Skip to main content

Hubble’s deep field images of the early universe are postcards from billions of years ago


This insignificant patch of sky in the fairly obscure constellation of Fornax is the setting for one of the most remarkable images ever captured. Although only a fraction of the full moon in size, this image traces thousands of distant galaxies to the edge of the observable universe.
The Hubble Space Telescope began observing “deep fields” in 1995. The idea was not new – astronomers have always tried to take longer photographic captures that draw in more light to reveal ever more faint and distant objects. Observing more distant galaxies sheds light on how they form, and how their shapes and sizes change over time. Hubble’s key advantage is that, floating in orbit, it’s unaffected by the blurring effect of the atmosphere and so can provide images of far superior resolution than ground-based telescopes.
Careful planning was required for the deep field images. An “empty” piece of sky was needed that contained no bright sources of visible light that might drown out fainter objects. There could also be no bright sources at other wavelengths, such as X-ray or radio waves where complementary supporting observations might be made. The direction chosen was away from the millions of faint stars and dust of the plane of our own galaxy, the Milky Way.
This was not without risk, however. Hubble was, and still is, a hugely popular, world-class research facility. It is typical that demand for Hubble’s instruments outstrips availability by six or seven times. There was always the possibility that the 10 days observation required might reveal the carefully-chosen blank part of the sky to be just that: blank.

Comments

Popular posts from this blog

Disney Discovers How To 3D Print with Fabric

We have seen 3D printers produce objects from plastic and even metal. But the Magic Kingdom is living up to its name with the announcement that it has designed a 3D printer capable of printing with fabric. A group of researchers at Cornell University, Carnegie Mellon and Disney Research unveiled the invention in a paper last weekend. According to the researchers, the device is capable of forming precise, but soft and deformable 3D objects from layers of off-the-shelf fabric. Among the objects the research team produced were a fabric bunny, a Japanese doll, a touch sensor made of fabric, and a smartphone case with an embedded conductive fabric coil for wireless  power   reception. Touch-Sensitive, Wireless Power To form each object, the printer uses a single sheet of fabric to create each layer of the object. The printer cuts this sheet along the 2D contour of the layer using a laser cutter and then bonds it to previously printed layers using a heat sensitive adh...

Top Link Shortening Websites to Make Money Online

While there are many ways to make money online, I believe making money by URL Shortening is one of the best for newbies. Just shorten URL, people click on it and you make money. Quite fantastic, isn’t it? Today I am going to present before you the top legit URL shortening website that you should choose to make money online. I have taken care of many factors before ranking them, like Page Rank, Alexa Rank, My Experience etc. I’ll keep on updating the list when it is needed. Before jumping to the Shorteners I would like to explain the factors on which ‘Top Legit Shorten URL and Make Money Online Sites’ list is based: Page Rank:  Page Rank is the one factor that Google uses to rank websites on their search results. Page Rank of a site can be anything between 0 and 10. Page Rank is generally given on the basis of quality of site and backlinks it has got. Alexa Rank:  Alexa Rank shows the relative popularity of website over internet. Less is the Alexa Rank, more the si...

10 Ways To Prevent Your Mac From Being Hacked

Information protection is now scrutinized in all commercial and government industries. Theft of information has crippled many organizations and businesses. One of the main reasons information is lost, corrupt, or stolen is because many industries have not fully adopted it as a risk, and have yet to implement strong quality assurance policies and programs. Some of the most common risks are because of unattended computers, weak passwords, and poor information management practices. Hackers look for the weakest target and tunnel into a business from easy sources, like tablets or cell phones. Using smart encryption software can remediate this threat and vulnerability, making it difficult for competitors or rookie hackers to penetrate your device. However, software alone is not enough to prevent Macs from being hacked. It is the Mac user who has the authority and resources to save it from potential penetration.  The top 10 ways to prevent your Mac from being hacked  is ...