Architecture Search Results

How To: Use the Film & Stage plugin in SketchUp

Alex Oliver demonstrates how Art Directors and Cinematographers can use the Film & Stage plugin in SketchUp to explore the use of different camera lenses and aspect ratios on location or on a production set. The Film and Stage plug-in is a great way for film makers and directors to pre-visualize shots and scenes in SketchUp, a software you may only have thought useful for architecture and product pre-visualization. Learn how to plan shots and do animatics in this SketchUp tutorial.

How To: Understand the basics of trigonometry

Learn and understand the basics of Trigonometry in this entertaining video. Taught by an experienced YayMath instructor, viewers gain knowledge in the study of trigonometry: the relationship of angles and the triangles they are in. Trigonometry is relevant in many forms of everyday living and careers including architecture. Watch as the experienced instructor gives easy-to-follow instructions and examples including solving "x for y" equations using the 'SOHCAHTOA' method, an abbreviation for ...

How To: Find the area of a circle easily

In this video lesson, you learn how to find the area of a circle. The video starts with an explanation of the area's formula. This formula can then be used to find the area of any circle, given its radius, which is half the diameter of the circle. There are many applications for this formula, whether in architecture, or studying for a basic geometry test. Euclidean geometry is the cornerstone of any education, and this video teaches you one of the many formulas in geometry.

How To: Find the volume of a cone quickly

For people who are interested in math or who need to know how to find the volume of a cone for any reason, whether it be homework or architecture, this video will show you how to do so. The formula for finding the volume of a cone is (1/3) pi x radius^2 x height. You can find the radius of your cone by finding half the length across the center of the circle which is the cone's base. After plugging in all the values into this equation, you will be able to find the volume of any cone when given...

How To: Design like an architect with asymmetry

Ever dreamed of becoming an architect? Well in this video, the viewers will be instantly thrown into the world of an architect. The video demonstrates and shows how to design like an architect with nothing much than just asymmetrical designs. The video goes in-depth with the idea of asymmetry, what it is and how it functions in architecture. The video is quick paced and very educational. It is highly recommended for any one who wants to become an architect or simply enjoys innovative structur...

How To: Hold a Building in Your Hand

Aaron Betsky, director of the Cincinnati Art Museum and previous director of the Netherlands Institute of Architecture, reports on the world's first postage stamp to employ augmented reality. Dutch advertising agency Gummo, the NIA and the Dutch postal service teamed up to present five unbuilt models by different Dutch architecture studios in 3D form. When held in front of a webcam, the illusion of a 3D building is projected in your hand. By slowly moving the stamp, you can experience the vir...

How To: Jailbreak Your iPhone with Your Android Phone or Tablet

A rather exciting development has recently surfaced in the jailbreaking scene for iPhone. The Checkm8 bootrom exploit was shown off to the public by axi0mX, which made way for the undefeatable Checkra1n jailbreak tool. With it, you can freely jailbreak a variety of older iPhone models without any restrictions. The success rate is quite high, too, when compared to other jailbreak methods.

News: Trimble Releases SketchUp Viewer, the First Commercial HoloLens Application in the Windows Store

Visualization is one of the obvious commercial applications for technology such as Microsoft's HoloLens. The ability to see the assets of a project in different scales—from micro to larger-than-life—with a quick air tap will play a large part in the coming augmented reality revolution. Whether the assets are art for a game, interior design, raw financial data, or architecture, data visualization will play an important role in the future. This is due, in part, to our ability to absorb informat...

How To: Check Your iPhone for 32-Bit Apps That Won't Work in iOS 11

Apple has removed support for older 32-bit applications in the new iOS 11, which was to be expected after the 10.3 update added the ability to detect apps that are still running 32-bit processes on your iPad, iPhone, or iPod touch. Apple even excluded restore images for 32-bit devices such as the iPhone 5 and iPad (4th gen) in the iOS 10.3.2 beta 1 update for developers, so this shouldn't be a surprise.

How To: Install Android Q Beta on Any Project Treble Phone

For many, the stock version of Android is often considered the epitome of what the operating system should look and feel like by default. It's clean and clear of unwanted extra apps that come pre-installed with the system, provides a fluid and fast user experience, and runs on just about any device that has an unlocked bootloader to install a custom ROM with the stock version ready to go.

Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 3 (Sending Intrusion Alerts to MySQL)

Welcome back, my hacker novitiates! If you have been following this new Snort series, you know that Snort is the world's most widely used intrusion detection/protection system. Now a part of the world's largest network equipment company, Cisco, it is likely to be found everywhere in one form or another. This makes a compelling argument for learning how to use it, as it will likely be a necessity in any security-related position.

Hack Like a Pro: How to Scan for Vulnerabilities with Nessus

Welcome back, my tenderfoot hackers! Generally, you will want to perform a vulnerability scan before doing a penetration test. Vulnerability scanners contain a database of all known vulnerabilities and will scan your machine or network to see whether those vulnerabilities appear to exist. If they do, it is your job to test whether they are real and can be exploited.