UTC surveys our members, other utilities and subject matter experts from around the world to provide meaningful industry research reports.
Ongoing research efforts allow us to keep growing and refreshing our offerings. UTC Research Reports are available to purchase at a large discount for our member utilities and at full price for non-members. Click each image below to learn more about the research and pricing options.
Check out all the past UTC research available to purchase by clicking here.
Today’s smart grid enhances the traditional transmission and distribution network with pockets of automation, connectivity, and centralized IT systems. But the grid of tomorrow, the Neural Grid, represents a vastly more powerful platform of hard and soft assets that leverage ubiquitous connectivity, the cloud, robotics, artificial intelligence (AI), edge computing, and pervasive sensing to perform a variety of energy and non-energy applications.
UTC Associate Member Navigant Research has provided its latest white paper defines this next-level grid and identifies the critical components expected to transform legacy infrastructure into a platform that will eventually support a fully mature Energy Cloud environment.
Utilities and other critical infrastructure (CI) industries around the globe are being challenged to improve service delivery while at the same time deal with security threats that aim to take down their operations. Compounding these challenges are the pressures from investors and regulatory agencies to streamline operations and reduce costs all while dealing with the complexities of a retiring workforce. To conquer these formidable challenges, critical infrastructure industries require greater visibility into their operations and are looking to leverage Machine to Machine (M2M) communications technology & communications to provide the means to increase the automation of their operations.
This paper provides a roadmap tailored to the utility space on how to successfully organize supplier management activities while addressing associated security risks. It is based on practical experience, numerous discussions with utilities and vendors, and recently published standards and best practice documents.