Tribute to Ventriloquism | Ventriloquist Central | Ventriloquists of the 20th Century http://www.ventriloquistcentral.com/ventriloquism-tribute/ventriloquists-20th-century/ of Fame by the Country Music Associations of America. Magicians and Ventriloquists also honored him with Hall of Fame Inductions. ROGER DE COURCEY www.rogerdeco... |
|
CHUM Tribute Site: Inside 1331 Yonge - A monthly column by Doug Thompson http://rockradioscrapbook.ca/chumtribute-inside1331-may20.html like current popular music at all. He was much more comfortable with big band swing and the crooner ballads of an earlier era. He continued to play some of that music on his mid m... |
|
Enter The Realm of the Fae Kitty http://www.softpaw.org/ lots of images) and musically enhanced so they may take some time to load for people with slower connection .You'll find atop each page a button to turn the music off ... |
|
Bare Bones Film Festival http://www.jerrypippin.com/Bare_Bones_Film_Festival.htm oklahomamusichalloffame.com muskogeechamber.org muskogeeport.com 3riversmuseum.com CLICK HERE for 2004 Festival Coverage CLICK HERE & HERE for 2007 Coverage CLICK HERE ... |
|
Opus's Reviews http://www.opusgames.com/books/books2.html movie. The wonderful musical score by Toto is perfect. The movie recently was re-released on video and laserdisc, and I was one of the first to pick up a laserdisc copy. The pictu... |
|
RBJones.com Quick Index http://www.rbjones.com/rbjpub/index.htm . The Future . Music . Politics . Science . Religion . Values . Writing . WWWell content top100 directories omniography hierarchic contents full contents Philosophy . Bibliography... |
|
ScubaMom's Caribbean & Steel Drum Midis http://www.scubamom.com/midis/caribbean/ Scuba Mom's Caribbean, Calypso, & Steel Drum Midis To enter Caribbean Midis, click the image above, and use the following words in the password box. ... |
|
Can you trust your computer? http://www.gpascal.com/trust.htm is not alone: the KaZaa music-sharing software is designed so that KaZaa's business partner can rent out the use of your computer to their clients. These malicious features are of... |
|