Notions Search Results

How To: Sew a perfect jet pocket on a jacket or dress

A welted pocket (also called a jetted pocket or piped pocket) is a pocket where it appears just to be a thin slit in the fabric of the garment. Ideal for when you are making something you want to have pockets, but don't want to necessarily draw much attention to them - such as tailored suit jackets or streamlined dresses. All you need to learn this technique are some basic sewing notions (scissors, pins, etc) and either bias tape or the ability to cut your own bias tape from your fashion fabric.

How To: Write a literature review for thesis writers

In this tutorial, we learn how to write a literature review for thesis writers. The three elements are: discuss the most relevant theory, introduce and define key terms, and discuss recent research in the field. You will need to include the most important literature, quote directly only if you discuss at some length, and use indirect quotes as well. Focus on notions you will use in your empirical study. It should be ten pages or less and sources of all quotes must appear in your works cited p...

Real Brain Food: What Geniuses Actually Eat, Part 1

It's common knowledge that certain foods foster brain development, health, and memory. Fish almost always makes the list, as do any foods that are loaded with antioxidants like blueberries, nuts, whole grains, green tea, and dark chocolate. Spices like turmeric are being studied for their ability to prevent Alzheimer's, among other things.

News: Intel Labs Chief Reveals the Secrets to Taking Augmented Reality Mainstream

Because augmented reality is still so new to so many people, there are a number of would-be experts opining online, often repeating basic facts anyone with a spare 15 minutes can find on their own. That's why it's important to point out when someone delivers what could be considered the ultimate cheat sheet for ramping up your AR IQ if you're unfamiliar with the finer points of the space.

How To: Use Traffic Analysis to Defeat TOR

As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own. The purpose is presumably to trace the origin of a communication by compromising some entrance and exit nodes. Once both are compromised, it is much easier to correlate traffic with a particular individual.

News: Making Ordinary Objects Extraordinary

Kevin Van Aelst creates witty visual "one-liners" by recontextualizing everyday, ordinary objects. With a few simple tweaks, the viewer recognizes a roll of tape as the ocean or reads gummi worms as chromosomes or understands mitosis through the use of sweet, sugary donuts.

Prev Page