Down, Danger, Dial: Electrical Safety Tips to Help British Columbians Stay Safe During Storm Season


CSA Z463 Electrical Maintenance

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$249
Coupon Price:
$199
Reserve Your Seat Today

BC Hydro Winter Electrical Safety highlights hazards from fallen power lines, high winds, and heavy rain; stay 10 metres back, dial 9-1-1, and follow outage, storm restoration, and emergency responder guidance.

 

Key Points

BC Hydro guidance to prevent winter electrical injuries by avoiding downed lines and calling 9-1-1.

✅ Stay 10 metres back from downed lines; assume they are live; call 9-1-1.

✅ Report hanging or low lines and leaning poles to emergency services.

✅ BC Hydro crews coordinate storm restoration with responders.

 

Hydro is reminding the public about the hazards of electricity and the importance of staying safe this winter, as utilities work on adapting to climate change impacts across Canada.

Electrical equipment is more prone to damage during the fall and winter months when high winds and heavy rain can cause trees to fall on power lines and knock down power poles, prompting some utilities to assess line-burying strategies for safety and cost. If you come across a fallen power line, assume it is dangerous, stay at least 10 metres back – the length of a school bus – and dial 9-1-1.

Every fallen power line should be treated as an emergency. Safety is a key priority for BC Hydro and if a power line does fall, crews will work with emergency responders to ensure the area around the line is safe. This includes storm restoration efforts from power line technicians, wire guards, damage assessors and vegetation crews, as well as broader system upgrades like major grid investments that improve local reliability.

Such system changes can also affect delivery rates for some customers over time.

BC Hydro is also reminding British Columbians to use caution, stay 10 metres back and dial 9-1-1, if they come across:

  • a hanging power line,
  • a tree that has fallen on an electrical line,
  • a power pole with a broken crossarm,
  • a low-hanging power line close to the ground, or
  • a power pole leaning more than two metres.

Electrical equipment can be dangerous and people are injured or killed by electricity every year, including incidents tied to copper theft dangers in some regions. For more information on electrical safety, visit bchydro.com/besafe.

Source BC Hydro Media Releations

 

Related News

Related News

Illinois electric utility publishes online map of potential solar capacity

ComEd Hosting Capacity Map helps Illinois communities assess photovoltaic capacity, distributed energy resources, interconnection limits, and grid planning needs, guiding developers and policymakers on siting solar, net metering feasibility, and RPS-aligned deployment by circuit.

 

Key Points

An online tool showing circuit-level DER capacity, PV limits, and interconnection readiness across ComEd.

✅ Circuit-level estimates of solar hosting capacity

✅ Guides siting, interconnection, and net metering

✅ Supports RPS goals with grid planning insights

 

As the Illinois solar market grows from the Future Energy Jobs Act, the largest utility in the state has posted a planning tool to identify potential PV capacity in their service territory. ComEd, a Northern Illinois subsidiary of Exelon, has a hosting capacity website for its communities indicating how much photovoltaic capacity can be sited in given areas, based on the existing electrical infrastructure, as utilities pilot virtual power plant programs that leverage distributed resources.

According to ComEd’s description, “Hosting Capacity is an estimate of the amount of DER [distributed energy resources] that may be accommodated under current configurations at the overall circuit level without significant system upgrades to address adverse impacts to power quality or reliability.” This website will enable developers and local decision makers to estimate how much solar could be installed by township, sections and fractions of sections as small as ½ mile by ½ mile and to gauge EV charging impacts with NREL's projection tool for distribution planning. The map sections indicate potential capacity by AC kilowatts with a link to to ComEd’s recently upgraded Interconnection and Net Metering homepage.

The Hosting Map can provide insight into how much solar can be installed in which locations in order to help solar reach a significant portion of the Illinois Renewable Portfolio Standard (RPS) of 25% electricity from renewable sources by 2025, and to plan for transportation electrification as EV charging infrastructure scales across utility territories. For example, the 18 sections of Oak Park Township capacity range from 612 to 909 kW, and total 13,260 kW of photovoltaic power. That could potentially generate around 20 million kWh, and policy actions such as the CPUC-approved PG&E EV program illustrate how electrification initiatives may influence future demand. Oak Park, according to the PlanItGreen Report Card, a joint project of the Oak Park River Forest Community Foundation and Seven Generations Ahead, uses about 325 million kWh.

Based on ComEd’s Hosting Capacity, Oak Park could generate about 6% of its electricity from solar power located within its borders. Going significantly beyond this amount would likely require a combination of upgrades by ComEd’s infrastructure, potentially higher interconnection costs and deployment of technologies like energy storage solutions. What this does indicate is that a densely populated community like Oak Park would most likely have to get the majority of its solar and renewable electricity from outside its boundaries to reach the statewide RPS goal of 25%. The Hosting Capacity Map shows a considerable disparity among communities in ½ mile by ½ mile sections with some able to host only 100-200 kWs to some with capacities of over 3,000 kW.

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

French Price-Fixing Probe: Schneider, Legrand, Rexel, and Sonepar Fined

French Antitrust Fines for Electrical Cartel expose price fixing by Schneider Electric, Legrand, Rexel, and Sonepar, after a Competition Authority probe into electrical distribution, collusion, and compliance breaches impacting market competition and customers.

 

Key Points

Penalties on Schneider Electric, Legrand, Rexel, and Sonepar for electrical price fixing, upholding competition law.

✅ Competition Authority fined four major suppliers.

✅ Collusion raised prices across construction and industry.

✅ Firms bolster compliance programs and training.

 

In a significant crackdown on corporate malfeasance, French authorities have imposed hefty fines on four major electrical equipment companies—Schneider Electric, Legrand, Rexel, and Sonepar—after concluding a price-fixing investigation. The total fines amount to approximately €500 million, underscoring the seriousness with which regulators are addressing anti-competitive practices in the electrical distribution sector, even as France advances a new electricity pricing scheme to address EU concerns.

Background of the Investigation

The probe, initiated by France’s Competition Authority, sought to uncover collusion among these leading firms regarding the pricing of electrical equipment and services between 2005 and 2012. This investigation is part of a broader initiative to promote fair competition within the market, as Europe prepares to revamp its electricity market to bolster transparency, ensuring that consumers and businesses alike benefit from competitive pricing and innovative products.

The inquiry revealed that these companies had engaged in illicit agreements to fix prices and coordinate their market strategies, limiting competition in a sector critical to both the economy and infrastructure. The findings indicated that the collusion not only stifled competition but also led to inflated prices for customers, illustrating why rolling back electricity prices is often more complex than it appears for customers across various sectors, from construction to manufacturing.

The Fines Imposed

Following the conclusion of the investigation, the fines levied against the companies were substantial. Schneider Electric faced the largest penalty, receiving a fine of €220 million, while Legrand was fined €150 million. Rexel and Sonepar were each fined €70 million and €50 million, respectively. These financial penalties serve as a deterrent to other companies that might consider engaging in similar practices, reinforcing the message that anti-competitive behavior will not be tolerated.

The fines are particularly significant given the size and influence of these companies within the electrical equipment market. Their combined revenues amount to billions of euros annually, making the repercussions of their actions far-reaching. As major players in the industry, their pricing strategies have a direct impact on numerous sectors, from residential construction to large-scale industrial projects.

Industry Reactions

The response from the affected companies has varied. Schneider Electric expressed its commitment to compliance and transparency, acknowledging the importance of adhering to competition laws, amid ongoing EU electricity reform debates that influence market expectations.

Legrand also emphasized its commitment to fair competition, noting that it has taken steps to enhance its compliance framework in response to the investigation. Rexel and Sonepar similarly reaffirmed their dedication to ethical business practices and their intention to cooperate with regulators in the future.

Industry experts have pointed out that these fines, while significant, may not be enough to deter large corporations from engaging in similar behavior unless accompanied by a broader cultural shift within the industry. There is a growing call for enhanced oversight and stricter penalties to ensure that companies prioritize ethical conduct over short-term profits.

Implications for the Market

The fines imposed on Schneider, Legrand, Rexel, and Sonepar could have broader implications for the electrical equipment market and beyond. They signal to other companies within the sector that regulatory bodies are vigilant, even as nine EU countries oppose electricity market reforms proposed as fixes for price spikes, and willing to take decisive action against anti-competitive practices. This could foster a more competitive environment, ultimately benefiting consumers through better prices and enhanced product offerings.

Moreover, the case highlights the importance of regulatory bodies in maintaining fair market conditions. As industries evolve, ongoing vigilance from competition authorities will be necessary to prevent similar instances of collusion and ensure that markets remain competitive and innovative, as seen when New York opened a formal review of retail energy markets.

The recent fines imposed on Schneider Electric, Legrand, Rexel, and Sonepar mark a significant moment in France's ongoing battle against corporate price-fixing and anti-competitive practices, occurring as the government and EDF reached a deal on electricity prices to balance market pressures. With total penalties exceeding €500 million, the investigation underscores the commitment of French authorities to uphold market integrity and protect consumer interests.

As the industry reflects on these developments, it remains crucial for companies to prioritize compliance and ethical business practices. The ultimate goal is to create an environment where competition thrives, innovation flourishes, and consumers benefit from fair pricing. This case serves as a reminder that transparency and accountability are vital in maintaining the health of any market, particularly one as essential as the electrical equipment sector.

 

Related News

View more

Opinion: Would we use Site C's electricity?

Site C Dam Electricity Demand underscores B.C.'s decarbonization path, enabling electrification of EVs, heat pumps, and industry, aligning with BC Hydro forecasts and 2030/2050 GHG targets to supply dependable, renewable baseload power.

 

Key Points

Projected clean power tied to Site C, driven by B.C. electrification to meet 2030 and 2050 greenhouse gas targets.

✅ Aligns with 25-30% by 2030 and 55-70% by 2050 GHG cuts

✅ Supports EVs, heat pumps, and industrial electrification

✅ Provides dependable baseload alongside efficiency gains

 

There are valid reasons not to build the Site C dam. There are also valid reasons to build it. One of the latter is the rapid increase in clean electricity needed to reduce B.C.’s greenhouse gas emissions from burning natural gas, gasoline, diesel and other harmful fossil fuel products.

Although former Premier Christy Clark casually avoided near-term emissions targets, Prime Minister Justin Trudeau has set Canadian targets for both 2030 and 2050, and cleaning up Canada's electricity is critical to meeting them. Studies by my research group at Simon Fraser University and other independent analysts show that B.C.’s cost-effective contribution to these national targets requires us to reduce our emissions 25 to 30 per cent by 2030 and 55 to 70 per cent by 2050 — an energy evolution involving, among other things, a much greater use of electricity in buildings, vehicles and industry.

Recent submissions to the Site C hearing have offered widely different estimates of B.C.’s electricity demand in the decade after the project’s completion in 2025, some arguing the dam’s output will be completely surplus to domestic need for years and perhaps decades, even though improved B.C.-Alberta grid links could help balance regional demand. Some of this variation in demand forecasts is understandable. Industrial demand is especially difficult to predict, dependent as it is on global economic conditions and shifting trade relations. And there are legitimate uncertainties about B.C. Hydro’s ability to reduce electricity demand by promoting efficient products and behaviour through its Power Smart program. But some of the forecasts appear to be deliberate exaggerations, designed to support fixed positions for or against Site C.

Our university-based research team models the energy system changes required to meet national and provincial emissions targets, and we have been comparing estimates of the electricity demand implications. These estimates are produced by academics, as well as by key institutions like B.C. Hydro, the National Energy Board, and the governments of Canada and B.C.

Most electricity forecasts for B.C., including the most recent by B.C. Hydro, do not assume that B.C. reduces its greenhouse gas emissions by 25 to 30 per cent by 2030 and 55 to 70 per cent by 2050. When we adjust Hydro’s forecast for just the low end of these targets, we find that in its latest, August 30, submission to the Site C hearing, which followed the premier’s over-budget go-ahead on the project, Hydro has underestimated the demand for its electricity by about three terawatt-hours in 2025, four in 2030 and 10 in 2035. Hydro’s forecast indicates that it will need the five terawatt-hours from Site C. Our research shows that even if Hydro’s demand forecast is too high, appropriate climate policy nationally and in B.C. will absorb all the electricity the dam can produce soon after its completion.

B.C. Hydro does not forecast electricity demand to 2050. But, studies by us and others show that B.C. electricity demand will be almost double today’s levels if we are to reduce emissions by 55 to 70 per cent, even amid a documented risk of missing the 2050 target, in just over three decades while our population, economy, buildings and equipment grow significantly. Most mid- and small-sized vehicles will be electric. Most buildings will be well insulated and heated by electric resistance or electric heat-pumps, either individually or via district heating systems. And many low temperature industrial applications will be electric.

Aggressive efforts to promote energy efficiency will make an important contribution, such that energy demand will not grow nearly as fast as the economy. But it is delusional to think that humans will stop using energy. Even climate policy scenarios in which we assume unprecedented success with energy efficiency show dramatic increases in the consumption of electricity, this being the most favoured zero-emission form of energy as a replacement for planet-destroying gasoline and natural gas.

The completion of the Site C dam is a complicated and challenging societal choice, and delay-related cost risks highlighted by the premier underscore the stakes. There is unbiased evidence and argument supporting either completion or cancellation. But let’s stick to the unbiased evidence. In the case of our 2030 and 2050 greenhouse gas reduction targets, such evidence shows that we must substantially increase our generation of dependable electricity. If the Site C dam is built, and if we are true to our climate goals, all its electricity will be used in B.C. soon after completion.

Mark Jaccard is a professor of sustainable energy in the School of Resource and Environmental Management at Simon Fraser University.

 

Related News

View more

'Electricity out of essentially nothing': Invention creates power from falling snow

Snow-powered nanogenerator harvests static electricity from falling snow using a silicone triboelectric design, enabling energy harvesting, solar panel support during snowfall, and dual-use sensing for weather monitoring and wearable winter sports analytics.

 

Key Points

A silicone triboelectric device that harvests snowDcharge to generate power and enable sensing.

✅ Triboelectric silicone layer captures charge from falling snow.

✅ Integrates with solar arrays to maintain power during snowfall.

✅ Functions as weather and motion sensor for winter sports.

 

Scientists from University of California, Los Angeles and McMaster University have invented a nanogenerator that creates electricity from falling snow.

Most Canadians have already seen a mini-version of this, McMaster Prof. Ravi Selvaganapathy told CTV’s Your Morning. “We find that we often get shocked in the winter when it’s dry when we come in into contact with a conductive surface like a doorknob.”

The thin device works by harnessing static electricity: positively-charged, falling snow collides with the negatively-charged silicone device, which produces a charge that’s captured by an electrode.

“You separate the charges and create electricity out of essentially nothing,” Richard Kaner, who holds UCLA’s Dr. Myung Ki Hong Endowed Chair in Materials Innovation and whose lab has explored turning waste into graphene, said in a press release.

“The device can work in remote areas because it provides its own power and does not need batteries or reliance on home storage systems such as the Tesla Powerwall, which store energy for later use,” he said, explaining that the device was 3D printed, flexible and inexpensive to make because of the low cost of silicone.

“It’s also going to be useful in places like Canada, where we get a lot of snow and are pursuing a net-zero grid by 2050 to cut emissions. We can extract energy from the environment,” Selvaganapathy added.

The team, which also included scientists from the University of Toronto, published their findings in Nano Energy journal last year, but a few weeks ago, they revealed the device’s more practical uses.

About 30 per cent of the Earth’s surface is covered by snow each winter, which can significantly limit the energy generated by solar panels, including rooftop solar grids in cold climates.

So the team thought: why not simply harness electricity from the snow whenever the solar panels were covered?

Integrating their device into solar panel arrays could produce a continuous power supply whenever it snows, potentially as part of emerging virtual power plants that aggregate distributed resources, study co-author and UCLA assistant researcher Maher El-Kady explained.

The device also serves as a weather-monitoring station by recording how much snow is falling and from where; as well as the direction and speed of the wind.

The team said they also want to incorporate their device into weather sensors to help them better acquire and transmit electronic signals, supporting initiatives to use AI for energy savings across local grids. They said several Toronto-based companies -- which they couldn’t name -- have expressed interest in partnering with them.

Selvaganapathy said the device would hop on the trend of “sensors being incorporated into what we wear, into our homes and even to detect electricity theft in some markets in order to monitor a lot of the things that are important to us”

But the device’s arguably larger potential use is being integrated into technology to monitor athletes and their performances during winter sports, such as hiking, skiing and cross-country skiing.

Up to now, the movement patterns used during cross-country skiing couldn’t be detected by a smart watch, but this device may be able to.

Scientists such as Kaner believe the technology could usher in a new era of self-monitoring devices to assess an athlete’s performance while they’re running, walking or jumping.

The device is simply a proof of concept and the next step would be figuring out how to generate more electricity and integrate it into all of these potential devices, Selvaganapathy said.

 

Related News

View more

Massachusetts stirs controversy with solar demand charge, TOU pricing cut

Massachusetts Solar Net Metering faces new demand charges and elimination of residential time-of-use rates under an MDPU order, as Eversource cites grid cost fairness while clean energy advocates warn of impacts on distributed solar growth.

 

Key Points

Policy letting solar customers net out usage with exports; MDPU now adds demand charges and ends TOU rates.

✅ New residential solar demand charges start Dec 31, 2018.

✅ Optional residential TOU rates eliminated by MDPU order.

✅ Eversource cites grid cost fairness; advocates warn slower solar.

 

A recent Massachusetts Department of Public Utilities' rate case order changes the way solar net metering works and eliminates optional residential time-of-use rates, stirring controversy between clean energy advocates and utility Eversource and potential consumer backlash over rate design.

"There is a lot of room to talk about what net-energy metering should look like, but a demand charge is an unfair way to charge customers," Mark LeBel, staff attorney at non-profit clean energy advocacy organization Acadia Center, said in a Tuesday phone call. Acadia Center is an intervenor in the rate case and opposed the changes.

The Friday MDPU order implements demand charges for new residential solar projects starting on December 31, 2018. Such charges are based on the highest peak hourly consumption over the course of a month, regardless of what time the power is consumed.

Eversource contends the demand charge will more fairly distribute the costs of maintaining the local power grid, echoing minimum charge proposals aimed at low-usage customers. Net metering is often criticized for not evenly distributing those costs, which are effectively subsidized by non-net-metered customers.

"What the demand charge will do is eliminate, to the extent possible, the unfair cross subsidization by non-net-metered customers that currently exists with rates that only have kilowatt-hour charges and no kilowatt demand, Mike Durand, Eversource spokesman, said in a Tuesday email. 

"For net metered facilities that use little kilowatt-hours, a demand charge is a way to charge them for their fair share of the cost of the significant maintenance and upgrade work we do on the local grid every day," Durand said. "Currently, their neighbors are paying more than their share of those costs."

It will not affect existing facilities, Durand said, only those installed after December 31, 2018.

Solar advocates are not enthusiastic about the change and see it slowing the growth of solar power, particularly residential rooftop solar, in the state.

"This is a terrible outcome for the future of solar in Massachusetts," Nathan Phelps, program manager of distributed generation and regulatory policy at solar power advocacy group Vote Solar, said in a Tuesday phone call.

"It's very inconsistent with DPU precedent and numerous pieces of legislation passed in the last 10 years," Phelps said. "The commonwealth has passed several pieces of legislation that are supportive of renewable energy and solar power. I don't know what the DPU was thinking."

 

TIME-OF-USE PRICING ELIMINATED

It does not matter when during the month peak demand occurs -- which could be during the week in the evening -- customers will be charged the same as they would on a hot summer day, LeBel said. Because an individual customer's peak usage does not necessarily correspond to peak demand across the utility's system, consumers are not being provided incentives to reduce energy usage in a way that could benefit the power system, Acadia Center said in a Tuesday statement.

However, Eversource maintains that residential customer distribution peaks based on customer load profiles do not align with basic service peak periods, which are based on Independent System Operator New England's peaks that reflect market-based pricing, even as a Connecticut market overhaul advances in the region, according to the MDPU order.

"The residential Time of Use rates we're eliminating are obsolete, having been designed decades ago when we were responsible for both the generation and the delivery of electricity," Eversource's Durand said.

"We are no longer in the generation business, having divested of our generation assets in Massachusetts in compliance with the law that restructured of our industry back in the late 1990s. Time Varying pricing is best used with generation rates, where the price for electricity changes based on time of day and electricity demand and can significantly alter electric bills for households," he said.

Additionally, only 0.02% of residential customers take service on Eversource's TOU rates and it would be difficult for residential customers to avoid peak period rates because they do not have the ability to shift or reduce load, according to the order.

"The Department allowed the Companies' proposal to eliminate their optional residential TOU rates in order to consolidate and align their residential rates and tariffs to better achieve the rate structure goal of simplicity," the MDPU said in the order.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified