Tag: Technology

Norwich Cathedral Flow Motion

Norwich Cathedral Flow Motion

Norwich Cathedral Flow Motion from Rob Whitworth on Vimeo.

Video Description via Vimeo

Probably the world’s first cathedral flow motion. Something of a passion project for me getting to shoot my home town and capture it in it’s best light. Constructed in 1096 Norwich Cathedral dominates the Norwich skyline to this day. Was super cool getting to explore all the secret areas whilst working on the video.

Graphic Design: Edward Clark

Sound Design: Wounded Buffalo Sound Studios
Website: woundedbuffalo.co.uk/

Big thanks to Nikon NPS UK for the loan of camera equipment during the filming.


@Nrw_Cathedral @kwhi02 @VisitNorwich


Cassini’s Grand Finale

Cassini’s Grand Finale

Make sure to watch this video in full screen. Beautiful visuals and a celebration of man’s achievements in exploring the worlds beyond ours.

Video information via Vimeo

CASSINI’S GRAND FINALE from Erik Wernquist on Vimeo.

CASSINI’S GRAND FINALE is a short film I had the great honor to produce for NASA’s Jet Propulsion Laboratory (JPL) about the spectacular ending of the Cassini/Huygens mission to Saturn. It is meant as an inspirational and informative piece about what happens in the last months of the mission, and as a celebration of all that this historic spacecraft has achieved.

Here is an article from JPL on the production of the film: https://saturn.jpl.nasa.gov/news/3016/making-cassinis-grand-finale/

For the official JPL release of the film, please turn here:


or go directly to the official JPL YouTube video here:

For the official NASA release, please turn here:


NASA’s Cassini spacecraft (launched in 1997) has been in orbit around Saturn since 2004 exploring the giant planet, its spectacular system of rings and moons. Cassini was also carrying with it the European Huygens Probe which was dispatched after arrival and successfully landed on the moon Titan, becoming the first human made craft to land on a surface in the outer solar system.

In 2017 – after more than a decade of bringing home remarkably successful scientific achievements, discoveries and a treasury of gorgeous photos – the spacecraft is running out of fuel to maneuver. In order to protect the moons Enceladus and Titan, and their potentially life-bearing sub surface oceans, from possible contamination in the unlikely event of a future collision, it has been decided to take Cassini permanently out of service. This is done by crashing the spacecraft into the atmosphere of Saturn – but not without doing some amazing science on the way.

22 times, Cassini dives through previously unexplored gap between Saturn and its rings, collecting new data on the mass of the rings (used to help determine their age), measurements of Saturn’s gravity and magnetic fields (used to help understanding its internal structure) and sending home stunning views of Saturn’s clouds and the rings – seen from a closer range than ever before.

Even up until the very end, Cassini will bring home data, as it tastes the atmosphere of Saturn, just minutes before burning up and becoming part of the planet itself.

It has been an unprecedented honor for me to get to do this film. Being a passionate enthusiast of planetary science, Cassini is the one mission – more than any other – to define my interest in the field, as I’ve had the pleasure to follow its success, from start to end, for a major part of my adult life.

For more information about the Cassini mission and its Grand Finale, please turn here:



DIRECTOR – Erik Wernquist

PRODUCERS – Preston Dyches (JPL), Stephen Epstein (JPL)

MUSIC – Cristian Sandquist

WRITER – Preston Dyches (JPL)

NARRATOR – Stephanie Czajkowski

COLORIST – Caj Müller

EDITOR – Micke Lindgren


CASSINI MODELING – Svante Segelson



TITLES – Mikael Hall



Thank you NASA, JPL, ESA and the entire Cassini/Huygens team for making such a wonderful, successful and inspiring mission.

And especially; thank you Cassini, and farewell.

The solar system will feel empty without you.

Gift Card and Voucher Scams on Facebook

Gift Card and Voucher Scams on Facebook

There is scam going around where you are offered a £300 gift card from ASDA if you comment, like and share with your friends. Similar scams involving Pizza Hut, and Starbucks have also been going around Facebook too.

Once again, scammers are looking for people to share these scams and even enter personal information such as email addresses, etc which get sold on; these email addresses then receive lots of spam (junk) emails. Some of these spammers get commission be sending you to another site. According to the website Naked Security:

If you read the small print on the offers page it becomes clear that the so-called offer of ASDA vouchers have nothing to do with the supermarket at all, and is not officially endorsed. Furthermore, the small print reveals that they plan to share the personal information you share with them with other direct marketers who may use it to email you and send you junk mail in the post.


A few things to do to avoid such scams:

  • Research into the companies who are supposedly offering this gift cards or vouchers, it would mention such as giveaway on their websites. If there is no mention of a giveaway then it will be a scam,
  • £300 gift card is a large amount to give away, it is too good to be true. The usual saying, “if it is too good to be true, it usually isn’t”,
  • Do not enter any personal information that is asked such as name, addresses and other details. These scammers pray on people who are vulnerable, especially during special times of the year where people are looking for expensive gifts, such as the festive season.

If you see this scam being shared by your friends or family, it will appear on your Facebook timeline. Send a warning to your friends to be more vigilant and report the scam to Facebook.

Read more on the website:


Related articles

Scam calls that claim to be from Talk Talk

Scam calls that claim to be from Talk Talk


I received a call recently from a man claiming he was from TalkTalk to inform me that they had found errors on my phone line and they would help me fix the problem. It does sound quite convincing since the caller used my name. I let the caller proceed in which he asked me if I was sitting near my computer. I stopped him and explained that he was a scammer and then hung up. I am one of many people who have received these calls recently.

Unfortunately, many people fall victim to the scam because the caller will use the account holders name, address and account number, therefore trying to sound genuine. The scammer will then ask to put a code into your computer which will enable him or her to access your computer remotely. Here is a snippet from a Which? member where the scam cost him £5,000:

After accessing my PC remotely, he said I was entitled to a refund of £200 for the problems I’d had. Using remote access software, he directed me to my Santander online bank account, where it appeared that he had credited £5,000 into my account in error.

The caller told me to send the money back, which I did using MoneyGram. But I have since found out that it was a scam. He had directed me to a copycat website. Is there anything I can do?


TalkTalk are reassuring people that no financial information was taken when customer details were stolen last year. Here is another snippet from the thisismoney.co.uk website:

Luckily, no sensitive financial information, such as bank account numbers, was taken in the latest TalkTalk scandal, but to a conman that does not matter. With convincing patter like this, they will be able to trick their way into the trust of many households.

That’s what happened to 62-year-old Graeme Smith in February. He was duped out of £2,815 by fraudsters who cold-called him and claimed to be from TalkTalk.

Graeme, a semi-retired HR consultant from Chester-le-Street, Co. Durham, was convinced there was a problem with his computer as he had been receiving a lot of spam email.

So when the fraudster called he thought it made sense. The conmen told Graeme they needed to solve a problem with his computer, but that TalkTalk would pay him £250 in compensation for the inconvenience he had suffered. A list of banks appeared on his screen and Graeme was told to select his own.

Somehow the fraudsters managed to get his bank, Santander, to send a password to Graeme’s mobile phone. He was then tricked into handing this over to the fraudsters, who used it to empty his account.

TalkTalk refuses to pay him compensation – though it did waive a £169 charge to leave his contract. Now Graeme plans to take them to court.

‘TalkTalk may not have handed my bank details to the fraudsters, but it’s their fault I was placed in that position at all,’ he says.

Graeme had no idea how the scammers got hold of his details, but he assumes that they were obtained from a previous data breach.


Similar scams where callers claim they are from BT-Internet or from Microsoft Windows are also common and people do fall for them. They claim that there is a problem with your computer and that they will fix it.

They ask you to enter a code into the computer, if you proceed, the scammer can see what is on your computer and even control it; that is a scary thought.

Here is another snippet from the thisismoney.co.uk website that explains how a scammer named David can gain remote access to a computer:

He [David] tells me the information he has about my computer comes from Microsoft Windows: ‘We have been informed by Microsoft that someone is trying to hack your computer.’

He directs me to turn it on and then gives me a series of instructions to get the ‘Start’ menu to pop up.

Things get confusing when I point out I don’t have the operating program Microsoft on my computer because I have an Apple Mac. (Apple uses a different operating system). David is quickly back on track, though, and gets me to open a website, http://www.support.me.

The screen is virtually blank apart from a square grey box in the middle. It says: Support Connection. And in the middle there is space to type in a six-digit code.

It all looks legitimate. But if you type in the code the person on the other end of the line can get access to your computer.

That means from anywhere in the world someone can see exactly what is happening on your screen. They can search through your files, download programs on to your computer to spy on what you’re doing and which keys you press if you do online banking, and put viruses on your computer that will render it useless.

Luckily, they can’t do this unless you give them access, and that can be done only by entering the code into the box. That’s what David wants me to do next.

‘When you bought the computer, there was a six-digit code provided to you. Can you input that code?’ David instructs me.

I rack my brain for the code. Of course, no code exists – it’s just another attempt to win my trust. Who would remember a code from a computer bought years ago?

He’s trying to lower my guard for the next bit when I tell him I can’t remember ever getting a code.

‘It doesn’t matter. I can provide you with one,’ says David – and he reads one out.


Here is a screenshot of the support me website mentioned above:


Once you enter a six digit code, the scammer can take control of your computer to read your files or install viruses or other malware; it is truly scary.

Social Engineering

This scam comes under the term ‘Social Engineering’.

Social engineering can be elaborate and is generally highly convincing, with approaches usually made by somebody you trust or in authority. It is sometimes made more believable by snippets of information which the fraudsters already have about you.

Private individuals and businesses can both be victims of social engineering.

So what can you do to avoid being scammed:

Here are some tips from the Get Safe Online website:

  • Never reveal personal or financial data including usernames, passwords, PINs, or ID numbers
  • Be very careful that people or organisations to whom you are supplying payment card information are genuine, and then never reveal passwords. Remember that a bank or other reputable organisation will never ask you for your password via email or phone call.
  • If you receive a phone call requesting confidential information, verify it is authentic by asking for a full and correct spelling of the person’s name and a call back number.
  • If you are asked by a caller to cut off the call and phone your bank or card provider, call the number on your bank statement or other document from your bank – or on the back of your card – but be sure to use another phone from the one you received the call on. If you cannot access another phone, be sure to hang up for at least five minutes before you dial out, or call a friend (whose voice you recognise) before making another call.
  • Do not open email attachments from unknown sources.
  • Do not readily click on links in emails from unknown sources. Instead, roll your mouse pointer over the link to reveal its true destination, displayed in the bottom left corner of your screen. Beware if this is different from what is displayed in the text of the link from the email.
  • Do not attach external storage devices or insert CD-ROMs/DVD-ROMs into your computer if you are not certain of the source, or just because you are curious about their contents.


Further reading: