Jamin sez,"Back in October, Cory was kind enough to post a link to my Halloween costume [Ed: this was a wearable puppet theater/playset that was so fantastically fantastic it beggars description.] At long last, here's video of the costume in action. Thanks so much for taking a look. I hope you enjoy it."
This is my Halloween costume for 2012. It took six months to plan and another six months to build. Everything is controlled from inside the costume. The kids are moved via magnets under the floors. The ropes on the front are pulled from behind to open and close the doors, revealing the rooms inside. The magpie and the ship's sails in the great hall are both hiding inside or behind furniture until they're activated. The lightning is a simple led and the kids on the spiral stair rotate around a dowel set into a heavy paper tube with a spiral cut into it for a guide. I plan on doing an extensive process post soonish.
It’s been seven years since we previewedTheft: A History of Music, a comic book that explains the complicated history of music, borrowing, control and copyright, created by a dynamic duo of witty copyright law professors from Duke University as a followup to the greatest law-comic ever published: the book was due out years ago, but the untimely and tragic death of illustrator Keith Aoki delayed it — until today.
Announced today: So It Is, a new album of Cuban-inspired jazz from the monumentally amazing Preservation Hall Jazz Band (previously), due out on April 21. Available today: Santiago, an instrumental track from the album that will MAKE YOU DANCE.
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]