• More off-shore wind power for U.K.

    U.K. wind energy specialist launches round three leasing program to add 25 GW of new offshore wind farm sites by 2020

  • GE Energy, Schlumberger in clean-coal power plant venture

    Collaboration will bring together GE’s experience in integrated gasification combined-cycle (IGCC) systems and Schlumberger Carbon Service’s carbon capture and storage (CCS), site selection, and project management expertise

  • Worry: VoIP especially suitable for conveying hidden messages

    Steganography involves concealing messages within digitally transmitted images or sound files; VoIP systems tolerate packet loss and have built-in redundancy, and are thus especially suitable for conveying hidden messages; law enforcement officials have expressed frustration about the difficulty of deciphering VoIP messages made by suspected terrorists using Skype

  • Green protection against terrorist attacks

    Here is a solution which combines responses to two great concerns of the time: terrorism and the environment; Georgia company offers an environmentally friendly anti-terrorist vehicle barrier

  • Botnet cyberattack costs Japanese company 300 million yen

    There is a new type of blackmail in Japan: Hackers use botnets in denial-of-service attacks on companies’ computers — ending the attacks only when hefty ransom is paid

  • Cyber attacks grow in sophistication, menace; most originate in China

    More and more cyber attacks on organization aim to allow criminals to take control over enterprise assets; most attacks on companies and organizations around the world originate in China

  • Danish company to deliver wind turbines to U.S. utility

    Madison, Wisconsin-based Alliant Energy orders 303 1.65 MW wind turbines from Danish manufacturer, for a total installed capacity of 500 MW

  • Glaring gaps in network security, II

    Specialists in penetration testing take six hours to hack the FBI; hacking the networks of Fortune 500 companies takes much less time; even companies which have been Sarbanes-Oxley compliant for several years have been hacked within twenty minutes, with the hackers taking control of the business; these hackers proved they could actively change general ledgers and do other critical tasks

  • U.S. goal: 20 Percent wind energy by 2030

    The U.S. Department of Energy says it is possible to reach the goal of having 20 percent of U.S. power needs generated by wind — but it will require new transmission infrastructure and enhancing domestic manufacturing capability

  • Chinese hacking threatens U.S. critical infrastructure

    U.S. government networks, and the computer systems of U.S. and Western European companies, are under broad and systemic Chinese hacking campaign; in the case of private Western companies, China steals industrial secrets and patent information in order to hasten its rise to a position of global economic hegemony; in the case of U.S. critical infrastructure — for example, control of electric power stations, several of which Chinese hackers have managed to disable — China may be preparing for more sinister contingencies

  • Cheap carbon trap cleans up power station emissions

    Sequestering CO2 is a good way to fight global warming, but only about 10 percent of the gas produced in the process of burning fossil fuels is CO2; most of the rest is nitrogen, which is not a greenhouse gas; there is a new, inexpensive way to separate the two

  • Glaring gaps in network security, I

    Specialists in penetration testing take six hours to hack the FBI; hacking the networks of Fortune 500 companies takes much less time; even companies which have been Sarbanes-Oxley compliant for several years have been hacked within twenty minutes, with the hackers taking control of the business; these hackers proved they could actively change general ledgers and do other critical tasks

  • Is the Internet "Critical Infrastructure"?

    The Internet’s architecture is optimized to be cheap and ubiquitous; such a network is never going to be perfectly secure or reliable; transactions that absolutely have to be done correctly and on time need to be done on a dedicated network

  • Nigerian group threatens attacks

    Today is the one-year anniversary since Umaru Yar’Adua was inaugurated as president of Nigeria; MEND, the leading rebel group in the Niger Delta, said yesterday that it would launch a series of bombings against oil installations to mark the day

  • Torrefaction treatment for biomass

    Torrefaction is increasingly seen as a desirable treatment for biomass because it creates a solid product which is easier to store, transport, and mill than raw biomass