Articles
Posted By: Areg Bagdasarian
On: June 23, 2015
Many of us have looked longingly and probably with a hint of envy, at the annual lists of the most livable cities in America and the world. Places like Austin, TX, Charlotte, NC, Vienna, Zurich, Vancouver and Munich regularly make the cut.  Consultancies like Mercer have sliced and diced the  more...
Article Viewed 0 Times  |  5 Comments
Posted By: Patrick Flynn - Group Leader, Sustainability, IO
On: June 12, 2015
Data centers consume large amounts of energy to operate the computer systems, networks and software upon which enterprises depend. And this energy consumption continues to rise as the digital world grows exponentially. Within the data center, energy typically represents 60 to 70 percent of the total operational costs. Creating an  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Puneet Gupta - Chief Technology Officer, Brillio
On: April 15, 2015
In the utility industry, customers expect – actually they demand - uninterrupted service and perfect product delivery. The threshold of tolerance for “mistakes” or slow response is low; the audience is vocal, digitally savvy and socially empowered; and there are government and regulatory eyes watching at all times. Layer in  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Prasanth Kumar - Consulting Partner, Wipro Technologies
On: March 23, 2015
Modern day Transmission and Distribution utilities are rapidly moving towards a smarter world and have the requirement to manage and maintain millions of physical asset attributes and characteristics in order to effectively manage and monitor the infrastructure network.  Traditionally, asset data management has always been a prime issue for these  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Michael Assante - Co-founder and Chief Security Strategist, NexDefense
On: February 10, 2015
As the world continues its transition into a digital landscape, we are cautioned by the proliferation of cyber incidents capturing headlines. Today’s cyber attacks are causing more damage and are increasingly being referred to as highly sophisticated and able to circumvent well-resourced cybersecurity programs.  This challenge is starting to present  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Jason Larson - Principal Security Consultant, IOActive
On: January 21, 2015
While Industrial Control System (ICS) vendors are quite practiced at finding and fixing implementation bugs, many have minimal experience with design bugs. In the near future, we can expect the attacker community to leverage this weakness, as it did with earlier technologies. Therefore, ICS vendors must begin focusing better on  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Steve Ehrlich - Senior Vice President, Marketing and Product Management, Space-Time Insight
On: January 12, 2015
Security Everywhere We expect utility services to be everywhere we are: charging our electronics in airports, flame-grilling our meals in restaurants, and filling drinking fountains in our public parks. To provide this level of service and convenience, utilities build networks of wires and pipes and communications channels that for the  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Gordon Feller - Director, Global HQ, Cisco
On: December 3, 2014
There's much debate about the potential value of the Internet of Things (IoT). But what is it really? IoT is the intelligent connectivity of smart devices, expected to drive massive gains in efficiency, sustainable growth and quality of life. In other words, when objects can sense each other and communicate,  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Joyce Tam - Product Marketing Strategist, Trimble Field Service Management
On: December 2, 2014
When a public works truck recently broke down in blizzard conditions during snow removal in a suburb of Boston, dispatchers knew exactly where to find the vehicle. That's because the public works department uses fleet management with telematics that tracks the progress of their fleet and crew in the field.  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: James Mater , Jim Zuber , Rolf Bienert
On: November 24, 2014
Let's begin under the premise that you (end-user, utility, aggregator, etc.) want to acquire technology from different vendors, specify the communications interface between products and have all such products install and work together easily and quickly (similar to adding a new printer to your PC - sometimes it's called "plug  more...
Article Viewed 0 Times  |  Be the first to comment on this article.

Receive Energy Central eNews & Updates





 

Protecting Your Utility with Data: Mitigating Cyber Risk with Financial Analysis

Tuesday Aug 4, 2015 - 12:00 PM Eastern - Virtual Event

The average utility faces $8 million of annual cyber risk from attacks that target end-user devices. As companies expand mobile workforces and bring-your-own-device policies, and as threats become increasingly sophisticated, this risk will only grow. more...

Part 2 of 3 - Driving a Better Utility Customer Experience with Analytics as a Service: Responding to the Voice of the Customer

Tuesday Aug 18, 2015 - 12:00 PM Eastern - Virtual Event

A Free Intelligent Utility Webinar Series: Tuesday, July 28 - Making the Most of Multichannel | Tuesday, August 18 - Responding to the Voice of the Customer | Tuesday, September 29 - Increasing Program Success with Predictive Analytics more...



Sponsored Content