Feeds

Star formation? All a bit of a wind up

Magnetically speaking, you understand

High performance access to file storage

UK astronomers have discovered that the material flowing out of newborn stars contains a coiled, spring-shaped magnetic field.

The discovery, reported in the 1 November edition of Nature helps to explain why new stars are able to form as they condense from spinning clouds of interstellar gas.

"Astronomers know that stars form when interstellar gas and dust collapse under the influence of gravity, but these objects are rotating," explains Dr Antonio Chrysostomou, currently on leave from the University of Hertfordshire to work as associate director of the James Clerk Maxwell Telescope in Hawaii.

"The problem is that as a rotating body gets smaller it will spin up so fast that these clouds should fly apart before they have a chance to form stars - and yet we know that stars do form. Somehow, that angular momentum, or spin, needs to be removed before a star forms."

Many new stars, as they are forming, expel material from their poles at extremely high speeds. Astronomers have long supposed that these jets carried away angular momentum from forming stars, preventing them from spinning faster and faster as they condensed.

The theory is that as the gas collapses to form the spinning protostar, the interstellar gas twists the magnetic field that permeates the universe, winding it up like a corkscrew. Gas that is spinning too fast spins out along the field lines creating the polar jets observed on so many new stars.

But until now there was no real evidence to support this explanation for the process, the Hertfordshire team says. Using the Anglo-Australian Telescope (AAT) in New South Wales, Australia, Dr Chrysostomou and his team measured the circular polarisation of near-infrared radiation from a young star's jet. They were then able to reconstruct the structure of the magnetic field in the outflow.

Dr Phil Lucas, lecturer at the University of Hertfordshire, commented: "When we combine our observations with sophisticated computer modelling techniques, we were able to show that the shape of magnetic field that could reproduce our observations could only be helical." ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.