recommended reading

Spacecraft blasts off for Jupiter

NASA's solar-powered Juno spacecraft blasted off on its five-year mission to Jupiter on Friday, the first mission launched after the end of the space shuttle program last month and the first representing NASA's new emphasis on unmanned space missions.

Juno will explore the largest planet in the solar system and some of its more than 50 moons. The aim is to learn more about how Jupiter formed and developed, shedding light on how solar systems and planets evolve in general.

NASA argues that these robotic missions are a better use of its resources for the time being, with the work of getting people in and out of space contracted to the private sector.

"The future of exploration includes cutting-edge science like this to help us better understand our solar system and an ever-increasing array of challenging destinations," NASA Administrator Charles Bolden said in a statement.

It will take just a day for Juno to travel 250,000 miles--the distance from Earth to the moon. But it's five more years--1.7 billion miles--to Jupiter. The spacecraft will orbit Jupiter's poles 33 times and use its collection of eight scientific instruments to try to see through Jupiter's thick, swirling cloud cover to see what's underneath.

"Jupiter is the Rosetta Stone of our solar system," said Scott Bolton, Juno's principal investigator from the Southwest Research Institute in San Antonio. "It is by far the oldest planet, contains more material than all the other planets, asteroids, and comets combined, and carries deep inside it the story of not only the solar system but of us. Juno is going there as our emissary--to interpret what Jupiter has to say."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.