Nice Precision Manufacturing photographs

Nice Precision Manufacturing photographs

Verify out these precision manufacturing photos:

West Bromwich Spring Organization Limited, George Street, West Bromwich

Image by ell brown
On George Street in West Bromwich is the West Bromwich Spring Co. Ltd.

It is also the Helical Works.

The West Bromwich Spring has been the forefront of precision manufacturing because 1896. We have maintained our position with a combination of expertise primarily based on technical expertise &amp continual procedure improvement.

West Bromwich Spring Ltd

West Bromwich Spring Business Limited, George Street, West Bromwich – sign West Bromwich Spring Co~y Lt~d

Image by ell brown
On George Street in West Bromwich is the West Bromwich Spring Co. Ltd.

It is also the Helical Works.

The West Bromwich Spring has been the forefront of precision manufacturing considering that 1896. We have maintained our position with a combination of experience based on technical experience &amp continual approach improvement.

West Bromwich Spring Ltd

Old sign on top correct of developing – West Bromwich Spring Co~y Lt~d.

Nice Precision Turned Parts Manufacturers photos

Nice Precision Turned Parts Manufacturers photos

A few nice precision turned parts manufacturers images I found:

Steven F. Udvar-Hazy Center: B-29 Superfortress “Enola Gay” panorama

Image by Chris Devers
See more photos of this, and the Wikipedia article.

Details, quoting from Smithsonian National Air and Space Museum | Lockheed P-38J-10-LO Lightning

In the P-38 Lockheed engineer Clarence "Kelly" Johnson and his team of designers created one of the most successful twin-engine fighters ever flown by any nation. From 1942 to 1945, U. S. Army Air Forces pilots flew P-38s over Europe, the Mediterranean, and the Pacific, and from the frozen Aleutian Islands to the sun-baked deserts of North Africa. Lightning pilots in the Pacific theater downed more Japanese aircraft than pilots flying any other Allied warplane.

Maj. Richard I. Bong, America’s leading fighter ace, flew this P-38J-10-LO on April 16, 1945, at Wright Field, Ohio, to evaluate an experimental method of interconnecting the movement of the throttle and propeller control levers. However, his right engine exploded in flight before he could conduct the experiment.

Transferred from the United States Air Force.

Manufacturer:
Lockheed Aircraft Company

Date:
1943

Country of Origin:
United States of America

Dimensions:
Overall: 390 x 1170cm, 6345kg, 1580cm (12ft 9 9/16in. x 38ft 4 5/8in., 13988.2lb., 51ft 10 1/16in.)

Materials:
All-metal

Physical Description:
Twin-tail boom and twin-engine fighter; tricycle landing gear.

Long Description:
From 1942 to 1945, the thunder of P-38 Lightnings was heard around the world. U. S. Army pilots flew the P-38 over Europe, the Mediterranean, and the Pacific; from the frozen Aleutian Islands to the sun-baked deserts of North Africa. Measured by success in combat, Lockheed engineer Clarence "Kelly" Johnson and a team of designers created the most successful twin-engine fighter ever flown by any nation. In the Pacific Theater, Lightning pilots downed more Japanese aircraft than pilots flying any other Army Air Forces warplane.

Johnson and his team conceived this twin-engine, single-pilot fighter airplane in 1936 and the Army Air Corps authorized the firm to build it in June 1937. Lockheed finished constructing the prototype XP-38 and delivered it to the Air Corps on New Year’s Day, 1939. Air Corps test pilot and P-38 project officer, Lt. Benjamin S. Kelsey, first flew the aircraft on January 27. Losing this prototype in a crash at Mitchel Field, New York, with Kelsey at the controls, did not deter the Air Corps from ordering 13 YP-38s for service testing on April 27. Kelsey survived the crash and remained an important part of the Lightning program. Before the airplane could be declared ready for combat, Lockheed had to block the effects of high-speed aerodynamic compressibility and tail buffeting, and solve other problems discovered during the service tests.

The most vexing difficulty was the loss of control in a dive caused by aerodynamic compressibility. During late spring 1941, Air Corps Major Signa A. Gilke encountered serious trouble while diving his Lightning at high-speed from an altitude of 9,120 m (30,000 ft). When he reached an indicated airspeed of about 515 kph (320 mph), the airplane’s tail began to shake violently and the nose dropped until the dive was almost vertical. Signa recovered and landed safely and the tail buffet problem was soon resolved after Lockheed installed new fillets to improve airflow where the cockpit gondola joined the wing center section. Seventeen months passed before engineers began to determine what caused the Lightning’s nose to drop. They tested a scale model P-38 in the Ames Laboratory wind tunnel operated by the NACA (National Advisory Committee for Aeronautics) and found that shock waves formed when airflow over the wing leading edges reached transonic speeds. The nose drop and loss of control was never fully remedied but Lockheed installed dive recovery flaps under each wing in 1944. These devices slowed the P-38 enough to allow the pilot to maintain control when diving at high-speed.

Just as the development of the North American P-51 Mustang, Republic P-47 Thunderbolt, and the Vought F4U Corsair (see NASM collection for these aircraft) pushed the limits of aircraft performance into unexplored territory, so too did P-38 development. The type of aircraft envisioned by the Lockheed design team and Air Corps strategists in 1937 did not appear until June 1944. This protracted shakedown period mirrors the tribulations suffered by Vought in sorting out the many technical problems that kept F4U Corsairs off U. S. Navy carrier decks until the end of 1944.

Lockheed’s efforts to trouble-shoot various problems with the design also delayed high-rate, mass production. When Japan attacked Pearl Harbor, the company had delivered only 69 Lightnings to the Army. Production steadily increased and at its peak in 1944, 22 sub-contractors built various Lightning components and shipped them to Burbank, California, for final assembly. Consolidated-Vultee (Convair) subcontracted to build the wing center section and the firm later became prime manufacturer for 2,000 P-38Ls but that company’s Nashville plant completed only 113 examples of this Lightning model before war’s end. Lockheed and Convair finished 10,038 P-38 aircraft including 500 photo-reconnaissance models. They built more L models, 3,923, than any other version.

To ease control and improve stability, particularly at low speeds, Lockheed equipped all Lightnings, except a batch ordered by Britain, with propellers that counter-rotated. The propeller to the pilot’s left turned counter-clockwise and the propeller to his right turned clockwise, so that one propeller countered the torque and airflow effects generated by the other. The airplane also performed well at high speeds and the definitive P-38L model could make better than 676 kph (420 mph) between 7,600 and 9,120 m (25,000 and 30,000 ft). The design was versatile enough to carry various combinations of bombs, air-to-ground rockets, and external fuel tanks. The multi-engine configuration reduced the Lightning loss-rate to anti-aircraft gunfire during ground attack missions. Single-engine airplanes equipped with power plants cooled by pressurized liquid, such as the North American P-51 Mustang (see NASM collection), were particularly vulnerable. Even a small nick in one coolant line could cause the engine to seize in a matter of minutes.

The first P-38s to reach the Pacific combat theater arrived on April 4, 1942, when a version of the Lightning that carried reconnaissance cameras (designated the F-4), joined the 8th Photographic Squadron based in Australia. This unit launched the first P-38 combat missions over New Guinea and New Britain during April. By May 29, the first 25 P-38s had arrived in Anchorage, Alaska. On August 9, pilots of the 343rd Fighter Group, Eleventh Air Force, flying the P-38E, shot down a pair of Japanese flying boats.

Back in the United States, Army Air Forces leaders tried to control a rumor that Lightnings killed their own pilots. On August 10, 1942, Col. Arthur I. Ennis, Chief of U. S. Army Air Forces Public Relations in Washington, told a fellow officer "… Here’s what the 4th Fighter [training] Command is up against… common rumor out there that the whole West Coast was filled with headless bodies of men who jumped out of P-38s and had their heads cut off by the propellers." Novice Lightning pilots unfamiliar with the correct bailout procedures actually had more to fear from the twin-boom tail, if an emergency dictated taking to the parachute but properly executed, Lightning bailouts were as safe as parachuting from any other high-performance fighter of the day. Misinformation and wild speculation about many new aircraft was rampant during the early War period.

Along with U. S. Navy Grumman F4F Wildcats (see NASM collection) and Curtiss P-40 Warhawks (see NASM collection), Lightnings were the first American fighter airplanes capable of consistently defeating Japanese fighter aircraft. On November 18, men of the 339th Fighter Squadron became the first Lightning pilots to attack Japanese fighters. Flying from Henderson Field on Guadalcanal, they claimed three during a mission to escort Boeing B-17 Flying Fortress bombers (see NASM collection).

On April 18, 1943, fourteen P-38 pilots from the 70th and the 339th Fighter Squadrons, 347th Fighter Group, accomplished one of the most important Lightning missions of the war. American ULTRA cryptanalysts had decoded Japanese messages that revealed the timetable for a visit to the front by the commander of the Imperial Japanese Navy, Admiral Isoroku Yamamoto. This charismatic leader had crafted the plan to attack Pearl Harbor and Allied strategists believed his loss would severely cripple Japanese morale. The P-38 pilots flew 700 km (435 miles) at heights from 3-15 m (10-50 feet) above the ocean to avoid detection. Over the coast of Bougainville, they intercepted a formation of two Mitsubishi G4M BETTY bombers (see NASM collection) carrying the Admiral and his staff, and six Mitsubishi A6M Zero fighters (see NASM collection) providing escort. The Lightning pilots downed both bombers but lost Lt. Ray Hine to a Zero.

In Europe, the first Americans to down a Luftwaffe aircraft were Lt. Elza E. Shahan flying a 27th Fighter Squadron P-38E, and Lt. J. K. Shaffer flying a Curtiss P-40 (see NASM collection) in the 33rd Fighter Squadron. The two flyers shared the destruction of a Focke-Wulf Fw 200C-3 Condor maritime strike aircraft over Iceland on August 14, 1942. Later that month, the 1st fighter group accepted Lightnings and began combat operations from bases in England but this unit soon moved to fight in North Africa. More than a year passed before the P-38 reappeared over Western Europe. While the Lightning was absent, U. S. Army Air Forces strategists had relearned a painful lesson: unescorted bombers cannot operate successfully in the face of determined opposition from enemy fighters. When P-38s returned to England, the primary mission had become long-range bomber escort at ranges of about 805 kms (500 miles) and at altitudes above 6,080 m (20,000 ft).

On October 15, 1943, P-38H pilots in the 55th Fighter Group flew their first combat mission over Europe at a time when the need for long-range escorts was acute. Just the day before, German fighter pilots had destroyed 60 of 291 Eighth Air Force B-17 Flying Fortresses (see NASM collection) during a mission to bomb five ball-bearing plants at Schweinfurt, Germany. No air force could sustain a loss-rate of nearly 20 percent for more than a few missions but these targets lay well beyond the range of available escort fighters (Republic P-47 Thunderbolt, see NASM collection). American war planners hoped the long-range capabilities of the P-38 Lightning could halt this deadly trend, but the very high and very cold environment peculiar to the European air war caused severe power plant and cockpit heating difficulties for the Lightning pilots. The long-range escort problem was not completely solved until the North American P-51 Mustang (see NASM collection) began to arrive in large numbers early in 1944.

Poor cockpit heating in the H and J model Lightnings made flying and fighting at altitudes that frequently approached 12,320 m (40,000 ft) nearly impossible. This was a fundamental design flaw that Kelly Johnson and his team never anticipated when they designed the airplane six years earlier. In his seminal work on the Allison V-1710 engine, Daniel Whitney analyzed in detail other factors that made the P-38 a disappointing airplane in combat over Western Europe.

• Many new and inexperienced pilots arrived in England during December 1943, along with the new J model P-38 Lightning.

• J model rated at 1,600 horsepower vs. 1,425 for earlier H model Lightnings. This power setting required better maintenance between flights. It appears this work was not done in many cases.

• During stateside training, Lightning pilots were taught to fly at high rpm settings and low engine manifold pressure during cruise flight. This was very hard on the engines, and not in keeping with technical directives issued by Allison and Lockheed.

• The quality of fuel in England may have been poor, TEL (tetraethyl lead) fuel additive appeared to condense inside engine induction manifolds, causing detonation (destructive explosion of fuel mixture rather than controlled burning).

• Improved turbo supercharger intercoolers appeared on the J model P-38. These devices greatly reduced manifold temperatures but this encouraged TEL condensation in manifolds during cruise flight and increased spark plug fouling.

Using water injection to minimize detonation might have reduced these engine problems. Both the Republic P-47 Thunderbolt and the North American P-51 Mustang (see NASM collection) were fitted with water injection systems but not the P-38. Lightning pilots continued to fly, despite these handicaps.

During November 1942, two all-Lightning fighter groups, the 1st and the 14th, began operating in North Africa. In the Mediterranean Theater, P-38 pilots flew more sorties than Allied pilots flying any other type of fighter. They claimed 608 enemy a/c destroyed in the air, 123 probably destroyed and 343 damaged, against the loss of 131 Lightnings.

In the war against Japan, the P-38 truly excelled. Combat rarely occurred above 6,080 m (20,000 ft) and the engine and cockpit comfort problems common in Europe never plagued pilots in the Pacific Theater. The Lightning’s excellent range was used to full advantage above the vast expanses of water. In early 1945, Lightning pilots of the 12th Fighter Squadron, 18th Fighter Group, flew a mission that lasted 10 ½ hours and covered more than 3,220 km (2,000 miles). In August, P-38 pilots established the world’s long-distance record for a World War II combat fighter when they flew from the Philippines to the Netherlands East Indies, a distance of 3,703 km (2,300 miles). During early 1944, Lightning pilots in the 475th Fighter Group began the ‘race of aces.’ By March, Lieutenant Colonel Thomas J. Lynch had scored 21 victories before he fell to antiaircraft gunfire while strafing enemy ships. Major Thomas B. McGuire downed 38 Japanese aircraft before he was killed when his P-38 crashed at low altitude in early January 1945. Major Richard I. Bong became America’s highest scoring fighter ace (40 victories) but died in the crash of a Lockheed P-80 (see NASM collection) on August 6, 1945.

Museum records show that Lockheed assigned the construction number 422-2273 to the National Air and Space Museum’s P-38. The Army Air Forces accepted this Lightning as a P-38J-l0-LO on November 6, 1943, and the service identified the airplane with the serial number 42-67762. Recent investigations conducted by a team of specialists at the Paul E. Garber Facility, and Herb Brownstein, a volunteer in the Aeronautics Division at the National Air and Space Museum, have revealed many hitherto unknown aspects to the history of this aircraft.

Brownstein examined NASM files and documents at the National Archives. He discovered that a few days after the Army Air Forces (AAF) accepted this airplane, the Engineering Division at Wright Field in Dayton, Ohio, granted Lockheed permission to convert this P-38 into a two-seat trainer. The firm added a seat behind the pilot to accommodate an instructor who would train civilian pilots in instrument flying techniques. Once trained, these test pilots evaluated new Lightnings fresh off the assembly line.

In a teletype sent by the Engineering Division on March 2, 1944, Brownstein also discovered that this P-38 was released to Colonel Benjamin S. Kelsey from March 3 to April 10, 1944, to conduct special tests. This action was confirmed the following day in a cable from the War Department. This same pilot, then a Lieutenant, flew the XP-38 across the United States in 1939 and survived the crash that destroyed this Lightning at Mitchel Field, New York. In early 1944, Kelsey was assigned to the Eighth Air Force in England and he apparently traveled to the Lockheed factory at Burbank to pick up the P-38. Further information about these tests and Kelsey’s involvement remain an intriguing question.

One of Brownstein’s most important discoveries was a small file rich with information about the NASM Lightning. This file contained a cryptic reference to a "Major Bong" who flew the NASM P-38 on April 16, 1945, at Wright Field. Bong had planned to fly for an hour to evaluate an experimental method of interconnecting the movement of the throttle and propeller control levers. His flight ended after twenty-minutes when "the right engine blew up before I had a chance [to conduct the test]." The curator at the Richard I. Bong Heritage Center confirmed that America’s highest scoring ace made this flight in the NASM P-38 Lightning.

Working in Building 10 at the Paul E. Garber Facility, Rob Mawhinney, Dave Wilson, Wil Lee, Bob Weihrauch, Jim Purton, and Heather Hutton spent several months during the spring and summer of 2001 carefully disassembling, inspecting, and cleaning the NASM Lightning. They found every hardware modification consistent with a model J-25 airplane, not the model J-10 painted in the data block beneath the artifact’s left nose. This fact dovetails perfectly with knowledge uncovered by Brownstein. On April 10, the Engineering Division again cabled Lockheed asking the company to prepare 42-67762 for transfer to Wright Field "in standard configuration." The standard P-38 configuration at that time was the P-38J-25. The work took several weeks and the fighter does not appear on Wright Field records until May 15, 1944. On June 9, the Flight Test Section at Wright Field released the fighter for flight trials aimed at collecting pilot comments on how the airplane handled.

Wright Field’s Aeromedical Laboratory was the next organization involved with this P-38. That unit installed a kit on July 26 that probably measured the force required to move the control wheel left and right to actuate the power-boosted ailerons installed in all Lightnings beginning with version J-25. From August 12-16, the Power Plant Laboratory carried out tests to measure the hydraulic pump temperatures on this Lightning. Then beginning September 16 and lasting about ten days, the Bombing Branch, Armament Laboratory, tested type R-3 fragmentation bomb racks. The work appears to have ended early in December. On June 20, 1945, the AAF Aircraft Distribution Office asked that the Air Technical Service Command transfer the Lightning from Wright Field to Altus Air Force Base, Oklahoma, a temporary holding area for Air Force museum aircraft. The P-38 arrived at the Oklahoma City Air Depot on June 27, 1945, and mechanics prepared the fighter for flyable storage.

Airplane Flight Reports for this Lightning also describe the following activities and movements:

6-21-45 Wright Field, Ohio, 5.15 hours of flying.
6-22-45Wright Field, Ohio, .35 minutes of flying by Lt. Col. Wendel [?] J. Kelley and P. Shannon.
6-25-45Altus, Oklahoma, .55 hours flown, pilot P. Shannon.
6-27-45Altus, Oklahoma, #2 engine changed, 1.05 hours flown by Air Corps F/O Ralph F. Coady.
10-5-45 OCATSC-GCAAF (Garden City Army Air Field, Garden City, Kansas), guns removed and ballast added.
10-8-45Adams Field, Little Rock, Arkansas.
10-9-45Nashville, Tennessee,
5-28-46Freeman Field, Indiana, maintenance check by Air Corps Capt. H. M. Chadhowere [sp]?
7-24-46Freeman Field, Indiana, 1 hour local flight by 1st Lt. Charles C. Heckel.
7-31-46 Freeman Field, Indiana, 4120th AAF Base Unit, ferry flight to Orchard Place [Illinois] by 1st Lt. Charles C. Heckel.

On August 5, 1946, the AAF moved the aircraft to another storage site at the former Consolidated B-24 bomber assembly plant at Park Ridge, Illinois. A short time later, the AAF transferred custody of the Lightning and more than sixty other World War II-era airplanes to the Smithsonian National Air Museum. During the early 1950s, the Air Force moved these airplanes from Park Ridge to the Smithsonian storage site at Suitland, Maryland.

• • •

Quoting from Wikipedia | Lockheed P-38 Lightning:

The Lockheed P-38 Lightning was a World War II American fighter aircraft built by Lockheed. Developed to a United States Army Air Corps requirement, the P-38 had distinctive twin booms and a single, central nacelle containing the cockpit and armament. Named "fork-tailed devil" by the Luftwaffe and "two planes, one pilot" by the Japanese, the P-38 was used in a number of roles, including dive bombing, level bombing, ground-attack, photo reconnaissance missions, and extensively as a long-range escort fighter when equipped with drop tanks under its wings.

The P-38 was used most successfully in the Pacific Theater of Operations and the China-Burma-India Theater of Operations as the mount of America’s top aces, Richard Bong (40 victories) and Thomas McGuire (38 victories). In the South West Pacific theater, the P-38 was the primary long-range fighter of United States Army Air Forces until the appearance of large numbers of P-51D Mustangs toward the end of the war. The P-38 was unusually quiet for a fighter, the exhaust muffled by the turbo-superchargers. It was extremely forgiving, and could be mishandled in many ways, but the rate of roll was too slow for it to excel as a dogfighter. The P-38 was the only American fighter aircraft in production throughout American involvement in the war, from Pearl Harbor to Victory over Japan Day.

Variants: Lightning in maturity: P-38J

The P-38J was introduced in August 1943. The turbo-supercharger intercooler system on previous variants had been housed in the leading edges of the wings and had proven vulnerable to combat damage and could burst if the wrong series of controls were mistakenly activated. In the P-38J model, the streamlined engine nacelles of previous Lightnings were changed to fit the intercooler radiator between the oil coolers, forming a "chin" that visually distinguished the J model from its predecessors. While the P-38J used the same V-1710-89/91 engines as the H model, the new core-type intercooler more efficiently lowered intake manifold temperatures and permitted a substantial increase in rated power. The leading edge of the outer wing was fitted with 55 gal (208 l) fuel tanks, filling the space formerly occupied by intercooler tunnels, but these were omitted on early P-38J blocks due to limited availability.

The final 210 J models, designated P-38J-25-LO, alleviated the compressibility problem through the addition of a set of electrically-actuated dive recovery flaps just outboard of the engines on the bottom centerline of the wings. With these improvements, a USAAF pilot reported a dive speed of almost 600 mph (970 km/h), although the indicated air speed was later corrected for compressibility error, and the actual dive speed was lower. Lockheed manufactured over 200 retrofit modification kits to be installed on P-38J-10-LO and J-20-LO already in Europe, but the USAAF C-54 carrying them was shot down by an RAF pilot who mistook the Douglas transport for a German Focke-Wulf Condor. Unfortunately the loss of the kits came during Lockheed test pilot Tony LeVier‘s four-month morale-boosting tour of P-38 bases. Flying a new Lightning named "Snafuperman" modified to full P-38J-25-LO specs at Lockheed’s modification center near Belfast, LeVier captured the pilots’ full attention by routinely performing maneuvers during March 1944 that common Eighth Air Force wisdom held to be suicidal. It proved too little too late because the decision had already been made to re-equip with Mustangs.

The P-38J-25-LO production block also introduced hydraulically-boosted ailerons, one of the first times such a system was fitted to a fighter. This significantly improved the Lightning’s rate of roll and reduced control forces for the pilot. This production block and the following P-38L model are considered the definitive Lightnings, and Lockheed ramped up production, working with subcontractors across the country to produce hundreds of Lightnings each month.

Noted P-38 pilots

Richard Bong and Thomas McGuire

The American ace of aces and his closest competitor both flew Lightnings as they tallied 40 and 38 victories respectively. Majors Richard I. "Dick" Bong and Thomas J. "Tommy" McGuire of the USAAF competed for the top position. Both men were awarded the Medal of Honor.

McGuire was killed in air combat in January 1945 over the Philippines, after racking up 38 confirmed kills, making him the second-ranking American ace. Bong was rotated back to the United States as America’s ace of aces, after making 40 kills, becoming a test pilot. He was killed on 6 August 1945, the day the atomic bomb was dropped on Japan, when his P-80 Shooting Star jet fighter flamed out on takeoff.

Charles Lindbergh

The famed aviator Charles Lindbergh toured the South Pacific as a civilian contractor for United Aircraft Corporation, comparing and evaluating performance of single- and twin-engined fighters for Vought. He worked to improve range and load limits of the F4U Corsair, flying both routine and combat strafing missions in Corsairs alongside Marine pilots. In Hollandia, he attached himself to the 475th FG flying P-38s so that he could investigate the twin-engine fighter. Though new to the machine, he was instrumental in extending the range of the P-38 through improved throttle settings, or engine-leaning techniques, notably by reducing engine speed to 1,600 rpm, setting the carburetors for auto-lean and flying at 185 mph (298 km/h) indicated airspeed which reduced fuel consumption to 70 gal/h, about 2.6 mpg. This combination of settings had been considered dangerous; it was thought it would upset the fuel mixture and cause an explosion. Everywhere Lindbergh went in the South Pacific, he was accorded the normal preferential treatment of a visiting colonel, though he had resigned his Air Corps Reserve colonel’s commission three years before. While with the 475th, he held training classes and took part in a number of Army Air Corps combat missions. On 28 July 1944, Lindbergh shot down a Mitsubishi Ki-51 "Sonia" flown expertly by the veteran commander of 73rd Independent Flying Chutai, Imperial Japanese Army Captain Saburo Shimada. In an extended, twisting dogfight in which many of the participants ran out of ammunition, Shimada turned his aircraft directly toward Lindbergh who was just approaching the combat area. Lindbergh fired in a defensive reaction brought on by Shimada’s apparent head-on ramming attack. Hit by cannon and machine gun fire, the "Sonia’s" propeller visibly slowed, but Shimada held his course. Lindbergh pulled up at the last moment to avoid collision as the damaged "Sonia" went into a steep dive, hit the ocean and sank. Lindbergh’s wingman, ace Joseph E. "Fishkiller" Miller, Jr., had also scored hits on the "Sonia" after it had begun its fatal dive, but Miller was certain the kill credit was Lindbergh’s. The unofficial kill was not entered in the 475th’s war record. On 12 August 1944 Lindbergh left Hollandia to return to the United States.

Charles MacDonald

The seventh-ranking American ace, Charles H. MacDonald, flew a Lightning against the Japanese, scoring 27 kills in his famous aircraft, the Putt Putt Maru.

Robin Olds

Main article: Robin Olds

Robin Olds was the last P-38 ace in the Eighth Air Force and the last in the ETO. Flying a P-38J, he downed five German fighters on two separate missions over France and Germany. He subsequently transitioned to P-51s to make seven more kills. After World War II, he flew F-4 Phantom IIs in Vietnam, ending his career as brigadier general with 16 kills.

Clay Tice

A P-38 piloted by Clay Tice was the first American aircraft to land in Japan after VJ-Day, when he and his wingman set down on Nitagahara because his wingman was low on fuel.

Antoine de Saint-Exupéry

Noted aviation pioneer and writer Antoine de Saint-Exupéry vanished in a F-5B-1-LO, 42-68223, c/n 2734, of Groupe de Chasse II/33, out of Borgo-Porreta, Bastia, Corsica, a reconnaissance variant of the P-38, while on a flight over the Mediterranean, from Corsica to mainland France, on 31 July 1944. His health, both physical and mental (he was said to be intermittently subject to depression), had been deteriorating and there had been talk of taking him off flight status. There have been suggestions (although no proof to date) that this was a suicide rather than an aircraft failure or combat loss. In 2000, a French scuba diver found the wreckage of a Lightning in the Mediterranean off the coast of Marseille, and it was confirmed in April 2004 as Saint-Exupéry’s F-5B. No evidence of air combat was found. In March 2008, a former Luftwaffe pilot, Horst Rippert from Jagdgruppe 200, claimed to have shot down Saint-Exupéry.

Adrian Warburton

The RAF’s legendary photo-recon "ace", Wing Commander Adrian Warburton DSO DFC, was the pilot of a Lockheed P-38 borrowed from the USAAF that took off on 12 April 1944 to photograph targets in Germany. W/C Warburton failed to arrive at the rendezvous point and was never seen again. In 2003, his remains were recovered in Germany from his wrecked USAAF P-38 Lightning.

• • • • •

Quoting Smithsonian National Air and Space Museum | Boeing B-29 Superfortress "Enola Gay":

Boeing’s B-29 Superfortress was the most sophisticated propeller-driven bomber of World War II and the first bomber to house its crew in pressurized compartments. Although designed to fight in the European theater, the B-29 found its niche on the other side of the globe. In the Pacific, B-29s delivered a variety of aerial weapons: conventional bombs, incendiary bombs, mines, and two nuclear weapons.

On August 6, 1945, this Martin-built B-29-45-MO dropped the first atomic weapon used in combat on Hiroshima, Japan. Three days later, Bockscar (on display at the U.S. Air Force Museum near Dayton, Ohio) dropped a second atomic bomb on Nagasaki, Japan. Enola Gay flew as the advance weather reconnaissance aircraft that day. A third B-29, The Great Artiste, flew as an observation aircraft on both missions.

Transferred from the United States Air Force.

Manufacturer:
Boeing Aircraft Co.
Martin Co., Omaha, Nebr.

Date:
1945

Country of Origin:
United States of America

Dimensions:
Overall: 900 x 3020cm, 32580kg, 4300cm (29ft 6 5/16in. x 99ft 1in., 71825.9lb., 141ft 15/16in.)

Materials:
Polished overall aluminum finish

Physical Description:
Four-engine heavy bomber with semi-monoqoque fuselage and high-aspect ratio wings. Polished aluminum finish overall, standard late-World War II Army Air Forces insignia on wings and aft fuselage and serial number on vertical fin; 509th Composite Group markings painted in black; "Enola Gay" in black, block letters on lower left nose.

Nice Milling Manufacturing images

Nice Milling Manufacturing images

A few nice milling manufacturing photos I discovered:

urban jungle

Image by CrazyFast
&quotThe paradox of our time in history is that we have taller buildings but shorter tempers, wider Freeways , but narrower viewpoints. We spend a lot more, but have less, we acquire a lot more, but take pleasure in less. We have bigger houses and smaller households, far more conveniences, but less time. We have far more degrees but significantly less sense, far more understanding, but significantly less judgment, a lot more experts, however more troubles, more medicine, but less wellness.

We drink also much, smoke too considerably, devote as well recklessly, laugh too little, drive too quickly, get too angry, remain up too late, get up too tired, study too small, watch Tv also considerably, and pray also seldom. We’ve discovered how to make a living, but not a life. We’ve done bigger things, but not much better items. We’ve learned to rush, but not to wait. We develop much more computer systems to hold much more details, to produce more copies than ever, but we communicate significantly less and significantly less.&quot
-George Carlin

Tampereen Tornihotelli 09/2013

Image by place: unknown

Nokia

Image by place: unknown

Nice Precision Engineering Services pictures

Nice Precision Engineering Services pictures

A few nice precision engineering services images I found:

CNET News – Desktop threat, still a threat (December 20, 2012 5:28 PM PST) …item 2.. The Andromeda Strain (1971) “Code 601” …item 3.. Beware of online banking (22 May 2014) — Payment request: £50 to A.Crook (ref: Thank you) …

Image by marsmet546
One story that Hypponen says was underreported in 2012 was the rootkit known as ZeroAccess. "Zero Access is almost totally under the radar, yet it’s a massive, massive outbreak. It’s almost as big in size as Conficker, which was headline material for weeks. [Zero Access] is a commercial kit, being developed and sold by a Russian coder. [It] installs itself to the [master boot record] so it boots before Windows.
.

……..*****All images are copyrighted by their respective authors ……..
.

… marsmet546 photostream … marsmet546

m.flickr.com/#/photos/90585146@N08/

Thursday, Apri 3, 2014

.

m.flickr.com/#/photos/90585146@N08/8292944597/

2014 – Black text on white background

.

View photo size … Large

m.flickr.com/#/photos/90585146@N08/8292944597/sizes/l/

.

m.flickr.com/#/activity/

.
.

………………………………………………………………………………………………………………………………………………………………………
.
…..item 1)…. CNET.com … news.cnet.com

CNET News Security & Privacy Four security trends defined 2012, will impact 2013

Four security trends defined 2012, will impact 2013
Mobile and Mac malware burbles noxiously, data breaches and data mining will cause more havoc with your privacy, and the Web will continue to suffer the ignominy of poorly-written, Swiss-cheesed code as security experts predict lessons from 2012 go unlearned in 2013.

by Seth Rosenblatt December 20, 2012 5:28 PM PST

news.cnet.com/8301-1009_3-57560373-83/four-security-trend…

.
……………………….

img code photo … Stuxnet OT

asset2.cbsistatic.com/cnwk.1d/i/tim/2012/06/30/Stuxnet_OT…

……………………….
.

The Internet is slowly changing, and security experts say that today’s security issues will continue to be major players in driving that change. Here are four trends that dominated headlines in 2012, and will continue to play a major role in 2013.

—– The Internet as governmental tool

The collective realization by governments around the world that the Internet is an excellent network for conducting surveillance, monitoring, espionage, and war, says Finnish computer security firm F-Secure’s Chief Technical Officer Mikko Hypponen, may not come to full fruition in 2013. But the foundation for that change is already underway.

"There will be more operations along the lines of Olympic Games, also from other sources than US and Israel. Later on, we might look back at these first 20 years of the Web as the Golden Days, when the net was still free," he wrote in an e-mail to CNET. "Olympic Games" is the covert inter-govenrment project that birthed Stuxnet, Duqu, and Flame.

Related stories:

… Senate approves Netflix-backed amendment to video privacy law
… Facebook begins rolling out new privacy tools
… Facebook starts pushing out new privacy settings
… Don’t blame Instagram users — blame Instagram
… Children’s privacy law catches on to apps, social networks

Information security expert Chris Wysopal agreed that "cyber-warfare" is becoming commonplace. "When there’s a political or actual war event, we’re seeing cyber-attacks parallel that. It does seem to be more pronounced. It’s almost not newsworthy, as if we expect it to happen alongside a political event."

Take that in for a moment. Government-sponsored, computer-based attacks, as "almost not newsworthy," he said.

But just because these attacks are becoming more frequent doesn’t mean that they don’t stymie security researchers. Tomer Teller, a security evangelist and researcher at Check Point, said that he was surprised this year by the rise of "precision-targeted attacks."

"We saw that with Gauss this year, from the Stuxnet family. It had an encrypted payload, and researchers couldn’t decrypt it."

Tim Rains, the director of Microsoft’s Trustworthy Computing division, pointed out that these governmental actions have consequences beyond the nuclear reactors of Iran and other industrial targets.

"Eighty-five percent of the exploits against operating systems tried to take advantage of one of the vulnerabilities that Stuxnet used. A very small fraction of malware uses "zero-days," so we’re seeing commodity malware writers benefits from the research of professionals," he said. "It was a trend in 2012, and we’ll continue to see that in the next year."

.
…………………….

img code photo … Android Marching Malware

asset3.cbsistatic.com/cnwk.1d/i/tim/2012/10/15/android-ma…

…………………….
.

—– More mobile devices, bigger targets

Experts have been talking up mobile security for several years now, and as mobile device proliferation continues, so will the security problems associated with them. Because of their very mobile, always-connected nature, experts told me that the problems will become more complex in 2013.

Lookout Mobile Security’s senior product manager, Derek Halliday, noted two interesting trends that his company saw in 2012. Lookout predicted and saw in 2012, "only a few dominant kinds of mobile malware," he said.

Microsoft’s Rains agreed. "[The Looter exploit] is responsible for the second-most highest number of mobile threats we saw."

Halliday added, "The other thing was how geographic specific these threats were. We were surprised by the stark contrast between the U.S. and say Russia or China. If you try to run a toll fraud application at scale in the U.S., you’ll encounter some problems — a double-opt in message, government intervention," he said.

Another point Halliday made was that while Android 4.2 is the most secure yet, with numerous security improvements, operating system fragmentation will prevent it from reaching most people until late 2013.

.
……………………..

img code photo … Flashback

asset1.cbsistatic.com/cnwk.1d/i/tim/2011/09/26/Flashback_…

(Credit: Intego)

……………………..
.

On the other hand, said Wysopal, the impact of mobile malware is definitely growing. "In 2012, half a percent of all mobile users got hurt by mobile malware in the U.S. That’s a million people, not an insignificant number. It’s a trend that is happening slower than expected, but it’s not going to go away."
The malware problem is likely to remain isolated from Apple’s iOS, according to Hypponen. "There’s still no iPhone malware. Five years after shipping one of the most popular systems, they have no malware problem at all. That’s a major accomplishment by Apple. Job well done."

—– Desktop threat, still a threat

Mobile is booming, with Android devices outselling Windows computers in Q3 2012, but that doesn’t mean that we’ll see a downturn in desktop-focused attacks.

One story that Hypponen says was underreported in 2012 was the rootkit known as ZeroAccess. "Zero Access is almost totally under the radar, yet it’s a massive, massive outbreak. It’s almost as big in size as Conficker, which was headline material for weeks. [Zero Access] is a commercial kit, being developed and sold by a Russian coder. [It] installs itself to the [master boot record] so it boots before Windows.

While Hypponen noted that Windows 8 and Macs use UEFI to create secure boot procedures that prevent rootkits like Zero Access, Microsoft’s Rains cautioned that eventually, and possibly in the coming year, this will force rootkits to evolve.

.
………………………..

img code photo … stuxnet

asset2.cbsistatic.com/cnwk.1d/i/tim/2012/06/13/stuxnet_30…

………………………..
.

Mac malware got a lot of attention in the second half of 2011 and in 2012 with Flashback, and that’s expected to continue. Hypponen said, "The author of the Flashback Trojan is still at large and is rumored to be working on something else. And while there have been smart security changes to the Mac OS," likely alluding to Mountain Lion’s Gatekeeper, "there’s a segment of the Mac-using population who are basically oblivious to the threats facing Macs, making them vulnerable to a new malware outbreak."
And across platforms, browsers remain a broad surface to attack despite ongoing improvements.

Jeremiah Grossman of WhiteHat Security said that new exploits and vulnerabilities, such as CSS sniffing attacks, will continue to cause turmoil in the most popular kind of desktop program. "Let’s say you just downloaded Chrome or Firefox. If I can get you to click somewhere on the screen, I can get you. These browsers are not really secure, it’s death by 1,000 cuts." we have 15 years of broken, faulty web code, we have a lot of garbage websites out there that are protecting a lot of interesting data.

—– Privacy and data breaches

One of the big notables in information security over the past year was the rise of awareness in data mining. Brought on by numerous privacy policy changes to high-profile social networks like Facebook, Google, and Instagram, by fast and loose trendy mobile app policies, and by shockingly large data breaches at companies that just can’t be bothered investing in better database protection, privacy is becoming a key security topic.

.
…………………………..

img code photo … hackerstwo

asset1.cbsistatic.com/cnwk.1d/i/tim/2012/06/12/100206hack…

…………………………..
.

Lookout’s Halliday said that he expects privacy to be a hot topic in the coming year. Not only has the California attorney general been pushing for companies to take a stance more favorable to consumers before the government is forced to step in, he said, but consumers are more aware in general.

"Devices are collecting not just location information, but contacts and your historical record of talking to them. We’d be more than happy if there was significant progress towards [better privacy] as a goal," he said.

WhiteHat Security’s Grossman pointed out that it’s not just malware writers who are using exploits. Difficult to detect until recently, "CSS sniffing was being done data aggregators," he said.

—– Holistic security

One trend that’s impossible to deny is that these security problems may start in discretely different realms, but the nature of the Internet is making them more intertwined than ever before. Malware-writing techniques pioneered for Stuxnet inspire consumer-targeted malware writers, who in turn are forced to develop new social engineering techniques as app stores, browsers, and Web site owners play Whac-a-Mole with vulnerabilities.

And issues like the potential for exploiting devices connected directly to the Internet, like smart TVs and DVD players; more creative, harder to stop social engineering; the commercialized selling of all manner of exploits; and utility and medical device hacks are expected to grow in impact.

As much as we don’t want to admit it, security is becoming an issue of ongoing education. 2013 would be a good year to get going on that.

Topics:Security Tags:roundup, 2013, 2012, prediction, security

About Seth Rosenblatt

Seth Rosenblatt is a senior editor at CNET, and has written about nearly every category of software and app available. At CNET since 2006, he currently focuses on browsers, security, and operating systems, with occasional forays into tech and pop culture.

.
.

.
………………………………………………………………………………………………………………………………………………………………………
.
…..item 2)…. youtube video …

— The Andromeda Strain (1971) Part 01 … 9:45 minutes

www.youtube.com/watch?v=wajIliPFHk4

………….

— The Andromeda Strain (1971) Part 02 … 10:04 minutes

www.youtube.com/watch?v=6Rd7ejqZSrg

…………..

— The Andromeda Strain (1971) Part 03 … 10:04 minutes

www.youtube.com/watch?v=VqOwqXafjcg

……………

— The Andromeda Strain (1971) Part 04 … 10:04 minutes

www.youtube.com/watch?v=CHXbBSFBfO4

…………….

— The Andromeda Strain (1971) Part 05 … 10:04 minutes

www.youtube.com/watch?v=dhp63DIM30o

……………..

— The Andromeda Strain (1971) Part 06 … 10:04 minutes

www.youtube.com/watch?v=Ab0woEupW90

………………

— The Andromeda Strain (1971) Part 07 … 10:04 minutes

www.youtube.com/watch?v=anwcFo4fwqA

……………….

— The Andromeda Strain (1971) Part 08 … 10:04 minutes

www.youtube.com/watch?v=wn82Q2JeB_g

……………….

— The Andromeda Strain (1971) Part 09 … 10:04 minutes

www.youtube.com/watch?v=O8Yv7LjD7tY

………………..

— The Andromeda Strain (1971) Part 10 … 10:04 minutes

www.youtube.com/watch?v=xHC7reln_tw

…………………

— The Andromeda Strain (1971) Part 11 … 10:04 minutes

www.youtube.com/watch?v=mUvOfnIPV0E

………………….

— The Andromeda Strain (1971) Part 12 … 10:04 minutes

www.youtube.com/watch?v=aqGztEExN4Y

………………….

— The Andromeda Strain (1971) Part 13 … 10:04 minutes

www.youtube.com/watch?v=OfsJ074Ccp4

…………………..

AStrainMov

Uploaded on Jul 31, 2008

The best-selling novel by Michael Crichton was faithfully adapted for this taut 1971 thriller, about a team of scientists(Arthur Hill, David Wayne, James Olson, Kate Reid and Paula Kelly) racing against time to destroy a deadly alien virus that threatens to wipe out life on Earth. As usual with any Crichton-based movie, the emphasis is on an exciting clash between nature and science, beginning when virologists discover the outer-space virus in a tiny town full of corpses. Projecting total contamination, the scientists isolate the deadly strain in a massive, high-tech underground lab facility, which is rigged for nuclear destruction if the virus is not successfully controlled.

The movie spends a great deal of time covering the scientific procedures of the high-pressure investigation, and the rising tensions between scientists who have been forced to work in claustrophobic conditions. It’s all very fascinating if you’re interested in scientific method and technological advances but it’s more effective as a thriller in which tension is derived not only from the deadly threat of the virus, but from the escalating fear and anxiety among the small group of people who’ve been assigned to save the human race.

The basic premise is still captivating; it’s easy to see how this became the foundation of Crichton’s science-thriller empire.

Category
Film & Animation

License
Standard YouTube License

.
.

.
……………………………………………………………………………………………………………………………………………………………………..
.
…..item 3)…. Beware of online banking: Security expert reveals that ANYONE can hack a bank’s app using free internet tools

… Mail Online – Daily Mail … www.dailymail.co.uk/sciencetech/

… Mobile security expert has demonstrated how a banking app can be hacked
… He built a dummy app and used reverse engineering to connect to a server
… When sending money, the server was able to obtain the user’s password
… It was then programmed to piggyback onto the payment and transfer money to the hacker’s account
… Arxan’s Winston Bond said reverse engineering can be used on any app
… There are also tools and online tutorials to teach hackers the process

By VICTORIA WOOLLASTON

PUBLISHED: 07:27 EST, 22 May 2014 | UPDATED: 08:58 EST, 22 May 2014

www.dailymail.co.uk/sciencetech/article-2636160/Beware-on…
.

More than two thirds of us now use smartphones to make payments and check bank balances online.

Many banking apps have a number of security measures in place – from two-step authentication to passwords and PINs – but they may not be as secure as first thought.
.
……………………

img code photo … SEND PAYMENT – dummy banking app

i.dailymail.co.uk/i/pix/2014/05/22/article-2636160-1E19D3…

Mobile security experts set up a dummy banking app, pictured, to demonstrate how the technology can be hacked using reverse engineering

Arxan

……………………
.

A mobile security expert has revealed to MailOnline how these apps can be hijacked using free tools available online – and the hackers don’t need any of the user’s login details.

Winston Bond is technical manager at mobile security firm Arxan Technologies.

To highlight the risks, he developed a dummy banking app before engineering it to connect it to an external server that could be run by a hacker.

During a demonstration, as he signed into the app, the password was automatically revealed on the hacker’s server.

During another demo, he sent money via the app.

The server was able to piggyback onto the payment and even transfer money to the hacker’s account at the same time.

Although this was a dummy demonstration, Bond explained it is the same process hackers are using to access official banking apps on mobile devices.

The hacking technique used is called reverse engineering.
.

More…

… Google’s 9 smart smoke sensor Nest Protect set to go back on sale after flaw that causes it to turn off if someone WAVES at it fixed
… The tricycle that could replace the cop car: Segway reveals ,000 three wheeler designed for police patrols

The process involves taking an object apart to see how it works, either to replicate or improve it.
.
………………………

img code photo … connected the app to an external server

— bin – Hacker’s Server
.

finnmcmissile% ./hackistan_server

########################################

Ready to capture mobile banking details

########################################

Password: arxan
Balance: 415

i.dailymail.co.uk/i/pix/2014/05/22/article-2636160-1E19D3…

As part of the engineering, expert Winston Bond connected the app to an external server that could be run by a hacker, pictured. During one demonstration, as he signed into the app on his iPad, the password was automatically revealed on this pretend hacker’s server on a laptop, pictured

Arxan

………………………
.
………………………

img code photo … The server was able to piggyback

— bin – Bank Of Arxan
.

finnmcmissile% ./BankOfArxan_server
BankOfArxan_Servier: using default port
New client: Winston’s iPad connect

Payment request: £10 to Wilf (ref: pocket money)

News client: Winston’s IPad connected

Payment request: £25 to Mark (ref: lunch)

Payment request: £50 to A.Crook (ref: Thank you)

i.dailymail.co.uk/i/pix/2014/05/22/article-2636160-1E19D2…

During another demonstration, Bond sent money to a person called Mark, via the app. The server was able to piggyback onto the payment and send money to the hacker’s account, pictured here as A.Crook. Although this was a dummy demonstration, Bond said it is the same process hackers use to access official banking apps

Arxan – Protecting the App Economy

………………………
.

Reverse engineering is not just used for hacking purposes, and is often a technique programmers use to find mistakes or errors in code in order to fix them.

In the case of apps, software reverse engineering involves translating the program’s binary code back into the source code it was originally written in.
.
….

— WHAT IS REVERSE ENGINEERING?

… Reverse engineering is the process of taking an object apart to see how it works, either to replicate or improve the object.

… It is not just used for hacking purposes, and is often used by programmers to find mistakes or errors in code in order to fix them.

… In the case of apps, software reverse engineering involves translating a program’s binary code back into the source code that it was written in.

… This source code reveals to the hackers how the app works, the steps it takes to complete certain tasks and details about the app’s structure.

… A reverse engineer can use a various tools to disassemble a program.

… One example is called a hexadecimal dumper, which prints or displays the binary numbers of a program in hexadecimal format, making it easier to read than binary.

… Another tool is a disassembler. This reads the binary code and displays each instruction in text form.

….
.

This source code reveals to the hackers how the app works, the steps it takes to complete certain tasks, and details about the app’s structure.

Hackers are able to manipulate this source code by adding in lines that connect the app to an external server, for example, or code that tells the app to reveal the password each time it’s entered.

More complicated code is used to create a rule, for example, that means every time a payment is sent, the same amount is sent to the hackers account.

Accomplished hackers can also edit the code to hide these changes from the program, so the software assumes everything is working as it should.

Once the changes are made, the edited code is uploaded back onto the company’s server.

And, as Winston Bond explained, all of these steps can be carried out using tools freely available online.

There are even online video tutorials that show programmers, as well as a hackers, how to access the source code of software.

He did point out that iOS apps and software are more secure and closely monitored than Android, for example – except on jailbroken devices.

‘Jailbreaking’ is the process of removing certain restrictions Apple places on apps and downloads, for example, and makes it easier for developers to adjust settings.
.
……………………..

img code photo … Reverse engineering

i.dailymail.co.uk/i/pix/2014/05/22/article-2636160-1E1A67…

Reverse engineering is the process of taking an object apart to see how it works. It is not just used for hacking purposes, and is often used by programmers to find mistakes or errors in code. Software reverse engineering involves translating a program’s binary code, stock image, back into the source code it was written in

……………………..
.

In many of the cases where banking apps are hacked, Bond continued the attack only works when a user downloads a separate, malicious app.

The demonstration was created after an Arxan study found hackers attacked 78 per cent of the top 100 paid Android and iOS apps last year.
.
…..

— HOW TO PROTECT YOURSELF?

… Many apps are now using additional software, including those developed by Arxan Technologies to prevent hackers from reverse engineering their products.

… However, firms do not reveal if they are protected by such services so users are advised to only download apps from official app stores.

… People should keep an eye on bank statements and report any irregularities.

… They should also check in the phone’s settings for any unusual looking processes running in the background.

… If any look suspicious, users can search online for the names of processes to see what they do.

… Experts also suggest installing antivirus apps on mobile devices.

…..
.

It revealed there were hacked versions of 100 per cent of the top 100 paid apps for Android, and 56 per cent of the top 100 paid apps for iOS.

Last year, Arxan found attackers modified 80 per cent of free Android apps, and this year, this was down to 73 per cent in the same category.

On iOS devices, 40 per cent were hacked last year, compared to 53 per cent this year.

The research unveiled cracked versions of popular financial apps to be at 53 per cent for Android, and 23 per cent were Apple iOS hacked variants.
.

— Share or comment on this article

.

Comments …
Share what you think

.

The comments below have not been moderated.

.

— Sid, Australia, Australia
And after all these wonderful foolproof actions and downloads, chuck the whole lot in the rubbish bin and walk to your banking institution JUST LIKE WE USED TO before we got lazy.

.
.

.
………………………………………………………………………………………………………………………………………..
.
.
.

Nice Cnc Milling Machine photos

Nice Cnc Milling Machine photos

A handful of good cnc milling machine images I identified:

luke iseman makes use of a cnc mill to machine steel biochar kilns for farmers in kenya

Image by nicolas.boullosa

cnc machining

Image by nicolas.boullosa

Custom engravings!

Image by bldesign
Thanks to some new gear, I can provide custom engraved 2×4 brick keychains after once more!

shop.bldesign.org/index.php?primary_web page=item_info&ampcP…

Get yours in time for the holidays!

Nice Cnc Turned Elements photos

Nice Cnc Turned Elements photos

Verify out these cnc turned components pictures:

Catwalk fabrication detail

Image by Caliper Studio
Developed for a multimedia design and style firm, this blackened steel catwalk connects a mezzanine to a conference area. The catwalk consists of cast glass lenses imbedded in the floor reminiscent of the cast iron sidewalk grates common in lower Manhattan at the turn of the century. The laser reduce elements were detailed in solidworks to match together like a kit-of-components that was assembled and installed more than a weekend.

Catwalk side view

Image by Caliper Studio
Designed for a multimedia design and style firm, this blackened steel catwalk connects a mezzanine to a conference room. The catwalk consists of cast glass lenses imbedded in the floor reminiscent of the cast iron sidewalk grates common in lower Manhattan at the turn of the century. The laser reduce components had been detailed in solidworks to fit together like a kit-of-components that was assembled and installed more than a weekend.

Nice Machined Metal Components pictures

Nice Machined Metal Components pictures

Some cool machined metal components images:

2010 Hope M4 brake lever

Image by SoulRider.222
7/14/10. Canon Rebel XTi. Quantaray 70-300mm. Tripod and remote switch. SOOC.

2010 Hope M4 brake lever, Shimano Deore XT shifter

Image by SoulRider.222
7/17/ten. Nikon Coolpix S8000. Handheld. SOOC.

2010 Hope M4 caliper

Image by SoulRider.222
7/14/ten. Canon Rebel XTi. Quantaray 70-300mm. Tripod and remote switch. SOOC.