Feeds

E-Cat pitching cold fusion to Australians

Pre-order Website open

High performance access to file storage

A company established in January 2012 is offering the Rossi E-Cat (“energy catalyzer”) to Australians. E-Cat Australia is offering pre-orders for a 1MW unit with “an estimated delivery time of 3 months”, and allowing people to pre-register for a domestic unit promising shipping in 2013.

Attempts had been made to promote E-Cat downunder before. Earlier this year, a group from the NSW north coast town of Mullumbimby hoped to host a Skype teleconference with Andrea Rossi which fizzled on a no-show.

As previously noted in The Register, Australian sceptic Dick Smith has offered $AU200,000 for proof that the device works.

The Register has invited E-Cat Australia to get in touch. In the meantime, here’s what we know.

The Australian commercial entity was established in January 2012 to a North Bondi residential address. Its newly-launched Website sees to have gone live on July 16, 2012 under a private registration.

Its Website is hosted on an IP belonging to Heart Internet in the UK. The company registration was completed by Roger George Green, a New Zealander who is also a director of the New Zealand School of Feng Shui in Takapuna, NZ, according to the New Zealand Companies Office.

The Register has put the following questions to E-Cat Australia:

1. What connection does your company have to Andrea Rossi, inventor of the E-Cat?

2. There has been no public demonstration of E-Cat in Australia - how could potential customers assure themselves of the efficacy of the technology prior to placing an order?

3. Can E-Cat Australia identify independent experiments replicating Rossi’s work?

4. Can E-Cat Australia provide any customer references in which E-Cat devices are in full operation?

We will update readers when we receive a response.

The E-Cat, or energy catalyzer, claims to produce a cold fusion reaction by combining hydrogen and nickel to produce copper in an exothermic reaction.

Inventor Andrea Rossi has been criticized in the past for not allowing third parties to "see inside the box" and attempt to replicate his work. However, the E-Cat has been a hit among green energy enthusiasts as a "save the world" technology. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.