Feeds

Top comet-watcher pens ISON's emotional obituary

'Born 4.5 Billion BC, Fragmented Nov 28, 2013 (age 4.5-billion yrs old)'

Top three mobile application threats

Comet-connoisseur Karl Battams of the Naval Research Laboratory has released a heartfelt – and more than a little tongue-in-cheek – eulogy for Comet C/2012 S1, aka ISON, which suffered a fiery death last Thursday when it was roasted, toasted, melted, and smelted by our merciless Sun.

Comet ISON

'This is how comet C/2012 S1 (ISON) wished to be remembered,' writes Battams
(image credit: Damian Peach – click to enlarge)

Fittingly entitled "In Memoriam", the death notice chronicles ISON's life in traditional obituary style. "Born in a dusty and turbulent environment, comet ISON spent its early years being jostled and struck by siblings both large and small," Battams writes, sympathetically.

He goes on to document ISON's troubled existence, including its "particularly violent first few million years" and its retreat to the Oort Cloud, where it "maintained a largely reclusive existence for nearly four billion years."

ISON was a rugged individualist, Battams maintains. "Never one to follow convention, ISON lived a dynamic and unpredictable life, alternating between periods of quiet reflection and violent outburst."

Violence was ISON's fate. "Tragically, on November 28, 2013, ISON's tenacious ambition outweighed its ability," Battams writes, "and our shining green candle in the solar wind began to burn out."

While the world may have lost a new friend, Battams notes that we should not despair for our loss, seeing as how ISON is "Survived by approximately several trillion siblings."

Flowers or other mementos of grief should not be offered to assuage the grief of those siblings, Battams suggests. "In ISON's memory," he writes, "donations are encouraged to your local astronomy club, observatory or charity that supports STEM and science outreach programs for children."

Ave atque vale, ISON. We hardly knew ye. ®

High performance access to file storage

More from The Register

next story
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
KILLER ROBOTS, DNA TAMPERING and PEEPING CYBORGS: the future looks bright!
Americans optimistic about technology despite being afraid of EVERYTHING
R.I.P. LADEE: Probe smashes into lunar surface at 3,600mph
Swan dive signs off successful science mission
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.