Feeds

NASA's Stardust braves cometary flak

Survives photographic close encounter with Tempel 1

SANS - Survey on application security programs

Of particular interest to scientists is the result of the whack Tempel 1 took from the Deep Impact spacecraft impactor back in July 2005. It's released a before-and-after comparison of the impact site:

Before and after comparison of the Deep Impact impactor site. Pic: NASA

NASA explains: "The left-hand image is a composite made from images obtained by Deep Impact in July 2005. The right-hand image shows arrows identifying the rim of the crater caused by the impactor. The crater is estimated to be 150 meters (500 feet) in diameter."

Pete Schultz of Brown University elaborated: "We see a crater with a small mound in the center, and it appears that some of the ejecta went up and came right back down. This tells us this cometary nucleus is fragile and weak based on how subdued the crater is we see today."

Stardust launched back in February 1999, on its primary mission to "collect dust and carbon-based samples during its closest encounter with Comet Wild 2" in January 2004.

These samples, plus interstellar dust, returned to Earth in January 2006 aboard a capsule which parachuted to earth in Utah

NASA then sent the spacecraft on its final mission - officially dubbed Stardust-NExT ("New Exploration of Tempel") - although it's not quite ready for retirement.

Tim Larson, Stardust-NExT project manager at the Jet Propulsion Laboratory, said: "This spacecraft has logged over 3.5 billion miles since launch, and while its last close encounter is complete, its mission of discovery is not. We'll continue imaging the comet as long as the science team can gain useful information, and then Stardust will get its well-deserved rest." ®

3 Big data security analytics techniques

More from The Register

next story
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.