The potential for the smart grid to do a host of good things -- cutting energy use, improving the environment, saving homeowners and businesses money, and generating revenue for a wide variety of companies in the telecommunications and IT sectors -- is unquestioned. The smart grid clearly is a winning initiative for society, as well as many companies.
That’s the good news. Just as the potential of the smart grid is an area of almost limitless potential, it also is an area of almost limitless complexity. The initiative, which is no less than to redefine and rework the way the nation supplies power to its homes and businesses, could easily get bogged down in conflicting agendas, governmental inertia and antiquated and legacy thinking.
The sheer breadth of the project – or, more accurately, projects – creates the dangers. Dozens of areas must be addressed, from how information is shepherded back and forth from home to utility, how to best guard the grid against being overwhelmed by demand, and how to enable people to remotely control their energy use. And, of course, there are profound security concerns at each step. Each of these will be areas of competition and, most likely, half-hearted cooperation between vendors.
In this slideshow, we take a look at the key components of the smart grid and the obstacles facing this massive undertaking.
Contract Negotiation Strategy: Waste Less Time and Get Better Deals Negotiate contracts with confidence with these tips.
Ten Reasons Why the IT Job Market Is Hot in 2010 IT remains a great career path for people already in the field, and for those considering it.
Why IT Projects Fail Recognize the early warning signs of imminent project failure.
It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ... More >>
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>