MEXICO, DF (Notimex) .- Then came the last day of the year and Google could not keep up with its traditional Doodle, so on this occasion celebrates the culmination of 2015, with friendly colorful birds await the arrival of 2016.
This time, the Internet search engine, is the logo with various birds in their traditional colors as are blue, red, yellow and green, which they hope to give the 12 pm for an egg to break that symbolizes the arrival of 2016.
In Mexico, there are different traditions to celebrate the eve and the arrival of the next year are to use red underwear, to attract love; and yellow, to attract money.
There are also people leaving with a suitcase at the door of his house and cross the street where they live with the belief that traveling during the coming year.
Another tradition is the belief of giving sheep and put them behind the door of the house to attract money, and also thought that the pyramid-shaped bend one dollar bill and put it in the portfolio brings good luck to always have sufficient funds
Microsoft said it will begin to warn users of its e-mail service Outlook , when you suspect that a government has attempted to illegally access their accounts.
The technology giant reported the measure through a statement, nine days after Reuters asked the company why it decided not to inform victims of a campaign of cyber attacks, discovered in 2011, which was directed against international leaders of the Tibetan and Uighur minorities in China in particular.
According to two former employees of Microsoft , experts from the company’s own concluded several years ago that the Chinese authorities were behind the campaign, but the company decided not to submit such information to users of its Hotmail service, now called Outlook.com.
In its statement, the company said both the company and the US government could not identify the sources of cyber attacks and that they did not come from a single country.
The change in company policy world’s largest software, comes after similar measures adopted in October by the Internet giants Facebook, Twitter and recently by Yahoo.
Google, which implemented this policy in 2012, said he now alert to tens of thousands of users every few months. For their part, d uring two years, Microsoft has offered warnings about potential security breaches without specifying the possible suspect.
In the statement, Microsoft said that “because the threat landscape has evolved, our approach also has done and we now go beyond . notifications and guidelines to specify if we reasonably believe that the attacker is ‘sponsored by a State’ “
Federal District – Thousands of users in America, Europe and Asia have failed to connect, send and receive messages through instant messaging application WhatsApp
. According to reports portals monitoring app, failures presented in the service are affecting thousands of users around the world.
The service provided failures this morning, was moderately restored for about 45 minutes, and then return to ‘fall’.
Hundreds of users have complained via social networks before the inconveniences of service.
On Twitter, the hashtag #Whatsapp remains Trending Topic, through it, people give testimonials and share memes and jokes about the application.
A spokesman told the British newspaper Mail Online that are already “working to restore service to 100% for all the world “and offered an apology for” the inconvenience “.
A few hours after the end of the year, the main concern is not being able to send or receive messages of congratulations.
users report using iMessage when Whatsapp Telegram and stops functioning, position the two services between trends on the Internet.
The official accountWhatsApp has not published anything about the problem.
WhatsApp has more than 700 million active accounts; in addition, over 30 billion messages are sent every day through the application.
comments section They pour above are the responsibility of the participants. Help us to maintain a healthy exchange of ideas, denounced by a “click” on the flag icon, each entry it deems inappropriate. If the comment does not comply with RULES , will be removed. Click here for the rules .
Welcome to our feedback service. We invite you to analyze, comment on and question the articles and reports published by El Diario. To maintain a healthy exchange of ideas to all our users, we need to follow the rules that we detail below. By participating in the feedback service you accept the application of these rules.
You agree that you are fully responsible for the content that you post.
Do not intentionally publish content that violates the copyright, trademark, patent or other intellectual property right of a third person.
No disseminate defamatory, obscene or aggressive that violates the right of a third person to privacy according to municipal, state, federal or even international or is deemed inappropriate. It indemnify Publications Paso del Norte (*), its employees and affiliates of each and every one of the claims and / or damages (including, but not limited to attorneys’ fees) that are submitted by third parties in relation to the content you published. He did not write content that discriminate against others because of their gender, race, ethnicity, nationality, religion, sexual orientation, disability or any other category.
You understand and agree that The Journal is not responsible for content posted by third parties. it is his understanding that the discussion forums, El Diario published oversees the content and reserves the right to remove, edit or alter content that seems inappropriate for any reason without consent of the author . We reserve the right according to our own discretion to withdraw a user the right to publish content on our site.
You understand and agree that the discussion forums should be used for non-commercial purposes. request resources or financial support. It will not promote commercial enterprises or perform any commercial activities in our discussion forums.
You understand and agree that the use of any information obtained through the discussion forums at your own risk. El Diario in no way endorses the broadcast content users, and it can not be made responsible for its accuracy.
With every content that you post, given to The Journal without paying royalties irrevocable, perpetual, exclusive and fully sublicensable license to use, reproduce, modify, adapt, publish, translate, create derivative works from, distribute, perform and display such content in whole or part worldwide and to incorporate them in their work in any way now known or hereafter developed.
The administration of social network Twitter issued a statement on Wednesday via his Official blog under which warn users about the latest changes in regulations regarding abuse and harassment against the social network with more than 320 000 000 active users.
So The social network said the rise in investment application area of your policy as well as new rules to establish clearly what is considered “abusive behavior and obnoxious behavior.”
Also, social network also takes the opportunity as a response to criticism that does not do suficienta to contain propaganda of violence and terrorism. Thus, Twitter said to be blocked (temporarily or permanently, depending on the case) accounts of those who commit “violent threats (direct or indirect),” which also includes “incitement to terrorism” .
After the attacks in San Bernardino, California, where 14 people, US congressmen died again proposed that social networks like Facebook and Twitter have to report, on a mandatory basis, this terrorist activity among their users to the authorities
A team of researchers from Japan’s Riken Center confirmed today that it has identified the 113th element of the periodic table, synthetic character and the provisional name uruntrio.
In a statement, the Japanese government institute the discovery of the new element was awarded, the finding dispute with a group of Russian and American researchers has conducted parallel investigations group.
The results of research conducted by the Riken will be published in the January issue of the Journal of the International Union of Pure and Applied Chemistry (IUPAC), the highest authority in this field, and responsible for determining the authorship of the discovery.
If the IUPAC confirmed that the Japanese team was the author of the decisive experiments for the discovery, it will have the right to give the official name of the new element of the periodic table.
The Russian-American team was the first to announce the discovery of element 113 in 2003, although the Japanese center claims to have compiled in 2012 conclusive data to confirm its existence.
The new synthetic element has 113 protons in its nucleus, and has been identified by a team led by Kosuke Morita Japanese scientist, University of Kyushu (southern Japan).
Morita has succeeded in synthesizing the element on three occasions by a method comprising colliding ions zinc on an ultrathin layer of bismuth.
“Now that we have demonstrated conclusively the existence of element 113, we plan to further investigate the uncharted territory of element 119 and beyond “Morita said in the statement.
” One day, we hope to reach the island of stable elements, “the Japanese researcher.
The synthetic elements not naturally occurring and artificially generated through experiments, and so far has created 24 such elements-including the plutonium, although they are unstable, he recalled the Riken.
Think two times before publishing. You hang no longer deleted. It is the message that launches the National Cyber Security Institute (Incide) in Spain, through its deputy director of operations, Marcos Gomez, speaking to ABC.
The council should not fall on deaf ears, since the data of the Institute, which manages the Internet User Security Office, and realize that more than 5% and up to 10% of youth 16-34 years in Spain lose a job opportunity for misuse that make social networks. They spend the holidays with friends invoice, and numerous photos hanging on drunken situation, for instance, or offensive and rude.
In the end, we are all slaves to our words. You always published what he wants without thinking that can have consequences, but we must be aware of the risks, says Esteban Mucientes turn, vice president of the Spanish Association of Online Communities (AERC).
The last case of someone their digital identity has played a trick is to Sergi Guardiola, a football player signed and struck template for Barcelona B in just eight hours. The young man apologized yesterday called Manacor Catalonia and Barcelona for hurting their sensitivity after “a friend” He escudó- use his personal account in the network micromensajes Twitter to post comments about anything appropriate that in the end have him served the termination of a contract.
It was a teammate, Toni Alcover, according to his version, who recorded in 2013 in his “timeline” or string of messages posted some comments against which has proved its contracting club in 2015 and praising the eternal rival. It whomsoever, it was his profile. Experts recommend having as Mucientes digital presence, while responsibly managing networks and common sense, without taking advantage of the anonymity that the Internet provides. Specialists always put a very simple example. Do not post on the Web that you would not be able to say out loud to the recipient
There are at least three strong reasons to believe that the phenomenon of the current El Niño will be as “big and powerful” as the considered worst history, 1997 and 1998.
related to the high temperatures of the ocean surface, the soaring temperatures in the northern hemisphere and that this year “El Niño shows no signs of retreat” Indicators, according the satellite images from NASA available.
For all this, the US space agency considers this 2015-2016 comparable to what many called the “ monstrous phenomenon ” 18 years ago.
“There is no doubt, are very similar. The events of 1982-1983 and 1997-1998 were the most impact in the previous century and in many ways it seems now we see a repeat “ told BBC News NASA expert William Patzert.
The research, analysis specialist weather events related to ocean circulation and air added this time “ is almost certain that the impact will be enormous .”
1. Oceans grown
Alturas much higher than the usual level in the Pacific Ocean are an indicator that there is a thick layer of hot water.
In both maps, generated by satellite, is see “classic pattern” phenomenon when almost or fully developed.
NASA called it “surprising” to the similarity in height anomalies recorded in December 1997 and 2015.
What you see on the graphs are the unusually high levels in the Pacific Ocean off the line of Ecuador.
The hot water and tibia that has accumulated in the area is what attracts the clouds and storms that have begun to occur in parts of Latin America, mainly in countries below the line of Ecuador.
Another consequence is the low level of rainfall in Southeast Asia, which contributed to the proliferation of large fires that have covered in smoke to the region a few weeks ago.
The heat in the Pacific region in 1997 was one of the weather phenomena that generated floods rarely seen before in countries like Bolivia, Paraguay, Peru, Argentina and Brazil in that year and the next.
The similarities in ocean temperature in both periods also it has remarkable similarities.
2. No decreases
El Niño is a natural phenomenon that occurs every two to seven years when the warm waters of the central Pacific Ocean expands eastward, closer to the shores of America.
usually reaches its most acute phase later this year but its effects are felt throughout the northern hemisphere spring and can last up to 12 months.
However, as NASA says The phenomenon this year is showing no signs of dissipating.
That’s “the signature of a great and powerful El Niño” , said NASA.
3. High temperatures
Patzert told BBC News that global warming currently facing the planet is a new factor influencing the nature and effects of El Niño.
“The planet is warmer now, that’s an important fact. A warmer planet generates more dangerous consequences, more extreme events, “the analyst NASA.
Numerous studies reported that climate change may exacerbate temperatures extreme periods like El Niño or La Niña.
Patzert said that the effects of El Niño are felt in the United States between January and March.
This year we are experiencing much higher temperatures than usual in the hemisphere north.
On Christmas Day in France, a historic record was just below that of 1997.
And even at the North Pole, where the December 30 is estimated the temperature has been above 0 degrees Celsius, when normal is -25 ° C.
In contrast, in Mexico, El Niño seems responsible for some unusual storms that have snowy north from the country. There is snow in parts of Sonora for the first time in 33 years.
In South and Central America, he says the researcher, the effects have already seen heavy flooding in recent weeks and will last at least three months.
Not all bad news, highlights Patzert.
The scientist said that despite the pronósiticos, there is more infrastructure and scientists to make more and better forecasts for the arrival of climate phenomenon progress.
However, it is likely that the consequences of El Niño will last through most of next year in the form of floods, epidemics or prolonged drought. . Primarily in South America
In one of its publications about NASA contudente reached a conclusion: “No matter where you live, feel the effects of El Nino”
However, A35 focuses on low power consumption, and not on functionality medical or health monitoring can sue in such a device. Pursuing the latter, Samsung has launched an all in one bioprocesador medical variables to measure.
With the new bioprocesador highlights again the importance of wearables as a priority platform for the present time.
In November, together with the presentation of the new sensor BRITECELL explained what would an integrated bioprocesador, and now take the step of releasing. With him pursue streamline wearables, but also more capable and specialized, as we have seen in the sensors that began incorporating smartphones, designed for a long time exclusively for them. The new bioprocesador is the first in the industry that allows you to monitor up to 5 different biometric values, can measure body fat, stress level, skin temperature, skeletal muscle, heart rate and heart rate.
On the other hand, it also integrates microcontroller, power management integrated circuit, processor and digital signal AFE. The bioprocesador occupies only 25% of what they take all the parts separately, making it especially useful for the market to which it is addressed, the wearables. Therefore, there are several test drives wearables platform to demonstrate its capabilities and versatility in the market, such as bracelets or medical professional measurement patches. The bioprocesador Samsung is already in production and will arrive intregrated devices to market in the first half of 2016, so it would not be unusual to see a demo at Mobile World Congress
The first in-depth analysis of the operating system used by computers North Korea reveals spy tools capable of monitoring even the documents executed when the device is offline.
The Red Star operating system was designed to look superficially OS X from Apple, but has hidden features that allow you to mark files and link them to a specific individual.
The tools They were discovered hidden Grunow and Niklaus Florian Schiess, two German researchers who conducted the analysis last month. The researchers reviewed in detail the code of Red Star 3.0, which appeared online a year ago operating system.
According to the BBC said Grunow, system developers “made a very good job “to copy the look of basic design and functionality of the Apple computers.
The above OS North Korea was more like Windows. (Photo: Reuters)
But they put a special added: any file uploaded to the system using a USB or other storage device can be marked disk, allowing you to State follow its path from one machine to another
Red Star may further identify unwanted files and delete them without authorization
-.. A very sophisticated system –
Grunow explains that the function to mark and trace files was designed in response to the proliferation of films and foreign music being shared offline.
“That allows to have a record of when a document was opened for the first time at the Red Star operating system and by whom. It basically allows the state to track the file “he says.
The system will mark the files with numbers individual serial, although it is not known how easy it is for the State to link those numbers serially to a particular user.
“What we have seen is the basic system for marking files, but found no evidence of the existence a widespread mechanism that is much more sophisticated and has a different cryptography “he says.
The experts do not know exactly which computers installed in North Korea its new system operating. (Photo: AFP)
“It could be that the file corresponds to your individual brand and they link it in their registration with you, allowing them to track specific individuals “.
Red Star is set to make nearly impossible for users to modify the system. Attempts to disable your antivirus software or firewall Internet make the system restarts
-. A brand for freedom of expression –
idea of creating an internal operating system was initially conceived as Grunow, Kim Jong-il, who led the country between 1994 and 2011.
“He said North Korea should create its own operating system that’s what we’ve done, “Grunow said.
” If you look at North Korea you see that Red Star is similar to the way the state functions. It is very controlled, they are much focus on integrity system and have mechanisms to track users, “he said.
As with many other things in the most isolated country in the world it is unknown how used in the Red Star system in North Korea. Grunow considered likely to be installed in libraries and other public buildings, where computer use is decided by the state.
Red Star was built using Linux, a free platform and open source can be freely modified by users and it was designed that way to make it as accessible as possible.
So to Grunow is an irony in the use that has given North Korea .
According Grunow, the idea of developing a proprietary operating system was Kim Jong-il’s father, Kim Jong-un. (Photo: Getty)
“They are using a system that was built to promote freedom of expression and use it improperly for marking and tracing freedom of expression” says.
More ironic still is the file name used by Red Star to pursue suspicious files on the machine.
“The file you are and that is used by the system Angae antivirus called. That means mist or fog that obscures something that is not transparent. We have no idea why they chose that name, but it is appropriate, right? “he says.
The South Korean company Samsung Unveils Bio-Processor, which unites in a single chip up to five sensors for wearables .
Samsung announced from its official website (in English) the creation of A bioprocesador that links five sensors for measuring health and medical characteristics in wearables Sport . This unique bioprocesador being produced today and will not be marketed before June 2016.
Samsung Bio-Processor has several improvements in its architecture that allow you to be market the first monitor simultaneously up to five different variables : heart rate, body fat, temperature skin, skeletal muscle mass and stress level. The union of these five sensors, which are usually present separately, enables bioprocesador occupy only 25% of the space that would be used to dispose of them all individually . This volume reduction leads to greater comfort for the sportsman, although the wearables in this bioprocesador will also include devices including for health. The hardware of the Samsung Bio-Processor is completed with the presence of a digital signal processor, microcontroller and power management circuitry.
The technological development of the wearables continues to advance rapidly, especially in the sporting arena. This enables not only large companies like Samsung committed to innovation, but also come about as Pivot business initiatives, the wearable intended for players.
The first in-depth analysis of the operating system used by computers in North Korea reveals spy tools capable of monitoring even the documents executed when the device is offline.
The Red Star operating system was designed to superficially resemble Apple OS X, but has hidden features that allow you to mark files and link them to a specific individual.
Hidden tools were discovered by Florian Schiess Grunow and Niklaus, Two German researchers who conducted the analysis last month.
Schiess Grunow and presented their findings Sunday at the “Chaos Communication Congress”, a conference held in Hamburg with security experts , cryptography, privacy and freedom of expression.
The researchers reviewed in detail the code of Red Star 3.0, which appeared online a year ago operating system.
According to the BBC said Grunow, system developers “did a very good job” to copy the look of basic design and functionality of the Apple computers.
The above OS North Korea was more like Windows.
Peo they put a special added: any file uploaded to the system using a USB or other storage device can be marked disk, which allows the State to follow its path from one machine to another
Red Star can also identify and delete unwanted files without authorization.
A very sophisticated system
Grunow explains that the function to marking and tracing files were designed in response to the proliferation of films and foreign music being shared offline.
“That allows you to have a record of when a document was opened for the first time at the Red Star operating system and by whom. It basically allows the state to track the file “he says.
The system will mark the files with individual serial numbers but not know how easy it is for the State to link those numbers serially to a particular user.
An item that still has puzzled researchers is the discovery of an extended version of the software that allows mark the files and that they have failed to fully understand, but Grunow think you can help identify users individually.
“What we have seen is the basic system mark the files, but found no evidence of the existence of a widespread mechanism that is much more sophisticated and has a different cryptography, “he says
Experts do not know precisely how computers North Korea has installed its new operating system.
“It could be that the file corresponds to your individual brand and they link it in their registration with you, allowing them to track specific individuals”.
Red Star is set to make nearly impossible for users to modify the system. Attempts to disable your antivirus software or firewall Internet make the system restarts.
A mark to free speech
The idea of creating a internal operating system was initially conceived as Grunow, Kim Jong-il, who led the country between 1994 and 2011.
“He said North Korea should create its own operating system and that’s what they’ve done, “Grunow said.
” If you look at North Korea you see that Red Star is similar to the way the state functions. It is very controlled, they closely focus on system integrity and have mechanisms to track users, “he said.
As with many other things in the most isolated country in the world is unknown how used in the Red Star system in North Korea.
Grunow considered likely to be installed in libraries and other public buildings, where computer use is decided by the state.
Red Star was built using Linux, a free and open source platform that can be freely modified by users and it was designed that way to make it as accessible as possible.
Therefore, to Grunow is an irony in the use that has given North Korea.
“They are using a system that was built to promote freedom expression and improperly used for marking and tracing freedom of expression, “he says.
More ironic is still the name of the file used by Red Star to pursue suspicious files on the machine.
“The file you are and that is used by the antivirus system is called Angae. That means mist or fog, something dark and it is not transparent. No ? We have no idea why they chose that name, but it is appropriate, right, “adds
The first in-depth analysis of the operating system used by computers in North Korea reveals spy tools capable of monitoring even to documents executed when the device is offline.
The Red Star operating system was designed to look superficially at Apple’s OS X, but has hidden features that allow you to mark files and link them to a specific individual.
The hidden tools were discovered by Florian Schiess Grunow and Niklaus, two German researchers who conducted the analysis last month.
Grunow and Schiess They presented their findings Sunday at the “Chaos Communication Congress”, a conference held in Hamburg with security experts, cryptography, privacy and freedom of expression.
The researchers reviewed in detail the system code Red Star OS 3.0, which appeared online last year.
According to the BBC said Grunow, system developers “did a very good job” to copy the look of basic design and functionality Apple computers.
Peo they put a special added: any file uploaded to the system using a USB or other storage device can be marked disk, which allows the State to continue its path from one machine to another .
Red Star can also identify and delete unwanted files without authorization.
A system very Sophisticated
Grunow explains that the function to mark and trace files was designed in response to the proliferation of films and foreign music being shared offline.
“That you keep track of when a document was first opened in the Red Star operating system and by whom . Basically, it allows the state to track the file “he says.
The system will mark the files with individual serial numbers, although it is not known how easy it is for the State to link those numbers serially to a particular user.
An element that still has puzzled researchers is the discovery an extended version of software that allows you to mark files and that they have failed to fully understand, but Grunow think you can help identify users individually.
” What we have seen is the basic system for marking files, but found no evidence of the existence of a widespread mechanism that is much more sophisticated and has a different cryptography “he says.
“It could be that that file corresponds to your individual brand and they in registration link it with you, allowing them to track specific individuals “.
Red Star is set to make nearly impossible for users to modify the system. Attempts to disable your antivirus software or firewall Internet make the system restarts.
A mark to free speech
The idea create was initially conceived internal operating system, according to Grunow, Kim Jong-il, who led the country between 1994 and 2011.
“He said North Korea should create its own operating system and that is what they have done, “Grunow said.
” If you look at North Korea you see that Red Star is similar to the way the state functions. It is very controlled, they are much focus on system integrity and have mechanisms to track users, “he said.
As with many other things in the most isolated country in the world it is unknown how used in the Red Star system in North Korea .
Grunow considered likely to be installed in libraries and other public buildings, where computer use is decided by the state.
Red Star was built using Linux, a free and open source platform that can be freely modified by users and it was designed that way to make it as accessible as possible .
So to Grunow is an irony in the use that has given North Korea.
“They are using a system that was built to promote freedom of expression and improperly used for marking and tracing freedom of expression “ said.
More ironic is still the name of the file used by Red Star to pursue suspicious files machine.
“The file you are and that is used by the antivirus system called Angae. That means mist or fog, something dark and it is not transparent. We have no idea why they chose that name, but it is appropriate, right? “he says.
The comets approaching Earth on dates close to Christmas are an added attraction. Irresistible remember the star of Bethlehem and on the other hand, the doomsayers are to visit a new opportunity to predict misfortunes and evils of all kinds on 2016. In fact, these days the comet that roams the Earth does not announce nothing either good or bad, with the exception of his own presence, is fascinating, of course, but not beyond the astronomical point of view.
This is the comet C / 2013 US10, better known like Catherine, who is due to name observatory in Arizona (USA) since it was first seen a couple of years ago. From the Oort cloud, within the confines of the solar system, he suffered a gravity boost produced by the passage of a nearby star that rushed him to our neighborhood. This space traveler reached its closest approach to the Sun, called perihelion, on 15 November. Then it moved at a speed of 166,000 km per hour between the orbits of Earth and Venus. He will not pulled too our star. On November 23 became a visible object in the, albeit somewhat more subdued northern hemisphere than expected.
Those who have not yet had the opportunity to locate in the sky will find it easier Eve and New Year. The last day of the year, the comet will approach Arturo, the brightest for the inhabitants of the northern half of the planet star and an excellent reference for amateur astronomers. To take a look, experts recommend using binoculars EarthSky magazine, away from the city lights and make the observation when the Moon is waning in the sky before dawn.
A Simple view
From the first week of January, coinciding with the decline of moonshine (the new moon on January 10), the viewing conditions are optimal. The comet will be visible from midnight to sunrise. From the Canary Islands Astrophysics Institute (IAC) recommend using a star chart to locate your position, as it varies each day because of its orbital motion. The latest predictions say that the kite can reach an apparent magnitude of about +5 (visible to the naked eye) in mid-January. Then it will be located near the Big Dipper, between Mizar and Alkaid stars
Catalina is spectacular. Its tail, which is twofold, measuring 800,000 km long and the core, between 4 and 20 km. Of course, with binoculars it is much more modest. It appears as a small hazy patch and you can barely glimpse of the queues. If you are lucky enough to have a good telescope by hand, the observation will be much better, but it will be very difficult to appreciate the green color of the comet’s coma, or atmosphere, notified in EarthSky. That flashy glare, caused by gases rock, it can be detected by the cameras, which are more sensitive than the human eye.
On January 17, the Catalina rock will reach its closest point our planet, but there is no reason to worry. Its orbit lies about 110 million km away, hundreds of times farther than the distance of the Moon. It has a hyperbolic orbit, which means that we will not see it. It will leave the planetary region of the solar system in a matter of decades and never return. The IAC said in a statement that this vagabond information carries in her womb the genesis of our solar system, and only have two months to try to meet him.
The next comet is expected to be easily visible glance is the 46P / Wirtanen, which come during Christmas 2018. That’s if there is not some unknown spontaneous, because the sky is always full of surprises
A new comet ‘Lovejoy’ will approach the Earth in the next few weeks, as reported by the Institute of Astrophysics of the Canary Islands (IAC). Specifically, the rock will reach its perigee (its closest point to Earth) on January 17, reaching 108 million kilometers.
Just a year ago that ‘Lovejoy’ offered its spectacle in the sky. Now another comet, they have called ‘Catherine’ visits the planet with the beginning of 2016.
Experts have explained that Catalina is a special kite and very interesting from an astronomical point of view for several reasons. It is a new comet that resided in the Oort Cloud, a spherical cloud surrounding the solar system at a distance of sunlight year, due to a “gravity boost” produced by the passage of a nearby star is It precipitated the inner solar system.
The dynamic calculations indicate that it has passed its perihelion at high speed, therefore, escape the solar attraction deep into interstellar space. Scientists define it as “a vagabond who carries in her womb information genesis of our solar system.” From Earth only they have two months to try to meet him.
A campaign was organized like watching for the passage of ‘Lovejoy’. Thanks to the images obtained from the Observatorio del Teide (IAC) now know, for example, that the day of the comet Lovejoy lasts approximately 18 hours.
As for Catalina, which was discovered in 2013 Scientists point out that this is the first time you visit the Solar System and the latest estimates indicate that it has a hyperbolic orbit, therefore, will only its way to the Sun once. Catalina will leave the solar system after passing through the perihelion (closest approach to the Sun).