Powerhouses: nanotechnology turns bricks into batteries | The Guardian

Research could pave way for cheap supercapacitor storage of renewable energyThe humble house brick has been turned into a battery that can store electricity, raising the possibility that buildings could one day become literal powerhouses.The new technology exploits the porous nature of fired red bricks by filling the pores with tiny nanofibres of a conducting plastic that can store charge. The first bricks store enough electricity to power small lights. But if their capacity can be increased, they may become a low-cost alternative to the lithium-ion batteries currently used. Continue reading…

Research could pave way for cheap supercapacitor storage of renewable energy

The humble house brick has been turned into a battery that can store electricity, raising the possibility that buildings could one day become literal powerhouses.

The new technology exploits the porous nature of fired red bricks by filling the pores with tiny nanofibres of a conducting plastic that can store charge. The first bricks store enough electricity to power small lights. But if their capacity can be increased, they may become a low-cost alternative to the lithium-ion batteries currently used.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more