Toggle light / dark theme

The concept aims to encourage public transportation in the city.

Ponti Design Studio revealed a concept design of an electric double-decker driverless tram to hit the roads of post-COVID Hong Kong. Dubbed Island.

The vehicle’s curved windows and see-through top let the sunshine in during the day, allowing passengers to enjoy the city view at night. According to the website, the interiors are sleek and comfortable, with charcoal gray walls, cushioned seats, wooden floors, and trims with a natural finish. Island won the 2020 GIDA Design Award.


Island is a driverless tram designed by Ponti Design Studio. We provide sustainable mobility, automotive and transportation design, aviation and rail design.

“All bets are off if the nukes start flying,” Musk recently tweeted.

Elon Musk reportedly rejected a request from within Ukraine to extend SpaceX’s Starlink satellite internet coverage to Crimea, according to a newsletter from political analyst Ian Bremmer.

However, Musk has taken to Twitter after those reports were published and has cast doubt on their veracity by claiming that “nobody should trust Bremmer”.


Source: 1, 2

How many bottles does he have to sell to buy out Twitter? You do the math.

The world’s richest person Elon Musk launched a new perfume, and about 24 hours later, he had orders worth two million dollars. With no prior exposure in the business, the perfume has sold on Musk’s reputation alone, and rightly so; the Tesla CEO now changed his Twitter description to Perfume Salesman.

Last Sunday, Musk unveiled the Burnt Hair perfume to his Twitter followers and how it would be a product from his tunneling venture, The Boring Company.


JDLasica/Wikimedia Commons.

The country plans to increase its installed renewable energy capacity to 25 GW by 2030.

Greece met its energy demands from only renewable sources of energy for a period of five hours on Friday, October 7, PV Tech.

Back in the U.S., the state of California has managed to reach this landmark milestone a couple of times this year. However, Greece’s achievement is remarkable as the region is also fighting off a self-imposed ban on using Russia-supplied gas, in the wake of the conflict in Ukraine.

Many investors and onlookers are wondering what the future of Tesla’s valuation will look like, especially knowing how the company could revolutionize the world with its products. From electric vehicles to sustainable energy, some have even made the case that Tesla could someday become the world’s largest company — likely shifting the way the world works either way.

How Tesla Hits $10T & Builds The Future. Source: HyperChange

Gali Russell, former EVANNEX contributor and host of YouTube channel HyperChange, recently made a video evaluating the case for how Tesla is likely to eventually hit a $10 trillion market capitalization, changing the world as we know it. The video even gained a stamp of approval from Tesla CEO Elon Musk via a like on Twitter, and it offers one of the best breakdowns of this idea we’ve seen as of late.

Cybersecurity has been compared to a never-ending game of whack-a-mole, with an ever-changing cast of threats and threat actors. While the attacks that make headlines may change from year to year, the basic fact remains: Any network, no matter how obscure the organization it supports, most likely will come under attack at some point. Thus, attaining and maintaining a strong security posture is of critical importance for organizations of any size.

An organization’s security posture, however, is constantly changing. Employees join or leave the company; endpoints are added and discarded; and network and security technologies are deployed, decommissioned, configured, and updated. Each change in network elements can represent a potential attack vector for malware and other threats.

That’s why security teams should review their security processes periodically and keep aligned with new developments in defensive and offensive testing and modeling. Doing so can help move the needle on security maturity from the most basic to an advanced, much stronger security posture, and from a reactive to a proactive model.