• New gear technology makes wave energy more attractive

    Wave energy has been held back in part because of the cost of electricity generation. The amount of steel and concrete needed in order to produce each MWh has simply been too great to make it into a profitable business. In addition, the power of waves presents a problem with reliability, and because waves vary greatly in height and timing, it is difficult to create a conversion system that functions across the full wave spectrum. Swedish researchers have developed a new wave energy system which generates five times more energy per ton of device, at one third of the cost, when compared to competing state-of-the art technologies. Energy output is three to four times higher than traditional wave power systems.

  • FAA proposes rules for integrating drones into U.S. airspace

    In an effort to integrate UAVs, or drones, into U.S. airspace, the Federal Aviation Administration (FAA) plans to allow small commercial drones weighing up to fifty-five pounds to fly within sight of their remote pilots during daylight hours, according to the agency’s proposal for governing commercial drone flights. The drones must remain below 500 feet in the air and not exceed 100 mph.Industry advocates warned that drone research could move overseas if the U.S. government fails to quickly accept the widespread use of commercial drones.

  • Obama signs cybersecurity executive order, promotes information-sharing hubs

    President Barack Obama, at last week’s White House Summit on Cybersecurity and Consumer Protection, reiterated the need for more companies to collaborate with each other as well as with the federal government to develop cybersecurity solutions that protect consumer privacy while keeping hackers out of network systems.One strategy Obama encouraged in his speech was the creation of information-sharing groups, called hubs, built around vertical industry sectors.

  • Grants competition to improve security, privacy of online identity verification systems

    The National Institute of Standards and Technology (NIST) is launching a competition for a fourth round of grants to pilot online identity verification systems that help improve the privacy, security, and convenience of online transactions. The pilot grants support the National Strategy for Trusted Identities in Cyberspace (NSTIC), a White House initiative launched in 2011. NSTIC’s goal is to improve trust online through the creation of a vibrant “Identity Ecosystem,” in which individuals and organizations are able to better trust one another because they follow agreed-upon standards and processes for secure, privacy-enhancing and interoperable identity solutions online.

  • Blocking cash transfers to Somalia may help, rather than hinder, terrorism: Experts

    In an effort to curb the flow of cash to terror networks in Somalia, U.S. treasury officials have pressured banks to cut off money transfers to the country. The move follows growing concerns among U.S. law-enforcement agencies about Somali émigrés with extremist Islamic views supporting Somali-based terror group al-Shabaab. Officials of several humanitarian groups worry that the move may backfire, as some Somalis who can no longer rely on cash transfers from the United States may soon join al-Shabaab or other criminal groups to make ends meet.

  • Improving security monitoring of energy industry networked control systems

    There are a number of useful products on the market for monitoring enterprise networks for possible security events, but they tend to be imperfect fits for the unusual requirements of control system networks. A network monitoring solution that is tailored to the needs of control systems would reduce security blind spots. The National Cybersecurity Center of Excellence (NCCoE) is seeking collaborators on an effort to help energy companies improve the security of the networked technologies they rely upon to control the generation, transmission and distribution of power.

  • CEO responsibilities for data breach

    The job of a chief executive officer (CEO) is becoming more difficult every year. Today, in addition to being strategic visionaries and leaders, most CEOs must deal with complex legal issues surrounding their organizations. More often they are being held personally responsible for mistakes made by their organizations. Security breaches are one of the fastest growing legal issues facing many C-level executives. All C-level executives need to be prepared to handle a potential security crisis with the help of IT, legal, and PR (public relation) teams.Taking rapid countermeasures and openly communicating about breaches are key factors in effectively managing expectations of a company’s shareholders and customers.

  • Warming pushes Western U.S. toward driest period in 1,000 years

    Study warns of unprecedented risk of drought in twenty-first century. Today, eleven of the past fourteen years have been drought years in much of the American West, including California, Nevada, New Mexico, and Arizona and across the Southern Plains to Texas and Oklahoma. The current drought directly affects more than sixty-four million people in the Southwest and Southern Plains, and many more are indirectly affected because of the impacts on agricultural regions. A new study predicts that during the second half of the twenty-first century, the U.S. Southwest and Great Plains will face persistent drought worse than anything seen in times ancient or modern, with the drying conditions “driven primarily” by human-induced global warming.

  • Closing the high seas to fishing would benefit fish stocks without hurting industry

    The world’s high seas should be closed to fishing, argues a new study. The world’s oceans are separated into exclusive economic zones (EEZs) and the high seas. EEZs are the coastal areas that are within 200 nautical miles of maritime countries that maintain the rights to the resources in these waters. Less than 1 percent of the global landings come from fish caught only in the high seas. The bulk of the world’s fisheries actually come from fish stocks that straddle both areas.

  • Spotting, neutralizing hackers when they are already inside your systems

    Since the Internet gained popularity in the 1990s, the traditional model of cybersecurity has been to build systems and software which could keep hackers out of computers. As hackers continue to tap into complex security systems, however, some cybersecurity experts are advising companies to focus on tricking or neutralizing hackers once they have infiltrated networks, rather than spending money only on trying to keep them out.

  • Royal commission into nuclear will open a world of possibilities

    Discussion of nuclear energy in Australia has matured in recent years with greater focus on factual arguments, the relativity of risks and the need for robust scientific sourcing of claims. South Australia’s potential to merge prosperity, clean energy and good global citizenship can barely be overstated. Globally, there are around 240,000 metric tons heavy metal (MtHM ) in spent nuclear fuel, much of which was dug from South Australian ores. By 2040 this will be around 700,000 MtHM. Robust dry-cask storage is now a demonstrated, reliable and recognized solution for holding this material. It can be quickly, readily implemented by South Australia. Importantly, such a facility would mean the material is retrievable, to enable the extraction of further value through recycling. A secure, multinational destination for spent fuel, located in a politically and geologically stable country such as Australia, would spur more rapid expansion of current generation reactors. This would displace coal as the fuel of choice in rapidly growing economies.

  • Cybersecurity sector welcomes Obama’s $14 billion cybersecurity initiatives in 2016 budget

    Massachusetts cybersecurity firms applauded President Barack Obama proposed$14 billion toward cybersecurity initiatives in his 2016 budget. If approved, the federal government would spend more money on intrusion detection and prevention capabilities, as well as cyber offensive measures. Waltham-based defense contractor Raytheon, whose government clients already use the firm for its cybersecurity capabilities and expertise, believes the cybersecurity industry is expected to grow even faster in the coming years.

  • Oklahoma rejects “rush to judgment” on the connection between fracking and earthquakes

    Between 1978 to mid-2009, Oklahoma recorded one or two 3.0 or greater magnitude earthquakes. Last year the state experienced 585 earthquakes of 3.0 magnitude or greater. Studies conducted by seismologists, including those who work with the United States Geological Survey(USGS), have attributed the spike in earthquakes to the roughly 3,200 active disposal wells, in which wastewater produced during oil and gas drilling is stored deep underground, and independent scientific studies have established the causal relationship between fracking and earthquake. Arkansas, Ohio, and Colorado have imposed temporary restrictions on fracking, while Texas and Illinois are considering similar measures – but the Oklahoma Geological Survey says that “We consider a rush to judgment about earthquakes being triggered to be harmful to state, public and industry interests.”

  • Texas appoints seismologist to examine wave of Irving-area quakes

    Research over decades has shown the fracking process — injecting fluid underground to release oil — has been the cause of fault slips and fractures. The fluid can often lubricate existing faults and cause them to slip. The Texas Railroad Commission (RRC) has turned to David Craig Pearson to help study a series of quakes which hit the area of Irving within a span of a few days. A UT-Austin seismologist has already published a report which found that most earthquakes in Texas’s oil-rich Barnett Shale occurred within two miles of an injection well, essentially proving that some of the quakes are caused by fracking. Pearson’s appointment was not universally welcomed, as some see him as too close to industry. “I’m absolutely engaged with trying to figure out the cause of all earthquakes throughout Texas,” said Pearson. “I’m a scientists first, and a Railroad Commission employee second.”

  • Floating wind turbines bring electricity – and power generation -- to customers

    Most wind turbine manufacturers are competing to build taller turbines to harness more powerful winds above 500 feet, or 150 meters. Altaeros is going much higher with its novel Buoyant Airborne Turbine — the BAT. The Altaeros BAT can reach 2,000 feet, or 600 meters. At this altitude, wind speeds are faster and have five to eight times greater power density. As a result, the BAT can generate more than twice the energy of a similarly rated tower-mounted turbine. The BAT’s key enabling technologies include a novel aerodynamic design, making it, in effect, a wind turbine which is being lifted by a tethered balloon. In the future, the company expects to deploy the BAT alongside first responders in emergency response situations when access to the electric grid is unavailable.