Articles
Posted By: Gerald Conn - Safety and Workers' Compensation Manager/Subject Matter Expert, ACRT, Inc.
On: July 23, 2015
Those who work outdoors are usually well acquainted with weather hazards and tend to keep a closer eye than most on the local weather report. When weather conditions directly affect your workday—especially when weather turns severe—it’s critical to understand how to protect yourself and avoid many weather-related safety myths that  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Charlie Hewitt - Principal, Sarsen Energy Group
On: June 26, 2015
The goals of retail electric competition are a source of disagreement among legislators, utilities, competitive suppliers, and consumers.  Some parties believe that the only goal is to reduce costs to consumers while others believe that customer choice produces important ancillary benefits such as innovation and consumer engagement.  This leads to  more...
Article Viewed 0 Times  |  1 Comments
Posted By: Aaron Hills , Darren Byrne
On: June 18, 2015
Age is the silent killer of America’s critical infrastructure.  In 2013, the American Society of Civil Engineers (ASCE) graded this infrastructure a D+ and noted that the majority is being pushed far beyond designed limits and intended life.  In 2013 alone, investor owned electric utilities and stand alone transmission companies  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Kimberly Klemm
On: June 9, 2015
When comparing clean energy systems for generating electric power, technology evaluation is dependent on understanding resistance, current, and voltage factors. Although the topic of electrical system variations is too widespread to address in the field of electric home generators, the questions of critical field resistance and types of electricity generation  more...
Article Viewed 0 Times  |  1 Comments
Posted By: Jerry Jackson - President, Jackson Associates
On: May 22, 2015
Untitled Document Deloitte’s reSources 2014 Survey found a growing number of firms recognizing energy management as essential in corporate growth strategies.   This is not a surprising considering that US businesses, institutions and government buildings are losing more than $60 billion/year in overlooked, profitable energy efficiency investments.1 The extent to which  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Dr. Marc Lamoureux
On: April 3, 2015
1.0 Introduction This paper provides an introductory exposition of NERC’s Risk-Based Compliance Monitoring and Enforcement Program (CMEP) oversight approach in the light of organizational policy recommendations to consider as the process begins and unfolds. Oversight approach elements that are considered include risk-based CMEP contextualized as a type of organizational policy  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Jasvir Gill - Founder and CEO, AlertEnterprise
On: February 12, 2015
The hacking of Sony Picture Studios over the release of a movie mocking North Korea’s head of state was a serious cyber-attack on vital corporate assets, business data and the private personal information of Sony employees, contractors and vendors.   The severe economic and reputational consequences of Sony’s failure to adequately  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Shiuly Kisku
On: January 15, 2015
A classic case of power shift from an autocracy to a democracy; the story of the Utility transformation may be just that. Ever since de-regulation, reliable power delivery now exists beyond the physical boundaries of power plants, substations, network operating houses, leaving more vulnerable ends open; hence, there's a surge  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Mike Craigie - Managing Director, Combustion, Energy & Steam Specialists Ltd
On: December 12, 2014
SYNOPSIS This paper outlines the recommended strategy for the valuation, marketing and disposal of surplus power plant. In addition to assessing the overall extent and varied sources of such available equipment, the paper also looks closely at the various options which a utility can adopt when disposing of such plant,  more...
Article Viewed 0 Times  |  Be the first to comment on this article.
Posted By: Joel Gordes - Consultant, Environmental Energy Solutions
On: December 8, 2014
It is particularly interesting to see the word "deterrence" in relation to cyber security and this should be a primary goal although it must eventually be viewed as only a portion of a larger strategy. One of the major differences in a cyber sense, particularly at a state level, is  more...
Article Viewed 0 Times  |  Be the first to comment on this article.

Receive Energy Central eNews & Updates





 

Protecting Your Utility with Data: Mitigating Cyber Risk with Financial Analysis

Tuesday Aug 4, 2015 - 12:00 PM Eastern - Virtual Event

The average utility faces $8 million of annual cyber risk from attacks that target end-user devices. As companies expand mobile workforces and bring-your-own-device policies, and as threats become increasingly sophisticated, this risk will only grow. more...



Sponsored Content