Feeds

First ever supersonic stealth jumpjet starts hover tests at last

Will Harrier heir survive Byzantine aero politics?

High performance access to file storage

The F-35 might be no good - but aerospace people would still hate it even if was brilliant

The F-35B doors open from the side. Credit: JSF Program

The fliptop lid covers the lift-fan shaft. The dorsal doors let more air into the engine for hover ops.

This is in part because the engine originally fitted had to be replaced with a modified one following bench-testing failures. There have been other delays, perhaps not surprising when one reflects that this is not just the world's first supersonic jumpjet but the first supersonic stealth jumpjet to boot. Now, however, the Forth Worth Star-Telegram reports that BF-1 has finally arrived at the US Navy's Patuxent River test field in Maryland, where the next month or so should see it flying slower and slower until it is actually hovering in mid-air.

These will be tense days for both F-35 engineers and for many observers. The whole F-35 programme - A, B and C models - has faced a barrage of criticism in the aerospace world, generally on the ostensible grounds that the jet isn't going to be good enough to tackle possible future Chinese and/or Russian planes. This school of thought holds that the Obama administration should have bought more expensive Raptor superbirds and fewer "affordably stealthy" F-35s.

It's possible to note, however, that such a plan would have been excellent news for the Western aerospace sector for business reasons. A smaller US buy of F-35s would drive up its price and so undermine the plane's likely dominance of the world fighter export market in coming years. This would be excellent news for the makers of the Super Hornet, the Eurofighter, the Gripen and the Rafale - thus for just about all the first-rank Western aerospace companies and anyone who makes their living from them - and still pretty good news for Lockheed, as they make the Raptor too.

The fact that the F-35 seems likely to put a lot of its rivals out of business in coming years, then, might account for as much of the criticism it gets as any genuine fear of Chinese or Russian air dominance in future.

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
Get your MOON GEAR: Auction to feature Space Race memorabilia
Keepsakes from early NASA, Soviet programs up for bids
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.