Feeds

Large Hadron Collider briefly back on over weekend

Halting start to 2010 proton billiards season

SANS - Survey on application security programs

The Large Hadron Collider (LHC), mightiest particle-masher ever assembled by the human race, briefly circulated its first hadron beams of 2010 at the weekend. However the vast machine has now been shut down again to remedy further technical snags.

Following last week's unfortunate multi-magnet quench incident, which saw large sections of the LHC's 27km forcefield conduit blink offline just as boffins were about to start powering particles around it, a new redline was painted on the dials in the control room. It had been hoped that beams would fire up on Friday, but in the event there was no success until the early hours of Sunday morning.

Even as the world's media noted that beams were back up, however, a "cryo intervention" was declared and beaming ceased. As this report is written, the LHC's subterranean tunnel circuit is cleared for people to enter (nobody is allowed down there when beams are up - access doors have retina-scan locks, and "it has to be a live eyeball", according to our control-room sources).

The latest estimates say that the rectification and recovery to supercold operating temperatures is expected to take until 5 or 6 o'clock this evening Swiss time.

It looks as though it may be a while before the Collider team can get the insanely complex machine back up to the record-breaking collision intensities seen late last year - and then onward to the planned 7 Tera-electron-Volt matter-mangling expected later this year. The LHC was designed to be capable of firing two even more outrageous 7 TeV beams into each other for an ultimate collision energy of 14 TeV, but following previous superfluid explosion disasters engineers now consider that a major refit will be required before such power levels are safe. ®

3 Big data security analytics techniques

More from The Register

next story
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
So, just how do you say 'the mutt's nuts' in French?
Vital linguistic question interrupts LOHAN spaceplane mission
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
STEALTHY NANOROBOTS dress up as viruses, prepare to sneak into YOUR BODY
Cloaking techniques nicked from viruses tackle roadblocks on way to medical frontier
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.