Feeds

Large Hadron Collider to fire up again next Thursday

LHC-fearing tinfoilers braced for dimensional invasion

Bridging the IT gap between rising business demands and ageing tools

Exclusive The Large Hadron Collider (LHC), most powerful particle-smasher ever assembled by the human race and possible portal to other dimensions, is to fire up its beams following the Xmas break in a week's time.

Official spokesmen for international particle-punishing science alliance CERN have thus far remained cagey about the exact date for the mighty machine's restart, but persons familiar with the matter tell the Reg that the 2010 proton billiards season is set to open on Thursday the 25th.

Our sources suggest that the initial beams will be relatively gentle 450 giga-electron-volt ones, for a mild 900 GeV collision energy. The following few weeks will see the Big Knob turned gradually up until the beams are at 3.5 tera-electron-volts and particles are thus colliding at 7 TeV.

The LHC is designed to go still further to a blistering 14 TeV, but boffinry chiefs fear that cranking it up that high might lead to another electro-blast liquid helium superfluid explosion disaster of the sort which crippled the LHC following its original startup in 2008. The plan is to run it this year at half power, hopefully beating the rival US Tevatron in the race to find the coveted Higgs boson, and then carry out modifications which will allow full-poke operations.

Next week's fire-up will also, of course, be the cue for a large cast of eccentric LHC-fearing doom prophets to clap tinfoil hat on head and dive under the bed - or, in the case of more hardline members of the anti-Collider movement, take more active measures. Our candidate for world champion heavyweight LHC-botherer, the man known simply as "Doctor Dark Energy", says he plans to obtain a nuclear weapon from Osama bin Laden and use it to take out CERN head Rolf Heuer - "and all his bigbangers".

We certainly hope he doesn't manage it: we here on the Reg dimensional-portal desk are looking forward to the advent of visitors from beyond our continuum, as forecast by top CERN boffin Sergio Bertolucci. Even if they are liable to be merely sub-subatomic, ultra-briefly-existing phenomena, rather than the possible teleporting juggernaut-tyrants from the Nth dimension. ®

Mobile application security vulnerability report

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
Microsoft's anti-bug breakthrough: Wire devs to BRAIN SCANNERS
Clippy: It looks your hands are shaking, are you sure you want to commit this code?
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.