Browse Definitions:
Reference

Smart Grid Technology Overview

GLOSSARY
Browse definitions and acronyms
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  #

> Printable Smart Grid glossary
> View all Smart Grid terms

Newly Added or Updated:
> machine-to-machine
> FERC
> compressed air energy storage
> MultiSpeak

SMART GRID PROJECTS
Google map of all smart grid projects around the world. (Zoom out to see U.S.)


KNOW-IT-ALL FAST FACTS
A smart meter has a wireless networking interface and mesh networking software.

There’s $2 billion in stimulus money available for projects that seek to make components of the Smart Grid interoperable and vendor neutral.

The Federal Communications Commission released its National Broadband Plan on March 17. Among the larger issues addressed in the Plan is the use of wireless broadband to facilitate Smart Grid development.

GOVERNMENT LINKS
SmartGrid.gov

U.S. Department of Energy

NIST: Smart Grid Interoperability Standards Roadmap

Smart Grid Investment Grant Program

White House: Smart Grid initiatives

WHAT IS THE SMART GRID?

Smart grid is a generic label for the application of computer intelligence and networking abilities to a dumb electricity distribution system. Smart grid initiatives seek to improve operations, maintenance and planning by making sure that all components of the electric grid can seamlessly exchange data. Smart Grid vocabulary is about electricity and power management, but it's also about networking, data management, data analytics, storage, security, customer communication and privacy. Continue...

OVERHEARD TALKING ABOUT SMART GRID TECH
"The overriding goal of Critical Infrastructure Protection (CIP) standards is to ensure the bulk electric system is protected from cyberattacks." -- Ernie Hayden

SMART GRID IT ROUNDUP
Smart grid tutorial: What IT managers should know
This smart grid tutorial explains what enterprise IT managers should know about the technology and how it will be applied to your business's wide area network (WAN).

Energy IT sees smart-grid boon for data storage
The economic stimulus package set aside billions of dollars for smart grids and smart meters, and storage admins at early-adopter energy companies are already managing hundreds of terabytes and even petabytes of data. (SearchStorageChannel.com)

NIST, smart grid privacy and social networking for security pros
The National Institutes of Standards and Technology (NIST) has outlined a framework for building more intelligence and interoperability into the electrical system of the United States. (ITKnowledgeExchange.com)

Networking VARs could grab smart grid stimulus bill funding
Given that the stimulus bill includes $54 billion for modernizing the nation's energy grid, VARs will have to take a second look at these opportunities, especially since these projects will depend on integrators for networking, storage and systems. (SearchNetworkingChannel.com)

Black Hat presenters to showcase smart grid security risks
Smart grid technology opens a world of possibilities for energy conservation and efficient operations. Unfortunately, it is also creating great opportunities for smart grid hackers. (SearchSecurity.com)

NERC CIP training: Understanding 'critical cyber asset identification'
CIP-002 through CIP-009 provide the minimum requirements for utilities and other affected enterprises to ensure the Bulk Electric System (BES) is effectively protected from cyberattacks and faults. (SearchSecurityChannel.com)

Smart Grid Opportunities for Solution Providers
Learn about the smart grid opportunities for solution providers from President Obama's stimulus package. (SearchITChannel.com)

Oracle takes the measure of smart metering technology
Oracle appears poised to jump into the smart grid business, but instead of pursuing opportunities having to do with saving electricity, it will focus on water conservation. (SearchOracle.com)

HP 'grid vision' has users scratching their heads
HP's product roadmap includes Reference Information Storage System (RISS), HP's archiving appliance and Scalable File Share (SFS), a global file system. (SearchStorage.com)

Cisco and Silver Spring Networks: A burgeoning rivalry to watch
VARs and system integrators who are looking to build a smart grid practice will probably see Cisco as a natural partner, but Silver Spring might be a good prospect as well. (SearchNetworkingChannel.com)

NERC CSO warns of cybersecurity threats, risk to electric grid
Addressing cybersecurity threats presents new challenges to utility companies and security executives. (SearchCompliance.com)

NIST, smart grid privacy and social networking for security pros
The major benefit provided by the Smart Grid, i.e. the ability to get richer data to and from customer meters and other electric devices, is also its Achilles’ heel from a privacy viewpoint. (ITKnowledgeExchange.com)

How does SAP fit into plans for a Smart Grid?
Advanced Meter Infrastructure (AMI) is about to enable what the utilities industry calls the Smart Grid, an integrated system that will turn meters into two-way communication devices and that means a lot more data. (SearchSAP.com)

 

VIDEO
Demystifying and De-Jargoning the Smart Grid
Efran Ibrahim, Technical Executive at the Electric Power Research Institute

 
WEBCAST
Securing the Power Grid
Automating NERC cyber security compliance

Choices for the Smart Grid
ISOC-DC discussion

 

WHITE PAPERS
The Smart Grid: An Introduction
Exploring the imperative of revitalizing America's electical infrastructure

Smart Grid
Leveraging intelligent communication to tranform the power infrastructure

Data Center Power Distribution Architecture
Install racks and PCUs without new wiring

Levels of Intelligence
Standardizing the Classification of Intelligence Levels and Performance of Electricity Supply Chains

VENDOR LINKS
IBM
Solution Architecture For Energy and Utilities Framework (SAFE)

Cisco
Cisco Smart Grid Solutions

Oracle/Sun
Oracle Utilities Products

Intel
Open Energy Initiative

HP
Smart meter solutions

Microsoft
Microsoft in Utilities

SAP
SAP in Utilities

 

     

 

 

 

     
This was last updated in April 2011

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close