• SAG-AFTRA proposed AI protections will let performers send their digital replicas on strike

    TechTarget and Informa Tech’s Digital Business Combine.TechTarget and InformaTechTarget and Informa Tech’s Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.SAG-AFTRA proposed AI protections will let performers send their digital replicas on strikeSAG-AFTRA proposed AI protections will let performers send their digital replicas on strikeA tentative agreement proposed by the union will also require game studios to secure informed consent from performers when using AI.Chris Kerr, Senior Editor, NewsJune 13, 20251 Min ReadImage via SAG-AFTRAPerformer union SAG-AFTRA has outlined what sort of AI protections have been secured through its new-look Interactive Media Agreement.The union, which this week suspended a year-long strike after finally agreeing terms with game studios signed to the IMA, said the new contract includes "important guardrails and gains around AI" such as the need for informed consent when deploying AI tech and the ability for performers to suspend consent for Digital Replicas during a strike—effectively sending their digital counterparts to the picket line.Compensation gains include the need for collectively-bargained minimums covering the use of Digital Replicas created with IMA-covered performances and higher minimumsfor what SAG-AFTRA calls "Real Time Generation," which is when a Digital Replica-voiced chatbot might be embedded in a video game.Secondary Performance Payments will also require studios to compensate performers when visual performances are reused in additional projects. The tentative agreement has already been approved by the SAG-AFTRA National Board and has now been submitted to union members for ratification.If ratified, it will also provide compounded compensation increases at a rate of 15.17 percent plus additional 3 percent increases in November 2025, November 2026, and November 2027. In addition, the overtime rate maximum for overscale performers will be based on double scale.Related:The full terms off the three-year deal will be released on June 18 alongside other ratification materials. Eligible SAG-AFTRA members will have until 5pm PDT on Wednesday, July 9, to vote on the agreement.  about:Labor & UnionizationAbout the AuthorChris KerrSenior Editor, News, GameDeveloper.comGame Developer news editor Chris Kerr is an award-winning journalist and reporter with over a decade of experience in the game industry. His byline has appeared in notable print and digital publications including Edge, Stuff, Wireframe, International Business Times, and PocketGamer.biz. Throughout his career, Chris has covered major industry events including GDC, PAX Australia, Gamescom, Paris Games Week, and Develop Brighton. He has featured on the judging panel at The Develop Star Awards on multiple occasions and appeared on BBC Radio 5 Live to discuss breaking news.See more from Chris KerrDaily news, dev blogs, and stories from Game Developer straight to your inboxStay UpdatedYou May Also Like
    #sagaftra #proposed #protections #will #let
    SAG-AFTRA proposed AI protections will let performers send their digital replicas on strike
    TechTarget and Informa Tech’s Digital Business Combine.TechTarget and InformaTechTarget and Informa Tech’s Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.SAG-AFTRA proposed AI protections will let performers send their digital replicas on strikeSAG-AFTRA proposed AI protections will let performers send their digital replicas on strikeA tentative agreement proposed by the union will also require game studios to secure informed consent from performers when using AI.Chris Kerr, Senior Editor, NewsJune 13, 20251 Min ReadImage via SAG-AFTRAPerformer union SAG-AFTRA has outlined what sort of AI protections have been secured through its new-look Interactive Media Agreement.The union, which this week suspended a year-long strike after finally agreeing terms with game studios signed to the IMA, said the new contract includes "important guardrails and gains around AI" such as the need for informed consent when deploying AI tech and the ability for performers to suspend consent for Digital Replicas during a strike—effectively sending their digital counterparts to the picket line.Compensation gains include the need for collectively-bargained minimums covering the use of Digital Replicas created with IMA-covered performances and higher minimumsfor what SAG-AFTRA calls "Real Time Generation," which is when a Digital Replica-voiced chatbot might be embedded in a video game.Secondary Performance Payments will also require studios to compensate performers when visual performances are reused in additional projects. The tentative agreement has already been approved by the SAG-AFTRA National Board and has now been submitted to union members for ratification.If ratified, it will also provide compounded compensation increases at a rate of 15.17 percent plus additional 3 percent increases in November 2025, November 2026, and November 2027. In addition, the overtime rate maximum for overscale performers will be based on double scale.Related:The full terms off the three-year deal will be released on June 18 alongside other ratification materials. Eligible SAG-AFTRA members will have until 5pm PDT on Wednesday, July 9, to vote on the agreement.  about:Labor & UnionizationAbout the AuthorChris KerrSenior Editor, News, GameDeveloper.comGame Developer news editor Chris Kerr is an award-winning journalist and reporter with over a decade of experience in the game industry. His byline has appeared in notable print and digital publications including Edge, Stuff, Wireframe, International Business Times, and PocketGamer.biz. Throughout his career, Chris has covered major industry events including GDC, PAX Australia, Gamescom, Paris Games Week, and Develop Brighton. He has featured on the judging panel at The Develop Star Awards on multiple occasions and appeared on BBC Radio 5 Live to discuss breaking news.See more from Chris KerrDaily news, dev blogs, and stories from Game Developer straight to your inboxStay UpdatedYou May Also Like #sagaftra #proposed #protections #will #let
    WWW.GAMEDEVELOPER.COM
    SAG-AFTRA proposed AI protections will let performers send their digital replicas on strike
    TechTarget and Informa Tech’s Digital Business Combine.TechTarget and InformaTechTarget and Informa Tech’s Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.SAG-AFTRA proposed AI protections will let performers send their digital replicas on strikeSAG-AFTRA proposed AI protections will let performers send their digital replicas on strikeA tentative agreement proposed by the union will also require game studios to secure informed consent from performers when using AI.Chris Kerr, Senior Editor, NewsJune 13, 20251 Min ReadImage via SAG-AFTRAPerformer union SAG-AFTRA has outlined what sort of AI protections have been secured through its new-look Interactive Media Agreement (IMA).The union, which this week suspended a year-long strike after finally agreeing terms with game studios signed to the IMA, said the new contract includes "important guardrails and gains around AI" such as the need for informed consent when deploying AI tech and the ability for performers to suspend consent for Digital Replicas during a strike—effectively sending their digital counterparts to the picket line.Compensation gains include the need for collectively-bargained minimums covering the use of Digital Replicas created with IMA-covered performances and higher minimums (7.5x scale) for what SAG-AFTRA calls "Real Time Generation," which is when a Digital Replica-voiced chatbot might be embedded in a video game.Secondary Performance Payments will also require studios to compensate performers when visual performances are reused in additional projects. The tentative agreement has already been approved by the SAG-AFTRA National Board and has now been submitted to union members for ratification.If ratified, it will also provide compounded compensation increases at a rate of 15.17 percent plus additional 3 percent increases in November 2025, November 2026, and November 2027. In addition, the overtime rate maximum for overscale performers will be based on double scale.Related:The full terms off the three-year deal will be released on June 18 alongside other ratification materials. Eligible SAG-AFTRA members will have until 5pm PDT on Wednesday, July 9, to vote on the agreement. Read more about:Labor & UnionizationAbout the AuthorChris KerrSenior Editor, News, GameDeveloper.comGame Developer news editor Chris Kerr is an award-winning journalist and reporter with over a decade of experience in the game industry. His byline has appeared in notable print and digital publications including Edge, Stuff, Wireframe, International Business Times, and PocketGamer.biz. Throughout his career, Chris has covered major industry events including GDC, PAX Australia, Gamescom, Paris Games Week, and Develop Brighton. He has featured on the judging panel at The Develop Star Awards on multiple occasions and appeared on BBC Radio 5 Live to discuss breaking news.See more from Chris KerrDaily news, dev blogs, and stories from Game Developer straight to your inboxStay UpdatedYou May Also Like
    0 Comentários 0 Compartilhamentos
  • Microsoft 365 Word gets SharePoint eSignature, now you can ditch third-party signing tools

    When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

    Microsoft 365 Word gets SharePoint eSignature, now you can ditch third-party signing tools

    Paul Hill

    Neowin
    @ziks_99 ·

    Jun 6, 2025 03:02 EDT

    Microsoft has just announced that it will be rolling out an extremely convenient feature for Microsoft 365 customers who use Word throughout this year. The Redmond giant said that you’ll now be able to use SharePoint’s native eSignature service directly in Microsoft Word.
    The new feature allows customers to request electronic signatures without converting the documents to a PDF or leaving the Word interface, significantly speeding up workflows.
    Microsoft’s integration of eSignatures also allows you to create eSignature templates which will speed up document approvals, eliminate physical signing steps, and help with compliance and security in the Microsoft 365 environment.

    This change has the potential to significantly improve the quality-of-life for those in work finding themselves adding lots of signatures to documents as they will no longer have to export PDFs from Word and apply the signature outside of Word. It’s also key to point out that this feature is integrated natively and is not an extension.
    The move is quite clever from Microsoft, if businesses were using third-party tools to sign their documents, they would no longer need to use these as it’s easier to do it in Word. Not only does it reduce reliance on other tools, it also makes Microsoft’s products more competitive against other office suites such as Google Workspace.
    Streamlined, secure, and compliant
    The new eSignature feature is tightly integrated into Word. It lets you insert signature fields seamlessly into documents and request other people’s signatures, all while remaining in Word. The eSignature feature can be accessed in Word by going to the Insert ribbon.
    When you send a signature request to someone from Word, the recipient will get an automatically generated PDF copy of the Word document to sign. The signed PDF will then be kept in the same SharePoint location as the original Word file. To ensure end-to-end security and compliance, the document never leaves the Microsoft 365 trust boundary.
    For anyone with a repetitive signing process, this integration allows you to turn Word documents into eSignature templates so they can be reused.
    Another feature that Microsoft has built in is audit trail and notifications. Both the senders and signers will get email notifications throughout the entire signing process. Additionally, you can view the activity historyin the signed PDF to check who signed it and when.
    Finally, Microsoft said that administrators will be able to control how the feature is used in Word throughout the organization. They can decide to enable it for specific users via an Office group policy or limit it to particular SharePoint sites. The company said that SharePoint eSignature also lets admins log activities in the Purview Audit log.
    A key security measure included by Microsoft, which was mentioned above, was the Microsoft 365 trust boundary. By keeping documents in this boundary, Microsoft ensures that all organizations can use this feature without worry.
    The inclusion of automatic PDF creation is all a huge benefit to users as it will cut out the step of manual PDF creation. While creating a PDF isn’t complicated, it can be time consuming.
    The eSignature feature looks like a win-win-win for organizations that rely on digital signatures. Not only does it speed things along and remain secure, but it’s also packed with features like tracking, making it really useful and comprehensive.
    When and how your organization gets it
    SharePoint eSignature has started rolling out to Word on the M365 Beta and Current Channels in the United States, Canada, the United Kingdom, Europe, and Australia-Pacific. This phase of the rollout is expected to be completed by early July.
    People in the rest of the world will also be gaining this time-saving feature but it will not reach everyone right away, though Microsoft promises to reach everybody by the end of the year.
    To use the feature, it will need to be enabled by administrators. If you’re an admin who needs to enable this, just go to the M365 Admin Center and enable SharePoint eSignature, ensuring the Word checkbox is selected. Once the service is enabled, apply the “Allow the use of SharePoint eSignature for Microsoft Word” policy. The policy can be enabled via Intune, Group Policy manager, or the Cloud Policy service for Microsoft 365
    Assuming the admins have given permission to use the feature, users will be able to access SharePoint eSignatures on Word Desktop using the Microsoft 365 Current Channel or Beta Channel.
    The main caveats include that the rollout is phased, so you might not get it right away, and it requires IT admins to enable the feature - in which case, it may never get enabled at all.
    Overall, this feature stands to benefit users who sign documents a lot as it can save huge amounts of time cumulatively. It’s also good for Microsoft who increase organizations’ dependence on Word.

    Tags

    Report a problem with article

    Follow @NeowinFeed
    #microsoft #word #gets #sharepoint #esignature
    Microsoft 365 Word gets SharePoint eSignature, now you can ditch third-party signing tools
    When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Microsoft 365 Word gets SharePoint eSignature, now you can ditch third-party signing tools Paul Hill Neowin @ziks_99 · Jun 6, 2025 03:02 EDT Microsoft has just announced that it will be rolling out an extremely convenient feature for Microsoft 365 customers who use Word throughout this year. The Redmond giant said that you’ll now be able to use SharePoint’s native eSignature service directly in Microsoft Word. The new feature allows customers to request electronic signatures without converting the documents to a PDF or leaving the Word interface, significantly speeding up workflows. Microsoft’s integration of eSignatures also allows you to create eSignature templates which will speed up document approvals, eliminate physical signing steps, and help with compliance and security in the Microsoft 365 environment. This change has the potential to significantly improve the quality-of-life for those in work finding themselves adding lots of signatures to documents as they will no longer have to export PDFs from Word and apply the signature outside of Word. It’s also key to point out that this feature is integrated natively and is not an extension. The move is quite clever from Microsoft, if businesses were using third-party tools to sign their documents, they would no longer need to use these as it’s easier to do it in Word. Not only does it reduce reliance on other tools, it also makes Microsoft’s products more competitive against other office suites such as Google Workspace. Streamlined, secure, and compliant The new eSignature feature is tightly integrated into Word. It lets you insert signature fields seamlessly into documents and request other people’s signatures, all while remaining in Word. The eSignature feature can be accessed in Word by going to the Insert ribbon. When you send a signature request to someone from Word, the recipient will get an automatically generated PDF copy of the Word document to sign. The signed PDF will then be kept in the same SharePoint location as the original Word file. To ensure end-to-end security and compliance, the document never leaves the Microsoft 365 trust boundary. For anyone with a repetitive signing process, this integration allows you to turn Word documents into eSignature templates so they can be reused. Another feature that Microsoft has built in is audit trail and notifications. Both the senders and signers will get email notifications throughout the entire signing process. Additionally, you can view the activity historyin the signed PDF to check who signed it and when. Finally, Microsoft said that administrators will be able to control how the feature is used in Word throughout the organization. They can decide to enable it for specific users via an Office group policy or limit it to particular SharePoint sites. The company said that SharePoint eSignature also lets admins log activities in the Purview Audit log. A key security measure included by Microsoft, which was mentioned above, was the Microsoft 365 trust boundary. By keeping documents in this boundary, Microsoft ensures that all organizations can use this feature without worry. The inclusion of automatic PDF creation is all a huge benefit to users as it will cut out the step of manual PDF creation. While creating a PDF isn’t complicated, it can be time consuming. The eSignature feature looks like a win-win-win for organizations that rely on digital signatures. Not only does it speed things along and remain secure, but it’s also packed with features like tracking, making it really useful and comprehensive. When and how your organization gets it SharePoint eSignature has started rolling out to Word on the M365 Beta and Current Channels in the United States, Canada, the United Kingdom, Europe, and Australia-Pacific. This phase of the rollout is expected to be completed by early July. People in the rest of the world will also be gaining this time-saving feature but it will not reach everyone right away, though Microsoft promises to reach everybody by the end of the year. To use the feature, it will need to be enabled by administrators. If you’re an admin who needs to enable this, just go to the M365 Admin Center and enable SharePoint eSignature, ensuring the Word checkbox is selected. Once the service is enabled, apply the “Allow the use of SharePoint eSignature for Microsoft Word” policy. The policy can be enabled via Intune, Group Policy manager, or the Cloud Policy service for Microsoft 365 Assuming the admins have given permission to use the feature, users will be able to access SharePoint eSignatures on Word Desktop using the Microsoft 365 Current Channel or Beta Channel. The main caveats include that the rollout is phased, so you might not get it right away, and it requires IT admins to enable the feature - in which case, it may never get enabled at all. Overall, this feature stands to benefit users who sign documents a lot as it can save huge amounts of time cumulatively. It’s also good for Microsoft who increase organizations’ dependence on Word. Tags Report a problem with article Follow @NeowinFeed #microsoft #word #gets #sharepoint #esignature
    WWW.NEOWIN.NET
    Microsoft 365 Word gets SharePoint eSignature, now you can ditch third-party signing tools
    When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Microsoft 365 Word gets SharePoint eSignature, now you can ditch third-party signing tools Paul Hill Neowin @ziks_99 · Jun 6, 2025 03:02 EDT Microsoft has just announced that it will be rolling out an extremely convenient feature for Microsoft 365 customers who use Word throughout this year. The Redmond giant said that you’ll now be able to use SharePoint’s native eSignature service directly in Microsoft Word. The new feature allows customers to request electronic signatures without converting the documents to a PDF or leaving the Word interface, significantly speeding up workflows. Microsoft’s integration of eSignatures also allows you to create eSignature templates which will speed up document approvals, eliminate physical signing steps, and help with compliance and security in the Microsoft 365 environment. This change has the potential to significantly improve the quality-of-life for those in work finding themselves adding lots of signatures to documents as they will no longer have to export PDFs from Word and apply the signature outside of Word. It’s also key to point out that this feature is integrated natively and is not an extension. The move is quite clever from Microsoft, if businesses were using third-party tools to sign their documents, they would no longer need to use these as it’s easier to do it in Word. Not only does it reduce reliance on other tools, it also makes Microsoft’s products more competitive against other office suites such as Google Workspace. Streamlined, secure, and compliant The new eSignature feature is tightly integrated into Word. It lets you insert signature fields seamlessly into documents and request other people’s signatures, all while remaining in Word. The eSignature feature can be accessed in Word by going to the Insert ribbon. When you send a signature request to someone from Word, the recipient will get an automatically generated PDF copy of the Word document to sign. The signed PDF will then be kept in the same SharePoint location as the original Word file. To ensure end-to-end security and compliance, the document never leaves the Microsoft 365 trust boundary. For anyone with a repetitive signing process, this integration allows you to turn Word documents into eSignature templates so they can be reused. Another feature that Microsoft has built in is audit trail and notifications. Both the senders and signers will get email notifications throughout the entire signing process. Additionally, you can view the activity history (audit trail) in the signed PDF to check who signed it and when. Finally, Microsoft said that administrators will be able to control how the feature is used in Word throughout the organization. They can decide to enable it for specific users via an Office group policy or limit it to particular SharePoint sites. The company said that SharePoint eSignature also lets admins log activities in the Purview Audit log. A key security measure included by Microsoft, which was mentioned above, was the Microsoft 365 trust boundary. By keeping documents in this boundary, Microsoft ensures that all organizations can use this feature without worry. The inclusion of automatic PDF creation is all a huge benefit to users as it will cut out the step of manual PDF creation. While creating a PDF isn’t complicated, it can be time consuming. The eSignature feature looks like a win-win-win for organizations that rely on digital signatures. Not only does it speed things along and remain secure, but it’s also packed with features like tracking, making it really useful and comprehensive. When and how your organization gets it SharePoint eSignature has started rolling out to Word on the M365 Beta and Current Channels in the United States, Canada, the United Kingdom, Europe, and Australia-Pacific. This phase of the rollout is expected to be completed by early July. People in the rest of the world will also be gaining this time-saving feature but it will not reach everyone right away, though Microsoft promises to reach everybody by the end of the year. To use the feature, it will need to be enabled by administrators. If you’re an admin who needs to enable this, just go to the M365 Admin Center and enable SharePoint eSignature, ensuring the Word checkbox is selected. Once the service is enabled, apply the “Allow the use of SharePoint eSignature for Microsoft Word” policy. The policy can be enabled via Intune, Group Policy manager, or the Cloud Policy service for Microsoft 365 Assuming the admins have given permission to use the feature, users will be able to access SharePoint eSignatures on Word Desktop using the Microsoft 365 Current Channel or Beta Channel. The main caveats include that the rollout is phased, so you might not get it right away, and it requires IT admins to enable the feature - in which case, it may never get enabled at all. Overall, this feature stands to benefit users who sign documents a lot as it can save huge amounts of time cumulatively. It’s also good for Microsoft who increase organizations’ dependence on Word. Tags Report a problem with article Follow @NeowinFeed
    Like
    Love
    Wow
    Sad
    Angry
    305
    5 Comentários 0 Compartilhamentos
  • Kenmore Pavilion / CARD

    Kenmore Pavilion / CARDSave this picture!© Andy MacphersonHouses, Sustainability•Brisbane City, Australia

    Architects:
    CARD
    Area
    Area of this architecture project

    Area: 
    90 m²

    Photographs

    Photographs:Andy MacphersonMore SpecsLess Specs
    this picture!
    Text description provided by the architects. The core philosophy of this project was to do more with less through revitalizing a 1960s workers' cottage through smart, cost-effective design. Rather than replacing, the approach focused on reuse, breathing new life into the existing structure.this picture!this picture!By embracing Brisbane's favourable climate, the design introduces a weather-protected outdoor space that seamlessly extends the home's footprint. This newly integrated pavilion creates a flexible living zone for cooking, socialising, and relaxing, while framing curated views of the surrounding landscape.this picture!this picture!this picture!The project is situated in the leafy suburb of Kenmore, Brisbane, renowned for its mid-century modernist architecture and lush natural surroundings. Drawing inspiration from Queensland's architectural heritage, the design of the pavilion references the quintessential deck through its overall proportions and timber detailing. The use of natural timber ensures the structure blends effortlessly with the surrounding landscape, reinforcing its identity as an extension of the garden and an inviting, functional outdoor space.this picture!The project was part of a bigger renovation which encouraged a direct connection to the garden, shifting the living areas to the north and the bedrooms to the south, clearly delineated by a continuous wall of joinery. This wall contains the kitchen, fireplace, bookshelves, entry nook, and services, with flush, hidden doors that conceal access to the bedrooms and hallway.this picture!With these renovations and the new outdoor pavilion, a dark and introverted house has been converted into a functional, light-filled, and social building. A flexible and adaptable space - the pavilion can be used for a range of activities, from outdoor dining, socializing, and cooking in the garden.this picture!Sustainability Initiatives Our vision centers around reducing environmental impact by retaining and working with the original post-war structure, which has solid bones. Existing materials were reused and retained where possible, such as the terracotta floor of the pavilion, which was retained from the original house. Other examples include parts of the tiling that were salvaged from leftover projects, and the western red cedar soffits were taken from leftover stock from a nearby development. The garden beds were made from salvaged beams from the original pergola The planter was made from salvaged brick from the paths around the original house The chicken coop was made from reclaimed cedar and old wall framing. The pergola was built from Kwila and Spotted Gum - purposefully chosen for their sustainability credentials. The project included the installation of a new 6.6 kW solar systeminstalled on the roof. this picture!

    Project gallerySee allShow less
    About this officeCARDOffice•••
    Published on June 05, 2025Cite: "Kenmore Pavilion / CARD" 05 Jun 2025. ArchDaily. Accessed . < ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否
    You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream
    #kenmore #pavilion #card
    Kenmore Pavilion / CARD
    Kenmore Pavilion / CARDSave this picture!© Andy MacphersonHouses, Sustainability•Brisbane City, Australia Architects: CARD Area Area of this architecture project Area:  90 m² Photographs Photographs:Andy MacphersonMore SpecsLess Specs this picture! Text description provided by the architects. The core philosophy of this project was to do more with less through revitalizing a 1960s workers' cottage through smart, cost-effective design. Rather than replacing, the approach focused on reuse, breathing new life into the existing structure.this picture!this picture!By embracing Brisbane's favourable climate, the design introduces a weather-protected outdoor space that seamlessly extends the home's footprint. This newly integrated pavilion creates a flexible living zone for cooking, socialising, and relaxing, while framing curated views of the surrounding landscape.this picture!this picture!this picture!The project is situated in the leafy suburb of Kenmore, Brisbane, renowned for its mid-century modernist architecture and lush natural surroundings. Drawing inspiration from Queensland's architectural heritage, the design of the pavilion references the quintessential deck through its overall proportions and timber detailing. The use of natural timber ensures the structure blends effortlessly with the surrounding landscape, reinforcing its identity as an extension of the garden and an inviting, functional outdoor space.this picture!The project was part of a bigger renovation which encouraged a direct connection to the garden, shifting the living areas to the north and the bedrooms to the south, clearly delineated by a continuous wall of joinery. This wall contains the kitchen, fireplace, bookshelves, entry nook, and services, with flush, hidden doors that conceal access to the bedrooms and hallway.this picture!With these renovations and the new outdoor pavilion, a dark and introverted house has been converted into a functional, light-filled, and social building. A flexible and adaptable space - the pavilion can be used for a range of activities, from outdoor dining, socializing, and cooking in the garden.this picture!Sustainability Initiatives Our vision centers around reducing environmental impact by retaining and working with the original post-war structure, which has solid bones. Existing materials were reused and retained where possible, such as the terracotta floor of the pavilion, which was retained from the original house. Other examples include parts of the tiling that were salvaged from leftover projects, and the western red cedar soffits were taken from leftover stock from a nearby development. The garden beds were made from salvaged beams from the original pergola The planter was made from salvaged brick from the paths around the original house The chicken coop was made from reclaimed cedar and old wall framing. The pergola was built from Kwila and Spotted Gum - purposefully chosen for their sustainability credentials. The project included the installation of a new 6.6 kW solar systeminstalled on the roof. this picture! Project gallerySee allShow less About this officeCARDOffice••• Published on June 05, 2025Cite: "Kenmore Pavilion / CARD" 05 Jun 2025. ArchDaily. Accessed . < ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否 You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream #kenmore #pavilion #card
    WWW.ARCHDAILY.COM
    Kenmore Pavilion / CARD
    Kenmore Pavilion / CARDSave this picture!© Andy MacphersonHouses, Sustainability•Brisbane City, Australia Architects: CARD Area Area of this architecture project Area:  90 m² Photographs Photographs:Andy MacphersonMore SpecsLess Specs Save this picture! Text description provided by the architects. The core philosophy of this project was to do more with less through revitalizing a 1960s workers' cottage through smart, cost-effective design. Rather than replacing, the approach focused on reuse, breathing new life into the existing structure.Save this picture!Save this picture!By embracing Brisbane's favourable climate, the design introduces a weather-protected outdoor space that seamlessly extends the home's footprint. This newly integrated pavilion creates a flexible living zone for cooking, socialising, and relaxing, while framing curated views of the surrounding landscape.Save this picture!Save this picture!Save this picture!The project is situated in the leafy suburb of Kenmore, Brisbane, renowned for its mid-century modernist architecture and lush natural surroundings. Drawing inspiration from Queensland's architectural heritage, the design of the pavilion references the quintessential deck through its overall proportions and timber detailing. The use of natural timber ensures the structure blends effortlessly with the surrounding landscape, reinforcing its identity as an extension of the garden and an inviting, functional outdoor space.Save this picture!The project was part of a bigger renovation which encouraged a direct connection to the garden, shifting the living areas to the north and the bedrooms to the south, clearly delineated by a continuous wall of joinery. This wall contains the kitchen, fireplace, bookshelves, entry nook, and services, with flush, hidden doors that conceal access to the bedrooms and hallway.Save this picture!With these renovations and the new outdoor pavilion, a dark and introverted house has been converted into a functional, light-filled, and social building. A flexible and adaptable space - the pavilion can be used for a range of activities, from outdoor dining, socializing, and cooking in the garden.Save this picture!Sustainability Initiatives Our vision centers around reducing environmental impact by retaining and working with the original post-war structure, which has solid bones. Existing materials were reused and retained where possible, such as the terracotta floor of the pavilion, which was retained from the original house. Other examples include parts of the tiling that were salvaged from leftover projects, and the western red cedar soffits were taken from leftover stock from a nearby development. The garden beds were made from salvaged beams from the original pergola The planter was made from salvaged brick from the paths around the original house The chicken coop was made from reclaimed cedar and old wall framing. The pergola was built from Kwila and Spotted Gum - purposefully chosen for their sustainability credentials. The project included the installation of a new 6.6 kW solar system (20 panels) installed on the roof. Save this picture! Project gallerySee allShow less About this officeCARDOffice••• Published on June 05, 2025Cite: "Kenmore Pavilion / CARD" 05 Jun 2025. ArchDaily. Accessed . <https://www.archdaily.com/1030800/kenmore-pavilion-card&gt ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否 You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream
    Like
    Love
    Wow
    Sad
    Angry
    341
    0 Comentários 0 Compartilhamentos
  • Steel life: Grand Canal Steelworks Park in Hangzhou, China by Jiakun Architects and TLS Landscape Architecture

    The transformation of Hangzhou’s old steelworks into a park is a tribute to China’s industrial past in a city of the future
    The congressional hearing about Chinese AI engine DeepSeek held in the US this April has propelled Hangzhou, the heart of China’s new digital economy, to the headlines. With companies such as DeepSeek, Unitree and Alibaba – whose payment app allowed me to get on the metro without needing to buy a ticket – headquartered in Hangzhou, China’s future in AI, robotics and automation is emanating from this city. Getting off the metro in the suburban area of Gongshu, the sun was shining on an old steelworks, overgrown with vines and flowers now that it is being transformed by Jiakun Architects and TLS Landscape Architecture into the Grand Canal Steelworks Park. The unfolding trade war might help to accelerate China’s journey into an automated future, leaving the world of factories behind, yet this new public space shows an impulse to commemorate the country’s economic history, and the forces that have shaped its contemporary built environment.
    Starting in Hangzhou and travelling more than 1,700km to Beijing, the Grand Canal is an engineering project built 2,500 years ago to connect the different regions of eastern China. The country’s geography means rivers flow from west to east: from higher elevations, culminating in the Himalayas, to the basin that is the country’s eastern seaboard. Historically, it was difficult to transport goods from mercantile centres in the south, including Hangzhou and Suzhou, to the political centre in Beijing up north. As a civil engineering project, the Grand Canal rivals the Great Wall, but if the Great Wall aims to protect China from the outside, the Grand Canal articulates Chinese commerce from the inside. The historic waterway has been an important conduit of economic and cultural exchange, enabling the movement of people and goods such as grain, silk, wine, salt and gravel across the country. It became a UNESCO World Heritage site in 2014.
    The state‑owned enterprise collective was founded, and the physical facility of Hangzhou steelworks built, in the 1950s during the Great Leap Forward, when China strove for self‑sufficiency, and wended its way through the country’s economic trajectory: first the economic chaos of the 1960s, then the reforms and opening up in the 1980s. Steel remains an important industry today in China, home to more than half of the world’s production, but the listing of the Grand Canal enabled city leaders to move production to a new site and decommission the Hangzhou steelworks. External mandates, including entry into the World Trade Organization, the Beijing Olympics and UNESCO listings, have been instrumentalised in the country to pursue a range of internal interests, particularly economical and real estate ones. 
    In 2016, the factory was shut down in 150 days, in what the company describes as a ‘heroic’ effort, and the site attracted tourists of industrial ruins. In the competition brief, Hangzhou planners asked for ‘as much of the existing blast furnaces and buildings’ as possible to be preserved. When I arrived in China in 2008, Chinese cities were notorious for heritage demolition, but today urban planners and architects increasingly work to preserve historical buildings. Just like several industrial sites in Beijing and Shanghai have been transformed into major public and cultural spaces in the past decade, in the Yangtze River Delta – of which Hangzhou is a major hub – several industrial sites along the Grand Canal’s course are being given a new lease of life.
    Today, the three blast furnaces of Hangzhou steelworks remain, with the silhouettes of their smokestacks easily recognisable from a distance. The project preserves as much as possible of the aesthetics of a steel mill with none of the danger or dust, ready to welcome instead new community facilities and cultural programmes in a vast and restored piece of landscape. Situated in a former working‑class district that has been gentrifying and welcoming young families, the new park is becoming a popular venue for music festivals, flower viewing in springtime and year‑round picnics – when I visited, parents were teaching their children to ride a bicycle, and students from Zhejiang University, about a kilometre from the park, were having lunch on the grass.
    New programmes accommodated in the old coke oven and steel mills will include a series of exhibition halls and spaces welcoming a wide range of cultural and artistic workshops as well as events – the project’s first phase has just completed but tenant organisations have not yet moved in, and works are ongoing to the north of the park. On the day of my visit, a student art exhibition was on display near one of the furnaces, with works made from detritus from the site, including old packing containers. The rehabilitated buildings also provide a range of commercial units, where cafés, restaurants, shops, a bookshop, ice cream shop and a gym have already opened their doors to visitors. 
    Several structures were deemed structurally unsafe and required demolition, such as the old iron casting building. The architects proposed to partially reconstruct it on its original footprint; the much more open structure, built with reclaimed bricks, now houses a semi‑outdoor garden. Material choices evoke the site’s industrial past: weathered steel, exposed concrete and large expanses of glazing dominate the landscape. The widespread use of red, including in an elevated walkway that traverses the park – at times vaguely reminiscent of a Japanese torii gate in the space below – gives a warm and reassuring earthiness to the otherwise industrial colour palette.
    Elements selected by the designers underwent sanitisation and detoxification before being reused. The landscaping includes old machinery parts and boulders; recuperated steel panels are for instance inlaid into the paving while pipes for pouring molten steel have been turned into a fountain. The train tracks that once transported material continue to run through the site, providing paths in between the new patches of vegetation, planted with local grasses as well as Japanese maples, camphors and persimmon trees. As Jiawen Chen from TLS describes it, the aesthetic feels ‘wild, but not weedy or abandoned’. The landscape architects’ inspiration came from the site itself after the steelworks’ closure, she explains, once vegetation had begun to reclaim it. Contaminated soil was replaced with clean local soil – at a depth between 0.5 and 1.5 metres, in line with Chinese regulations. The removed soil was sent to specialised facilities for purification, while severely contaminated layers were sealed with concrete. TLS proposed phytoremediationin selected areas of the site ‘as a symbolic and educational gesture’, Chen explains, but ‘the client preferred to be cautious’. From the eastern end of the park, hiking trails lead to the mountain and its Buddhist temples. The old steel mill’s grounds fade seamlessly into the hills. Standing in what it is still a construction site, a sign suggests there will soon be a rowing centre here. 
    While Jiakun Architects and TLS have prioritised making the site palatable as a public space, the project also brings to life a history that many are likely to have forgotten. Throughout, the park incorporates different elements of China’s economic history, including the life of the Grand Canal and the industrial era. There is, for example, a Maoist steelworker painted on the mural of one of the cafés, as well as historical photographs and drawings of the steelworks peppering the site, framed and hung on the walls. The ambition might be in part to pay homage to steelworkers, but it is hard to imagine them visiting. Gongshu, like the other suburbs of Hangzhou, has seen rapid increases in its property prices. 
    The steelworks were built during the Maoist era, a time of ‘battling with earth, battling with heaven, battling with humanity’, to borrow Mao’s own words. Ordinary people melted down pots and pans to surpass the UK in steel production, and industry was seen as a sharp break from a traditional Chinese way of life, in which humans aspire to live in harmony with their environment. The priorities of the government today are more conservative, seeking to create a garden city to attract engineers and their families. Hangzhou has long represented the balmy and sophisticated life of China’s south, a land of rice and fish. To the west of the city, not far from the old steelworks, are the ecologically protected Xixi wetlands, and Hangzhou’s urban planning exemplifies the Chinese principle of 天人合一, or nature and humankind as one. 
    Today, Hangzhou is only 45 minutes from Shanghai by high‑speed train. The two cities feel like extensions of one another, an urban region of 100 million people. The creation of the Grand Canal Steelworks Park reflects the move away from heavy industry that Chinese cities such as Hangzhou are currently making, shifting towards a supposedly cleaner knowledge‑driven economy. Yet the preservation of the steelworks epitomises the sentimental attitude towards the site’s history and acts as a reminder that today’s middle classes are the children of yesterday’s steelworkers, drinking coffee and playing with their own children in grassy lawns next to shuttered blast furnaces. 
    The park’s second phase is already nearing completion, and the competition for the nearby Grand Canal Museum was won by Herzog & de Meuron in 2020 – the building is under construction, and should open at the end of this year. It is a district rich in history, but the city is resolutely turned towards the future. 

    2025-06-02
    Reuben J Brown

    Share

    AR May 2025CircularityBuy Now
    #steel #life #grand #canal #steelworks
    Steel life: Grand Canal Steelworks Park in Hangzhou, China by Jiakun Architects and TLS Landscape Architecture
    The transformation of Hangzhou’s old steelworks into a park is a tribute to China’s industrial past in a city of the future The congressional hearing about Chinese AI engine DeepSeek held in the US this April has propelled Hangzhou, the heart of China’s new digital economy, to the headlines. With companies such as DeepSeek, Unitree and Alibaba – whose payment app allowed me to get on the metro without needing to buy a ticket – headquartered in Hangzhou, China’s future in AI, robotics and automation is emanating from this city. Getting off the metro in the suburban area of Gongshu, the sun was shining on an old steelworks, overgrown with vines and flowers now that it is being transformed by Jiakun Architects and TLS Landscape Architecture into the Grand Canal Steelworks Park. The unfolding trade war might help to accelerate China’s journey into an automated future, leaving the world of factories behind, yet this new public space shows an impulse to commemorate the country’s economic history, and the forces that have shaped its contemporary built environment. Starting in Hangzhou and travelling more than 1,700km to Beijing, the Grand Canal is an engineering project built 2,500 years ago to connect the different regions of eastern China. The country’s geography means rivers flow from west to east: from higher elevations, culminating in the Himalayas, to the basin that is the country’s eastern seaboard. Historically, it was difficult to transport goods from mercantile centres in the south, including Hangzhou and Suzhou, to the political centre in Beijing up north. As a civil engineering project, the Grand Canal rivals the Great Wall, but if the Great Wall aims to protect China from the outside, the Grand Canal articulates Chinese commerce from the inside. The historic waterway has been an important conduit of economic and cultural exchange, enabling the movement of people and goods such as grain, silk, wine, salt and gravel across the country. It became a UNESCO World Heritage site in 2014. The state‑owned enterprise collective was founded, and the physical facility of Hangzhou steelworks built, in the 1950s during the Great Leap Forward, when China strove for self‑sufficiency, and wended its way through the country’s economic trajectory: first the economic chaos of the 1960s, then the reforms and opening up in the 1980s. Steel remains an important industry today in China, home to more than half of the world’s production, but the listing of the Grand Canal enabled city leaders to move production to a new site and decommission the Hangzhou steelworks. External mandates, including entry into the World Trade Organization, the Beijing Olympics and UNESCO listings, have been instrumentalised in the country to pursue a range of internal interests, particularly economical and real estate ones.  In 2016, the factory was shut down in 150 days, in what the company describes as a ‘heroic’ effort, and the site attracted tourists of industrial ruins. In the competition brief, Hangzhou planners asked for ‘as much of the existing blast furnaces and buildings’ as possible to be preserved. When I arrived in China in 2008, Chinese cities were notorious for heritage demolition, but today urban planners and architects increasingly work to preserve historical buildings. Just like several industrial sites in Beijing and Shanghai have been transformed into major public and cultural spaces in the past decade, in the Yangtze River Delta – of which Hangzhou is a major hub – several industrial sites along the Grand Canal’s course are being given a new lease of life. Today, the three blast furnaces of Hangzhou steelworks remain, with the silhouettes of their smokestacks easily recognisable from a distance. The project preserves as much as possible of the aesthetics of a steel mill with none of the danger or dust, ready to welcome instead new community facilities and cultural programmes in a vast and restored piece of landscape. Situated in a former working‑class district that has been gentrifying and welcoming young families, the new park is becoming a popular venue for music festivals, flower viewing in springtime and year‑round picnics – when I visited, parents were teaching their children to ride a bicycle, and students from Zhejiang University, about a kilometre from the park, were having lunch on the grass. New programmes accommodated in the old coke oven and steel mills will include a series of exhibition halls and spaces welcoming a wide range of cultural and artistic workshops as well as events – the project’s first phase has just completed but tenant organisations have not yet moved in, and works are ongoing to the north of the park. On the day of my visit, a student art exhibition was on display near one of the furnaces, with works made from detritus from the site, including old packing containers. The rehabilitated buildings also provide a range of commercial units, where cafés, restaurants, shops, a bookshop, ice cream shop and a gym have already opened their doors to visitors.  Several structures were deemed structurally unsafe and required demolition, such as the old iron casting building. The architects proposed to partially reconstruct it on its original footprint; the much more open structure, built with reclaimed bricks, now houses a semi‑outdoor garden. Material choices evoke the site’s industrial past: weathered steel, exposed concrete and large expanses of glazing dominate the landscape. The widespread use of red, including in an elevated walkway that traverses the park – at times vaguely reminiscent of a Japanese torii gate in the space below – gives a warm and reassuring earthiness to the otherwise industrial colour palette. Elements selected by the designers underwent sanitisation and detoxification before being reused. The landscaping includes old machinery parts and boulders; recuperated steel panels are for instance inlaid into the paving while pipes for pouring molten steel have been turned into a fountain. The train tracks that once transported material continue to run through the site, providing paths in between the new patches of vegetation, planted with local grasses as well as Japanese maples, camphors and persimmon trees. As Jiawen Chen from TLS describes it, the aesthetic feels ‘wild, but not weedy or abandoned’. The landscape architects’ inspiration came from the site itself after the steelworks’ closure, she explains, once vegetation had begun to reclaim it. Contaminated soil was replaced with clean local soil – at a depth between 0.5 and 1.5 metres, in line with Chinese regulations. The removed soil was sent to specialised facilities for purification, while severely contaminated layers were sealed with concrete. TLS proposed phytoremediationin selected areas of the site ‘as a symbolic and educational gesture’, Chen explains, but ‘the client preferred to be cautious’. From the eastern end of the park, hiking trails lead to the mountain and its Buddhist temples. The old steel mill’s grounds fade seamlessly into the hills. Standing in what it is still a construction site, a sign suggests there will soon be a rowing centre here.  While Jiakun Architects and TLS have prioritised making the site palatable as a public space, the project also brings to life a history that many are likely to have forgotten. Throughout, the park incorporates different elements of China’s economic history, including the life of the Grand Canal and the industrial era. There is, for example, a Maoist steelworker painted on the mural of one of the cafés, as well as historical photographs and drawings of the steelworks peppering the site, framed and hung on the walls. The ambition might be in part to pay homage to steelworkers, but it is hard to imagine them visiting. Gongshu, like the other suburbs of Hangzhou, has seen rapid increases in its property prices.  The steelworks were built during the Maoist era, a time of ‘battling with earth, battling with heaven, battling with humanity’, to borrow Mao’s own words. Ordinary people melted down pots and pans to surpass the UK in steel production, and industry was seen as a sharp break from a traditional Chinese way of life, in which humans aspire to live in harmony with their environment. The priorities of the government today are more conservative, seeking to create a garden city to attract engineers and their families. Hangzhou has long represented the balmy and sophisticated life of China’s south, a land of rice and fish. To the west of the city, not far from the old steelworks, are the ecologically protected Xixi wetlands, and Hangzhou’s urban planning exemplifies the Chinese principle of 天人合一, or nature and humankind as one.  Today, Hangzhou is only 45 minutes from Shanghai by high‑speed train. The two cities feel like extensions of one another, an urban region of 100 million people. The creation of the Grand Canal Steelworks Park reflects the move away from heavy industry that Chinese cities such as Hangzhou are currently making, shifting towards a supposedly cleaner knowledge‑driven economy. Yet the preservation of the steelworks epitomises the sentimental attitude towards the site’s history and acts as a reminder that today’s middle classes are the children of yesterday’s steelworkers, drinking coffee and playing with their own children in grassy lawns next to shuttered blast furnaces.  The park’s second phase is already nearing completion, and the competition for the nearby Grand Canal Museum was won by Herzog & de Meuron in 2020 – the building is under construction, and should open at the end of this year. It is a district rich in history, but the city is resolutely turned towards the future.  2025-06-02 Reuben J Brown Share AR May 2025CircularityBuy Now #steel #life #grand #canal #steelworks
    WWW.ARCHITECTURAL-REVIEW.COM
    Steel life: Grand Canal Steelworks Park in Hangzhou, China by Jiakun Architects and TLS Landscape Architecture
    The transformation of Hangzhou’s old steelworks into a park is a tribute to China’s industrial past in a city of the future The congressional hearing about Chinese AI engine DeepSeek held in the US this April has propelled Hangzhou, the heart of China’s new digital economy, to the headlines. With companies such as DeepSeek, Unitree and Alibaba – whose payment app allowed me to get on the metro without needing to buy a ticket – headquartered in Hangzhou, China’s future in AI, robotics and automation is emanating from this city. Getting off the metro in the suburban area of Gongshu, the sun was shining on an old steelworks, overgrown with vines and flowers now that it is being transformed by Jiakun Architects and TLS Landscape Architecture into the Grand Canal Steelworks Park. The unfolding trade war might help to accelerate China’s journey into an automated future, leaving the world of factories behind, yet this new public space shows an impulse to commemorate the country’s economic history, and the forces that have shaped its contemporary built environment. Starting in Hangzhou and travelling more than 1,700km to Beijing, the Grand Canal is an engineering project built 2,500 years ago to connect the different regions of eastern China. The country’s geography means rivers flow from west to east: from higher elevations, culminating in the Himalayas, to the basin that is the country’s eastern seaboard. Historically, it was difficult to transport goods from mercantile centres in the south, including Hangzhou and Suzhou, to the political centre in Beijing up north. As a civil engineering project, the Grand Canal rivals the Great Wall, but if the Great Wall aims to protect China from the outside, the Grand Canal articulates Chinese commerce from the inside. The historic waterway has been an important conduit of economic and cultural exchange, enabling the movement of people and goods such as grain, silk, wine, salt and gravel across the country. It became a UNESCO World Heritage site in 2014. The state‑owned enterprise collective was founded, and the physical facility of Hangzhou steelworks built, in the 1950s during the Great Leap Forward, when China strove for self‑sufficiency, and wended its way through the country’s economic trajectory: first the economic chaos of the 1960s, then the reforms and opening up in the 1980s. Steel remains an important industry today in China, home to more than half of the world’s production, but the listing of the Grand Canal enabled city leaders to move production to a new site and decommission the Hangzhou steelworks. External mandates, including entry into the World Trade Organization, the Beijing Olympics and UNESCO listings, have been instrumentalised in the country to pursue a range of internal interests, particularly economical and real estate ones.  In 2016, the factory was shut down in 150 days, in what the company describes as a ‘heroic’ effort, and the site attracted tourists of industrial ruins. In the competition brief, Hangzhou planners asked for ‘as much of the existing blast furnaces and buildings’ as possible to be preserved. When I arrived in China in 2008, Chinese cities were notorious for heritage demolition, but today urban planners and architects increasingly work to preserve historical buildings. Just like several industrial sites in Beijing and Shanghai have been transformed into major public and cultural spaces in the past decade, in the Yangtze River Delta – of which Hangzhou is a major hub – several industrial sites along the Grand Canal’s course are being given a new lease of life. Today, the three blast furnaces of Hangzhou steelworks remain, with the silhouettes of their smokestacks easily recognisable from a distance. The project preserves as much as possible of the aesthetics of a steel mill with none of the danger or dust, ready to welcome instead new community facilities and cultural programmes in a vast and restored piece of landscape. Situated in a former working‑class district that has been gentrifying and welcoming young families, the new park is becoming a popular venue for music festivals, flower viewing in springtime and year‑round picnics – when I visited, parents were teaching their children to ride a bicycle, and students from Zhejiang University, about a kilometre from the park, were having lunch on the grass. New programmes accommodated in the old coke oven and steel mills will include a series of exhibition halls and spaces welcoming a wide range of cultural and artistic workshops as well as events – the project’s first phase has just completed but tenant organisations have not yet moved in, and works are ongoing to the north of the park. On the day of my visit, a student art exhibition was on display near one of the furnaces, with works made from detritus from the site, including old packing containers. The rehabilitated buildings also provide a range of commercial units, where cafés, restaurants, shops, a bookshop, ice cream shop and a gym have already opened their doors to visitors.  Several structures were deemed structurally unsafe and required demolition, such as the old iron casting building. The architects proposed to partially reconstruct it on its original footprint; the much more open structure, built with reclaimed bricks, now houses a semi‑outdoor garden. Material choices evoke the site’s industrial past: weathered steel, exposed concrete and large expanses of glazing dominate the landscape. The widespread use of red, including in an elevated walkway that traverses the park – at times vaguely reminiscent of a Japanese torii gate in the space below – gives a warm and reassuring earthiness to the otherwise industrial colour palette. Elements selected by the designers underwent sanitisation and detoxification before being reused. The landscaping includes old machinery parts and boulders; recuperated steel panels are for instance inlaid into the paving while pipes for pouring molten steel have been turned into a fountain. The train tracks that once transported material continue to run through the site, providing paths in between the new patches of vegetation, planted with local grasses as well as Japanese maples, camphors and persimmon trees. As Jiawen Chen from TLS describes it, the aesthetic feels ‘wild, but not weedy or abandoned’. The landscape architects’ inspiration came from the site itself after the steelworks’ closure, she explains, once vegetation had begun to reclaim it. Contaminated soil was replaced with clean local soil – at a depth between 0.5 and 1.5 metres, in line with Chinese regulations. The removed soil was sent to specialised facilities for purification, while severely contaminated layers were sealed with concrete. TLS proposed phytoremediation (using plants to detoxify soil) in selected areas of the site ‘as a symbolic and educational gesture’, Chen explains, but ‘the client preferred to be cautious’. From the eastern end of the park, hiking trails lead to the mountain and its Buddhist temples. The old steel mill’s grounds fade seamlessly into the hills. Standing in what it is still a construction site, a sign suggests there will soon be a rowing centre here.  While Jiakun Architects and TLS have prioritised making the site palatable as a public space, the project also brings to life a history that many are likely to have forgotten. Throughout, the park incorporates different elements of China’s economic history, including the life of the Grand Canal and the industrial era. There is, for example, a Maoist steelworker painted on the mural of one of the cafés, as well as historical photographs and drawings of the steelworks peppering the site, framed and hung on the walls. The ambition might be in part to pay homage to steelworkers, but it is hard to imagine them visiting. Gongshu, like the other suburbs of Hangzhou, has seen rapid increases in its property prices.  The steelworks were built during the Maoist era, a time of ‘battling with earth, battling with heaven, battling with humanity’, to borrow Mao’s own words. Ordinary people melted down pots and pans to surpass the UK in steel production, and industry was seen as a sharp break from a traditional Chinese way of life, in which humans aspire to live in harmony with their environment. The priorities of the government today are more conservative, seeking to create a garden city to attract engineers and their families. Hangzhou has long represented the balmy and sophisticated life of China’s south, a land of rice and fish. To the west of the city, not far from the old steelworks, are the ecologically protected Xixi wetlands, and Hangzhou’s urban planning exemplifies the Chinese principle of 天人合一, or nature and humankind as one.  Today, Hangzhou is only 45 minutes from Shanghai by high‑speed train. The two cities feel like extensions of one another, an urban region of 100 million people. The creation of the Grand Canal Steelworks Park reflects the move away from heavy industry that Chinese cities such as Hangzhou are currently making, shifting towards a supposedly cleaner knowledge‑driven economy. Yet the preservation of the steelworks epitomises the sentimental attitude towards the site’s history and acts as a reminder that today’s middle classes are the children of yesterday’s steelworkers, drinking coffee and playing with their own children in grassy lawns next to shuttered blast furnaces.  The park’s second phase is already nearing completion, and the competition for the nearby Grand Canal Museum was won by Herzog & de Meuron in 2020 – the building is under construction, and should open at the end of this year. It is a district rich in history, but the city is resolutely turned towards the future.  2025-06-02 Reuben J Brown Share AR May 2025CircularityBuy Now
    Like
    Love
    Wow
    Sad
    Angry
    209
    0 Comentários 0 Compartilhamentos
  • Adidas data breach reveals customer info in vendor attack

    Published
    June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles!
    Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at  apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #adidas #data #breach #reveals #customer
    Adidas data breach reveals customer info in vendor attack
    Published June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at  apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #adidas #data #breach #reveals #customer
    WWW.FOXNEWS.COM
    Adidas data breach reveals customer info in vendor attack
    Published June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at work (Kurt "CyberGuy" Knutsson)Adidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas sign (Kurt "CyberGuy" Knutsson)What Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harm (such as identity theft or fraud) being caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at https://www.adidas.com/us/helpWe apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe (Kurt "CyberGuy" Knutsson)6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Angry
    Sad
    216
    0 Comentários 0 Compartilhamentos
  • Smashing Animations Part 4: Optimising SVGs

    SVG animations take me back to the Hanna-Barbera cartoons I watched as a kid. Shows like Wacky Races, The Perils of Penelope Pitstop, and, of course, Yogi Bear. They inspired me to lovingly recreate some classic Toon Titles using CSS, SVG, and SMIL animations.
    But getting animations to load quickly and work smoothly needs more than nostalgia. It takes clean design, lean code, and a process that makes complex SVGs easier to animate. Here’s how I do it.

    Start Clean And Design With Optimisation In Mind
    Keeping things simple is key to making SVGs that are optimised and ready to animate. Tools like Adobe Illustrator convert bitmap images to vectors, but the output often contains too many extraneous groups, layers, and masks. Instead, I start cleaning in Sketch, work from a reference image, and use the Pen tool to create paths.
    Tip: Affinity Designerand Sketchare alternatives to Adobe Illustrator and Figma. Both are independent and based in Europe. Sketch has been my default design app since Adobe killed Fireworks.

    Beginning With Outlines
    For these Toon Titles illustrations, I first use the Pen tool to draw black outlines with as few anchor points as possible. The more points a shape has, the bigger a file becomes, so simplifying paths and reducing the number of points makes an SVG much smaller, often with no discernible visual difference.

    Bearing in mind that parts of this Yogi illustration will ultimately be animated, I keep outlines for this Bewitched Bear’s body, head, collar, and tie separate so that I can move them independently. The head might nod, the tie could flap, and, like in those classic cartoons, Yogi’s collar will hide the joins between them.

    Drawing Simple Background Shapes
    With the outlines in place, I use the Pen tool again to draw new shapes, which fill the areas with colour. These colours sit behind the outlines, so they don’t need to match them exactly. The fewer anchor points, the smaller the file size.

    Sadly, neither Affinity Designer nor Sketch has tools that can simplify paths, but if you have it, using Adobe Illustrator can shave a few extra kilobytes off these background shapes.

    Optimising The Code
    It’s not just metadata that makes SVG bulkier. The way you export from your design app also affects file size.

    Exporting just those simple background shapes from Adobe Illustrator includes unnecessary groups, masks, and bloated path data by default. Sketch’s code is barely any better, and there’s plenty of room for improvement, even in its SVGO Compressor code. I rely on Jake Archibald’s SVGOMG, which uses SVGO v3 and consistently delivers the best optimised SVGs.

    Layering SVG Elements
    My process for preparing SVGs for animation goes well beyond drawing vectors and optimising paths — it also includes how I structure the code itself. When every visual element is crammed into a single SVG file, even optimised code can be a nightmare to navigate. Locating a specific path or group often feels like searching for a needle in a haystack.

    That’s why I develop my SVGs in layers, exporting and optimising one set of elements at a time — always in the order they’ll appear in the final file. This lets me build the master SVG gradually by pasting it in each cleaned-up section. For example, I start with backgrounds like this gradient and title graphic.

    Instead of facing a wall of SVG code, I can now easily identify the background gradient’s path and its associated linearGradient, and see the group containing the title graphic. I take this opportunity to add a comment to the code, which will make editing and adding animations to it easier in the future:
    <svg ...>
    <defs>
    <!-- ... -->
    </defs>
    <path fill="url" d="…"/>
    <!-- TITLE GRAPHIC -->
    <g>
    <path … />
    <!-- ... -->
    </g>
    </svg>

    Next, I add the blurred trail from Yogi’s airborne broom. This includes defining a Gaussian Blur filter and placing its path between the background and title layers:
    <svg ...>
    <defs>
    <linearGradient id="grad" …>…</linearGradient>
    <filter id="trail" …>…</filter>
    </defs>
    <!-- GRADIENT -->
    <!-- TRAIL -->
    <path filter="url" …/>
    <!-- TITLE GRAPHIC -->
    </svg>

    Then come the magical stars, added in the same sequential fashion:
    <svg ...>
    <!-- GRADIENT -->
    <!-- TRAIL -->
    <!-- STARS -->
    <!-- TITLE GRAPHIC -->
    </svg>

    To keep everything organised and animation-ready, I create an empty group that will hold all the parts of Yogi:
    <g id="yogi">...</g>

    Then I build Yogi from the ground up — starting with background props, like his broom:
    <g id="broom">...</g>

    Followed by grouped elements for his body, head, collar, and tie:
    <g id="yogi">
    <g id="broom">…</g>
    <g id="body">…</g>
    <g id="head">…</g>
    <g id="collar">…</g>
    <g id="tie">…</g>
    </g>

    Since I export each layer from the same-sized artboard, I don’t need to worry about alignment or positioning issues later on — they’ll all slot into place automatically. I keep my code clean, readable, and ordered logically by layering elements this way. It also makes animating smoother, as each component is easier to identify.
    Reusing Elements With <use>
    When duplicate shapes get reused repeatedly, SVG files can get bulky fast. My recreation of the “Bewitched Bear” title card contains 80 stars in three sizes. Combining all those shapes into one optimised path would bring the file size down to 3KB. But I want to animate individual stars, which would almost double that to 5KB:
    <g id="stars">
    <path class="star-small" fill="#eae3da" d="..."/>
    <path class="star-medium" fill="#eae3da" d="..."/>
    <path class="star-large" fill="#eae3da" d="..."/>
    <!-- ... -->
    </g>

    Moving the stars’ fill attribute values to their parent group reduces the overall weight a little:
    <g id="stars" fill="#eae3da">
    <path class="star-small" d="…"/>
    <path class="star-medium" d="…"/>
    <path class="star-large" d="…"/>
    <!-- ... -->
    </g>

    But a more efficient and manageable option is to define each star size as a reusable template:

    <defs>
    <path id="star-large" fill="#eae3da" fill-rule="evenodd" d="…"/>
    <path id="star-medium" fill="#eae3da" fill-rule="evenodd" d="…"/>
    <path id="star-small" fill="#eae3da" fill-rule="evenodd" d="…"/>
    </defs>

    With this setup, changing a star’s design only means updating its template once, and every instance updates automatically. Then, I reference each one using <use> and position them with x and y attributes:
    <g id="stars">
    <!-- Large stars -->
    <use href="#star-large" x="1575" y="495"/>
    <!-- ... -->
    <!-- Medium stars -->
    <use href="#star-medium" x="1453" y="696"/>
    <!-- ... -->
    <!-- Small stars -->
    <use href="#star-small" x="1287" y="741"/>
    <!-- ... -->
    </g>

    This approach makes the SVG easier to manage, lighter to load, and faster to iterate on, especially when working with dozens of repeating elements. Best of all, it keeps the markup clean without compromising on flexibility or performance.
    Adding Animations
    The stars trailing behind Yogi’s stolen broom bring so much personality to the animation. I wanted them to sparkle in a seemingly random pattern against the dark blue background, so I started by defining a keyframe animation that cycles through different opacity levels:
    @keyframes sparkle {
    0%, 100% { opacity: .1; }
    50% { opacity: 1; }
    }

    Next, I applied this looping animation to every use element inside my stars group:
    #stars use {
    animation: sparkle 10s ease-in-out infinite;
    }

    The secret to creating a convincing twinkle lies in variation. I staggered animation delays and durations across the stars using nth-child selectors, starting with the quickest and most frequent sparkle effects:
    /* Fast, frequent */
    #stars use:nth-child:nth-child{
    animation-delay: .1s;
    animation-duration: 2s;
    }

    From there, I layered in additional timings to mix things up. Some stars sparkle slowly and dramatically, others more randomly, with a variety of rhythms and pauses:
    /* Medium */
    #stars use:nth-child:nth-child{ ... }

    /* Slow, dramatic */
    #stars use:nth-child:nth-child{ ... }

    /* Random */
    #stars use:nth-child{ ... }

    /* Alternating */
    #stars use:nth-child{ ... }

    /* Scattered */
    #stars use:nth-child{ ... }

    By thoughtfully structuring the SVG and reusing elements, I can build complex-looking animations without bloated code, making even a simple effect like changing opacity sparkle.

    Then, for added realism, I make Yogi’s head wobble:

    @keyframes headWobble {
    0% { transform: rotatetranslateY; }
    100% { transform: rotatetranslateY; }
    }

    #head {
    animation: headWobble 0.8s cubic-bezierinfinite alternate;
    }

    His tie waves:

    @keyframes tieWave {
    0%, 100% { transform: rotateZrotateYscaleX; }
    33% { transform: rotateZrotateYscaleX; }
    66% { transform: rotateZrotateYscaleX; }
    }

    #tie {
    transform-style: preserve-3d;
    animation: tieWave 10s cubic-bezierinfinite;
    }

    His broom swings:

    @keyframes broomSwing {
    0%, 20% { transform: rotate; }
    30% { transform: rotate; }
    50%, 70% { transform: rotate; }
    80% { transform: rotate; }
    100% { transform: rotate; }
    }

    #broom {
    animation: broomSwing 4s cubic-bezierinfinite;
    }

    And, finally, Yogi himself gently rotates as he flies on his magical broom:

    @keyframes yogiWobble {
    0% { transform: rotatetranslateYscale; }
    30% { transform: rotatetranslateY; }
    100% { transform: rotatetranslateYscale; }
    }

    #yogi {
    animation: yogiWobble 3.5s cubic-bezierinfinite alternate;
    }

    All these subtle movements bring Yogi to life. By developing structured SVGs, I can create animations that feel full of character without writing a single line of JavaScript.
    Try this yourself:
    See the Pen Bewitched Bear CSS/SVG animationby Andy Clarke.
    Conclusion
    Whether you’re recreating a classic title card or animating icons for an interface, the principles are the same:

    Start clean,
    Optimise early, and
    Structure everything with animation in mind.

    SVGs offer incredible creative freedom, but only if kept lean and manageable. When you plan your process like a production cell — layer by layer, element by element — you’ll spend less time untangling code and more time bringing your work to life.
    #smashing #animations #part #optimising #svgs
    Smashing Animations Part 4: Optimising SVGs
    SVG animations take me back to the Hanna-Barbera cartoons I watched as a kid. Shows like Wacky Races, The Perils of Penelope Pitstop, and, of course, Yogi Bear. They inspired me to lovingly recreate some classic Toon Titles using CSS, SVG, and SMIL animations. But getting animations to load quickly and work smoothly needs more than nostalgia. It takes clean design, lean code, and a process that makes complex SVGs easier to animate. Here’s how I do it. Start Clean And Design With Optimisation In Mind Keeping things simple is key to making SVGs that are optimised and ready to animate. Tools like Adobe Illustrator convert bitmap images to vectors, but the output often contains too many extraneous groups, layers, and masks. Instead, I start cleaning in Sketch, work from a reference image, and use the Pen tool to create paths. Tip: Affinity Designerand Sketchare alternatives to Adobe Illustrator and Figma. Both are independent and based in Europe. Sketch has been my default design app since Adobe killed Fireworks. Beginning With Outlines For these Toon Titles illustrations, I first use the Pen tool to draw black outlines with as few anchor points as possible. The more points a shape has, the bigger a file becomes, so simplifying paths and reducing the number of points makes an SVG much smaller, often with no discernible visual difference. Bearing in mind that parts of this Yogi illustration will ultimately be animated, I keep outlines for this Bewitched Bear’s body, head, collar, and tie separate so that I can move them independently. The head might nod, the tie could flap, and, like in those classic cartoons, Yogi’s collar will hide the joins between them. Drawing Simple Background Shapes With the outlines in place, I use the Pen tool again to draw new shapes, which fill the areas with colour. These colours sit behind the outlines, so they don’t need to match them exactly. The fewer anchor points, the smaller the file size. Sadly, neither Affinity Designer nor Sketch has tools that can simplify paths, but if you have it, using Adobe Illustrator can shave a few extra kilobytes off these background shapes. Optimising The Code It’s not just metadata that makes SVG bulkier. The way you export from your design app also affects file size. Exporting just those simple background shapes from Adobe Illustrator includes unnecessary groups, masks, and bloated path data by default. Sketch’s code is barely any better, and there’s plenty of room for improvement, even in its SVGO Compressor code. I rely on Jake Archibald’s SVGOMG, which uses SVGO v3 and consistently delivers the best optimised SVGs. Layering SVG Elements My process for preparing SVGs for animation goes well beyond drawing vectors and optimising paths — it also includes how I structure the code itself. When every visual element is crammed into a single SVG file, even optimised code can be a nightmare to navigate. Locating a specific path or group often feels like searching for a needle in a haystack. That’s why I develop my SVGs in layers, exporting and optimising one set of elements at a time — always in the order they’ll appear in the final file. This lets me build the master SVG gradually by pasting it in each cleaned-up section. For example, I start with backgrounds like this gradient and title graphic. Instead of facing a wall of SVG code, I can now easily identify the background gradient’s path and its associated linearGradient, and see the group containing the title graphic. I take this opportunity to add a comment to the code, which will make editing and adding animations to it easier in the future: <svg ...> <defs> <!-- ... --> </defs> <path fill="url" d="…"/> <!-- TITLE GRAPHIC --> <g> <path … /> <!-- ... --> </g> </svg> Next, I add the blurred trail from Yogi’s airborne broom. This includes defining a Gaussian Blur filter and placing its path between the background and title layers: <svg ...> <defs> <linearGradient id="grad" …>…</linearGradient> <filter id="trail" …>…</filter> </defs> <!-- GRADIENT --> <!-- TRAIL --> <path filter="url" …/> <!-- TITLE GRAPHIC --> </svg> Then come the magical stars, added in the same sequential fashion: <svg ...> <!-- GRADIENT --> <!-- TRAIL --> <!-- STARS --> <!-- TITLE GRAPHIC --> </svg> To keep everything organised and animation-ready, I create an empty group that will hold all the parts of Yogi: <g id="yogi">...</g> Then I build Yogi from the ground up — starting with background props, like his broom: <g id="broom">...</g> Followed by grouped elements for his body, head, collar, and tie: <g id="yogi"> <g id="broom">…</g> <g id="body">…</g> <g id="head">…</g> <g id="collar">…</g> <g id="tie">…</g> </g> Since I export each layer from the same-sized artboard, I don’t need to worry about alignment or positioning issues later on — they’ll all slot into place automatically. I keep my code clean, readable, and ordered logically by layering elements this way. It also makes animating smoother, as each component is easier to identify. Reusing Elements With <use> When duplicate shapes get reused repeatedly, SVG files can get bulky fast. My recreation of the “Bewitched Bear” title card contains 80 stars in three sizes. Combining all those shapes into one optimised path would bring the file size down to 3KB. But I want to animate individual stars, which would almost double that to 5KB: <g id="stars"> <path class="star-small" fill="#eae3da" d="..."/> <path class="star-medium" fill="#eae3da" d="..."/> <path class="star-large" fill="#eae3da" d="..."/> <!-- ... --> </g> Moving the stars’ fill attribute values to their parent group reduces the overall weight a little: <g id="stars" fill="#eae3da"> <path class="star-small" d="…"/> <path class="star-medium" d="…"/> <path class="star-large" d="…"/> <!-- ... --> </g> But a more efficient and manageable option is to define each star size as a reusable template: <defs> <path id="star-large" fill="#eae3da" fill-rule="evenodd" d="…"/> <path id="star-medium" fill="#eae3da" fill-rule="evenodd" d="…"/> <path id="star-small" fill="#eae3da" fill-rule="evenodd" d="…"/> </defs> With this setup, changing a star’s design only means updating its template once, and every instance updates automatically. Then, I reference each one using <use> and position them with x and y attributes: <g id="stars"> <!-- Large stars --> <use href="#star-large" x="1575" y="495"/> <!-- ... --> <!-- Medium stars --> <use href="#star-medium" x="1453" y="696"/> <!-- ... --> <!-- Small stars --> <use href="#star-small" x="1287" y="741"/> <!-- ... --> </g> This approach makes the SVG easier to manage, lighter to load, and faster to iterate on, especially when working with dozens of repeating elements. Best of all, it keeps the markup clean without compromising on flexibility or performance. Adding Animations The stars trailing behind Yogi’s stolen broom bring so much personality to the animation. I wanted them to sparkle in a seemingly random pattern against the dark blue background, so I started by defining a keyframe animation that cycles through different opacity levels: @keyframes sparkle { 0%, 100% { opacity: .1; } 50% { opacity: 1; } } Next, I applied this looping animation to every use element inside my stars group: #stars use { animation: sparkle 10s ease-in-out infinite; } The secret to creating a convincing twinkle lies in variation. I staggered animation delays and durations across the stars using nth-child selectors, starting with the quickest and most frequent sparkle effects: /* Fast, frequent */ #stars use:nth-child:nth-child{ animation-delay: .1s; animation-duration: 2s; } From there, I layered in additional timings to mix things up. Some stars sparkle slowly and dramatically, others more randomly, with a variety of rhythms and pauses: /* Medium */ #stars use:nth-child:nth-child{ ... } /* Slow, dramatic */ #stars use:nth-child:nth-child{ ... } /* Random */ #stars use:nth-child{ ... } /* Alternating */ #stars use:nth-child{ ... } /* Scattered */ #stars use:nth-child{ ... } By thoughtfully structuring the SVG and reusing elements, I can build complex-looking animations without bloated code, making even a simple effect like changing opacity sparkle. Then, for added realism, I make Yogi’s head wobble: @keyframes headWobble { 0% { transform: rotatetranslateY; } 100% { transform: rotatetranslateY; } } #head { animation: headWobble 0.8s cubic-bezierinfinite alternate; } His tie waves: @keyframes tieWave { 0%, 100% { transform: rotateZrotateYscaleX; } 33% { transform: rotateZrotateYscaleX; } 66% { transform: rotateZrotateYscaleX; } } #tie { transform-style: preserve-3d; animation: tieWave 10s cubic-bezierinfinite; } His broom swings: @keyframes broomSwing { 0%, 20% { transform: rotate; } 30% { transform: rotate; } 50%, 70% { transform: rotate; } 80% { transform: rotate; } 100% { transform: rotate; } } #broom { animation: broomSwing 4s cubic-bezierinfinite; } And, finally, Yogi himself gently rotates as he flies on his magical broom: @keyframes yogiWobble { 0% { transform: rotatetranslateYscale; } 30% { transform: rotatetranslateY; } 100% { transform: rotatetranslateYscale; } } #yogi { animation: yogiWobble 3.5s cubic-bezierinfinite alternate; } All these subtle movements bring Yogi to life. By developing structured SVGs, I can create animations that feel full of character without writing a single line of JavaScript. Try this yourself: See the Pen Bewitched Bear CSS/SVG animationby Andy Clarke. Conclusion Whether you’re recreating a classic title card or animating icons for an interface, the principles are the same: Start clean, Optimise early, and Structure everything with animation in mind. SVGs offer incredible creative freedom, but only if kept lean and manageable. When you plan your process like a production cell — layer by layer, element by element — you’ll spend less time untangling code and more time bringing your work to life. #smashing #animations #part #optimising #svgs
    SMASHINGMAGAZINE.COM
    Smashing Animations Part 4: Optimising SVGs
    SVG animations take me back to the Hanna-Barbera cartoons I watched as a kid. Shows like Wacky Races, The Perils of Penelope Pitstop, and, of course, Yogi Bear. They inspired me to lovingly recreate some classic Toon Titles using CSS, SVG, and SMIL animations. But getting animations to load quickly and work smoothly needs more than nostalgia. It takes clean design, lean code, and a process that makes complex SVGs easier to animate. Here’s how I do it. Start Clean And Design With Optimisation In Mind Keeping things simple is key to making SVGs that are optimised and ready to animate. Tools like Adobe Illustrator convert bitmap images to vectors, but the output often contains too many extraneous groups, layers, and masks. Instead, I start cleaning in Sketch, work from a reference image, and use the Pen tool to create paths. Tip: Affinity Designer (UK) and Sketch (Netherlands) are alternatives to Adobe Illustrator and Figma. Both are independent and based in Europe. Sketch has been my default design app since Adobe killed Fireworks. Beginning With Outlines For these Toon Titles illustrations, I first use the Pen tool to draw black outlines with as few anchor points as possible. The more points a shape has, the bigger a file becomes, so simplifying paths and reducing the number of points makes an SVG much smaller, often with no discernible visual difference. Bearing in mind that parts of this Yogi illustration will ultimately be animated, I keep outlines for this Bewitched Bear’s body, head, collar, and tie separate so that I can move them independently. The head might nod, the tie could flap, and, like in those classic cartoons, Yogi’s collar will hide the joins between them. Drawing Simple Background Shapes With the outlines in place, I use the Pen tool again to draw new shapes, which fill the areas with colour. These colours sit behind the outlines, so they don’t need to match them exactly. The fewer anchor points, the smaller the file size. Sadly, neither Affinity Designer nor Sketch has tools that can simplify paths, but if you have it, using Adobe Illustrator can shave a few extra kilobytes off these background shapes. Optimising The Code It’s not just metadata that makes SVG bulkier. The way you export from your design app also affects file size. Exporting just those simple background shapes from Adobe Illustrator includes unnecessary groups, masks, and bloated path data by default. Sketch’s code is barely any better, and there’s plenty of room for improvement, even in its SVGO Compressor code. I rely on Jake Archibald’s SVGOMG, which uses SVGO v3 and consistently delivers the best optimised SVGs. Layering SVG Elements My process for preparing SVGs for animation goes well beyond drawing vectors and optimising paths — it also includes how I structure the code itself. When every visual element is crammed into a single SVG file, even optimised code can be a nightmare to navigate. Locating a specific path or group often feels like searching for a needle in a haystack. That’s why I develop my SVGs in layers, exporting and optimising one set of elements at a time — always in the order they’ll appear in the final file. This lets me build the master SVG gradually by pasting it in each cleaned-up section. For example, I start with backgrounds like this gradient and title graphic. Instead of facing a wall of SVG code, I can now easily identify the background gradient’s path and its associated linearGradient, and see the group containing the title graphic. I take this opportunity to add a comment to the code, which will make editing and adding animations to it easier in the future: <svg ...> <defs> <!-- ... --> </defs> <path fill="url(#grad)" d="…"/> <!-- TITLE GRAPHIC --> <g> <path … /> <!-- ... --> </g> </svg> Next, I add the blurred trail from Yogi’s airborne broom. This includes defining a Gaussian Blur filter and placing its path between the background and title layers: <svg ...> <defs> <linearGradient id="grad" …>…</linearGradient> <filter id="trail" …>…</filter> </defs> <!-- GRADIENT --> <!-- TRAIL --> <path filter="url(#trail)" …/> <!-- TITLE GRAPHIC --> </svg> Then come the magical stars, added in the same sequential fashion: <svg ...> <!-- GRADIENT --> <!-- TRAIL --> <!-- STARS --> <!-- TITLE GRAPHIC --> </svg> To keep everything organised and animation-ready, I create an empty group that will hold all the parts of Yogi: <g id="yogi">...</g> Then I build Yogi from the ground up — starting with background props, like his broom: <g id="broom">...</g> Followed by grouped elements for his body, head, collar, and tie: <g id="yogi"> <g id="broom">…</g> <g id="body">…</g> <g id="head">…</g> <g id="collar">…</g> <g id="tie">…</g> </g> Since I export each layer from the same-sized artboard, I don’t need to worry about alignment or positioning issues later on — they’ll all slot into place automatically. I keep my code clean, readable, and ordered logically by layering elements this way. It also makes animating smoother, as each component is easier to identify. Reusing Elements With <use> When duplicate shapes get reused repeatedly, SVG files can get bulky fast. My recreation of the “Bewitched Bear” title card contains 80 stars in three sizes. Combining all those shapes into one optimised path would bring the file size down to 3KB. But I want to animate individual stars, which would almost double that to 5KB: <g id="stars"> <path class="star-small" fill="#eae3da" d="..."/> <path class="star-medium" fill="#eae3da" d="..."/> <path class="star-large" fill="#eae3da" d="..."/> <!-- ... --> </g> Moving the stars’ fill attribute values to their parent group reduces the overall weight a little: <g id="stars" fill="#eae3da"> <path class="star-small" d="…"/> <path class="star-medium" d="…"/> <path class="star-large" d="…"/> <!-- ... --> </g> But a more efficient and manageable option is to define each star size as a reusable template: <defs> <path id="star-large" fill="#eae3da" fill-rule="evenodd" d="…"/> <path id="star-medium" fill="#eae3da" fill-rule="evenodd" d="…"/> <path id="star-small" fill="#eae3da" fill-rule="evenodd" d="…"/> </defs> With this setup, changing a star’s design only means updating its template once, and every instance updates automatically. Then, I reference each one using <use> and position them with x and y attributes: <g id="stars"> <!-- Large stars --> <use href="#star-large" x="1575" y="495"/> <!-- ... --> <!-- Medium stars --> <use href="#star-medium" x="1453" y="696"/> <!-- ... --> <!-- Small stars --> <use href="#star-small" x="1287" y="741"/> <!-- ... --> </g> This approach makes the SVG easier to manage, lighter to load, and faster to iterate on, especially when working with dozens of repeating elements. Best of all, it keeps the markup clean without compromising on flexibility or performance. Adding Animations The stars trailing behind Yogi’s stolen broom bring so much personality to the animation. I wanted them to sparkle in a seemingly random pattern against the dark blue background, so I started by defining a keyframe animation that cycles through different opacity levels: @keyframes sparkle { 0%, 100% { opacity: .1; } 50% { opacity: 1; } } Next, I applied this looping animation to every use element inside my stars group: #stars use { animation: sparkle 10s ease-in-out infinite; } The secret to creating a convincing twinkle lies in variation. I staggered animation delays and durations across the stars using nth-child selectors, starting with the quickest and most frequent sparkle effects: /* Fast, frequent */ #stars use:nth-child(n + 1):nth-child(-n + 10) { animation-delay: .1s; animation-duration: 2s; } From there, I layered in additional timings to mix things up. Some stars sparkle slowly and dramatically, others more randomly, with a variety of rhythms and pauses: /* Medium */ #stars use:nth-child(n + 11):nth-child(-n + 20) { ... } /* Slow, dramatic */ #stars use:nth-child(n + 21):nth-child(-n + 30) { ... } /* Random */ #stars use:nth-child(3n + 2) { ... } /* Alternating */ #stars use:nth-child(4n + 1) { ... } /* Scattered */ #stars use:nth-child(n + 31) { ... } By thoughtfully structuring the SVG and reusing elements, I can build complex-looking animations without bloated code, making even a simple effect like changing opacity sparkle. Then, for added realism, I make Yogi’s head wobble: @keyframes headWobble { 0% { transform: rotate(-0.8deg) translateY(-0.5px); } 100% { transform: rotate(0.9deg) translateY(0.3px); } } #head { animation: headWobble 0.8s cubic-bezier(0.5, 0.15, 0.5, 0.85) infinite alternate; } His tie waves: @keyframes tieWave { 0%, 100% { transform: rotateZ(-4deg) rotateY(15deg) scaleX(0.96); } 33% { transform: rotateZ(5deg) rotateY(-10deg) scaleX(1.05); } 66% { transform: rotateZ(-2deg) rotateY(5deg) scaleX(0.98); } } #tie { transform-style: preserve-3d; animation: tieWave 10s cubic-bezier(0.68, -0.55, 0.27, 1.55) infinite; } His broom swings: @keyframes broomSwing { 0%, 20% { transform: rotate(-5deg); } 30% { transform: rotate(-4deg); } 50%, 70% { transform: rotate(5deg); } 80% { transform: rotate(4deg); } 100% { transform: rotate(-5deg); } } #broom { animation: broomSwing 4s cubic-bezier(0.5, 0.05, 0.5, 0.95) infinite; } And, finally, Yogi himself gently rotates as he flies on his magical broom: @keyframes yogiWobble { 0% { transform: rotate(-2.8deg) translateY(-0.8px) scale(0.998); } 30% { transform: rotate(1.5deg) translateY(0.3px); } 100% { transform: rotate(3.2deg) translateY(1.2px) scale(1.002); } } #yogi { animation: yogiWobble 3.5s cubic-bezier(.37, .14, .3, .86) infinite alternate; } All these subtle movements bring Yogi to life. By developing structured SVGs, I can create animations that feel full of character without writing a single line of JavaScript. Try this yourself: See the Pen Bewitched Bear CSS/SVG animation [forked] by Andy Clarke. Conclusion Whether you’re recreating a classic title card or animating icons for an interface, the principles are the same: Start clean, Optimise early, and Structure everything with animation in mind. SVGs offer incredible creative freedom, but only if kept lean and manageable. When you plan your process like a production cell — layer by layer, element by element — you’ll spend less time untangling code and more time bringing your work to life.
    Like
    Love
    Wow
    Angry
    Sad
    273
    0 Comentários 0 Compartilhamentos
  • Book review: Sustainable Housing in a Circular Economy

    By Naomi Keena and Avi FriedmanThe next frontier for housing is one that looks to embedding housing as part of a circular economy. Is it possible, this book asks, to disrupt the “take, make, waste” model of producing housing to instead provide affordable, waste-free housing?
    A circular economy approach is often associated with waste recovery: designing buildings so that their component parts can be disassembled and reused. But an equally important aim is to right-size buildings and keep them in use for as long as possible, through strategies including engaging in the sharing economy and planning for flexibility in the use of spaces. The book also explores the role of digitization and data standardization, such as in digital passports that track raw materials as they are used—and reused—over time.
    This book is primarily intended as an academic text, but for architects interested in the topic, there are gems to be gleaned, especially in the global case studies. A particularly revealing graphic shows the exponential growth of construction material use in the United States over the past century—a mountain that dwarfs all other resources. A circular economy approach to housing is not just a luxury—but will be necessary to reverse the trend, and ensure a sustainable future.

     As appeared in the June 2025 issue of Canadian Architect magazine 

    The post Book review: Sustainable Housing in a Circular Economy appeared first on Canadian Architect.
    #book #review #sustainable #housing #circular
    Book review: Sustainable Housing in a Circular Economy
    By Naomi Keena and Avi FriedmanThe next frontier for housing is one that looks to embedding housing as part of a circular economy. Is it possible, this book asks, to disrupt the “take, make, waste” model of producing housing to instead provide affordable, waste-free housing? A circular economy approach is often associated with waste recovery: designing buildings so that their component parts can be disassembled and reused. But an equally important aim is to right-size buildings and keep them in use for as long as possible, through strategies including engaging in the sharing economy and planning for flexibility in the use of spaces. The book also explores the role of digitization and data standardization, such as in digital passports that track raw materials as they are used—and reused—over time. This book is primarily intended as an academic text, but for architects interested in the topic, there are gems to be gleaned, especially in the global case studies. A particularly revealing graphic shows the exponential growth of construction material use in the United States over the past century—a mountain that dwarfs all other resources. A circular economy approach to housing is not just a luxury—but will be necessary to reverse the trend, and ensure a sustainable future.  As appeared in the June 2025 issue of Canadian Architect magazine  The post Book review: Sustainable Housing in a Circular Economy appeared first on Canadian Architect. #book #review #sustainable #housing #circular
    WWW.CANADIANARCHITECT.COM
    Book review: Sustainable Housing in a Circular Economy
    By Naomi Keena and Avi Friedman (Routledge, 2024) The next frontier for housing is one that looks to embedding housing as part of a circular economy. Is it possible, this book asks, to disrupt the “take, make, waste” model of producing housing to instead provide affordable, waste-free housing? A circular economy approach is often associated with waste recovery: designing buildings so that their component parts can be disassembled and reused. But an equally important aim is to right-size buildings and keep them in use for as long as possible, through strategies including engaging in the sharing economy and planning for flexibility in the use of spaces. The book also explores the role of digitization and data standardization, such as in digital passports that track raw materials as they are used—and reused—over time. This book is primarily intended as an academic text, but for architects interested in the topic, there are gems to be gleaned, especially in the global case studies. A particularly revealing graphic shows the exponential growth of construction material use in the United States over the past century—a mountain that dwarfs all other resources. A circular economy approach to housing is not just a luxury—but will be necessary to reverse the trend, and ensure a sustainable future.  As appeared in the June 2025 issue of Canadian Architect magazine  The post Book review: Sustainable Housing in a Circular Economy appeared first on Canadian Architect.
    0 Comentários 0 Compartilhamentos
  • SpaceX Starship Flight 9 Reuses Booster, Gathers Key Data Despite Loss

    Photo Credit: SpaceX SpaceX Starship Flight 9 Reuses Booster, Gathers Key Data Despite Loss

    Highlights

    First reuse of Super Heavy booster marks key Starship milestone
    Ship reached space but failed to deploy dummy Starlink satellites
    Valuable reentry and tile test data collected despite stage losses

    Advertisement

    SpaceX launched its ninth Starship test flight on May 27 that featured the first-ever significant reuse of Starship hardware. As planned on Flight 9, Starship's two stages separated successfully, and the upper stage even reached space. However, both were ultimately lost before completing their objectives. Despite these setbacks, the mission yielded valuable data which inspires SpaceX's iterative approach to innovation as it aims to create a fully reusable launch system for space missions. This test flight exhibited successful reuse of a Super Heavy booster and aimed to demonstrate improved hardware performance.Previous test flightsAccording to official site of SpaceX, Starship's two stages are one giant booster called Super Heavy and a 171-foot-tallupper-stage spacecraft known as Starship, or simply "Ship." Both are powered by SpaceX's new Raptor engine — 33 of them for Super Heavy and six for Ship.On Flight 7 and Flight 8 the Super Heavy performed flawlessly, acing its engine burn and then returning to Starbase for a catch by the launch tower's "chopstick" arms. But Ship had problems: It exploded less than 10 minutes after launch on both missions, raining debris down on the Turks and Caicos Islands and The Bahamas, respectively.Advancements in flight 9In flight 9, SpaceX reused a Super Heavy booster for the first time, swapping out just four of its 33 Raptor engines after its initial flight in January. The booster also conducted a new atmospheric entry experiment, entering at a higher angle to collect data on aerodynamic control. Meanwhile, Shipwas tasked with deploying eight dummy Starlink satellites.Despite the promising advances, Flight 9 encountered several failures. Super Heavy broke apart roughly six minutes after launch during its return burn, and Ship lost control due to a fuel tank leak. The upper stage began tumbling, which prevented a planned in-space engine relight and led to a destructive reentry over the Indian Ocean. Still, SpaceX gained critical data, particularly on tile performance and active cooling systems.

     

    For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

    Further reading:
    SpaceX, Starship, Super Heavy, Starship Flight 9, Elon Musk, Rocket Reuse, Raptor Engine, Space Launch, Space Innovation, Starlink, Reusable Rocket

    Gadgets 360 Staff

    The resident bot. If you email me, a human will respond.
    More

    Related Stories
    #spacex #starship #flight #reuses #booster
    SpaceX Starship Flight 9 Reuses Booster, Gathers Key Data Despite Loss
    Photo Credit: SpaceX SpaceX Starship Flight 9 Reuses Booster, Gathers Key Data Despite Loss Highlights First reuse of Super Heavy booster marks key Starship milestone Ship reached space but failed to deploy dummy Starlink satellites Valuable reentry and tile test data collected despite stage losses Advertisement SpaceX launched its ninth Starship test flight on May 27 that featured the first-ever significant reuse of Starship hardware. As planned on Flight 9, Starship's two stages separated successfully, and the upper stage even reached space. However, both were ultimately lost before completing their objectives. Despite these setbacks, the mission yielded valuable data which inspires SpaceX's iterative approach to innovation as it aims to create a fully reusable launch system for space missions. This test flight exhibited successful reuse of a Super Heavy booster and aimed to demonstrate improved hardware performance.Previous test flightsAccording to official site of SpaceX, Starship's two stages are one giant booster called Super Heavy and a 171-foot-tallupper-stage spacecraft known as Starship, or simply "Ship." Both are powered by SpaceX's new Raptor engine — 33 of them for Super Heavy and six for Ship.On Flight 7 and Flight 8 the Super Heavy performed flawlessly, acing its engine burn and then returning to Starbase for a catch by the launch tower's "chopstick" arms. But Ship had problems: It exploded less than 10 minutes after launch on both missions, raining debris down on the Turks and Caicos Islands and The Bahamas, respectively.Advancements in flight 9In flight 9, SpaceX reused a Super Heavy booster for the first time, swapping out just four of its 33 Raptor engines after its initial flight in January. The booster also conducted a new atmospheric entry experiment, entering at a higher angle to collect data on aerodynamic control. Meanwhile, Shipwas tasked with deploying eight dummy Starlink satellites.Despite the promising advances, Flight 9 encountered several failures. Super Heavy broke apart roughly six minutes after launch during its return burn, and Ship lost control due to a fuel tank leak. The upper stage began tumbling, which prevented a planned in-space engine relight and led to a destructive reentry over the Indian Ocean. Still, SpaceX gained critical data, particularly on tile performance and active cooling systems.   For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube. Further reading: SpaceX, Starship, Super Heavy, Starship Flight 9, Elon Musk, Rocket Reuse, Raptor Engine, Space Launch, Space Innovation, Starlink, Reusable Rocket Gadgets 360 Staff The resident bot. If you email me, a human will respond. More Related Stories #spacex #starship #flight #reuses #booster
    WWW.GADGETS360.COM
    SpaceX Starship Flight 9 Reuses Booster, Gathers Key Data Despite Loss
    Photo Credit: SpaceX SpaceX Starship Flight 9 Reuses Booster, Gathers Key Data Despite Loss Highlights First reuse of Super Heavy booster marks key Starship milestone Ship reached space but failed to deploy dummy Starlink satellites Valuable reentry and tile test data collected despite stage losses Advertisement SpaceX launched its ninth Starship test flight on May 27 that featured the first-ever significant reuse of Starship hardware. As planned on Flight 9, Starship's two stages separated successfully, and the upper stage even reached space. However, both were ultimately lost before completing their objectives. Despite these setbacks, the mission yielded valuable data which inspires SpaceX's iterative approach to innovation as it aims to create a fully reusable launch system for space missions. This test flight exhibited successful reuse of a Super Heavy booster and aimed to demonstrate improved hardware performance.Previous test flightsAccording to official site of SpaceX, Starship's two stages are one giant booster called Super Heavy and a 171-foot-tall (52 meters) upper-stage spacecraft known as Starship, or simply "Ship." Both are powered by SpaceX's new Raptor engine — 33 of them for Super Heavy and six for Ship.On Flight 7 and Flight 8 the Super Heavy performed flawlessly, acing its engine burn and then returning to Starbase for a catch by the launch tower's "chopstick" arms. But Ship had problems: It exploded less than 10 minutes after launch on both missions, raining debris down on the Turks and Caicos Islands and The Bahamas, respectively.Advancements in flight 9In flight 9, SpaceX reused a Super Heavy booster for the first time, swapping out just four of its 33 Raptor engines after its initial flight in January. The booster also conducted a new atmospheric entry experiment, entering at a higher angle to collect data on aerodynamic control. Meanwhile, Ship (the upper stage) was tasked with deploying eight dummy Starlink satellites.Despite the promising advances, Flight 9 encountered several failures. Super Heavy broke apart roughly six minutes after launch during its return burn, and Ship lost control due to a fuel tank leak. The upper stage began tumbling, which prevented a planned in-space engine relight and led to a destructive reentry over the Indian Ocean. Still, SpaceX gained critical data, particularly on tile performance and active cooling systems.   For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube. Further reading: SpaceX, Starship, Super Heavy, Starship Flight 9, Elon Musk, Rocket Reuse, Raptor Engine, Space Launch, Space Innovation, Starlink, Reusable Rocket Gadgets 360 Staff The resident bot. If you email me, a human will respond. More Related Stories
    0 Comentários 0 Compartilhamentos
  • How microwave tech can help reclaim critical materials from e-waste

    When the computer or phone you’re using right now blinks its last blink and you drop it off for recycling, do you know what happens?

    At the recycling center, powerful magnets will pull out steel. Spinning drums will toss aluminum into bins. Copper wires will get neatly bundled up for resale. But as the conveyor belt keeps rolling, tiny specks of valuable, lesser-known materials such as gallium, indium, and tantalum will be left behind.

    Those tiny specks are critical materials. They’re essential for building new technology, and they’re in short supply in the U.S. They could be reused, but there’s a problem: Current recycling methods make recovering critical minerals from e-waste too costly or hazardous, so many recyclers simply skip them.

    Sadly, most of these hard-to-recycle materials end up buried in landfills or get mixed into products like cement. But it doesn’t have to be this way. New technology is starting to make a difference.

    As demand for these critical materials keeps growing, discarded electronics can become valuable resources. My colleagues and I at West Virginia University are developing a new technology to change how we recycle. Instead of using toxic chemicals, our approach uses electricity, making it safer, cleaner, and more affordable to recover critical materials from electronics.

    How much e-waste are we talking about?

    Americans generated about 2.7 million tons of electronic waste in 2018, according to the latest federal data. Including uncounted electronics, the U.S. recycles only about 15% of its total e-waste, suggests a survey by the United Nations.

    Even worse, nearly half the electronics that people in Northern America sent to recycling centers end up shipped overseas. They often land in scrapyards, where workers may use dangerous methods like burning or leaching with harsh chemicals to pull out valuable metals. These practices can harm both the environment and workers’ health. That’s why the Environmental Protection Agency restricts these methods in the U.S.

    The tiny specks matter

    Critical minerals are in most of the technology around you. Every phone screen has a super-thin layer of a material called indium tin oxide. LEDs glow because of a metal called gallium. Tantalum stores energy in tiny electronic parts called capacitors.

    All of these materials are flagged as “high risk” on the U.S. Department of Energy’s critical materials list. That means the U.S. relies heavily on these materials for important technologies, but their supply could easily be disrupted by conflicts, trade disputes, or shortages.

    Right now, just a few countries, including China, control most of the mining, processing, and recovery of these materials, making the U.S. vulnerable if those countries decide to limit exports or raise prices.

    These materials aren’t cheap, either. For example, the U.S. Geological Survey reports that gallium was priced between to per kilogram in 2024. That’s 50 times more expensive than common metals like copper, at per kilogram in 2024.

    Revolutionizing recycling with microwaves

    At West Virginia University’s Department of Mechanical, Materials, and Aerospace Engineering, I and materials scientist Edward Sabolsky asked a simple question: Could we find a way to heat only specific parts of electronic waste to recover these valuable materials?

    If we could focus the heat on just the tiny specks of critical minerals, we might be able to recycle them easily and efficiently.

    The solution we found: microwaves.

    This equipment isn’t very different from the microwave ovens you use to heat food at home, just bigger and more powerful. The basic science is the same: Electromagnetic waves cause electrons to oscillate, creating heat.

    In our approach, though, we’re not heating water molecules like you do when cooking. Instead, we heat carbon, the black residue that collects around a candle flame or car tailpipe. Carbon heats up much faster in a microwave than water does. But don’t try this at home; your kitchen microwave wasn’t designed for such high temperatures.

    In our recycling method, we first shred the electronic waste, mix it with materials called fluxes that trap impurities, and then heat the mixture with microwaves. The microwaves rapidly heat the carbon that comes from the plastics and adhesives in the e-waste. This causes the carbon to react with the tiny specks of critical materials. The result: a tiny piece of pure, sponge-like metal about the size of a grain of rice.

    This metal can then be easily separated from leftover waste using filters.

    So far, in our laboratory tests, we have successfully recovered about 80% of the gallium, indium, and tantalum from e-waste, at purities between 95% and 97%. We have also demonstrated how it can be integrated with existing recycling processes.

    Why the Department of Defense is interested

    Our recycling technology got its start with help from a program funded by the Defense Department’s Advanced Research Projects Agency, or DARPA.

    Many important technologies, from radar systems to nuclear reactors, depend on these special materials. While the Department of Defense uses less of them than the commercial market, they are a national security concern.

    We’re planning to launch larger pilot projects next to test the method on smartphone circuit boards, LED lighting parts, and server cards from data centers. These tests will help us fine-tune the design for a bigger system that can recycle tons of e-waste per hour instead of just a few pounds. That could mean producing up to 50 pounds of these critical minerals per hour from every ton of e-waste processed.

    If the technology works as expected, we believe this approach could help meet the nation’s demand for critical materials.

    How to make e-waste recycling common

    One way e-waste recycling could become more common is if Congress held electronics companies responsible for recycling their products and recovering the critical materials inside. Closing loopholes that allow companies to ship e-waste overseas, instead of processing it safely in the U.S., could also help build a reserve of recovered critical minerals.

    But the biggest change may come from simple economics. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.

    Terence Musho is an associate professor of engineering at West Virginia University.

    This article is republished from The Conversation under a Creative Commons license. Read the original article.
    #how #microwave #tech #can #help
    How microwave tech can help reclaim critical materials from e-waste
    When the computer or phone you’re using right now blinks its last blink and you drop it off for recycling, do you know what happens? At the recycling center, powerful magnets will pull out steel. Spinning drums will toss aluminum into bins. Copper wires will get neatly bundled up for resale. But as the conveyor belt keeps rolling, tiny specks of valuable, lesser-known materials such as gallium, indium, and tantalum will be left behind. Those tiny specks are critical materials. They’re essential for building new technology, and they’re in short supply in the U.S. They could be reused, but there’s a problem: Current recycling methods make recovering critical minerals from e-waste too costly or hazardous, so many recyclers simply skip them. Sadly, most of these hard-to-recycle materials end up buried in landfills or get mixed into products like cement. But it doesn’t have to be this way. New technology is starting to make a difference. As demand for these critical materials keeps growing, discarded electronics can become valuable resources. My colleagues and I at West Virginia University are developing a new technology to change how we recycle. Instead of using toxic chemicals, our approach uses electricity, making it safer, cleaner, and more affordable to recover critical materials from electronics. How much e-waste are we talking about? Americans generated about 2.7 million tons of electronic waste in 2018, according to the latest federal data. Including uncounted electronics, the U.S. recycles only about 15% of its total e-waste, suggests a survey by the United Nations. Even worse, nearly half the electronics that people in Northern America sent to recycling centers end up shipped overseas. They often land in scrapyards, where workers may use dangerous methods like burning or leaching with harsh chemicals to pull out valuable metals. These practices can harm both the environment and workers’ health. That’s why the Environmental Protection Agency restricts these methods in the U.S. The tiny specks matter Critical minerals are in most of the technology around you. Every phone screen has a super-thin layer of a material called indium tin oxide. LEDs glow because of a metal called gallium. Tantalum stores energy in tiny electronic parts called capacitors. All of these materials are flagged as “high risk” on the U.S. Department of Energy’s critical materials list. That means the U.S. relies heavily on these materials for important technologies, but their supply could easily be disrupted by conflicts, trade disputes, or shortages. Right now, just a few countries, including China, control most of the mining, processing, and recovery of these materials, making the U.S. vulnerable if those countries decide to limit exports or raise prices. These materials aren’t cheap, either. For example, the U.S. Geological Survey reports that gallium was priced between to per kilogram in 2024. That’s 50 times more expensive than common metals like copper, at per kilogram in 2024. Revolutionizing recycling with microwaves At West Virginia University’s Department of Mechanical, Materials, and Aerospace Engineering, I and materials scientist Edward Sabolsky asked a simple question: Could we find a way to heat only specific parts of electronic waste to recover these valuable materials? If we could focus the heat on just the tiny specks of critical minerals, we might be able to recycle them easily and efficiently. The solution we found: microwaves. This equipment isn’t very different from the microwave ovens you use to heat food at home, just bigger and more powerful. The basic science is the same: Electromagnetic waves cause electrons to oscillate, creating heat. In our approach, though, we’re not heating water molecules like you do when cooking. Instead, we heat carbon, the black residue that collects around a candle flame or car tailpipe. Carbon heats up much faster in a microwave than water does. But don’t try this at home; your kitchen microwave wasn’t designed for such high temperatures. In our recycling method, we first shred the electronic waste, mix it with materials called fluxes that trap impurities, and then heat the mixture with microwaves. The microwaves rapidly heat the carbon that comes from the plastics and adhesives in the e-waste. This causes the carbon to react with the tiny specks of critical materials. The result: a tiny piece of pure, sponge-like metal about the size of a grain of rice. This metal can then be easily separated from leftover waste using filters. So far, in our laboratory tests, we have successfully recovered about 80% of the gallium, indium, and tantalum from e-waste, at purities between 95% and 97%. We have also demonstrated how it can be integrated with existing recycling processes. Why the Department of Defense is interested Our recycling technology got its start with help from a program funded by the Defense Department’s Advanced Research Projects Agency, or DARPA. Many important technologies, from radar systems to nuclear reactors, depend on these special materials. While the Department of Defense uses less of them than the commercial market, they are a national security concern. We’re planning to launch larger pilot projects next to test the method on smartphone circuit boards, LED lighting parts, and server cards from data centers. These tests will help us fine-tune the design for a bigger system that can recycle tons of e-waste per hour instead of just a few pounds. That could mean producing up to 50 pounds of these critical minerals per hour from every ton of e-waste processed. If the technology works as expected, we believe this approach could help meet the nation’s demand for critical materials. How to make e-waste recycling common One way e-waste recycling could become more common is if Congress held electronics companies responsible for recycling their products and recovering the critical materials inside. Closing loopholes that allow companies to ship e-waste overseas, instead of processing it safely in the U.S., could also help build a reserve of recovered critical minerals. But the biggest change may come from simple economics. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials. Terence Musho is an associate professor of engineering at West Virginia University. This article is republished from The Conversation under a Creative Commons license. Read the original article. #how #microwave #tech #can #help
    WWW.FASTCOMPANY.COM
    How microwave tech can help reclaim critical materials from e-waste
    When the computer or phone you’re using right now blinks its last blink and you drop it off for recycling, do you know what happens? At the recycling center, powerful magnets will pull out steel. Spinning drums will toss aluminum into bins. Copper wires will get neatly bundled up for resale. But as the conveyor belt keeps rolling, tiny specks of valuable, lesser-known materials such as gallium, indium, and tantalum will be left behind. Those tiny specks are critical materials. They’re essential for building new technology, and they’re in short supply in the U.S. They could be reused, but there’s a problem: Current recycling methods make recovering critical minerals from e-waste too costly or hazardous, so many recyclers simply skip them. Sadly, most of these hard-to-recycle materials end up buried in landfills or get mixed into products like cement. But it doesn’t have to be this way. New technology is starting to make a difference. As demand for these critical materials keeps growing, discarded electronics can become valuable resources. My colleagues and I at West Virginia University are developing a new technology to change how we recycle. Instead of using toxic chemicals, our approach uses electricity, making it safer, cleaner, and more affordable to recover critical materials from electronics. How much e-waste are we talking about? Americans generated about 2.7 million tons of electronic waste in 2018, according to the latest federal data. Including uncounted electronics, the U.S. recycles only about 15% of its total e-waste, suggests a survey by the United Nations. Even worse, nearly half the electronics that people in Northern America sent to recycling centers end up shipped overseas. They often land in scrapyards, where workers may use dangerous methods like burning or leaching with harsh chemicals to pull out valuable metals. These practices can harm both the environment and workers’ health. That’s why the Environmental Protection Agency restricts these methods in the U.S. The tiny specks matter Critical minerals are in most of the technology around you. Every phone screen has a super-thin layer of a material called indium tin oxide. LEDs glow because of a metal called gallium. Tantalum stores energy in tiny electronic parts called capacitors. All of these materials are flagged as “high risk” on the U.S. Department of Energy’s critical materials list. That means the U.S. relies heavily on these materials for important technologies, but their supply could easily be disrupted by conflicts, trade disputes, or shortages. Right now, just a few countries, including China, control most of the mining, processing, and recovery of these materials, making the U.S. vulnerable if those countries decide to limit exports or raise prices. These materials aren’t cheap, either. For example, the U.S. Geological Survey reports that gallium was priced between $220 to $500 per kilogram in 2024. That’s 50 times more expensive than common metals like copper, at $9.48 per kilogram in 2024. Revolutionizing recycling with microwaves At West Virginia University’s Department of Mechanical, Materials, and Aerospace Engineering, I and materials scientist Edward Sabolsky asked a simple question: Could we find a way to heat only specific parts of electronic waste to recover these valuable materials? If we could focus the heat on just the tiny specks of critical minerals, we might be able to recycle them easily and efficiently. The solution we found: microwaves. This equipment isn’t very different from the microwave ovens you use to heat food at home, just bigger and more powerful. The basic science is the same: Electromagnetic waves cause electrons to oscillate, creating heat. In our approach, though, we’re not heating water molecules like you do when cooking. Instead, we heat carbon, the black residue that collects around a candle flame or car tailpipe. Carbon heats up much faster in a microwave than water does. But don’t try this at home; your kitchen microwave wasn’t designed for such high temperatures. In our recycling method, we first shred the electronic waste, mix it with materials called fluxes that trap impurities, and then heat the mixture with microwaves. The microwaves rapidly heat the carbon that comes from the plastics and adhesives in the e-waste. This causes the carbon to react with the tiny specks of critical materials. The result: a tiny piece of pure, sponge-like metal about the size of a grain of rice. This metal can then be easily separated from leftover waste using filters. So far, in our laboratory tests, we have successfully recovered about 80% of the gallium, indium, and tantalum from e-waste, at purities between 95% and 97%. We have also demonstrated how it can be integrated with existing recycling processes. Why the Department of Defense is interested Our recycling technology got its start with help from a program funded by the Defense Department’s Advanced Research Projects Agency, or DARPA. Many important technologies, from radar systems to nuclear reactors, depend on these special materials. While the Department of Defense uses less of them than the commercial market, they are a national security concern. We’re planning to launch larger pilot projects next to test the method on smartphone circuit boards, LED lighting parts, and server cards from data centers. These tests will help us fine-tune the design for a bigger system that can recycle tons of e-waste per hour instead of just a few pounds. That could mean producing up to 50 pounds of these critical minerals per hour from every ton of e-waste processed. If the technology works as expected, we believe this approach could help meet the nation’s demand for critical materials. How to make e-waste recycling common One way e-waste recycling could become more common is if Congress held electronics companies responsible for recycling their products and recovering the critical materials inside. Closing loopholes that allow companies to ship e-waste overseas, instead of processing it safely in the U.S., could also help build a reserve of recovered critical minerals. But the biggest change may come from simple economics. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials. Terence Musho is an associate professor of engineering at West Virginia University. This article is republished from The Conversation under a Creative Commons license. Read the original article.
    0 Comentários 0 Compartilhamentos