SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
Enabling the Energy
Transition in times of
Cloud, Apps and
BYOD
Hope is not a strategy
Alliander IT CIO Office
Michel de Goede
Issue # 1: Electric vehicles
• Roll out of thousands of electric vehicle charging stations
• Grid Capacity is insufficient
• What if we use cars as backup energy storage?
Issue # 2: Two way traffic
Monetary flow
Information flow
Transmission
Trade/PRP/
Shipper
Distribution SupplyMeteringProduction
Physical flow
© Jeroen Scheer, Alliander, 2011
• Flows change
• Capacity increase
Issue # 3: Smart metering
• Roll out of 5 Million Smart Meters (Gas + Electricity)
• Inform customer regarding energy consumption and create
awareness
• Respect privacy concerns
• Manage the potential data ocean
Issue # 4: Smart city initiatives
• Combination of various techniques (Amsterdam)
• Self healing and self regulating micro grid (Bronsbergen)
Issue # 6: Smart grid
• Accommodate higher peaks and two-way traffic through intelligence
• Accomodate energy transition scenario’s through intelligence
• Provide the necessary information to all parties involved
Issue # 7: Staff
Issue # 7: Staff
• Nowadays, everyone wants to be a manager
Issue # 7: Staff
• And prefers to work like this…..
Answer # 1: Digitize work
• Get ‘ye olde drawings’ off the wall
• Combine workflow with documents
• Make sure the data is accurate
√ √
• Signal anomalies
• Analyze, analyze & analyze
• Help with repairs
• Everything in near real-time
• Different life-cycle
• Different breed of people
Answer # 2: Integrate IT & OT
Answer # 3: Manage centrally
Answer # 4: Solve decentrally
• The problem is fractal
• Think in levels of control circuits
• Home, block, area, mid-voltage area, etcetera
But then
• How do we get all this information HERE?????
Landscape build-up
Keep it secure
• Layering our landscape
• Multi level authentication and authorization
Operational
systems
Stepping
stone Area
IT systems
Keep it secure
Internet
(open)
Access Management
(access layer)
Representation
(presentation layer)
Authorization Management
(application layer)
Application
1
Application
2
Application
n
May I enter the house?
What goods and services
am I allowed to
use in these rooms?
Any device
Offices
(closed)
For which rooms do you
give me the key(s)?
Keep it secure
Key Management
Identity
Management
Security
Management
Network Access
Control
Firewalls
Intrusion
Detection /
Protection
Audit Anti-Virus VPN’s
Event Monitoring /
Correlation
Authentication Authorization Confidentiality Integrity Encryption
• Perform as many as possible of these activities
© IBM / Cisco, Smart Grid Reference Architecture
And what about cloud?
Internet
(open)
Access Management
(access layer)
Representation
(presentation layer)
Authorization Management
(application layer)
Application
1
Application
2
Application
n
May I enter the house?
What goods and services
am I allowed to
use in these rooms?
Any device
Offices
(closed)
For which rooms do you
give me the key(s)?
What goods and services
am I allowed to
use in this room?
Or BYOD and apps?
Internet
(open)
Access Management
(access layer)
Representation
(presentation layer)
Authorization Management
(application layer)
Application
1
Application
n
May I enter the house?
What goods and services
am I allowed to
use in these rooms?
Any device
Offices
(closed)
For which rooms do you
give me the key(s)?
What goods and services
am I allowed to
use in this room?
Protocol and data-
format decoupling
such as: Citrix,
HTML 5, JSON,
XML, Sybase SUP
and so on
Application
2
Context Awareness and proactivity
User
Use pleasantly, always and
anywhere
Connector
Provide To Every Context
Functionality & Content
Follow Me
Identity
Locations
Context
Connections
User
aware
Connector
AutorizeAuthenticate
Secure
Service
Provider
Business
Event handler
Manage
Capability
Perspective
Use
Capabilities
Matching
Capabilities
Functional
Capabilities
Alliander knows its
users’ whereabouts
Alliander knows how
to connect
Alliander knows how
to provide
© Wim Bouman, Alliander IT
Require more security
• Security at data and content level
• Context Based Access Control
© Microsoft
And a shared taxonomy
• Taxonomy over data in IT and OT domain must be consistent
• Taxonomy over content descriptors must be consistent with data
The strategy
• Back into the datacenter
• Decouple on interface and / or protocol level
• Defence, Defence and more Defence
• Align Taxonomies
• Local autonomy and fractal modelling
• Convergence to Vendor suites of products versus
individual product offerings (fewer interfaces, less
different skills, lower cost, go to ‘systems of systems’)
© Oxford Dictionary
To bring the Grid to our new staff
The beauty of it all?
• Complexity reduction
• Beautiful and adequate architecture
Thank You!
Questions?
Alliander IT CIO Office
Michel de Goede

Weitere ähnliche Inhalte

Was ist angesagt?

Basics of c++ Programming Language
Basics of c++ Programming LanguageBasics of c++ Programming Language
Basics of c++ Programming LanguageThe IOT Academy
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's ApplicationsAakashjit Bhattacharya
 
Architectures for the Internet of Things
Architectures for the Internet of ThingsArchitectures for the Internet of Things
Architectures for the Internet of ThingsIñaki Vazquez
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
ciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack sessionciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack sessionAlan Quayle
 
NDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoTNDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoTJustin Grammens
 
Ibm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_CapabilitiesIbm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_CapabilitiesIBM_Info_Management
 
Internet of things applications covering industrial domain
Internet of things applications covering industrial domainInternet of things applications covering industrial domain
Internet of things applications covering industrial domainDev Bhattacharya
 
Addressing the Challenges of IoT Design
Addressing the Challenges of IoT DesignAddressing the Challenges of IoT Design
Addressing the Challenges of IoT DesignMentor Graphics
 
Digital stick by Divya & Kanti
Digital stick by Divya & KantiDigital stick by Divya & Kanti
Digital stick by Divya & KantiDivya Tiwari
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)Abdullah Ozturk
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of ThingsVodqaBLR
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTMuhammad Ahad
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsRick G. Garibay
 
Internet of Things Iot presentation with module
Internet of Things Iot presentation with moduleInternet of Things Iot presentation with module
Internet of Things Iot presentation with moduleIsp university Multan
 
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and AzureGuide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and AzureBarnaba Accardi
 

Was ist angesagt? (20)

Basics of c++ Programming Language
Basics of c++ Programming LanguageBasics of c++ Programming Language
Basics of c++ Programming Language
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
 
Architectures for the Internet of Things
Architectures for the Internet of ThingsArchitectures for the Internet of Things
Architectures for the Internet of Things
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Iot and ethics
Iot and ethicsIot and ethics
Iot and ethics
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
ciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack sessionciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack session
 
NDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoTNDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoT
 
Ibm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_CapabilitiesIbm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_Capabilities
 
Internet of things applications covering industrial domain
Internet of things applications covering industrial domainInternet of things applications covering industrial domain
Internet of things applications covering industrial domain
 
Addressing the Challenges of IoT Design
Addressing the Challenges of IoT DesignAddressing the Challenges of IoT Design
Addressing the Challenges of IoT Design
 
Digital stick by Divya & Kanti
Digital stick by Divya & KantiDigital stick by Divya & Kanti
Digital stick by Divya & Kanti
 
What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of Things
 
Internet of Things Iot presentation with module
Internet of Things Iot presentation with moduleInternet of Things Iot presentation with module
Internet of Things Iot presentation with module
 
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and AzureGuide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
 

Ähnlich wie Enabling the energy transition in times of cloud, apps and BYOD

From reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosFrom reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosMichel de Goede
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Crew
 
BYOD: Be your own device?
BYOD: Be your own device?BYOD: Be your own device?
BYOD: Be your own device?Michel de Goede
 
Technology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your BusinessTechnology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your BusinessPrecisely
 
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...Surety, LLC
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology Austin Ross
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
 
Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT SecurityOliver Pfaff
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationSylCotter
 

Ähnlich wie Enabling the energy transition in times of cloud, apps and BYOD (20)

From reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosFrom reactive to proactive mobile scenarios
From reactive to proactive mobile scenarios
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best Practice
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
BYOD: Be your own device?
BYOD: Be your own device?BYOD: Be your own device?
BYOD: Be your own device?
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Technology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your BusinessTechnology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your Business
 
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT Security
 
Karunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident Handling
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
U nit 4
U nit 4U nit 4
U nit 4
 
I learning lot
I learning lotI learning lot
I learning lot
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 

Mehr von Michel de Goede

5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&AMichel de Goede
 
Maximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and evMaximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and evMichel de Goede
 
Breaking down the layers of cyber security
Breaking down the layers of cyber securityBreaking down the layers of cyber security
Breaking down the layers of cyber securityMichel de Goede
 
The intricacies of cloud integration
The intricacies of cloud integrationThe intricacies of cloud integration
The intricacies of cloud integrationMichel de Goede
 
Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!Michel de Goede
 
The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsMichel de Goede
 
BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?Michel de Goede
 
Enabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timelineEnabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timelineMichel de Goede
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of riskMichel de Goede
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of riskMichel de Goede
 
Are you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurshipAre you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurshipMichel de Goede
 
IT PMI: tips and lessons learned
IT PMI: tips and lessons learnedIT PMI: tips and lessons learned
IT PMI: tips and lessons learnedMichel de Goede
 
IT: make or break the deal
IT: make or break the dealIT: make or break the deal
IT: make or break the dealMichel de Goede
 
Smart data & smart energy
Smart data & smart energySmart data & smart energy
Smart data & smart energyMichel de Goede
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerizationMichel de Goede
 

Mehr von Michel de Goede (20)

5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A
 
Maximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and evMaximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and ev
 
Breaking down the layers of cyber security
Breaking down the layers of cyber securityBreaking down the layers of cyber security
Breaking down the layers of cyber security
 
Cloudifying Alliander
Cloudifying AllianderCloudifying Alliander
Cloudifying Alliander
 
The intricacies of cloud integration
The intricacies of cloud integrationThe intricacies of cloud integration
The intricacies of cloud integration
 
Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!
 
The Connected Utility
The Connected UtilityThe Connected Utility
The Connected Utility
 
The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise apps
 
BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?
 
Enabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timelineEnabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timeline
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
 
Are you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurshipAre you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurship
 
Mobile as a strategy
Mobile as a strategyMobile as a strategy
Mobile as a strategy
 
Mobile as a strategy
Mobile as a strategyMobile as a strategy
Mobile as a strategy
 
IT PMI: tips and lessons learned
IT PMI: tips and lessons learnedIT PMI: tips and lessons learned
IT PMI: tips and lessons learned
 
Database Technologies
Database TechnologiesDatabase Technologies
Database Technologies
 
IT: make or break the deal
IT: make or break the dealIT: make or break the deal
IT: make or break the deal
 
Smart data & smart energy
Smart data & smart energySmart data & smart energy
Smart data & smart energy
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerization
 

Kürzlich hochgeladen

Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsChandrakantDivate1
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsChandrakantDivate1
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesChandrakantDivate1
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...nishasame66
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfCWS Technology
 

Kürzlich hochgeladen (6)

Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 

Enabling the energy transition in times of cloud, apps and BYOD

  • 1. Enabling the Energy Transition in times of Cloud, Apps and BYOD Hope is not a strategy Alliander IT CIO Office Michel de Goede
  • 2. Issue # 1: Electric vehicles • Roll out of thousands of electric vehicle charging stations • Grid Capacity is insufficient • What if we use cars as backup energy storage?
  • 3. Issue # 2: Two way traffic Monetary flow Information flow Transmission Trade/PRP/ Shipper Distribution SupplyMeteringProduction Physical flow © Jeroen Scheer, Alliander, 2011 • Flows change • Capacity increase
  • 4. Issue # 3: Smart metering • Roll out of 5 Million Smart Meters (Gas + Electricity) • Inform customer regarding energy consumption and create awareness • Respect privacy concerns • Manage the potential data ocean
  • 5. Issue # 4: Smart city initiatives • Combination of various techniques (Amsterdam) • Self healing and self regulating micro grid (Bronsbergen)
  • 6. Issue # 6: Smart grid • Accommodate higher peaks and two-way traffic through intelligence • Accomodate energy transition scenario’s through intelligence • Provide the necessary information to all parties involved
  • 7. Issue # 7: Staff
  • 8. Issue # 7: Staff • Nowadays, everyone wants to be a manager
  • 9. Issue # 7: Staff • And prefers to work like this…..
  • 10. Answer # 1: Digitize work • Get ‘ye olde drawings’ off the wall • Combine workflow with documents • Make sure the data is accurate √ √
  • 11. • Signal anomalies • Analyze, analyze & analyze • Help with repairs • Everything in near real-time • Different life-cycle • Different breed of people Answer # 2: Integrate IT & OT
  • 12. Answer # 3: Manage centrally
  • 13. Answer # 4: Solve decentrally • The problem is fractal • Think in levels of control circuits • Home, block, area, mid-voltage area, etcetera
  • 14. But then • How do we get all this information HERE?????
  • 16. Keep it secure • Layering our landscape • Multi level authentication and authorization Operational systems Stepping stone Area IT systems
  • 17. Keep it secure Internet (open) Access Management (access layer) Representation (presentation layer) Authorization Management (application layer) Application 1 Application 2 Application n May I enter the house? What goods and services am I allowed to use in these rooms? Any device Offices (closed) For which rooms do you give me the key(s)?
  • 18. Keep it secure Key Management Identity Management Security Management Network Access Control Firewalls Intrusion Detection / Protection Audit Anti-Virus VPN’s Event Monitoring / Correlation Authentication Authorization Confidentiality Integrity Encryption • Perform as many as possible of these activities © IBM / Cisco, Smart Grid Reference Architecture
  • 19. And what about cloud? Internet (open) Access Management (access layer) Representation (presentation layer) Authorization Management (application layer) Application 1 Application 2 Application n May I enter the house? What goods and services am I allowed to use in these rooms? Any device Offices (closed) For which rooms do you give me the key(s)? What goods and services am I allowed to use in this room?
  • 20. Or BYOD and apps? Internet (open) Access Management (access layer) Representation (presentation layer) Authorization Management (application layer) Application 1 Application n May I enter the house? What goods and services am I allowed to use in these rooms? Any device Offices (closed) For which rooms do you give me the key(s)? What goods and services am I allowed to use in this room? Protocol and data- format decoupling such as: Citrix, HTML 5, JSON, XML, Sybase SUP and so on Application 2
  • 21. Context Awareness and proactivity User Use pleasantly, always and anywhere Connector Provide To Every Context Functionality & Content Follow Me Identity Locations Context Connections User aware Connector AutorizeAuthenticate Secure Service Provider Business Event handler Manage Capability Perspective Use Capabilities Matching Capabilities Functional Capabilities Alliander knows its users’ whereabouts Alliander knows how to connect Alliander knows how to provide © Wim Bouman, Alliander IT
  • 22. Require more security • Security at data and content level • Context Based Access Control © Microsoft
  • 23. And a shared taxonomy • Taxonomy over data in IT and OT domain must be consistent • Taxonomy over content descriptors must be consistent with data
  • 24. The strategy • Back into the datacenter • Decouple on interface and / or protocol level • Defence, Defence and more Defence • Align Taxonomies • Local autonomy and fractal modelling • Convergence to Vendor suites of products versus individual product offerings (fewer interfaces, less different skills, lower cost, go to ‘systems of systems’) © Oxford Dictionary
  • 25. To bring the Grid to our new staff
  • 26. The beauty of it all? • Complexity reduction • Beautiful and adequate architecture
  • 27. Thank You! Questions? Alliander IT CIO Office Michel de Goede