Menu

Blog

Page 4901

Jul 1, 2022

Nextracker & BCI Steel Renovate Abandoned Pittsburgh Steel Factory to Serve Growing U.S. Utility-Scale Solar Market

Posted by in categories: solar power, sustainability

This is Nextracker’s third new factory, adding to the company’s new Texas and Arizona factories announced in April and May, towards building 10 GW of annual domestic solar tracker capacity. Courtesy of Nextracker — by Pallavi Singla.


Nextracker LLC, the global market leader in utility-scale solar trackers, and BCI Steel, a Pittsburgh-based steel fabricator, this week announced the reopening of the historic Bethlehem Steel manufacturing factory in nearby Leetsdale to produce solar tracker equipment for large-scale solar power plants.

The steel processing plant will incorporate both BCI Steel’s new and reshored equipment shipped to the U.S. from factories in Malaysia and Brazil. Solar tracker products produced at the factory will serve rapidly growing solar markets in Pennsylvania, Indiana, New York, and Ohio.

Continue reading “Nextracker & BCI Steel Renovate Abandoned Pittsburgh Steel Factory to Serve Growing U.S. Utility-Scale Solar Market” »

Jul 1, 2022

Robot Sales Grow

Posted by in category: robotics/AI

After two years of disruptions, sales of industrial robots increased worldwide in 2021, said the IFR. The organization said demand in Asia and Australia grew the most.

Jul 1, 2022

Flu vaccines linked to 40% reduced risk of Alzheimer’s disease

Posted by in categories: biotech/medical, neuroscience

𝐅𝐥𝐮 𝐯𝐚𝐜𝐜𝐢𝐧𝐞𝐬 𝐥𝐢𝐧𝐤𝐞𝐝 𝐭𝐨 𝟒𝟎% 𝐫𝐞𝐝𝐮𝐜𝐞𝐝 𝐫𝐢𝐬𝐤 𝐨𝐟 𝐀𝐥𝐳𝐡𝐞𝐢𝐦𝐞𝐫’𝐬 𝐝𝐢𝐬𝐞𝐚𝐬𝐞

Jun 30, 2022

Graphene-like structure created from a fullerene

Posted by in category: materials

2D material synthesised from nanocluster fullerene for the first time.

Jun 30, 2022

AI Is Learning Twice as Fast This Year Than Last

Posted by in category: robotics/AI

According to the best measures we’ve got, a set of benchmarks called MLPerf, machine learning systems can be trained nearly twice as quickly they could last year. It’s a figure that outstrips Moore’s Law by quite a ways.

Jun 30, 2022

Google Blocks Dozens of Malicious Domains Operated

Posted by in category: cybercrime/malcode

Google’s Threat Analysis Group (TAG) blocks as many as 36 malicious domains operated by hack-for-hire groups from India, Russia and UAE.


Shadow IT refers to the practice of users deploying unauthorized technology resources in order to circumvent their IT department.

Jun 30, 2022

What is Shadow IT and why is it so risky?

Posted by in categories: internet, security

Shadow IT refers to the practice of users deploying unauthorized technology resources in order to circumvent their IT department. Users may resort to using shadow IT practices when they feel that existing IT policies are too restrictive or get in the way of them being able to do their jobs effectively.

An old school phenomenon

Shadow IT is not new. There have been countless examples of widespread shadow IT use over the years. In the early 2000s, for example, many organizations were reluctant to adopt Wi-Fi for fear that it could undermine their security efforts. However, users wanted the convenience of wireless device usage and often deployed wireless access points without the IT department’s knowledge or consent.

Jun 30, 2022

Ex-Canadian Government Employee Pleads Guilty Over NetWalker Ransomware Attacks

Posted by in categories: cybercrime/malcode, government

A former Canadian government employee pleaded guilty in the U.S. to charges related to his involvement with the NetWalker ransomware syndicate.

Jun 30, 2022

New YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators

Posted by in category: cybercrime/malcode

Researchers are warning about a new YouTube hijacking malware, dubbed YTStealer, believed to be sold as a service on the dark web.

Jun 30, 2022

New ‘FabricScape’ Bug in Microsoft Azure Service Fabric Impacts Linux Workloads

Posted by in category: computing

Researchers reveal details about a new vulnerability in Microsoft’s Service Fabric that could be exploited to gain elevated privileges on Linux.