This is a continuation of something I’ve been working on earlier. I added a scene where a sailor, that looks suspiciously a lot like me, is working on releasing several depth charges. Animating this character was a pain in the butt since the ship is moving up and down following the ocean waves. I also somewhat broke the model of the submarine in order to have it blown up by one of these depth charges. What I learned while making this animation is how to create simple explosions, and how to time them properly. And how to have these explosions influence objects like the submarine in this case. Let’s hope nobody will notice that the infamous Bismarck, a German battleship, is bombing a German U-boat in this animation.
Here are the models that I used to create this animation on Sketchfab:
I promise this will be the last animation that features a Tiger II tank. Or maybe not… We’ll see. Here’s a scene showing an abandoned Tiger II tank being re-claimed by mother nature. How would you rate this post? Click on a star to rate it! Submit Rating
It was also known to the Allies as the buzz bomb or doodlebug, and in Germany as Kirschkern (cherry stone) or Maikäfer (maybug). The V1 was the first of the Vergeltungswaffen deployed for the terror bombing of London. It was developed at Peenemünde Army Research Center in 1939 by the Luftwaffe at the beginning of […]
This scene depicts a computer room as you would find in the 1960’s and 1970’s at companies who could afford it. The servers shown here are IBM mainframe computers. How would you rate this post? Click on a star to rate it! Submit Rating
This website uses cookies to store information. By clicking 'OK' you will consent and allow us to process data such as visitor statistics.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.