Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI

CGI

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI. This series of blog posts builds on the 2018 CGI Client Global Insights, providing insights into how utilities are making progress toward digital transformation. The findings and perspectives are based on 1,400 in-person interviews with business and IT executives, of which 127 are from the utilities industry. So where do utilities stand?

Key strategies and technologies to help utilities respond to a “storm” never seen before

CGI

Key strategies and technologies to help utilities respond to a “storm” never seen before. For more than three decades, I served at a leading electric utility, responding to numerous storms to keep the lights on for customers and to support critical infrastructure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Kali Project Encryption and Isolation Using Vagrant and BitLocker

Perficient Data & Analytics

Once the disk is mounted, the script invokes the BitLocker utility to encrypt the drive. Then, the script performs some data mining to determine the ID of the virtual storage image associated with our Kali VM. Once we’ve found the correct storage image, then it can be encrypted using the Virtualbox management utility. Imagine that you work on different engagements or projects in which Kali Linux is one of your primary tools.

A potential solution for protecting customer privacy when sharing smart meter data

CGI

This is because smart meters are widely regarded as a key to reducing both energy consumption and emission levels. With the help of machine learning and advanced data analytics, several load-monitoring techniques can deduce a customer’s activity patterns just from their electricity metering data. Imagine a situation where a third party gets hold of your metering data and, using data mining algorithms, and can detect your presence or absence and other household activities.