Feeds

Comet bomber flyby pics show spaceball belching ancient dry ice

Professor Sunshine bitchslaps wet squirty tail theory

SANS - Survey on application security programs

Excellent snaps sent back by a NASA probe craft during a rendezvous with the comet Hartley 2 have revealed that the spectacular "jets" of glowing gas which make it so spectacular result from dry ice subliming in its interior.

The nucleus of comet Hartley 2 belching dry ice, imaged by the EPOXI spacecraft. Credit: NASA/JPL-Caltech/UMD

A little bit of dry ice fabulousness

NASA's EPOXI* mission has seen the former Deep Impact spacecraft - which successfully bombed the comet Tempel 1 with an impact missile in 2005, gleaning valuable data while so doing - subsequently reassigned to mount a flyby past Hartley 2. During the past five years the probe has carried out cunning gravity-assist flybys past Earth in order to intercept the hurtling comet, and a week ago it zoomed to just 700km from the freezing spaceball. This time, however, there was no impact probe.

This excellent clip from NASA explains:

Since the Hartley 2 intercept last week data has beamed down from the EPOXI craft to NASA's receivers on Earth, and boffins have been eagerly crunching it. Already, traditional notions of how comets work have been upset.

"Previously it was thought that water vapor from water ice was the propulsive force behind jets of material coming off of the body, or nucleus, of the comet," says Professor Jessica Sunshine, who is deputy top boffin for the EPOXI mission.

"We now have unambiguous evidence that solar heating of subsurface frozen carbon dioxide (dry ice), directly to a gas, a process known as sublimation, is powering the many jets of material coming from the comet," continues the prof. "This is a finding that only could have been made by traveling to a comet, because ground based telescopes can't detect CO2 and current space telescopes aren't tuned to look for this gas."

Sunshine and her colleagues believe that it may be commonplace for comets' spurting of gas and dust from their nuclei into their gassy coma, or tail, to be driven by dry ice rather than wet.

"The dry ice that is producing the CO2 jets on this comet has probably been frozen inside it since the formation of the solar system," comments Sunshine's colleague Lori Feaga.

According to the EPOXI pics, Hartley 2's nucleus is peanut or dumbbell shaped, 2km long and 400m across at the narrow point of the neck. The comet-probe boffins expect many more interesting revelations from the probe data, which is still streaming in at a rate of 2,000 images a day.

Many more excellent pics, animations etc can be seen here, courtesy of NASA and Maryland uni where Sunshine and her team work. ®

*Extrasolar Planet Observation and Characterization plus Deep Impact Extended Investigation

Top three mobile application threats

More from The Register

next story
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.