Browse Definitions:
Definition

CERN (Conseil Europeen pour la Recherche Nucleaire)

Contributor(s): Dr. Ron Peterson

CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland. The organization, founded in 1954, currently has about 20 member countries. In French, the acronym CERN stands for "Conseil Europeen pour la Recherche Nucleaire" which translates to the English "European Council for Nuclear Research."

The idea for CERN was born in 1949 when physicist Louis de Broglie (pronounced de BROY) suggested that all the countries of Europe ought to share a scientific laboratory. In 1952, a provisional CERN was formed and joined by several nations. The first official meeting of the CERN council was held in 1955. The first CERN particle accelerator began operating in 1957. Since that time, several other particle accelerators, sometimes called "atom smashers" by lay people, were built. The latest is the Large Hadron Collider (LHC). CERN has also conducted detection experiments involving neutrinos and other elusive particles. The results of such experiments may give physicists and astronomers clues about the formation and evolution of the universe.

Because it is a joint effort among governments, CERN enables countries with small populations to participate in advanced physics experiments without having to unnecessarily burden their science budgets. In addition, CERN fosters a sense of international cooperation and understanding.

In 1991, a researcher at CERN, Dr. Tim Berners-Lee, essentially invented the World Wide Web. Berners-Lee is credited with developing the idea of combining hypertext with the speed of today's electronic networks. Working with a small team, he developed the Hypertext Transfer Protocol (HTTP) on which the Web is based. The HTTP rule set was applied to the Internet and became the standard protocol for navigating among Web sites.

This was last updated in March 2011

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

CERN is a dangerous experiment and a very costly one. Creating a wormhole or a portal to cross dimensions will let demonic spirits able to enter this world. The bible states that the abyss will be opened up letting demonic spirits cross over to our world, so I guess they will continue until that happens. Already there are many portals from their world to ours from people practicing the occult and through blood sacrifices to Satan. But I guess if we create a portal for them, it will be much easier. Why does Satan want this? First he wants his minions to come through. But second if time travel becomes possible, someone or something can go back in time undoing Christ's death on the cross which saved mankind. Christ was given total authority over death by his death on the cross. Of course, Satan will not succeed in his plan. But people in this project are being duped by Satan thinking 1. They can travel through time without effecting the world they live in; 2. This project will let them travel through space at an alarming rate - although traveling through a wormhole will destroy the person going through it or change their structure of atoms 3. It will give them power over the spirits entering this world - another lie that Satan uses for he becomes the dominant force not the other way around. 4. The person who controls the wormhole or portal through space and time will become as gods. In the bible it states that there were gods. Of course some are man-made of wood, etc. Who were these gods? They are demonic spirits who can cross over dimensions as Satan rules this earth. There are two kinds of evil spirits: one is demonic in nature and the other are evil spirits created by merging demonic spirits or human beings with other forms of life such as animals or with the combination of demons and humans. Of course, they help us with our technology, because through it they can destroy our world. People think some cultures were advanced. I disagree as blood sacrifices of children and anyone is an example of a savage civilization not an advanced one. Satan gives them knowledge of the stars to serve his purpose not ours getting these civilizations the power to destroy themselves. If that is called helpful to humanity, then we are dumber than we think. If they really did create us, then we should realize that they are getting ready to destroy us. Shows on T.V. call them our gods. I follow one God who loves us. They follow gods that are secretive, perform horrible experiments on people or animals with the help of men, and give us the knowledge to create weapons of mass destruction. Man was not created to be gods or god-like for man has not the intelligence not to destroy himself in the process. It is only through the power of Jesus that man can have power over the spirit realm. Yes mankind will become mad men as Satan will destroy our minds in the process of gathering his army. Follow Jesus before it is too late.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close