Feeds

Council fields world's first rubbish-fuelled rubbish truck

Electric revolution in... er... Huddersfield

High performance access to file storage

'Leccy Tech For a brief moment this week, the focus of electric vehicle development in Britain was Huddersfield town centre and while the location may lack the glamour of Geneva, Monaco or Los Angeles what was on show was not without interest.

Kirklees 'leccy rubbish truck

Kirklees Council's 'leccy truck: local van for local people

In what may well be a world first, Kirklees Council was showing off its shiny new 'leccy Ford Transit rubbish collection vehicle - possibly the world's first van powered by the garbage it picks up.

The van - actually a Smith Edison-modified 3.5-tonne Transit with a 40kWh lithium-ion battery pack, a top speed of 50mph, an effective range of 100 miles and a 6-8 hour charge time – will glide around central Huddersfield collecting rubbish from 25 newly installed “split bins” and take said trash to the Energy from Waste (EfW) power station-cum-recycling centre just down the road. There, the rubbish will be burnt to generate electricity that will be used to charge the van for the next days collection runs.

Kirklees 'leccy rubbish truck

Trash goes in here... to generate power for here...

Of course, powering 'leccy vehicles is not the Emerald Street EfW's main role - on a good day it pumps around ten megawatts into the National Grid, all generated from fire-consumed rubbish that has been collected locally.

At the moment, the EfW only boasts just one recharge point for Kirklees' single EV, but it is from such humble beginnings that some form of electric car re-charge infrastructure in Britain may well grow.

Kirklees 'leccy rubbish truck

A solitary charging post, yesterday

Downsides to the project? Well, Register Hardware's suggestions that a silent bin lorry in central Huddersfield could pose safety issues for any locals who forget to look both ways when crossing the road were pooh-pooh'd until the driver mentioned that he'd had two near misses that very morning.

Cue much muttering about retrofitting more flashing lights and some form of audible warning device. We would suggest a recording of a thumping big V8. After all, if it's good enough for the Lightning... ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
Get your MOON GEAR: Auction to feature Space Race memorabilia
Keepsakes from early NASA, Soviet programs up for bids
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.