7 décembre 2018 | International, Aérospatial

Boeing, ELG Carbon Fibre find new life for airplane structure material in groundbreaking partnership

First-agreement of its kind will repurpose aerospace-grade composite material for making laptop cases, car parts and other products

Partnership will reduce solid waste by more than one million pounds a year

SEATTLE, Dec. 5, 2018 /PRNewswire/ -- Boeing [NYSE:BA] and ELG Carbon Fibre today announced a partnership to recycle excess aerospace-grade composite material, which will be used by other companies to make products such as electronic accessories and automotive equipment.

The agreement – the first of its kind for the aerospace industry – covers excess carbon fiber from 11 Boeing airplane manufacturing sites and will reduce solid waste by more than one million pounds a year.

Carbon-fiber reinforced material is extremely strong and lightweight, making it attractive for a variety of uses, including in building the super-efficient 787 Dreamliner and the all-new 777X airplane.

As the largest user of aerospace-grade composites from its commercial and defense programs, Boeing has been working for several years to create an economically viable carbon fiber reuse industry. The company improved its production methods to minimize excess and developed a model for collecting scrap material.

But technical barriers stood in the way of repurposing material that had already been "cured" or prepped for use in the airplane manufacturing process. UK-based ELG developed a proprietary method to recycle "cured" composites so they do not have to be thrown out.

"Recycling cured carbon fiber was not possible just a few years ago," said Tia Benson Tolle, Boeing Materials & Fabrication director for Product Strategy & Future Airplane Development. "We are excited to collaborate with ELG and leverage innovative recycling methods to work toward a vision where no composite scrap will be sent to landfills."

To prove that the recycling method can be applied on a grand scale, Boeing and ELG conducted a pilot project where they recycled excess material from Boeing's Composite Wing Center in Everett, Wash., where the massive wings for the 777X airplane are made.

ELG put the excess materials through treatment in a furnace, which vaporizes the resin that holds the carbon fiber layers together and leaves behind clean material. Over the course of 18 months, the companies saved 380,000 pounds of carbon fiber, which was cleaned and sold to companies in the electronics and ground transportation industries.

"Security of supply is extremely important when considering using these materials in long-term automotive and electronic projects," said Frazer Barnes, managing director of ELG Carbon Fibre. "This agreement gives us the ability to provide that assurance, which gives our customers the confidence to use recycled materials."

Based on the success of the pilot project, Boeing says the new agreement should save a majority of the excess composite material from its 11 sites, which will support the company's goal to reduce solid waste going to landfills 20 percent by 2025.

"This collaboration takes Boeing's commitment to protect the environment to a whole new level. Recycling composites will eventually be as commonplace as recycling aluminum and titanium," said Kevin Bartelson, 777 Wing Operations leader.

Boeing and ELG are considering expanding the agreement to include excess material from three additional Boeing sites in Canada, China and Malaysia.

As a result of the partnership, ELG estimates the number of its employees will nearly triple from 39 in 2016 to an expected 112 by the end of 2019 as the recycling market continues to expand.

Contact:
Todd Kelley
425-373-8388
todd.e.kelley@boeing.com

SOURCE Boeing

https://boeing.mediaroom.com/2018-12-05-Boeing-ELG-Carbon-Fibre-find-new-life-for-airplane-structure-material-in-groundbreaking-partnership

Sur le même sujet

  • CISO Perspectives on Complying with Cybersecurity Regulations

    8 avril 2024 | International, C4ISR

    CISO Perspectives on Complying with Cybersecurity Regulations

    Navigating cybersecurity compliance just got easier. Our latest blog taps into the wisdom of CISOs to share strategies for managing data security requ

  • This is Knight’s Armament’s new machine gun suppressor

    19 juillet 2019 | International, Autre défense

    This is Knight’s Armament’s new machine gun suppressor

    Knight's Armament Company of Titusville, Florida, unveiled a new suppressor at this year's Special Operations Forces Industry Conference where members of the SOF community get to interact with vendors and industry partners to preview and try out the latest and greatest in special operations kit and gear. KAC's suppressor is designed primarily to be used with the company's premier belt-fed Light Assault Machine Gun platform, chambered for 5.56 NATO and marketed more towards the SOF and private military contractor communities than to conventional infantry forces. True to its name, the LAMG is indeed very light, weighing only 8.6 pounds unloaded. In comparison, the M249 Squad Automatic Weapon weighs in at 17 pounds unloaded. According to KAC, one of the LAMG's biggest selling points is its ability to put down a high volume of fire with a low cyclic rate of just around 575-625 rounds per minute, allowing the end user to maintain a greater degree of control over the weapon and concentrate accurate fire on target. The suppressor, delivered in kit form, mounts to a threaded barrel included in the kit, and makes heavy use of a unique Pressure Reduction Technology system, which vents the gasses from each shot forward, preventing the gas from venting backwards into the shooter's face. Additionally -- and probably its best feature -- the PRT system allows the LAMG to keep its factory cyclic rates during sustained fire without any major dips. The LAMG is currently available to defense buyers, which means that the new suppressor will likely only be targeted towards military sales. At the moment, US SOCOM doesn't list the LAMG in its belt-fed arsenal, though it's possible that there are foreign SOF units that make use of KAC's innovative light machine gun platform, and might potentially avail of a sustained fire suppressor. https://www.militarytimes.com/off-duty/gearscout/irons/2019/07/09/this-is-knights-armaments-new-machine-gun-suppressor/

  • Making DoD Security Operations Centers More Effective: Security Automation

    13 juillet 2020 | International, C4ISR, Sécurité

    Making DoD Security Operations Centers More Effective: Security Automation

    Security orchestration, automation, and response (SOAR) software frees DoD analysts to apply cognitive skills to actually fixing problems. By SPLUNKon July 10, 2020 at 6:39 PM The Defense Department's most recent National Defense Strategy (NDS) describes a complex military environment characterized by increased global disorder, a decline in the long-standing rules-based international order, myriad threats from rogue states like Iran and North Korea, great power peers like China and Russia, malicious hackers, and terrorists in places like Yemen. One of the military domains where this dynamic is most evident is cyberspace, where bad actors arguably have comparable or better cyber capabilities than us. “This increasingly complex security environment is defined by rapid technological change, challenges from adversaries in every operating domain, and the impact on current readiness from the longest continuous stretch of armed conflict in our nation's history,” the NDS states. “In this environment, there can be no complacency—we must make difficult choices and prioritize what is most important...” More cybersecurity threats mean more cyberattacks on DoD networks. Essye Miller, former principal deputy for the DoD CIO, said recently that attacks on department networks are surging and that the attack surface is expanding as adversaries target DoD employees working from home during the coronavirus pandemic. This surge in cyberattacks means that analysts working in DoD information security operations centers (SOCs) are being bombarded with security alerts. With so many events, it's hard for them to differentiate true alerts from false ones, and to determine which events are priorities to address immediately. Through no fault of their own, they end up chasing their tail when their time could be better spent on mission-critical activities that directly support warfighters. The solution for this domain is automation. While popular in commercial software segments for years—including SalesForce automation, marketing automation, human resources automation, and IT automation—DoD security teams are just beginning to realize the benefits of what's known as security orchestration, automation, and response. The Value of Security Automation “Automation is nothing new to the military. The Defense Department is making great inroads into DevSecOps, for example,” explained Drew Church, senior security advisor at Splunk, referring to an agile software development process where software is quickly developed, tested, and improved over weeks and months rather than years. “A key, fundamental concept of DevSecOps is automation. The point of automation in DevSecOps is to bring together different technologies, tools, people, and processes to develop code and get it out to the war fighter more rapidly. “Automation provides that same capability inside IT operations procedures, security operations procedures, and other business processes,” said church. “It does this in a reliable and repeatable fashion every time, and at speed and scale.” Splunk's SOAR solution is called Phantom. It helps security teams work to identify, analyze, and mitigate threats facing their organizations. It can be used to improve efficiency, shorten incident response times and reduce the growing backlog of security incidents, even when there's a shortfall of DoD security personnel to analyze the volume of daily security alerts. Phantom does so by integrating teams, processes, and tools, and by automating tasks, orchestrating workflows, and supporting a range of SOC functions to include event and case management, collaboration, and reporting. In essence, it frees SOC analysts of the usual Tier I-type activities of gathering data from the security information and event management (SIEM) platform, prioritizing these alerts, performing triage to determine if an alert is real or a false alarm, configuring and managing security monitoring tools, and generating trouble tickets. Instead, Splunk Phantom lets them spend more time on the value-added work of Tier II SOC analysts. This includes actually investigating the trouble tickets, responding to incidents, and leveraging threat intelligence to better understand the threat and be proactive rather than reactive. “Focusing on the bureaucracy of security rather than the actual doing of security limits the effectiveness of security analysts,” said Church. “Better to free them of the tasks that can be easily automated like reviewing IP addresses, domain names, and URLs so that they can be force multipliers in conducting the thoughtful work needed to protect DoD networks. “That automation is done for them in Phantom. It let's analysts focus on investigating and taking remediation or mitigation steps as appropriate. Where humans excel is in actually thinking through a problem. Copying and pasting from websites, emails, and reports is not the most effective use of a highly paid, resource-limited talent pool.” Integration With Existing SOC Tools SOC analysts make their decisions by gathering information. They sometimes review classified military intelligence, but usually they look at a lot of open-source information and data from commercial off-the-shelf products from myriad providers of cybersecurity threat intelligence products. Some of the common ones that are relevant to the Defense Department include: McAfee's ePolicy Orchestrator, which the DoD refers to as Host Based Security Systems (HBSS); and Tenable's Security Center, which is known inside the DoD as Assured Compliance Assessment Solution (ACAS). Splunk Phantom has more than 300 out-of-the-box integrations with products like HBSS and ACAS. “Being integrated with each of those products permits the analyst to get the information they need without having to go to another browser window, or another tab, or a different computer,” said Church. “Phantom automatically brings all that data to the analyst. That takes somebody who spends most of their time copying information from page A into system B and lets them make more rapid and accurate determinations about the threat.” Through the use of APIs (application programming interface), that same integration is also found with government off-the-shelf (GOTs) solutions that haven't before been integrated with Splunk Phantom because there was never a request to do so. The same goes for a custom app created by a DevSecOps shop like the Air Force's Kessel Run project in Boston, for example. Automating these vital but drudgerous processes also pays dividends during both staffing shortfalls and times of surge, and brings consistency to SOC activities. Military service members are constantly rotating and changing duty stations; senior leadership turns over regularly. Contractors have to be relied upon to provide continuity from tour to tour. That means that SOC processes that were well oiled on a Monday may no longer be operating smoothly on Friday because of a change of command. Or maybe there is a compelling event that grabs everyone's attention. Or possibly there are legal or policy requirements that need to be addressed, and though they don't add mission value they still must be completed. Automation by Splunk Phantom smooths out the bumps associated with those all-to-common scenarios by keeping the flow of vital data moving to where it can be acted upon best. “The computer's running the marathon for you so that you are free to sprint and swarm on the problems that need the most resources at any particular time,” said Church. The Takeaway For security analysts, incident handlers/responders, IT operations managers, security operations managers, and forward-leaning business process experts, Splunk Phantom is all about removing barriers so people can get back to accomplishing the mission, maximizing productivity of skilled personnel and organizations. “For anybody that has a business process, a mission process, an IT operations process, or a security process and wants to free those skilled workers to get back to what you brought them onboard to do, we can help you with that,” said Church. “We do that through orchestration, we do that through automation. We bring in collaboration, and we're able to do that at scale because of the value that a company like Splunk brings to the table. By being able to have a rich ecosystem of partners and support across the board, we're able to do that even with differences from organization to organization.” Splunk Phantom addresses technology-based processes, and orchestrates and automates those processes to get people back to doing what they do best. https://breakingdefense.com/2020/07/making-dod-security-operations-centers-more-effective-security-automation/

Toutes les nouvelles