The document discusses several issues facing a power utility in enabling the energy transition:
1) Using electric vehicles for backup energy storage to address insufficient grid capacity for EV charging stations.
2) Accommodating two-way energy and information flows as well as capacity increases on the grid.
3) Rolling out smart meters while respecting privacy and managing large amounts of data.
4) Combining smart city initiatives around technologies like self-healing microgrids.
It also addresses securing the infrastructure against threats in an environment of cloud computing, mobile devices, and applications through approaches like layered authentication, authorization, and encryption.
Leading Mobile App Development Companies in India (2).pdf
Enabling the energy transition in times of cloud, apps and BYOD
1. Enabling the Energy
Transition in times of
Cloud, Apps and
BYOD
Hope is not a strategy
Alliander IT CIO Office
Michel de Goede
2. Issue # 1: Electric vehicles
• Roll out of thousands of electric vehicle charging stations
• Grid Capacity is insufficient
• What if we use cars as backup energy storage?
4. Issue # 3: Smart metering
• Roll out of 5 Million Smart Meters (Gas + Electricity)
• Inform customer regarding energy consumption and create
awareness
• Respect privacy concerns
• Manage the potential data ocean
5. Issue # 4: Smart city initiatives
• Combination of various techniques (Amsterdam)
• Self healing and self regulating micro grid (Bronsbergen)
6. Issue # 6: Smart grid
• Accommodate higher peaks and two-way traffic through intelligence
• Accomodate energy transition scenario’s through intelligence
• Provide the necessary information to all parties involved
8. Issue # 7: Staff
• Nowadays, everyone wants to be a manager
9. Issue # 7: Staff
• And prefers to work like this…..
10. Answer # 1: Digitize work
• Get ‘ye olde drawings’ off the wall
• Combine workflow with documents
• Make sure the data is accurate
√ √
11. • Signal anomalies
• Analyze, analyze & analyze
• Help with repairs
• Everything in near real-time
• Different life-cycle
• Different breed of people
Answer # 2: Integrate IT & OT
16. Keep it secure
• Layering our landscape
• Multi level authentication and authorization
Operational
systems
Stepping
stone Area
IT systems
17. Keep it secure
Internet
(open)
Access Management
(access layer)
Representation
(presentation layer)
Authorization Management
(application layer)
Application
1
Application
2
Application
n
May I enter the house?
What goods and services
am I allowed to
use in these rooms?
Any device
Offices
(closed)
For which rooms do you
give me the key(s)?
19. And what about cloud?
Internet
(open)
Access Management
(access layer)
Representation
(presentation layer)
Authorization Management
(application layer)
Application
1
Application
2
Application
n
May I enter the house?
What goods and services
am I allowed to
use in these rooms?
Any device
Offices
(closed)
For which rooms do you
give me the key(s)?
What goods and services
am I allowed to
use in this room?
20. Or BYOD and apps?
Internet
(open)
Access Management
(access layer)
Representation
(presentation layer)
Authorization Management
(application layer)
Application
1
Application
n
May I enter the house?
What goods and services
am I allowed to
use in these rooms?
Any device
Offices
(closed)
For which rooms do you
give me the key(s)?
What goods and services
am I allowed to
use in this room?
Protocol and data-
format decoupling
such as: Citrix,
HTML 5, JSON,
XML, Sybase SUP
and so on
Application
2