Feeds

Comet-bomb interceptor makes low pass above Atlantic

Earthy speed to get probe 'up close and personal'

High performance access to file storage

A NASA space probe famous for bombing a comet five years ago made a final "flyby" past Earth last night, changing its orbit around the Sun with the aid of the planet's gravity. The renamed "EPOXI" craft (formerly "Deep Impact") swooped low just 19,000 miles above the South Atlantic at 11pm UK time last night.

Orbits of EPOXI, Earth, Hartley 2 about the Sun. Credit: NASA/JPL

One way of looking at it

Last night's 12,750 mph flypast will see the dual-missioned spaceprobe accelerate by no less than 3,470 mph in its bid to reach the comet Hartley 2 later this year. EPOXI's name reflects the two new tasks it was given following the Deep Impact comet-bombing run: Extrasolar Planet Observation and Characterization plus Deep Impact Extended Investigation.

After the successful 2005 strike in which the then Deep Impact smashed a probe into the comet Tempel 1, NASA assessed that the probe still had plenty of manoeuvring fuel left and that, by means of judicious low passes above Earth, it could be steered to a new rendezvous with another comet. The Hartley intercept, however, will not involve an impact probe like the Tempel rendezvous.

The orbits of EPOXI and Hartley 2 referenced from Earth. Credit: NASA/JPL

Here's another from our point of view

"There is always some gravity boost at a flyby and in some cases, like this one, it is the main reason for a flyby. The last Earth flyby was used primarily to change the tilt of the spacecraft's orbit to match that of comet Hartley 2, and we are using Sunday's flyby to also change the shape of the orbit to get us to the comet," says astronomer Michael A'Hearn, boss boffin for both Deep Impact and EPOXI.

Following Sunday's flypast EPOXI is now outward bound to intercept Hartley 2 on November 4. The small comet, which orbits the Sun every six years, will at that stage be almost as close to the Sun as it ever gets, just outside Earth's orbit.

"Earth is a great place to pick up orbital velocity," said Tim Larson, the EPOXI project manager from NASA's Jet Propulsion Laboratory. "This flyby will [get us] up close and personal with comet Hartley 2." ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.