Browse Definitions :
Definition

smart grid

Smart grid is a generic label for the application of computer intelligence and networking abilities to a dumb electricity distribution system.

Smart grid initiatives seek to improve operations, maintenance and planning by making sure that each component of the electric grid can both 'talk' and 'listen.' Another major component of smart grid technology is automation.

In many places, a power company will only know that service is out if a customer calls. In a smart grid scenario, if service is interrupted the company will know right away because certain components of the grid (smart meters in the affected area, for instance) stop sending sensor data. By ensuring that all the components of the grid -- from transformers to power lines to home electric meters -- have IP addresses and are capable of two-way communication, the company can manage distribution more efficiently, be proactive about maintenance and respond to outages faster.

The United Stated Department of Energy proposes that four types of technology will drive the advancement of smart grids: 

  • Integrated, automated communication between components of the electric grid. 
  • Sensing and measurement technologies. 
  • Automated controls for distribution and repairs. 
  • Improved management dashboards and decision support software.

The smart grid is one example of the burgeoning Internet of Things (IoT), in which almost any entity imaginable can be outfitted with a unique identifier (UID) and the capacity to communicate over a network.

See also: sensor, smart grid sensor, wireless sensor and actuator network (WSAN), sensor hub

This was last updated in September 2015

Continue Reading About smart grid

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close