Feeds

A year in spaaaaace: El Reg looks back on 2011

Era of the spaceplane ends, robot exploration continues

High performance access to file storage

Upstart start-ups get a look-in

But despite all the bad that went with the closure of the programme, there was also some potential good - possible successors to the shuttle.

At first the field seemed to be opening up to commercial companies that might be able to provide rockets at significantly lower costs, such as Elon Musk's SpaceX firm. But NASA was having a hard time letting go of the expensive and lavishly-staffed way it has always done things and announced it was planning a new kind of rocket based on recycled shuttle (and Apollo) technology, the Space Launch System.

NASA wasn't completely blind to the benefits of commercial space travel, however, setting up and distributing Commercial Crew Development funding for possible manned flights to Amazon-ian Jeff Bezos' Blue Origin space venture, Paypal alumni Elon Musk's SpaceX and the Sierra Nevada Corporation.

Out of that lot the prize goes to SpaceX, which will have the first mission to the International Space Station by a privately built and operated spacecraft early next year, NASA announced. The Dragon capsule, sitting on a Falcon 9 rocket, will (hopefully) deliver supplies to the ISS.

The Dragon capsule with 'Draco' rockets in action. Credit: SpaceX

The Dragon capsule with 'Draco' rockets in action. Credit: SpaceX

Nonetheless NASA isn't quite ready to let go of the old days, sending some of the commercial crew funds the way of United Launch Alliance - basically the entire existing US rocket business amalgamated into a huge monopoly. ULA is a joint venture of guess who? Yes, Lockheed Martin and Boeing.

ULA's offering for commercial manned flights is the trusty Atlas V rocket, which is to be man-rated to send astronauts into low-Earth orbit.

Plenty of Atlas Vs have already flown with unmanned missions - for instance carrying Juno, NASA's Jupiter probe, into space.

Artist's impression of Juno at Jupiter. Pic: NASA

Artist's impression of Juno at Jupiter. Credit: NASA

Juno, which will be busily unlocking the secrets of the early solar system when it eventually makes it to Jupiter in 2016, launched in August.

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.