Feeds

Sun to blame for yin-yang Moon's dark side

Paging Pink Floyd

High performance access to file storage

The fearsome heat of the Sun is being blamed for the strange yin-yang appearance of Saturn's moon Iapetus.

Even at an average distance of roughly 1.5 billion kilometres from the sun, Iapetus is being gradually toasted on one side.

False colour image of Iapetus' bright leading edge. Credit: NASA

False colour image of Iapetus' bright leading edge. Credit: NASA

NASA says its infrared observations confirm that the dark side is warm enough for a very slow but sustained release of water vapour, and that the temperature difference between the two hemispheres is a major factor in the sharp colour boundary.

Researchers have suspected for a while that some external event caused one side of the Moon to become darker. Tilmann Denk, Cassini imaging scientist at the Free University in Berlin, explains: "Dusty material spiralling in from outer Moons hits Iapetus head-on, and causes the forward-facing side of Iapetus to look different than the rest of the Moon."

This idea has not been discarded, but the scientists think the difference set up a vicious circle, leading to an ever greater contrast between the two sides of the Moon.

The process is simple to explain in broad brush terms. Once the Moon was darkened slightly on the leading edge, the side facing towards the Sun, the surface there would heat more rapidly. As the surface heats, the water ice evaporates and condenses on the nearest cold spot. As the leading edge loses its ice, it gets darker still, retaining more heat and setting up a runaway process whereby the dark side gets darker and darker and the bright side brighter.

The hypothesis even stands up to more detailed examination. In the picture, we can clearly see isolated spots of dark material even on the bright side of the Moon. But NASA says analysis of these spots shows them to be predominantly on the sunward facing slopes of craters.

Some craters have darker material at the bottoms of the slopes, suggesting that it might even slide downhill.

But the dark material is still a mystery. The initial darkening event is still unknown, and scientists are no closer to discovering exactly what the dark material is. So as Cassini flies through Saturn's system, there is still plenty more to come, the scientists say. ®

High performance access to file storage

More from The Register

next story
IBM Hursley Park: Where Big Blue buries the past, polishes family jewels
How the internet of things has deep roots in the English countryside
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Honeybee boffin STINGS OWN WEDDING TACKLE... for SCIENCE
Not the worst place to be stung, says one man
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.