Monday, July 14, 2014

Podcast: Notes From ICON 8

07.13.14_Notes From ICON 8
Download the MP3, stream directly on Stitcher, or subscribe via iTunes!

Notes From ICON 8
Length: 00:42:42
Synopsis: This week Lindsay and Jenny traveled to Portland, OR to attend ICON 8, the annual Illustration Conference. They spent the weekend meeting artists, attending creative panels, participating in the ICON Roadshow, and just having an all-around great time. On this week's podcast, Lindsay and Jenny reflect on their favorite moments, interactions, and personal realizations from ICON 8.

Show Notes:
ICON - The Illustration Conference


  1. What sort of a national crisis would the art lab be discussing? On the off chance that it was such a major crisis for what reason didn't we do this the principal day we were studying for what reason this was such a major crisis?

    Also, incidentally, we have a huge number of devotees on different tapes shouting swearing and proclaiming that we need to write fast, write my essay in 3 hours or in 6 hours. So for what reason are we notwithstanding having this discussion in any case?

  2. If you want to learn how to hack someone’s Facebook without them knowing, then you are in the right place. You can track Facebook messages with the help of special spy applications. You may get more info here.

  3. this is really great to know. thanks for letting us know.

  4. thanks for sharing this. i really liked your post.

  5. These days users, both individuals as well as business owners are highly concerned about computer security. If one safeguards their computer with antivirus, then they can protect their devices from viruses and other malware. For making the device secure, one needs to download Norton security software. To set up the Norton antivirus, the users need to go through its procedure of downloading, installing and activating on

  6. Download Or Install Office Setup Step 1. Go to - Sign in, 2nd. Enter product key, and 3rd. we can also help you with online.

    For Trend Micro Download , you must create a Trend Micro account from trend micro that can help you in smooth Trend Micro installation. Protect your systems and online data from multiple threats, including viruses, spyware, identity theft, malware, rootkits, Trojans, phishing attacks, ransomware, Adware, Worms, Bots, Horses, and other threats.You can activate the Trend Micro software by installing the Trend Micro download

  8. It's a very nice article, thanking for sharing this helpful article with us. |

  9. - Secure your PC by downloading, introducing and actuating Norton security. Confirm your item key at and get the arrangement for your Windows or Mac PC.