Feeds

CERN plans LHC switch-on for May next year

Warm up tests are for wimps

High performance access to file storage

CERN's new particle accelerator, the Large Hadron Collider, will start up in May 2008, the facility's director general announced on Friday last week.

Low energy runs on the LHC were supposed to begin this year, but the project has been beset by niggles, technical hitches and other delays. The catastrophic failure of a magnetic component called an inner triplet, during a pressure test in March was the rather large bale of straw that finally broke the schedule's back.

But rather than miss its original switch-on date, the management has decided to skip the low power runs altogether.

Project leader Lyn Evans explains: "We'll be starting up for physics in May 2008 as always foreseen, and will commission the machine to full energy in one go. There is no big red button when you're starting up an accelerator, but we aim to be seeing high energy collisions by the summer."

Instead of the low energy runs, the new schedule calls for each of the LHC's sectors to be successively cooled and powered over the winter. Earlier this year the first sector was taken down to its operational temperature of 1.9K. CERN says cooling the sector took longer than expected, but that the team should be able to use their experience here to cool the other sectors more quickly.

This should mean the machine is ready for the accelerators to be switched on in the spring. Tests on powering up the cooled segment have already begun, and the cooling of the next segment will start soon.

The LHC is massive: at 27km in circumference, it is the world's largest super conducting installation. It is also massively complex.

When the accelerators are switched on, the team will have a chance to get used to driving the machine with relatively low energy and intensity beams. Only once they have the hang of things will the energy and intensity be increased.

The CERN council also voted to increase funding for the facility from 2008-2011. CERN Director General Robert Aymar described the decision as an important vote of confidence for particle physics in Europe.

He said: "[This increase in funding] allows us to consolidate the laboratory’s infrastructure, prepare for future upgrades of the LHC and to re-launch a programme of R&D for the long-term future." ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.