Browse Definitions :
Definition

compressed air energy storage (CAES)

Compressed air energy storage (CAES) is a way to store massive amounts of renewable power by compressing air at very high pressures and storing it in large underground caverns, depleted wells or aquifers. The compressed air can be released and run through turbines to generate power when wind turbines and solar plants reduce output and power is needed. Hundreds of hours of output can be stored, providing the ability to cover long doldrum wind periods or a series of cloudy days. 

Currently, underground caverns and depleted wells are used to store natural gas.  A nationwide network of CAES plants could use the same types of geographical formations to offer very economical energy storage.  In the extreme event a cavern becomes fully depleted of air, most CAES turbines can also run in natural gas-only mode. Unlike a nuclear or coal plant, a plant that uses CAES is able to supply fully dispatchable power, which means that the plant is able to increase and decrease its output to match fluctuating customer demand. This flexibility is a major advantage for usefulness to the electric grid.

Learn more:

Dr. Joseph Romm explains more about CAES in  "The Holy Grail of clean energy economy is in sight: Affordable storage for wind and solar."

 

Contributor: Dr. Joseph Romm

This was last updated in September 2010

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close