Feeds

Heidemarie 'Toolbag' Piper set for second spacewalk

While ISS crew hunt missing spider

SANS - Survey on application security programs

Endeavour mission specialists Shane Kimbrough and Heide Stefanyshyn-Piper are getting ready for the second mission STS-126 spacewalk outside the International Space Station this afternoon, scheduled to get under way at 18:45 GMT.

Their lisk of jobs includes "the relocation of two crew and equipment translation aid carts, the lubrication of the Canadarm2 end effector, and the continuation of cleaning and lubrication of the starboard solar alpha rotary joint".

Piper earlier this week dropped a toolbag during the first spacewalk - a mishap she described as "very disheartening". She added: "There's still the psychological thing of knowing that we made a mistake and having to live through that. It was hardest coming back in and having to face everybody else."

Piper did, though, insist there would be no repeat performance, tempting fate with: "You're not going to see us lose another bag. We're going to double- and triple-check everything from here on out."

Inside the ISS, meanwhile, crew are keeping a sharp eye out for one of two orb spiders which may have gone awol from a sealed container which arrived aboard Endeavour. The arachnids form part of an experiment aimed at promoting science to students, which consists of seeing how they cope with web-weaving in space.

The answer is not very well, as the ISS's science officer Sandra Magnus explained: "The web was more or less three-dimensional and it looked like it was all over the inside of the spider hab."

Crew on Monday checked the pair, but could only see one inside the tangled silken matrix. NASA insisted, though, that the missing spider was probably somewhere amid the confusion. Kirk Shireman, NASA's deputy station program manager, said: "We don't believe that it's escaped the overall payload enclosure. I'm sure we'll find him spinning a web sometime here in the next few days."

NASA has STS-126 mission updates here. ®

Top three mobile application threats

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.