Back-sighting the history of Surveying

Last November 28- December 2, 2011, I had the chance to participate in a course for GPS data analysis and modelling (GDAM) for scientific and practical application workshop held at the National Engineering Center of UP Diliman.

Part of the itinerary is a day of field trip to the major research agencies that uses Global Positioning Systems (GPS) in the modelling and analysis of crustal movements for their respective scientific applications.

The agencies that we have visited are the Philippine Institute of Volcanology and Seismology (PHIVOLCS),  Manila Observatory and the National Mapping and Resource Information Authority (NAMRIA).

At PHIVOLCS we get a peek on how the GPS data from continuous and campaign sites have been archived, processed and delivered. These data will then be used further for the analysis of crustal movements specifically along the Philippune Fault as well as the deformation and movements on active volcanoes in the Philippines such as Mayon and Kanlaon. Having been part of the PHIVOLCS-GPS Team for quite some time, I am already familiar with the processing scheme using Bernese 5.0 which is Windows-based. In this workshop however, we are taught on how to process and model GPS data using  GAMIT-GLOBK and DEFNODE respectively. GAMIT-GLOBK and DEFNODE both runs in LINUX. 

Another office that we have visited is the Manila Observatory where an IGS station -PIMO is located.
A short introductory GPS presentation was given during our visit.

Of course we also got sight of the only International GPS Service (IGS) station in the Philippines for the longest time since 1980's I guess. That is PIMO appearing in the photo below. I think NAMRIA has recently added another IGS station, PTAG which is located at their office in Taguig. So in total, there are already 2 IGS stations that's tied into the International Terrestrial Reference Frame (ITRF) in the Philippines to account for the movement of our 7107 islands that's being tectonically active and bounded by four major tectoic plates.

 After the Manila Observatory, our next stop is NAMRIA where the Data processing and archiving of the Philippine Active Geodetic Network (PAGEnet) takes place.

After the lecture and introduction of the data monitoring procedures done in the PAGEnet Data and Control Center, we got the chance to tour around the museum located at ground floor of NAMRIA. The surveying instruments of the past were carefully preserved and displayed within the room.

Berger Theodolite


Wye Level

Trimble 4000 GPS

 Trimble 4000 SLD receiver

Wild-T2 Theodolite

JMR Doppler Receiver

India Magnetometer


Three arm protractor


A step through the relief map of the Philippines.

 A walk through the rich history of Surveying and Mapping in the Philippines

 A back-sight of the accuracy and precision instruments for surveying in the past...


Cam-whoring (^_^)


Woah! Win up to $1M by hacking Google Chrome!

It was of great awe that I discover this morning how Google Chrome developers have just been so confident of the security of their product that they really got some pretty great awards for those who could break in their security.

Hack Chrome! Get Rewards! Nice nice!

This year again CanSecWest is offering up to ONE MILLION DOLLAR reward for geeks who could crack the Google Chrome codes and bring themselves to the pedestal of their dreams. Yeah, who knows? It might just be another entrepot for such hidden talents that really ought to be brought out of the underground dark.

So here are the compelling prizes to drool so much about:
$60,000 - “Full Chrome exploit”: Chrome / Win7 local OS user account persistence using only bugs in Chrome itself. 
$40,000 - “Partial Chrome exploit”: Chrome / Win7 local OS user account persistence using at least one bug in Chrome itself, plus other bugs. For example, a WebKit bug combined with a Windows sandbox bug.
$20,000 - “Consolation reward, Flash / Windows / other”: Chrome / Win7 local OS user account persistence that does not use bugs in Chrome. For example, bugs in one or more of Flash, Windows or a driver. These exploits are not specific to Chrome and will be a threat to users of any web browser. Although not specifically Chrome’s issue, we’ve decided to offer consolation prizes because these findings still help us toward our mission of making the entire web safer. 
All winners will also receive a Chromebook.
They will issue multiple rewards per category, up to the $1 million limit, on a first-come-first served basis. There is no splitting of winnings or “winner takes all.” They require each set of exploit bugs to be reliable, fully functional end to end, disjoint, of critical impact, present in the latest versions and genuinely “0-day,” i.e. not known to us or previously shared with third parties. Contestant’s exploits must be submitted to and judged by Google before being submitted anywhere else. 
Yey! The bribe is not that bad, so you playful geeks could now start the ball rolling! May fickle fate find you fierce fellows! (^_^)

Source: Chromium Blog