Category: Energy Transportation

Innovators: Building an electric car for speed | Marketplace.org

Innovators: Building an electric car for speed | Marketplace.org.

Posted: February 1, 2013 in Energy, Transportation

‘Silent but deadly’ Java security update breaks legacy apps – dev • The Register

'Silent but deadly' Java security update breaks legacy apps – dev • The Register.

Posted: February 1, 2013 in Computer

Analysis: Inventory mountain adds to pain for Chinese solar firms | Reuters

Analysis: Inventory mountain adds to pain for Chinese solar firms | Reuters.

Posted: February 1, 2013 in Solar

Launch Party: a crowdfunding revolution ignites the next space race | The Verge

Launch Party: a crowdfunding revolution ignites the next space race | The Verge.

Posted: February 1, 2013 in Space

How to use a million-core supercomputer—without it blowing up in your face | Ars Technica

How to use a million-core supercomputer—without it blowing up in your face | Ars Technica.

Posted: February 1, 2013 in Computer

Wind Beats Out Natural Gas To Become Top Source Of New Electricity Capacity For 2012 | ThinkProgress

Wind Beats Out Natural Gas To Become Top Source Of New Electricity Capacity For 2012 | ThinkProgress.

Posted: February 1, 2013 in Energy, Wind

Building a lunar base with 3D printing / Technology / Our Activities / ESA

Building a lunar base with 3D printing / Technology / Our Activities / ESA.

Posted: February 1, 2013 in Space

Security experts on Java: Fixing zero-day exploit could take ‘two years’ | ZDNet

Security experts on Java: Fixing zero-day exploit could take 'two years' | ZDNet.

Posted: February 1, 2013 in Computer

Apple blocks Java on Macs due to vulnerabilities – Technology on NBCNews.com

Apple blocks Java on Macs due to vulnerabilities – Technology on NBCNews.com.

Posted: February 1, 2013 in Computer

Disable This Buggy Feature On Your Router Now To Avoid A Serious Set Of Security Vulnerabilities – Forbes

Disable This Buggy Feature On Your Router Now To Avoid A Serious Set Of Security Vulnerabilities – Forbes.

Posted: February 1, 2013 in Computer