Connect with us

Tech

Reinventing industry: Carbon capture technologies lead the charge against climate change

Published

on

Reinventing industry: Carbon capture technologies lead the charge against climate change


Credit: Pixabay/CC0 Public Domain

Researchers are testing a new method of capturing CO2 from energy-intensive industries and converting it into valuable chemicals and fuels.

In a potential game-changer for heavy industry, a magnesium-oxide mine in Greece received seven special containers in November 2024 with equipment designed to capture CO₂ and transform it into a valuable chemical, right there on site.

Long blamed for driving up the planet’s temperature, CO2 could now be converted into jet fuel for passenger aircraft—cutting emissions from both mining and transport.

“We just started capturing CO2, which is an amazing milestone,” said Dr. Haris Yiannoulakis, research and development manager at Grecian Magnesite, the producer of magnesium oxide.

The containers came from the Petrobrazi oil refinery in Romania. There, the had been tried out as part of a project called ConsenCUS, involving seven countries and three test sites.

Getting down

The EU has set its sights on slashing by 55% by 2030, compared to 1990 levels. The ultimate goal: climate neutrality for industry by 2050.

ConsenCUS brings together new technologies to trap CO₂ from three notoriously hard-to-abate industries: oil refining, mining and . These sectors face a double challenge, as CO₂ is generated both from burning and from the raw materials themselves.

For example, at the Grecian Magnesite mine site, raw material magnesite—a natural mineral found in rocks—is mined and heated up to 2,000°C to yield magnesium oxide. This material is crucial to a wide range of European industries, from steel and glass to fertilizers, and pharmaceuticals.

The downside, however, is that the thermal treatment releases CO2 both from the decomposition of magnesite and the fuel required for the process.

Three steps

The in Greece is now tackling CO₂ conversion in three steps, explains Sara Vallejo Castaño, a at Wetsus research institute in the Netherlands.

First, a capture column separates CO₂ from factory gases, mixing it with water and potassium hydroxide. The CO₂ dissolves and reacts, forming potassium carbonate, which locks the gas in liquid form.

The second step uses electricity to raise the acidity of the solution, which releases CO2.

This method is simpler and greener than traditional heating or hazardous chemicals because it uses only electricity and water as resources.

A third step turns the CO2 into (or formate), a simple, naturally occurring chemical that can be found in nettles and ant bites.

“Formic acid is a well-known molecule used in the chemical sector,” said Dirk Koppert, the coordinator of ConsenCUS at New Energy Coalition, a nonprofit organization in the Netherlands.

One Dutch company, Coval Energy, already produces formic acid in this way from CO2. The acid is then fed to microbes to make fats and proteins. The proteins could be ingredients in cattle and fish feed, while the fatty acids could one day be used as a replacement for jet fuel.

Tough cement

The first testing site for the new technology was at Aalborg Portland in northern Denmark. This is one of the largest cement manufacturers in Europe, producing up to 1.8 million tons of gray cement and 0.8 million tons of white cement annually and operating since 1889.

Sustainability is a major selling point for its cement. The factory now uses non-fossil fuels for more than 30% of its heating needs for gray cement production, for example.

“We are reducing our dependence on fossil fuels and reducing CO2 emissions,” said Jesper Damfoft, sustainability director at the company.

But the manufacturing of cement still releases CO2 in the process.

The main cement ingredients in Aalborg are sand, dredged from the Limfjord waterway, and chalk from a local quarry. This calcium-rich chalk is heated to temperatures of about 1,500°C to produce lime (calcium oxide), which is essential for manufacturing cement.

When heated, the chalk’s carbon and oxygen atoms combine to form CO₂ gas, making production a major source of global emissions—by some estimates, accounting for 7%–8% of the world’s total.

A way forward is to capture and store CO2 underground, or put it to other uses, such as by making formic acid.

Under the EU’s emissions trading scheme, the price per excess ton of CO2 that companies have to pay stood at around €73 in June 2025, but it is expected to rise.

“Carbon prices are relatively low, but are predicted to be €150 per ton in 2030, and who knows what they will be beyond that,” said Yiannoulakis. Clearly, European industries must prepare.

The new capture technology remained in Greece until June for testing. The hope is to move the technology closer to a commercial plant and put it to work to capture CO2.

Working out the technicalities of how to capture CO2 gas and produce a desirable chemical required a dozen industry and research partners to come together, including those from universities in Canada and China.

“Without EU funds, we would not be able to build this project and test these technologies,” said Koppert.

Bringing communities on board

However, technical expertise is only part of the story.

Jacob Nielsenat from Robert Gordon University in Scotland has been investigating how to give citizens a voice in these new technologies.

He quickly realized that “lots of people didn’t know what carbon capture is, so we were asking people to give us their opinion on something they didn’t know anything about.”

Along with his colleague Kostas Stavrianakis, he invented a to prompt discussions on carbon capture. Both believe that results will come. “Most citizens are perfectly able to understand the complexities around these technologies,” said Stavrianakis.

He emphasized that the industry needs to talk to local people. “If you want a project to go ahead, it is always better to involve communities so they can feel part of it.”

This article was originally published in Horizon the EU Research and Innovation Magazine.

Citation:
Reinventing industry: Carbon capture technologies lead the charge against climate change (2025, August 22)
retrieved 22 August 2025
from https://techxplore.com/news/2025-08-reinventing-industry-carbon-capture-technologies.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Tech

Why Everyone Is Suddenly in a ‘Very Chinese Time’ in Their Lives

Published

on

Why Everyone Is Suddenly in a ‘Very Chinese Time’ in Their Lives


In case you didn’t get the memo, everyone is feeling very Chinese these days. Across social media, people are proclaiming that “You met me at a very Chinese time of my life,” while performing stereotypically Chinese-coded activities like eating dim sum or wearing the viral Adidas Chinese jacket. The trend blew up so much in recent weeks that celebrities like comedian Jimmy O Yang and influencer Hasan Piker even got in on it. It has now evolved into variations like “Chinamaxxing” (acting increasingly more Chinese) and “u will turn Chinese tomorrow” (a kind of affirmation or blessing).

It’s hard to quantify a zeitgeist, but here at WIRED, chronically online people like us have been noticing a distinct vibe shift when it comes to China over the past year. Despite all of the tariffs, export controls, and anti-China rhetoric, many people in the United States, especially younger generations, have fallen in love with Chinese technology, Chinese brands, Chinese cities, and are overall consuming more Chinese-made products than ever before. In a sense the only logical thing left to do was to literally become Chinese.

“It has occurred to me that a lot of you guys have not come to terms with your newfound Chinese identity,” the influencer Chao Ban joked in a TikTok video that has racked up over 340,000 likes. “Let me just ask you this: Aren’t you scrolling on this Chinese app, probably on a Chinese made phone, wearing clothes that are made in China, collecting dolls that are from China?”

Everything Is China

As is often the case with Western narratives about China, these memes are not really meant to paint an accurate picture of life in the country. Instead, they function as a projection of “all of the undesirable aspects of American life—or the decay of the American dream,” says Tianyu Fang, a PhD researcher at Harvard who studies science and technology in China.

At a moment when America’s infrastructure is crumbling and once-unthinkable forms of state violence are being normalized, China is starting to look pretty good in contrast. “When people say it’s the Chinese century, part of that is this ironic defeat,” says Fang.

As the Trump administration remade the US government in its own image and smashed long-standing democratic norms, people started yearning for an alternative role model, and they found a pretty good one in China. With its awe-inspiring skylines and abundant high-speed trains, the country serves as a symbol of the earnest and urgent desire among many Americans for something completely different from their own realities.

Critics frequently point to China’s massive clean energy investments to highlight America’s climate policy failures, or they point to its urban infrastructure development to shame the US housing shortage. These narratives tend to emphasize China’s strengths while sidelining the uglier facets of its development—but that selectivity is the point. China is being used less as a real place than as an abstraction, a way of exposing America’s own shortcomings. As writer Minh Tran observed in a recent Substack post, “In the twilight of the American empire, our Orientalism is not a patronizing one, but an aspirational one.”

Part of why China is on everyone’s mind is that it’s become totally unavoidable. No matter where you live in the world, you are likely going to be surrounded by things made in China. Here at WIRED, we’ve been documenting that exhaustively: Your phone or laptop or robot vacuum is made in China; your favorite AI slop joke is made in China; Labubu, the world’s most coveted toy, is made in China; the solar panels powering the Global South are made in China; the world’s best-selling EV brand, which officially overtook Tesla last year, is made in China. Even the most-talked about open-source AI model is from China. All of these examples are why this newsletter is called Made in China.





Source link

Continue Reading

Tech

VTL Group boosts output by 10% with Coats Digital’s GSDCost solution

Published

on

VTL Group boosts output by 10% with Coats Digital’s GSDCost solution



Coats Digital is delighted to announce that VTL Group, one of the largest vertically integrated textile manufacturers in the Mediterranean region, has adopted Coats Digital’s GSDCost solution to standardise production methods, increase productivity, and improve pricing accuracy across its Tunisian operations. The initiative is already showing a significant impact, with VTL reducing standard minute values (SMVs) by 15–20% and increasing line output by 10% across its three, key sewing facilities.

With over 5,000 employees and 3,000 sewing machines across 90 sewing lines, VTL Group specialises in jersey knits and denim, producing up to 20 million garments per year for world-renowned brands such as Lacoste, Adidas, G-Star, Hugo Boss, Replay and Paul & Shark. The company operates six garment production units, along with dedicated facilities for screen printing, knitting, dyeing and textile finishing. This extensive vertical integration gives VTL complete control over quality, lead-times and cost-efficiency, which is vital for meeting the stringent demands of its global customer base.

VTL Group has adopted Coats Digital’s GSDCost to standardise production, boost productivity, and improve pricing accuracy across its Tunisian operations.
The solution cut SMVs by 15–20 per cent, raised line output by 10 per cent, and enhanced planning, cost accuracy, and customer confidence, enabling competitive pricing, lean operations, and stronger relationships with global fashion brands.

Prior to implementing GSDCost, VTL calculated capacity and product pricing using data from internal time catalogues stored in Excel. This approach led to inconsistent and inaccurate cost estimations, causing both lost contracts due to inflated production times and reduced margins from underestimations. In some cases, delays caused by misaligned time predictions resulted in increased transportation costs and operational inefficiencies that impacted customer satisfaction.

Hichem Kordoghli, Plant Manager, VTL Group, said: “Before GSDCost, we struggled with inconsistent operating times that directly impacted our competitiveness. We lost orders when our timings were too high and missed profits when they were too low. GSDCost has transformed the way we approach planning, enabling us to quote confidently with accurate, reliable data. We’ve already seen up to 20% reductions in SMVs, a 10% rise in output, and improved customer confidence. It’s a game-changer for our sales and production teams.”

Since adopting GSDCost across 50 sewing lines, VTL Group has been able to establish a reliable baseline for production planning and line efficiency monitoring. This has led to a more streamlined approach to managing load plans and forecasting. Importantly, GSDCost has given the business the flexibility to align pricing more effectively with actual production realities, contributing to greater customer satisfaction and improved profit margins.

Although it’s too early to determine the exact financial impact, VTL Group has already realised improvements in pricing flexibility and competitiveness thanks to shorter product times and better planning. These gains are seen as instrumental in enabling the company to pursue more strategic orders, reduce wasted effort and overtime, and maintain the high expectations of leading global fashion brands.

Hichem Kordoghli, Plant Manager, VTL Group, added: “GSDCost has empowered our teams with reliable data that has translated directly into real operational benefits. We are seeing more consistent line performance, enhanced planning precision, and greater confidence across departments. These improvements are helping us build stronger relationships with our brand partners, while setting the foundation for sustainable productivity gains in the future.”

The company now plans to expand usage across an additional 30 lines in 2025, supported by a second phase of GSD Practitioner Bootcamp training to strengthen in-house expertise and embed best practices throughout the production environment. A further 10 lines are expected to follow in 2026 as part of VTL’s phased rollout strategy.

Liz Bamford, Customer Success Manager, Coats Digital, commented: “We are proud to support VTL Group in their digital transformation journey. The impressive improvements in planning accuracy, quoting precision, and cross-functional alignment are a testament to their commitment to innovation and excellence. GSDCost is helping VTL set a new benchmark for operational transparency and performance in the region, empowering their teams with the tools needed for long-term success.”

GSDCost, Coats Digital’s method analysis and pre-determined times solution, is widely acknowledged as the de-facto international standard across the sewn products industry. It supports a more collaborative, transparent, and sustainable supply chain in which brands and manufacturers establish and optimise ‘International Standard Time Benchmarks’ using standard motion codes and predetermined times. This shared framework supports accurate cost prediction, fact-based negotiation, and a more efficient garment manufacturing process, while concurrently delivering on CSR commitments.

Key Benefits and ROI for VTL Group

  • 15–20% reduction in SMVs across 50 production lines
  • 10% productivity increase across key sewing facilities
  • More competitive pricing for strategic sales opportunities
  • Improved cost accuracy and quotation flexibility
  • Standardised time benchmarks for future factory expansion
  • Enhanced planning accuracy and load plan management
  • Greater alignment with lean and sustainable manufacturing goals
  • Increased brand confidence and satisfaction among premium customers
Note: The headline, insights, and image of this press release may have been refined by the Fibre2Fashion staff; the rest of the content remains unchanged.

Fibre2Fashion News Desk (HU)



Source link

Continue Reading

Tech

NSA urges continuous checks to achieve zero trust | Computer Weekly

Published

on

NSA urges continuous checks to achieve zero trust | Computer Weekly


The US National Security Agency (NSA) has published its latest guidance on zero trust to secure US federal government IT networks and systems. This is the first of two guidance documents coming out of the NSA, providing “practical and actionable” recommendations that can be applied as best practice to secure corporate IT environments both in the public and private sectors.

In the Zero trust primer document, the NSA defines a “zero-trust mindset”, which means assuming IT environment traffic, users, devices and infrastructure may be compromised. To achieve this, the guidance urges IT security teams to establish a rigorous authentication and authorisation process for all access requests.

In the context of securing the integrity of government IT systems, it said that such a strategy enhances the security posture of networks by rigorously validating every access request, which prevents unauthorised changes, reduces risk of malicious code insertion, and ensures the integrity of software and supply chains

The main takeaway from the NSA regarding zero trust is to never trust users or devices that request network connectivity or access to internal resources. The NSA guidance calls for verification without exception, where dynamic authentication and explicit approval is used across all activities on the network, adhering to the principle of least privilege.

Specifically, the NSA’s latest guidance suggests that IT security teams should assume they are working in an IT environment where there is a breach, which means operating and defending resources under the assumption that an adversary already has a presence in the environment.

The NSA said IT security teams should plan for deny-by-default and heavily scrutinise all users, devices, data flows and requests. This means that IT security teams need to log, inspect and monitor all configuration changes, resource accesses and environment traffic for suspicious activity continuously.

The guidance also recommends explicit verification. This implies that access to all resources is consistently verified, using both dynamic and static mechanisms, which is used to derive what the NSA calls “confidence levels for contextual access decisions”.

Commenting on the guidelines, zero-trust expert Brian Soby, CTO and co-founder of AppOmni, said: “Across the guidance, the emphasis is on continuous logging, inspection and monitoring of resource access and configuration change, plus comprehensive visibility across layers.

“Read plainly, the NSA is suggesting that many programs are built around coarse checkpoints and limited signals, while the real risk lives inside enterprise applications, especially SaaS, where sensitive data and business workflows reside.”

Soby’s understanding of the new guidelines is that effective zero trust requires a thorough understanding of what users can and cannot do, instead of simply relying on their ability to authenticate through network directory services and the authorisation that successful authentication gives them.

“Many security programs still substitute directory groups and simplistic roles for true entitlement materiality, even though effective access in modern SaaS is shaped by application-native permissions, sharing rules, delegated administration, conditional controls and third-party OAuth grants.”

He noted that the NSA’s emphasis on monitoring resource access and configuration change implies that relying on coarse identity abstractions leaves IT security teams blind to the actions and permission shifts that create exposure and enable misuse.

“This gap also lines up uncomfortably well with the breaches and campaigns we are seeing now,” he added.

As an example, Soby said that recent intrusions tied to groups tracked as UNC6040 and UNC6395 have highlighted how attackers can bypass traditional, frontdoor-centred controls by abusing SaaS identities and integrations, including compromised OAuth tokens and third-party application access, to reach and extract data from SaaS environments.

“In that light, the NSA’s guidance supports a sharper conclusion: identity security programs that cannot truly understand user activities, behaviours and the materiality of entitlements inside applications do not match the principles of zero trust,” said Soby. “These often become more performative than effective, leaving security operations centre teams stuck with generic signals like logins when the meaningful attacker activity is happening inside the app.”



Source link

Continue Reading

Trending