"Frankenstein," monster comedy playing on Lafitte Greenway
WGNO’s Kenny Lopez spoke with the director, Leslie Claverie about the production.
It’s alive! The monster comedy, “Frankenstein,” has now crept its way to the Lafitte Greenway.
“It’s our original adaptation of ‘Frankenstein,’ by company member Pete McElligott featuring a cast and design team of all local talent. You can expect to see a lot of funny jokes, a very fast-paced story,” Claverie said.
Claverie said this is the third production for The NOLA Project at the Lafitte Greenway.
“Frankenstein” is presented in partnership with the Friends of the Lafitte Greenway and NORD.
“I think NOLA gets a starring role with our surroundings for sure. There’s nothing like seeing live theatre. It is an art form that we work really hard to make accessible to the community. There’s an incredible amount of play space here and we use every bit of it that we possibly can,” she said.
“The show is immersive, so you’ll find there are actors running around behind you, on the sides of you, in and out and up and down the streets,” Claverie said.
“The show maintains an incredible amount of heart. There’s a really solid, grounded storyline, while just making it a little more fun for a modern audience,” she said.
The play is showing now through Oct. 17. For showtimes for “Frankenstein.”
The NOLA Project is now in its 21st season.
Organized cybercriminal groups are abusing freelancer-focused fintech platforms in France to create verified mule accounts…
Kaspersky researchers have uncovered a previously undocumented destructive malware campaign targeting Venezuela’s energy and utilities…
A new npm supply chain incident has raised fresh concern for software teams after researchers…
Runtime code environments such as Node.js and Python have long been targets for threat actors…
Recent threat intelligence has uncovered a direct operational link between Iran’s MuddyWater espionage group and…
CrowdStrike has disclosed a critical vulnerability in its LogScale platform that could allow remote attackers…
This website uses cookies.