The potential for the smart grid to do a host of good things -- cutting energy use, improving the environment, saving homeowners and businesses money, and generating revenue for a wide variety of companies in the telecommunications and IT sectors -- is unquestioned. The smart grid clearly is a winning initiative for society, as well as many companies.
That’s the good news. Just as the potential of the smart grid is an area of almost limitless potential, it also is an area of almost limitless complexity. The initiative, which is no less than to redefine and rework the way the nation supplies power to its homes and businesses, could easily get bogged down in conflicting agendas, governmental inertia and antiquated and legacy thinking.
The sheer breadth of the project – or, more accurately, projects – creates the dangers. Dozens of areas must be addressed, from how information is shepherded back and forth from home to utility, how to best guard the grid against being overwhelmed by demand, and how to enable people to remotely control their energy use. And, of course, there are profound security concerns at each step. Each of these will be areas of competition and, most likely, half-hearted cooperation between vendors.
In this slideshow, we take a look at the key components of the smart grid and the obstacles facing this massive undertaking.
Contract Negotiation Strategy: Waste Less Time and Get Better Deals Negotiate contracts with confidence with these tips.
Ten Reasons Why the IT Job Market Is Hot in 2010 IT remains a great career path for people already in the field, and for those considering it.
Why IT Projects Fail Recognize the early warning signs of imminent project failure.
Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ... More >>
Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ... More >>
Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ... More >>