Search Results

407 RESULTS FOUND

Case Study: Texas Coop Leverages Enhanced Thermostats Controls to Capture Savings Amid Extreme Grid Pressures

image 3236 1 Learn how Farmers Electric is leveraging Google Nest thermostats’ enhanced control capabilities inside Shift to increase savings and maintain customer comfort amid growing grid pressures in Texas….

The Path From Utility Regulation to Implementation

…involve research, consultations, or convenings (the regulatory term for formal meetings) to gather the input needed to draft a regulation. Sometimes commissions ask for information and comments from stakeholders prior…

Utility Cybersecurity in the Cloud: A Discussion on Best Practices

security system, whether it’s in the cloud or hosted in your own data center, is 100 percent immune from compromise. Regardless of how mature your cloud security is, it’s best…

Justice40, Equity, & Demand Flexibility

…capacity. Community Solar Community solar installations are an obvious example of investing in renewable energies. As an investment in photovoltaic solar installations, community solar directly benefits LMI communities. Program participants…

Seeking & Amplifying Underrepresented Voices for Energy Equity

…with community-based organizations (CBOs) that represent these populations. It’s really important to reach underrepresented communities in settings that are comfortable for them–online calls with slides and utility jargon will likely…

How Utilities Can Survive Distributed Energy Resources Powered Tech Disruption

…by Horizon Power and Commonwealth Edison (ComEd), respectively. ComEd spent more than a decade researching, developing, and building the Bronzeville Community Microgrid. ComEd put its money (about $20 million) into…

What Is a Microgrid?

community’s energy security. If the larger grid experiences a blackout, a community can disconnect its microgrid to protect itself from losing power. Community microgrids can also connect to the grid…

Basic Steps To Enhance Utility Cybersecurity

…– The denial-of-service cyberattack overwhelms an operating system with superfluous commands or traffic, exhausting computational bandwidth and rendering a system unable to comply with legitimate user requests. Unfortunately, this is…

Dr. Sanya Carley on Energy Justice, Equity, and Rate Design

…Empower Innovation Forum, an event put together for our clients. Her research focuses on energy justice, energy equity, and policies aimed at advancing the innovation of low-carbon and efficient energy…

How Server Farms, Bitcoin Mining, & NFTs Challenge the Grid

…Require? Individually, a typical laptop uses about 0.05 kWh of power per day, an insignificant demand compared to the needs of a community, commercial properties, or industry. That escalates quickly…

The Path From a Bill to a Utility Regulation

Where does utility regulation come from? This is about the birds (policymakers) and the bees (commissioners) that bring utility regulation into the world. It’s a two-part series that focuses first…

What is Community Solar?

community solar programs have begun popping up as a response to the just energy transition. So what does this mean for your utility operation? What is Community Solar? Community solar…