search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Keeping an Eye on


issued under California’s Low Carbon Fuel Standard program. Those credits also bring down the cost of renewable diesel. During his session in North Carolina, Pritchard ad-


dressed concerns around electrification costs by using “funding braiding,” a neutral cost model that knits together various funding sources. “The most recent news related to tariffs may also


cause pricing challenges for certain manufacturers who are working hard to keep their pricing com- petitive,” added Zenobe’s Clancy. “However, federal programs like the EPA’s Clean School Bus program are just one source of funding, and there are many local, state and regional funding sources that our grant team has successfully supported on behalf of districts and transportation contractors.” Since fleet electrification can be a five to 15-year


process, Pritchard advised STN EXPO attendees to work closely and communicate with their vendor partners— and contractors, if applicable—on funding options.


Planning for the Future Maintaining a big-picture perspective was a com-


mon theme when discussing how transportation operations can effectively plan purchasing decisions, even in uncertain times.


Fleet Security While purchasing security is currently at question, fleet and infrastructure security concerns continue. With many reported cases of school buses being targeted for parts or materials, it is important for trans- portation operations to have security measures in place to protect their school buses. Tim Shannon said he experienced cases of catalytic


converters being stolen from Twin River Unified School District buses in California that were going to be used as scrappage to obtain funds for electric buses. It cost the district a significant amount of money to replace those buses so they could meet the funding requirement. He also noted a case of vandals breaking into buses and emptying fire extinguishers inside. That rang up a $200,000 cleaning bill. He said that cameras and motion detectors are generally the methods used to help prevent similar issues. Engineering consultant Ewan Pritchard said he is


aware of cases of cut or stolen charging cables. It’s im- portant to have a general awareness of “realistic threats rather than posing hypothetical threats,” he added. Director of Transportation Mike Bullman said the South Carolina Department of Education requires a high level of physical security, with lighting and fenc- es. “We feel that the security measures we currently have in place will support all the various fuel plat- forms,” he added.


Cybersecurity Considerations “Much like many organizations are working to con-


trol physical access to computers, all organizations are working to limit physical access to interfaces. Think of this like in Star Wars, where R2D2 was able to just plug in locally to the Death Star,” Pritchard explained. “Organizations today work to limit access to comput- ers by turning off access to USB ports so people can’t steal information or put malicious software on with a USB drive. Similarly, vehicle manufacturers and [Elec- tric Vehicle Service Equipment] manufacturers are limiting this physical access. Remote communications are now also encrypted end-to-end with more sophis- ticated authentication.” Shannon noted that as during his time at Twin


An InCharge Energy charger in operation for an on-going pilot project at an undisclosed school district.


Rivers, the IT department handled cybersecurity concerns. Since the charging infrastructure had a cellular connection as opposed to Wi-Fi, he said a cyber-attack was less of a concern. InCharge Energy stated that it achieved SOC 2 se- curity and is also OCPP 2.0.1-compliant, meaning there are features such as “secure firmware updates, cer- tificate-based authentication, encryption, and secure communication protocol.” It is also audited annually for security of IT networks and software solutions.


www.stnonline.com 39


PHOTO COURTESY OF INCHARGE ENERGY


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60