Indeed. The first dedicated light -- for various values of "light" -- source[1] repurposed the tunnel and various bits and techniques from the particle physics accelerator it replaced, and on which parasitic "light" measurements were made previously. See also [2].
In the context of the article "collider" means intersecting particle beams, like in RHIC and LHC, which obviously involves rather low probability interactions, as opposed to accelerators which slam a beam into a dense target (like the SLAC accelerator). In a synchrotron light source you want the beam to circulate and specifically not collide with anything; they were developed from particle physics accelerators, of course.
You imply that experiment contaminated drinking, and other, water. How? Are you saying the Cs¹³⁷ leaked, and at concentration above that from fallout, say? Its γ-rays don't activate materials — I've used enough of them.
Since when were industrial products the purpose? Why do you think my colleagues can't analyse LHC data and discover the Higgs particle? The article says RHIC was a considerable scientific success.
As I recall, RHIC itself replaced some cancelled project. I remember the tunnel being at least partly there in the mid-80s, with a plan to trundle ions from the tandem lab through a crazy long beamline across the site and stop nuclear structure research there as a result.
ISABELLE, which was a cancelled proton-proton collider. Major delays with its magnet design meant that it was overtaken by existing programs at CERN and Fermilab. RHIC reused its hall.
I've looked without success for external audit reports of either Tailscale and Netbird, like Mullvad gets. While I don't approve of the sort of auditor box-ticking we get at work, it would be reassuring to see a report from a proper security consultancy.
Netbird has supposedly done a penetration test, but it is only supplied upon request [0]. I haven't bothered trying to get my hands on it since I don't use their product. I don't agree with gatekeeping the results instead of making them public.
NetBird should also consider publishing an SBOM, similar to what Defguard does.[1].
Oh, I hadn't found that. Yes, it seems strange not to publicize something like that to give users confidence (assuming the audit/pentest isn't damning). It doesn't have to have been perfect initially, as long as appropriate fixes were made.
https://en.wikipedia.org/wiki/ALGOL_68#Operating_systems_wri...
reply