Wednesday, October 28, 2020

Two Knit Garments - Galaxy Top and a Jenna Cardi




This fabulous deep purple floral knit (from Alyssa May Design) needed a great pattern and I found the perfect pattern and it is free!  I was drawn to the puff sleeves and they did not disappoint.


So for the coming winter, I have set up an indoor photo area.  Tuesday I tried it out as we were having snow and rain.  I need to improve my lighting but this will work.  

Now back to the pattern, it is from Pattern Scissors Cloth and called Galaxy T-shirt and it went together beautifully.  I did do some double checking on the size and I was happy with one I went with.  I did bring it in a bit of at the side seams.



If you want the t-shirt style but with a bit of drama, get this pattern, you will love it.



Here are the sleeves


A fabric confession, when I have extra fabric after finishing a project, I have a hard time moving on.  This knit was just too good not to make another garment.  I decided to revisit the Jenna Cardi by Muse Patterns.  I made it once before, way back in 2015.  I liked how it looked but it has been gone from my wardrobe for awhile.

I made View A this time with some changes.  



I went with the hip length version which has the bottom band.  I finished it and hated the length, so time for a change.  I am noticing that I am now really evaluating my makes and do I love them or do I not love them.  If it is in the not love, I am trying to see what I don't like.  On this one it was just too long so I cut of the bottom band and hemmed it.



So now on bands, just hemmed.  I liked it better but the Jenna Cardi has very small sleeve bands.  I feel like trends are larger cuffs.  I added very long cuffs and shortened the sleeves for this change, I am so happy I took the time to make this work for me.




Here is the back view


I am thrilled with my two new garments, both easy garments to make.  Unless you spend an entire Sunday working on your cardigan to get it just like you want it!  

3 comments:

  1. What are the rules of knitwear import to UK among small Business? How To Make A Wikipedia Page

    ReplyDelete
  2. RECOVERY OF LOST FUNDS (BINARY OPTIONS, BITCOINS, LOAN SCAM).
    THINGS YOU NEED TO KNOW ABOUT THE GLOBALKOS C.E.H RECOVERY COMPANY.
    (leroysteckler@gmail.com)
    ⏱️2MIN.
    Hiring a professional hacker has been one of the world most technical valued navigating information. High prolific information and Privileges comes rare as it has been understood that what people do not see, they will never know.
    Welcome to the Global KOS hacking agency where every request concerning lost funds are recovered within a short period of time.
    The crucial benefit of contacting The Global-KOS hackers is
    • ZERO TRACE: After a successful hack recovery is carried out by the Global-KOS, no active or passive attacks will be used to trace any of our hacks to our clients or our organization. One common practice that attackers employ to evade detection is to break into poorly secured systems and use those hijacked systems as proxies through which they can launch and route attacks. So in a nutshell, attackers effort on this platform are useless because our systems are protected with a vigorous firewall switching and a firm security system to prevent unauthorized bodies from tracking or modifying our network accessible resources. I.e the hacker and clients are 100% safe and anonymous.
    Secondly,
    ADVANTAGE TO CLIENTS:
    • REPEAT CLIENTS and SERVICES: E.g, after helping a client recover all money lost to fraudulent practices, most of this clients comes back requesting we provide the same service in disguise as another person. We found a way to issue serial Numbers to each clients who seeks our help and services for identification purposes because we are not interested in your names nor location. But we urge that individuals shouldn't abuse this opportunities as we have provided value to you.
    However, on this platform of recovery, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web protocol. The operation of these hackers is to potentially deploy a distinguished cyber security technique to retrieving back the victims stolen funds via the application of a diverse CM breacher which enables you to track the data location of a scammer and extract every data on the con database. This is achieved using the systematic courier tracking method.
    Which of the uneasy situation do you find yourself in right now?
    ✅(BITCOIN INVESTMENTS, BINARY OPTIONS OR LOAN SCAM?
    This shocking study points to one harsh reality we all face today. It saddens our mind when a client expresses annoyance or dissatisfaction of unethical behaviors of scammers. We have striven to make tenacious efforts to help those who are victims of this fleas get off their traumatic feeling of loss.
    The company is large enough to provide comprehensive range of services such as.
    • MOBILE PHONE HACKS.(Catching A Cheating Spouse)��
    • CREDIT SCORE UPGRADE,
    • PENETRATION OF WEBSITES AND DATABASE.
    • UNLOCKING FROZEN CRYPTO WALLET��
    • EMAIL HACKS
    • HACKING A FRAUDULENT WEBSITE.��
    • UBER FREE PAYMENT LICENCE.��

    For prolific services and info,
    Contact:
    ✉️Email: theglobalkos@gmail.com
    leroysteckler@gmail.com
    ®Global KOS™
    2020.

    ReplyDelete
  3. Angora rabbits, which have extremely soft, thick coats, are not killed for their fur; instead, the animals are shaved or plucked and the fur is spun to produce a very plush yarn fiber. See more for more info.

    ReplyDelete