recommended reading

Say 'Cheese' -- and Happy Birthday! -- to the International Space Station


When the astronauts who pieced together the International Space Station snapped photos of the view from the cosmos, little did they know that there would eventually be an app for that.

On the 15th anniversary of the ISS, a recently-departed NASA program manager noted that a winner of the agency’s recent "hackathon," which she managed, designed an iPad tool for timing the best extraterrestrial shots.

Terrestrial photogs can use the same app to frame the astronauts. 

The concept was "we’re going to alert you and we’re going to alert the astronauts on station 10- minutes before the flyover, so you can wave, and they can wave, and it coordinates a photo between the two," Ali Llewellyn, former NASA Open Innovation Program Office community manager, said during an interview on the sidelines of a conference hosted by Nextgov. 

The T-10 app (pronounced T minus 10) lets astronauts choose the area they want to photograph, pick whether they want a day or night shot, and set an alarm to go off when the location is visible. They receive a ten minute warning before the cross by. When the alarm sounds, they say "yes" to proceed with the countdown, and a message alerts T-10 iOS and Android device users on Earth to smile for the camera.

The Earthlings also get a 10-minute warning so they can grab telescopes and cameras to find a good angle. The astronaut's countdown screen displays the number of people ready to pose.

During an 83-hour brainstorming session this spring, citizens and astronauts in 44 countries "online and beyond" collaborated to solve specific NASA problems using public data sources, like space station positions.  

Still, the ISS is probably more inventive than the app. 

The space station "stands as one of the engineering marvels of this or any other age, and a testament to American ingenuity and perseverance," House Science Committee Ranking Member Rep. Eddie Bernice Johnson, D-Texas, said in a statement. “NASA should be proud of having built a robust facility for testing life support systems and other technologies to ensure they work in space and are reliable.”

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.