Feeds

Gov seeks UK nuclear competition for EDF

Glowing future foretold

High performance access to file storage

French energy giant EDF will have some competition in the new British nuclear sector, according to reports. It appears that certain UK sites belonging to British Energy and the Nuclear Decommissioning Authority will see new plants built by EDF's rivals.

The Times reports that BE's operations at Bradwell in Essex and Dungeness in Kent will be added to some NDA sites and sold in an auction later this year, in order to establish some competition within the future UK nuclear sector. The rest of BE is expected to be acquired by EDF this week, now that institutional shareholder Invesco has been brought onside by improved terms.

UK ministers are thought to be backing the attempt to get more investors into the new wave of British nuclear, hoping that this will mean multiple construction efforts commencing simultaneously and more plants online sooner. With electricity consumption rising steadily and the UK committed to tough carbon-reduction targets, the government regards swift development of nuclear as essential.

Ministers are also thought - like the unions - to view new nuclear as a potential jobs and economic bonanza. Almost all the cost of nuclear-generated electricity goes into building, running and decommissioning the plant, and thereafter handling the wastes. All these activities would be carried out largely in the UK, by well-paid Brits.

With fossil fuels, much of the money would go to overseas suppliers; with renewables, the comparative simplicity of the machinery would tend to see manufacturing offshored and construction, maintenance etc. offering fewer nice white-collar or high-tech jobs.

Westinghouse, which hopes to build new reactors for the UK, has recently issued a report claiming that its construction plan would bring a £30bn boost to the UK. It received a warm welcome from biz minister John Hutton.

“This report illustrates why I am so determined to press all the buttons to get nuclear facilities built in this country at the earliest opportunity," Hutton told the Times, ahead of announcements at the Labour conference in Manchester. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.