A Strategic Assessment of Flow Batteries

As renewable energy resources continue to gain market share, Battery Energy Storage Systems (BESS) are increasingly being used to support use-cases such as renewables firming, peak management, ancillary services, energy and carbon arbitrage, storage as a transmission asset,...

Navigating Regulatory Shifts- NERC's Inverter Based Resource Standards

As the energy landscape undergoes a significant transformation with the growing integration of renewable energy sources, regulatory frameworks are evolving to address new challenges and opportunities. The North American Electric Reliability Corporation (NERC) has introduced...

TransActions 2024 Issue Q1/Q2

Download PDF

The Increasing Challenges in Load Forecasting

The load forecast, or for the old hands among us, the power requirements study, is a useful planning tool, undergirding efforts such as budgeting, integrated resource planning, and energy efficiency/demand response market potential studies. As I like to say about a load...

IGSAs - a new option in utility service on military installations

GDS ASSOCIATES EARNS 2024 ENERGY STAR® SUSTAINED EXCELLENCE AWARD

Marietta, GA (March 27, 2024) — GDS Associates, Inc is proud to announce that it has received the 2024 ENERGY STAR Partner of the Year – Sustained Excellence Award from the U.S. Environmental Protection Agency. Awarded in the Energy Rating Company category, this honor is...

Transactions 2023 Issue Q4

Electric Vehicles: Forecasting, Grid Impacts & Proactive Planning

Developing On Call Energy & Capacity Security - Part 3

JOINT PROJECT OWNERSHIP As provided in Part 1 and Part 2 of this three-part series, there are industry proven power project development and asset management processes which can be utilized to effectively develop, own, and manage a natural gas fired generation resource. The...

Phishing & Smishing Campaigns: Steps to Protect Your Personal Info

Phishing and Smishing campaigns are becoming more advanced with the introduction of AI language models such as ChatGPT. This allows an attacker to create a more fluid and less suspicious emails that are harder to identify.