Last December we showed you how to create your own custom photo bokeh effects; this fun video from Samsung shows all sorts of interesting ways you can put them to use.
Although they made the video for Valentine’s Day (and to promote their new NX system) you can recreate the effects with any suitable camera–for more details on exactly what kind of camera and lens you need for successfully create the effect check out our guide here.
Hit up the link below for a free printable bokeh template–remember to adjust the print size to fit your lens.
Show Your Love with Beautiful BOKEH [via DIY Photography]
Think you know the answer? Click through to see if you're right!
What if you combined an 8-bit RPG with global access in a sort of 1988 meets the modern Internet mashup? You’d end up with Realm of the Mad God, a sprite-fueled massive multiplayer adventure.
This straight forward tutorial outlines how you can turn an old book into a secret switch–what the switch controls is only limited by your imagination.
This DIY digital clock takes Persistence of Vision (POV) hacking to a new level by combining the more common POV tricks based on a spinning old hard drive with a sweet digital clock display created through POV.
The hardest part of compiling software on Linux is locating its dependencies and installing them. Ubuntu has apt commands that automatically detect, locate and install dependencies, doing the hard work for you.
Have you ever wanted to work on a project with the ability to track your changes as well as revert them? How-To Geek explains How-To use the popular version tracking system, Subversion (a.k.a SVN).
Since our home servers are constantly on, and often headless, it is nice to know when certain events happen on your server without having to log in and check all the time. This is where email notifications save the day.
Think you know the answer? Click through to see if you're right!
We all have had a time when we have done some private browsing, maybe for someone’s birthday present, on the internet without going into “private” mode. Here’s the beginner’s guide to clearing your web history in any of the major browsers.
Google accounts are a treasure trove of personal data for identity thieves. We’ve already covered setting up two-step authentication to secure your Google account, but there are a few more tricks you may not know about.