Mars rover Curiosity sends images, video
- 07 August, 2012 13:59
A short, low resolution video captured the final minutes of Mars rover Curiosity's descent onto the planet. At the beginning of the clip the 15-foot wide heat shield can be seen separating from the capsule carrying the rover.
The images were recorded by the Mars Descent Imager, or MARDI, and pieced together at four frames per second to detail the final two and a half minutes of the rover's descent. According to NASA, the images needed to be reduced by a factor of eight in order for them to be sent back to Earth quickly. Higher resolution images (1600 by 1200) will be beamed to Earth in the coming months.
During the descent the passing Mars Reconnaissance Orbiter snapped a shot of the rover's supersonic parachute, which was designed to slow it from 900 miles per hour to around 200 miles per hour. The separated heat shield can be seen falling towards the surface.
The rover also sent a picture that shows the north wall and rim of Gale Crater, the section of the planet where Curiosity touched down. The image is murky because the dust cover on the Mars Hand Lens Imager (MAHLI) hasn't been removed. During the descent, dust kicked up by the Sky Crane's rockets coated the lens, but the protective cover will be removed in the coming weeks. MAHLI's main purpose is to capture close-ups of rocks and soil -- it can focus as close as 2.1 centimeters -- but can also focus to infinity, allowing it to capture images like the one of the Martian landscape.
Curiosity's mission on Mars will last about two years and as NASA scientists enable more of the rover's imaging systems, higher resolution photos are expected in the coming days.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Android Malware Exposed
Take an in-depth look at the evolution of android malware. The world of malware targeting the Android OS is similar yet very different from malware affecting Windows. Explore the rapidly evolving world of android malware and shed light on the various techniques used to exploit devices using this OS.
Advanced Targeted Attacks
The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpaced the defensive technologies used by most companies today. Find out more on how to protect against the next generation of cyber-attacks.