cosendey. F: What are some of the areas of research you’d like to see tackled in the years ahead? BC: I’d like to see more conservation projects that include local communities as active participants rather than as passive observers. Incorporating their voices, perspectives, and needs not only makes initiatives more effective, but also more just. There is also great potential in recognizing and valuing traditional knowledge. Beyond its cultural significance, certain practices—such as the use of natural compounds—could become practical assets for other vulnerable regions. Once properly documented and understood, many of these approaches offer adaptable forms of environmental management and could help inform broader conservation strategies elsewhere. F: How has open science benefited the reach and impact of your research? BC: Open science is crucial for making research more accessible. By eliminating access barriers, it facilitates a broader exchange of knowledge—important especially for interdisciplinary research like mine which draws on multiple knowledge systems and gains value when shared widely. For scientific work, it ensures that knowledge reaches a wider audience, including practitioners and policymakers. This openness fosters dialogue across different sectors, making research more inclusive and encouraging greater collaboration among diverse groups. The Q&A can also be read here. #qampampa #how #anacondas #chickens #locals
    WWW.POPSCI.COM
    Q&A: How anacondas, chickens, and locals may be able to coexist in the Amazon
    A coiled giant anaconda. They are the largest snake species in Brazil and play a major role in legends including the ‘Boiuna’ and the ‘Cobra Grande.’ CREDIT: Beatriz Cosendey. Get the Popular Science daily newsletter💡 Breakthroughs, discoveries, and DIY tips sent every weekday. South America’s lush Amazon region is a biodiversity hotspot, which means that every living thing must find a way to co-exist. Even some of the most feared snakes on the planet–anacondas. In a paper published June 16 in the journal Frontiers in Amphibian and Reptile Science, conservation biologists Beatriz Cosendey and Juarez Carlos Brito Pezzuti from the Federal University of Pará’s Center for Amazonian Studies in Brazil, analyze the key points behind the interactions between humans and the local anaconda populations. Ahead of the paper’s publication, the team at Frontiers conducted this wide-ranging Q&A with Conesday. It has not been altered. Frontiers: What inspired you to become a researcher? Beatriz Cosendey: As a child, I was fascinated by reports and documentaries about field research and often wondered what it took to be there and what kind of knowledge was being produced. Later, as an ecologist, I felt the need for approaches that better connected scientific research with real-world contexts. I became especially interested in perspectives that viewed humans not as separate from nature, but as part of ecological systems. This led me to explore integrative methods that incorporate local and traditional knowledge, aiming to make research more relevant and accessible to the communities involved. F: Can you tell us about the research you’re currently working on? BC: My research focuses on ethnobiology, an interdisciplinary field intersecting ecology, conservation, and traditional knowledge. We investigate not only the biodiversity of an area but also the relationship local communities have with surrounding species, providing a better understanding of local dynamics and areas needing special attention for conservation. After all, no one knows a place better than those who have lived there for generations. This deep familiarity allows for early detection of changes or environmental shifts. Additionally, developing a collaborative project with residents generates greater engagement, as they recognize themselves as active contributors; and collective participation is essential for effective conservation. Local boating the Amazon River. CREDIT: Beatriz Cosendey. F: Could you tell us about one of the legends surrounding anacondas? BC: One of the greatest myths is about the Great Snake—a huge snake that is said to inhabit the Amazon River and sleep beneath the town. According to the dwellers, the Great Snake is an anaconda that has grown too large; its movements can shake the river’s waters, and its eyes look like fire in the darkness of night. People say anacondas can grow so big that they can swallow large animals—including humans or cattle—without difficulty. F: What could be the reasons why the traditional role of anacondas as a spiritual and mythological entity has changed? Do you think the fact that fewer anacondas have been seen in recent years contributes to their diminished importance as an mythological entity? BC: Not exactly. I believe the two are related, but not in a direct way. The mythology still exists, but among Aritapera dwellers, there’s a more practical, everyday concern—mainly the fear of losing their chickens. As a result, anacondas have come to be seen as stealthy thieves. These traits are mostly associated with smaller individuals (up to around 2–2.5 meters), while the larger ones—which may still carry the symbolic weight of the ‘Great Snake’—tend to retreat to more sheltered areas; because of the presence of houses, motorized boats, and general noise, they are now seen much less frequently. A giant anaconda is being measured. Credit: Pedro Calazans. F: Can you share some of the quotes you’ve collected in interviews that show the attitude of community members towards anacondas? How do chickens come into play? BC: When talking about anacondas, one thing always comes up: chickens. “Chicken is her [the anaconda’s] favorite dish. If one clucks, she comes,” said one dweller. This kind of remark helps explain why the conflict is often framed in economic terms. During the interviews and conversations with local dwellers, many emphasized the financial impact of losing their animals: “The biggest loss is that they keep taking chicks and chickens…” or “You raise the chicken—you can’t just let it be eaten for free, right?” For them, it’s a loss of investment, especially since corn, which is used as chicken feed, is expensive. As one person put it: “We spend time feeding and raising the birds, and then the snake comes and takes them.” One dweller shared that, in an attempt to prevent another loss, he killed the anaconda and removed the last chicken it had swallowed from its belly—”it was still fresh,” he said—and used it for his meal, cooking the chicken for lunch so it wouldn’t go to waste. One of the Amazonas communities where the researchers conducted their research. CREDIT: Beatriz Cosendey. Some interviewees reported that they had to rebuild their chicken coops and pigsties because too many anacondas were getting in. Participants would point out where the anaconda had entered and explained that they came in through gaps or cracks but couldn’t get out afterwards because they ‘tufavam’ — a local term referring to the snake’s body swelling after ingesting prey. We saw chicken coops made with mesh, with nylon, some that worked and some that didn’t. Guided by the locals’ insights, we concluded that the best solution to compensate for the gaps between the wooden slats is to line the coop with a fine nylon mesh (to block smaller animals), and on the outside, a layer of wire mesh, which protects the inner mesh and prevents the entry of larger animals. F: Are there any common misconceptions about this area of research? How would you address them? BC: Yes, very much. Although ethnobiology is an old science, it’s still underexplored and often misunderstood. In some fields, there are ongoing debates about the robustness and scientific validity of the field and related areas. This is largely because the findings don’t always rely only on hard statistical data. However, like any other scientific field, it follows standardized methodologies, and no result is accepted without proper grounding. What happens is that ethnobiology leans more toward the human sciences, placing human beings and traditional knowledge as key variables within its framework. To address these misconceptions, I believe it’s important to emphasize that ethnobiology produces solid and relevant knowledge—especially in the context of conservation and sustainable development. It offers insights that purely biological approaches might overlook and helps build bridges between science and society. The study focused on the várzea regions of the Lower Amazon River. CREDIT: Beatriz Cosendey. F: What are some of the areas of research you’d like to see tackled in the years ahead? BC: I’d like to see more conservation projects that include local communities as active participants rather than as passive observers. Incorporating their voices, perspectives, and needs not only makes initiatives more effective, but also more just. There is also great potential in recognizing and valuing traditional knowledge. Beyond its cultural significance, certain practices—such as the use of natural compounds—could become practical assets for other vulnerable regions. Once properly documented and understood, many of these approaches offer adaptable forms of environmental management and could help inform broader conservation strategies elsewhere. F: How has open science benefited the reach and impact of your research? BC: Open science is crucial for making research more accessible. By eliminating access barriers, it facilitates a broader exchange of knowledge—important especially for interdisciplinary research like mine which draws on multiple knowledge systems and gains value when shared widely. For scientific work, it ensures that knowledge reaches a wider audience, including practitioners and policymakers. This openness fosters dialogue across different sectors, making research more inclusive and encouraging greater collaboration among diverse groups. The Q&A can also be read here.
    Like
    Love
    Wow
    Sad
    Angry
    443
    2 Comentários 0 Compartilhamentos
  • This paint ‘sweats’ to keep your house cool

    News

    Climate

    This paint ‘sweats’ to keep your house cool

    A new cement-based paint cools buildings by combining sunlight reflection and water evaporation

    A new cooling paint reflects sunlight and mimics sweat to reduce air-conditioning use.

    Marie LaFauci/Getty Images

    By Larissa G. Capella
    June 13, 2025 at 11:00 am

    A cool house without air conditioning may soon be possible.
    Scientists in Singapore have developed a new type of paint that reflects sunlight and cools surfaces by slowly evaporating water. Unlike other commercially available cooling paints, which are designed to repel water to protect the underlying material, the new one even works in hot, humid places, offering a low-energy way to stay cool, researchers report June 5 in Science.
    “The key is passive cooling,” which requires no energy input, says material scientist Li Hong In other words, it works without using electricity or mechanical systems. Right now, radiative cooling is the most common type of passive cooling used in materials, including certain paints. It works by reflecting sunlight and radiating heat from a surface such as walls or roofs, into the sky. But in humid places like Singapore, water vapor in the air traps heat near the surface, which prevents it from escaping into the atmosphere and keeps the surfaces warm.
    In response, Hong and two other material scientists from Nanyang Technological University developed a cement-based paint that combines three cooling strategies: radiative cooling, evaporative cooling, which our skin uses, and solar reflection. In the study, the scientists painted three small houses: one with regular white paint, one with commercial cooling paint that uses only radiative cooling and one with their new formula. After two years of sun and rain in Singapore, the first two paints had turned yellow. But “our paint was still white,” says coauthor Jipeng Fei. Unlike other colors, white helps materials maintain their high reflectivity and cooling performance.

    Sign up for our newsletter

    We summarize the week's scientific breakthroughs every Thursday.
    #this #paint #sweats #keep #your
    This paint ‘sweats’ to keep your house cool
    News Climate This paint ‘sweats’ to keep your house cool A new cement-based paint cools buildings by combining sunlight reflection and water evaporation A new cooling paint reflects sunlight and mimics sweat to reduce air-conditioning use. Marie LaFauci/Getty Images By Larissa G. Capella June 13, 2025 at 11:00 am A cool house without air conditioning may soon be possible. Scientists in Singapore have developed a new type of paint that reflects sunlight and cools surfaces by slowly evaporating water. Unlike other commercially available cooling paints, which are designed to repel water to protect the underlying material, the new one even works in hot, humid places, offering a low-energy way to stay cool, researchers report June 5 in Science. “The key is passive cooling,” which requires no energy input, says material scientist Li Hong In other words, it works without using electricity or mechanical systems. Right now, radiative cooling is the most common type of passive cooling used in materials, including certain paints. It works by reflecting sunlight and radiating heat from a surface such as walls or roofs, into the sky. But in humid places like Singapore, water vapor in the air traps heat near the surface, which prevents it from escaping into the atmosphere and keeps the surfaces warm. In response, Hong and two other material scientists from Nanyang Technological University developed a cement-based paint that combines three cooling strategies: radiative cooling, evaporative cooling, which our skin uses, and solar reflection. In the study, the scientists painted three small houses: one with regular white paint, one with commercial cooling paint that uses only radiative cooling and one with their new formula. After two years of sun and rain in Singapore, the first two paints had turned yellow. But “our paint was still white,” says coauthor Jipeng Fei. Unlike other colors, white helps materials maintain their high reflectivity and cooling performance. Sign up for our newsletter We summarize the week's scientific breakthroughs every Thursday. #this #paint #sweats #keep #your
    WWW.SCIENCENEWS.ORG
    This paint ‘sweats’ to keep your house cool
    News Climate This paint ‘sweats’ to keep your house cool A new cement-based paint cools buildings by combining sunlight reflection and water evaporation A new cooling paint reflects sunlight and mimics sweat to reduce air-conditioning use. Marie LaFauci/Getty Images By Larissa G. Capella June 13, 2025 at 11:00 am A cool house without air conditioning may soon be possible. Scientists in Singapore have developed a new type of paint that reflects sunlight and cools surfaces by slowly evaporating water. Unlike other commercially available cooling paints, which are designed to repel water to protect the underlying material, the new one even works in hot, humid places, offering a low-energy way to stay cool, researchers report June 5 in Science. “The key is passive cooling,” which requires no energy input, says material scientist Li Hong In other words, it works without using electricity or mechanical systems. Right now, radiative cooling is the most common type of passive cooling used in materials, including certain paints. It works by reflecting sunlight and radiating heat from a surface such as walls or roofs, into the sky. But in humid places like Singapore, water vapor in the air traps heat near the surface, which prevents it from escaping into the atmosphere and keeps the surfaces warm. In response, Hong and two other material scientists from Nanyang Technological University developed a cement-based paint that combines three cooling strategies: radiative cooling, evaporative cooling, which our skin uses, and solar reflection. In the study, the scientists painted three small houses: one with regular white paint, one with commercial cooling paint that uses only radiative cooling and one with their new formula. After two years of sun and rain in Singapore, the first two paints had turned yellow. But “our paint was still white,” says coauthor Jipeng Fei. Unlike other colors, white helps materials maintain their high reflectivity and cooling performance. Sign up for our newsletter We summarize the week's scientific breakthroughs every Thursday.
    0 Comentários 0 Compartilhamentos
  • Is the Newly Revealed Xbox Handheld a Switch 2 Killer?

    Home Is the Newly Revealed Xbox Handheld a Switch 2 Killer?

    News

    Is the Newly Revealed Xbox Handheld a Switch 2 Killer?

    6 min read

    Published: June 14, 2025

    Key Takeaways

    Xbox has announced two new handheld gaming devices in partnership with Asus: the ROG Xbox Ally and ROG Xbox Ally X.
    They’re expected to compete with Nintendo’s Switch 2, which has sold 3.5M units in just 4 days of its launch.
    Xbox aims to bring a wide range of game titles to portable handheld devices in order to cater to the gaming PC market.

    Xbox has entered the handheld gaming market with two new launches: the ROG Xbox Ally and ROG Xbox Ally X in partnership with ASUS.
    Interestingly, Nintendo released its Switch 2 just last week. The public has received it with much enthusiasm, seeing as it’s already sold around 3.5M units in the first four days of its release.
    Needless to say, Xbox and Nintendo will be direct competitors in the handheld segment now. We looked at the spec sheets and customer reviews, and both handheld gaming devices seem to have different target audiences.
    Let’s unpack them in detail.
    Memory and Storage
    The ROG Xbox Ally comes in standard white color and features the AMD Ryzen Z2 A Processor with 16GB of memory and 512GB of storage, with a 60Wh battery. The Ally X, on the other hand, comes in striking black with the AMD Ryzen AI Z2 Extreme Processor, 24 GB of memory, and 1 TB of storage, and a 80Wh battery.

    Source: Rog Ally Life
    Right off the bat, we believe that Microsoft has done a good job with the storage and processors. In comparison, the Nintendo Switch 2 has 12GB of memory with just 256GB of internal storage. On paper, the Xbox series looks to have an advantage over the Switch 2, which uses a custom NVIDIA T239 chipset for raw power.

    Nvidia’s DLSS, however, gives Switch 2 an advantage over Xbox’s AMD Ryzen processors. DLSS can render games at lower resolutions and, therefore, achieve higher in-use frame rates, which boosts its overall performance.
    Simply put, despite the gap in on-paper specifications, the Switch 2 may render comparable performance to the Xbox Ally. Take this with a pinch of salt, though, because we’ll only be able to confirm this once we get our hands on the new Xbox handhelds.
    Display
    Both the Xbox handhelds feature a 7-inch Full HDscreen with a 120 Hz refresh rate. In comparison, the Switch 2 screen is bigger, with a 7.9-inch display, also rendering at 120 Hz. However, Switch 2 also features HDR10, giving it a significant edge over Xbox Ally.

    HDR10 ensures a much wider range of brightness levels and a broader spectrum of colors, so the display looks more vibrant and lifelike. Plus, you’ll see more detailed blacks and whites on the screen with better realism and depth, enhancing your overall gaming experience.
    The Switch 2 also features VRR technology, which prevents screen tearing and reduces stutter. Notably, the Xbox Ally range has its own version of the VRR, FreeSync Premium. So, truth be told, you might not experience much of a difference in that area. However, HDR10 can definitely prove to be a winner for Switch 2.
    Product Market Fit
    While both the Switch 2 and new Xbox handhelds are apparently the same genre of products, Microsoft and Nintendo seem to have different target markets in their minds.
    Microsoft is focusing more on the Windows handheld market, targeting players who want an on-the-go PC gaming experience. With access to Game Pass and titles from Steam and Epic Games, the Xbox Ally offers a more comprehensive library of games.
    Nintendo, on the other hand, looks to build on the legacy of the OG Nintendo Switch, which has sold 152M units since its launch in 2017. It aims to tap in on the Nintendo fan base with original titles such as Mario and an improved gaming experience.
    Also, Xbox is in direct competition with Valve’s Steam Deck. Both are essentially handheld PCs with wide access to PC-compatible aggregated game libraries on the go.
    Xbox is also introducing the ‘Xbox Experience for Handheld’ feature for its new Ally range, which will make Windows 11 more compatible and optimized for its handheld device – something similar to Valve’s SteamOS on the Steam Deck.
    Xbox Exploring a New Market Segment
    The global mobile and handheld gaming market is expected to expand at a rate of 13.8% CAGR till 2034. It may reach a market value of B. 
    Valve’s Steam Deck managed to sell around 3.7M units by the end of 2024. On the other hand, Windows-based devices like the ASUS ROG Ally, Lenovo Legion Go, and MSI Claw have sold ~5.9M units so far as per early 2025 reports. This shows there’s certainly demand for Windows-based handheld gaming devices. 
    Plus, Xbox’s partnership with ASUS could bring along a brand-value advantage for the product. With a seamless Windows 11 experience on an on-the-go device, these sales figures are expected to swell once the Xbox Ally hits the shelves.
    However, pricing will be a key determinant. The Switch 2 currently sells at – or with the Mario Kart bundle. The Steam Deck starts at and goes up to This means that the price range according to the current market demand is around -Anything more than that may result in market adoption issues.
    The original ASUS ROG Ally is currently priced at There’s little doubt, however, that Xbox would add a premium to this price. So, we’re expecting the price of the ROG Xbox Ally to be around while the ROG Xbox Ally X may cost more than This means that Xbox will be participating in the premium handheld gaming sector, which is something Nintendo and Steam do not cater to.
    Let’s wait for confirmation regarding the pricing and the launch date. Remember, this was only a feature comparison of the two products, and we’re yet to test them out for a detailed hands-on gaming experience comparison. Stick around for that.

    Krishi is a seasoned tech journalist with over four years of experience writing about PC hardware, consumer technology, and artificial intelligence.  Clarity and accessibility are at the core of Krishi’s writing style.
    He believes technology writing should empower readers—not confuse them—and he’s committed to ensuring his content is always easy to understand without sacrificing accuracy or depth.
    Over the years, Krishi has contributed to some of the most reputable names in the industry, including Techopedia, TechRadar, and Tom’s Guide. A man of many talents, Krishi has also proven his mettle as a crypto writer, tackling complex topics with both ease and zeal. His work spans various formats—from in-depth explainers and news coverage to feature pieces and buying guides. 
    Behind the scenes, Krishi operates from a dual-monitor setupthat’s always buzzing with news feeds, technical documentation, and research notes, as well as the occasional gaming sessions that keep him fresh. 
    Krishi thrives on staying current, always ready to dive into the latest announcements, industry shifts, and their far-reaching impacts.  When he's not deep into research on the latest PC hardware news, Krishi would love to chat with you about day trading and the financial markets—oh! And cricket, as well.

    View all articles by Krishi Chowdhary

    Our editorial process

    The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.

    More from News

    View all

    View all
    #newly #revealed #xbox #handheld #switch
    Is the Newly Revealed Xbox Handheld a Switch 2 Killer?
    Home Is the Newly Revealed Xbox Handheld a Switch 2 Killer? News Is the Newly Revealed Xbox Handheld a Switch 2 Killer? 6 min read Published: June 14, 2025 Key Takeaways Xbox has announced two new handheld gaming devices in partnership with Asus: the ROG Xbox Ally and ROG Xbox Ally X. They’re expected to compete with Nintendo’s Switch 2, which has sold 3.5M units in just 4 days of its launch. Xbox aims to bring a wide range of game titles to portable handheld devices in order to cater to the gaming PC market. Xbox has entered the handheld gaming market with two new launches: the ROG Xbox Ally and ROG Xbox Ally X in partnership with ASUS. Interestingly, Nintendo released its Switch 2 just last week. The public has received it with much enthusiasm, seeing as it’s already sold around 3.5M units in the first four days of its release. Needless to say, Xbox and Nintendo will be direct competitors in the handheld segment now. We looked at the spec sheets and customer reviews, and both handheld gaming devices seem to have different target audiences. Let’s unpack them in detail. Memory and Storage The ROG Xbox Ally comes in standard white color and features the AMD Ryzen Z2 A Processor with 16GB of memory and 512GB of storage, with a 60Wh battery. The Ally X, on the other hand, comes in striking black with the AMD Ryzen AI Z2 Extreme Processor, 24 GB of memory, and 1 TB of storage, and a 80Wh battery. Source: Rog Ally Life Right off the bat, we believe that Microsoft has done a good job with the storage and processors. In comparison, the Nintendo Switch 2 has 12GB of memory with just 256GB of internal storage. On paper, the Xbox series looks to have an advantage over the Switch 2, which uses a custom NVIDIA T239 chipset for raw power. Nvidia’s DLSS, however, gives Switch 2 an advantage over Xbox’s AMD Ryzen processors. DLSS can render games at lower resolutions and, therefore, achieve higher in-use frame rates, which boosts its overall performance. Simply put, despite the gap in on-paper specifications, the Switch 2 may render comparable performance to the Xbox Ally. Take this with a pinch of salt, though, because we’ll only be able to confirm this once we get our hands on the new Xbox handhelds. Display Both the Xbox handhelds feature a 7-inch Full HDscreen with a 120 Hz refresh rate. In comparison, the Switch 2 screen is bigger, with a 7.9-inch display, also rendering at 120 Hz. However, Switch 2 also features HDR10, giving it a significant edge over Xbox Ally. HDR10 ensures a much wider range of brightness levels and a broader spectrum of colors, so the display looks more vibrant and lifelike. Plus, you’ll see more detailed blacks and whites on the screen with better realism and depth, enhancing your overall gaming experience. The Switch 2 also features VRR technology, which prevents screen tearing and reduces stutter. Notably, the Xbox Ally range has its own version of the VRR, FreeSync Premium. So, truth be told, you might not experience much of a difference in that area. However, HDR10 can definitely prove to be a winner for Switch 2. Product Market Fit While both the Switch 2 and new Xbox handhelds are apparently the same genre of products, Microsoft and Nintendo seem to have different target markets in their minds. Microsoft is focusing more on the Windows handheld market, targeting players who want an on-the-go PC gaming experience. With access to Game Pass and titles from Steam and Epic Games, the Xbox Ally offers a more comprehensive library of games. Nintendo, on the other hand, looks to build on the legacy of the OG Nintendo Switch, which has sold 152M units since its launch in 2017. It aims to tap in on the Nintendo fan base with original titles such as Mario and an improved gaming experience. Also, Xbox is in direct competition with Valve’s Steam Deck. Both are essentially handheld PCs with wide access to PC-compatible aggregated game libraries on the go. Xbox is also introducing the ‘Xbox Experience for Handheld’ feature for its new Ally range, which will make Windows 11 more compatible and optimized for its handheld device – something similar to Valve’s SteamOS on the Steam Deck. Xbox Exploring a New Market Segment The global mobile and handheld gaming market is expected to expand at a rate of 13.8% CAGR till 2034. It may reach a market value of B.  Valve’s Steam Deck managed to sell around 3.7M units by the end of 2024. On the other hand, Windows-based devices like the ASUS ROG Ally, Lenovo Legion Go, and MSI Claw have sold ~5.9M units so far as per early 2025 reports. This shows there’s certainly demand for Windows-based handheld gaming devices.  Plus, Xbox’s partnership with ASUS could bring along a brand-value advantage for the product. With a seamless Windows 11 experience on an on-the-go device, these sales figures are expected to swell once the Xbox Ally hits the shelves. However, pricing will be a key determinant. The Switch 2 currently sells at – or with the Mario Kart bundle. The Steam Deck starts at and goes up to This means that the price range according to the current market demand is around -Anything more than that may result in market adoption issues. The original ASUS ROG Ally is currently priced at There’s little doubt, however, that Xbox would add a premium to this price. So, we’re expecting the price of the ROG Xbox Ally to be around while the ROG Xbox Ally X may cost more than This means that Xbox will be participating in the premium handheld gaming sector, which is something Nintendo and Steam do not cater to. Let’s wait for confirmation regarding the pricing and the launch date. Remember, this was only a feature comparison of the two products, and we’re yet to test them out for a detailed hands-on gaming experience comparison. Stick around for that. Krishi is a seasoned tech journalist with over four years of experience writing about PC hardware, consumer technology, and artificial intelligence.  Clarity and accessibility are at the core of Krishi’s writing style. He believes technology writing should empower readers—not confuse them—and he’s committed to ensuring his content is always easy to understand without sacrificing accuracy or depth. Over the years, Krishi has contributed to some of the most reputable names in the industry, including Techopedia, TechRadar, and Tom’s Guide. A man of many talents, Krishi has also proven his mettle as a crypto writer, tackling complex topics with both ease and zeal. His work spans various formats—from in-depth explainers and news coverage to feature pieces and buying guides.  Behind the scenes, Krishi operates from a dual-monitor setupthat’s always buzzing with news feeds, technical documentation, and research notes, as well as the occasional gaming sessions that keep him fresh.  Krishi thrives on staying current, always ready to dive into the latest announcements, industry shifts, and their far-reaching impacts.  When he's not deep into research on the latest PC hardware news, Krishi would love to chat with you about day trading and the financial markets—oh! And cricket, as well. View all articles by Krishi Chowdhary Our editorial process The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors. More from News View all View all #newly #revealed #xbox #handheld #switch
    TECHREPORT.COM
    Is the Newly Revealed Xbox Handheld a Switch 2 Killer?
    Home Is the Newly Revealed Xbox Handheld a Switch 2 Killer? News Is the Newly Revealed Xbox Handheld a Switch 2 Killer? 6 min read Published: June 14, 2025 Key Takeaways Xbox has announced two new handheld gaming devices in partnership with Asus: the ROG Xbox Ally and ROG Xbox Ally X. They’re expected to compete with Nintendo’s Switch 2, which has sold 3.5M units in just 4 days of its launch. Xbox aims to bring a wide range of game titles to portable handheld devices in order to cater to the gaming PC market. Xbox has entered the handheld gaming market with two new launches: the ROG Xbox Ally and ROG Xbox Ally X in partnership with ASUS. Interestingly, Nintendo released its Switch 2 just last week. The public has received it with much enthusiasm, seeing as it’s already sold around 3.5M units in the first four days of its release. Needless to say, Xbox and Nintendo will be direct competitors in the handheld segment now. We looked at the spec sheets and customer reviews, and both handheld gaming devices seem to have different target audiences. Let’s unpack them in detail. Memory and Storage The ROG Xbox Ally comes in standard white color and features the AMD Ryzen Z2 A Processor with 16GB of memory and 512GB of storage, with a 60Wh battery. The Ally X, on the other hand, comes in striking black with the AMD Ryzen AI Z2 Extreme Processor, 24 GB of memory, and 1 TB of storage, and a 80Wh battery. Source: Rog Ally Life Right off the bat, we believe that Microsoft has done a good job with the storage and processors. In comparison, the Nintendo Switch 2 has 12GB of memory with just 256GB of internal storage. On paper, the Xbox series looks to have an advantage over the Switch 2, which uses a custom NVIDIA T239 chipset for raw power. Nvidia’s DLSS (Deep Learning Super-Sampling), however, gives Switch 2 an advantage over Xbox’s AMD Ryzen processors. DLSS can render games at lower resolutions and, therefore, achieve higher in-use frame rates, which boosts its overall performance. Simply put, despite the gap in on-paper specifications, the Switch 2 may render comparable performance to the Xbox Ally. Take this with a pinch of salt, though, because we’ll only be able to confirm this once we get our hands on the new Xbox handhelds. Display Both the Xbox handhelds feature a 7-inch Full HD (FHD) screen with a 120 Hz refresh rate. In comparison, the Switch 2 screen is bigger, with a 7.9-inch display, also rendering at 120 Hz. However, Switch 2 also features HDR10, giving it a significant edge over Xbox Ally. HDR10 ensures a much wider range of brightness levels and a broader spectrum of colors, so the display looks more vibrant and lifelike. Plus, you’ll see more detailed blacks and whites on the screen with better realism and depth, enhancing your overall gaming experience. The Switch 2 also features VRR technology, which prevents screen tearing and reduces stutter. Notably, the Xbox Ally range has its own version of the VRR, FreeSync Premium. So, truth be told, you might not experience much of a difference in that area. However, HDR10 can definitely prove to be a winner for Switch 2. Product Market Fit While both the Switch 2 and new Xbox handhelds are apparently the same genre of products, Microsoft and Nintendo seem to have different target markets in their minds. Microsoft is focusing more on the Windows handheld market, targeting players who want an on-the-go PC gaming experience. With access to Game Pass and titles from Steam and Epic Games, the Xbox Ally offers a more comprehensive library of games. Nintendo, on the other hand, looks to build on the legacy of the OG Nintendo Switch, which has sold 152M units since its launch in 2017. It aims to tap in on the Nintendo fan base with original titles such as Mario and an improved gaming experience. Also, Xbox is in direct competition with Valve’s Steam Deck. Both are essentially handheld PCs with wide access to PC-compatible aggregated game libraries on the go. Xbox is also introducing the ‘Xbox Experience for Handheld’ feature for its new Ally range, which will make Windows 11 more compatible and optimized for its handheld device – something similar to Valve’s SteamOS on the Steam Deck. Xbox Exploring a New Market Segment The global mobile and handheld gaming market is expected to expand at a rate of 13.8% CAGR till 2034. It may reach a market value of $35.189B.  Valve’s Steam Deck managed to sell around 3.7M units by the end of 2024. On the other hand, Windows-based devices like the ASUS ROG Ally, Lenovo Legion Go, and MSI Claw have sold ~5.9M units so far as per early 2025 reports. This shows there’s certainly demand for Windows-based handheld gaming devices.  Plus, Xbox’s partnership with ASUS could bring along a brand-value advantage for the product. With a seamless Windows 11 experience on an on-the-go device, these sales figures are expected to swell once the Xbox Ally hits the shelves. However, pricing will be a key determinant. The Switch 2 currently sells at $449.99 – or $499.99 with the Mario Kart bundle. The Steam Deck starts at $399.00 and goes up to $649. This means that the price range according to the current market demand is around $400-$600. Anything more than that may result in market adoption issues. The original ASUS ROG Ally is currently priced at $499. There’s little doubt, however, that Xbox would add a premium to this price. So, we’re expecting the price of the ROG Xbox Ally to be around $600, while the ROG Xbox Ally X may cost more than $700. This means that Xbox will be participating in the premium handheld gaming sector, which is something Nintendo and Steam do not cater to. Let’s wait for confirmation regarding the pricing and the launch date. Remember, this was only a feature comparison of the two products, and we’re yet to test them out for a detailed hands-on gaming experience comparison. Stick around for that. Krishi is a seasoned tech journalist with over four years of experience writing about PC hardware, consumer technology, and artificial intelligence.  Clarity and accessibility are at the core of Krishi’s writing style. He believes technology writing should empower readers—not confuse them—and he’s committed to ensuring his content is always easy to understand without sacrificing accuracy or depth. Over the years, Krishi has contributed to some of the most reputable names in the industry, including Techopedia, TechRadar, and Tom’s Guide. A man of many talents, Krishi has also proven his mettle as a crypto writer, tackling complex topics with both ease and zeal. His work spans various formats—from in-depth explainers and news coverage to feature pieces and buying guides.  Behind the scenes, Krishi operates from a dual-monitor setup (including a 29-inch LG UltraWide) that’s always buzzing with news feeds, technical documentation, and research notes, as well as the occasional gaming sessions that keep him fresh.  Krishi thrives on staying current, always ready to dive into the latest announcements, industry shifts, and their far-reaching impacts.  When he's not deep into research on the latest PC hardware news, Krishi would love to chat with you about day trading and the financial markets—oh! And cricket, as well. View all articles by Krishi Chowdhary Our editorial process The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors. More from News View all View all
    0 Comentários 0 Compartilhamentos
  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence

    A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan.
    "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets."
    The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites.

    Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets.
    While users can create temporary, permanent, or custominvite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases.

    This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server.
    "This creates a serious risk: Users who follow previously trusted invite linkscan unknowingly be redirected to fake Discord servers created by threat actors," Check Point said.
    The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button.
    This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification.

    Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string", and press Enter to authenticate their accounts.
    But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them.
    At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks.
    AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-controlserver by reading a Pastebin file.
    The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms.
    Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office.
    The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook.
    The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain.

    Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times.
    It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom.
    The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery networkabused to host malware in the past.
    "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers."
    "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #discord #invite #link #hijacking #delivers
    Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets." The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites. Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets. While users can create temporary, permanent, or custominvite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases. This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server. "This creates a serious risk: Users who follow previously trusted invite linkscan unknowingly be redirected to fake Discord servers created by threat actors," Check Point said. The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button. This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification. Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string", and press Enter to authenticate their accounts. But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them. At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks. AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-controlserver by reading a Pastebin file. The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms. Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office. The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook. The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain. Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times. It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom. The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery networkabused to host malware in the past. "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers." "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #discord #invite #link #hijacking #delivers
    THEHACKERNEWS.COM
    Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets." The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites. Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets. While users can create temporary, permanent, or custom (vanity) invite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases. This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server. "This creates a serious risk: Users who follow previously trusted invite links (e.g., on websites, blogs, or forums) can unknowingly be redirected to fake Discord servers created by threat actors," Check Point said. The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button. This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification. Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string" (i.e., the PowerShell command), and press Enter to authenticate their accounts. But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them. At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks. AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-control (C2) server by reading a Pastebin file. The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms. Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office. The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook. The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain. Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times. It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom. The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery network (CDN) abused to host malware in the past. "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers." "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    0 Comentários 0 Compartilhamentos
  • The Drinking Fountain of La Arboleda by Luis Barragán: Water, Memory, and Geometry

    Drinking Fountain of La Arboleda| 1970s Photograph
    Luis Barragan’s work is often celebrated for its profound dialogue between form, memory, and landscape. In the Drinking Fountain of La Arboleda, Barragán channels these core principles into a singular architectural gesture. Situated at the culmination of the Paseo de los Gigantes, this fountain transcends utilitarian function to become a space of contemplation and poetic reflection.

    Drinking Fountain of La Arboleda Technical Information

    Architects1-2: Luis Barragán
    Location: Avenida Paseo de los Gigantes, Las Arboledas, Mexico
    Height: 14.6 meters
    Width: 10.4 meters
    Project Years: 1960s
    Plans by: Enrique Delgado Camara

    In Las Arboledas I had the pleasure of building a large rectangular pond among eucalyptus trees; however, while doing so, I thought of Persian gardens, I also thought of De Chirico, I also thought that water is a mirror, and I liked that it reflected the branches of the trees. You know, popular architecture has always impressed me because it is pure truth and because the spaces that occur in plazas, in porticos, in courtyards, are always given with generosity.
    – Luis Barragán

    Drinking Fountain of La Arboleda Photographs

    Drinking Fountain of La Arboleda| 1970s Photograph

    1970s Photograph

    1970s Photograph

    1970s Photograph

    1970s Photograph
    Spatial Composition and Geometric Manipulation
    The project extends Barragán’s broader explorations in Las Arboledas and Los Clubes, developments marked by an intimate relationship with nature and a restrained formal language. Here, water becomes material and metaphor, shaping a spatial experience that is as much about the mind as the body.
    The Drinking Fountain of La Arboleda is defined by the dynamic interplay of two elements: a towering white wall and a long, linear water trough. The wall, rising to a height of 14.6 meters, asserts its presence in the landscape as a vertical marker. It competes with, yet does not overshadow, the surrounding eucalyptus trees. The water trough, measuring 44 meters in length, 2.55 meters in width, and 0.67 meters in height, extends along the path in a measured horizontal counterpoint.
    This juxtaposition of vertical and horizontal geometries establishes a composition of duality. The white wall commands attention from afar, while the dark basin of water, offset to the side, quietly draws in the viewer’s gaze. The deliberate misalignment of these two forms prevents a static symmetry, generating a subtle sense of movement and tension within the space.
    Barragán’s manipulation of circulation further reinforces this dynamic quality. Rather than a direct approach, entry to the plaza is orchestrated through a series of turns. These indirect paths obscure the view and gradually reveal the fountain, heightening the sense of arrival and emphasizing the experiential choreography of the approach.
    Materiality and Sensory Qualities
    Material choices are critical in the fountain’s ability to evoke stillness and dynamism. The white stucco of the wall acts as a canvas for the interplay of light and shadow, particularly as the sun filters through the towering eucalyptus canopy. This shifting luminosity imbues the space with a living quality, constantly animated by the rhythms of the day.
    The basin of the fountain is constructed from dark anthracite, lending the water a reflective depth that absorbs and mirrors the surrounding environment. The edge of the water, defined by precisely cut, sharp-edged walls, creates an illusion of the water as a freestanding volume. This interplay of light, shadow, and reflection intensifies the perception of depth, dissolving the boundary between container and contained.
    The gentle sound of water flowing over the basin’s edge adds a sonic dimension to the experience. It serves as a subtle counterpoint to the plaza’s otherwise hushed atmosphere, enhancing the sensory richness without disrupting the meditative calm.
    Drinking Fountain of La Arboleda Cultural Resonance
    In this project, Barragán evokes a memory of rural Mexico that resonates with personal nostalgia and collective cultural imagery. The trough recalls the water basins of his childhood, echoing the hacienda landscapes and the enduring significance of water in Mexican life. Yet, by abstracting these elements into minimalist forms, he situates them within a modern architectural discourse that transcends mere historicism.
    Barragán’s insistence on the evocative power of space is evident in every aspect of the Drinking Fountain. It is a site of transition, marking the end of the linear paseo while simultaneously inviting introspection and pause. The project’s restrained materiality and precise spatial articulation distill Barragán’s belief in architecture as a vehicle for personal reflection and cultural continuity.
    His 1980 Pritzker Prize acceptance speech, in which he described his enduring fascination with water and the memories of fountains and acequias, underscores this deep personal connection. The Drinking Fountain of La Arboleda can be read as an architectural meditation on that theme. This work bridges the abstraction of modernism with the rich, elemental forces of the Mexican landscape.
    Drinking Fountain of La Arboleda Plans

    Floor Plan | © Enrique Delgado Camara

    Axonometric View | © Enrique Delgado Camara
    Drinking Fountain of La Arboleda Image Gallery

    About Luis Barragán
    Luis Barragánwas a Mexican architect renowned for his masterful integration of light, color, and landscape into architecture. His work blends modernist abstraction with deeply rooted Mexican traditions, crafting spaces that evoke memory, contemplation, and poetic resonance.
    Credits and Additional Notes

    Water TroughLength: 44 meters
    Water TroughWidth: 2.55 meters
    Water TroughHeight: 0.67 meters
    Material: Anthracite-colored stoneDelgado Cámara, Enrique. La Geometría del Agua: Mecanismos Arquitectónicos de Manipulación Espacial. Enrique Delgado Cámara, 2024. 
    Ambasz, Emilio. The Architecture of Luis Barragán. Museum of Modern Art, New York, 1976.
    #drinking #fountain #arboleda #luis #barragán
    The Drinking Fountain of La Arboleda by Luis Barragán: Water, Memory, and Geometry
    Drinking Fountain of La Arboleda| 1970s Photograph Luis Barragan’s work is often celebrated for its profound dialogue between form, memory, and landscape. In the Drinking Fountain of La Arboleda, Barragán channels these core principles into a singular architectural gesture. Situated at the culmination of the Paseo de los Gigantes, this fountain transcends utilitarian function to become a space of contemplation and poetic reflection. Drinking Fountain of La Arboleda Technical Information Architects1-2: Luis Barragán Location: Avenida Paseo de los Gigantes, Las Arboledas, Mexico Height: 14.6 meters Width: 10.4 meters Project Years: 1960s Plans by: Enrique Delgado Camara In Las Arboledas I had the pleasure of building a large rectangular pond among eucalyptus trees; however, while doing so, I thought of Persian gardens, I also thought of De Chirico, I also thought that water is a mirror, and I liked that it reflected the branches of the trees. You know, popular architecture has always impressed me because it is pure truth and because the spaces that occur in plazas, in porticos, in courtyards, are always given with generosity. – Luis Barragán Drinking Fountain of La Arboleda Photographs Drinking Fountain of La Arboleda| 1970s Photograph 1970s Photograph 1970s Photograph 1970s Photograph 1970s Photograph Spatial Composition and Geometric Manipulation The project extends Barragán’s broader explorations in Las Arboledas and Los Clubes, developments marked by an intimate relationship with nature and a restrained formal language. Here, water becomes material and metaphor, shaping a spatial experience that is as much about the mind as the body. The Drinking Fountain of La Arboleda is defined by the dynamic interplay of two elements: a towering white wall and a long, linear water trough. The wall, rising to a height of 14.6 meters, asserts its presence in the landscape as a vertical marker. It competes with, yet does not overshadow, the surrounding eucalyptus trees. The water trough, measuring 44 meters in length, 2.55 meters in width, and 0.67 meters in height, extends along the path in a measured horizontal counterpoint. This juxtaposition of vertical and horizontal geometries establishes a composition of duality. The white wall commands attention from afar, while the dark basin of water, offset to the side, quietly draws in the viewer’s gaze. The deliberate misalignment of these two forms prevents a static symmetry, generating a subtle sense of movement and tension within the space. Barragán’s manipulation of circulation further reinforces this dynamic quality. Rather than a direct approach, entry to the plaza is orchestrated through a series of turns. These indirect paths obscure the view and gradually reveal the fountain, heightening the sense of arrival and emphasizing the experiential choreography of the approach. Materiality and Sensory Qualities Material choices are critical in the fountain’s ability to evoke stillness and dynamism. The white stucco of the wall acts as a canvas for the interplay of light and shadow, particularly as the sun filters through the towering eucalyptus canopy. This shifting luminosity imbues the space with a living quality, constantly animated by the rhythms of the day. The basin of the fountain is constructed from dark anthracite, lending the water a reflective depth that absorbs and mirrors the surrounding environment. The edge of the water, defined by precisely cut, sharp-edged walls, creates an illusion of the water as a freestanding volume. This interplay of light, shadow, and reflection intensifies the perception of depth, dissolving the boundary between container and contained. The gentle sound of water flowing over the basin’s edge adds a sonic dimension to the experience. It serves as a subtle counterpoint to the plaza’s otherwise hushed atmosphere, enhancing the sensory richness without disrupting the meditative calm. Drinking Fountain of La Arboleda Cultural Resonance In this project, Barragán evokes a memory of rural Mexico that resonates with personal nostalgia and collective cultural imagery. The trough recalls the water basins of his childhood, echoing the hacienda landscapes and the enduring significance of water in Mexican life. Yet, by abstracting these elements into minimalist forms, he situates them within a modern architectural discourse that transcends mere historicism. Barragán’s insistence on the evocative power of space is evident in every aspect of the Drinking Fountain. It is a site of transition, marking the end of the linear paseo while simultaneously inviting introspection and pause. The project’s restrained materiality and precise spatial articulation distill Barragán’s belief in architecture as a vehicle for personal reflection and cultural continuity. His 1980 Pritzker Prize acceptance speech, in which he described his enduring fascination with water and the memories of fountains and acequias, underscores this deep personal connection. The Drinking Fountain of La Arboleda can be read as an architectural meditation on that theme. This work bridges the abstraction of modernism with the rich, elemental forces of the Mexican landscape. Drinking Fountain of La Arboleda Plans Floor Plan | © Enrique Delgado Camara Axonometric View | © Enrique Delgado Camara Drinking Fountain of La Arboleda Image Gallery About Luis Barragán Luis Barragánwas a Mexican architect renowned for his masterful integration of light, color, and landscape into architecture. His work blends modernist abstraction with deeply rooted Mexican traditions, crafting spaces that evoke memory, contemplation, and poetic resonance. Credits and Additional Notes Water TroughLength: 44 meters Water TroughWidth: 2.55 meters Water TroughHeight: 0.67 meters Material: Anthracite-colored stoneDelgado Cámara, Enrique. La Geometría del Agua: Mecanismos Arquitectónicos de Manipulación Espacial. Enrique Delgado Cámara, 2024.  Ambasz, Emilio. The Architecture of Luis Barragán. Museum of Modern Art, New York, 1976. #drinking #fountain #arboleda #luis #barragán
    ARCHEYES.COM
    The Drinking Fountain of La Arboleda by Luis Barragán: Water, Memory, and Geometry
    Drinking Fountain of La Arboleda (Bebedero) | 1970s Photograph Luis Barragan’s work is often celebrated for its profound dialogue between form, memory, and landscape. In the Drinking Fountain of La Arboleda, Barragán channels these core principles into a singular architectural gesture. Situated at the culmination of the Paseo de los Gigantes, this fountain transcends utilitarian function to become a space of contemplation and poetic reflection. Drinking Fountain of La Arboleda Technical Information Architects1-2: Luis Barragán Location: Avenida Paseo de los Gigantes, Las Arboledas, Mexico Height: 14.6 meters Width: 10.4 meters Project Years: 1960s Plans by: Enrique Delgado Camara In Las Arboledas I had the pleasure of building a large rectangular pond among eucalyptus trees; however, while doing so, I thought of Persian gardens, I also thought of De Chirico, I also thought that water is a mirror, and I liked that it reflected the branches of the trees. You know, popular architecture has always impressed me because it is pure truth and because the spaces that occur in plazas, in porticos, in courtyards, are always given with generosity. – Luis Barragán Drinking Fountain of La Arboleda Photographs Drinking Fountain of La Arboleda (Bebedero) | 1970s Photograph 1970s Photograph 1970s Photograph 1970s Photograph 1970s Photograph Spatial Composition and Geometric Manipulation The project extends Barragán’s broader explorations in Las Arboledas and Los Clubes, developments marked by an intimate relationship with nature and a restrained formal language. Here, water becomes material and metaphor, shaping a spatial experience that is as much about the mind as the body. The Drinking Fountain of La Arboleda is defined by the dynamic interplay of two elements: a towering white wall and a long, linear water trough. The wall, rising to a height of 14.6 meters, asserts its presence in the landscape as a vertical marker. It competes with, yet does not overshadow, the surrounding eucalyptus trees. The water trough, measuring 44 meters in length, 2.55 meters in width, and 0.67 meters in height, extends along the path in a measured horizontal counterpoint. This juxtaposition of vertical and horizontal geometries establishes a composition of duality. The white wall commands attention from afar, while the dark basin of water, offset to the side, quietly draws in the viewer’s gaze. The deliberate misalignment of these two forms prevents a static symmetry, generating a subtle sense of movement and tension within the space. Barragán’s manipulation of circulation further reinforces this dynamic quality. Rather than a direct approach, entry to the plaza is orchestrated through a series of turns. These indirect paths obscure the view and gradually reveal the fountain, heightening the sense of arrival and emphasizing the experiential choreography of the approach. Materiality and Sensory Qualities Material choices are critical in the fountain’s ability to evoke stillness and dynamism. The white stucco of the wall acts as a canvas for the interplay of light and shadow, particularly as the sun filters through the towering eucalyptus canopy. This shifting luminosity imbues the space with a living quality, constantly animated by the rhythms of the day. The basin of the fountain is constructed from dark anthracite, lending the water a reflective depth that absorbs and mirrors the surrounding environment. The edge of the water, defined by precisely cut, sharp-edged walls, creates an illusion of the water as a freestanding volume. This interplay of light, shadow, and reflection intensifies the perception of depth, dissolving the boundary between container and contained. The gentle sound of water flowing over the basin’s edge adds a sonic dimension to the experience. It serves as a subtle counterpoint to the plaza’s otherwise hushed atmosphere, enhancing the sensory richness without disrupting the meditative calm. Drinking Fountain of La Arboleda Cultural Resonance In this project, Barragán evokes a memory of rural Mexico that resonates with personal nostalgia and collective cultural imagery. The trough recalls the water basins of his childhood, echoing the hacienda landscapes and the enduring significance of water in Mexican life. Yet, by abstracting these elements into minimalist forms, he situates them within a modern architectural discourse that transcends mere historicism. Barragán’s insistence on the evocative power of space is evident in every aspect of the Drinking Fountain. It is a site of transition, marking the end of the linear paseo while simultaneously inviting introspection and pause. The project’s restrained materiality and precise spatial articulation distill Barragán’s belief in architecture as a vehicle for personal reflection and cultural continuity. His 1980 Pritzker Prize acceptance speech, in which he described his enduring fascination with water and the memories of fountains and acequias, underscores this deep personal connection. The Drinking Fountain of La Arboleda can be read as an architectural meditation on that theme. This work bridges the abstraction of modernism with the rich, elemental forces of the Mexican landscape. Drinking Fountain of La Arboleda Plans Floor Plan | © Enrique Delgado Camara Axonometric View | © Enrique Delgado Camara Drinking Fountain of La Arboleda Image Gallery About Luis Barragán Luis Barragán (1902–1988) was a Mexican architect renowned for his masterful integration of light, color, and landscape into architecture. His work blends modernist abstraction with deeply rooted Mexican traditions, crafting spaces that evoke memory, contemplation, and poetic resonance. Credits and Additional Notes Water Trough (Bebedero) Length: 44 meters Water Trough (Bebedero) Width: 2.55 meters Water Trough (Bebedero) Height: 0.67 meters Material: Anthracite-colored stone (dark tone to enhance reflections) Delgado Cámara, Enrique. La Geometría del Agua: Mecanismos Arquitectónicos de Manipulación Espacial. Enrique Delgado Cámara, 2024.  Ambasz, Emilio. The Architecture of Luis Barragán. Museum of Modern Art, New York, 1976.
    Like
    Love
    Wow
    Sad
    Angry
    746
    0 Comentários 0 Compartilhamentos
  • Understanding the Relationship Between Security Gateways and DMARC

    Email authentication protocols like SPF, DKIM, and DMARC play a critical role in protecting domains from spoofing and phishing. However, when SEGs are introduced into the email path, the interaction with these protocols becomes more complex.
    Security gatewaysare a core part of many organizations’ email infrastructure. They act as intermediaries between the public internet and internal mail systems, inspecting, filtering, and routing messages.
    This blog examines how security gateways handle SPF, DKIM, and DMARC, with real-world examples from popular gateways such as Proofpoint, Mimecast, and Avanan. We’ll also cover best practices for maintaining authentication integrity and avoiding misconfigurations that can compromise email authentication or lead to false DMARC failures.
    Security gateways often sit at the boundary between your organization and the internet, managing both inbound and outbound email traffic. Their role affects how email authentication protocols behave.
    An inbound SEG examines emails coming into your organization. It checks SPF, DKIM, and DMARC to determine if the message is authentic and safe before passing it to your internal mail servers.
    An outbound SEG handles emails sent from your domain. It may modify headers, rewrite envelope addresses, or even apply DKIM signing. All of these can impact SPF,  DKIM, or DMARC validation on the recipient’s side.

    Understanding how SEGs influence these flows is crucial to maintaining proper authentication and avoiding unexpected DMARC failures.
    Inbound Handling of SPF, DKIM, and DMARC by Common Security Gateways
    When an email comes into your organization, your security gateway is the first to inspect it. It checks whether the message is real, trustworthy, and properly authenticated. Let’s look at how different SEGs handle these checks.
    AvananSPF: Avanan verifies whether the sending server is authorized to send emails for the domain by checking the SPF record.
    DKIM: It verifies if the message was signed by the sending domain and if that signature is valid.
    DMARC: It uses the results of the SPF and DKIM check to evaluate DMARC. However, final enforcement usually depends on how DMARC is handled by Microsoft 365 or Gmail, as Avanan integrates directly with them.

    Avanan offers two methods of integration:1. API integration: Avanan connects via APIs, no change in MX, usually Monitor or Detect modes.2. Inline integration: Avanan is placed inline in the mail flow, actively blocking or remediating threats.
    Proofpoint Email Protection

    SPF: Proofpoint checks SPF to confirm the sender’s IP is authorized to send on behalf of the domain. You can set custom rules.
    DKIM: It verifies DKIM signatures and shows clear pass/fail results in logs.
    DMARC: It fully evaluates DMARC by combining SPF and DKIM results with alignment checks. Administrators can configure how to handle messages that fail DMARC, such as rejecting, quarantining, or delivering them. Additionally, Proofpoint allows whitelisting specific senders you trust, even if their emails fail authentication checks.

    Integration Methods

    Inline Mode: In this traditional deployment, Proofpoint is positioned directly in the email flow by modifying MX records. Emails are routed through Proofpoint’s infrastructure, allowing it to inspect and filter messages before they reach the recipient’s inbox. This mode provides pre-delivery protection and is commonly used in on-premises or hybrid environments.
    API-BasedMode: Proofpoint offers API-based integration, particularly with cloud email platforms like Microsoft 365 and Google Workspace. In this mode, Proofpoint connects to the email platform via APIs, enabling it to monitor and remediate threats post-delivery without altering the email flow. This approach allows for rapid deployment and seamless integration with existing cloud email services.

    Mimecast

    SPF: Mimecast performs SPF checks to verify whether the sending server is authorized by the domain’s SPF record. Administrators can configure actions for SPF failures, including block, quarantine, permit, or tag with a warning. This gives flexibility in balancing security with business needs.
    DKIM: It validates DKIM signatures by checking that the message was correctly signed by the sending domain and that the content hasn’t been tampered with. If the signature fails, Mimecast can take actions based on your configured policies.
    DMARC: It fully evaluates DMARC by combining the results of SPF and DKIM with domain alignment checks. You can choose to honor the sending domain’s DMARC policyor apply custom rules, for example, quarantining or tagging messages that fail DMARC regardless of the published policy. This allows more granular control for businesses that want to override external domain policies based on specific contexts.

    Integration Methods

    Inline Deployment: Mimecast is typically deployed as a cloud-based secure email gateway. Organizations update their domain’s MX records to point to Mimecast, so all inboundemails pass through it first. This allows Mimecast to inspect, filter, and process emails before delivery, providing robust protection.
    API Integrations: Mimecast also offers API-based services through its Mimecast API platform, primarily for management, archival, continuity, and threat intelligence purposes. However, API-only email protection is not Mimecast’s core model. Instead, the APIs are used to enhance the inline deployment, not replace it.

    Barracuda Email Security Gateway
    SPF: Barracuda checks the sender’s IP against the domain’s published SPF record. If the check fails, you can configure the system to block, quarantine, tag, or allow the message, depending on your policy preferences.
    DKIM: It validates whether the incoming message includes a valid DKIM signature. The outcome is logged and used to inform further policy decisions or DMARC evaluations.
    DMARC: It combines SPF and DKIM results, checks for domain alignment, and applies the DMARC policy defined by the sender. Administrators can also choose to override the DMARC policy, allowing messages to pass or be treated differently based on organizational needs.
    Integration Methods

    Inline mode: Barracuda Email Security Gateway is commonly deployed inline by updating your domain’s MX records to point to Barracuda’s cloud or on-premises gateway. This ensures that all inbound emails pass through Barracuda first for filtering and SPF, DKIM, and DMARC validation before being delivered to your mail servers.
    Deployment Behind the Corporate Firewall: Alternatively, Barracuda can be deployed in transparent or bridge mode without modifying MX records. In this setup, the gateway is placed inline at the network level, such as behind a firewall, and intercepts mail traffic transparently. This method is typically used in complex on-premises environments where changing DNS records is not feasible.

    Cisco Secure EmailCisco Secure Email acts as an inline gateway for inbound email, usually requiring your domain’s MX records to point to the Cisco Email Security Appliance or cloud service.
    SPF: Cisco Secure Email verifies whether the sending server is authorized in the sender domain’s SPF record. Administrators can set detailed policies on how to handle SPF failures.
    DKIM: It validates the DKIM signature on incoming emails and logs whether the signature is valid or has failed.
    DMARC: It evaluates DMARC by combining SPF and DKIM results along with domain alignment checks. Admins can configure specific actions, such as quarantine, reject, or tag, based on different failure scenarios or trusted sender exceptions.
    Integration methods

    On-premises Email Security Appliance: You deploy Cisco’s hardware or virtual appliance inline, updating MX records to route mail through it for filtering.
    Cisco Cloud Email Security: Cisco offers a cloud-based email security service where MX records are pointed to Cisco’s cloud infrastructure, which filters and processes inbound mail.

    Cisco Secure Email also offers advanced, rule-based filtering capabilities and integrates with Cisco’s broader threat protection ecosystem, enabling comprehensive inbound email security.
    Outbound Handling of SPF, DKIM, and DMARC by Common Security Gateways
    When your organization sends emails, security gateways can play an active role in processing and authenticating those messages. Depending on the configuration, a gateway might rewrite headers, re-sign messages, or route them through different IPs – all actions that can help or hurt the authentication process. Let’s look at how major SEGs handle outbound email flow.
    Avanan – Outbound Handling and Integration Methods
    Outbound Logic
    Avanan analyzes outbound emails primarily to detect data loss, malware, and policy violations. In API-based integration, emails are sent directly by the original mail server, so SPF and DKIM signatures remain intact. Avanan does not alter the message or reroute traffic, which helps maintain full DMARC alignment and domain reputation.
    Integration Methods
    1. API Integration: Connects to Microsoft 365 or Google Workspace via API. No MX changes are needed. Emails are scanned after they are sent, with no modification to SPF, DKIM, or the delivery path. 

    How it works: Microsoft Graph API or Google Workspace APIs are used to monitor and intervene in outbound emails.
    Protection level: Despite no MX changes, it can offer inline-like protection, meaning it can block, quarantine, or encrypt emails before they are delivered externally.
    SPF/DKIM/DMARC impact: Preserves original headers and signatures since mail is sent directly from Microsoft/Google servers.

    2. Inline Integration: Requires changing MX records to route email through Avanan. In this mode, Avanan can intercept and inspect outbound emails before delivery. Depending on the configuration, this may affect SPF or DKIM if not properly handled.

    How it works: Requires adding Avanan’s
    Protection level: Traditional inline security with full visibility and control, including encryption, DLP, policy enforcement, and advanced threat protection.
    SPF/DKIM/DMARC impact: SPF configuration is needed by adding Avanan’s include mechanism to the sending domain’s SPF record. The DKIM record of the original sending source is preserved.

    For configurations, you can refer to the steps in this blog.
    Proofpoint – Outbound Handling and Integration Methods
    Outbound Logic
    Proofpoint analyzes outbound emails to detect and prevent data loss, to identify advanced threatsoriginating from compromised internal accounts, and to ensure compliance. Their API integration provides crucial visibility and powerful remediation capabilities, while their traditional gatewaydeployment delivers true inline, pre-delivery blocking for outbound traffic.
    Integration methods
    1. API Integration: No MX record changes are required for this deployment method. Integration is done with Microsoft 365 or Google Workspace.

    How it works: Through its API integration, Proofpoint gains deep visibility into outbound emails and provides layered security and response features, including:

    Detect and alert: Identifies sensitive content, malicious attachments, or suspicious links in outbound emails.
    Post-delivery remediation: A key capability of the API model is Threat Response Auto-Pull, which enables Proofpoint to automatically recall, quarantine, or delete emails after delivery. This is particularly useful for internally sent messages or those forwarded to other users.
    Enhanced visibility: Aggregates message metadata and logs into Proofpoint’s threat intelligence platform, giving security teams a centralized view of outbound risks and user behavior.

    Protection level: API-based integration provides strong post-delivery detection and response, as well as visibility into DLP incidents and suspicious behavior. 
    SPF/DKIM/DMARC impact: Proofpoint does not alter SPF, DKIM, or DMARC because emails are sent directly through Microsoft or Google servers. Since Proofpoint’s servers are not involved in the actual sending process, the original authentication headers remain intact.

    2. Gateway Integration: This method requires updating MX records or routing outbound mail through Proofpoint via a smart host.

    How it works: Proofpoint acts as an inline gateway, inspecting emails before delivery. Inbound mail is filtered via MX changes; outbound mail is relayed through Proofpoint’s servers.
    Threat and DLP filtering: Scans outbound messages for sensitive content, malware, and policy violations.
    Real-time enforcement: Blocks, encrypts, or quarantines emails before they’re delivered.
    Policy controls: Applies rules based on content, recipient, or behavior.
    Protection level: Provides strong, real-time protection for outbound traffic with pre-delivery enforcement, DLP, and encryption.
    SPF/DKIM/DMARC impact: Proofpoint becomes the sending server:

    SPF: You need to configure ProofPoint’s SPF.
    DKIM: Can sign messages; requires DKIM setup.
    DMARC: DMARC passes if SPF and DKIM are set up properly.

    Please refer to this article to configure SPF and DKIM for ProofPoint.
    Mimecast – Outbound Handling and Integration Methods
    Outbound Logic
    Mimecast inspects outbound emails to prevent data loss, detect internal threats such as malware and impersonation, and ensure regulatory compliance. It primarily functions as a Secure Email Gateway, meaning it sits directly in the outbound email flow. While Mimecast offers APIs, its core outbound protection is built around this inline gateway model.
    Integration Methods
    1. Gateway IntegrationThis is Mimecast’s primary method for outbound email protection. Organizations route their outbound traffic through Mimecast by configuring their email serverto use Mimecast as a smart host. This enables Mimecast to inspect and enforce policies on all outgoing emails in real time.

    How it works:
    Updating outbound routing in your email system, or
    Using Mimecast SMTP relay to direct messages through their infrastructure.
    Mimecast then scans, filters, and applies policies before the email reaches the final recipient.

    Protection level:
    Advanced DLP: Identifies and prevents sensitive data leaks.
    Impersonation and Threat Protection: Blocks malware, phishing, and abuse from compromised internal accounts.
    Email Encryption and Secure Messaging: Applies encryption policies or routes messages via secure portals.

    Regulatory Compliance: Enforces outbound compliance rules based on content, recipient, or metadata.
    SPF/DKIM/DMARC impact:

    SPF: Your SPF record must include Mimecast’s SPF mechanism based on your region to avoid SPF failures.
    DKIM: A new DKIM record should be configured to make sure your emails are DKIM signed when routing through Mimecast.
    DMARC: With correct SPF and DKIM setup, Mimecast ensures DMARC alignment, maintaining your domain’s sending reputation. Please refer to the steps in this detailed article to set up SPF and DKIM for Mimecast.

    2. API IntegrationMimecast’s APIs complement the main gateway by providing automation, reporting, and management tools rather than handling live outbound mail flow. They allow you to manage policies, export logs, search archived emails, and sync users.
    APIs enhance visibility and operational tasks but do not provide real-time filtering or blocking of outbound messages. Since APIs don’t process live mail, they have no direct effect on SPF, DKIM, or DMARC; those depend on your gatewaysetup.
    Barracuda – Outbound Handling and Integration Methods
    Outbound Logic
    Barracuda analyzes outbound emails to prevent data loss, block malware, stop phishing/impersonation attempts from compromised internal accounts, and ensure compliance. Barracuda offers flexible deployment options, including both traditional gatewayand API-based integrations. While both contribute to outbound security, their roles are distinct.
    Integration Methods
    1. Gateway Integration— Primary Inline Security

    How it works: All outbound emails pass through Barracuda’s security stack for real-time inspection, threat blocking, and policy enforcement before delivery.
    Protection level:

    Comprehensive DLP 
    Outbound spam and virus filtering 
    Enforcement of compliance and content policies

    This approach offers a high level of control and immediate threat mitigation on outbound mail flow.

    SPF/DKIM/DMARC impact:

    SPF: Update SPF records to include Barracuda’s sending IPs or SPF include mechanism.
    DKIM: Currently, no explicit setup is needed; DKIM of the main sending source is preserved.

    Refer to this article for more comprehensive guidance on Barracuda SEG configuration.
    2. API IntegrationHow it works: The API accesses cloud email environments to analyze historical and real-time data, learning normal communication patterns to detect anomalies in outbound emails. It also supports post-delivery remediation, enabling the removal of malicious emails from internal mailboxes after sending.
    Protection level: Advanced AI-driven detection and near real-time blocking of outbound threats, plus strong post-delivery cleanup capabilities.
    SPF/DKIM/DMARC impact: Since mail is sent directly by the original mail server, SPF and DKIM signatures remain intact, preserving DMARC alignment and domain reputation.

    Cisco Secure Email– Outbound Handling and Integration Methods
    Outbound Logic
    Cisco Secure Email protects outbound email by preventing data loss, blocking spam and malware from internal accounts, stopping business email compromiseand impersonation attacks, and ensuring compliance. Cisco provides both traditional gateway appliances/cloud gateways and modern API-based solutions for layered outbound security.
    Integration Methods
    1. Gateway Integration– Cisco Secure Email GatewayHow it works: Organizations update MX records to route mail through the Cisco Secure Email Gateway or configure their mail serverto smart host outbound email via the gateway. All outbound mail is inspected and policies enforced before delivery.
    Protection level:

    Granular DLPOutbound spam and malware filtering to protect IP reputation
    Email encryption for sensitive outbound messages
    Comprehensive content and attachment policy enforcement

    SPF: Check this article for comprehensive guidance on Cisco SPF settings.
    DKIM: Refer to this article for detailed guidance on Cisco DKIM settings.

    2. API Integration – Cisco Secure Email Threat Defense

    How it works: Integrates directly via API with Microsoft 365, continuously monitoring email metadata, content, and user behavior across inbound, outbound, and internal messages. Leverages Cisco’s threat intelligence and AI to detect anomalous outbound activity linked to BEC, account takeover, and phishing.
    Post-Delivery Remediation: Automates the removal or quarantine of malicious or policy-violating emails from mailboxes even after sending.
    Protection level: Advanced, AI-driven detection of sophisticated outbound threats with real-time monitoring and automated remediation. Complements gateway filtering by adding cloud-native visibility and swift post-send action.
    SPF/DKIM/DMARC impact: Since emails are sent directly by the original mail server, SPF and DKIM signatures remain intact, preserving DMARC alignment and domain reputation.

    If you have any questions or need assistance, feel free to reach out to EasyDMARC technical support.
    #understanding #relationship #between #security #gateways
    Understanding the Relationship Between Security Gateways and DMARC
    Email authentication protocols like SPF, DKIM, and DMARC play a critical role in protecting domains from spoofing and phishing. However, when SEGs are introduced into the email path, the interaction with these protocols becomes more complex. Security gatewaysare a core part of many organizations’ email infrastructure. They act as intermediaries between the public internet and internal mail systems, inspecting, filtering, and routing messages. This blog examines how security gateways handle SPF, DKIM, and DMARC, with real-world examples from popular gateways such as Proofpoint, Mimecast, and Avanan. We’ll also cover best practices for maintaining authentication integrity and avoiding misconfigurations that can compromise email authentication or lead to false DMARC failures. Security gateways often sit at the boundary between your organization and the internet, managing both inbound and outbound email traffic. Their role affects how email authentication protocols behave. An inbound SEG examines emails coming into your organization. It checks SPF, DKIM, and DMARC to determine if the message is authentic and safe before passing it to your internal mail servers. An outbound SEG handles emails sent from your domain. It may modify headers, rewrite envelope addresses, or even apply DKIM signing. All of these can impact SPF,  DKIM, or DMARC validation on the recipient’s side. Understanding how SEGs influence these flows is crucial to maintaining proper authentication and avoiding unexpected DMARC failures. Inbound Handling of SPF, DKIM, and DMARC by Common Security Gateways When an email comes into your organization, your security gateway is the first to inspect it. It checks whether the message is real, trustworthy, and properly authenticated. Let’s look at how different SEGs handle these checks. AvananSPF: Avanan verifies whether the sending server is authorized to send emails for the domain by checking the SPF record. DKIM: It verifies if the message was signed by the sending domain and if that signature is valid. DMARC: It uses the results of the SPF and DKIM check to evaluate DMARC. However, final enforcement usually depends on how DMARC is handled by Microsoft 365 or Gmail, as Avanan integrates directly with them. Avanan offers two methods of integration:1. API integration: Avanan connects via APIs, no change in MX, usually Monitor or Detect modes.2. Inline integration: Avanan is placed inline in the mail flow, actively blocking or remediating threats. Proofpoint Email Protection SPF: Proofpoint checks SPF to confirm the sender’s IP is authorized to send on behalf of the domain. You can set custom rules. DKIM: It verifies DKIM signatures and shows clear pass/fail results in logs. DMARC: It fully evaluates DMARC by combining SPF and DKIM results with alignment checks. Administrators can configure how to handle messages that fail DMARC, such as rejecting, quarantining, or delivering them. Additionally, Proofpoint allows whitelisting specific senders you trust, even if their emails fail authentication checks. Integration Methods Inline Mode: In this traditional deployment, Proofpoint is positioned directly in the email flow by modifying MX records. Emails are routed through Proofpoint’s infrastructure, allowing it to inspect and filter messages before they reach the recipient’s inbox. This mode provides pre-delivery protection and is commonly used in on-premises or hybrid environments. API-BasedMode: Proofpoint offers API-based integration, particularly with cloud email platforms like Microsoft 365 and Google Workspace. In this mode, Proofpoint connects to the email platform via APIs, enabling it to monitor and remediate threats post-delivery without altering the email flow. This approach allows for rapid deployment and seamless integration with existing cloud email services. Mimecast SPF: Mimecast performs SPF checks to verify whether the sending server is authorized by the domain’s SPF record. Administrators can configure actions for SPF failures, including block, quarantine, permit, or tag with a warning. This gives flexibility in balancing security with business needs. DKIM: It validates DKIM signatures by checking that the message was correctly signed by the sending domain and that the content hasn’t been tampered with. If the signature fails, Mimecast can take actions based on your configured policies. DMARC: It fully evaluates DMARC by combining the results of SPF and DKIM with domain alignment checks. You can choose to honor the sending domain’s DMARC policyor apply custom rules, for example, quarantining or tagging messages that fail DMARC regardless of the published policy. This allows more granular control for businesses that want to override external domain policies based on specific contexts. Integration Methods Inline Deployment: Mimecast is typically deployed as a cloud-based secure email gateway. Organizations update their domain’s MX records to point to Mimecast, so all inboundemails pass through it first. This allows Mimecast to inspect, filter, and process emails before delivery, providing robust protection. API Integrations: Mimecast also offers API-based services through its Mimecast API platform, primarily for management, archival, continuity, and threat intelligence purposes. However, API-only email protection is not Mimecast’s core model. Instead, the APIs are used to enhance the inline deployment, not replace it. Barracuda Email Security Gateway SPF: Barracuda checks the sender’s IP against the domain’s published SPF record. If the check fails, you can configure the system to block, quarantine, tag, or allow the message, depending on your policy preferences. DKIM: It validates whether the incoming message includes a valid DKIM signature. The outcome is logged and used to inform further policy decisions or DMARC evaluations. DMARC: It combines SPF and DKIM results, checks for domain alignment, and applies the DMARC policy defined by the sender. Administrators can also choose to override the DMARC policy, allowing messages to pass or be treated differently based on organizational needs. Integration Methods Inline mode: Barracuda Email Security Gateway is commonly deployed inline by updating your domain’s MX records to point to Barracuda’s cloud or on-premises gateway. This ensures that all inbound emails pass through Barracuda first for filtering and SPF, DKIM, and DMARC validation before being delivered to your mail servers. Deployment Behind the Corporate Firewall: Alternatively, Barracuda can be deployed in transparent or bridge mode without modifying MX records. In this setup, the gateway is placed inline at the network level, such as behind a firewall, and intercepts mail traffic transparently. This method is typically used in complex on-premises environments where changing DNS records is not feasible. Cisco Secure EmailCisco Secure Email acts as an inline gateway for inbound email, usually requiring your domain’s MX records to point to the Cisco Email Security Appliance or cloud service. SPF: Cisco Secure Email verifies whether the sending server is authorized in the sender domain’s SPF record. Administrators can set detailed policies on how to handle SPF failures. DKIM: It validates the DKIM signature on incoming emails and logs whether the signature is valid or has failed. DMARC: It evaluates DMARC by combining SPF and DKIM results along with domain alignment checks. Admins can configure specific actions, such as quarantine, reject, or tag, based on different failure scenarios or trusted sender exceptions. Integration methods On-premises Email Security Appliance: You deploy Cisco’s hardware or virtual appliance inline, updating MX records to route mail through it for filtering. Cisco Cloud Email Security: Cisco offers a cloud-based email security service where MX records are pointed to Cisco’s cloud infrastructure, which filters and processes inbound mail. Cisco Secure Email also offers advanced, rule-based filtering capabilities and integrates with Cisco’s broader threat protection ecosystem, enabling comprehensive inbound email security. Outbound Handling of SPF, DKIM, and DMARC by Common Security Gateways When your organization sends emails, security gateways can play an active role in processing and authenticating those messages. Depending on the configuration, a gateway might rewrite headers, re-sign messages, or route them through different IPs – all actions that can help or hurt the authentication process. Let’s look at how major SEGs handle outbound email flow. Avanan – Outbound Handling and Integration Methods Outbound Logic Avanan analyzes outbound emails primarily to detect data loss, malware, and policy violations. In API-based integration, emails are sent directly by the original mail server, so SPF and DKIM signatures remain intact. Avanan does not alter the message or reroute traffic, which helps maintain full DMARC alignment and domain reputation. Integration Methods 1. API Integration: Connects to Microsoft 365 or Google Workspace via API. No MX changes are needed. Emails are scanned after they are sent, with no modification to SPF, DKIM, or the delivery path.  How it works: Microsoft Graph API or Google Workspace APIs are used to monitor and intervene in outbound emails. Protection level: Despite no MX changes, it can offer inline-like protection, meaning it can block, quarantine, or encrypt emails before they are delivered externally. SPF/DKIM/DMARC impact: Preserves original headers and signatures since mail is sent directly from Microsoft/Google servers. 2. Inline Integration: Requires changing MX records to route email through Avanan. In this mode, Avanan can intercept and inspect outbound emails before delivery. Depending on the configuration, this may affect SPF or DKIM if not properly handled. How it works: Requires adding Avanan’s Protection level: Traditional inline security with full visibility and control, including encryption, DLP, policy enforcement, and advanced threat protection. SPF/DKIM/DMARC impact: SPF configuration is needed by adding Avanan’s include mechanism to the sending domain’s SPF record. The DKIM record of the original sending source is preserved. For configurations, you can refer to the steps in this blog. Proofpoint – Outbound Handling and Integration Methods Outbound Logic Proofpoint analyzes outbound emails to detect and prevent data loss, to identify advanced threatsoriginating from compromised internal accounts, and to ensure compliance. Their API integration provides crucial visibility and powerful remediation capabilities, while their traditional gatewaydeployment delivers true inline, pre-delivery blocking for outbound traffic. Integration methods 1. API Integration: No MX record changes are required for this deployment method. Integration is done with Microsoft 365 or Google Workspace. How it works: Through its API integration, Proofpoint gains deep visibility into outbound emails and provides layered security and response features, including: Detect and alert: Identifies sensitive content, malicious attachments, or suspicious links in outbound emails. Post-delivery remediation: A key capability of the API model is Threat Response Auto-Pull, which enables Proofpoint to automatically recall, quarantine, or delete emails after delivery. This is particularly useful for internally sent messages or those forwarded to other users. Enhanced visibility: Aggregates message metadata and logs into Proofpoint’s threat intelligence platform, giving security teams a centralized view of outbound risks and user behavior. Protection level: API-based integration provides strong post-delivery detection and response, as well as visibility into DLP incidents and suspicious behavior.  SPF/DKIM/DMARC impact: Proofpoint does not alter SPF, DKIM, or DMARC because emails are sent directly through Microsoft or Google servers. Since Proofpoint’s servers are not involved in the actual sending process, the original authentication headers remain intact. 2. Gateway Integration: This method requires updating MX records or routing outbound mail through Proofpoint via a smart host. How it works: Proofpoint acts as an inline gateway, inspecting emails before delivery. Inbound mail is filtered via MX changes; outbound mail is relayed through Proofpoint’s servers. Threat and DLP filtering: Scans outbound messages for sensitive content, malware, and policy violations. Real-time enforcement: Blocks, encrypts, or quarantines emails before they’re delivered. Policy controls: Applies rules based on content, recipient, or behavior. Protection level: Provides strong, real-time protection for outbound traffic with pre-delivery enforcement, DLP, and encryption. SPF/DKIM/DMARC impact: Proofpoint becomes the sending server: SPF: You need to configure ProofPoint’s SPF. DKIM: Can sign messages; requires DKIM setup. DMARC: DMARC passes if SPF and DKIM are set up properly. Please refer to this article to configure SPF and DKIM for ProofPoint. Mimecast – Outbound Handling and Integration Methods Outbound Logic Mimecast inspects outbound emails to prevent data loss, detect internal threats such as malware and impersonation, and ensure regulatory compliance. It primarily functions as a Secure Email Gateway, meaning it sits directly in the outbound email flow. While Mimecast offers APIs, its core outbound protection is built around this inline gateway model. Integration Methods 1. Gateway IntegrationThis is Mimecast’s primary method for outbound email protection. Organizations route their outbound traffic through Mimecast by configuring their email serverto use Mimecast as a smart host. This enables Mimecast to inspect and enforce policies on all outgoing emails in real time. How it works: Updating outbound routing in your email system, or Using Mimecast SMTP relay to direct messages through their infrastructure. Mimecast then scans, filters, and applies policies before the email reaches the final recipient. Protection level: Advanced DLP: Identifies and prevents sensitive data leaks. Impersonation and Threat Protection: Blocks malware, phishing, and abuse from compromised internal accounts. Email Encryption and Secure Messaging: Applies encryption policies or routes messages via secure portals. Regulatory Compliance: Enforces outbound compliance rules based on content, recipient, or metadata. SPF/DKIM/DMARC impact: SPF: Your SPF record must include Mimecast’s SPF mechanism based on your region to avoid SPF failures. DKIM: A new DKIM record should be configured to make sure your emails are DKIM signed when routing through Mimecast. DMARC: With correct SPF and DKIM setup, Mimecast ensures DMARC alignment, maintaining your domain’s sending reputation. Please refer to the steps in this detailed article to set up SPF and DKIM for Mimecast. 2. API IntegrationMimecast’s APIs complement the main gateway by providing automation, reporting, and management tools rather than handling live outbound mail flow. They allow you to manage policies, export logs, search archived emails, and sync users. APIs enhance visibility and operational tasks but do not provide real-time filtering or blocking of outbound messages. Since APIs don’t process live mail, they have no direct effect on SPF, DKIM, or DMARC; those depend on your gatewaysetup. Barracuda – Outbound Handling and Integration Methods Outbound Logic Barracuda analyzes outbound emails to prevent data loss, block malware, stop phishing/impersonation attempts from compromised internal accounts, and ensure compliance. Barracuda offers flexible deployment options, including both traditional gatewayand API-based integrations. While both contribute to outbound security, their roles are distinct. Integration Methods 1. Gateway Integration— Primary Inline Security How it works: All outbound emails pass through Barracuda’s security stack for real-time inspection, threat blocking, and policy enforcement before delivery. Protection level: Comprehensive DLP  Outbound spam and virus filtering  Enforcement of compliance and content policies This approach offers a high level of control and immediate threat mitigation on outbound mail flow. SPF/DKIM/DMARC impact: SPF: Update SPF records to include Barracuda’s sending IPs or SPF include mechanism. DKIM: Currently, no explicit setup is needed; DKIM of the main sending source is preserved. Refer to this article for more comprehensive guidance on Barracuda SEG configuration. 2. API IntegrationHow it works: The API accesses cloud email environments to analyze historical and real-time data, learning normal communication patterns to detect anomalies in outbound emails. It also supports post-delivery remediation, enabling the removal of malicious emails from internal mailboxes after sending. Protection level: Advanced AI-driven detection and near real-time blocking of outbound threats, plus strong post-delivery cleanup capabilities. SPF/DKIM/DMARC impact: Since mail is sent directly by the original mail server, SPF and DKIM signatures remain intact, preserving DMARC alignment and domain reputation. Cisco Secure Email– Outbound Handling and Integration Methods Outbound Logic Cisco Secure Email protects outbound email by preventing data loss, blocking spam and malware from internal accounts, stopping business email compromiseand impersonation attacks, and ensuring compliance. Cisco provides both traditional gateway appliances/cloud gateways and modern API-based solutions for layered outbound security. Integration Methods 1. Gateway Integration– Cisco Secure Email GatewayHow it works: Organizations update MX records to route mail through the Cisco Secure Email Gateway or configure their mail serverto smart host outbound email via the gateway. All outbound mail is inspected and policies enforced before delivery. Protection level: Granular DLPOutbound spam and malware filtering to protect IP reputation Email encryption for sensitive outbound messages Comprehensive content and attachment policy enforcement SPF: Check this article for comprehensive guidance on Cisco SPF settings. DKIM: Refer to this article for detailed guidance on Cisco DKIM settings. 2. API Integration – Cisco Secure Email Threat Defense How it works: Integrates directly via API with Microsoft 365, continuously monitoring email metadata, content, and user behavior across inbound, outbound, and internal messages. Leverages Cisco’s threat intelligence and AI to detect anomalous outbound activity linked to BEC, account takeover, and phishing. Post-Delivery Remediation: Automates the removal or quarantine of malicious or policy-violating emails from mailboxes even after sending. Protection level: Advanced, AI-driven detection of sophisticated outbound threats with real-time monitoring and automated remediation. Complements gateway filtering by adding cloud-native visibility and swift post-send action. SPF/DKIM/DMARC impact: Since emails are sent directly by the original mail server, SPF and DKIM signatures remain intact, preserving DMARC alignment and domain reputation. If you have any questions or need assistance, feel free to reach out to EasyDMARC technical support. #understanding #relationship #between #security #gateways
    EASYDMARC.COM
    Understanding the Relationship Between Security Gateways and DMARC
    Email authentication protocols like SPF, DKIM, and DMARC play a critical role in protecting domains from spoofing and phishing. However, when SEGs are introduced into the email path, the interaction with these protocols becomes more complex. Security gateways(SEGs) are a core part of many organizations’ email infrastructure. They act as intermediaries between the public internet and internal mail systems, inspecting, filtering, and routing messages. This blog examines how security gateways handle SPF, DKIM, and DMARC, with real-world examples from popular gateways such as Proofpoint, Mimecast, and Avanan. We’ll also cover best practices for maintaining authentication integrity and avoiding misconfigurations that can compromise email authentication or lead to false DMARC failures. Security gateways often sit at the boundary between your organization and the internet, managing both inbound and outbound email traffic. Their role affects how email authentication protocols behave. An inbound SEG examines emails coming into your organization. It checks SPF, DKIM, and DMARC to determine if the message is authentic and safe before passing it to your internal mail servers. An outbound SEG handles emails sent from your domain. It may modify headers, rewrite envelope addresses, or even apply DKIM signing. All of these can impact SPF,  DKIM, or DMARC validation on the recipient’s side. Understanding how SEGs influence these flows is crucial to maintaining proper authentication and avoiding unexpected DMARC failures. Inbound Handling of SPF, DKIM, and DMARC by Common Security Gateways When an email comes into your organization, your security gateway is the first to inspect it. It checks whether the message is real, trustworthy, and properly authenticated. Let’s look at how different SEGs handle these checks. Avanan (by Check Point) SPF: Avanan verifies whether the sending server is authorized to send emails for the domain by checking the SPF record. DKIM: It verifies if the message was signed by the sending domain and if that signature is valid. DMARC: It uses the results of the SPF and DKIM check to evaluate DMARC. However, final enforcement usually depends on how DMARC is handled by Microsoft 365 or Gmail, as Avanan integrates directly with them. Avanan offers two methods of integration:1. API integration: Avanan connects via APIs, no change in MX, usually Monitor or Detect modes.2. Inline integration: Avanan is placed inline in the mail flow (MX records changed), actively blocking or remediating threats. Proofpoint Email Protection SPF: Proofpoint checks SPF to confirm the sender’s IP is authorized to send on behalf of the domain. You can set custom rules (e.g. treat “softfail” as “fail”). DKIM: It verifies DKIM signatures and shows clear pass/fail results in logs. DMARC: It fully evaluates DMARC by combining SPF and DKIM results with alignment checks. Administrators can configure how to handle messages that fail DMARC, such as rejecting, quarantining, or delivering them. Additionally, Proofpoint allows whitelisting specific senders you trust, even if their emails fail authentication checks. Integration Methods Inline Mode: In this traditional deployment, Proofpoint is positioned directly in the email flow by modifying MX records. Emails are routed through Proofpoint’s infrastructure, allowing it to inspect and filter messages before they reach the recipient’s inbox. This mode provides pre-delivery protection and is commonly used in on-premises or hybrid environments. API-Based (Integrated Cloud Email Security – ICES) Mode: Proofpoint offers API-based integration, particularly with cloud email platforms like Microsoft 365 and Google Workspace. In this mode, Proofpoint connects to the email platform via APIs, enabling it to monitor and remediate threats post-delivery without altering the email flow. This approach allows for rapid deployment and seamless integration with existing cloud email services. Mimecast SPF: Mimecast performs SPF checks to verify whether the sending server is authorized by the domain’s SPF record. Administrators can configure actions for SPF failures, including block, quarantine, permit, or tag with a warning. This gives flexibility in balancing security with business needs. DKIM: It validates DKIM signatures by checking that the message was correctly signed by the sending domain and that the content hasn’t been tampered with. If the signature fails, Mimecast can take actions based on your configured policies. DMARC: It fully evaluates DMARC by combining the results of SPF and DKIM with domain alignment checks. You can choose to honor the sending domain’s DMARC policy (none, quarantine, reject) or apply custom rules, for example, quarantining or tagging messages that fail DMARC regardless of the published policy. This allows more granular control for businesses that want to override external domain policies based on specific contexts. Integration Methods Inline Deployment: Mimecast is typically deployed as a cloud-based secure email gateway. Organizations update their domain’s MX records to point to Mimecast, so all inbound (and optionally outbound) emails pass through it first. This allows Mimecast to inspect, filter, and process emails before delivery, providing robust protection. API Integrations: Mimecast also offers API-based services through its Mimecast API platform, primarily for management, archival, continuity, and threat intelligence purposes. However, API-only email protection is not Mimecast’s core model. Instead, the APIs are used to enhance the inline deployment, not replace it. Barracuda Email Security Gateway SPF: Barracuda checks the sender’s IP against the domain’s published SPF record. If the check fails, you can configure the system to block, quarantine, tag, or allow the message, depending on your policy preferences. DKIM: It validates whether the incoming message includes a valid DKIM signature. The outcome is logged and used to inform further policy decisions or DMARC evaluations. DMARC: It combines SPF and DKIM results, checks for domain alignment, and applies the DMARC policy defined by the sender. Administrators can also choose to override the DMARC policy, allowing messages to pass or be treated differently based on organizational needs (e.g., trusted senders or internal exceptions). Integration Methods Inline mode (more common and straightforward): Barracuda Email Security Gateway is commonly deployed inline by updating your domain’s MX records to point to Barracuda’s cloud or on-premises gateway. This ensures that all inbound emails pass through Barracuda first for filtering and SPF, DKIM, and DMARC validation before being delivered to your mail servers. Deployment Behind the Corporate Firewall: Alternatively, Barracuda can be deployed in transparent or bridge mode without modifying MX records. In this setup, the gateway is placed inline at the network level, such as behind a firewall, and intercepts mail traffic transparently. This method is typically used in complex on-premises environments where changing DNS records is not feasible. Cisco Secure Email (formerly IronPort) Cisco Secure Email acts as an inline gateway for inbound email, usually requiring your domain’s MX records to point to the Cisco Email Security Appliance or cloud service. SPF: Cisco Secure Email verifies whether the sending server is authorized in the sender domain’s SPF record. Administrators can set detailed policies on how to handle SPF failures. DKIM: It validates the DKIM signature on incoming emails and logs whether the signature is valid or has failed. DMARC: It evaluates DMARC by combining SPF and DKIM results along with domain alignment checks. Admins can configure specific actions, such as quarantine, reject, or tag, based on different failure scenarios or trusted sender exceptions. Integration methods On-premises Email Security Appliance (ESA): You deploy Cisco’s hardware or virtual appliance inline, updating MX records to route mail through it for filtering. Cisco Cloud Email Security: Cisco offers a cloud-based email security service where MX records are pointed to Cisco’s cloud infrastructure, which filters and processes inbound mail. Cisco Secure Email also offers advanced, rule-based filtering capabilities and integrates with Cisco’s broader threat protection ecosystem, enabling comprehensive inbound email security. Outbound Handling of SPF, DKIM, and DMARC by Common Security Gateways When your organization sends emails, security gateways can play an active role in processing and authenticating those messages. Depending on the configuration, a gateway might rewrite headers, re-sign messages, or route them through different IPs – all actions that can help or hurt the authentication process. Let’s look at how major SEGs handle outbound email flow. Avanan – Outbound Handling and Integration Methods Outbound Logic Avanan analyzes outbound emails primarily to detect data loss, malware, and policy violations. In API-based integration, emails are sent directly by the original mail server (e.g., Microsoft 365 or Google Workspace), so SPF and DKIM signatures remain intact. Avanan does not alter the message or reroute traffic, which helps maintain full DMARC alignment and domain reputation. Integration Methods 1. API Integration: Connects to Microsoft 365 or Google Workspace via API. No MX changes are needed. Emails are scanned after they are sent, with no modification to SPF, DKIM, or the delivery path.  How it works: Microsoft Graph API or Google Workspace APIs are used to monitor and intervene in outbound emails. Protection level: Despite no MX changes, it can offer inline-like protection, meaning it can block, quarantine, or encrypt emails before they are delivered externally. SPF/DKIM/DMARC impact: Preserves original headers and signatures since mail is sent directly from Microsoft/Google servers. 2. Inline Integration: Requires changing MX records to route email through Avanan. In this mode, Avanan can intercept and inspect outbound emails before delivery. Depending on the configuration, this may affect SPF or DKIM if not properly handled. How it works: Requires adding Avanan’s Protection level: Traditional inline security with full visibility and control, including encryption, DLP, policy enforcement, and advanced threat protection. SPF/DKIM/DMARC impact: SPF configuration is needed by adding Avanan’s include mechanism to the sending domain’s SPF record. The DKIM record of the original sending source is preserved. For configurations, you can refer to the steps in this blog. Proofpoint – Outbound Handling and Integration Methods Outbound Logic Proofpoint analyzes outbound emails to detect and prevent data loss (DLP), to identify advanced threats (malware, phishing, BEC) originating from compromised internal accounts, and to ensure compliance. Their API integration provides crucial visibility and powerful remediation capabilities, while their traditional gateway (MX record) deployment delivers true inline, pre-delivery blocking for outbound traffic. Integration methods 1. API Integration: No MX record changes are required for this deployment method. Integration is done with Microsoft 365 or Google Workspace. How it works: Through its API integration, Proofpoint gains deep visibility into outbound emails and provides layered security and response features, including: Detect and alert: Identifies sensitive content (Data Loss Prevention violations), malicious attachments, or suspicious links in outbound emails. Post-delivery remediation (TRAP): A key capability of the API model is Threat Response Auto-Pull (TRAP), which enables Proofpoint to automatically recall, quarantine, or delete emails after delivery. This is particularly useful for internally sent messages or those forwarded to other users. Enhanced visibility: Aggregates message metadata and logs into Proofpoint’s threat intelligence platform, giving security teams a centralized view of outbound risks and user behavior. Protection level: API-based integration provides strong post-delivery detection and response, as well as visibility into DLP incidents and suspicious behavior.  SPF/DKIM/DMARC impact: Proofpoint does not alter SPF, DKIM, or DMARC because emails are sent directly through Microsoft or Google servers. Since Proofpoint’s servers are not involved in the actual sending process, the original authentication headers remain intact. 2. Gateway Integration (MX Record/Smart Host): This method requires updating MX records or routing outbound mail through Proofpoint via a smart host. How it works: Proofpoint acts as an inline gateway, inspecting emails before delivery. Inbound mail is filtered via MX changes; outbound mail is relayed through Proofpoint’s servers. Threat and DLP filtering: Scans outbound messages for sensitive content, malware, and policy violations. Real-time enforcement: Blocks, encrypts, or quarantines emails before they’re delivered. Policy controls: Applies rules based on content, recipient, or behavior. Protection level: Provides strong, real-time protection for outbound traffic with pre-delivery enforcement, DLP, and encryption. SPF/DKIM/DMARC impact: Proofpoint becomes the sending server: SPF: You need to configure ProofPoint’s SPF. DKIM: Can sign messages; requires DKIM setup. DMARC: DMARC passes if SPF and DKIM are set up properly. Please refer to this article to configure SPF and DKIM for ProofPoint. Mimecast – Outbound Handling and Integration Methods Outbound Logic Mimecast inspects outbound emails to prevent data loss (DLP), detect internal threats such as malware and impersonation, and ensure regulatory compliance. It primarily functions as a Secure Email Gateway (SEG), meaning it sits directly in the outbound email flow. While Mimecast offers APIs, its core outbound protection is built around this inline gateway model. Integration Methods 1. Gateway Integration (MX Record change required) This is Mimecast’s primary method for outbound email protection. Organizations route their outbound traffic through Mimecast by configuring their email server (e.g., Microsoft 365, Google Workspace, etc.) to use Mimecast as a smart host. This enables Mimecast to inspect and enforce policies on all outgoing emails in real time. How it works: Updating outbound routing in your email system (smart host settings), or Using Mimecast SMTP relay to direct messages through their infrastructure. Mimecast then scans, filters, and applies policies before the email reaches the final recipient. Protection level: Advanced DLP: Identifies and prevents sensitive data leaks. Impersonation and Threat Protection: Blocks malware, phishing, and abuse from compromised internal accounts. Email Encryption and Secure Messaging: Applies encryption policies or routes messages via secure portals. Regulatory Compliance: Enforces outbound compliance rules based on content, recipient, or metadata. SPF/DKIM/DMARC impact: SPF: Your SPF record must include Mimecast’s SPF mechanism based on your region to avoid SPF failures. DKIM: A new DKIM record should be configured to make sure your emails are DKIM signed when routing through Mimecast. DMARC: With correct SPF and DKIM setup, Mimecast ensures DMARC alignment, maintaining your domain’s sending reputation. Please refer to the steps in this detailed article to set up SPF and DKIM for Mimecast. 2. API Integration (Complementary to Gateway) Mimecast’s APIs complement the main gateway by providing automation, reporting, and management tools rather than handling live outbound mail flow. They allow you to manage policies, export logs, search archived emails, and sync users. APIs enhance visibility and operational tasks but do not provide real-time filtering or blocking of outbound messages. Since APIs don’t process live mail, they have no direct effect on SPF, DKIM, or DMARC; those depend on your gateway (smart host) setup. Barracuda – Outbound Handling and Integration Methods Outbound Logic Barracuda analyzes outbound emails to prevent data loss (DLP), block malware, stop phishing/impersonation attempts from compromised internal accounts, and ensure compliance. Barracuda offers flexible deployment options, including both traditional gateway (MX record) and API-based integrations. While both contribute to outbound security, their roles are distinct. Integration Methods 1. Gateway Integration (MX Record / Smart Host) — Primary Inline Security How it works: All outbound emails pass through Barracuda’s security stack for real-time inspection, threat blocking, and policy enforcement before delivery. Protection level: Comprehensive DLP (blocking, encrypting, or quarantining sensitive content)  Outbound spam and virus filtering  Enforcement of compliance and content policies This approach offers a high level of control and immediate threat mitigation on outbound mail flow. SPF/DKIM/DMARC impact: SPF: Update SPF records to include Barracuda’s sending IPs or SPF include mechanism. DKIM: Currently, no explicit setup is needed; DKIM of the main sending source is preserved. Refer to this article for more comprehensive guidance on Barracuda SEG configuration. 2. API Integration (Complementary & Advanced Threat Focus) How it works: The API accesses cloud email environments to analyze historical and real-time data, learning normal communication patterns to detect anomalies in outbound emails. It also supports post-delivery remediation, enabling the removal of malicious emails from internal mailboxes after sending. Protection level: Advanced AI-driven detection and near real-time blocking of outbound threats, plus strong post-delivery cleanup capabilities. SPF/DKIM/DMARC impact: Since mail is sent directly by the original mail server (e.g., Microsoft 365), SPF and DKIM signatures remain intact, preserving DMARC alignment and domain reputation. Cisco Secure Email (formerly IronPort) – Outbound Handling and Integration Methods Outbound Logic Cisco Secure Email protects outbound email by preventing data loss (DLP), blocking spam and malware from internal accounts, stopping business email compromise (BEC) and impersonation attacks, and ensuring compliance. Cisco provides both traditional gateway appliances/cloud gateways and modern API-based solutions for layered outbound security. Integration Methods 1. Gateway Integration (MX Record / Smart Host) – Cisco Secure Email Gateway (ESA) How it works: Organizations update MX records to route mail through the Cisco Secure Email Gateway or configure their mail server (e.g., Microsoft 365, Exchange) to smart host outbound email via the gateway. All outbound mail is inspected and policies enforced before delivery. Protection level: Granular DLP (blocking, encrypting, quarantining sensitive content) Outbound spam and malware filtering to protect IP reputation Email encryption for sensitive outbound messages Comprehensive content and attachment policy enforcement SPF: Check this article for comprehensive guidance on Cisco SPF settings. DKIM: Refer to this article for detailed guidance on Cisco DKIM settings. 2. API Integration – Cisco Secure Email Threat Defense How it works: Integrates directly via API with Microsoft 365 (and potentially Google Workspace), continuously monitoring email metadata, content, and user behavior across inbound, outbound, and internal messages. Leverages Cisco’s threat intelligence and AI to detect anomalous outbound activity linked to BEC, account takeover, and phishing. Post-Delivery Remediation: Automates the removal or quarantine of malicious or policy-violating emails from mailboxes even after sending. Protection level: Advanced, AI-driven detection of sophisticated outbound threats with real-time monitoring and automated remediation. Complements gateway filtering by adding cloud-native visibility and swift post-send action. SPF/DKIM/DMARC impact: Since emails are sent directly by the original mail server, SPF and DKIM signatures remain intact, preserving DMARC alignment and domain reputation. If you have any questions or need assistance, feel free to reach out to EasyDMARC technical support.
    Like
    Love
    Wow
    Sad
    Angry
    398
    0 Comentários 0 Compartilhamentos
  • How to Move from an Apartment to a House: A Step-by-Step Guide

    House in Palm Springs | © Sydney Turturro via Unsplash
    Moving from an apartment to a house is a major life milestone. It usually means more space, more responsibility, and more freedom. But unless you plan it right, it can also come with more stress. 
    Whether upgrading to accommodate a growing family or simply looking for more room to breathe, here are five essential steps to help you move from an apartment to a house confidently and easily.

    1. Start with a Clear Plan and Timeline
    One of the most common mistakes people make when moving from an apartment to a house is underestimating how long it takes. It’s not just about packing up your belongings; it’s about handling logistics, paperwork, and scheduling around daily life. 
    As soon as you know your moving date, create a moving checklist. 
    Outline what needs to be done weekly: notifying your landlord, scheduling the elevator if you’re in a high-rise, collecting packing materials, and booking your moving company.
    Planning ahead helps you avoid last-minute stress and unexpected costs. If possible, give yourself at least 6–8 weeks. That gives you enough time to declutter, coordinate with service providers, and ensure you’re fully prepared for move-in day. The earlier you start, the smoother everything flows.
    Hiring professional movers early in the process can also secure your preferred date and provide access to helpful services, such as packing, storage, or specialized transportation. With everything scheduled well in advance, you’ll have the peace of mind needed to focus on your new adventure.
    2. Downsize Before You Upsize
    It may sound counterintuitive, but moving to a bigger space doesn’t mean you should bring everything with you. 
    Over time, we accumulate furniture, clothes, gadgets, and kitchen tools that serve little purpose. And in a small apartment, many of these items might have been crammed into closets or storage bins and forgotten altogether. 
    Now’s the perfect time to declutter and lighten the load before the move.
    Start by walking through your apartment and taking stock of everything. Ask yourself what truly adds value to your life and what’s just taking up space. If you haven’t used something in over a year, it’s probably safe to let it go. You can donate, sell, or recycle items as needed. A good rule of thumb is to be ruthless. A cleaner move means a cleaner start in your new home.
    By purging the excess, you’ll reduce moving costs and arrive at your new house with a fresh mindset. There’s no sense in transporting items you no longer want or need. Instead, you’ll be able to unpack more quickly and enjoy your new space without clutter.
    3. Prepare for a Different Kind of Space
    Living in a house is very different from apartment life. The layout, square footage, and storage options all change, which means your furniture and lifestyle habits may also need to adapt. That cozy loveseat that fits perfectly in your apartment living room might look dwarfed in a larger house. 
    Before moving, visit the house if possible and take room measurements. 
    Consider creating a rough floor plan to determine where each piece of furniture will fit. This not only helps your local movers place items on move-in day, but it also ensures you don’t waste time and energy relocating things that won’t work in the new space. Apps and online tools can help you visualize your layout ahead of time.
    Beyond furniture, also think about what your new home may need. 

    Will you have a backyard that needs maintenance?
    A garage that requires storage shelving?
    An extra guest room or home office that needs furnishing? 

    While you don’t have to buy everything at once, it’s smart to budget for future purchases so you can comfortably and intentionally grow into your home.
    4. Handle Utilities, Address Changes, and Logistics

    © Peter Thomas via Unsplash

    © Mitch via Unsplash

    Unlike apartments, where utilities may be partially covered or managed by the landlord, houses typically require you to set up and manage everything yourself. 
    This includes electricity, water, gas, internet, trash collection, and sometimes even lawn care services. Don’t wait until the last minute; contact providers at least a week before your move to schedule installation or transfers.
    At the same time, update your address with your bank, subscription services, and relevant government agencies. This helps ensure you continue to receive important mail and prevents service disruptions. If you’re moving within the same city, this can be fairly straightforward. If you’re moving to a different region or province, however, make sure you check for local utility providers and regional services.
    Elevator bookings and parking permits are other key details to address, especially when moving out of an apartment in a busy area. 
    Confirm all building rules and moving hours in advance, and inform your movers so they can plan accordingly. Clear communication on these details makes the moving day smoother for everyone involved.
    5. Rely on a Trusted Moving Partner
    Perhaps the most important step in this process is choosing the right moving company. 
    Apartment-to-house moves require experience, careful coordination, and physical effort, especially when dealing with tight stairwells, narrow hallways, or long distances from the apartment to the truck. 
    A professional moving team can handle the logistics efficiently while protecting your belongings from damage.
    Instead of doing it all yourself, you can count on us to carry the load literally. We bring the right equipment, vehicles, and muscle, so you don’t have to worry about heavy lifting or unexpected delays. More importantly, we offer peace of mind during an exciting and overwhelming time.
    A good moving experience sets the tone for your new chapter. Let us help make that transition smooth, stress-free, and even enjoyable.
    Final Word
    Moving from an apartment to a house is more than just a physical shift; it’s a lifestyle change. With the right planning, thoughtful decisions, and support from experienced movers, you can make the process simple and even fun. Whether it’s your first home or your dream upgrade, we’re here to guide you every step of the way.
    Frequently Asked Questions 
    1. How far in advance should I book a moving company when moving from an apartment to a house?
    We recommend booking your moving company at least 4–6 weeks in advance, especially during peak moving seasons. This gives you the best chance to secure your preferred date and time while also allowing time for proper planning, packing, and coordination with building management if needed.
    2. What’s the best way to downsize before moving into a house?
    Even though you’re moving to a larger space, it’s wise to declutter before your move. Sort items by category, keep, donate, sell, or discard, and be honest about what you actually use. Unused furniture, duplicate kitchenware, and old clothes often don’t need to make the move. A lighter load means a faster, more affordable, and more organized transition.
    3. Will all my apartment furniture fit properly in a house? 
    Some furniture from a compact apartment may not always feel too small or awkward in a larger home. We recommend measuring key pieces and comparing them with the dimensions of the new space before moving. Our team can help you decide what’s worth moving and even assist with layout planning to ensure everything fits where it should.
    4. What should I do about utilities when moving into a house? 
    Unlike apartment living, homeowners are responsible for setting up all their utilities individually. Be sure to contact providers for electricity, water, internet, gas, and waste collection at least a week before your move. Scheduling ahead ensures your new home is move-in ready, and you won’t experience any service interruptions.
    5. Do I need professional movers for a short move from an apartment to a house?
    Even if you’re moving just a few blocks, a professional moving team makes the process faster, safer, and far less stressful. We handle the heavy lifting, stairs, tight corners, and transportation logistics, so you don’t have to. Our experience ensures that your belongings arrive safely, regardless of the distance.

    GuidesTips

    by ArchEyes Team
    Leave a comment
    #how #move #apartment #house #stepbystep
    How to Move from an Apartment to a House: A Step-by-Step Guide
    House in Palm Springs | © Sydney Turturro via Unsplash Moving from an apartment to a house is a major life milestone. It usually means more space, more responsibility, and more freedom. But unless you plan it right, it can also come with more stress.  Whether upgrading to accommodate a growing family or simply looking for more room to breathe, here are five essential steps to help you move from an apartment to a house confidently and easily. 1. Start with a Clear Plan and Timeline One of the most common mistakes people make when moving from an apartment to a house is underestimating how long it takes. It’s not just about packing up your belongings; it’s about handling logistics, paperwork, and scheduling around daily life.  As soon as you know your moving date, create a moving checklist.  Outline what needs to be done weekly: notifying your landlord, scheduling the elevator if you’re in a high-rise, collecting packing materials, and booking your moving company. Planning ahead helps you avoid last-minute stress and unexpected costs. If possible, give yourself at least 6–8 weeks. That gives you enough time to declutter, coordinate with service providers, and ensure you’re fully prepared for move-in day. The earlier you start, the smoother everything flows. Hiring professional movers early in the process can also secure your preferred date and provide access to helpful services, such as packing, storage, or specialized transportation. With everything scheduled well in advance, you’ll have the peace of mind needed to focus on your new adventure. 2. Downsize Before You Upsize It may sound counterintuitive, but moving to a bigger space doesn’t mean you should bring everything with you.  Over time, we accumulate furniture, clothes, gadgets, and kitchen tools that serve little purpose. And in a small apartment, many of these items might have been crammed into closets or storage bins and forgotten altogether.  Now’s the perfect time to declutter and lighten the load before the move. Start by walking through your apartment and taking stock of everything. Ask yourself what truly adds value to your life and what’s just taking up space. If you haven’t used something in over a year, it’s probably safe to let it go. You can donate, sell, or recycle items as needed. A good rule of thumb is to be ruthless. A cleaner move means a cleaner start in your new home. By purging the excess, you’ll reduce moving costs and arrive at your new house with a fresh mindset. There’s no sense in transporting items you no longer want or need. Instead, you’ll be able to unpack more quickly and enjoy your new space without clutter. 3. Prepare for a Different Kind of Space Living in a house is very different from apartment life. The layout, square footage, and storage options all change, which means your furniture and lifestyle habits may also need to adapt. That cozy loveseat that fits perfectly in your apartment living room might look dwarfed in a larger house.  Before moving, visit the house if possible and take room measurements.  Consider creating a rough floor plan to determine where each piece of furniture will fit. This not only helps your local movers place items on move-in day, but it also ensures you don’t waste time and energy relocating things that won’t work in the new space. Apps and online tools can help you visualize your layout ahead of time. Beyond furniture, also think about what your new home may need.  Will you have a backyard that needs maintenance? A garage that requires storage shelving? An extra guest room or home office that needs furnishing?  While you don’t have to buy everything at once, it’s smart to budget for future purchases so you can comfortably and intentionally grow into your home. 4. Handle Utilities, Address Changes, and Logistics © Peter Thomas via Unsplash © Mitch via Unsplash Unlike apartments, where utilities may be partially covered or managed by the landlord, houses typically require you to set up and manage everything yourself.  This includes electricity, water, gas, internet, trash collection, and sometimes even lawn care services. Don’t wait until the last minute; contact providers at least a week before your move to schedule installation or transfers. At the same time, update your address with your bank, subscription services, and relevant government agencies. This helps ensure you continue to receive important mail and prevents service disruptions. If you’re moving within the same city, this can be fairly straightforward. If you’re moving to a different region or province, however, make sure you check for local utility providers and regional services. Elevator bookings and parking permits are other key details to address, especially when moving out of an apartment in a busy area.  Confirm all building rules and moving hours in advance, and inform your movers so they can plan accordingly. Clear communication on these details makes the moving day smoother for everyone involved. 5. Rely on a Trusted Moving Partner Perhaps the most important step in this process is choosing the right moving company.  Apartment-to-house moves require experience, careful coordination, and physical effort, especially when dealing with tight stairwells, narrow hallways, or long distances from the apartment to the truck.  A professional moving team can handle the logistics efficiently while protecting your belongings from damage. Instead of doing it all yourself, you can count on us to carry the load literally. We bring the right equipment, vehicles, and muscle, so you don’t have to worry about heavy lifting or unexpected delays. More importantly, we offer peace of mind during an exciting and overwhelming time. A good moving experience sets the tone for your new chapter. Let us help make that transition smooth, stress-free, and even enjoyable. Final Word Moving from an apartment to a house is more than just a physical shift; it’s a lifestyle change. With the right planning, thoughtful decisions, and support from experienced movers, you can make the process simple and even fun. Whether it’s your first home or your dream upgrade, we’re here to guide you every step of the way. Frequently Asked Questions  1. How far in advance should I book a moving company when moving from an apartment to a house? We recommend booking your moving company at least 4–6 weeks in advance, especially during peak moving seasons. This gives you the best chance to secure your preferred date and time while also allowing time for proper planning, packing, and coordination with building management if needed. 2. What’s the best way to downsize before moving into a house? Even though you’re moving to a larger space, it’s wise to declutter before your move. Sort items by category, keep, donate, sell, or discard, and be honest about what you actually use. Unused furniture, duplicate kitchenware, and old clothes often don’t need to make the move. A lighter load means a faster, more affordable, and more organized transition. 3. Will all my apartment furniture fit properly in a house?  Some furniture from a compact apartment may not always feel too small or awkward in a larger home. We recommend measuring key pieces and comparing them with the dimensions of the new space before moving. Our team can help you decide what’s worth moving and even assist with layout planning to ensure everything fits where it should. 4. What should I do about utilities when moving into a house?  Unlike apartment living, homeowners are responsible for setting up all their utilities individually. Be sure to contact providers for electricity, water, internet, gas, and waste collection at least a week before your move. Scheduling ahead ensures your new home is move-in ready, and you won’t experience any service interruptions. 5. Do I need professional movers for a short move from an apartment to a house? Even if you’re moving just a few blocks, a professional moving team makes the process faster, safer, and far less stressful. We handle the heavy lifting, stairs, tight corners, and transportation logistics, so you don’t have to. Our experience ensures that your belongings arrive safely, regardless of the distance. GuidesTips by ArchEyes Team Leave a comment #how #move #apartment #house #stepbystep
    ARCHEYES.COM
    How to Move from an Apartment to a House: A Step-by-Step Guide
    House in Palm Springs | © Sydney Turturro via Unsplash Moving from an apartment to a house is a major life milestone. It usually means more space, more responsibility, and more freedom. But unless you plan it right, it can also come with more stress.  Whether upgrading to accommodate a growing family or simply looking for more room to breathe, here are five essential steps to help you move from an apartment to a house confidently and easily. 1. Start with a Clear Plan and Timeline One of the most common mistakes people make when moving from an apartment to a house is underestimating how long it takes. It’s not just about packing up your belongings; it’s about handling logistics, paperwork, and scheduling around daily life.  As soon as you know your moving date, create a moving checklist.  Outline what needs to be done weekly: notifying your landlord, scheduling the elevator if you’re in a high-rise, collecting packing materials, and booking your moving company. Planning ahead helps you avoid last-minute stress and unexpected costs. If possible, give yourself at least 6–8 weeks. That gives you enough time to declutter, coordinate with service providers, and ensure you’re fully prepared for move-in day. The earlier you start, the smoother everything flows. Hiring professional movers early in the process can also secure your preferred date and provide access to helpful services, such as packing, storage, or specialized transportation. With everything scheduled well in advance, you’ll have the peace of mind needed to focus on your new adventure. 2. Downsize Before You Upsize It may sound counterintuitive, but moving to a bigger space doesn’t mean you should bring everything with you.  Over time, we accumulate furniture, clothes, gadgets, and kitchen tools that serve little purpose. And in a small apartment, many of these items might have been crammed into closets or storage bins and forgotten altogether.  Now’s the perfect time to declutter and lighten the load before the move. Start by walking through your apartment and taking stock of everything. Ask yourself what truly adds value to your life and what’s just taking up space. If you haven’t used something in over a year, it’s probably safe to let it go. You can donate, sell, or recycle items as needed. A good rule of thumb is to be ruthless. A cleaner move means a cleaner start in your new home. By purging the excess, you’ll reduce moving costs and arrive at your new house with a fresh mindset. There’s no sense in transporting items you no longer want or need. Instead, you’ll be able to unpack more quickly and enjoy your new space without clutter. 3. Prepare for a Different Kind of Space Living in a house is very different from apartment life. The layout, square footage, and storage options all change, which means your furniture and lifestyle habits may also need to adapt. That cozy loveseat that fits perfectly in your apartment living room might look dwarfed in a larger house.  Before moving, visit the house if possible and take room measurements.  Consider creating a rough floor plan to determine where each piece of furniture will fit. This not only helps your local movers place items on move-in day, but it also ensures you don’t waste time and energy relocating things that won’t work in the new space. Apps and online tools can help you visualize your layout ahead of time. Beyond furniture, also think about what your new home may need.  Will you have a backyard that needs maintenance? A garage that requires storage shelving? An extra guest room or home office that needs furnishing?  While you don’t have to buy everything at once, it’s smart to budget for future purchases so you can comfortably and intentionally grow into your home. 4. Handle Utilities, Address Changes, and Logistics © Peter Thomas via Unsplash © Mitch via Unsplash Unlike apartments, where utilities may be partially covered or managed by the landlord, houses typically require you to set up and manage everything yourself.  This includes electricity, water, gas, internet, trash collection, and sometimes even lawn care services. Don’t wait until the last minute; contact providers at least a week before your move to schedule installation or transfers. At the same time, update your address with your bank, subscription services, and relevant government agencies. This helps ensure you continue to receive important mail and prevents service disruptions. If you’re moving within the same city, this can be fairly straightforward. If you’re moving to a different region or province, however, make sure you check for local utility providers and regional services. Elevator bookings and parking permits are other key details to address, especially when moving out of an apartment in a busy area.  Confirm all building rules and moving hours in advance, and inform your movers so they can plan accordingly. Clear communication on these details makes the moving day smoother for everyone involved. 5. Rely on a Trusted Moving Partner Perhaps the most important step in this process is choosing the right moving company.  Apartment-to-house moves require experience, careful coordination, and physical effort, especially when dealing with tight stairwells, narrow hallways, or long distances from the apartment to the truck.  A professional moving team can handle the logistics efficiently while protecting your belongings from damage. Instead of doing it all yourself, you can count on us to carry the load literally. We bring the right equipment, vehicles, and muscle, so you don’t have to worry about heavy lifting or unexpected delays. More importantly, we offer peace of mind during an exciting and overwhelming time. A good moving experience sets the tone for your new chapter. Let us help make that transition smooth, stress-free, and even enjoyable. Final Word Moving from an apartment to a house is more than just a physical shift; it’s a lifestyle change. With the right planning, thoughtful decisions, and support from experienced movers, you can make the process simple and even fun. Whether it’s your first home or your dream upgrade, we’re here to guide you every step of the way. Frequently Asked Questions  1. How far in advance should I book a moving company when moving from an apartment to a house? We recommend booking your moving company at least 4–6 weeks in advance, especially during peak moving seasons (spring and summer). This gives you the best chance to secure your preferred date and time while also allowing time for proper planning, packing, and coordination with building management if needed. 2. What’s the best way to downsize before moving into a house? Even though you’re moving to a larger space, it’s wise to declutter before your move. Sort items by category, keep, donate, sell, or discard, and be honest about what you actually use. Unused furniture, duplicate kitchenware, and old clothes often don’t need to make the move. A lighter load means a faster, more affordable, and more organized transition. 3. Will all my apartment furniture fit properly in a house?  Some furniture from a compact apartment may not always feel too small or awkward in a larger home. We recommend measuring key pieces and comparing them with the dimensions of the new space before moving. Our team can help you decide what’s worth moving and even assist with layout planning to ensure everything fits where it should. 4. What should I do about utilities when moving into a house?  Unlike apartment living, homeowners are responsible for setting up all their utilities individually. Be sure to contact providers for electricity, water, internet, gas, and waste collection at least a week before your move. Scheduling ahead ensures your new home is move-in ready, and you won’t experience any service interruptions. 5. Do I need professional movers for a short move from an apartment to a house? Even if you’re moving just a few blocks, a professional moving team makes the process faster, safer, and far less stressful. We handle the heavy lifting, stairs, tight corners, and transportation logistics, so you don’t have to. Our experience ensures that your belongings arrive safely, regardless of the distance. GuidesTips by ArchEyes Team Leave a comment
    Like
    Love
    Wow
    Sad
    Angry
    286
    0 Comentários 0 Compartilhamentos
  • The Wellness Industry Is Coming for Your Kitchen

    A Peloton perched in the living room. A set of weights on the bedroom floor. Some wellness products have a way of making their presence known. But even the smaller things—think daily supplements, mushroom tinctures, herbal teas—can slowly start to sprawl out everywhere. With the rise and awareness of holistic health habits, wellness routines that rival your skincare shelf, and obsessions like ProteinTok—a whole corner of the internet dedicated to everything protein—you might find that wellness has taken over your kitchen. Suddenly, your blender is battling for space with the hydration powders, collagen tubs, and stacks of snack bars. If you don’t have a place to properly store it all, your kitchen can start to be more overwhelming than calming. But with thoughtful design, proper planning, and smart storage solutions, you can integrate it all into your home in a way that feels serene and seamless. We asked designers and wellness experts how they manage their ever-expanding collection of products and design their kitchens with well-being in mind.Consider An Appliance GarageTessa NeustadtGreen cabinet doors conceal the appliances in this kitchen by Interior Archaeology.“For things that need to be in reach and on the counter, we put everything in an appliance garage,” shares Lynn Kloythanomsup of Landed Interiors and Homes. By that she means is a built-in cabinet or nook—typically integrated into the cabinetry—that features a door that lifts, rolls, or swings open and shut to conceal bulky appliances. Designer Hollie Velten of Spaces by Hollie Velten is also a fan of this feature and notices more clients requesting it. “A custom appliance garage allows things like tea supplies to be accessible for entertaining but hidden for everyday use.”It’s not just designers who advocate for this intentional placement—wellness experts themselves are just as mindful of it. “Our juicer must be on the countertop to make juicing as effortless as possible but other appliances are fine tucked away,” says health coach and nutritionist Daphne Javtich of Doing Well. Kerrilynn Pamer of Cap Beauty echoes this: “I keep my juicer on the counter, I have a Nama, and it’s pretty discreet even though it's large. Everything else, I keep behind doors.”Think Beyond The Main KitchenStacy Zarin GoldbergThis auxiliary kitchen by Kate Abt Design makes a perfect spot for wellness essentials.One luxury feature on the rise? Auxiliary kitchens, also known as dirty kitchens. “When designing for clients, we almost always have the ‘family’ or ‘show’ kitchen and then a second kitchen where the real cooking happens,” says Eric Egan of Eric Egan Interior Design. “This is much like in a restaurant show kitchen, where you see them finishing the meals, but you don't see the prep work or the clean up, all of which happens in the background.” Designer Sarah Barnard of Sarah Barnard Design has also seen an increase in the request of auxiliary kitchens and loves them because they “provide concealed storage for juicers, blenders, dehydrators, and food processors.” While two kitchens might not be realistic for everyone, if you have access to a nice-sized pantry or closet nearby, that’s an ideal spot to corral it all, as well. Rethink Unused SpacesKEVIN MIYAZAKIRemove the booze, bring in the blender, and this liquor cabinet, in a library designed by Kate Marker, could be a wellness station.Speaking of ideal spots for wellness, consider transforming underutilized spaces like liquor cabinets or part of a mudroom into a wellness hub. “We don't find that too many of our clients have a liquor cabinet or use a bar anymore,” shares Kloythanomsup. “So that area can be repurposed as a wellness area.” While you're repurposing it, consider where you can plug in all those wellness appliances. “Clients are also asking us to design technology-stations, so they have multiple areas to hide their technology and free their view of cords and distractions,” Velten says. Get In The ZoneEmma Farrer//Getty ImagesA dedicated tea zone.If you are going to dedicate counter space to your wellness routine, whether it’s a juicing zone, smoothie station, a hydration corner—keep things arranged in groups or zones. “I keep the bulk of my supplements and remedies in a large, shallow pullout drawer in the kitchen,” Javitch shares. “I find this is the easiest way to organize and find products quickly. And you don't have to remove some to get to others.”“I love setting up thoughtful, dedicated zones, like a wellness drawer with teas, vitamins, and tinctures all in one place, or a water station with a glass water pitcher, reusable bottles, and electrolytes,” shares Blakey. Keeping similar items together allows products to stay top of mind and prevents them from getting lost in the shuffle. Contain YourselfCourtesy Holly BlakeyA pantry organized by Holly Blakey of Breathing Room Home.While baskets are a no-brainer for kitchen organization, designers and experts say that’s for good reason, advising homeowners not to overlook them—and to keep the materials as natural as possible. “Wooden bins are another favorite way to add warmth and style while keeping items grouped,” Blakey says. Velten seconds the idea of rush baskets or wooden bins, “We try to push living finishes as much as we can because with proper care, material that came from the earth just vibrates differently.” No matter how many products you use or how dialed-in your routine may be, “wellness becomes part of the daily flow when your space helps you follow through on your intentions,” says Blakey. For that reason, says Javitch, “I always keep a few small baskets in our cabinets with products I often grab for like the kids' sunblock stick or their multivitamin gummies.”Show Off Your Stash Thomas LeonczikHollie Velten designed this kitchen to keep essentials on view. The alternative to hiding things away? Showing them off! “We worked with a client who described her kitchen goals as ‘California health kitchen,’” shares Velten. “We actually removed the upper cabinets to create an easy-to-access corner of shelving to hold glass jars and sustainable practices for her teas, herbs, spices, tinctures, and other food prep essentials.” After all, some items deserve to be seen—not only from an aesthetic perspective but also to prompt daily use and consistency. “I’ll usually keep my essential daily products on a pretty wood tray on the kitchen counter,” Javtich shares.If you are going to keep things out in the open, Bay Area-based organizer of Breathing Room Home Holly Blakey, says clarity is key. “I swear by glass containers for food storage, not just for sustainability, but because they help you know what you have and when you can clearly see your items, you’re more likely to use them before they expire.”Plus, this keep-it-all-out method a way to incorporate your personal preferences and add a little personality into your kitchen. “Sometimes well-kept essentials really only bring more joy and utility when out in the open,” Velten adds. Follow House Beautiful on Instagram and TikTok.
    #wellness #industry #coming #your #kitchen
    The Wellness Industry Is Coming for Your Kitchen
    A Peloton perched in the living room. A set of weights on the bedroom floor. Some wellness products have a way of making their presence known. But even the smaller things—think daily supplements, mushroom tinctures, herbal teas—can slowly start to sprawl out everywhere. With the rise and awareness of holistic health habits, wellness routines that rival your skincare shelf, and obsessions like ProteinTok—a whole corner of the internet dedicated to everything protein—you might find that wellness has taken over your kitchen. Suddenly, your blender is battling for space with the hydration powders, collagen tubs, and stacks of snack bars. If you don’t have a place to properly store it all, your kitchen can start to be more overwhelming than calming. But with thoughtful design, proper planning, and smart storage solutions, you can integrate it all into your home in a way that feels serene and seamless. We asked designers and wellness experts how they manage their ever-expanding collection of products and design their kitchens with well-being in mind.Consider An Appliance GarageTessa NeustadtGreen cabinet doors conceal the appliances in this kitchen by Interior Archaeology.“For things that need to be in reach and on the counter, we put everything in an appliance garage,” shares Lynn Kloythanomsup of Landed Interiors and Homes. By that she means is a built-in cabinet or nook—typically integrated into the cabinetry—that features a door that lifts, rolls, or swings open and shut to conceal bulky appliances. Designer Hollie Velten of Spaces by Hollie Velten is also a fan of this feature and notices more clients requesting it. “A custom appliance garage allows things like tea supplies to be accessible for entertaining but hidden for everyday use.”It’s not just designers who advocate for this intentional placement—wellness experts themselves are just as mindful of it. “Our juicer must be on the countertop to make juicing as effortless as possible but other appliances are fine tucked away,” says health coach and nutritionist Daphne Javtich of Doing Well. Kerrilynn Pamer of Cap Beauty echoes this: “I keep my juicer on the counter, I have a Nama, and it’s pretty discreet even though it's large. Everything else, I keep behind doors.”Think Beyond The Main KitchenStacy Zarin GoldbergThis auxiliary kitchen by Kate Abt Design makes a perfect spot for wellness essentials.One luxury feature on the rise? Auxiliary kitchens, also known as dirty kitchens. “When designing for clients, we almost always have the ‘family’ or ‘show’ kitchen and then a second kitchen where the real cooking happens,” says Eric Egan of Eric Egan Interior Design. “This is much like in a restaurant show kitchen, where you see them finishing the meals, but you don't see the prep work or the clean up, all of which happens in the background.” Designer Sarah Barnard of Sarah Barnard Design has also seen an increase in the request of auxiliary kitchens and loves them because they “provide concealed storage for juicers, blenders, dehydrators, and food processors.” While two kitchens might not be realistic for everyone, if you have access to a nice-sized pantry or closet nearby, that’s an ideal spot to corral it all, as well. Rethink Unused SpacesKEVIN MIYAZAKIRemove the booze, bring in the blender, and this liquor cabinet, in a library designed by Kate Marker, could be a wellness station.Speaking of ideal spots for wellness, consider transforming underutilized spaces like liquor cabinets or part of a mudroom into a wellness hub. “We don't find that too many of our clients have a liquor cabinet or use a bar anymore,” shares Kloythanomsup. “So that area can be repurposed as a wellness area.” While you're repurposing it, consider where you can plug in all those wellness appliances. “Clients are also asking us to design technology-stations, so they have multiple areas to hide their technology and free their view of cords and distractions,” Velten says. Get In The ZoneEmma Farrer//Getty ImagesA dedicated tea zone.If you are going to dedicate counter space to your wellness routine, whether it’s a juicing zone, smoothie station, a hydration corner—keep things arranged in groups or zones. “I keep the bulk of my supplements and remedies in a large, shallow pullout drawer in the kitchen,” Javitch shares. “I find this is the easiest way to organize and find products quickly. And you don't have to remove some to get to others.”“I love setting up thoughtful, dedicated zones, like a wellness drawer with teas, vitamins, and tinctures all in one place, or a water station with a glass water pitcher, reusable bottles, and electrolytes,” shares Blakey. Keeping similar items together allows products to stay top of mind and prevents them from getting lost in the shuffle. Contain YourselfCourtesy Holly BlakeyA pantry organized by Holly Blakey of Breathing Room Home.While baskets are a no-brainer for kitchen organization, designers and experts say that’s for good reason, advising homeowners not to overlook them—and to keep the materials as natural as possible. “Wooden bins are another favorite way to add warmth and style while keeping items grouped,” Blakey says. Velten seconds the idea of rush baskets or wooden bins, “We try to push living finishes as much as we can because with proper care, material that came from the earth just vibrates differently.” No matter how many products you use or how dialed-in your routine may be, “wellness becomes part of the daily flow when your space helps you follow through on your intentions,” says Blakey. For that reason, says Javitch, “I always keep a few small baskets in our cabinets with products I often grab for like the kids' sunblock stick or their multivitamin gummies.”Show Off Your Stash Thomas LeonczikHollie Velten designed this kitchen to keep essentials on view. The alternative to hiding things away? Showing them off! “We worked with a client who described her kitchen goals as ‘California health kitchen,’” shares Velten. “We actually removed the upper cabinets to create an easy-to-access corner of shelving to hold glass jars and sustainable practices for her teas, herbs, spices, tinctures, and other food prep essentials.” After all, some items deserve to be seen—not only from an aesthetic perspective but also to prompt daily use and consistency. “I’ll usually keep my essential daily products on a pretty wood tray on the kitchen counter,” Javtich shares.If you are going to keep things out in the open, Bay Area-based organizer of Breathing Room Home Holly Blakey, says clarity is key. “I swear by glass containers for food storage, not just for sustainability, but because they help you know what you have and when you can clearly see your items, you’re more likely to use them before they expire.”Plus, this keep-it-all-out method a way to incorporate your personal preferences and add a little personality into your kitchen. “Sometimes well-kept essentials really only bring more joy and utility when out in the open,” Velten adds. Follow House Beautiful on Instagram and TikTok. #wellness #industry #coming #your #kitchen
    WWW.HOUSEBEAUTIFUL.COM
    The Wellness Industry Is Coming for Your Kitchen
    A Peloton perched in the living room. A set of weights on the bedroom floor. Some wellness products have a way of making their presence known. But even the smaller things—think daily supplements, mushroom tinctures, herbal teas—can slowly start to sprawl out everywhere. With the rise and awareness of holistic health habits, wellness routines that rival your skincare shelf, and obsessions like ProteinTok—a whole corner of the internet dedicated to everything protein—you might find that wellness has taken over your kitchen. Suddenly, your blender is battling for space with the hydration powders, collagen tubs, and stacks of snack bars. If you don’t have a place to properly store it all, your kitchen can start to be more overwhelming than calming. But with thoughtful design, proper planning, and smart storage solutions, you can integrate it all into your home in a way that feels serene and seamless. We asked designers and wellness experts how they manage their ever-expanding collection of products and design their kitchens with well-being in mind.Consider An Appliance GarageTessa NeustadtGreen cabinet doors conceal the appliances in this kitchen by Interior Archaeology.“For things that need to be in reach and on the counter, we put everything in an appliance garage,” shares Lynn Kloythanomsup of Landed Interiors and Homes. By that she means is a built-in cabinet or nook—typically integrated into the cabinetry—that features a door that lifts, rolls, or swings open and shut to conceal bulky appliances. Designer Hollie Velten of Spaces by Hollie Velten is also a fan of this feature and notices more clients requesting it. “A custom appliance garage allows things like tea supplies to be accessible for entertaining but hidden for everyday use.”It’s not just designers who advocate for this intentional placement—wellness experts themselves are just as mindful of it. “Our juicer must be on the countertop to make juicing as effortless as possible but other appliances are fine tucked away,” says health coach and nutritionist Daphne Javtich of Doing Well. Kerrilynn Pamer of Cap Beauty echoes this: “I keep my juicer on the counter, I have a Nama, and it’s pretty discreet even though it's large. Everything else, I keep behind doors.”Think Beyond The Main KitchenStacy Zarin GoldbergThis auxiliary kitchen by Kate Abt Design makes a perfect spot for wellness essentials.One luxury feature on the rise? Auxiliary kitchens, also known as dirty kitchens. “When designing for clients, we almost always have the ‘family’ or ‘show’ kitchen and then a second kitchen where the real cooking happens,” says Eric Egan of Eric Egan Interior Design. “This is much like in a restaurant show kitchen, where you see them finishing the meals, but you don't see the prep work or the clean up, all of which happens in the background.” Designer Sarah Barnard of Sarah Barnard Design has also seen an increase in the request of auxiliary kitchens and loves them because they “provide concealed storage for juicers, blenders, dehydrators, and food processors.” While two kitchens might not be realistic for everyone, if you have access to a nice-sized pantry or closet nearby, that’s an ideal spot to corral it all, as well. Rethink Unused SpacesKEVIN MIYAZAKIRemove the booze, bring in the blender, and this liquor cabinet, in a library designed by Kate Marker, could be a wellness station.Speaking of ideal spots for wellness, consider transforming underutilized spaces like liquor cabinets or part of a mudroom into a wellness hub. “We don't find that too many of our clients have a liquor cabinet or use a bar anymore,” shares Kloythanomsup. “So that area can be repurposed as a wellness area.” While you're repurposing it, consider where you can plug in all those wellness appliances. “Clients are also asking us to design technology-stations, so they have multiple areas to hide their technology and free their view of cords and distractions,” Velten says. Get In The ZoneEmma Farrer//Getty ImagesA dedicated tea zone.If you are going to dedicate counter space to your wellness routine, whether it’s a juicing zone, smoothie station, a hydration corner—keep things arranged in groups or zones. “I keep the bulk of my supplements and remedies in a large, shallow pullout drawer in the kitchen,” Javitch shares. “I find this is the easiest way to organize and find products quickly. And you don't have to remove some to get to others.”“I love setting up thoughtful, dedicated zones, like a wellness drawer with teas, vitamins, and tinctures all in one place, or a water station with a glass water pitcher, reusable bottles, and electrolytes,” shares Blakey. Keeping similar items together allows products to stay top of mind and prevents them from getting lost in the shuffle. Contain YourselfCourtesy Holly BlakeyA pantry organized by Holly Blakey of Breathing Room Home.While baskets are a no-brainer for kitchen organization, designers and experts say that’s for good reason, advising homeowners not to overlook them—and to keep the materials as natural as possible. “Wooden bins are another favorite way to add warmth and style while keeping items grouped,” Blakey says. Velten seconds the idea of rush baskets or wooden bins, “We try to push living finishes as much as we can because with proper care, material that came from the earth just vibrates differently.” No matter how many products you use or how dialed-in your routine may be, “wellness becomes part of the daily flow when your space helps you follow through on your intentions,” says Blakey. For that reason, says Javitch, “I always keep a few small baskets in our cabinets with products I often grab for like the kids' sunblock stick or their multivitamin gummies.”Show Off Your Stash Thomas LeonczikHollie Velten designed this kitchen to keep essentials on view. The alternative to hiding things away? Showing them off! “We worked with a client who described her kitchen goals as ‘California health kitchen,’” shares Velten. “We actually removed the upper cabinets to create an easy-to-access corner of shelving to hold glass jars and sustainable practices for her teas, herbs, spices, tinctures, and other food prep essentials.” After all, some items deserve to be seen—not only from an aesthetic perspective but also to prompt daily use and consistency. “I’ll usually keep my essential daily products on a pretty wood tray on the kitchen counter,” Javtich shares.If you are going to keep things out in the open, Bay Area-based organizer of Breathing Room Home Holly Blakey, says clarity is key. “I swear by glass containers for food storage, not just for sustainability, but because they help you know what you have and when you can clearly see your items, you’re more likely to use them before they expire.”Plus, this keep-it-all-out method a way to incorporate your personal preferences and add a little personality into your kitchen. “Sometimes well-kept essentials really only bring more joy and utility when out in the open,” Velten adds. Follow House Beautiful on Instagram and TikTok.
    Like
    Love
    Wow
    Sad
    Angry
    378
    0 Comentários 0 Compartilhamentos
  • Op-Ed: Could Canada benefit from adopting Finland’s architectural competition system?

    As a Canadian who has spent the last two and a half years working as an intern architect in Helsinki, these questions have been on my mind. In my current role, I have had the opportunity to participate in numerous architectural competitions arranged by Finnish municipalities and public institutions. It has been my observation that the Finnish system of open, anonymous architectural competitions consistently produces elegant and highly functional public buildings at reasonable cost and at great benefit to the lives of the everyday people for whom the projects are intended to serve. Could Canada benefit from the adoption of a similar model?
    ‘Public project’ has never been a clearly defined term and may bring to mind the image of a bustling library for some while conjuring the image of a municipal power substation for others. In the context of this discussion, I will use the term to refer to projects that are explicitly in-service of the broader public such as community centres, museums, and other cultural venues.
    Finland’s architectural competition system
    Frequented by nearly 2 million visitors per year, the Oodi Central Library in Helsinki, Finland, has become a thriving cultural hub and an internationally recognized symbol of Finnish design innovation. Designed by ALA Architects, the project was procured through a 2-stage, open, international architectural competition. Photo by NinaraIn Finland, most notable public projects begin with an architectural competition. Some are limited to invited participants only, but the majority of these competitions are open to international submissions. Importantly, the authors of any given proposal remain anonymous with regards to the jury. This ensures that all proposals are evaluated purely on quality without bias towards established firms over lesser known competitors. The project budget is known in advance to the competition entrants and cost feasibility is an important factor weighed by the jury. However, the cost for the design services to be procured from the winning entry is fixed ahead of time, preventing companies from lowballing offers in the hopes of securing an interesting commission despite the inevitable compromises in quality that come with under-resourced design work. The result: inspired, functional public spaces are the norm, not the exception. Contrasted against the sea of forgettable public architecture to be found in cities large and small across Canada, the Finnish model paints a utopic picture.
    Several award-winning projects in my current place of employment in Helsinki have been the result of successes in open architectural competitions. The origin of the firm itself stemmed from a winning competition entry for a church in a small village submitted by the firm’s founder while he was still completing his architectural studies.  At that time, many architecture firms in Finland were founded in this manner with the publicity of a competition win serving as a career launching off point for young architects. While less common today, many students and recent graduates still participate in these design competitions. On the occasion that a young practitioner wins a competition, they are required to assemble a team with the necessary expertise and qualifications to satisfy the requirements of the jury. I believe there is a direct link between the high architectural quality outcomes of these competitions and the fact that they are conducted anonymously. The opening of these competitions to submissions from companies outside of Finland further enhances the diversity of entries and fosters international interest in the goings-on of Finland’s architectural scene. Nonetheless, it is worth acknowledging that exemplary projects have also resulted from invited and privately organized competitions. Ultimately, the mindset of the client, the selection of an appropriate jury, and the existence of sufficient incentives for architects to invest significant time in their proposals play a more critical role in shaping the quality of the final outcome.
    Tikkurila Church and Housing in Vantaa, Finland, hosts a diverse range of functions including a café, community event spaces and student housing. Designed by OOPEAA in collaboration with a local builder, the project was realized as the result of a competition organized by local Finnish and Swedish parishes. Photo by Marc Goodwin
    Finland’s competition system, administered by the Finnish Association of Architects, is not limited to major public projects such as museums, libraries and city halls. A significant number of idea competitions are organized seeking compelling visions for urban masterplans. The quality of this system has received international recognition. To quote a research paper from a Swedish university on the structure, criteria and judgement process of Finnish architectural competitions, “The Finnishexperience can provide a rich information source for scholars and students studying the structure and process of competition system and architectural judgement, as well as those concerned with commissioning and financing of competitions due to innovative solutions found in the realms of urban revitalization, poverty elimination, environmental pollution, cultural and socio-spatial renewals, and democratization of design and planning process.” This has not gone entirely under the radar in Canada. According to the website of the Royal Architectural Institute of Canada, “Competitions are common in countries such as Finland, Ireland, the United Kingdom, Australia, and New Zealand. These competitions have resulted in a high quality of design as well as creating public interest in the role of architecture in national and community life.”
    Canada’s architectural competition system
    In Canada, the RAIC sets general competition guidelines while provincial and territorial architect associations are typically responsible for the oversight of any endorsed architectural competition. Although the idea of implementing European architectural competition models has been gaining traction in recent years, competitions remain relatively rare even for significant public projects. While Canada is yet to fully embrace competition systems as a powerful tool for ensuring higher quality public spaces, success stories from various corners of the country have opened up constructive conversations. In Edmonton, unconventional, competitive procurement efforts spearheaded by city architect Carol Belanger have produced some remarkable public buildings. This has not gone unnoticed in other parts of the country where consistent banality is the norm for public projects.
    Jasper Place Branch Library designed by HCMA and Dub Architects is one of several striking projects in Edmonton built under reimagined commissioning processes which broaden the pool of design practices eligible to participate and give greater weight to design quality as an evaluation criterion. Photo by Hubert Kang
    The wider applicability of competition systems as a positive mechanism for securing better public architecture has also started to receive broader discussion. In my hometown of Ottawa, this system has been used to procure several powerful monuments and, more recently, to select a design for the redevelopment of a key city block across from Parliament Hill. The volume and quality of entries, including from internationally renowned architectural practices, attests to the strengths of the open competition format.
    Render of the winning entry for the Block 2 Redevelopment in Ottawa. This 2-stage competition was overseen directly by the RAIC. Design and render by Zeidler Architecture Inc. in cooperation with David Chipperfield Architects.
    Despite these successes, there is significant room for improvement. A key barrier to wider adoption of competition practices according to the RAIC is “…that potential sponsors are not familiar with competitions or may consider the competition process to be complicated, expensive, and time consuming.” This is understandable for private actors, but an unsatisfactory answer in the case of public, tax-payer funded projects. Finland’s success has come through the normalization of competitions for public project procurement. We should endeavour to do the same. Maintaining design contribution anonymity prior to jury decision has thus far been the exception, not the norm in Canada. This reduces the credibility of the jury without improving the result. Additionally, the financing of such competitions has been piece-meal and inconsistent. For example, several world-class schools have been realized in Quebec as the result of competitions funded by a provincial investment.  With the depletion of that fund, it is no longer clear if any further schools will be commissioned in Quebec under a similar model. While high quality documentation has been produced, there is a risk that developed expertise will be lost if the team of professionals responsible for overseeing the process is not retained.
    École du Zénith in Shefford, Quebec, designed by Pelletier de Fontenay + Leclerc Architectes is one of six elegant and functional schools commission by the province through an anonymous competition process. Photo by James Brittain
    A path forward
    Now more than ever, it is essential that our public projects instill in us a sense of pride and reflect our uniquely Canadian values. This will continue to be a rare occurrence until more ambitious measures are taken to ensure the consistent realization of beautiful, innovative and functional public spaces that connect us with one another. In service of this objective, Canada should incentivize architectural competitions by normalizing their use for major public projects such as national museums, libraries and cultural centres. A dedicated Competitions Fund could be established to support provinces, territories and cities who demonstrate initiative in the pursuit of more ambitious, inspiring and equitable public projects. A National Competitions Expert could be appointed to ensure retention and dissemination of expertise. Maintaining the anonymity of competition entrants should be established as the norm. At a moment when talk of removing inter-provincial trade barriers has re-entered public discourse, why not consider striking down red tape that prevents out-of-province firms from participating in architectural competitions? Alas, one can dream. Competitions are no silver bullet. However, recent trials within our borders should give us confidence that architectural competitions are a relatively low-risk, high-reward proposition. To this end, Finland’s open, anonymous competition system offers a compelling case study from which we would be well served to take inspiration.

    Isaac Edmonds is a Canadian working for OOPEAA – Office for Peripheral Architecture in Helsinki, Finland. My observations of the Finnish competition system’s ability to consistently produce functional, beautiful buildings inform my interest in procurement methods that elevate the quality of our shared public realm.
    The post Op-Ed: Could Canada benefit from adopting Finland’s architectural competition system? appeared first on Canadian Architect.
    #oped #could #canada #benefit #adopting
    Op-Ed: Could Canada benefit from adopting Finland’s architectural competition system?
    As a Canadian who has spent the last two and a half years working as an intern architect in Helsinki, these questions have been on my mind. In my current role, I have had the opportunity to participate in numerous architectural competitions arranged by Finnish municipalities and public institutions. It has been my observation that the Finnish system of open, anonymous architectural competitions consistently produces elegant and highly functional public buildings at reasonable cost and at great benefit to the lives of the everyday people for whom the projects are intended to serve. Could Canada benefit from the adoption of a similar model? ‘Public project’ has never been a clearly defined term and may bring to mind the image of a bustling library for some while conjuring the image of a municipal power substation for others. In the context of this discussion, I will use the term to refer to projects that are explicitly in-service of the broader public such as community centres, museums, and other cultural venues. Finland’s architectural competition system Frequented by nearly 2 million visitors per year, the Oodi Central Library in Helsinki, Finland, has become a thriving cultural hub and an internationally recognized symbol of Finnish design innovation. Designed by ALA Architects, the project was procured through a 2-stage, open, international architectural competition. Photo by NinaraIn Finland, most notable public projects begin with an architectural competition. Some are limited to invited participants only, but the majority of these competitions are open to international submissions. Importantly, the authors of any given proposal remain anonymous with regards to the jury. This ensures that all proposals are evaluated purely on quality without bias towards established firms over lesser known competitors. The project budget is known in advance to the competition entrants and cost feasibility is an important factor weighed by the jury. However, the cost for the design services to be procured from the winning entry is fixed ahead of time, preventing companies from lowballing offers in the hopes of securing an interesting commission despite the inevitable compromises in quality that come with under-resourced design work. The result: inspired, functional public spaces are the norm, not the exception. Contrasted against the sea of forgettable public architecture to be found in cities large and small across Canada, the Finnish model paints a utopic picture. Several award-winning projects in my current place of employment in Helsinki have been the result of successes in open architectural competitions. The origin of the firm itself stemmed from a winning competition entry for a church in a small village submitted by the firm’s founder while he was still completing his architectural studies.  At that time, many architecture firms in Finland were founded in this manner with the publicity of a competition win serving as a career launching off point for young architects. While less common today, many students and recent graduates still participate in these design competitions. On the occasion that a young practitioner wins a competition, they are required to assemble a team with the necessary expertise and qualifications to satisfy the requirements of the jury. I believe there is a direct link between the high architectural quality outcomes of these competitions and the fact that they are conducted anonymously. The opening of these competitions to submissions from companies outside of Finland further enhances the diversity of entries and fosters international interest in the goings-on of Finland’s architectural scene. Nonetheless, it is worth acknowledging that exemplary projects have also resulted from invited and privately organized competitions. Ultimately, the mindset of the client, the selection of an appropriate jury, and the existence of sufficient incentives for architects to invest significant time in their proposals play a more critical role in shaping the quality of the final outcome. Tikkurila Church and Housing in Vantaa, Finland, hosts a diverse range of functions including a café, community event spaces and student housing. Designed by OOPEAA in collaboration with a local builder, the project was realized as the result of a competition organized by local Finnish and Swedish parishes. Photo by Marc Goodwin Finland’s competition system, administered by the Finnish Association of Architects, is not limited to major public projects such as museums, libraries and city halls. A significant number of idea competitions are organized seeking compelling visions for urban masterplans. The quality of this system has received international recognition. To quote a research paper from a Swedish university on the structure, criteria and judgement process of Finnish architectural competitions, “The Finnishexperience can provide a rich information source for scholars and students studying the structure and process of competition system and architectural judgement, as well as those concerned with commissioning and financing of competitions due to innovative solutions found in the realms of urban revitalization, poverty elimination, environmental pollution, cultural and socio-spatial renewals, and democratization of design and planning process.” This has not gone entirely under the radar in Canada. According to the website of the Royal Architectural Institute of Canada, “Competitions are common in countries such as Finland, Ireland, the United Kingdom, Australia, and New Zealand. These competitions have resulted in a high quality of design as well as creating public interest in the role of architecture in national and community life.” Canada’s architectural competition system In Canada, the RAIC sets general competition guidelines while provincial and territorial architect associations are typically responsible for the oversight of any endorsed architectural competition. Although the idea of implementing European architectural competition models has been gaining traction in recent years, competitions remain relatively rare even for significant public projects. While Canada is yet to fully embrace competition systems as a powerful tool for ensuring higher quality public spaces, success stories from various corners of the country have opened up constructive conversations. In Edmonton, unconventional, competitive procurement efforts spearheaded by city architect Carol Belanger have produced some remarkable public buildings. This has not gone unnoticed in other parts of the country where consistent banality is the norm for public projects. Jasper Place Branch Library designed by HCMA and Dub Architects is one of several striking projects in Edmonton built under reimagined commissioning processes which broaden the pool of design practices eligible to participate and give greater weight to design quality as an evaluation criterion. Photo by Hubert Kang The wider applicability of competition systems as a positive mechanism for securing better public architecture has also started to receive broader discussion. In my hometown of Ottawa, this system has been used to procure several powerful monuments and, more recently, to select a design for the redevelopment of a key city block across from Parliament Hill. The volume and quality of entries, including from internationally renowned architectural practices, attests to the strengths of the open competition format. Render of the winning entry for the Block 2 Redevelopment in Ottawa. This 2-stage competition was overseen directly by the RAIC. Design and render by Zeidler Architecture Inc. in cooperation with David Chipperfield Architects. Despite these successes, there is significant room for improvement. A key barrier to wider adoption of competition practices according to the RAIC is “…that potential sponsors are not familiar with competitions or may consider the competition process to be complicated, expensive, and time consuming.” This is understandable for private actors, but an unsatisfactory answer in the case of public, tax-payer funded projects. Finland’s success has come through the normalization of competitions for public project procurement. We should endeavour to do the same. Maintaining design contribution anonymity prior to jury decision has thus far been the exception, not the norm in Canada. This reduces the credibility of the jury without improving the result. Additionally, the financing of such competitions has been piece-meal and inconsistent. For example, several world-class schools have been realized in Quebec as the result of competitions funded by a provincial investment.  With the depletion of that fund, it is no longer clear if any further schools will be commissioned in Quebec under a similar model. While high quality documentation has been produced, there is a risk that developed expertise will be lost if the team of professionals responsible for overseeing the process is not retained. École du Zénith in Shefford, Quebec, designed by Pelletier de Fontenay + Leclerc Architectes is one of six elegant and functional schools commission by the province through an anonymous competition process. Photo by James Brittain A path forward Now more than ever, it is essential that our public projects instill in us a sense of pride and reflect our uniquely Canadian values. This will continue to be a rare occurrence until more ambitious measures are taken to ensure the consistent realization of beautiful, innovative and functional public spaces that connect us with one another. In service of this objective, Canada should incentivize architectural competitions by normalizing their use for major public projects such as national museums, libraries and cultural centres. A dedicated Competitions Fund could be established to support provinces, territories and cities who demonstrate initiative in the pursuit of more ambitious, inspiring and equitable public projects. A National Competitions Expert could be appointed to ensure retention and dissemination of expertise. Maintaining the anonymity of competition entrants should be established as the norm. At a moment when talk of removing inter-provincial trade barriers has re-entered public discourse, why not consider striking down red tape that prevents out-of-province firms from participating in architectural competitions? Alas, one can dream. Competitions are no silver bullet. However, recent trials within our borders should give us confidence that architectural competitions are a relatively low-risk, high-reward proposition. To this end, Finland’s open, anonymous competition system offers a compelling case study from which we would be well served to take inspiration. Isaac Edmonds is a Canadian working for OOPEAA – Office for Peripheral Architecture in Helsinki, Finland. My observations of the Finnish competition system’s ability to consistently produce functional, beautiful buildings inform my interest in procurement methods that elevate the quality of our shared public realm. The post Op-Ed: Could Canada benefit from adopting Finland’s architectural competition system? appeared first on Canadian Architect. #oped #could #canada #benefit #adopting
    WWW.CANADIANARCHITECT.COM
    Op-Ed: Could Canada benefit from adopting Finland’s architectural competition system?
    As a Canadian who has spent the last two and a half years working as an intern architect in Helsinki, these questions have been on my mind. In my current role, I have had the opportunity to participate in numerous architectural competitions arranged by Finnish municipalities and public institutions. It has been my observation that the Finnish system of open, anonymous architectural competitions consistently produces elegant and highly functional public buildings at reasonable cost and at great benefit to the lives of the everyday people for whom the projects are intended to serve. Could Canada benefit from the adoption of a similar model? ‘Public project’ has never been a clearly defined term and may bring to mind the image of a bustling library for some while conjuring the image of a municipal power substation for others. In the context of this discussion, I will use the term to refer to projects that are explicitly in-service of the broader public such as community centres, museums, and other cultural venues. Finland’s architectural competition system Frequented by nearly 2 million visitors per year, the Oodi Central Library in Helsinki, Finland, has become a thriving cultural hub and an internationally recognized symbol of Finnish design innovation. Designed by ALA Architects, the project was procured through a 2-stage, open, international architectural competition. Photo by Ninara (flickr, CC BY 2.0) In Finland, most notable public projects begin with an architectural competition. Some are limited to invited participants only, but the majority of these competitions are open to international submissions. Importantly, the authors of any given proposal remain anonymous with regards to the jury. This ensures that all proposals are evaluated purely on quality without bias towards established firms over lesser known competitors. The project budget is known in advance to the competition entrants and cost feasibility is an important factor weighed by the jury. However, the cost for the design services to be procured from the winning entry is fixed ahead of time, preventing companies from lowballing offers in the hopes of securing an interesting commission despite the inevitable compromises in quality that come with under-resourced design work. The result: inspired, functional public spaces are the norm, not the exception. Contrasted against the sea of forgettable public architecture to be found in cities large and small across Canada, the Finnish model paints a utopic picture. Several award-winning projects in my current place of employment in Helsinki have been the result of successes in open architectural competitions. The origin of the firm itself stemmed from a winning competition entry for a church in a small village submitted by the firm’s founder while he was still completing his architectural studies.  At that time, many architecture firms in Finland were founded in this manner with the publicity of a competition win serving as a career launching off point for young architects. While less common today, many students and recent graduates still participate in these design competitions. On the occasion that a young practitioner wins a competition, they are required to assemble a team with the necessary expertise and qualifications to satisfy the requirements of the jury. I believe there is a direct link between the high architectural quality outcomes of these competitions and the fact that they are conducted anonymously. The opening of these competitions to submissions from companies outside of Finland further enhances the diversity of entries and fosters international interest in the goings-on of Finland’s architectural scene. Nonetheless, it is worth acknowledging that exemplary projects have also resulted from invited and privately organized competitions. Ultimately, the mindset of the client, the selection of an appropriate jury, and the existence of sufficient incentives for architects to invest significant time in their proposals play a more critical role in shaping the quality of the final outcome. Tikkurila Church and Housing in Vantaa, Finland, hosts a diverse range of functions including a café, community event spaces and student housing. Designed by OOPEAA in collaboration with a local builder, the project was realized as the result of a competition organized by local Finnish and Swedish parishes. Photo by Marc Goodwin Finland’s competition system, administered by the Finnish Association of Architects (SAFA), is not limited to major public projects such as museums, libraries and city halls. A significant number of idea competitions are organized seeking compelling visions for urban masterplans. The quality of this system has received international recognition. To quote a research paper from a Swedish university on the structure, criteria and judgement process of Finnish architectural competitions, “The Finnish (competition) experience can provide a rich information source for scholars and students studying the structure and process of competition system and architectural judgement, as well as those concerned with commissioning and financing of competitions due to innovative solutions found in the realms of urban revitalization, poverty elimination, environmental pollution, cultural and socio-spatial renewals, and democratization of design and planning process.” This has not gone entirely under the radar in Canada. According to the website of the Royal Architectural Institute of Canada (RAIC), “Competitions are common in countries such as Finland, Ireland, the United Kingdom, Australia, and New Zealand. These competitions have resulted in a high quality of design as well as creating public interest in the role of architecture in national and community life.” Canada’s architectural competition system In Canada, the RAIC sets general competition guidelines while provincial and territorial architect associations are typically responsible for the oversight of any endorsed architectural competition. Although the idea of implementing European architectural competition models has been gaining traction in recent years, competitions remain relatively rare even for significant public projects. While Canada is yet to fully embrace competition systems as a powerful tool for ensuring higher quality public spaces, success stories from various corners of the country have opened up constructive conversations. In Edmonton, unconventional, competitive procurement efforts spearheaded by city architect Carol Belanger have produced some remarkable public buildings. This has not gone unnoticed in other parts of the country where consistent banality is the norm for public projects. Jasper Place Branch Library designed by HCMA and Dub Architects is one of several striking projects in Edmonton built under reimagined commissioning processes which broaden the pool of design practices eligible to participate and give greater weight to design quality as an evaluation criterion. Photo by Hubert Kang The wider applicability of competition systems as a positive mechanism for securing better public architecture has also started to receive broader discussion. In my hometown of Ottawa, this system has been used to procure several powerful monuments and, more recently, to select a design for the redevelopment of a key city block across from Parliament Hill. The volume and quality of entries, including from internationally renowned architectural practices, attests to the strengths of the open competition format. Render of the winning entry for the Block 2 Redevelopment in Ottawa. This 2-stage competition was overseen directly by the RAIC. Design and render by Zeidler Architecture Inc. in cooperation with David Chipperfield Architects. Despite these successes, there is significant room for improvement. A key barrier to wider adoption of competition practices according to the RAIC is “…that potential sponsors are not familiar with competitions or may consider the competition process to be complicated, expensive, and time consuming.” This is understandable for private actors, but an unsatisfactory answer in the case of public, tax-payer funded projects. Finland’s success has come through the normalization of competitions for public project procurement. We should endeavour to do the same. Maintaining design contribution anonymity prior to jury decision has thus far been the exception, not the norm in Canada. This reduces the credibility of the jury without improving the result. Additionally, the financing of such competitions has been piece-meal and inconsistent. For example, several world-class schools have been realized in Quebec as the result of competitions funded by a provincial investment.  With the depletion of that fund, it is no longer clear if any further schools will be commissioned in Quebec under a similar model. While high quality documentation has been produced, there is a risk that developed expertise will be lost if the team of professionals responsible for overseeing the process is not retained. École du Zénith in Shefford, Quebec, designed by Pelletier de Fontenay + Leclerc Architectes is one of six elegant and functional schools commission by the province through an anonymous competition process. Photo by James Brittain A path forward Now more than ever, it is essential that our public projects instill in us a sense of pride and reflect our uniquely Canadian values. This will continue to be a rare occurrence until more ambitious measures are taken to ensure the consistent realization of beautiful, innovative and functional public spaces that connect us with one another. In service of this objective, Canada should incentivize architectural competitions by normalizing their use for major public projects such as national museums, libraries and cultural centres. A dedicated Competitions Fund could be established to support provinces, territories and cities who demonstrate initiative in the pursuit of more ambitious, inspiring and equitable public projects. A National Competitions Expert could be appointed to ensure retention and dissemination of expertise. Maintaining the anonymity of competition entrants should be established as the norm. At a moment when talk of removing inter-provincial trade barriers has re-entered public discourse, why not consider striking down red tape that prevents out-of-province firms from participating in architectural competitions? Alas, one can dream. Competitions are no silver bullet. However, recent trials within our borders should give us confidence that architectural competitions are a relatively low-risk, high-reward proposition. To this end, Finland’s open, anonymous competition system offers a compelling case study from which we would be well served to take inspiration. Isaac Edmonds is a Canadian working for OOPEAA – Office for Peripheral Architecture in Helsinki, Finland. My observations of the Finnish competition system’s ability to consistently produce functional, beautiful buildings inform my interest in procurement methods that elevate the quality of our shared public realm. The post Op-Ed: Could Canada benefit from adopting Finland’s architectural competition system? appeared first on Canadian Architect.
    Like
    Love
    Wow
    Sad
    Angry
    451
    0 Comentários 0 Compartilhamentos