SlideShare a Scribd company logo
SHUTTLE PROCESSING (Before Flight Activities Rarely Seen  By The General Public) DISCOVER --- DISCOVERY
External Tank Arrives by Barge from MS
 
Vertical Assembly Building External Tank
Removing  External Tank From Carrier
 
External Tank Enters VAB
External Tank in VAB
Preparing to Lift the Tank to Vertical
Lifting Tank
Solid Rockets Are Attached
Engines Are  Attached To Solids
Engines Are Attached To The Shuttle In The Shuttle Processing Facility
 
 
 
Shuttle In Sling Ready For Lift In VAB
Shuttle Has Been Moved To VAB And And Will Be Attached To External Tank
 
Shuttle is Attached
 
 
 
Payload Preparation Room (PPR)
Cargo Package For ISS
New Module For ISS
Payload Ready To Be Moved to The Launch Pad
 
Payload Carrier Leaves PPR
 
Payload Being Moved To Launch Pad
 
Lifting Payload  Into Position For  Insertion Into  Discovery When  It Arrives At The Pad
 
 
Shuttle Discovery Leaves VAB
 
Shuttle & Crawler Launch Pad TRIP: Length--- 3 ½  mi Time--- 6-8 hours
 
Crawler Control
 
DISCOVERY ARRIVES  AT PAD
 
 
 
READY FOR  LAUNCH
We Have Lift Off
 

More Related Content

Viewers also liked

Child's Play
Child's PlayChild's Play
Child's Play
Peety G
 
Christmas shopping
Christmas shoppingChristmas shopping
Christmas shoppingguimera
 
Cool Images
Cool ImagesCool Images
Cool Images
Peety G
 
Pictures please! How to use images to create more impact with your keynote
Pictures please! How to use images to create more impact with your keynotePictures please! How to use images to create more impact with your keynote
Pictures please! How to use images to create more impact with your keynote
Else Kramer - Photosopher
 
Párrafos y su clasificación
Párrafos y su clasificaciónPárrafos y su clasificación
Párrafos y su clasificación
Eleam Jarquin
 
Photovoice through the life span samples
Photovoice through the life span samplesPhotovoice through the life span samples
Photovoice through the life span samples
grizleo
 
Quotes for presentations
Quotes for presentationsQuotes for presentations
Quotes for presentations
hiddenpersuader
 
Picture Art
Picture ArtPicture Art
Picture Art
Peety G
 
Pictures from the 20th century in black and white
Pictures from the 20th century in black and whitePictures from the 20th century in black and white
Pictures from the 20th century in black and whiteguimera
 
Satyrs and Nymphs in paintings
Satyrs and Nymphs in paintingsSatyrs and Nymphs in paintings
Satyrs and Nymphs in paintings
guimera
 
9 11
9 119 11
9 11
Peety G
 

Viewers also liked (13)

Rbc
RbcRbc
Rbc
 
Child's Play
Child's PlayChild's Play
Child's Play
 
Christmas shopping
Christmas shoppingChristmas shopping
Christmas shopping
 
Cool Images
Cool ImagesCool Images
Cool Images
 
Pictures please! How to use images to create more impact with your keynote
Pictures please! How to use images to create more impact with your keynotePictures please! How to use images to create more impact with your keynote
Pictures please! How to use images to create more impact with your keynote
 
Párrafos y su clasificación
Párrafos y su clasificaciónPárrafos y su clasificación
Párrafos y su clasificación
 
Photovoice through the life span samples
Photovoice through the life span samplesPhotovoice through the life span samples
Photovoice through the life span samples
 
Quotes for presentations
Quotes for presentationsQuotes for presentations
Quotes for presentations
 
Picture Art
Picture ArtPicture Art
Picture Art
 
Pictures from the 20th century in black and white
Pictures from the 20th century in black and whitePictures from the 20th century in black and white
Pictures from the 20th century in black and white
 
Satyrs and Nymphs in paintings
Satyrs and Nymphs in paintingsSatyrs and Nymphs in paintings
Satyrs and Nymphs in paintings
 
Maravilla del cuerpo humano
Maravilla del cuerpo humanoMaravilla del cuerpo humano
Maravilla del cuerpo humano
 
9 11
9 119 11
9 11
 

More from Peety G

Condom Fashion
Condom FashionCondom Fashion
Condom Fashion
Peety G
 
Sports Illustrated Models 2006
Sports Illustrated Models 2006Sports Illustrated Models 2006
Sports Illustrated Models 2006
Peety G
 
The Bull
The BullThe Bull
The Bull
Peety G
 
Reuters 2006
Reuters 2006Reuters 2006
Reuters 2006
Peety G
 
Baghdad Before After
Baghdad Before AfterBaghdad Before After
Baghdad Before After
Peety G
 
Busy Working
Busy WorkingBusy Working
Busy Working
Peety G
 
Photoshop
PhotoshopPhotoshop
Photoshop
Peety G
 
Cool Cars
Cool CarsCool Cars
Cool Cars
Peety G
 

More from Peety G (9)

Condom Fashion
Condom FashionCondom Fashion
Condom Fashion
 
Sports Illustrated Models 2006
Sports Illustrated Models 2006Sports Illustrated Models 2006
Sports Illustrated Models 2006
 
The Bull
The BullThe Bull
The Bull
 
Reuters 2006
Reuters 2006Reuters 2006
Reuters 2006
 
Baghdad Before After
Baghdad Before AfterBaghdad Before After
Baghdad Before After
 
Busy Working
Busy WorkingBusy Working
Busy Working
 
Photoshop
PhotoshopPhotoshop
Photoshop
 
Cool Cars
Cool CarsCool Cars
Cool Cars
 
Dubai
DubaiDubai
Dubai
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Discover the Discovery