Feeds

LOHAN team buried under ballockets

Click here for a shedload of Reg reader spaceplane launch concepts

Secure remote control for conventional and virtual desktops

We don't think we've had enough big springs yet. Cue Richard Possnett: "The balloon would be hooked up to a spring mechanism which would pull it away from Vulture 2 upon bursting, and also function as a launch trigger at the best possible height. Although it may need quite a large spring, maybe a coil which winds up the cord would work better?"

A compressed spring pulls the burst balloon away from Vulture 2 and ignited rocket motor

David Steadman chipped in with this plan...

A pair of separating boxes provides the launch platform

...while also offering something a bit more off-the-wall:

Vulture 2 attached to a weight which pulls it free from the main payload

Tim Harris got right back to basics, but with some solid thinking:

The Vulture 2 launched from the end of a horizontal platform

He says: "By rigging to the ends of the beam, the beam will be be working in compression, with the mass of the payload and Vulture primarily supported by the rigging. This will enable the use of a much lighter spar.

"I have made the assumption that the payload will be heavier than the vehicle, and have done away with the counterweight. This might save a good chunk of weight and also allows the Vulture to be further out for a given length of spar. The centre of mass always hanging beneath the anchor point. (In the drawing the payload is approx. 3X the weight of the vehicle.)

"Because the rig is asymmetrical, it should kite into the wind the vehicle to leeward. you could add a streamer or small windsock for more stability.

"Once Vulture has launched, the payload should have a fairly gentle swing to the new C.O.M."

Internet Security Threat Report 2014

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.