The Napster Revolution

I’ve recently been reading through Steve Jobs’ biography, a phenomenal work by Walter Isaacson. A point that Isaacson keeps coming back to throughout the book is that Steve Jobs revolutionized six different industries: animated movies (through Pixar), personal computing, tablet computing, phones, digital publishing, and music.

I don’t disagree with Isaacson. Jobs did revolutionize the way that digital media (including music, movies, books, and more) is marketed and sold today. But before you can have the corner on the market, there needs to be demand. And the revolution that realized the screaming demand for easily accessible digital media around the globe started in a college dorm room during the summer of 1999.

 

The Beginning

It started with two adolescents, Shawn Fanning and Sean Parker, who shared mutual interest in hacking and programming. Though the teenagers never met at this point, they continued to chat over IRC in the years to come, bouncing various software ideas off each other.

During his Freshman year of college at Northeastern University in Boston, Fanning had an idea to simplify online music acquisition for him and his roommate. It was 1998, and the easiest way to download MP3s was through various websites. Each website had a different interface. Each a different library of music. Many broken links. All were very slow.

Fanning wrote a piece of software that fixed this. It provided a single, clean interface that searched all the major MP3 websites, providing results only for working links. It was effective. But it still wasn’t a comprehensive library.

By the end of his Freshman year, Fanning had dropped out of college and was mulling over ideas for a music sharing program that didn’t rely on limited libraries and websites that were taken down and relaunched on a weekly basis. He worked out the good and bad ideas for such a program with his internet buddy, Parker, over IRC, slowly growing more confident in his idea and its architecture.

By midsummer, 1999, Fanning sat down at his uncle’s for a sixty-hour programming spree, and it was during those sleepless hours that Napster was officially born.

 

The Architecture

His idea was simple enough. All he needed to do was combine three existing protocols into one client: computer-to-computer connectivity (which was accomplished in instant messaging clients like IRC), file sharing (which was implemented in many instant messaging clients and exhibited in operating systems like Windows), and advanced search (which was illustrated by MP3 and internet search engines).

Fanning had already implemented two of the three features in the MP3 search program that he wrote during his Freshman year of college. The third feature, computer-to-computer connectivity, was the innovation that led his first program to become Napster.

The issue with Fanning’s first program was the same issue independent MP3 websites had: it relied on the servers of third-party websites that were frequently taken down for a number of reasons. Using computer-to-computer connectivity, Napster utilized each user’s computer as a server on the Napster network. Rather than searching the server of a website, Napster searched the computer’s of user’s that were currently logged onto the network.

There still was a centralized server for Napster—which is what eventually led to the service’s downfall—that indexed MP3 files and their locations. This allowed the Napster to still provide a very rapid search functionality.

Amazingly, in its two years of operation, the centralized server for Napster never went down. Not once.

 

Sharing and Searching

Napster did not blindly search a user’s entire computer for MP3 files—Fanning was originally a hacker, but he still understood privacy. Nor was Napster able to search a client’s computer if the Napster client was not running. So how did user’s music library become part of the Napster network?

  1. The user would need to install the Napster client on their computer
  2. The user would need to share a specific folder on their computer
  3. The user would need to have the Napster client running

Assuming these three criteria were met, any MP3 files within the user’s shared folder would be indexed on the centralized Napster server and available for download by other logged on users.

Any other user using the Napster client could then browse for songs by artist, song, album, etc. The search would be indexed through the centralized Napster server, and results returned from the index would be shown to the user. When a user selected a song for download, the Napster server would return the IP address of the user’s computer that contained the desired song, connect the two user’s computers, and transfer the file.

 

The Rise …

After Fanning’s sixty-hour programming marathon, Napster was born. It was June of 1999, and Fanning and Parker released the beta of Napster to thirty of their friends. It was meant to be a small group for testing. But obviously, given the described architecture above, the more computers that user Napster, the larger the Napster library would be. Fanning and Parker’s friends saw this potential, and less than seven days later, the purposely small test group had spread the download from thirty to 15,000 users.

Its users unaware of the legal implications, Napster went viral. Less than a year from its release, Napster was the fastest growing website in history and had acquired over 25 million users. This growth rate was unprecedented and was a surprise to everyone except Fanning, Parker … and anyone that used the service. Napster was wildly popular on the internet for two blissful years. Before Napster’s user base started to decline (due to the hot legal attention it was receiving), the service peaked at 80 million registered users.

Fanning believed his idea would be popular. But he had no idea of the demand that it would generate. Prior to the release of Napster, digital media was not easily accessible to the general public. Napster opened our eyes to the convenience we could be affording. Unfortunately, the convenience Napster offered was relatively short lived. The Recording Industry Association of America (RIAA) had taken its focus off nearly every other legal dispute it had to focus its crosshairs squarely on Napster.

 

… And Fall

How much damage (if any) Napster did to the music industry will be a topic of debate that will never find a good answer. While the RIAA may point out that, at its peak, Napster shared roughly 2.79 billion MP3s per month among its users, others would tell you that a song downloaded for free does not always correlate to revenue lost. A statistician on the other side of the argument might point out that, during the year Napster was most popular, revenue for the music industry increased by $500 million. Neither of these facts provide hard evidence for either side of the case, but they make for good argumentation.

Regardless, the service Napster provided was solely free MP3 distribution, and there’s no doubt that the means by which Napster did this violated copyright law. The RIAA, along with major record labels, artists, producers, and other corporate giants, banded together to file litigation against Napster. The litigation itself wasn’t overly complicated, and the Napster company effectively dissolved in July 2001, two years after launching the Napster service, one year after injunction.

But the Napster rise, fall, and lawsuit were extremely interesting. No, the litigation itself was nothing to write home about. It was the companies sponsoring the litigation, as well as Napster, that illustrated both the irony of the situation and the need for something like Napster with a legal face. Because many of the same companies that sponsored the litigation against Napster, and even sued Napster itself, were the same companies that had (and continued to, even after injunction) funded Napster.

While the litigation departments of media companies around the world were building cases against Napster, the software departments were integrating components of Napster into their own applications. AOL, Yahoo, and Microsoft, for instance, each introduced instant messaging clients that had a Napster button on every chat window, which allowed you to quickly share a song with a friend. You may recall that AOL merged with Time Warner in late 2000, which caused Warner Music to be renamed to Warner Music Group. Point being, Warner Music Group was one of the many groups involved in litigation against Napster, but their parent company AOL Time Warner was funding the very company they were suing.

AOL was not the only house divided. German media giant Bertelsmann saw the potential in Napster, but they also saw how susceptible it was to legal disputes. So they invested $85 million into the company, asking them to develop a better, more secure distribution system. All this, even while Bertelsmann’s media division was also funding the RIAA and its lawsuit  against Napster. And finally, when the dust was still settling in early 2002, Bertelsmann offered to purchase Napster for $20 million. The offer was rejected, and Napster quickly disintegrated as its employees (and executives … and board) took their severance pay and fled at the sight of bankruptcy. For as spectacular as the formation of Napster was, the day the company finally closed its doors was downtrodden and quiet.

 

The Gnutella Network

The end of the Napster service did not end the Napster idea. And even though Bertelsmann offered Napster $85 million to develop a secure distribution system that the company never had time to develop, someone else did: two people named Justin Frankel and Tom Pepper, co-founders of Nullsoft, a small software company recently purchased by none other than AOL. Justin and Tom developed a more robust and secure peer-to-peer file sharing network, and they called it Gnutella. Mind you, this wasn’t years after the RIAA smashed Napster into the ground. They began working on their alternative to Napster in 2000, and the Gnutella network began to catch the attention of the public’s eye in early 2001, when Napster’s legal battles were ramping up.

To AOL’s credit, they did try to stop Gnutella from growing up and living a long and healthy life. The day after the Gnutella source code was publicly released on Nullsoft’s website, AOL demanded the project be shut down. But, of course, it had already been downloaded thousands of times, and it was already being redistributed on countless sites. So AOL’s move to pull it off their servers was said to be similar to closing the barn door after you let the horse out.

The Gnutella network, unlike Napster, was not a client. It was both a protocol and an idea. The downfall of the old MP3 sites was that both their index server and their libraries were centralized servers owned by the sites. The downfall of Napster was that, though their libraries were on their user’s computers, they still had a centralized server that indexed all MP3 files and the computers on which they were stored. The Gnutella network removed all centralized server and instead used each user’s computer as a server and also a relay. The relay was what acted in place of a centralized index server. And since the Gnutella protocol was open source, anyone could make a client that connected to it. And there are … many.

When you logged on to the Gnutella protocol using a Gnutella client, for instance LimeWire or Morpheus, the protocol on your computer would ping several other computers that it thought might be logged on. Each of those computers also had a list of computers they knew were logged on, so they would return that list to your Gnutella client. Once Gnutella found other logged on users, it would remember those addresses the next time you started the service—this way if one of the servers did go down for any reason (even copyright violation), it still had other alternatives. When you searched for a file on Gnutella, it would send the request down the chain of clients you were attached to, and clients attached to those clients, until it found a match.

In this way, the Gnutella network was completely distributed. There were no centralized servers, so there was nothing for copyright holders to seize when an infraction was suspected. Sure, they would seize your computer, since it was one of Gnutella’s servers. But there were millions of other servers out there just like you. And for this reason, the Gnutella network has never been (and likely never will be, as its effectively impossible) shutdown; it has only grown since its inception. Certain clients have legally been shutdown before, but since they are open source, they would simply reemerge a few days later.

 

Modern Distribution

The Gnutella network today is the most widely used peer-to-peer distribution network (aside from torrenting). Though illegality popularized these distribution systems, they are primarily used for legitimate transfers today, though obviously they do still house illegal content.

More importantly, however, the digital media revolution that Napster started, however controversial it was and is, finally forced the media sources to reevaluate demand for their products. Piracy initially caused CD sales to plummet and thus the music industry to lose money. But once key distributors like Apple, Amazon, and even eventually Napster again (purchased by Rhapsody and reintroduced legally for a fee) finally saw the demand that Napster enlightened them to, the music industry recovered (though they’d like you to believe they’re still limping along). Sure, CD sales have all but died, and some stores like Best Buy don’t even carry CDs, but digital sales have surpassed what CD sales used to be. The digital revolution also opened new possibilities. For instance, Pandora, offering you a digital streaming alternative to your radio.

But the demand for digital content didn’t stop at music. Companies like Netflix, Hulu, and Amazon Instant emerged. Products like the iPad and Kindle are hugely popular. And TV stations started streaming their content online. Even non-internet-based companies like Redbox were formed based on consumer’s desire for on demand content.

 

Now, I’m not condoning illegal activity. And downloading music or movies from LimeWire or The Pirate Bay is very bad, kids. But there is a lesson to be learned here. When the culture begins to change, and the culture realizes a new possibility that never existed to them before is now a reality, don’t resist it. The amount of money the record labels and RIAA put into legislation and litigation before they even consider changing with the culture to provide legal alternatives to services such as Napster far surpassed the money they were losing in records sales. When the culture advances, advance with it. That’s what technology is all about.

 

Unless the culture advances into a murdering machine. That should still be frowned upon.

Reagan.com Email is a Misguided Effort

I heard a commercial with the booming and illustrious voice of Rush Limbaugh. After I recovered from banging my head against my desk, I reflected on what was said in the commercial.

Rush pointed to the popular free email providers (Yahoo, Google, and others) to remind you that they scan your email. To remind you that they sell your email address, and other information about you, to the highest bidder. To remind you that the use of these free email addresses may increase your risk of spam mail. In contrast, purchasing an email address from Reagan.com provides you with private and secure email, and your information will never be sold.

I was intrigued.

I found that Rush was not the only conservative advertising this servic. Fox, CBS, and many others also endorsed it, though for slightly different political reasons; they primarily portrayed it as an email alternative “for conservatives”. They said that, unlike these free services, Reagan.com email would not have you unknowingly contributing to “the liberals”. These are hard-and-fast definitions, people.

Michael Reagan, founder of Reagan.com and son of, you guessed it, Ronald Reagan, has this to say about his service:

[…] every time you use your email from companies like Google, AOL, Yahoo, Hotmail, Apple and others, you are helping the liberals. These companies are, and will continue to be, huge supporters financially and with technology of those that are hurting our country.

Because apparently liberals are the only ones that are interested in using technology to advance our country. And apparently “the liberals” are the only people benefiting from these huge corporations. Obviously, they would never help “the conservatives”. Regardless, this is a relatively empty claim as its never actually substantiated.

Politics aside, allow me to explain to you from a technical perspective why the commercials endorsing Reagan.com and even the information on Reagan.com is largely misleading.

First, let’s address the script Rush was fed in his advertisement. It is well known and accepted that free email providers, along with many paying internet providers as well, will harvest and sell your information to advertising companies. It’s well known because these companies clearly state this in their Privacy Policies. The claim is that the Reagan email service, which costs you $40 per year, does not do this. However, if you read through the Privacy Policy for Reagan.com, it is true that Reagan.com says they will not collect your information, but they do allow their affiliates to collect your information.

We may also use one or more advertising network providers to help present advertisements or other content on this website. These advertising network providers use cookies, web beacons, or other technologies to serve you advertisements or content tailored to interests you have shown by browsing on this and other websites you have visited. Advertising network providers collect non-personally identifiable information such as your browser type, your operating system, web pages visited, time of visits, content viewed, ads viewed, and other click stream data.

The key phrases here are that their “advertising network providers” have the right to collect information about “content viewed”. I don’t know about you, but the content I primarily view while logged onto my email is … email.

The use of cookies, web beacons, or similar technologies by these advertising network providers is subject to their own privacy policies, not our privacy policy for this website or its Service.

Reagan.com uses the affiliate networkadvertising.org for their ads (why they show ads on a service they charge for is beyond me). Ironically, if you look through the list of partners of Network Advertising, four companies may quickly jump out at you: Microsoft (Hotmail), AOL, Yahoo, and Google. Just to name a few. Which means much of the same ad revenue that these companies may generate from your use of their free email services may still be generated for them through your use of Reagan.com.

This last point is key to highlighting the disconnect between the claim of the Reagan.com email service and the reality of the internet’s interconnectivity. This disconnect has also recently been highlighted with the controversial SOPA and PIPA bills passing through Congress. You have politicians proposing bills, or in this case making a buck using the influence of politics, on technical subjects in which they have little to no understanding.

If privacy is what you seek, you cannot use the internet, and you certainly cannot use email (unless it is isolated to an internal network). Even if a given email was secure and private while on the Reagan.com servers, any incoming and outgoing messages will go through a server at some point somewhere in the world that is likely owned, operated, or affiliated with one of the internet or server giants, including Google. Coincidentally, even if you had a Reagan.com email address and sent an email to yourself, the email would still go through one of these external servers before returning to you.

Next claim. Reagan.com is email for conservatives, right? So supposedly using Reagan.com will support a conservative agenda rather than a liberal agenda. Perhaps directly, and on the very surface, but indirectly (and about half an inch below the surface down to bedrock) no. As I said before, you can’t take something as intertwined and complex as the internet and expect to take the biggest internet giants out of it. Ironically, on the same site that Michael Reagan is falsely boasting that his service will get you away from those Big Brother liberal companies, he provides instructions for how to configure his email service to work on your mobile device. You know, the one made by Blackberry, Apple, or Motorola (owned by Google) running the Android OS (also owned by Google).

Let’s give Reagan the benefit of the doubt. Let’s assume he’s not trying to insinuate it’s Big Business we should distrust. Maybe he’s suggesting Google, Yahoo, and the like sell your information to the government, and that’s where the privacy risk comes in. This is half true … although they don’t sell it. And, again, Reagan.com won’t get you away from this. Even when using Reagan.com, as soon as the email leaves the Reagan.com servers, the United States government will have the opportunity to seize and view the email. They probably won’t, unless you’re a terrorist suspect, but they always have the right, no matter your provider, thanks to the Patriot Act. Heck, even on the Reagan.com servers the government has the right to seize it under this act.

There’s a phrase that somebody said once goes something like:

Is it really free if it costs you your privacy?

That’s up to you to decide, really. But if you believe internet companies are the only ones tracking personal information about your daily habits … well, let’s just say you should stop shopping at Target. Or Wal-Mart. Or Best Buy. Or really any major chain in America. Personally, I don’t think a corporation tracking your habits to better serve you with ads related to your interests is an invasion of your privacy.

The cost of Reagan’s supposedly private and secure email service is $40 per year. This service is rented from a man who has no technical expertise and is not a server administrator. His Terms of Service clearly and painfully guarantee you nothing in terms of support, up-time, warranty, or back-up. And if you’re expecting new features in the future … well, don’t hold your breath.

On the other hand, companies like Google and Yahoo have incentive to provide you with new features. They have incentive to guarantee you up-time, because every second their servers are down is ad revenue lost for them. They have dedicated support teams to ensure their servers are always running at peak health, and they have redundantly connected servers and farms, just in case.

Reagan’s servers go down? I’m sure they’ll get it back up eventually. But, you know, you’ve already paid them your $40, so they don’t lose money by the second when the service is down. And it is owned by a politician … so don’t expect a quick turnaround.

Using VirtualBox to Host a VPS

Oracle’s VM VirtualBox is a virtualization program that allows you to run another operating system from within your native operating system. Though it is most commonly used to run fully functional operating systems such as Linux or OS X from within Windows 7 (or vice versa), it can also be used to host a Virtual Private Server (VPS).

This post does nothing to compare benchmarks between more efficient (and recommended) VPS environments such as VMware or Linux-VServer, and I would not recommend using VirtualBox as a VPS in a production environment. However, it is useful in many situations, and I’ll let you be the judge of when this should or should not be done. It is certainly acceptable for personal and developmental purposes. And hosting a VPS through something like VirtualBox that is extremely simply to setup and use allows you to easily experiment with configurations and operating systems, or even jump between multiple VPSs on the same computer.

This tutorial assumes you have a rudimentary knowledge of server software and operating systems. I’m going to be explaining virtualization to you, not the details of the server installation and configuration.

 

Setting Up VirtualBox

First, some definitions. When I refer to the host operating system, that is the primary operating system that your computer boots into. When I refer to the guest operating system, that is the virtualized system that is run from within VirtualBox. There will also be references to IP address and ports on the host and guest. They follow the same theme. Now that we’ve got that of the way …

You can pick up VirtualBox for free from their website here. Download and run the installer for your host operating system. Congratulations. VirtualBox is now ready to run. Unfortunately, it doesn’t have a guest operating system installed or configured yet, so it doesn’t do much for you. But before we actually install one of those, let’s create a virtual environment for it and configure some VirtualBox settings.

In VirtualBox, click New to create an environment where we install a guest operating system. I’m assuming you’re a civilized human being and installing a Linux server operating system, so select Linux, then select the version of operating system you’re using. If the exact version isn’t in the VirtualBox list, select the parent Linux distribution (for instance, for CentOS you’d select Fedora).

Ideally, you should grant at least half of your host system’s memory to the guest operating system. You should dedicate at least 8GB to the guests hard drive space. Luckily, since this is a virtual environment, you can select to dynamically allocate this space, so the virtual hard drive will only consume space on your host’s hard drive as it is needed. Finish up the wizard, and the guest environment will be created.

Now, to make that guest environment accessible to our host computer. Right-click on the newly created environment and select “Settings”. Click on “Network” in the list on the left, and click on “Adapter 2”. Enable this adapter and, from “Attached to:” select “Bridged Adapter”. This will cause the guest environment to resolve DHCP IP information directly from the host operating system, which means we can now forward some host ports directly to the guest operating system.

Go back to the “Adapter 1” tab, make sure this adapter is “Attached to: NAT”, and click “Advanced”. Click on “Port Forwarding” and add a new TCP forward. Let’s call it “SSH”. Specify 22 for the host and guest ports. This will forward the host machines port 22 to the guest machines port 22—they don’t have to be the same, they just have to match other configurations on the host and guest side of things. It’s also worth adding an “HTTP” forward for port 80 as well as any other the forwards for ports controlling any other services you’d like accessible from the guest environment.

 

Server Operating System

If you haven’t already, now’s the time to choose what operating system you’re going to use for your guest environment. I recommend Ubuntu Server if you’re used to Ubuntu or Debian environments, and CentOS is another wildly popular one, though it’s not my cup of tea. Whatever operating system you choose, download the ISO for it’s installation and open up VirtualBox again.

Right-click on your guest environment and select “Settings”. From the list on the left select “Storage”, and point your virtual disc drive to the ISO you just downloaded. Once this is done, you can simply start the guest environment and it will boot with that disc “in the drive”, so you can install that operating system in the guest environment.

If you’re installing Ubuntu Server, selecting OpenSSH during the install process as well as LAMP and any other services you’d like available will make things much easier for you. However, as I said above, this tutorial assumes you have a rudimentary knowledge of server operating systems, so I’m not going to go into the details of installing those services. But to prove that our port forwards worked, you should at least install OpenSSH (during installation or as soon as you boot into the environment), and if you are able to SSH to your host computer on port 22 and access the guest environment, then everything worked the way it should have.

 

Launching Server When Computer is Booted

It may be useful to launch this virtual server when the computer boots. To do this, create a BAT file with the following command:

VBoxManage startvm “VM Name” –type headless

Place a shortcut to this BAT file in the Startup folder of a (or all) user accounts and you’re good to go. The server will launch and run in the background, allowing you to SSH into the server to control it from a terminal.

For maintenance purposes, you may also want to create a second BAT file for stopping the server (since it’s running in the background with no visible window). To do so, create a BAT file with the following command:

VBoxManage controlvm “VM Name” poweroff

 

Access from External IP

Login to your router and go the Port Forwarding section. Add a new port 22 forward, and forward that port to the IP address of the host. Do the same for port 80 and any other ports you added during the configuration above. Now, by typing in the external IP address of your network, you can SSH into the guest operating system through port 22, and you can utilize other services available to other ports.

There’s a lot more than can be done from here (using DNS to propagate to your external IP address, mail servers, etc.), but this tutorial has gotten you to the point where you can use tutorials for non-virtualized environments tutorials to accomplish those goals now. Good luck with your endeavors!

 

Ernie’s Adventure

What … Is This?

If you’re like my brother and me, you love old-timey computer games almost more than the latest and greatest shoot-em-up.  For as long as I can remember, my brother and I have loved playing classic puzzle games like King’s Quest, Commander Keen (yah, I realize that’s not really a puzzle game), and, later, games like the Myst games.

As such, after years of my brother and I writing our own useful programs, Andrew had a brilliant idea.  “Hey, why don’t we write an old-school adventure game with lousy DOS graphics?  You know, in the fashion of King’s Quest and the like?”

This was an idea through most of 2008, began development in 2009, and became what it is now sometime in 2010.  Obviously, we could have put effort into making these graphics cutting edge … but that would kind of defeat the purpose.  We intentionally made this game for nostalgic purposes.

The music is pure genius, I must say.  Any likenesses you may here throughout the game to other old-timey games you’ve played is purely coincidental.  Don’t sue us.

Alright, I Follow.  So Who’s Ernie?

Ernie was my dog.  I don’t say “was” because he’s dead or anything terrible like that−I say “was” because he now belongs to my brother.  I now have a new dog named Dante, and he and Ernie get along great.  But I digress.

When Andrew started developing The-Yet-To-Be-Named-Old-School-Game, he needed something to fashion it after, and he wanted it to be something he and I had in common, since we had the same affinity for such games.  Ernie must have been trotting by at the time, because he decided to make him the main character.  And thus development began.

Uh, I Didn’t Play Old-Timey Games.  What Do I Do?

Use the arrow keys to move the Ernie character around.  When you walk up to an object you’d like to do something with, type the action.  Then press enter.  Yes, type.  For instance, if you walk up to a shiny object on the ground, try typing the command “get key” and pressing enter.  Don’t know if it’s a keep?  Try the “look” command to see what’s around you.  Be specific.  If you see a person, type “look person”.

The key to these old game typing commands is verb noun.  So to talk (verb) to aperson (noun), you’d type “talk person”.  Don’t know the name of the person?  Type “look” and maybe the description will tell you the name of the person in the screen.

Type “inventory” to see a list of the items in your … you guessed it … inventory!

Oh, and as I said before, this was intentionally made as a DOS-style game.  That means your mouse won’t work at all.  If you’d like to access those menus at the top, press Alt and use the arrow keys to navigate.

The Nerd-Speech in This Post is Minimal.  Anything to Add?

Yah.  The game can also be run on Mac, if you’re interested, but the build isn’t as stable, and, frankly, I didn’t feel like dealing with getting it to that state.  Deal with it.  If you’d really like to see the game run on Mac, you’re more than welcome to brave the build yourself.  You can find it on Andrew’s code repository here.  Don’t say I didn’t warn use.  Seriously.  Not a pretty build.  And even if you do get it to build, I’ve only gotten it to run a few times, and it does crash from time to time.

And speaking of crashing, it may crash a bit on Windows Vista.  I don’t think we got all of the Vista bugs worked out because, well … it’s Vista.  Not worth our time.  But it worked consistently on Windows XP and Windows 7.  Anyway, you know, we offer this game with absolutely no guarantee or warranty.  And it should work just fine for you.  I promise.

Conclusion

If you’re a fan of the classics, or you just really like stalking the work I do, or you just want to take my old dog on a walking-tour of my parent’s house, it’s certainly worth a play through!

And, since a lot of the commands and scenarios on this game are very Laird-specific, I’ll leave comments and such enabled on this page so people can post and help each other out if absolutely necessary.

The End of an Era for NASA

STS-135: The Final (Shuttle) Launch

This morning marked the beginning of the end of an era.  I say the beginning of the end because the era does not conclusively close until next week, when the Space Shuttle Atlantis returns safely the Earth.

The beginning of the end happened at 11:29 A.M. EST as Atlantis’ rocket engines propelled the 4.5 million pound vehicle off the pad and, in eight and a half minutes, out of the Earth’s atmosphere, into space, and up to a speed of 17,320 mph.  (For the astute reader, you’ll note that this means it must be traveling at over 4.81 miles per second as it left the Earth’s atmosphere.)

Ominous weather taunted the launch of this shuttle all week, but all systems were a go this morning, and aside from a slight hold at T-minus 31 seconds (due to the GOX Vent Hood not registering with one of the sensors as fully retracted), Atlantis left the pad and disappeared into the heavy blanket of clouds above in less than forty seconds.

What you may not realize is that, at the time of the launch, according to NASA’s own protocol, the shuttle technically had the red light.  Yesterday, storms were furious around Cape Canaveral, and lightning even struck the ground twice just around the launch pad.  Luckily, there was no significant damage done to the pad or the surrounding area.  The weather, however, persisted.

NASA’s launch safety protocol dictates that precipitation cannot occur within twenty miles of the launch pad during a launch.  This morning, after all launch systems reported back “go”, the weather crew came back without a go.  It wasn’t a no-go, per se.  They just hadn’t reached a verdict yet.  This was at the T-minus 9 minute hold; it was definitely raining within the twenty mile radius.

Ultimately, Mike Leinbach, the Shuttle Launch Director, who gave the launch a go under the assumption that the weather would continue to move away from the launch pad before launch.  This was not a dangerous maneuver, as if weather hadn’t gone as predicted, the launch could have been scrubbed down to the thirty second mark.

The weather was so variable in fact, that Mike Moses, Launch Integration Manager, said in the post-launch press report that the decision to fill the External Fuel Tank (ET) this morning, a six hour process that costs $500,000 to undo, was settled over a game of darts. But the calls were made.  The delays, insignificant.  And after over 1,000 onboard systems were a “go”, STS-135, the final shuttle of its kind, launched safely from Pad 39A this morning.  But this is only the end of one era.  The end of the space shuttle era.  It seems Americans and the media have focused so intently on the ending of this era that they’re acting as though NASA is closing its doors for good.

Nearly one million people were present to watch Atlantis liftoff from the Kennedy Space Center this morning.  That doesn’t include the tens of millions of viewers watching the stream live from all around America and the world.  Certainly this was a momentous occasion—the conclusion of the near $200 billion dollar space shuttle program’s 30-year reign—but NASA has plans to return to space.  They just need a new vehicle to do it in.

The aged space shuttles weren’t originally built to optimal safety standards (you can thank the government for NASA budget cuts on that one), so they’re being retired.  Though the shuttles could continue to fly safely, NASA has brighter plans for the future.  My hope is that the one million people at Cape Canaveral chanting, “U-S-A … U-S-A” and “GO, GO, GO!”, as well as the cubicle-confined fans (like myself) shouting “Get ‘outta here!” from their desk chairs mourn only the conclusion of the shuttle generation, but not the death of NASA.

Eye on the Prize

The Space Shuttle Atlantis was hauling its crew and cargo to the International Space Station, a $100 billion dollar structure in a low-Earth orbit (about 220 miles out).  The Space Shuttle itself was designed primarily for this purpose even—a low-Earth orbit. But what about deep space exploration?  That’s exactly what NASA said.  Orion, the vehicle being built for the future of space travel, is being designed with manned deep exploration in mind.  It’s slated for a completion date of 2016, and it is expected to launch that same year assuming NASA gets a contractor to build a rocket for it and assuming that rocket is also completed by 2016. The Orion space capsule follows the primitive design of the Apollo spacecraft, but with much more of a vision.  Obviously, we’ve advanced quite a ways technologically since the Saturn V rockets boosted the Apollo capsule into space.  The aim for Orion is that she’ll have the reliability and safety the old Apollo spacecraft with the ingenuity and technology of the future.  She’s being built with the purpose of landing a man (or woman) on the surface of Mars.

But … Why Space?  It’s a Money Hog!

A money hog?  Because the space shuttle cost us nearly $2 billion each?  For the $450 million dollar price tag per mission?  Because the shuttle burns more than two million pounds of solid propellant in the two minutes after takeoff?  Because a satellite can cost upwards of $300 million to launch?

Sure, NASA is expensive.  We get it.  But can you name me a way to advance society that doesn’t cost a pretty penny?  You can debate it all you like, and you can argue that the budget for NASA is too large, or that the tax break NASA gets (that’s coming from your pocket) is too much, but the fact remains: NASA paved the way for your current way of life, and space exploration, especially through NASA, will mold the lives of our future generations.

Unfortunately, the advantage of space exploration is currently evading our current administration.  Yet in an economy continually teetering just above and below a 10% unemployment rate, I’d say the jobs created by subcontracted construction of rockets, satellites, space vehicles, space equipment, and research and development projects are nigh invaluable.

Lockheed Martin, the primary contractor for the Orion project, has published posters that boast, “Orion is being built near me!”  And, as a means of spreading out the love (and keeping the primary decision to scrap the project out of the hands of the government), they’ve spread the research, development, and construction work for Orion out over twenty-six separate contractors all over the country.  Not only are they stimulating jobs in the economy, but they’re also inspiring families and the job market alike with the excitement of being involved (directly or indirectly) in the future of the space age.

Don’t Care.  I Still Don’t Need NASA

Perhaps you’re still not convinced.  Maybe you still think you you don’t need NASA, and that NASA has done nothing to personally effect your life and loved ones.  Then I’ll leave you with these thoughts:  well over 1,700 technologies, many of which you use daily, were brought to you from the multi-billion dollar space program and NASA …

… The fibrous material in your tire tread.  Your home’s insulation.  Velcro.  Image processing (which gave you all the technology from a steady cam to image enhancement to HD movies to a personal video and still camera the size of your palm).  Prosthetics.  The GPS in your phone … not to mention the satellite that your phone, television, and possibly even your internet connection talk to … not to mention these satellites are now used to predict weather patterns, tornados, hurricanes, and more.  Health and safety equipment from ventricular devices to help your heart pump blood to more lightweight material that firefighters can wear when entering a burning building.  Cordless tools …

… and much, much more.

Thanks, NASA, for all the work you’ve done not just for our country, but for the entire world.  For inspiring my brother and I to investigate computers, technology, and spacecraft.  For the sense of camaraderie you gave Americans with each other, the rest of the world, and the universe this morning.  For the life changing technology you’ve given us.  Keep shedding more light on the infinite galaxies out there left to explore.

North American P-51 Mustang

One-hundred-seventeen days.  Almost four months.  What could you build in one-hundred-seventeen days?  Perhaps I should rephrase that: what could you build in one-hundred-seventeen days on a government contract? Certainly not an entire aircraft, from the ground up, from scratch-paper to rolling it out of the hanger?

But it has been done.  The North American P-51 Mustang was ordered just one-hundred-seventeen days before the first prototype was rolled out.  That’s an incredible achievement right there.  Before the aircraft even got off the ground, putting all of its air superiority aside, the entire plane was designed and put together in less than four months.  It was flying less than two months after that.

History

Why was the P-51 ordered you might ask? In the early 1940’s as World War II was ramping up, North American Aviation (NAA) realized we had no fighters that met the Royal Air Force’s (RAF) strict requirements, and we were in desperate need of an aircraft that could protect daytime bombing formations deep into Germany.  So in March of 1940, 320 new P-51 aircraft were commissioned by NAA.

It wasn’t until 1943 that enough P-51s were available to start doing some good.  Pilots found that the aircraft was an excellent long range escort fighter.  Finally, it was possible for the RAF to carry out their bombing missions at night, and the United States Army Air Force (USAAF) to carry out their bombing missions in the day time with P-51 escort.

As the war wrapped up, jet powered aircraft started to develop.  While many of the earlier aircraft in the Allied fleet couldn’t compete against the faster jet aircraft, the P-51 could.  This allowed the P-51 to be picked as the top piston powered aircraft during the end of the war.

The USAAF consolidated much of its P-51 fleet after the end of the war.  A few upgrades were made to the plane through the 1950’s and the fighter lasted much longer than other piston powered fighter planes.  While much of the world was looking to jet powered fighters, the P-51 continued to have a role even into the 1960’s.  Finally, the last two military P-51s flew in 1968 as chase planes for a military helicopter.  The last P-51 that was downed in military combat flew in 1965.

The P-51 played a vital role in winning Wold War II.

Record

By May of 1945 the top three P-51 groups had shot down 4,950 aircraft; this amounted to half of the USAAF total kills in the entire European theater.  Keep in mind that was only the top three groups, and if you break that down by day, it amounts to over 6.75 kills per day.

The two top scoring aerial combat groups (which exclusively flew P-51s) had 1,229 kills just between the two of them.  During the European campaign, the RAF and USAAF used the P-51 in 123,873 sorties.

Weapons

Machine guns were the dogfighting weapon in World War II.  The P-51 had four 0.30 inch M1919 Browning machine guns and two 0.50 inch M2 Browning machine guns in its wings.  Two more 0.50 inch M2 Browning machine guns were mounted under the engine of the aircraft and were synchronized to fire between the propeller as it rotated.  This technology was developed in WWI and was known as gun synchronization gear.

The P-51 was capable of carrying ten 5 inch long rockets that were mounted under the wings similar to today’s missiles.  It could also carry 2,000 pounds of bombs under the wings in place of the rockets.  On long range missions the later models could replace the weapons with external fuel tanks to extend their range by 300 miles.

Specifications

The P-51 Mustang was a top of the line machine for its time.  Powered by the Merlin V-1650 engine, the first models boasted a top speed of 437 mph, which could keep up with the earliest jet powered aircraft.  The final model, the P-51H, could hit 490 mph.  The P-51 would cruise at around 275 mph and at about 41,900 feet.  Its range was over 1000 miles.  When the P-51D was introduced an additional 300 miles were gained with drop tanks on the wings.

How much did a P-51 cost?  In 1945 the government paid $50,985 for each aircraft.  Converting that to 2011 dollars it would cost around $628,000 to buy a P-51.  After the war, the government sold many of their P-51s for civilian use, some for as little as $1,500.

A total of 16,766 P-51 Mustangs were built.  Many of them were sold to other Allied countries.  It was thought of as the top long range escort fighter of its time.  Many still fly today in homage of the original lead fighter of the USAAF.

Sightings

Sadly, it’s not likely that you’ll be out drinking lemonade on your porch one day and see a formation of P-51s flying over anymore.  You will mostly likely have to go to a museum or an airshow to see one.

There has been a trend over the past few years to do “heritage” flights at airshows with a WWII era plane flying along side one of today’s modern fighters.  Many times the P-51 is chosen for this task.  If you’ve been to a recent airshow and seen one of these “heritage” flights, then it’s possible you’ve seen a P-51.

It’s even harder to see a P-51 in the movies.  There was only one movie made that centers around the P-51 and that was a 1957 film called Battle Hymn.  There are a handful of other movies that you catch glimpses of P-51s: Empire of the Sun, Saving Private Ryan, Memphis Belle, and The Tuskegee Airmen all have a few scenes with P-51s flying.

If you get a chance, head over to an airshow and catch a glimpse of the one of the finest WWII era fighters built.  It will be a trip worth taking.

If you don’t get a chance, buy your own P-51 Mustang model or remote control plane from Amazon! Just follow the links below:

Andrew Laird (usually referred to as “The Brother”) is the sibling of Alex Laird. He shares the same love for airplanes as Alex does and is the guest author of this post.

McDonnel Douglas F/A-18 Hornet

The Fighter/Attack series is one most people are familiar with, and probably the most well-know set of aircraft the Unites States Navy and Air Force produce.  Unfortunately, the understood distinctions between each aircraft are not that well known.  Most commonly, all fighter aircraft are referred to as an F-16.  If you don’t believe me, just look up a few YouTube videos; you’ll be able to see variances in the details of the aircraft, but most of the videos are  will call the aircraft an F-16 … it’s sad, really.

But I digress.

Let’s talk about the second most awesome plane in the Fighter/Attack series (the most awesome being the Lockheed Martin F-22 Raptor, but this aircraft, unfortunately, will not be at the Quad City Air Show): the F/A-18.  And, just to make things interesting, let’s Tarantino this post and get to the interesting stuff first!

 

Where You’ve Seen It

If you recall, the Fat Albert of the Blue Angels was a C-130.  Well, the most recent bread of Blue Angels themselves happen to fly F/A-18 Hornets.  That’s where this post comes in as relating to the Quad City Air Show—not only will their be ground displays of a standard F/A-18, but the Blue Angels will put on a show flying their F/A-18s as well.

The media?  F/A-18s have made appearances in the following popular Hollywood movies: Godzilla (I’d say the scene is obvious enough), The Rock as they attack Alcatraz, Independence Day (the aircraft that Will Smith is shown flying), Clear and Present Danger where an F/A-18 is shown dropping a laser-guided bomb on a vehicle, Tears of the Sun in the final battle, and the F/A-18 Super Hornet, a two-seat variant of the F/A-18 Hornet stars, in Behind Enemy Lines.

Think you saw the F/A-18 in Transformers?  You’d be right!  The Transformers Decepticon, Starscream, morphs into an F-22 Raptor, and flying through the city (when Starscream smashes them down) are also F-22s.  However, the fighters shown lifting off the carrier part-way through the movie are Hornets, and I actually know the pilot who was flying the F/A-18 shown taking off from the carrier!

Ever seen that video of a fighter jet flying and safely landing after losing a wing?  That’s an F/A-18.  The Hornet was the first aircraft of its kind to have the unique ability to be able to safely fly with up to 80% of a wing removed, thanks to some amazing thrust-control software developed by … you guessed it, Rockwell Collins.  I’m not 100% certain, but I believe that functionality has also been implemented in the F-22 Raptor.

Finally, the F/A-18 is one of the most common fighter jets you see at an airshow, next to the F-16 Fighting Falcon and the F-15 Eagle, so it’s likely that if you’ve been to an air show or two, you’ve probably seen the Hornet or a variation thereof.

 

Specifications

The F/A-18 is powered by two massive power plants mounted on its rear.  The power plants are each F404-GE-402 afterburning engines, capable of thrusting over 18,000 pounds.The weight of the F/A-18 at takeoff is 22,000 pounds.  The thrust-to-weight ratio is nearly 1-to-1, which lends to the aircraft’s amazing maneuverability.

The fighter can hold over 11,000 pounds of fuel in its internal tank and nearly 7,000 pounds in its external fuel tank.  On takeoff, the aircraft will be loaded with different amounts of fuel depending on its roll during flight.  For instance, if it is performing an attack mission, the external fuel tank will not be filled.  However, if is performing a longer-range attack mission, the external fuel tank will be filled, and the plane may weigh up to 52,000 pounds on takeoff.

The Hornet is 56 feet in length, only 15 feet in height, and has a wingspan of 40 feet—again, its very close length-to-width ratio lends to amazing maneuverability during combat.  When loaded with fuel and missiles, the fighter can fly just over 1,000 miles non-stop.

It’s hard to talk about a fighter jet without touching its speeds.  You ready for this?  The F/A-18 has a top speed of mach 1.8—that’s 1,370 mph.  That’s less than two hours to fly coast-to-coast in the United States at its widest point (excluding Alaska, of course).

 

On the Carrier

And while we’re on the subject of dimensions and speed, we should probably talk about the planes use on aircraft carriers, since it was designed with that storage in mind.  Certain later F/A-18 models (E and F) have collapsible wings for better storage on an aircraft carrier, but the standard models (A-D) do not.  This isn’t a huge issue, however, since their wingspan is only 40 feet.  Carriers range in size, but depending on the mixture of aircraft its holding and whether they have collapsible wings or not, a carrier can usually hold anywhere from 85 to 140 fighter planes.

Fighter jets, though extremely powerful, do not have enough thrust to get their aircraft up to liftoff speed before the end of the very short carrier runway, usually around 300 yards or less.  By comparison, United States air regulations require commercial landing strips to be a minimum of 4,033 yards.  So you can see that the fighters are working with a lot less runway here.  So how do they get up to speed?  Four continuous catapults.

A plane cannot lift off the ground until the proper amount of air is moving over the wings to generate lift.  The amount of air needed to generate lift depends on the weight and dimensions of the aircraft, but the catapults on an aircraft carrier, which are entirely steam driven, help lung fighters up to their necessary speed (about 170 mph) before the end of the runway.  It takes that catapults only two seconds to do this.  Usually, they planes don’t quite make it to their necessary speed, which is why you’ll see the heavier fighter jets dip toward the sea just after takeoff of an aircraft carrier.  But don’t worry.  There’s still 240 feet between the flight deck and the thrashing sea, which is plenty of room for the plane to gather the necessary airspeed to gain altitude.

Of course, all of this is just for takeoff.  How does a plane land on such a short runway?  Oh, and you know how a flight deck may be up to 300 yards long for takeoff?  Landing planes come in at a different angle, and they usually only have about 166 yards.  When they lower their landing gear, they also lower a tail hook.  The tail hook is just what it sounds like—a hook that protrudes down from the fighter jet and grabs the arresting wires that are stretched across the carrier’s landing deck.  These wires are pulled tight and screech the aircraft to a halt on the flight deck.

But what if the pilot misses the wires?  Landing on an aircraft carrier is one of the most difficult things a fighter pilot may ever do, so there’s a good chance he may miss the wires.  This means he has to immediately takeoff, fly a loop, and try landing again.  This also means that fighters land on an aircraft carrier at a very high rate of speed compared to a normal runway.  Which also means that as soon as the pilot hits the flight deck, rather than pulling his engines back or slamming on the breaks, he throws the engines to full throttle.  Why?  Because the moment he is signaled that he missed the arresting wires, he needs to be above his 180 mph to take off the other end of the carrier again.  When an aircraft misses the arrest wire, it is known as a “bolter”.  The landing deck of an aircraft carrier is slanting upward at a 14 degree angle from the rest of the aircraft so it can assist bolters in quickly getting back up to a safe altitude after missing the arresting wires.

 

Armaments

Unfortunately, the F/A-18 has no weapon systems … I’m just kidding.  But seriously.  The Hornet comes equipped with a nose-mounted 20 mm M61 Vulcan gatling gun that houses nearly 600 rounds.

The F/A-18 can hold up to nine missiles: two on the wingtips, four under the wing, and three under the external fuel tank.  If you see an equipped F/A-18, it may be carrying Hydra 70 or Zuni rockets, or it may be equipped with AIM-9, AIM-132, IRIS-T, or AIM-120, AIM-7 or AIM-120 air-to-air missiles.  There are also five types of air-to-surface heat-seeking missiles that the Hornet may be carrying, or a few AGM-84 Harpoon anti-ship missile.

You think that’s all?  Of course not.  The Hornet can also be used as a bomber.  The F/A-18 can carry up to eight different types of bombs, including Paveway laser-guided bombs, cluster bombs, JDAM precision-guided bombs, B61/Mk57 nuclear bombs, and more.

 

History and Cost

Boy, after starting with all the cool stuff, the history of the aircraft seems kinda bland, doesn’t it?  If you answered “yes” to that, I question why you’re even reading blogs about airplanes … after all, without aircraft history, we wouldn’t be making bigger, better, faster, and more agile aircraft every decade.

McDonnell Douglas developed the F/A-18 Hornet after gaining the contract from the United States Navy’s Naval Fighter-Attack Experimental program.  The goal of this program was simple:  create an agile aircraft that could replace the Skyhawk, Corsair II, and Phantom II, performing better in every respect than its fighter-series predecessors.  Both the Navy and the Air Force needed a short-takeoff aircraft that was versatile enough to be used on a land-based air base or stored on and launched from an aircraft carrier.

The Navy proposed a design for the aircraft that illustrated a single-man aircraft that could be easily used for bombing and could then defend itself from attacks while it returned to Home Base.  The F/A-18 certainly meets that goal with its superior dog-fighting capabilities, and it proved this ability in Operation Desert Storm, when one aircraft would dog-fight its way to its target, bomb the area, and return to base without a scratch.

The F/A-18 was first tested in 1978 and entered the service in 1983.  The F/A-18 Super Hornet, a two-seater variant of the Hornet developed by Boeing, was introduced in the early 1990s after the Navy retired the F-14 Tomcat, A-6 Intruder, and EA-6 Prowler all at once … without first considering an alternative (oops).

A single F/A-18 Hornet costs just under $40 million.  The F/A-18 Super Hornet costs nearly $60 million.  The fleet size of the F/A-18 family is nearly 3,000 aircraft.

Finally, let’s talk about the cockpit of the aircraft.  Like previous military aircraft I’ve covered, the radio communications and control panel were developed by none other than Rockwell Collins (though, again, we never get credit for this on any of the Wikipedia pages).  Last, but certainly not least, in the late 1990s, Rockwell Collins developed a technology that would automatically adjust engine thrusts in the case of a serious malfunction of aircraft damage.  Originally, the functionality was intended to provide a safe landing for a fighter aircraft if it lost up to 60% of its wing, but the final program allows the F/A-18 to lose up to 80% of one wing and land safely!  Now that’s impressive for an aircraft that may weigh up to 51,000 pounds when filled.

Oh, and here’s a fun fact: though you may think of the F/A-18 as a “heavy” aircraft due to its many pounds by comparison to, say, you’re car, it’s actually classified as a light-weight fighter.  In fact, when the Navy bid the program in the first place, a light-weight fighter was one of their requirements.

Think the F/A-18 Hornet is one of McDonnel Douglas’ finest creations? Buy your own model or remote control version by following the Amazon links below:

Or, if you’re really ambitious, save up a bit for an even bigger scale model:

Boeing AH-64 Apache

Has there ever been a moment in your life in which you’ve seen something and your thought has been, “This is it … I’m about to die.”  Perhaps you’ve been out hiking and you’ve seen some form of wildlife.  Maybe it’s been when you stood on the edge of a massive cliff (I felt this way when I went to the Grand Canyon).  If you’re like Jess, it’s probably been when you’ve seen a spider.

But I don’t think anything could really prepare you for a real life confrontation with today’s aircraft: the Boeing AH-64 Apache helicopter.

 

 

The Lockheed AH-56 Cheyenne

Think of the Cheyenne as the Apache’s older, fatter brother that ended up being a major disappointment, dropping out of college after the first month.  When hope in the family business was lost with Big Brother Cheyenne, the parents turned to Boeing to save the day with brother Apache.

In 1966, the United States Army was in the market for a jet-assisted attack helicopter that, as a secondary goal beyond defensive escorts, could also dash ahead (up to 244mph) for an offensive front.  Lockheed’s AH-56 was meant to be that helicopter.  Unfortunately, after exceeding the budget, the weight, procuring too many technical difficulties for the Army’s taste, and more than one fatality during test flights, the Army cancelled their contract with Lockheed.  Ten Cheyenne helicopters were completed during production—only four survived testing, three of which are on display at various museums.

 

The Apache Concept

Unfortunately, the Army still needed a jet-assisted helicopter for armored air transportation.  Solutions had been found to many of the technical difficulties the Cheyenne had experienced, but the program was already so over budget that Lockheed was not given the chance to embrace the fixes themselves.  In a new bid, Boeing won production rights to a dual-engine attack helicopter; the dual engines resolved most of the stability issues the Cheyenne had.  A more compact design (due partially in part to the dual engines) led to a lighter aircraft, which fulfilled the Army’s maximum weight requirements.

What the Army really wanted was an aircraft like British Aerospace’s Harrier Jump Jet.  Unfortunately, the Key West Agreement denies the Army the rights to own or produce its own fixed-wing aircraft.  This may seem like a strange policy for a division of the Department of Defense to agree to, but it essentially separates the various types of aircraft owned by each division of the United States Military.  The Air Force controls most of the fixed-wing aircraft, the National Guard and the Army own primarily helicopters, etc; it helps maintain division of roles.  Anyway, their solution to a Harrier-like aircraft without mounting wings was a jet-assisted helicopter.

 

The Production and The Cost

In 1976, four years after the Cheyenne program was cancelled, the concept for the AH-64 was approved.  Two more units were produced, surpassing the Army’s desires for the aircraft, and in 1982, the AH-64 was approved for full production.

The initial production model was known as the AH-64A, a unit that cost $20 million to produce.  In March of 1997, an upgraded version of the AH-64 was developed and called the AH-64D.  This model featured improved sensory systems and enemy detection, superior armor plating, and a safer glass cockpit.  With the improved sensory systems on the AH-64D comes the dome you see on the very top of some of the aircraft.  This dome features advanced targeting technology and radar for targeting.  The dome is elevated so far above the rest of the aircraft so the aircraft can be hiding behind a hill, but the radar targeting system can still lock onto an enemy and fire.

The unit cost of an AH-64D Apache today is about $18 million.  At this time, nearly all AH-64As in existence have been upgraded to AH-64Ds.  To this day, over 1,100 Apache attack helicopters have been developed and are used in action.

One cost the AH-64 Apache did not incur that the Cheyenne did was fatalities in testing.  From the beginning, the Apache helicopter was always a much more stable and controlled design.

 

The Presence and The Sightings

You’ll know when you see the AH-64 Apache.  Most likely because you’ll suddenly find that your pants have been soiled and your legs are shaking involuntarily.  Don’t believe me?  After the AH-64As huge success in non-confrontational combat, the AH-64D was developed with a primary goal of taking advantage of the Apache’s terrifying facade and making it that much more so.  During the Gulf War, only five years after the public release of the new attack helicopter, three Apache helicopters were deployed on a particular mission to help eradicate Iraqi troops.  The moment the Apache helicopters arrived, as they rose over the horizon and came into the enemy troops’ vision, 10,000 Iraqi troops threw down their weapons, fell to their knees, and lifted their arms in surrender; the helicopters never fired a single shot.  Since only two crew members reside in each Apache helicopter, that means six soldiers successfully overthrew 10,000 hostile troops.

Other ways to identify it are by its unusual length for a helicopter—or the fact that it’s a helicopter with twin jet engines, one mounted on either side.  The Apache measures 58 feet in length, 16 feet in height, and has a 17 ft. “wing” span.  The diameter of the rotors is 48 feet, making the rotor disc area 1,809 sq. ft.  When loaded with an average capacity, the Apache weighs a little over 15,000 pounds.  They can have up to two fuel tanks—one internal, one external— totaling over 8,000 pounds of fuel on takeoff.  However, if the AH-64 is on a short-range attack mission, the external fuel tank can be swapped out for 16 Hellfire air-to-surface missiles or 76 70 mm rocket pods.

Which reminds me, an attack helicopter wouldn’t be very complete without its armaments.  Boeing’s AH-64 is always equipped with one 30 mm chain cannon, which may host up to 1,200 rounds.  Though this helicopter has no bombing capabilities, it can have any combination of the following air-to-surface missiles: AGM-114 Hellfire, AGM-122 Sidearm, or BGM-71 TOW.  If an Apache confronts you, it may also be loaded with AIM-9 Sidewinder or AIM-92 Stinger air-to-air heat-seeking missiles.  Finally, the AH-64 Apache can also carry 70 mm rocket pods, as mentioned above, as well as 127 mm rockets.

Other than seeing an Apache attack helicopter at an air show, you may have seen a few make an appearance in the movie Fire Birds, a 1990 film starring Nicolas Cage as an Apache pilot.  Transformers fan?  The “Spinster” Transformer character morphs into an Apache attack helicopter.  The AH-64 also makes appearances in the 1991 movie Toy Soldiers.

Think the AH-64 is the sweetest helicopter around (like me)? Buy your own model or remote control version by following the Amazon links below:

Lockheed C-130 Hercules

My brother and I have always had an obsession with airplanes, spacecraft, and NASA that borders on the unhealthy.  Our obsessive endeavors have taken us annually to the Quad City Air Show, where we have drooled at our magnificent dreams hovering just before our eyes.

This year’s edition of the Quad City Air Show is just around the corner—June 18-19.  And as a tribute to those momentous dates, I have decided to release a special on each of the aircraft that will (cross your fingers) be present or performing at the Quad City Air Show this year.  Today’s installment is the Lockheed C-130 Hercules, an enormous transport aircraft built for the United States Air Force during the Korean War.

 

The Bid

In the post-World War II era, The Korean War shed light on the fact that the current military transport aircraft were simply insufficient; their advancements simply hadn’t kept up with the aircraft and crew they were transporting.  So in 1951, the United States Air Force put out a new General Operation Requirement for leading manufacturers to bid on.

The aircraft needed to be able to host any of the following: 92 passengers, 72 combat troops, or 64 paratroopers.  It also needed five crew members to be operable.  It had a requirement to be able house cargo in excess of 400 sq. ft.  And it would be the first transport aircraft to host a rear-entry ramp—a ramp big enough to fit even the biggest military vehicles—a ramp that could be used for air drops.

In the running for the bid were the usual big-name airliners: Boeing, Douglas, Fairchild, Lockheed, and Northrop, just to name a few.  Lockheed won the design bid and, ultimately, the contract to develop the plane, with their 130-page proposal for a quad-turboprop beast designed specifically for heavy cargo, long-range transportation, short-strip takeoffs from unprepared runways, and the amazing ability to still maintain altitude with one engine down.

After being awarded the winning bid, but before signing the paperwork to accept the contract, a Lockheed engineer remarked to the project leads, “If you sign that letter, you will destroy the Lockheed Company.”  The program was seen as a trivial pursuit for the Lockheed Company as the C-130 would be a defenseless transport aircraft and Lockheed was known for its more combatant pursuits.  Even still, the contract was signed, and Lockheed promptly put 2,000 more units of its prototype into production.

Because I’m a fan of shameless plugs, though Lockheed was the primary contractor on the aircraft and built most of the visible components, the Heads Up Display (HUD), which is the majority of the control panel and radio communications within the cockpit of the aircraft, was developed by Rockwell Collins.

 

The Crew and The Payload

The original C-130, as there have been many editions of the aircraft since then, required five crew members for flight operations: two pilots, one navigator, one flight engineer, and one loadmaster.  The modern C-130 only requires three crew members.

The maximum possible weight of the C-130 is 42,000 pounds.  An average payload during its lifetime is 36,000 pounds.  The cargo of a C-130 may simply consist of palettes full of military or civilian supplies, or it may be carrying vehicles.  For example, its cargo bay could carry up to three Humvees, or two M113 tanks (it could probably carry more space-wise, but each of these tanks weighs in at about 12 tons).

Though the standard C-130 Hercules was bid primarily as a non-combatant cargo aircraft, it has been practically used for offensive attacks by means of its payload ramp.  For instance, a low-altitude flyover with the payload ramp let out can easily lend to the dropping of an M551, a “light” tank (weighing in at 15 tons) designed with an air-drop in mind.  The Hercules has also been used on some occasions to drop “daisy clutter” bombs from its easily accessible payload.

 

The Power

The C-130 can be the host of 21 tons of cargo.  It can drop a 15-ton tank directly out of its payload.  It can hold enough fuel for not only itself, but also for an aircraft it may be meeting to refuel.  And under this stress, how does the Hercules itself fair?  Quite well, actually.

With an average payload weight, the Hercules can still travel just over 1,200 nautical miles.  That’s nearly halfway across the United States.  On the one hand, that may not seem very far considering it’s a cargo aircraft.  On the other hand, it can make that trip in only a little over three hours, and it does it while carrying 21 tons of cargo, not including its own weight, which is itself nearly 38 tons.  Think about that.  That means that, at takeoff, the plain is lifting 77 tons, or 155,000 pounds, off the ground.  To put that into perspective, the United States Department of Transportation does not allow a semi to weigh more than 40 tons.  And the C-130 is doing nearly twice that.  In the air.

The maximum speed of a fully loaded C-130 is 345-417mph, depending on the model.  The aircraft has a 132 ft. wingspan, is 97 feet long, and stands nearly four stories (38 feet) high.  The plane’s ceiling is safely at 28,000 feet, and the aircraft requires 3,290 feet of runway to takeoff and an absolute minimum of 1,500 feet to land.  Carrying an average load, the plane can slow to the surprising speed of 115mph before stalling.

 

The Cost

It’s really the reason you’ve been reading this long, isn’t it?  You want to know what a plane like this costs.  It depends on the model built.  The C-130E cost $11.9 million to build, the H-series cost $30.1 million, and the C-130J costs $48.5 million, to name a few.   Of all types, a total of 2,300 C-130s have been produced.  If you’re like me, you’ll want to know what the cost of the entire fleet is.  Unfortunately, there’s no simple calculation of these numbers that will lend to an accurate portrayal of that cost.  Economic variances since the C-130 was first developed will lend to errors in this calculation.  So we’ll just have to be satisfied to know that the biggest, most powerful, and most expensive C-130J costs something close to $50 million per unit.

 

The Sightings

Ever been to an air show?  More than one?  Then you’ve probably seen the Blue Angels and their chubby companion, Fat Albert.  Fat Albert is probably one of the most well-known C-130s, and he’s known most for his weight.  At nearly every show, he lifts off using Jet-engine Assisted TakeOff, or JATO, to help him lift his overweight body off the ground.

The Lockheed C-130 Hercules is also seen in the movies The Green Berets (John Wayne fans?) and The Perfect Storm.  In fact, the footage shown in The Perfect Storm is actually real life footage of National Guard HC-130P refueling a distressed HH-60 helicopter.  And, of course, the plane that takes out that ugly scorpion at the beginning of Transformers was an AC-130, the combatant relative to the C-130.

If you live near an Air Force base, you’ve likely seen one of these freighters lifting into the sky.  They’re easily identified by their immense presence, four five/six-blade propellers, elongated underbelly, huge tail fin, wings along the top of the plane (rather than through the mid-section), and slow maneuvering.  As far as size goes, the Hercules is single most impressive aircraft in the world (save the Boeing C-17 of course).

The Question Project

Music, as defined by Webster, is “the science or art of ordering tones or sounds in succession, in combination, and in temporal relationships to produce a composition having unity and continuity.” This has come to be the generally accepted definition of music. However, Webster also defines music as, “An agreeable sound.” Sound, by its second definition, is “the sensation perceived by the sense of hearing.” To hear is to “Perceive or apprehend by ear,” or to “Gain knowledge by hearing.” Hearing is defined as, “The process, function, or power of perceiving sound.” The definition seems a bit circular when you look at it, but essentially music is what your ear perceives as a pleasant sound.

In a post modern sort of way, The Question of Music, Meaning, and Life Project aims to provide the listener with a deep, philosophical sound, or lack-thereof, with which they can meditate on the deeper philosophical questions of life.

Get It!

It is imperative that you read the description of each track to fully understand and appreciate each song on the album.

  1. White Noise – 2:15
  2. The Hows and Whys of What Led to Us – 3:31
  3. Greenpeace – 2:51
  4. I Made the Tree Fall in the Forest – 2:39
  5. Song of the Deaf – 5:24
  6. I’m the Reason Your Nose is Itching – 4:17
  7. The Female Mind – 10:14
  8. We Miss You, Pluto – 4:59
  9. Triangle Sandwiches Taste Better Than Square Ones – 3:03
  10. The Ultimate Answer to Life, the Universe, and Everything – 0:42
  11. What Was the Best thing Before Sliced Bread? – 4:22
  12. Dark Matter – 3:54
  13. Male Thought Patterns – 0:01
  14. Untitled – 3:13
  15. [Hidden Track] – 10:50

Thank you for your support!

The Tracks

White Noise – 2:15

Potentially one of the most controversial tracks on the album, White Noise refuses to live up to its name. The complete lack of artificial noise of any kind renders the possibility of white noise on the track impossible.

Critics have argued that this track is not really worthy of the name White Noise, but the song was written deliberately to shatter the preconceptions of the avid listener. Alone, they will be sitting in their room, ready to hear a track full of White Noise, and they will be completely flabbergasted at the notion that there is no white noise on this track!

Indeed, it seems that the sibling track to White Noise would have to be [Hidden Track], the only track on the entire album which actually articulates some sort of waveform. [Hidden Track] portrays the components that White Noise is lacking, but the average listener will never hear it.

Back to top

The Hows and Whys of What Led to Us – 3:31

In each relationship there is a beginning and an end. The beginning is beautiful, the end is painful and there are peaks and falls all throughout. It is impossible for those who once loved each other to articulate, once the relationship has ended, exactly what drew them to their former partner in the first place. Hurt feelings, raw emotions and healing hearts require just one thing:

Silence.

Back to top

Greenpeace – 2:51

Green.

Peace.

Back to top

I Made the Tree Fall in the Forest – 2:39

This is no laughing matter. If a tree falls in the forest, and there is no one there to hear it, does it make a sound?

Presumably no, by the definition of sound. For a sound is the vibration of matter as perceived by hearing. If there is no one there to hear it, no sound can be made, because hearing is part of the definition of a sound. However, hearing is not only done by humans. Hearing is done by animals and all other creatures of creation as well. The chances of there being absolutely nothing around to apprehend the noise vibrations is extremely unlikely.

However the question does suggest that there is no one present to hear it. Since the definition of hearing is circular, perceiving sound through the ear, we can be most certain that a sound is not actually made by the tree falling in the forest with no one around to heart it.

This track was written in loving memory of the numerous trees who have given their lives to prove this point.

Back to top

Song of the Deaf – 5:24

Many people misunderstand this track, assuming it’s silent because deaf people can’t talk. What these people fail to realize is that deaf people actually may be able to talk, they just certainly can’t hear. Dumb people, or their more appeasing title of mute people, are the ones who are unable to speak.

This track is meant to speak directly to deaf people, moving their very soul. Written and performed with the utmost concern for them, this track shows empathy towards them, understanding their inability to hear by intentionally giving them nothing to hear at all. Rather than smacking them in the face with audible sounds and vibrations as if to say, “Ha! You can’t hear this!” the artist chooses to recognize them and give them what they can hear.

Silence.

Back to top

I’m the Reason Your Nose is Itching – 4:17

There’s the old urban legend that if your nose is itching, someone is thinking about you. Is your nose itching right now? It should be. But have you ever stopped to think about the screaming silence of an itch? An itch invokes the sense of feeling and, if from an open sore, potentially even the sense of smelling. It’s likely one could look at the area in need of scratching, by crossing your eyes in the case of your nose, and you could even lick an itch, if you really wanted to. But there’s absolutely no way to hear an itch.

Think about it. It’s an emotional attachment to the one who loves you; an understanding simply through the sense of feeling, but they aren’t even present to be touching you. It takes a true, deep love to be able to affect someone so deeply through the senses without even being present.

This track is a dedication to that love; a silent love that can only be understood by the one who’s nose is itching, silently.

Back to top

The Female Mind – 10:14

The complexity of the female mind cannot be explained with words, sounds, or anything rational. It is obvious that women don’t understand the ways their minds work just as much as (if not more than) the males who try to understand them. “If not more than” is specifically stated not because of a superior intellect in the male gender, but because males simply don’t care to understand the female mind, therefore they give up trying. When they give up on understanding, they understand as much as they understood at the point of giving up, and they do not lose any understand beyond that point because they simply refuse to think about it. However, in the female’s persistence to continue to understand her own mind, she is, in actuality, lessening her own knowledge of her own mind due to the frustrations encountered in realizing more and more how impossible it is to understand herself, thus lowering her own knowledge of herself and other female minds.

The artist doesn’t even attempt to understand the female mind; he simply goes on about it in silence for the entirety of this song, which is probably the way such matters should always be approached.

Back to top

We Miss You, Pluto – 4:59

Poor Pluto has been the victim of much criticism, simply due to its small stature. Pluto was discovered and considered a planet up until the year 2006, at which point so much controversy was stirred over the planet that scientists finally created an entirely new subset of planets known as dwarf planets. Officially, Pluto was placed in this category, but we still think of Pluto as a planet.

By far the most saddening and even disturbing fact of all this is that people seem to be forgetting that planets have feelings too. Calling Pluto a dwarf planet may permanently damage its self image! Did anyone ever stop to think about that?

So, Pluto, here’s to you … A moment of silence in commemoration of when you were a planet. We still think of you as a planet.

Back to top

Triangle Sandwiches Taste Better Than Square Ones – 3:03

The mindset that all sandwiches are created equal is a fallacy of life that far too many people are sucked into.

You say that a sandwich is a sandwich, no matter which way it is cut, but that is simply untrue. For, in fact, the taste of a sandwich may be perceived by one as better if it is cut differently. One of the definitions of taste being “to appreciate or enjoy,” one may appreciate or enjoy a sandwich more if it is cut triangularly, thus rending the sandwich a better tasting one than had it been cut squarely.

In fact, this is most commonly the case, as numerous accounts of triangularly cut sandwiches tasting better then squarely cut ones have emerged all over the globe. While it may be a matter of your taste as to whether or not the triangle sandwich is better or not, it is more likely that you simply are one of those who wishes to go against the trends of everyone, therefore your mind is refusing to allow you to enjoy the superior taste of the triangularly cut sandwich. We pray for you.

This track is dedicated to all the triangle sandwiches that are eaten by people who refuse to admit they taste better. Don’t worry, Sandwich. You do.

Back to top

The Ultimate Answer to Life, the Universe, and Everything – 0:42

The track doesn’t lie. It does, in fact, hold the answer to life, the Universe, and everything within it, though the amateur listener may not notice. (At least, according to The Hitchhiker’s Guide to the Galaxy.)

The track length is forty-two seconds. Digitally, the hexadecimal representation of the background for the Track Artwork is #2A2A2A. The hexadecimal color was chosen purposefully setting RGB to (42, 42, 42), which resulted in the aforementioned hexadecimal color.

There was much debate about whether it was more appropriate to start with RGB: (42, 42, 42) and convert to the hexadecimal representation, which is HEX: #2A2A2A, or whether the hexadecimal color should be set to #424242 to be converted to RGB, which is RGB: (66, 66, 66). After lengthy meetings and phone conferences that no one wanted to attend, the decision was finally made to start with the RGB color and convert to hexadecimal. The final decision was made due to a convincing argument pointing out that the RGB representation of #424242 was a string of sixes, which is frowned upon in most cultures due to its close association with the anti-Christ.

Back to top

What Was the Best Thing Before Sliced Bread? – 4:22

Or, more specifically, when was sliced bread invented, and by whom?

The story is very near and dear to the artist’s heart. Sliced bread was essentially invented by Otto Frederick Rohwedder of Davenport, IA. Alex Laird is also from Iowa and enjoys freshly sliced bread each morning. Rohwedder built a prototype for the first bread slicer in 1917, thus rending bread now sliceable. The prototype was destroyed in a supposedly accidental fire.

What many people don’t know is the controversies that have been had over whether slicing bread should be legal or not. In the mid-1900s, street riots broke out frequently simply as a result of arguments of bread slicing, how it should be done, and whether it was ethical. In fact, in 1943, the U.S. put a ban on sliced bread for a short period of time, but the response to this ban was so great that it was soon lifted. This is why the fire destroying Rohwedder’s bread slicer is frequently considered intentional. It wasn’t until the 60s, when peace and love were spreading rampantly, that Americans decided bread should be able to be sliced if people wanted to slice it.

This track contrasts the violent and noisy acts of bread-slicing lovers throughout the years who have fought to keep the slicing legal and remembers their courageous actions.

Back to top

Dark Matter – 3:54

Perhaps one of the most profoundly titled tracks on the album, Dark Matter dares to attempt to give us a glimpse at dark matter itself. (The dark matter being the things in the universe that cannot be seen but their presence can be felt under given circumstances.) Scientists estimate that about 90% of all matter within a given galaxy is dark matter.

Why is this song called Dark Matter? Listen to its silence, absorbing everything around you, meditating specifically on the infiniteness of the universe and the eternity of life after death. Are the hairs on the back of your neck standing up? Is your heart suddenly getting all flippy and floaty? Those are the forces of the universe around you that remain unseen, and this track caused it.

Back to top

Male Thought Patterns – 0:01

Males don’t need to be diagnosed with ADHD, because they all already have it. A male’s thought patterns are disjointed from one another, rarely flowing in a fluid manner. Short and to the point, just like the length and message of this track.

Back to top

Untitled – 3:13

In view of the popular cultures, which currently seems to be craving untitled tracks that precede hidden tracks, the artist includes this track as a nod toward his fellow artists who seem to have slumped into the kitsch of music and sound.

Back to top

[Hidden Track] – 10:50

By far the most moving piece on The Question of Music, Meaning, and Life, [Hidden Track] is the only track to actually feature audible waveforms. Specifically, white noise. In fact, [Hidden Track] is the sibling track to White Noise, a controversial silent track that offers no white noise.

While the general theme of The Question of Music, Meaning, and Life is to contradict all musical norms by going against what is expected, the artist chose to close off the album by following two stereotypes of a mainstream album: firstly, a track which is simply titled Untitled, and secondly, a hidden track which plays after several minutes of silence.

Most shockingly, [Hidden Track] is the only track on the album that actually delivers noise to the listener. This was done intentionally as a final emotional movement to the album in which, after pulling moving the listener emotionally for all the previous, the artist finally gives them what their heart is so longing for: a sound.

Back to top