Feeds

3-million-km-long comet plunges into Sun

'Deepest penetration yet' filmed in STEREOvision

Secure remote control for conventional and virtual desktops

Boffins in California report that they have managed to track the course of an unusually resilient comet as it crashed deep into the Sun before finally being crisped.

"We believe this is the first time a comet has been tracked in 3-D space this low down in the solar corona," says Claire Raftery, a post-doctoral researcher at UC-Berkeley.

Raftery and her colleagues, fellow Berkeley postdocs Juan Carlos Martinez-Oliveros, Samuel Krucker and Pascal Saint-Hilaire, believe that the comet was one of the "Kreutz family", a swarm of comets - perhaps resulting from breakup of a single big one - knocked out of their previous path by Jupiter in 2004.

Hydrogen-alpha observations of the Sun's edge from the Coronado instrument of the Mauna Loa Solar Observatory showing what the authors believe to be the comet approaching the solar limb.

Hot comet plunge action.

The boffins managed to track one in particular, boasting a tail no less than three million km long, as it plunged down in a final death dive into the Sun. This was done using NASA's Solar TErrestrial RElations Observatory (STEREO) system. STEREO is a pair of observer spacecraft in orbit round the Sun, one ahead of Earth and one behind.

The STEREO track gave enough information to work out where the comet would crash into the Sun to within 1,000km or so. Raftery and her scientific chums then checked data from that area which had been scooped by the Corona instrument at the Mauna Loa Solar Observatory in Hawaii. Sure enough, these showed an object approaching the edge of the Sun at the right place and time.

According to the data, the boffins think that the comet actually survived a surprisingly long time, penetrating the solar corona and disappearing in the 100,000-degree heat of the chromosphere.

The four presented their research at a meeting of the American Astronomical Society in Miami last night. Comet-chasing isn't their usual work - seemingly it's more of a sideline.

“It was supposed to be an exercise, but it took over our lives,” says Raftery. ®

Next gen security for virtualised datacentres

More from The Register

next story
Gigantic toothless 'DRAGONS' dominated Earth's early skies
Gummy pterosaurs outlived toothy competitors
Vulture 2 takes a battering in 100km/h test run
Still in one piece, but we're going to need MORE POWER
TRIANGULAR orbits will help Rosetta to get up close with Comet 67P
Probe will be just 10km from Space Duck in October
Boffins ID freakish spine-smothered prehistoric critter: The CLAW gave it away
Bizarre-looking creature actually related to velvet worms
CRR-CRRRK, beep, beep: Mars space truck backs out of slippery sand trap
Curiosity finds new drilling target after course correction
'Leccy racer whacks petrols in Oz race
ELMOFO rakes in two wins in sanctioned race
What does a flashmob of 1,024 robots look like? Just like this
Sorry, Harvard, did you say kilobots or KILLER BOTS?
NASA's rock'n'roll shock: ROLLING STONE FOUND ON MARS
No sign of Ziggy Stardust and his band
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.