Feeds

Hubble shows images from record-breaking 13.1 billion light-years

Spots quintet of infant galaxies in formation

Top 5 reasons to deploy VMware with Tegile

The Hubble telescope has broken its own distance record, spotting a cluster of five galaxies 13.1billion light-years away.

They were spotted as part of the Brightest Reionizing Galaxies (BoRG) survey, which aims to scan the theoretical edges of the universe. In a paper to the American Astronomical Society meeting Michele Trenti, of the University of Colorado and the Institute of Astronomy at the University of Cambridge, postulated that the image showed a grouping has grown into a 2,000 galaxy group, similar in size to the Virgo cluster.

Hubble galaxy discovered by BoRG

BoRG has no plans for assimilation of galaxies

"These galaxies formed during the earliest stages of galaxy assembly, when galaxies had just started to cluster together," he said in a statement. "The result confirms our theoretical understanding of the buildup of galaxy clusters. And, Hubble is just powerful enough to find the first examples of them at this distance."

The galaxies themselves are between a tenth and a half of the size of our Milky May, but are much brighter as they absorb the material from merging objects. The team could only spot these brightest of galaxies and Trenti suggested that there were many more outside of clusters, and thus too dim to be seen. Further spectroscopic observations are planned for next year.

The BoRG survey is being conducted using the Hubble’s most advanced imaging unit, the Wide Field Camera 3 (WFC3). This uses twin sensors; a large format Charge Coupled Device to view near-ultraviolet emissions and a mercury, cadmium and tellurium photosensitive surface to scan to the edges of infrared. The camera was also used list year to show the warping of dark matter on galactic viewing.

Nasa's WFC3 viewer now installed on Hubble

The WFC3 camera was installed in 2009

"We need to look in many different areas because the odds of finding something this rare are very small," said Trenti. "It's like playing a game of Battleship: the search is hit-and-miss. Typically, a region has nothing, but if we hit the right spot, we can find multiple galaxies." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
NASA launches new climate model at SC14
75 days of supercomputing later ...
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Simon's says quantum computing will work
Boffins blast algorithm with half a dozen qubits
LIFE, JIM? Comet probot lander found 'ORGANICS' on far-off iceball
That's it for God, then – if Comet 67P has got complex molecules
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.