Gas and Petroleum Industry

Gas and Petroleum Industry Reports
Deep learning for countering energy theft – a hybrid long-short term memory approach
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
Posted: 26 Apr 2022 | Published: 26 Apr 2022

ComputerWeekly.com

Computer Weekly – 17 May 2022: Digitally transforming UK power networks for renewable energy
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the UK's power networks need to be digital transformed to be ready for renewable energy – and the role of open source. Wi-Fi 6 was meant to give a boost to wireless connectivity – we examine why adoption has stalled. And we look at what a quantum datacentre might be like. Read the issue now.
Posted: 13 May 2022 | Published: 17 May 2022

ComputerWeekly.com

Operational Intelligence Adds to Business Smarts
sponsored by SearchBusinessAnalytics
EBOOK: In this 3-part guide, SearchBusinessAnalytics explores organizations' operational intelligence initiatives and their impact on business processes in customer service, logistics, energy, and manufacturing.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

SearchBusinessAnalytics

Israel Electric Corporation Moves Toward Smarter Maintenance
sponsored by IBM
CASE STUDY: This use case describes how Israel's largest electricity provider utilizes IBM's predictive analytics software to monitor its turbine performance in real time, enabling the company to discover and resolve anomalies before outages occur.
Posted: 25 Feb 2015 | Published: 30 Sep 2013

IBM

Transforming Insight Into Action With Business Event Processing
sponsored by IBM
WHITE PAPER: This white paper explores key business event processing capabilities that are helping energy and utilities organizations to manage instrumented and intelligent utility networks detect outages, improve grid security, and prevent fraudulent use of energy.
Posted: 10 Oct 2011 | Published: 31 Dec 2009

IBM

HP Data Center Smart Grid: An HP Converged Infrastructure Innovation Primer
sponsored by HP & Intel®
WHITE PAPER: By helping your data center more accurately visualize and control energy use, you'll reclaim facility capacity and optimize energy use en route to reducing costs for your organization. Read this white paper for the details.
Posted: 10 May 2011 | Published: 10 May 2011

HP & Intel®

Application Performance for Oil and Gas Seismic Analysis
sponsored by Dot Hill Systems Corp.
WHITE PAPER: The reference solution combines Dot Hill storage solutions, Intel Enterprise Edition for Lustre, and Mellanox Infiniband to deliver a highly scalable and high performance infrastructure for oil exploration computing platforms, as well as other HPC applications.
Posted: 04 Apr 2014 | Published: 14 Mar 2014

Dot Hill Systems Corp.

CW Buyer's Guide: Green Computing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at technologies that can help your datacentre become cost and energy efficient in this 11 page Buyer's Guide.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Achieve Higher Quality Decisions Faster for a Competitive Edge in the Oil and Gas Industry
sponsored by Hitachi Vantara
WHITE PAPER: This brief resource profiles a storage and analysis approach that can help your organization meet the challenges of today's data-intensive business world and achieve a competitive edge. Read on to learn more.
Posted: 24 Sep 2013 | Published: 31 Jul 2013

Hitachi Vantara

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM