Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Amrisha Prashar
on 16 October 2015

Origami Wily Werewolf Competition


In March we held a competition that asked participants to create their best version of a Unicorn Origami to celebrate our design theme for the Ubuntu Phone. With the upcoming launch of 15.10, we’d love to see your best version of Wily Werewolf using your Origami skills.

The following pdf can help you design your creations! Instructions Origami Wily Werewolf

Then all you’ll need to do once complete is:
– Take a photo of your design
– Upload to Twitter
– And use the hashtag #OrigamiWerewolf

A member of our design team will judge the best based on creativity, complexity and design. The deadline is 11:59 on Wednesday 28th October and the winner will receive an Ubuntu E5 Phone! Happy creating.

Terms_and_Conditions_Origami_WilyWerewolf

Related posts


Benjamin Ryzman
2 April 2025

The future of Kubernetes networking: Cilium and other CNIs with Canonical Kubernetes

Ubuntu Article

Choosing the right Container Network Interface (CNI) for Kubernetes is critical to achieving optimal performance, security, and scalability. With the launch of  Canonical Kubernetes LTS (long-term support) last month, Canonical decided to integrate Cilium as the default CNI in order to reflect our commitment to delivering a modern, securi ...


Michelle Anne Tabirao
2 April 2025

How does MongoDB work?

Data Platform Article

Explore what MongoDB is, how it functions, and how organizations utilize it for specific applications to achieve business benefits. ...


Rajan Patel
31 March 2025

Automated patching for the Linux kernel

Security Article

To start securely and efficiently, Linux systems follow a carefully orchestrated sequence of steps to initialize firmware and manage services. Applying security patches to the software responsible for some of these early steps of Linux startup often requires a full system reboot. Frequent reboots driven by unplanned critical patching is d ...