Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
This white paper explores key business event processing capabilities that are helping energy and utilities organizations to manage instrumented and intelligent utility networks detect outages, improve grid security, and prevent fraudulent use of energy.
With energy prices on a steep climb, soon the cost to power and cool a server over its life span could equal its purchase price. By “going green” with energy-efficient IBM® System x™ servers featuring Intel® Xeon® processors, you can win back control of your IT budget--and win the battle with data center...
This white paper shows how mathematical optimization enables the rapid development and deployment of applications that address the energy and power industries’ most pressing issues, including climate change, grid utilization, market restructuring and Enterprise IT.
This brief resource profiles a storage and analysis approach that can help your organization meet the challenges of today's data-intensive business world and achieve a competitive edge. Read on to learn more.
This transcript examines the respective challenges that accompany virtualization and green IT initiatives. Learn specific best practices that will enable your business to lower Total Cost of Ownership (TCO) and accelerate ROI.
This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.