The Coming Decentralization of the Utility Sector

Bloom Energy Fuel Cell Courtesy Bloom Energy

Bloom Energy Fuel Cell
Courtesy Bloom Energy

Several trend waves are heading for a thunderous collision and are going to change the course of the utility sector. When billions of dollars were poured into energy “cleanies” and “greenies”, few thought about the third order ramifications and potential by-products. But, alternative energy is just that. It means we don’t need the same old companies providing the same old things that they’ve provided for the last 50 years. In fact the alternatives are starting to line up nicely. Like the telecommunications infrastructure that has rapidly gone from big infrastructure to mobile wireless due to rapid advancements in battery power, bandwidth, and miniaturization, so goes the utility sector. The three big waves that are about to hit are miniaturization and efficiencies through nanotechnologies, improvements in battery power and storage systems; and improved human economization of energy. [Read more…]

Detonation by Remote: What Cyber “In-security” Might Really Mean…

Oil Rig off Coast Of AlaskaEvery time we turn on the news, we hear the word “cyber” so much that it’s become merged in a decoupage of meaningless chatter. But, what does it really mean?

Almost every global corporation relies on connectivity to the internet through a range of electronic devices. The world has become the domain for billions of chips and interconnected devices activated by a plethora of electronic signals. In just a few short years, endless numbers of end user devices gained IP addresses and the ability to be remotely activated for everything from remote meter reading and home security monitoring, to detecting when you are out of milk in your refrigerator. So, from Budweiser beer, to internal computers on our cars, to nuclear plants, gazillions of devices have become accessible over the network. Not only do we now have countless numbers of devices linked by wireless networks, but we have an ongoing barrage of software maladies lurking in lines of poorly crafted or malicious code which can often carry nasty little destructive payloads (viruses, trojans, etc.).

By integrating cellular networks, WIFI networks, and long haul networks, someone in another global location could theoretically access your cell phone, computer, or a nuclear power plant, oil rig, or the power grid. We often forget about the infinitesimal number of devices getting connecting to the net as time progresses. We also forget just how much of our life is dependent upon computers. This becomes rapid reality when you realize your SUV’s onboard computer system has failed and door locks, windows, and transmission begin to malfunction.

RFID tags have long been the paradise-sought of the grocery store business, which may, one day soon, send checkers into workforce obsolescence as “drive through” carts, scanning the entire mound of groceries take their place. What Cyber gurus lose sleep over is not the many networked devices and hack-ability of computers and cell phones, but the vulnerability of critical infrastructure, such as the power grid, oil and gas infrastructure, banking, and any connected infrastructure that can disrupt commerce or simply make the economy screech to a terminal halt.

Many industry executives are often quite surprised when they learn that someone can remotely tinker with their equipment since they are usually thinking about computer viruses. On a daily basis, our world becomes increasingly more interconnected through the internet, presenting the possibility that physical objects containing computer chips and signal receivers can be tampered with, from simply being disabled, to being remotely blown-up through a variety of means.

TrendsDigest will soon release its Sector Cyber Analysis Report (SCAR) detailing challenges faced by individual sectors. TD

Copyright Trends Digest 2013 All Rights reserved.

The Billion Dollar Cyber Heist

Every time we turn on the news, we hear the word “cyber” so much that it’s become merged in a decoupage of meaningless chatter. But, what does it really mean?

Almost every global corporation relies on connectivity to the internet through a range of electronic devices. The world has become the domain for billions of chips and interconnected devices activated by a plethora of electronic signals. In just a few short years, endless numbers of end user devices gained IP addresses and the ability to be remotely activated for everything from remote meter reading and home security monitoring, to detecting when you are out of milk in your refrigerator. So, from Budweiser beer, to internal computers on our cars, to nuclear plants, gazillions of devices have become accessible over the network. Not only do we now have countless numbers of devices linked by wireless networks, but we have an ongoing barrage of software maladies lurking in lines of poorly crafted or malicious code which can often carry nasty little destructive payloads (viruses, trojans, etc.).

Cyber HeistBy integrating cellular networks, WIFI networks, and long haul networks, someone in another global location could theoretically access your cell phone, computer, or a nuclear power plant, oil rig, or the power grid. We often forget about the infinitesimal number of devices getting connecting to the net as time progresses. We also forget just how much of our life is dependent upon computers. This becomes rapid reality when you realize your SUV’s onboard computer system has failed and door locks, windows, and transmission begin to malfunction.

RFID tags have long been the paradise-sought of the grocery store business, which may, one day soon, send checkers into workforce obsolescence as “drive through” carts, scanning the entire mound of groceries take their place. What Cyber gurus lose sleep over is not the many networked devices and hack-ability of computers and cell phones, but the vulnerability of critical infrastructure, such as the power grid, oil and gas infrastructure, banking, and any connected infrastructure that can disrupt commerce or simply make the economy screech to a terminal halt.

Many industry executives are often quite surprised when they learn that someone can remotely tinker with their equipment since they are usually thinking about computer viruses. On a daily basis, our world becomes increasingly more interconnected through the internet, presenting the possibility that physical objects containing computer chips and signal receivers can be tampered with, from simply being disabled, to being remotely blown-up through a variety of means.

TrendsDigest will soon release its Sector Cyber Analysis Report (SCAR) detailing challenges faced by individual sectors. TD

Copyright Trends Digest, 2013, All rights reserved.

Drones to Swarm the Energy Market in the Next Decade

Drones Swarm Energy Market

UAVs mature, their roles of sensing and monitoring will eventually give way to robotic functions allowing them to operate as hybrids.  Drones soon will take on far more complex tasks.  Flying drone robots may soon be able to perform not only inspection but engineering modifications using onboard toolkits.   The UAS market in the U.S. hasn’t had the commercial jump start of growth from the energy sector seen in Israel, the U.K.  Much of this revolves around the regulatory challenges. Congress’s recently passed legislation requiring expedited integration of UAS into the national aviation infrastructure by 2015 should finally start the engines. UAS operation has historically been expensive when you add up the cost of hardware, software, training, technical support, and the occasional crash and burn event.  However, as the market continues to grow as does more affordable solutions.  Operators coming back from Afghanistan may find themselves met by more opportunities in the civilian world.  Soon UAVs might be familiar terrain features in the sky above the U.S.  However, integration of aerial vehicles may be easier said than done given the already crowed air space.  However the next decade unfolds, you can count on the fact that unmanned aerial vehicles and their even more robotic successors will be a big part of it.

UAV’S HAVE PLENTY OF ROOM TO LOOK AFTER THE BAAKEN

Civilian airspace might be crowded, according to the FAA, but as you can see from the image, it’s a little less crowded in Eastern Montana and Western North Dakota.

All of our technology connections are creating the Virtual Electronic Enabled Hive (VEE-HIVE) presenting unfolding opportunities as disruptive technological and business trends take hold.      Use our “Contact” page to request a free Introductory issue of the VEE-Hive Report. Copyright 2012 Trends Digest – All Rights Reserved