Skip to main content

We Saw It Coming: Dinky Asteroid Hits Earth, Burns Up

We Saw It Coming: Dinky Asteroid Hits Earth, Burns Up

// 
For only the second time in history, an asteroid has hit Earth that was discovered hours before impact. But don’t panic! The asteroid didn’t put a city-sized divot in our planet, it most likely burned up somewhere between Africa and South America over the Atlantic Ocean at midnight EST.
Asteroid 2014 AA, the first asteroid discovery of the year, was spotted by astronomers using the Mt. Lemmon Survey telescope in Arizona. As shrewdly pointed out by Bad Astronomer Phil Plait, the asteroid was the approximate size of a couch — measuring only a couple of meters across. That’s around one-half of a Mini Cooper, whichever takes your fancy. But whatever your preferred size comparison, the outcome was likely the same; the asteroid burned up on atmospheric entry as a meteor.
This might have provided a nice visual spectacle only a day after New Years, but 2014 AA is notable as being the first pre-impact discovery of an asteroid since 2008.
“2014 AA was unlikely to have survived atmospheric entry intact, as it was comparable in size to 2008 TC3, the only other example of an impacting object observed prior to atmospheric entry,” said a Minor Planet Electronic Circular announcement.
In 2008, 2008 TC3 was discovered hours before it disintegrated over Sudan. Knowing the precise time of impact and its approximate geographical location, meteorite hunters were able to find fragments of the fireball strewn over the desert. This was the first time an asteroid had been discovered, impact location predicted and fragments recovered from that location.
Although it’s unlikely that fragments from 2014 AA will be recovered from the ground (as the most likely region of reentry was off the western coast of Africa), this is a stunning achievement by asteroid hunters who were able to detect a tiny (and very faint) object approaching Earth and forecast the time and approximate location of impact.
As we learned from the Russian meteor event nearly a year ago, even comparatively small asteroids can wreak havoc if they slam into the skies over populated regions, so the techniques being developed to detect incoming space rocks could help us prepare — or even evacuate — a city if necessary.
After all, it’s not a question of if we’ll get hit again, it’s a question of whenand near-Earth asteroid surveys are our first line of defense.

Comments

As many people apply for for latest government jobs along with involving in startups and research this site helps them a lot with the exact information with its reliable content.
tamilnadu government jobs

Popular posts from this blog

Proxy list

* http://www.proxy4free.com * http://www.publicproxyservers.com * http://www.anonymitychecker.com * http://www.proxz.com * http://www.digitalcybersoft.com/ProxyList/ * http://www.checker.freeproxy.ru * http://tools.rosinstrument.com/proxy/ * http://www.samair.ru/proxy/ * http://www.multiproxy.org/anon_proxy.htm * http://www.atomintersoft.com/product...xy/proxy-list/ [/b]

Useful & Valuable Sites

For Urgent Blood Requirements call +91888704898 Learn online Udemy Coursera Khan Openculture W3Schools Buy online Flipkart Amazon Myntra shopclues freekaamaal Online App Ajio Craftvilla Mirraw Limeroad Voonik Travel Booking Railway Paytm Redbus goibibo Trivago Sales OLX Justdail Quikr carwale 2ndhandbazar Jobs Search Bank Jobs BJS Glassdoor LinkedIn Freelancer S/W Downloads Filehippo Softpedia Download.com SourceForge BrotherSoft Flight Booking Qatar Singapore Makeytrip goindgo Emirates Status Enquiry Passport Panind Aadhar voter PF Yoga Acupoints Acupuncture Prachina Yoga Ayurveda Learn Cloud AWS Azure IBM VMware Redhat Search Engines Google yahoo amazon dogpile aol
Top 10 Most Common Cyber Attacks Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. Unlike attacks that are designed to enable the attacker to gain or increase access, denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s enough to have the satisfaction of service denial. However, if the attacked resource belongs to a business competitor, then the benefit to the attacker may be real enough. Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking, which I’ll describe later. There are different types of DoS and DDoS attacks; the most common are ...