da 20 Year Old Man Confesses In German Data Leak By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 15:08:41 GMT Full Article headline hacker government privacy data loss germany
da Facebook Ordered By Germany To Gather And Mix Less Data By packetstormsecurity.com Published On :: Thu, 07 Feb 2019 16:31:21 GMT Full Article headline government privacy germany facebook social
da German Police Storm Bulletproof Data Center In Former NATO Bunker By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:50:06 GMT Full Article headline government germany
da Switzerland Files Criminal Complaint Over Crypto Spying Scandal By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:28 GMT Full Article headline government privacy cyberwar germany spyware cryptography switzerland cia
da Anonymous Leaks Paris Climate Summit Officials' Private Data By packetstormsecurity.com Published On :: Sat, 05 Dec 2015 02:08:03 GMT Full Article headline government data loss france anonymous
da Russian Hackers Target French Presidential Candidate By packetstormsecurity.com Published On :: Tue, 25 Apr 2017 14:00:53 GMT Full Article headline hacker government russia fraud cyberwar france
da Breached Airbus Employee Data Gets Released On The Dark Web By packetstormsecurity.com Published On :: Fri, 01 Feb 2019 16:21:50 GMT Full Article headline hacker privacy data loss france
da Yves Rocher Cosmetic Company Leaks Data On Millions By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 15:58:43 GMT Full Article headline hacker privacy data loss france
da Zero Day Initiative Advisory 11-109 By packetstormsecurity.com Published On :: Tue, 22 Mar 2011 20:31:31 GMT Zero Day Initiative Advisory 11-109 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari on the iPhone. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the support for parsing Office files. When handling the OfficeArtMetafileHeader the process trusts the cbSize field and performs arithmetic on it before making an allocation. As the result is not checked for overflow, the subsequent allocation can be undersized. Later when copying into this buffer, memory can be corrupted leading to arbitrary code execution under the context of the mobile user on the iPhone. Full Article
da Microsoft Patches 0-Day Vulnerabilities In IE And Exchange By packetstormsecurity.com Published On :: Wed, 13 Feb 2019 15:01:51 GMT Full Article headline microsoft email flaw patch
da Shanghai Jiao Tong University Exposed 8.4TB Of Email Data By packetstormsecurity.com Published On :: Mon, 10 Jun 2019 19:57:39 GMT Full Article headline privacy email china data loss
da UNICEF Leaks Personal Data Of 8,000 Users Via Email Blunder By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 14:30:26 GMT Full Article headline privacy email data loss
da IBM Data Risk Manager 2.0.3 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:12:14 GMT IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed by a command injection as the server user, and finally abuse of an insecure default password. This module exploits all three vulnerabilities, giving the attacker a root shell. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
da Lazarus Pivots To Linux Attacks Through Dacls Trojan By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:36:58 GMT Full Article headline malware linux trojan backdoor
da DAWIN - Distributed Audit and Wireless Intrustion Notification By packetstormsecurity.com Published On :: Wed, 17 Sep 2014 22:34:16 GMT DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual. Full Article
da DAWIN - Distributed Audit and Wireless Intrustion Notification 2.0 By packetstormsecurity.com Published On :: Tue, 28 Apr 2015 00:52:43 GMT DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual. Full Article
da ABB IDAL HTTP Server Authentication Bypass By packetstormsecurity.com Published On :: Fri, 21 Jun 2019 20:32:22 GMT The IDAL HTTP server CGI interface contains a URL, which allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. In the IDAL CGI interface, there is a URL (/cgi/loginDefaultUser), which will create a session in an authenticated state and return the session ID along with the username and plaintext password of the user. An attacker can then login with the provided credentials or supply the string 'IDALToken=......' in a cookie which will allow them to perform privileged operations such as restarting the service with /cgi/restart. Full Article
da Iranian Internet Attacked Saturday, Knocked Partially Offline By packetstormsecurity.com Published On :: Tue, 11 Feb 2020 15:34:05 GMT Full Article headline government denial of service iran
da How Data Intelligence Is Accelerating Innovation for Social Good By feeds.techsoup.org Published On :: Fri, 22 Sep 2017 14:45:00 GMT I am often asked what I see as the biggest potential game-changers in tech — particularly as it relates to social good. Mobile, social, the cloud, and analytics continue to emerge as key themes. However, analytics is emerging as the true game changer — catalyzed by advances in open architecture. Let me unpack what I mean by "open architecture." Open means that anyone can access it, contribute to it, and innovate on top of it. At Blackbaud, where I serve as chief technology officer, one of our core tenets has been to design an open, cloud-based software and data architecture. We're cultivating a technical community of partners, customers, and engineers (inside and outside of the company) who are innovating in different ways and contributing to this ecosystem. From this vantage point, I see the way that openness accelerates the velocity of innovation. Looking at it from a different angle, open ecosystems also yield data and analytics that enable everyone who is part of them to gain more insights and intelligence. This data can power intelligent software solutions, surface actionable events, maintain accurate and current data assets, and generally drive more results for users. In other words, an open cloud-based architecture elevates usage, which in turn generates more and more data and intelligence that make the system even more powerful. With data, analytics, and intelligence in mind, the following capabilities emerge as candidates to have a great positive impact. The Internet of Things Internet of Things (IoT) technology is cheap and accessible and can transform normal household items into network devices that generate data. In my house, the lights, thermostats, appliances, cars, doors, and windows are all connected devices. These connected devices generate data and intelligence (such as trends in usage, optimization of electricity consumption, and so on). Much like a household, there are many IoT possibilities for nonprofits and other players in the social good space to generate valuable, actionable data. Instrumentation Instrumentation provides us with the ability to understand what's happening within our software. As Blackbaud ships features and capabilities within solutions, we monitor usage. We do so to understand if our customers can easily discover the new capability (do they use it the first time they log on?) and to determine if our customers find it valuable (is their use ongoing?). This data-driven approach is an extremely effective way of measuring both the quality of the user experience and the overall value of the work we're doing. We can learn a lot about our customers just by observing what they do. Across the software industry, instrumentation is driving advances in understanding that enable more targeted solutions to users' challenges. Usage Information Like instrumentation, usage data enables us to understand the leading indicators that yield the best, most effective outcomes. For example, through usage data, we were able to understand that nonprofits who proactively thank donors within one week of giving have an advantage. They were much more effective at converting those individuals to longer-term supporters and recurring donors. Predictive Intelligence Predictive analytics showcase some of the most stunning and innovative applications of data. At Blackbaud, we think of predictive analytics as a kind of "self-driving car." It guides and sometimes fully automates tasks for our users, enabling them to gain much greater results. A few examples of predictive analytics scenarios that we're working on include Extending the most compelling message to a specific person at just the right time via the best channel, to keep them engaged, generate a donation, invite them to an event, or simply share a story. Intelligently connecting nonprofits, corporations, individuals, foundations, faith-based organizations, schools, and other stakeholders across the ecosystem we serve. That action enables us to more efficiently coordinate efforts and services and drive greater good together. Leveraging social information, an understanding of a person's network, geographical context, and other analytics to help connect an advocate with a nonprofit, school, or foundation, in just the right way. We leverage the correlation of many different, disparate data sources to drive true intelligence and to power new, predictive user experiences across our applications. Our data platform is what powers this intelligence. This platform drives value across our solutions in other ways, including Correcting, appending, and de-duplicating data across the system Business intelligence and reporting that shows trends in data Real-time data pipelines that spark events across the system based on changes to the data I’ve included only a few examples of technology capabilities we're researching that we believe will have a strong positive impact. The central theme of these capabilities is providing more actionable data and intelligence. Our commitment to delivering a robust, scalable, and flexible data architecture as well as open, cloud-based software enables us to take advantage of this technology. It also enables us to harness these capabilities to drive greater value for the customers we serve. This blog post was written by Mary Beth Westmoreland. spanhidden Full Article nonprofit tech big data artificial intelligence nptech data intelligence
da 5 Data Security Risks for Nonprofits (and How to Fix Them) By feeds.techsoup.org Published On :: Fri, 13 Oct 2017 19:56:00 GMT Many nonprofits handle sensitive personal information belonging to community members — whether it's names or email addresses or payment information. But are you handling this data properly to prevent a data breach? This post is by no means exhaustive — after all, every nonprofit handles different sorts of data, and each organization has different security needs. That said, these are some practical things to think about when you review your handling of sensitive personal information. #1 Risk: Malware and Software Vulnerabilities The Problem This one may seem obvious, but with so many other security risks out there, it's easy to forget that malware still poses a major threat to your organization's data. How You Can Mitigate It To start, make sure you have antivirus software installed, and that it's up to date. In addition, you'll want to make sure your operating system and any software installed are also up to date, with all security patches installed. Beyond that, be careful what you click on. Don't download and install software from sites you don't trust. Be careful of the email attachments and links you click on — even from people you know. If you aren't expecting a file or link, click with caution. #2 Risk: Ransomware The Problem Ransomware is an especially insidious form of malware that holds your computer or data hostage unless you pay a sum of money to a criminal actor. Oftentimes, ransomware will encrypt your data, preventing you from accessing it. And according to Symantec's Director of Security Response Kevin Haley, some forms of ransomware will threaten to publicly release your data. How You Can Mitigate It Aside from up-to-date antivirus software and taking steps to avoid infection in the first place, there isn't a ton you can do to deal with a ransomware attack once your data's been encrypted. In that case, according to Haley, keeping up-to-date backups of your data is your best bet. That way, you'll be able to get back up and running quickly with minimal data loss. (TechSoup offers backup and recovery solutions from Veritas.) #3 Risk: Public Wi-Fi The Problem Public Wi-Fi is generally fine for some things, such as browsing cat videos on YouTube, or catching up on the headlines. However, for anything involving sensitive personal information, it's a security disaster waiting to happen. Bad actors could potentially eavesdrop on what you're doing while using public Wi-Fi, leaving your data and work open to prying eyes. How You Can Mitigate It First off, avoid using public, unsecured Wi-Fi when handling sensitive information — whether it's internal organizational data or your own personal banking information. Using a wireless hotspot, like those from Mobile Beacon (offered through TechSoup), instead of public Wi-Fi is an easy way to keep your data more secure. If you can't avoid public Wi-Fi, a virtual private network (VPN) is a good option — VPNs secure data between your computer and the website you're visiting. Not all VPNs provide the same level of security, though, and you'll need to make sure your VPN of choice conforms to any data security regulations that your organization may be subject to. See our previous overview of VPNs for more. #4 Risk: Inappropriate Sharing of Sensitive Information The Problem Sharing sensitive information via email, messaging apps, or similar means is a risky proposition. Email is a notoriously insecure method of communication. Email accounts are often the target of data breaches and phishing attacks. (A phishing attack is where an attacker tries to steal your account information by tricking you to enter your account information on a phony login page.) And whether it's through email or messaging app, it's all too easy to accidentally leak data by sharing it with the wrong person. How You Can Mitigate It Avoid sending sensitive information to colleagues via email. It's easier said than done, we know. Maybe you need to share a list of donor contact information with your marketing department, for example. Consider uploading it to a secure file server on your network that can only be accessed by others in the office. If your organization uses a cloud storage service like Box, consider using that instead — so long as it meets your organization's security needs. These cloud storage services usually encrypt data you upload to prevent it from getting stolen. You may also want to consider using constituent relationship management (CRM) software, a tool designed specifically to store and manage your organization's contacts. In addition, pay attention to access permissions. If you can, restrict access to sensitive information to only those who need it. Revisit your permissions settings regularly and update them as needed. To prevent your user accounts from being compromised in the first place, practice good account security hygiene. Use strong passwords and require your staff to use two-factor authentication. #5 Risk: Handling Credit Card Data The Problem A breach involving credit card data can be embarrassing for your organization, but it could wreak financial havoc on your members and supporters. All it takes is for hackers to grab a few pieces of information to rack up credit card debt in your supporters' names. How You Can Mitigate It Securing credit card information is important, but you don't have to make it up as you go. Make sure your organization conforms to payment card security standards. The Payment Card Industry Security Standards Council, as well as banks and credit card issuers, provide guidelines on how to best handle credit card information to prevent breaches. Has your nonprofit recently encountered any other notable risks? Tell us about it in the comments! spanhidden Full Article security symantec2017 privacy databases
da Keep Your Data Safe: The Joy of Locking Your Computer By feeds.techsoup.org Published On :: Fri, 27 Oct 2017 17:36:00 GMT Here's a simple way to keep your data safe from potential bad actors in one easy step. Are you ready? Here it is: Log out and lock your computer whenever you're not in front of it. That's right, it's so simple it can almost be seen as an analog approach to cybersecurity. But make no mistake, all those in-depth disk encryption efforts can be rendered pointless. If you step away from your computer while it's on and unlocked, anyone passing by can access it. Working Remotely Promotes Data Vulnerability What's perhaps most insidious about someone gaining physical access to your computer is the fact that the attacker doesn't need any advanced technical know-how to steal sensitive information. A momentary lapse in vigilance at work or a coffee shop can result in a data breach of epic proportions. Let's say you're working remotely at your favorite café down the street from your apartment and you get up to put in an order for a late breakfast, forgetting to lock your laptop. During that brief moment, a low-key cybervillian could easily stick a USB drive into your computer and copy any sensitive files about you — or your organization — and leave undetected. Furthermore, if you were logged in to Gmail, your medical records, or your bank account, that malefactor could wreak havoc on your personal and professional life in a matter of minutes. Tips for Protecting Yourself The good news about all of this is that warding off these types of would-be data plunderers is really, really easy — it's simply a matter of using your operating system's screen locking functionality. If you don't want to do this, then at the very least you should log out of any sensitive online accounts whenever you step away from your machine. For each of the following options, be sure you are aware of the password connected to your user login before locking yourself (or anyone else) out. Screen Locking in Microsoft Windows Press Ctrl+Alt+Delete and select Lock this computer Press Windows+L Either of these will lock your computer and require a password to log back in. You can choose Control Panel > Personalization > Screen Saver Settings and set up a screen saver that provides a login screen to get back in once it's been initiated. Screen Locking in macOS On an external keyboard or older laptops, press Ctrl+Shift+Eject On a MacBook Air or Pro Retina, press Ctrl+Shift+Power You can also go to System Preferences > Security & Privacy > General and select Require password immediately after sleep or screen saver begins (provided you have already set up a screen saver by clicking System Preferences > Desktop & Screen Saver). Additional Cybersecurity Resources Find out how to recognize suspicious emails and protect yourself against malware through better password security Check out our recent post on the future of security threats Get more security tips from the National Cyber Security Alliance. National Cyber Security Awareness Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved. Image: National Cyber Security Alliance spanhidden Full Article security symantec2017 privacy
da Millions Of Guests Impacted In Marriott Data Breach, Again By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:26:34 GMT Full Article headline hacker privacy bank cybercrime data loss fraud
da How Serbia has landed on the tech radar By www.fdiintelligence.com Published On :: Thu, 13 Feb 2020 16:40:18 +0000 Serbia’s technology cluster is gaining momentum and attracting FDI, for both its software and hardware expertise. Full Article
da Roaring Trade In Zero-Days Means More Vulns Are Falling Into The Hands Of State Spies By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:36:16 GMT Full Article headline hacker government cyberwar spyware zero day
da End of the road for Vodafone India? By www.fdiintelligence.com Published On :: Wed, 18 Mar 2020 16:48:27 +0000 A government bailout for the ailing subsidiary of the telecoms powerhouse has fallen through. Full Article
da Balochistan representative hails new dawn By www.fdiintelligence.com Published On :: Thu, 20 Feb 2020 12:53:28 +0000 Sardar Popalzai, president of the Balochistan Economic Forum, talks about the blue economy and the Pakistani province’s tourism potential. Full Article
da Red Hat Hack Prompts Critical OpenSSH Update By packetstormsecurity.com Published On :: Fri, 22 Aug 2008 10:17:11 GMT Full Article linux ssh
da OpenSSH Chink Bares Encrypted Data Packets By packetstormsecurity.com Published On :: Tue, 19 May 2009 09:13:21 GMT Full Article ssh
da Production and preservation the key on Canada's Atlantic coast By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 11:24:54 +0000 Canada's Atlantic Ocean-bordering provinces are making the most of their coastal resources, using decades of knowhow to balance economic growth with sustainability. Full Article
da FDI into Canada reaches four-year high of $41.9bn By www.fdiintelligence.com Published On :: Wed, 18 Sep 2019 14:36:11 +0000 Canada has seen a four-year peak in FDI, with the technology, real estate and aerospace sectors enjoying substantial growth. Zara Fennell reports. Full Article
da FERC's data shows US renewable generating capacity has surpassed coal By feedproxy.google.com Published On :: 2019-06-10T13:43:07Z According to an analysis by the SUN DAY Campaign of data just released by the Federal Energy Regulatory Commission (FERC), U.S. electrical generating capacity by renewable energy sources (i.e., biomass, geothermal, hydropower, solar, wind) has now - for the first time - surpassed that of coal. Full Article News Hydropower Energy Efficiency Bioenergy Wind Power Solar Geothermal
da New York to pass 'one of the most aggressive clean energy mandates in the country' By feedproxy.google.com Published On :: 2019-06-19T11:30:37Z New York is poised to pass its own version of the Green New Deal with a climate bill that would more than triple the state’s solar capacity and aggressively promote development of wind farms off the state’s coast. Full Article News Hydropower Storage Bioenergy Policy Solar Offshore Geothermal
da Corani seeking financing to develop 147-MW Banda Azul hydro project in Bolivia By feedproxy.google.com Published On :: 2019-06-20T13:27:00Z Jose Maria Romay, general manager of Corani (a subsidiary of Ende), has announced the company is seeking financing from Latin American development bank CAF and French development agency AFD for the 147-MW Banda Azul hydro project. Full Article Latin America News Hydropower New Development Finance
da EPA finalizes Affordable Clean Energy rule, repeals Clean Power Plan By feedproxy.google.com Published On :: 2019-06-20T14:58:00Z The U.S. Environmental Protection Agency (EPA) has issued the Affordable Clean Energy (ACE) rule and simultaneously repealed the Clean Power Plan (CPP). Full Article Environmental North America Government and Policy News News Hydropower Storage Wind Power Solar Geothermal
da Google spending billions on data centers in renewable energy rich regions By feedproxy.google.com Published On :: 2019-06-25T13:10:43Z Alphabet Inc.’s Google said it would invest 1 billion euros ($1.1 billion) to expand its data center infrastructure in the Netherlands. Full Article Energy Efficiency News Hydropower Wind Power
da The failure of privatization in the energy sector and why today’s consumers are reclaiming power By feedproxy.google.com Published On :: 2019-06-26T12:44:57Z Back in the 1980s and 1990s, the twin forces of privatization and deregulation of public infrastructure services ascended to a global paradigm of progress and development. Government management of services such as telecommunications, transportation, water, and energy was deemed inefficient, underperforming, and monopolistic. Private industry – accountable to the profits and losses of an open market and, thus, believed more efficient than government – was proclaimed the better way for consumer choice and a more efficient use of taxpayers’ expenses. Full Article DER Rooftop Bioenergy Wind Power Opinion & Commentary Solar Geothermal
da Educating today’s utilities about tomorrow’s innovations By feedproxy.google.com Published On :: 2019-07-02T15:01:00Z Last week in San Antonio, Texas, about 150 DISTRIBUTECH stakeholders convened to discuss industry trends, best practices for marketing and sales in the utility industry and set the educational agenda for the 2020 event. Full Article Microgrids DER Grid Edge Microgrids News C&I Generation DER T&D DER Project Development Policy & Regulation Smart Grid Vehicle to grid Grid Scale Energy Efficiency Utility Integration Customer Service
da Wednesday webcast to reveal what's new about POWERGEN 2019 in NOLA By feedproxy.google.com Published On :: 2019-07-12T13:36:00Z Clarion Energy’s Teresa Hansen, vice president of global content, for a webcast Wednesday will be making some important announcements regarding this year’s event in New Orleans. Hansen also will offer key details on content, the exhibit floor and resources available to attendees. Full Article Coal News Gas Storage Renewables On-Site Power O&M Energy Storage Wind Power Solar Placement
da The Lewis River Merwin Dam: harvest, habitat, hatcheries and hydro By feedproxy.google.com Published On :: 2019-07-24T13:05:00Z On Tuesday, July 23, about 30 HydroVision attendees had to privilege of touring the 136-MW Lewis River hydropower plant located at the Merwin Dam in Ariel, Washington. The dam was constructed in 1931 and has four penstocks, which today feed three turbines. The turbines were installed in 1931, 1949 and 1958, respectively. The fourth penstock, which was the focus of much of the tour, is for fish passage. Full Article Environmental News Hydropower FERC Controls and Automation Dams and Civil Structures Monitoring O&M Black & Veatch Asset Management
da Glendale Water & Power to repower Grayson power plant with solar plus storage By feedproxy.google.com Published On :: 2019-07-29T15:34:10Z Last week, California’s Glendale Water & Power (GWP) received approval from the Glendale City Council to move forward with a plan to repower the aging Grayson Power Plant with a combination of renewable energy resources, energy storage and a limited amount of thermal generation. Full Article News Utility Scale Grid Scale DER Energy Efficiency DER Solar
da Utility device and data management technologies revenue could exceed $22 billion by 2027edit By feedproxy.google.com Published On :: 2019-07-30T13:53:00Z A new report from Navigant Research released this week says that revenue from device and data management technologies could grow from approximately $14.8 billion in 2018 to more than $22.1 billion in 2027 at a compound annual growth rate (CAGR) of 4.6%. Full Article Communication Technology DER Grid Edge News Smart Grid DER Energy Efficiency DER
da U.S. announces changes to implementing regulations of the Endangered Species Act By feedproxy.google.com Published On :: 2019-08-13T16:45:00Z U.S. Secretary of the Interior David Bernhardt has unveiled changes to the implementing regulations of the Endangered Species Act (ESA) that Interior says is “designed to increase transparency and effectiveness and bring the administration of the Act into the 21st century.” Full Article Environmental North America Government and Policy News News Hydropower Wind Power Solar
da University of Notre Dame breaks ground on 2.5-MW hydroelectric generation facility By feedproxy.google.com Published On :: 2019-08-20T19:15:00Z The University of Notre Dame and South Bend’s Venues Parks & Arts have broken ground on a 2.5-MW hydroelectric generation facility at an existing city-owned dam on the St. Joseph River in downtown South Bend, Ind. Full Article Small Hydro Environmental North America News Hydropower
da World’s largest hospital solar PV project online now in Aman, Jordan By feedproxy.google.com Published On :: 2019-08-27T14:01:20Z This week Aman, Jordan-based Philadelphia Solar announced that the 8.2-MW solar PV project that it installed at the Abdali Medical Center in Jordan has entered commercial operation. Full Article C&I DER News
da Hawaiian Electric Companies issue largest clean energy procurement to date; aim to end coal use, replace oil By feedproxy.google.com Published On :: 2019-08-27T14:32:35Z Last week, the Hawaiian Electric Companies began Hawai‘i’s largest procurement effort for renewable energy resources to end the use of coal and reduce reliance on imported oil for power generation, moving the state closer to its goal of using 100 percent renewable energy by 2045. Full Article DER News Utility Scale DER Utility Integration
da Thailand planning massive floating solar power plants on hydropower dam reservoirs By feedproxy.google.com Published On :: 2019-03-05T14:51:04Z Thailand plans to build the world’s largest floating solar farms to power Southeast Asia’s second-largest economy and to boost the country’s share of clean energy. Full Article Energy Efficiency News Hydropower Solar
da Idaho Power sets goal for 100-percent clean energy by 2045; signs record-low solar PPA By feedproxy.google.com Published On :: 2019-03-29T14:33:00Z Idaho Power unveiled a goal Tuesday to provide 100-percent clean energy by 2045 on the heels of an announcement that it will purchase 120-MW of solar energy through a PPA with Jackpot Holdings at a price of less than US $0.022 cents per kWh. Full Article News Editor's Pick Hydropower Storage Bioenergy Wind Power Solar Geothermal
da FPL building world's largest solar-storage combo facility in Florida By feedproxy.google.com Published On :: 2019-03-29T19:05:00Z The unit of NextEra Energy announced plans to build a 409-MW energy storage facility in Manatee County. FPL says the Manatee Energy Storage Center will be the world’s largest solar-power battery system by four-fold. Full Article Storage Solar
da Nevada is the fourth US state to commit to 100 percent clean energy By feedproxy.google.com Published On :: 2019-04-23T16:49:02Z Nevada is joining the growing list of U.S. places that aim to ban fossil fuels from its electricity supply. Full Article News Hydropower Storage Onshore Bioenergy Wind Power Solar Geothermal
da Bermuda Electric Light Company installs 10-MW/5.5-MWh energy storage system By feedproxy.google.com Published On :: 2019-05-29T13:21:53Z Yesterday, energy storage company Saft said it delivered and installed a turnkey Energy Storage System to Bermuda Electric Light Company (BELCO). The system provides up to 10 MW power for spinning reserves and frequency response to maintain grid stability and has a storage capacity of 5.5MWh, said the company. The official ribbon-cutting ceremony was held on May 16. Full Article Energy Efficiency Microgrids News Wind Power Grid Scale Solar