Feeds

LHC boffins crank beams to 3.5 TeV redline

'Dump cores' catch and stop moving aircraft carriers

SANS - Survey on application security programs

Big news from the Large Hadron Collider (LHC) overnight. The titanic proton-punisher has once again smashed all records to achieve the most powerful particle beams ever generated by the human race, at energies of 3.5 Tera-electron-volts - the maximum redline power at which the mighty machine can currently be safely run.

Slide from LHC 0830 morning briefing Friday 19 March 2010.

Uncontrolled emotion was shown by the scientists

The LHc narrowly nudged ahead of the planet's second-most-puissant atomsmasher towards the end of last year's proton billiards season, generating 1.18 TeV beams. The rival Tevatron, located in America, can manage only 0.98 TeV: last night's 3.5 TeV beams at the LHC have now moved particle physics firmly into a new league.

The LHC is actually designed to be capable of still more outrageous 7 TeV beams, which can be crossed over almost head-on to produce unimaginably violent particle collisions at 14 TeV energies. However, following the machine's original fire-up in 2008, a blown power connection led to a disastrous liquid helium superfluid explosion mishap which flung multi-tonne magnet pipes about like cardboard poster tubes and crippled the Collider for months.

Following that incident, engineers painted the new half-power 3.5 TeV redline on the Big Dial. The plan is to work within this limit this year, and then strip out and replace all the relevant power connections around the entire 27km underground tunnel which houses the LHC. This will be a long job, so CERN boffins are keen to get in a good run at 3.5 Tev first so as to pile up some data for their mighty supercomputing grids to crunch in the meantime.

It's worth noting that last night saw no actual particle collisions as such. However, in the natural course of things it's not safe to simply switch off the magnets having created such powerful beams. A full 7 TeV beam contains as much energy as a Royal Navy aircraft carrier steaming at 12 knots; thus a half-power 3.5 TeV one like last night's has as much energy as the same huge ship going at 8 knots (kinetic energy being proportional to the square of velocity).

Top three mobile application threats

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
Melting permafrost switches to nasty, high-gear methane release
Result? 'Way more carbon being released into the atmosphere as methane'
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.