Costs stall PEI energy projects

By CBC News


Protective Relay Training - Basic

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today
Prince Edward Island has officially put on hold renewable-energy projects promising 130 megawatts because all the proposals are too costly.

Six companies made submissions in February to build the projects, mostly for wind development. They were assessed by Maritime Electric, the province's main electricity supplier.

Energy Minister Richard Brown announced in the legislature they've all been rejected because the electricity costs were too high.

"We have a wind farm on Prince Edward Island. We know what [cost] we can produce wind for," said Brown.

"Maritime Electric analyzed the bids and, with the current prices that were in them and with the transmission costs and the additional costs that we would have to put in place in terms of infrastructure, the pricing wasn't good enough for Islanders."

Energy critic Mike Currie doesn't understand why a private company should have the power to evaluate energy projects for the province.

"I think that Maritime Electric just doesn't want to do any more wind projects on Prince Edward Island," said Currie. "Why the minister has made them part of the evaluation process is beyond me."

The plan was to sell 30 megawatts on PEI and export the rest.

It's possible that could still happen. The companies have been given 30 days to fine-tune their proposals and resubmit them.

Related News

State-sponsored actors 'very likely' looking to attack electricity supply, says intelligence agency

Canada Critical Infrastructure Cyber Risks include state-sponsored actors probing the electricity grid and ICS/OT, ransomware on utilities, and espionage targeting smart cities, medical devices, and energy networks, pre-positioning for disruptive operations.

 

Key Points

Nation-state and criminal cyber risks to Canada's power, water, and OT/ICS, aiming to disrupt, steal data, or extort.

✅ State-sponsored probing of power grid and utilities

✅ OT/ICS exposure grows as systems connect to IT networks

✅ Ransomware, espionage, and pre-positioning for disruption

 

State-sponsored actors are "very likely" trying to shore up their cyber capabilities to attack Canada's critical infrastructure — such as the electricity supply, as underscored by the IEA net-zero electricity report indicating rising demand for clean power, to intimidate or to prepare for future online assaults, a new intelligence assessment warns.

"As physical infrastructure and processes continue to be connected to the internet, cyber threat activity has followed, leading to increasing risk to the functioning of machinery and the safety of Canadians," says a new national cyber threat assessment drafted by the Communications Security Establishment.

"We judge that state-sponsored actors are very likely attempting to develop the additional cyber capabilities required to disrupt the supply of electricity in Canada, even as cleaning up Canada's electricity remains critical for climate goals."

Today's report — the second from the agency's Canadian Centre for Cyber Security wing — looks at the major cyber threats to Canadians' physical safety and economic security.

The CSE does say in the report that while it's unlikely cyber threat actors would intentionally disrupt critical infrastructure — such as water and electricity supplies — to cause major damage or loss of life, they would target critical organizations "to collect information, pre-position for future activities, or as a form of intimidation."

The report said Russia-associated actors probed the networks of electricity utilities in the U.S. and Canada last year and Chinese state-sponsored cyber threat actors have targeted U.S. utility employees. Other countries have seen their industrial control systems targeted by Iranian hacking groups and North Korean malware was found in the IT networks of an Indian power plant, it said.

The threat grows as more critical infrastructure goes high-tech.

In the past, the operational technology (OT) used to control dams, boilers, electricity and pipeline operations has been largely immune to cyberattacks — but that's changing as manufacturers incorporate newer information technology in their systems and products and as the race to net-zero drives grid modernization, says the report.

That technology might make things easier and lower costs for utilities already facing debates over electricity prices in Alberta amid affordability concerns, but it comes with risks, said Scott Jones, the head of the cyber centre.

"So that means now it is a target, it is accessible and it's vulnerable. So what you could see is shutting off of transmission lines, you can see them opening circuit breakers, meaning electricity simply won't flow to our homes to our business," he told reporters Wednesday.

While the probability of such attacks remains low, Jones said the goal of Wednesday's briefing is to send out the early warnings.

"We're not trying to scare people. We're certainly not trying to scare people into going off grid by building a cabin in the woods. We're here to say, 'Let's tackle these now while they're still paper, while they're still a threat we're writing down.'"

Steve Waterhouse, a former cybersecurity officer for the Department of National Defence who now teaches at Université de Sherbrooke, said a saving grace for Canada could be the makeup of its electrical systems.

"Since in Canada, they're very centralized, it's easier to defend, and debates about bridging Alberta and B.C. electricity aim to strengthen resilience, while down in the States, they have multiple companies all around the place. So the weakest link is very hard to identify where it is, but the effect is a cascading effect across the country ... And it could impact Canada, just like we saw in the big Northeastern power outage, the blackout of 2003," he said.

"So that goes to say, we have to be prepared. And I believe most energy companies have been taking extra measures to protect and defend against these type of attacks, even as Canada points to nationwide climate success in electricity to meet emissions goals."

In the future, attacks targeting so-called smart cities and internet-connected devices, such as personal medical devices, could also put Canadians at risk, says the report. 

Earlier this year, for example, Health Canada warned the public that medical devices containing a particular Bluetooth chip — including pacemakers, blood glucose monitors and insulin pumps — are vulnerable to cyber attacks that could crash them.

The foreign signals intelligence agency also says that while state-sponsored programs in China, Russia, Iran and North Korea "almost certainly" pose the greatest state-sponsored cyber threats to Canadian individuals and organizations, many other states are rapidly developing their own cyber programs.

Waterhouse said he was glad to see the government agency call out the countries by name, representing a shift in approach in recent years.

"To tackle on and be ready to face a cyber-attack, you have to know your enemy," he said.

"You have to know what's vulnerable inside of your organization. You have to know how ... vulnerable it is against the threats that are out there."


Commercial espionage continues
State-sponsored actors will also continue their commercial espionage campaigns against Canadian businesses, academia and governments — even as calls to make Canada a post-COVID manufacturing hub grow — to steal Canadian intellectual property and proprietary information, says the CSE.

"We assess that these threat actors will almost certainly continue attempting to steal intellectual property related to combating COVID-19 to support their own domestic public health responses or to profit from its illegal reproduction by their own firms," says the "key judgments" section of the report.

"The threat of cyber espionage is almost certainly higher for Canadian organizations that operate abroad or work directly with foreign state-owned enterprises."

The CSE says such commercial espionage is happening already across multiple fields, including aviation, technology and AI, energy and biopharmaceuticals.

While state-sponsored cyber activity tends to offer the most sophisticated threats, CSE said that cybercrime continues to be the threat most likely to directly affect Canadians and Canadian organizations, through vectors like online scams and malware.

"We judge that ransomware directed against Canada will almost certainly continue to target large enterprises and critical infrastructure providers. These entities cannot tolerate sustained disruptions and are willing to pay up to millions of dollars to quickly restore their operations," says the report.


Cybercrime becoming more sophisticated 
According to the Canadian Anti-Fraud Centre, Canadians lost over $43 million to cybercrime last year. The CSE reported earlier this year that online thieves have been using the COVID-19 pandemic to trick Canadians into forking over their money — through scams like a phishing campaign that claimed to offer access to a Canada Emergency Response Benefit payment in exchange for the target's personal financial details.

Online foreign influence activities — a dominant theme in the CSE's last threat assessment briefing — continue and constitute "a new normal" in international affairs as adversaries seek to influence domestic and international political events, says the agency.

"We assess that, relative to some other countries, Canadians are lower-priority targets for online foreign influence activity," it said.

"However, Canada's media ecosystem is closely intertwined with that of the United States and other allies, which means that when their populations are targeted, Canadians become exposed to online influence as a type of collateral damage."

According to the agency's own definition, "almost certainly" means it is nearly 100 per cent certain in its analysis, while "very likely" means it is 80-90 per cent certain of its conclusions. The CSE says its analysis is based off of a mix of confidential and non-confidential intelligence and sources. 

 

Related News

View more

Sask. sets new record for power demand

SaskPower Summer Power Demand Record hits 3,520 MW as heat waves drive electricity consumption; grid capacity, renewables expansion, and energy efficiency tips highlight efforts to curb greenhouse gas emissions while meeting Saskatchewan's growing load.

 

Key Points

The latest summer peak load in Saskatchewan: 3,520 MW, driven by heat, with plans to expand capacity and lower emissions.

✅ New peak surpasses last August by 50 MW to 3,520 MW.

✅ Capacity target: 7,000 MW by 2030 with more renewables.

✅ Tips: AC settings, close blinds, delay heat-producing chores.

 

As the mercury continues to climb in Saskatchewan, where Alberta's summer electricity record offers a regional comparison, SaskPower says the province has set a new summer power demand record.

The Crown says the new record is 3,520 megawatts. It’s an increase of 50 megawatts over the previous record, or enough electricity for 50,000 homes.

“We’ve seen both summer and winter records set every year for a good while now. And if last summer is any indication, we could very well see another record before temperatures cool off heading into the fall,” said SaskPower Vice President of Transmission and Industrial Services Kory Hayko in a written release. “It’s not impossible we’ll break this record again in the coming days. It’s SaskPower’s responsibility to ensure that Saskatchewan people and businesses have the power they need to thrive. That’s what drives our investment of $1 billion every year, as outlined in our annual report, to modernize and grow the province’s electrical system.”

The previous summer consumption record of 3,740 megawatts was set last August, and similar extremes in the Yukon electricity demand highlight broader demand pressures this year. The winter demand record remains higher at 3,792 megawatts, set on Dec. 29, 2017.

SaskPower says it plans to expand its generation capacity from 4,500 megawatts now to 7,000 megawatts in 2030, with a focus on decreasing greenhouse gas emissions and doubling renewable electricity by 2030 as part of its strategy.

To reduce power bills, the Crown suggests turning down or programming air conditioning when residents aren’t home, inspecting the air conditioner to make sure it is operating efficiently, keeping blinds closed to keep out direct sunlight, delaying chores that produce heat and making sure electronics are turned off when people leave the room.

The new record beats the previous summer peak of 3,470 MW, set last August after also being broken twice in July. The winter demand record is still higher at 3,792 MW, which was set on December 29, 2017. To meet growing power demand, and amid projections that Manitoba's electrical demand could double in the next 20 years, SaskPower is expanding its generation capacity from approximately 4,500 MW now to 7,000 MW by 2030 while also reducing greenhouse gas emissions by 40 per cent from 2005 levels. To accomplish this, we will be significantly increasing the amount of renewables on our system.

Cooling and heating represents approximately a quarter of residential power bills. To reduce consumption and power bills during heat waves, SaskPower’s customers can:

Turn down or program the air conditioning when no one is home (for every degree that air conditioning is lowered for an eight-hour period, customers can save up to two per cent on their power costs);

Consider having their air conditioning unit inspected to make sure it is operating efficiently;

Keep the heat out by closing blinds and drapes, especially those with direct sunlight;

Delay chores that produce heat and moisture, like dishwashing and laundering, until the cooler parts of the day or evening; and

As with any time of the year, make sure lights, televisions and other electronics are turned off when no one's in the room. For example, a modern gaming console can use as much power as a refrigerator.

 

Related News

View more

Britons could save on soaring bills as ministers plan to end link between gas and electricity prices

UK Electricity-Gas Price Decoupling aims to reform wholesale electricity pricing under the Energy Security Bill, shielding households from gas price spikes, supporting renewables, and easing the cost-of-living crisis through market redesign and transparent tariffs.

 

Key Points

Policy to decouple power prices from gas via the Energy Security Bill, stabilizing bills and reflecting renewables

✅ Breaks gas-to-power pricing link to cut electricity costs

✅ Reduces volatility; shields households from global gas shocks

✅ Highlights benefits of renewables and market transparency

 

Britons could be handed relief on rocketing household bills under Government plans to sever the link between the prices of gas and electricity, including proposals to restrict energy prices in the market, it has emerged.

Ministers are set to bring forward new laws under the Energy Security Bill to overhaul the UK's energy market in the face of the current cost-of-living crisis.

They have promised to provide greater protection for Britons against global fluctuations in energy prices, through a price cap on bills among other measures.

The current worldwide crisis has been exacerbated by the Ukraine war, which has sent gas prices spiralling higher.

Under the current make-up of Britain's energy market, soaring natural gas prices have had a knock-on effect on electricity costs.

But it has now been reported the new legislation will seek to prevent future shocks in the global gas market having a similar impact on electricity prices.

Yet the overhaul might not come in time to ease high winter energy costs for households ahead of this winter.

According to The Times, Business Secretary Kwasi Kwarteng will outline proposals for reforms in the coming weeks.

These will then form part of the Energy Security Bill to be introduced in the autumn, with officials anticipating a decrease in energy bills by April.

The newspaper said the plans will end the current system under which the wholesale cost of gas effectively determines the price of electricity for households.

Although more than a quarter of Britain's electricity comes from renewable sources, under current market rules it is the most expensive megawatt needed to meet demand that determines the price for all electricity generation.

This means that soaring gas prices have driven up all electricity costs in recent months, even though only around 40% of UK electricity comes from gas power stations.

Energy experts have compared the current market to train passengers having to pay the peak-period price for every journey they make.

One Government source told The Times: 'In the past it didn’t really matter because the price of gas was reasonably stable.

'Now it seems completely crazy that the price of electricity is based on the price of gas when a large amount of our generation is from renewables.'

It was also claimed ministers hope the reforms will make the market more transparent and emphasise to consumers the benefits of decarbonisation, amid an ongoing industry debate over free electricity for consumers.

A Government spokesperson said: 'The high global gas prices and linked high electricity prices that we are currently facing have given added urgency to the need to consider electricity market reform.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

New York State Moratorium on Utility Disconnections During Emergencies

New York Utility Disconnection Ban protects residents during state emergencies, covering electric, gas, water, telecommunications, cable, and internet services, with penalties for noncompliance and options like deferred payment agreements and consumer protections.

 

Key Points

A proposed law barring shutoffs in state emergencies across electric, gas, water, telecom, cable, and internet.

✅ Applies during declared state and local emergencies statewide.

✅ Covers electric, gas, water, telecom, cable, and internet services.

✅ Noncompliance triggers penalties; payment plans required for arrears.

 

Governor Andrew M. Cuomo has announced a proposal to prohibit utility disconnections in regions that are under a state of emergency, addressing the energy insecurity many households face, as part of the 2021 State of the State. The Governor will propose legislation that will apply to electric, gas, water, telecommunications, cable and internet services. Utilities that fail to comply will be subject to penalties.

“In a year in which we dealt with an unprecedented pandemic, ferocious storms added insult to injury by knocking out power for hundreds of thousands of New Yorkers,” Governor Cuomo said. “Utility companies provide essential services, and we need to make sure they continue to provide them, rain or shine. That’s why we’re proposing legislation to make sure that New Yorkers, especially those living in regions under states of emergency, have access to these critical services to provide for themselves and their families.”

Governor Cuomo has taken a series of actions to protect New Yorkers’ access to utilities during the COVID-19 pandemic, including a suspension of shut-offs in New York and New Jersey, among other measures. Last year, the Governor signed legislation extending a moratorium that prevents utility companies from disconnecting utilities to residential households that are struggling with their bills due to the COVID-19 pandemic, a move mirrored by reconnection efforts in Ontario by Hydro One. Utility companies must instead offer these individuals a deferred payment agreement on any past-due balance. 

On November 19, Governor Cuomo announced that Con Edison now faces $25 million in penalties and possible license revocation from the New York State Public Service Commission, amid a broader review of retail energy markets by state regulators, following an investigation into the utility’s failed response during large-scale power outages in Manhattan and Brooklyn in July 2019. On November 2, Governor Cuomo announced that more than $328 million in home heating aid is now available, similar to Ontario bill support during the pandemic, for low- and middle-income New Yorkers who need assistance keeping their homes warm during the coming winter season.

The Governor has previously enacted some of the strongest and most progressive consumer protection and assistance programs in the country, including smart streetlights in Syracuse that reduce energy costs, and other initiatives. Governor Cuomo established New York’s energy affordability policy in 2016, as states pursue renewable energy ambitions that can affect rates, underscoring the need for affordability. The policy extended energy bill support to more than 152,000 additional New York families, ensuring that more than 920,000 New York families spend no more than 6 percent of their income on energy bills. Through this program, New York commits more than $238 million annually helping to keep the lights and heat on for our most vulnerable New Yorkers, while actively striving to expand coverage to additional families.

 

Related News

View more

Energy-hungry Europe to brighten profit at US solar equipment makers

European Solar Inverter Demand surges as photovoltaics and residential solar expand during the clean energy transition, driven by high natural gas prices; Germany leads, boosting Enphase and SolarEdge sales for rooftop systems and grid-tied installations.

 

Key Points

Rising European need for solar inverters, fueled by residential PV growth, high energy costs, and clean energy policies.

✅ Germany leads EU rooftop PV installations

✅ Enphase and SolarEdge see revenue growth

✅ High gas prices and policies spur adoption

 

Solar equipment makers are expected to post higher quarterly profit, benefiting from strong demand in Europe for critical components that convert energy from the sun into electricity, amid record renewable momentum worldwide.

The continent is emerging as a major market for solar firms as it looks to reduce its dependence on the Russian energy supply and accelerate its clean energy transition, with solar already reshaping power prices in Northern Europe across the region, brightening up businesses of companies such as Enphase Energy (ENPH.O) and SolarEdge Technologies (SEDG.O), which make solar inverters.

Wall Street expects Enphase and SolarEdge to post a combined adjusted net income of $323.8 million for the April-June quarter, a 56.7% jump from a year earlier, even as demand growth slows in the United States.

The energy crisis in Europe is not as acute as last year when Western sanctions on Russia severely crimped supplies, but prices of natural gas and electricity continue to be much higher than in the United States, Raymond James analyst Pavel Molchanov said.

As a result, demand for residential solar keeps growing at a strong pace in the region, with Germany being one of the top markets and solar adoption in Poland also accelerating in recent years across the region.

About 159,000 residential solar systems became operational in the first quarter in Germany amid a solar power boost that reflects policy and demand, a 146% rise from a year earlier, according to BSW solar power association.

Adoption of solar is also helping European homeowners have greater control over their energy costs as fossil fuel prices tend to be more volatile, Morningstar analyst Brett Castelli said.

SolarEdge, which has a bigger exposure to Europe than Enphase, said its first-quarter revenue from the continent more than doubled compared with last year.

In comparison, growth in the United States has been tepid due to lukewarm demand in states like Texas and Arizona where cheaper electricity prices make the economics of residential solar less attractive, even though solar is now cheaper than gas in parts of the U.S. market.

Higher interest rates following the U.S. Federal Reserve's recent actions to tame inflation are also weighing on demand, even as power outage risks rise across the United States.

Analysts also expect weakness in California where a new metering reform reduces the money credited to rooftop solar owners for sending excess power into the grid, underscoring how policy shifts can reshape the sector. The sunshine state accounts for nearly a third of the U.S. residential solar market.

Enphase will report its results on Thursday after the bell, while SolarEdge will release its second-quarter numbers on Aug. 1.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.