Skip to main content

A Huge $2 Billion 'Solar + Storage' Project in California Powers Up

3 months ago
One of America's largest solar + battery storage projects "is now fully online in Mojave, California," reports Electrek: Arevon Energy's Eland Solar-plus-Storage Project combines 758 megawatts (MWdc) of solar with 300 MW/1,200 megawatt hours of battery storage. Eland 1 reached commercial operation in December 2024, and Eland 2 recently commenced full operation. The two combined comprise 1.36 million solar panels and 172 lithium iron phosphate batteries (LFP). Combined, the Eland 1 & 2 projects will be able to power more than 266,000 homes annually, and overall, can provide 7% of the total electricity requirements for the city of Los Angeles. "Arevon's Eland Solar-plus-Storage Project alone will ... push the city's clean energy share above 60%, a major milestone in LA's transition to being powered by 100% clean energy by 2035," said Los Angeles Mayor Karen Bass. Eland 1 & 2 created around 1,000 jobs to construct the project, and it's expected to disburse more than $36 million in local government payments throughout its lifetime. The article points out that Arevon Energy "has more than 4,500 MW of solar and battery storage projects operating across 17 states — and more than 6 GW of new projects in its pipeline."

Read more of this story at Slashdot.

EditorDavid

Rust's Annual Tech Report: Trusted Publishing for Packages and a C++/Rust Interop Strategy

3 months ago
Thursday saw the release of Rust 1.89.0 But this week the Rust Foundation also released its second comprehensive annual technology report. A Rust Foundation announcement shares some highlights: - Trusted Publishing [GitHub Actions authentication using cryptographically signed tokens] fully launched on crates.io, enhancing supply chain security and streamlining workflows for maintainers. - Major progress on crate signing infrastructure using The Update Framework (TUF), including three full repository implementations and stakeholder consensus. - Integration of the Ferrocene Language Specification (FLS) into the Rust Project, marking a critical step toward a formal Rust language specification [and "laying the groundwork for broader safety certification and formal tooling."] - 75% reduction in CI infrastructure costs while maintaining contributor workflow stability. ["All Rust repositories are now managed through Infrastructure-as-Code, improving maintainability and security."] - Expansion of the Safety-Critical Rust Consortium, with multiple international meetings and advances on coding guidelines aligned with safety standards like MISRA. ["The consortium is developing practical coding guidelines, aligned tooling, and reference materials to support regulated industries — including automotive, aerospace, and medical devices — adopting Rust."] - Direct engagement with ISO C++ standards bodies and collaborative Rust-C++ exploration... The Foundation finalized its strategic roadmap, participated in ISO WG21 meetings, and initiated cross-language tooling and documentation planning. These efforts aim to unlock Rust adoption across legacy C++ environments without sacrificing safety. The Rust Foundation also acknowledges continued funding from OpenSSF's Alpha-Omega Project and "generous infrastructure donations from organizations like AWS, GitHub, and Mullvad VPN" to the Foundation's Security Initiative, which enabled advances like including GitHub Secret Scanning and automated incident response to "Trusted Publishing" and the integration of vulnerability-surfacing capabilities into crates.io. There was another announcement this week. In November AWS and the Rust Foundation crowdsourced "an effort to verify the Rust standard library" — and it's now resulted in a new formal verification tool called "Efficient SMT-based Context-Bounded Model Checker" (or ESBMCESBMC) This winning contribution adds ESBMC — a state-of-the-art bounded model checker — to the suite of tools used to analyze and verify Rust's standard library. By integrating through Goto-Transcoder, they enabled ESBMC to operate seamlessly in the Rust verification workflow, significantly expanding the scope and flexibility of verification efforts... This achievement builds on years of ongoing collaboration across the Rust and formal verification communities... The collaboration has since expanded. In addition to verifying the Rust standard library, the team is exploring the use of formal methods to validate automated C-to-Rust translations, with support from AWS. This direction, highlighted by AWS Senior Principal Scientist Baris Coskun and celebrated by the ESBMC team in a recent LinkedIn post, represents an exciting new frontier for Rust safety and verification tooling.

Read more of this story at Slashdot.

EditorDavid