IIOT
-
IIOT
CleanSpark Announces $2.5 Million in Order for its Intelligent ATS Switchgear
SALT LAKE CITY — CleanSpark, Inc., a microgrid company with advanced engineering, software and controls for innovative distributed energy resource (DER) and microgrid deployments today announced that it has secured a $2.5 million in orders for its intelligent automatic transfer switch (ATS) switchgear. The Company’s Intelligent ATS switchgear is used to automatically transfer power supply from its […]
Tagged in: -
IIOT Power
THE BIG PICTURE: 30 Innovations Revolutionizing the Power Industry
Between 2005 and 2016, the global installed capacity of solar PV increased more than seven-fold, and the capacity of onshore wind increased nearly three-fold, and owing to plunging costs, variable renewable energy (VRE) capacity is set to expand dramatically, according to the International Renewable Energy Agency (IRENA). To accommodate soaring shares of VRE generation, innovations […]
-
Cybersecurity
Modifying Behavior to Protect Systems in a Malicious Threat Landscape
The malicious threat landscape for industrial control systems (ICSs) is constantly evolving and getting more sophisticated, thereby raising the need to have visibility, implement protective controls, and perform continuous monitoring. As a result, it is important to take a look at the attack vectors of some malware/malicious events—such as Triton—that have occurred over the last […]
-
Smart Grid
Certifying Precision Timing in the Smart Grid
Utilities deploying precise timing in their networks have an additional choice in evaluating solutions based on whether or not the devices are IEEE certified for compliance to the appropriate IEEE 1588 Power Profile. To reach this point, years of effort from the IEEE, International Electrotechnical Commission (IEC), National Institute of Standards and Technology (NIST), and […]
-
News
The Dark Side of the Smart Grid
The smart grid offers great promise to transform the electric system, enabling two-way communication between providers and consumers over the network, and allowing new services that can save electricity and
-
Connected Plant
Regulators Must Mirror the Greening of America’s Power Supply
COMMENTARY The 19th-century electrical grid has had a good run in the United States. For more than 100 years, it has reliably provided electricity to end-users based on the premise that a centralized generation and transmission model was the way to go. Large coal, hydro and (later) nuclear generating facilities would produce huge amounts of […]
Tagged in: -
Connected Plant
Lessons in Backup Power Generation from South Australia
Electricity demand spiked considerably in South Australia this past January as residents tried to stay cool in the middle of a record heat wave that brought temperatures up to 46.6°C (or about 115°F). To ensure a stable power supply would be available, the South Australian government fired up two power plants (276 MW) that the […]
-
Cybersecurity
New Cyberattack by Group Behind TRITON/TRISIS Reported
Cybersecurity firm FireEye has uncovered and is responding to a new intrusion at an unnamed critical infrastructure facility that it suggests in an April 10 blog post was perpetrated by the group behind the TRITON attack, which prompted a process shutdown at a Middle Eastern facility in 2017. But while details of the new attack are sparse, […]
-
Press Releases
TrendMiner Introduces New Capabilities and Extended Integration with PI System at OSIsoft PI World 2019
The long-term OSIsoft partner will unveil extended capabilities to support PI Event Frames and preview their latest software enhancement, DashHub, at the flagship event. Houston, TX, USA – April 9, 2019 – TrendMiner NV, a Software AG company and provider of the leading self-service predictive analytics software, announced today that they will be previewing the […]
Tagged in: -
Connected Plant
Hackers May Already be in Your Infrastructure—Now What?
Cyber-attacks on industrial control systems (ICSs) are no longer a hypothetical. As pieced together by the Wall Street Journal, in 2017, Russian hackers attacked a small construction company, exploiting the organization’s connections with utilities and government agencies. Through an integrator, the hackers accessed computer-network credentials, giving them the ability to get into computer systems that […]