Feeds

El Reg's LHC visit - Deleted Scenes

'An impossible machine that could not be built'

Secure remote control for conventional and virtual desktops

The Large Hadron Collider - the gigantic underground double-barrelled particle cannon assembled by top boffins deep beneath the Franco-Swiss border - is to start up again "around the 20th" of this month. Not only is the LHC tremendously cool (quite literally) in its own right, it's also the focus of a global hypercomputing grid of tremendous potency, giving us an excuse to go and visit it this week.

The control board at the LHC

Do not spill your tea on this.

Sadly the Collider is now largely chilled down to firing temperature, and parts of it are already having test beams fired along them, so it's now pretty difficult for visits to get down into the various underground caverns and tunnels containing the actual good bits. Even the CERN boffins have to undergo a retina scan to get down there now, we were told, for security and radiation-safety reasons. ("It has to be a live eyeball, too", according to our hosts.)

As a result we don't have any first-hand pics of the underground bits. Nor did we manage to sneak down there anyway, get zapped by a freak blast of krenon-rays or something and acquire mysterious mutant powers or turn green and swell into a enormous monster journalist able to crumple up impertinent press officers like paper cups.

Internet Security Threat Report 2014

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.