Feeds

Second Higgs possibility pops up in CERN data

Massive surprise lurks in LHC data release

SANS - Survey on application security programs

Isn’t that just typical? Science waits half a century for a Higgs boson, and when it arrives, just like a bus, a second one is right behind.

That’s the tantalising prospect raised by the most recent release of data from the Large Hadron Collider scientists, who had barely finished celebrating after confirming that they’d spotted the elusive particle.

The Higgs boson was posited as part of the Standard Model as necessary to bestow mass on other fundamental particles – the W and Z bosons – but it took the era of high-powered colliders like the LHC and the now-retired Fermilab Tevatron to produce energies high enough to bring the particle into existence.

It also took a lot of data-gathering, because the Higgs pops its head up in only a few collisions out of millions or billions.

As Scientific American explains, ever since the original Higgs boson announcement, scientists have been reviewing the ATLAS experimental data to try and identify possible anomalies – and they’ve turned up a gem.

Atlas chart of Higgs boson signals

What a surprise looks like: blue plot shows 123.5 GeV signal, red shows 126.5 GeV signal. Source: CERN

There appears to be not one Higgs boson “signal”, but two: one at 123.5 GeV (giga-electron volts), the other at 126.5 GeV. The first decays into pairs of Z particles, while the second shows the decay of a Higgs into two photons. (Here, “signal” refers to a spike in the observations at a particular mass level.)

It could, of course, be a statistical blip that disappears as more data is collected – the next big data release from CERN is scheduled for March – or, as particle physicist Adam Falkowski blogs, it could result from a “systematic error” (he humourously posits “alcohol abuse” as a possibility).

However, as Scientific American notes, the ATLAS scientists have worked hard trying to filter such errors out of their data.

A pair of Higgs isn’t excluded by the Standard Model of physics – but Falkowski points out that the two observations are too similar in mass, something which would be difficult to explain.

Even if the “twin peaks” in the data are resolved in the next release, physicists won’t find themselves kicking cans down the street in boredom: they still need to explain why there seem to be more Higgs-photon decays than they expected. ®

3 Big data security analytics techniques

More from The Register

next story
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Dragon capsule arrives at space station for Easter Sunday delivery
SpaceX reports Falcon booster made controlled touchdown in ocean
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.