Feeds

Vulture 1 sprouts wings and a tail

Lots of lovely construction snaps for your viewing pleasure

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

At this point, suitably fortified with a quick shot of brandy, we turned our attention to the wings. Our previous effort, and readers' comments regarding the same, prompted us to go with a redesigned rib, which looks like this:

Plan of the wing rib

We made a raft of ribs from a four-ply paper laminate (as per the rudder and elevators, but with an extra ply) and punched them out to accept the paper-straw spars:

The wings ribs and leather punch

The main spar is formed from three straws, which you have to keep pinned down during glueing to keep them hard up against each other:

The main spar pinned down to keep it straight during glueing

Here's the main spar passing through the ribs...

The main spar passing through the ribs

...and the trailing edge spar in position. Note the high-tech wing assembly jig:

The trailing edge spar also passing through the ribs and the whole wing pinned down

Internet Security Threat Report 2014

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.