Feeds

Government promises low carbon future

£10m for electric car chargers

High performance access to file storage

Energy Secretary Ed Miliband has outlined our bright, green future in the UK Low Carbon Transition Plan which aims to cut emissions by 34 per cent of 1990 levels by 2020.

Some 21 per cent has already been cut., and by 2020 Miliband reckons we'll have 1.2m in "green jobs", whatever they are. Some 1.5m households will be producing their own energy with government support and 40 per cent of electricity will come from low carbon sources like renewables, nuclear and clean coal.

In this brave new world we will also see cars which emit 40 per cent less carbon than they do now.

The paper hopes about 50 per cent of savings will come from greening up the power supply. This includes £6m for a smart grid, £11.2m to help local authorities fast-track planning decisions on renewables and low carbon energy sources.

The short list for the Severn Barrage project is confirmed, as is approval of a biomass plant in Teeside.

Savings from homes are predicted to provide 15 per cent of the total cut. Ofgem gets more powers. There is £4m for individuals to green their houses which will be paid back from lower energy bills. 15 towns and villages are challenged to become model green towns.

£120m will be spent on offshore wind and £60m on wave and tidal technology and £6m will be spent looking at geothermal energy.

The government is also detailing proposals to create a recharging infrastructure for electric and hybrid cars. More details here.

David Frost, director general of the British Chambers of Commerce, said the move offered huge opportunities for Britain's businesses but he warned: “On the day that the UK’s largest employer in the green energy industry is to cease production of wind turbines [Vesta's wind turbine factory on the Isle of Wight closes tomorrow, with production moving to the US], we need to ensure that these announcements are made of real substance.”

The Tories accused the government of paying the price for ignoring the issue for ten years and that the best bits of policy were stolen from them.

The government's website on the assorted ideas is here.®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.