Feeds

Discovery crew prep for return to Earth

ISS mission accomplished, undocking tomorrow

High performance access to file storage

Space shuttle Discovery will tomorrow undock from the International Space Station ahead of a scheduled return to Kennedy Space Center at 13:44 EDT (17:44 GMT) on Saturday.

Mission specialist Joseph Acaba during yesterday's spacewalkThe shuttle's STS-119 mission to deliver and fit the final solar arrays to the orbiting outpost was done and dusted yesterday with a third and final spacewalk by mission specialists Joseph Acaba (pictured) and Richard Arnold.

On board, station commander Mike Fincke continued to address the troublesome urine-recycler space drinks machine and was finally successful in getting a replacement Urine Processor Assembly "up and running on a 'wet spin', the processing of the unit’s first sample". The UPA apparently "continued working through the evening and completed its first cycle" without clapping out.

The recycler is, along with the extra solar arrays, part of the plan to to expand the station's crew to a permanent roster of six. As we previously reported, the ISS will "soon lose the option to take on water produced as an exhaust product of fuel cells aboard visiting shuttles, and lifting all the water requirements of the new six-person crews into orbit aboard Soyuz or private rockets would be extremely expensive".

The solar arrays now provide 84 to 120 kilowatts of electricity, enough to power the additional science planned for the expanded crew.

The Discovery crew are today enjoying a "breather" ahead of the shuttle's departure. Flight engineer Sandra Magnus, who's been on board the ISS on since arriving on Endeavour's November 2008 STS-126 mission, will return to Earth, replaced by Japan Aerospace Exploration Agency astronaut Koichi Wakata.

In Kazakhstan, meanwhile, Expedition 19 commander Gennady Padalka and flight engineer Michael Barratt are preparing for a Thursday launch atop a Soyuz to lift them to the ISS. They're joined by "spaceflight participant" (= tourist) Charles Simonyi, the billionaire software designer making his second trip to the station.

Simonyi will return to Earth on 7 April in the Soyuz TMA-13 capsule accompanied by Expedition 18 members commander E Michael Fincke and flight engineer Yury Lonchakov, who've been aloft since October 2008.

There are full Expedition 19 details here (pdf). ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
Get your MOON GEAR: Auction to feature Space Race memorabilia
Keepsakes from early NASA, Soviet programs up for bids
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.