Skip to main content
  1. Blog
  2. Article

Amrisha Prashar
on 24 March 2015

Origami Unicorn Challenge


Origami has long been associated with good fortune and represents the visual style for the Ubuntu Phone. We would like to invite you to create your own Origami Unicorn for the chance to win an Ubuntu Phone.

The stages to participate include:

  • Create a Unicorn Origami form from a single sheet of paper
  • Take a photo of your custom creation
  • Upload to instagram with the hashtag #fingertipchallenge

Simple! And we’ve included a downloadable guide on how to create a Unicorn Origami below. The most number of likes on Instagram wins an Ubuntu Phone. Deadline is 6pm (GMT) on Wednesday 15th April.

Happy crafting folks!

Origami unicorn instructions

Related posts


Rob Gibbon
20 April 2026

Hybrid search and reranking: a deeper look at RAG

AI Article

Many of us are familiar with the retrieval augmented generative AI (RAG) pattern for building agentic AI applications – like digital concierges, frontline support chatbots and agents that can help with basic self-service troubleshooting.  At a high level, the flow for RAG is fairly clear – the user’s prompt is augmented with some relevant ...


Canonical
20 April 2026

Canonical expands Ubuntu support to next-generation MediaTek Genio 520 and 720 platforms

edge computing Article

Canonical is pleased to announce the early access launch of Ubuntu 24.04 LTS for MediaTek’s Genio IoT platforms. Building on the companies’ strategic partnership, this release introduces optimized Ubuntu images for the brand-new Genio 520 and 720, while continuing to provide robust support for the Genio 350, 510, 700, and 1200.  The colla ...


Ijlal Loutfi
10 April 2026

What’s new in security for Ubuntu 26.04 LTS?

Security Article

Here’s a concise excerpt you can use:> Ubuntu 26.04 LTS significantly raises the security baseline by strengthening defaults across every layer of the system without requiring manual intervention. Key improvements include production-ready hardware-backed encryption, post-quantum–aware cryptographic defaults, modern TLS configurations, and ...