Feeds

NASA captures Martian avalanche

Ice, dust, camera, action

Top three mobile application threats

NASA has released a rather nice snap of a Martian "avalanche" - a cascade of ice and dust tumbling down a slope near the Red Planet's north pole captured by its Mars Reconnaissance Orbiter's High Resolution Imaging Science Experiment (HiRISE) on 19 February:

NASA image of Martian avalanche. Pic: NASA/JPL-Caltech/University of Arizona

HiRISE has been repeatedly perusing selected Martian sites to track seasonal changes, NASA explains, but wasn't in this case focused on the 700 metre tall cliff.

Candice Hansen, HiRISE deputy principal investigator at NASA's Jet Propulsion Laboratory, Pasadena, said: "We were checking for springtime changes in the carbon-dioxide frost covering a dune field, and finding the avalanches was completely serendipitous."

The cliff face has layers "known to be rich in water ice", and scientists now plan to keep an eye on developments at the slope's base to determine what proportion of the debris it represents.

HiRISE collaborator Patrick Russell of the University of Berne elaborated: "If blocks of ice broke loose and fell, we expect the water in them will be changing from solid to gas. We'll be watching to see if blocks and other debris shrink in size. What we learn could give us a better understanding of one part of the water cycle on Mars."

As well as the photo of the dynamic Martian surface, NASA yesterday released about 2,400 HiRISE images, including one of the Earth and Moon as seen from our neighbour.

NASA has more info* on the avalanche pic here and hi-res images here. ®

Bootnote

*The agency explains:

The scarp in this image is on the edge of the dome of layered deposits centered on Mars' north pole. From top to bottom this impressive cliff is over 700 metres (2,300 feet) tall and reaches slopes over 60 degrees. The top part of the scarp, to the left of the images, is still covered with bright (white) carbon dioxide frost which is disappearing from the polar regions as spring progresses. The upper mid-toned (pinkish-brownish) section is composed of layers (difficult to see here) that are mostly ice with varying amounts of dust. The darkest deposits below form more gentle slopes, less than 20 degrees, and are mainly composed of two materials: mid-toned layers, possibly ice-rich, that form small shelves, and more mobile, wide-spread, sand-sized dark material. The wavy forms on the flatter areas to the right are dunes.

High performance access to file storage

More from The Register

next story
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
KILLER ROBOTS, DNA TAMPERING and PEEPING CYBORGS: the future looks bright!
Americans optimistic about technology despite being afraid of EVERYTHING
R.I.P. LADEE: Probe smashes into lunar surface at 3,600mph
Swan dive signs off successful science mission
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.