Browse Definitions :
Definition

compressed air energy storage (CAES)

Compressed air energy storage (CAES) is a way to store massive amounts of renewable power by compressing air at very high pressures and storing it in large underground caverns, depleted wells or aquifers. The compressed air can be released and run through turbines to generate power when wind turbines and solar plants reduce output and power is needed. Hundreds of hours of output can be stored, providing the ability to cover long doldrum wind periods or a series of cloudy days. 

Currently, underground caverns and depleted wells are used to store natural gas.  A nationwide network of CAES plants could use the same types of geographical formations to offer very economical energy storage.  In the extreme event a cavern becomes fully depleted of air, most CAES turbines can also run in natural gas-only mode. Unlike a nuclear or coal plant, a plant that uses CAES is able to supply fully dispatchable power, which means that the plant is able to increase and decrease its output to match fluctuating customer demand. This flexibility is a major advantage for usefulness to the electric grid.

Learn more:

Dr. Joseph Romm explains more about CAES in  "The Holy Grail of clean energy economy is in sight: Affordable storage for wind and solar."

 

Contributor: Dr. Joseph Romm

This was last updated in September 2010

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close