Thursday, December 03, 2020

Esme Cardigan - aka Grandpa Cardigan




Fabric and idea first, then pattern.  That is usually how I work and this time was no different.  The only difference is I couldn't find perfect pattern


Enter Instagram Stories Maria of Keechiibstyle and she was thinking about a cardigan, too.  A suggested pattern was Esme Maxi Cardigan by Named Patterns - no longer readily available  but I found an older copy!  Yea, this was just what I wanted only about mid-thigh.



I found the inspiration at Pinterest, of course, right!  It is Selena Gomez in they style I was wanting to make for my style - photo from Who What Wear


 I held up the pattern to see what length I wanted and then started cutting out.  I did make sure the cables - fabric is a Style Maker Fabrics' Sweater Knit  matched on the upper and lower front. 

The pockets are interfaced at the seam allowance and easy to do, it just needed a minor change.  The pockets have a tendency to bag out, which is fine but not fine.  Let me explain, the Named Patterns instructions have you use lining fabric for all of the pocket bags.  This is not a good look with the pockets bagging out, which leads to seeing the lining fabric on the back (close to the body) part.  I had completed one pocket and noticed this, so I did some unsewing - cut out a new back portion of the pocket bag from the sweater knit and completed the pocket bag again.  This was the perfect solution, my pockets can bag out now, you see pretty cable fabric.  I did do a bit of stitching at the edge of the pockets, to keep the edges in a bit.



On the inside, the interfacing shows and all you pocket construction details.  I took a small portion of the fabric, serged the edges and hand stitched it in place.  This was the perfect solution, makes the inside look all neat.



I really thought I would love and wear this cardigan with a t-shirt and jeans exclusively, which I do and it looks great.  A white tee is needed and I just ordered fabric to make one.

BUT.....

I like it with a blouse just as well.  I am sure I will find so many ways to wear this one, including with this ruffled collar chambray shirt.  I did not make buttonholes and had no intention of putting on buttons.  That all changed when I shared the inspiration photo with my daughter, Kaitlyn, she thought it needed the buttons and she was right.  I like the buttons on the cardigan.


I was between sizes, so I went up, happy I did as I wanted an oversized look, so a bit of sizing information.


Once you get the pockets completed the pattern goes together quickly.  One more change to the sleeve, it has a rolled up cuff, which with this bulkier knit, I did not want.  I made my cuff narrower to act like a band and took 2" off the sleeve length.

The oversized has a great twirl.


My cardigan turned out to be everything I had hoped and I love it so much.  Next styling try, like the inspiration photo, mock turtleneck, flared jeans, loafers.  Stay tuned!

3 comments:

  1. How did you do your buttonholes? On your machine? I'm terrified of trying buttonholes on my cableknit fabric. But yours really do look good. Any tips on how to do it?

    ReplyDelete
  2. RECOVERY OF LOST FUNDS (BINARY OPTIONS, BITCOINS, LOAN SCAM).
    THINGS YOU NEED TO KNOW ABOUT THE GLOBALKOS C.E.H RECOVERY COMPANY.
    (leroysteckler@gmail.com)
    ⏱️2MIN.
    Hiring a professional hacker has been one of the world most technical valued navigating information. High prolific information and Privileges comes rare as it has been understood that what people do not see, they will never know.
    Welcome to the Global KOS hacking agency where every request concerning lost funds are recovered within a short period of time.
    The crucial benefit of contacting The Global-KOS hackers is
    • ZERO TRACE: After a successful hack recovery is carried out by the Global-KOS, no active or passive attacks will be used to trace any of our hacks to our clients or our organization. One common practice that attackers employ to evade detection is to break into poorly secured systems and use those hijacked systems as proxies through which they can launch and route attacks. So in a nutshell, attackers effort on this platform are useless because our systems are protected with a vigorous firewall switching and a firm security system to prevent unauthorized bodies from tracking or modifying our network accessible resources. I.e the hacker and clients are 100% safe and anonymous.
    Secondly,
    ADVANTAGE TO CLIENTS:
    • REPEAT CLIENTS and SERVICES: E.g, after helping a client recover all money lost to fraudulent practices, most of this clients comes back requesting we provide the same service in disguise as another person. We found a way to issue serial Numbers to each clients who seeks our help and services for identification purposes because we are not interested in your names nor location. But we urge that individuals shouldn't abuse this opportunities as we have provided value to you.
    However, on this platform of recovery, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web protocol. The operation of these hackers is to potentially deploy a distinguished cyber security technique to retrieving back the victims stolen funds via the application of a diverse CM breacher which enables you to track the data location of a scammer and extract every data on the con database. This is achieved using the systematic courier tracking method.
    Which of the uneasy situation do you find yourself in right now?
    ✅(BITCOIN INVESTMENTS, BINARY OPTIONS OR LOAN SCAM?
    This shocking study points to one harsh reality we all face today. It saddens our mind when a client expresses annoyance or dissatisfaction of unethical behaviors of scammers. We have striven to make tenacious efforts to help those who are victims of this fleas get off their traumatic feeling of loss.
    The company is large enough to provide comprehensive range of services such as.
    • MOBILE PHONE HACKS.(Catching A Cheating Spouse)��
    • CREDIT SCORE UPGRADE,
    • PENETRATION OF WEBSITES AND DATABASE.
    • UNLOCKING FROZEN CRYPTO WALLET��
    • EMAIL HACKS
    • HACKING A FRAUDULENT WEBSITE.��
    • UBER FREE PAYMENT LICENCE.��

    For prolific services and info,
    Contact:
    ✉️Email: theglobalkos@gmail.com
    leroysteckler@gmail.com
    ®Global KOS™
    2020.

    ReplyDelete
  3. INTERNET SCAM ALERT‼️

    The internet today is full of SCAM ADS, mostly in comments of various sites and blogs. A large number of individuals have been victims of scam and lost a lot of money to SCAMMERS. Most of the common scam you can see are -:
    ❌BANK LOAN SCAM. ❌BINARY OPTIONS SCAM.
    ❌MONEY MULTIPLICATION SCAM. ❌HACKING SCAM. ❌GETTING DEGREE SCAM. ❌SHOPPING SCAM and lost more..........

    But here is a good news to everyone who has been a victim of INTERNET SCAM❗️
    You can get your money back from the scammer, and can even get more than what you lost, No Authorities will not been involve just the genius of our skill.

    WHO ARE WE⁉️
    We are PYTHONAX ! A group of skilled Hackers who have dedicated our time to helping individuals to get back thier money from INTERNET SCAMMERS. A research was carried out and an approximation of more than $3billion USD annually was said to be lost to INTERNET SCAM. This is so wrong and that’s why we have decided to help individuals get thier money.

    HOW DO WE OPERATE⁉️
    We use a RAT(Remote Access Trojan) to take over the SCAMMER(s) device(Phone or Computer) and take back your money by accessing their Bitcoin wallets or Bank Account. Most of this scammers use their Bitcoin to save money they get from SCAM activities. This is because Bitcoin keeps the money hidden from FINANCIAL INSTITUTIONS BOARD from getting to see the money they can’t give account for.

    If you have been a Victim of INTERNET SCAM, then you should contact us via the Email below
    Email-: pythonaxservices@gmail.com
    pythonaxhacks@gmail.com




    Pythonax.
    2020 © All Right Reserved.

    ReplyDelete