Feeds

Earth escapes obliteration by comet

Elenin breaks up into teeny bits and misses planet

High performance access to file storage

NASA has released another statement on Comet Elenin, the totally insignificant comet it keeps giving out statements about, to say that it has broken up into "smaller, even less significant, chunks of dust and ice".

"This trail of piffling particles will remain on the same path as the original comet, completing its unexceptional swing through the inner solar system this fall," the statement added.

The space boffins' protestation comes after widespread internet rumours that Comet Elenin was not in the least bit insignificant and would a) crash into the Earth and obliterate all life, b) pass close enough to the planet that its gravitational pull would cause loads of earthquakes and similar cataclysms and obliterate all life or c) do any number of other apocalyptic things that would obliterate all life.

Back in August, NASA assured the planet that while "often, comets are portrayed as harbingers of gloom and doom in movies and on television, most pose no threat to Earth".

The totally clear wording and apparent transparency of the space agency only served to throw further fuel on the fire of speculation that this was some sort of elaborate cover-up.

No doubt similar theorists will now infer that the comet was blown up outside the solar system and its hurtling path towards Earth deviated by some sort of explosion deep in its core affected by a motley crew of space drillers, most of whom tragically died during the mission.

NASA, however, is sticking to its guns.

"I cannot begin to guess why this little comet became such a big internet sensation," Don Yeomans of NASA's Near-Earth Object Programme Office at the Jet Propulsion Laboratory in California, said in the statement.

"The scientific reality is this modest-sized icy dirtball's influence upon our planet is so incredibly minuscule that my subcompact automobile exerts a greater gravitational influence on Earth than the comet ever would. That includes the date it came closest to Earth (Oct 16), when the comet's remnants got no closer than about 22 million miles [35.5 million km]," he added. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.