Smart Grid: A Closer Look at Potential and Obstacles

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Previous Smart Grid: A Closer Look at Potential and Obstacles-1 Next

Click through to take a closer look at key components and obstacles of the smart grid.

The potential for the smart grid to do a host of good things -- cutting energy use, improving the environment, saving homeowners and businesses money, and generating revenue for a wide variety of companies in the telecommunications and IT sectors -- is unquestioned. The smart grid clearly is a winning initiative for society, as well as many companies.

That’s the good news. Just as the potential of the smart grid is an area of almost limitless potential, it also is an area of almost limitless complexity. The initiative, which is no less than to redefine and rework the way the nation supplies power to its homes and businesses, could easily get bogged down in conflicting agendas, governmental inertia and antiquated and legacy thinking.

The sheer breadth of the project – or, more accurately, projects – creates the dangers. Dozens of areas must be addressed, from how information is shepherded back and forth from home to utility, how to best guard the grid against being overwhelmed by demand, and how to enable people to remotely control their energy use. And, of course, there are profound security concerns at each step. Each of these will be areas of competition and, most likely, half-hearted cooperation between vendors.

In this slideshow, we take a look at the key components of the smart grid and the obstacles facing this massive undertaking.

More Slideshows:


Contract Negotiation Strategy: Waste Less Time and Get Better Deals Negotiate contracts with confidence with these tips.

Ten Reasons Why the IT Job Market Is Hot in 2010 IT remains a great career path for people already in the field, and for those considering it.


Why IT Projects Fail Recognize the early warning signs of imminent project failure.

 

Related Topics : Clustering, Energy Consumption, High-Performance Computing, Java, SOA

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

InfoBuildersIoTData0x Capitalizing on IoT Data: The Golden Rule for Data Success

The key to truly capitalizing on IoT data is a well-established, integrated information management strategy. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.