
How PoE Renewable Energy Solutions Support Solar-Powered Charging Stations
The primary obstacles to widespread acceptance of EV technology are higher purchase prices and a lack of charging stations. While vehicle pricing is up to the manufacturers, charging station infrastructure development requires private and public funding. Urban and suburban areas should strive to provide sufficient volume to sustain a viable business model. Rural spaces, such as the plains of Kansas and Nebraska, may lack the volume to justify private investment, necessitating public funds to ensure a comprehensive US network.
Because conventional charging stations draw power from existing utility grids, energy costs and availability may vary. As the American market grows, EVs will demand more energy, which could overload the local grid, especially in areas with aging infrastructure. In less populated regions, drawing power from local grids may be difficult and possibly cost-prohibitive. Combining solar power with Power over Ethernet (PoE) renewable energy technology is an effective way to drive the development of self-powered charging stations nationwide.
PoE technology enables the transmission of both electrical power and data over a single Ethernet cable. Sending power and data over one wire eliminates the need for a separate power supply for PoE-enabled devices. The Institute of Electrical and Electronics Engineers (IEEE) Electrical and Electronics Engineers (IEEE) working groups develop standards that ensure compatibility among PoE devices. The following standards have been released: IEEE 802.3af supports up to 15.4 watts of power output.
supports up to 15.4 watts of power output. IEEE 802.3at defines power outputs up to 30 watts.
defines power outputs up to 30 watts. IEEE 802.3bt Type 3 supports up to 60 watts of power.
Type 3 supports up to 60 watts of power. IEEE 802.3bt Type 4 has a maximum power output of 100 watts.
The IEEE continues to work on standards to support more power and data.
A Renewable Power Managed Ethernet Switch, such as Planet's BSP-360 switch, connects to a renewable energy source, a storage battery, and a charging station. The switch receives DC current, ranging from 24V to 45V, from energy sources such as solar panels. Any energy gathered by these sources can be used to power the managed PoE switch or be stored in a lithium or lead-acid battery. The PoE switch can then power any PoE-enabled device, eliminating the need for an additional power source. By leveraging PoE-enabled renewable energy solutions, Kansas can utilize its, on average, 230 sunny days to great use, powering charging stations across the Great Plains.
Commercial EV charging stations typically offer two charging levels: Level 1 adds a range of approximately four to five miles per hour of charging using a 120-volt outlet.
adds a range of approximately four to five miles per hour of charging using a 120-volt outlet. Level 2 adds a range of approximately ten to twenty miles per hour of charging using a 240-volt outlet.
A third option is available for DC fast charging. It requires a commercial-grade power supply of 480 volts or higher with dedicated circuits. The charging rates at each station determine the power capacity needed from the PoE power source. The IECC's 2024 EV standards outline charging infrastructure specifications, including load and capacity requirements.
In addition to power requirements, US charging stations must consider the following standards and regulations: The National Electrical Code outlines design and inspection requirements to ensure compliance with safety standards.
Open Charge Point Protocol (OCPP) is a negotiating protocol between EV applications and charging stations. First published in 2009, OCPP's latest release (2.0.1) incorporates changes to simplify transactions. For many implementations, OCPP certification is becoming a requirement.
ISO 15118defines a plug-and-charge protocol standard that requires drivers to set up a purchasing profile. When drivers plug the car into a charging station, payment is transmitted using pre-existing profiles.
Section 508 of the Rehabilitation Act defines accessibility requirements for users with disabilities. It stipulates the requirements for spacing between charging stations to allow for wheelchair access. Charging stations must provide accessible communication methods through user interfaces and voice activation. Stations must display clear signage to ensure safe ingress and egress.
EV standards are continually evolving, and new requirements are being released as the industry matures.
In addition to these nationwide requirements, every local jurisdiction has its own set of building and business codes that charging stations must comply with. For example, charging stations in residential areas may be required to construct fences or barriers to prevent headlights from shining into homes. There may be restrictions on the number of parking spaces in specific locations, and construction should also consider size requirements to ensure compliance with Section 508.
Building codes may require that only licensed electricians install charging stations and oversee connections to utility grids. There may also be zoning constraints or signage guidelines. Before investing in EV charging stations, check with local authorities to avoid any unexpected obstacles.
If local utilities are publicly owned, coordinating deployment will be part of these entities' approval processes. If the electrical company is privately operated, be sure to discuss directly with them to understand how to add charging stations to their grid. The company will want to assess the impact on its existing grid and determine if infrastructure upgrades are needed.
Interest in electric cars began in the early 19th century; however, sustained interest by the buying public didn't emerge until the 21st century. As of March 2025, the United States had over 204,600 charging outlets, with 51,200 located in California. According to the US Department of Energy, by 2030, the United States will need 28 million EV charging ports distributed across the country.
Most charging stations will be located at single-family homes and workplaces. However, public charging stations will be necessary in areas such as multi-family buildings, hotels, and shopping centers. A network of fast-charging stations will be crucial for long-distance travel.
Planet's PoE renewable switch and cellular gateways are designed to facilitate the growth of sustainable charging stations. These products enable the placement of self-powered charging stations where they are needed most. Contact us for more information on PoE solutions.
TIME BUSINESS NEWS
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Boston Globe
an hour ago
- Boston Globe
Trump criticized the idea of presidential vacations. His Scotland trip is built around golf.
The White House isn't calling Trump's five-day, midsummer jaunt a vacation, but rather a working trip where the Republican president might hold a news conference and sit for interviews with U.S. and British media outlets. Trump was also talking trade in separate meetings with European Commission chief Ursula von der Leyen and British Prime Minister Keir Starmer. Trump is staying at his properties near Turnberry and Aberdeen, where his family owns two golf courses and is opening a third on Aug. 13. Trump played golf over the weekend at Turnberry and is helping cut the ribbon on the new course on Tuesday. Advertisement He's not the first president to play in Scotland: Dwight D. Eisenhower played at Turnberry in 1959, more than a half century before Trump bought it, after meeting with French President Charles de Gaulle in Paris. But none of Trump's predecessors has constructed a foreign itinerary around promoting vacation sites his family owns and is actively expanding. Advertisement It lays bare how Trump has leveraged his second term to pad his family's profits in a variety of ways, including overseas development deals and promoting cryptocurrencies, despite growing questions about ethics concerns. 'You have to look at this as yet another attempt by Donald Trump to monetize his presidency,' said Leonard Steinhorn, who teaches political communication and courses on American culture and the modern presidency at American University. 'In this case, using the trip as a PR opportunity to promote his golf courses.' A parade of golf carts and security accompanied President Trump at Turnberry, on the Scottish coast southwest of Glasgow, on Sunday. Christopher Furlong/Getty President Trump on the links. Christopher Furlong/Getty Presidents typically vacation in the US Franklin D. Roosevelt went to the Bahamas, often for the excellent fishing, five times between 1933 and 1940. He visited Canada's Campobello Island in New Brunswick, where he had vacationed as a child, in 1933, 1936 and 1939. Reagan spent Easter 1982 on vacation in Barbados after meeting with Caribbean leaders and warning of a Marxist threat that could spread throughout the region from nearby Grenada. Presidents also never fully go on vacation. They travel with a large entourage of aides, receive intelligence briefings, take calls and otherwise work away from Washington. Kicking back in the United States, though, has long been the norm. Harry S. Truman helped make Key West, Florida, a tourist hot spot with his 'Little White House' cottage there. Several presidents, including James Buchanan and Benjamin Harrison, visited the Victorian architecture in Cape May, New Jersey. More recently, Bill Clinton and Barack Obama boosted tourism on Massachusetts' Martha's Vineyard, while Trump has buoyed Palm Beach, Florida, with frequent trips to his Mar-a-Lago estate. But any tourist lift Trump gets from his Scottish visit is likely to most benefit his family. 'Every president is forced to weigh politics versus fun on vacation,' said Jeffrey Engel, David Gergen Director of the Center for Presidential History at Southern Methodist University in Dallas, who added that Trump is 'demonstrating his priorities.' Advertisement 'When he thinks about how he wants to spend his free time, A., playing golf, B., visiting places where he has investments and C., enhancing those investments, that was not the priority for previous presidents, but it is his vacation time,' Engel said. It's even a departure from Trump's first term, when he found ways to squeeze in visits to his properties while on trips more focused on work. Trump stopped at his resort in Hawaii to thank staff members after visiting the memorial site at Pearl Harbor and before embarking on an Asia trip in November 2017. He played golf at Turnberry in 2018 before meeting with Russian President Vladimir Putin in Finland. Trump once decried the idea of taking vacations as president. 'Don't take vacations. What's the point? If you're not enjoying your work, you're in the wrong job,' Trump wrote in his 2004 book, 'Think Like a Billionaire.' During his presidential campaign in 2015, he pledged to 'rarely leave the White House.' Even as recently as a speech at a summit on artificial intelligence in Washington on Wednesday, Trump derided his predecessor for flying long distances for golf — something he's now doing. 'They talked about the carbon footprint and then Obama hops onto a 747, Air Force One, and flies to Hawaii to play a round of golf and comes back,' he said. On the green... Christopher Furlong/Getty ... and in the sand. Christopher Furlong/Getty Presidential vacations and any overseas trips were once taboo Trump isn't the first president not wanting to publicize taking time off. George Washington was criticized for embarking on a New England tour to promote the presidency. Some took issue with his successor, John Adams, for leaving the then-capital of Philadelphia in 1797 for a long visit to his family's farm in Quincy, Massachusetts. James Madison left Washington for months after the War of 1812. Advertisement Teddy Roosevelt helped pioneer the modern presidential vacation in 1902 by chartering a special train and directing key staffers to rent houses near Sagamore Hill, his home in Oyster Bay, New York, according to the White House Historical Association. Four years later, Roosevelt upended tradition again, this time by becoming the first president to leave the country while in office. The New York Times noted that Roosevelt's 30-day trip by yacht and battleship to tour construction of the Panama Canal 'will violate the traditions of the United States for 117 years by taking its President outside the jurisdiction of the Government at Washington.' In the decades since, where presidents opted to vacation, even outside the U.S., has become part of their political personas. In addition to New Jersey, Grant relaxed on Martha's Vineyard. Calvin Coolidge spent the 1928 Christmas holidays at Sapelo Island, Georgia. Lyndon B. Johnson had his 'Texas White House,' a Hill Country ranch. Eisenhower vacationed in Newport, Rhode Island. John F. Kennedy went to Palm Springs, California, and his family's compound in Hyannis Port, Massachusetts, among other places. Richard Nixon had the 'Southern White House' on Key Biscayne, Florida, while Joe Biden traveled frequently to Rehoboth Beach, Delaware, while also visiting Nantucket, Massachusetts, and St. Croix in the U.S. Virgin Islands. George H.W. Bush was a frequent visitor to his family's property in Kennebunkport, Maine, and didn't let the start of the Gulf War in 1991 detour him from a monthlong vacation there. His son, George W. Bush, opted for his ranch in Crawford, Texas, rather than a more posh destination. Advertisement Presidential visits help tourism in some places more than others, but Engel said that for some Americans, 'if the president of the Untied States goes some place, you want to go to the same place.' He noted that visitors emulating presidential vacations are out 'to show that you're either as cool as he or she, that you understand the same values as he or she or, heck, maybe you'll bump into he or she.'
Yahoo
2 hours ago
- Yahoo
Why Morgan Stanley Thinks Alphabet's (GOOGL) Innovation Cycle Isn't Priced In Yet
Alphabet Inc. (NASDAQ:GOOGL) is one of the . On July 24, Morgan Stanley reiterated the stock as 'Overweight' and raised its price target to $210 per share from $205 following Alphabet's latest earnings report on Wednesday. Analyst Brian Nowak is optimistic about Google's accelerating cloud revenue growth and its updated AI-based engagement metrics. 'Search, YouTube and Google Cloud all accelerated as GenAI-enabled innovation is driving faster growth,' he wrote in a Thursday note to clients. 'Our EPS ests are largely unchanged (revenue higher offset by higher D & A/investment) but we remain OW as this accelerated pace of innovation sets up GOOGL for more durable multi-year growth.' A business person pointing to a graph displaying a company's projected EBITDA growth. Alphabet Inc. (NASDAQ:GOOGL) is an American multinational technology conglomerate holding company wholly owning the internet giant Google, amongst other businesses. While we acknowledge the potential of GOOGL as an investment, we believe certain AI stocks offer greater upside potential and carry less downside risk. If you're looking for an extremely undervalued AI stock that also stands to benefit significantly from Trump-era tariffs and the onshoring trend, see our free report on the best short-term AI stock. READ NEXT: and . Disclosure: None. Sign in to access your portfolio


CNBC
2 hours ago
- CNBC
'Quishing' scams dupe millions of Americans as cybercriminals turn the QR code bad
QR codes were once a quirky novelty that prompted a fun scan with the phone. Early on, you might have seen a QR code on a museum exhibit and scanned it to learn more about the eating habits of the woolly mammoth or military strategies of Genghis Khan. During the pandemic, QR codes became the default restaurant menu. However, as QR codes became a mainstay in more urgent aspects of American life, from boarding passes to parking payments, hackers have exploited their ubiquity. "As with many technological advances that start with good intentions, QR codes have increasingly become targets for malicious use. Because they are everywhere — from gas pumps and yard signs to television commercials — they're simultaneously useful and dangerous," said Dustin Brewer, senior director of proactive cybersecurity services at BlueVoyant. Brewer says that attackers exploit these seemingly harmless symbols to trick people into visiting malicious websites or unknowingly share private information, a scam that has become known as "quishing." The increasing prevalence of QR code scams prompted a warning from the Federal Trade Commission earlier this year about unwanted or unexpected packages showing up with a QR code that when scanned "could take you to a phishing website that steals your personal information, like credit card numbers or usernames and passwords. It could also download malware onto your phone and give hackers access to your device." State and local advisories this summer have reached across the U.S., with the New York Department of Transportation and Hawaii Electric warning customers about avoiding QR code scams. The appeal to cybercriminals lies in the relative ease with which the scam operates: slap a fake QR code sticker on a parking meter or a utility bill payment warning and rely on urgency to do the rest. "The crooks are relying on you being in a hurry and you needing to do something," said Gaurav Sharma, a professor in the department of electrical and computer engineering at the University of Rochester. Sharma expects QR scams to increase as the use of QR codes spreads. Another reason QR codes have increased in popularity with scammers is that more safeguards have been put into place to tamp down on traditional email phishing campaigns. A study this year from cybersecurity platform KeepNet Labs found that 26 percent of all malicious links are now sent via QR code. According to cybersecurity company, NordVPN, 73% of Americans scan QR codes without verification, and more than 26 million have already been directed to malicious sites. "The cat and mouse game of security will continue and that people will figure out solutions and the crooks will either figure out a way around or look at other places where the grass is greener," Sharma said. Sharma is working to develop a "smart" QR code called a SDMQR (Self-Authenticating Dual-Modulated QR) that has built-in security to prevent scams. But first, he needs buy-in from Google and Microsoft, the companies that build the cameras and control the camera infrastructure. Companies putting their logos into QR codes isn't a fix because it can cause a false sense of security, and that criminals can usually simply copy the logos, he said. Some Americans are wary of the increasing reliance on QR codes. "I'm in my 60s and don't like using QR codes," said Denise Joyal of Cedar Rapids, Iowa. "I definitely worry about security issues. I really don't like it when one is forced to use a QR code to participate in a promotion with no other way to connect. I don't use them for entertainment-type information." Institutions are also trying to fortify their QR codes against intrusion. Natalie Piggush, spokeswoman for the Children's Museum of Indianapolis, which welcomes over one million visitors a year, said their IT staff began upgrading their QR codes a couple of years ago to protect against what has become an increasingly significant threat. "At the museum, we use stylized QR codes with our logo and colors as opposed to the standard monochrome codes. We also detail what users can expect to see when scanning one of our QR codes, and we regularly inspect our existing QR codes for tampering or for out-of-place codes," Piggush said. Museums are usually less vulnerable than places like train stations or parking lots because scammers are looking to collect cash from people expecting to pay for something. A patron at a museum is less likely to expect to pay, although Sharma said even in those settings, fake QR codes can be deployed to install malware on someone's phone. QR code scams are likely to hit both Apple and Android devices, but iPhone users may be slightly more likely to fall victim to the crime, according to a study completed earlier this year by Malwarebytes. Users of iPhones expressed more trust in their devices than Android owners and that, researchers say, could cause them to let down their guard. For example, 70% of iPhone users have scanned a QR code to begin or complete a purchase versus 63% of Android users who have done the same. Malwarebytes researcher David Ruiz wrote that trust could have an adverse effect, in that iPhone users do not feel the need to change their behavior when making online purchases, and they have less interest in (or may simply not know about) using additional cybersecurity measures, like antivirus. Fifty-five percent of iPhone users trust their device to keep them safe, versus 50 percent of Android users expressing the same sentiment. A QR code is more dangerous than a traditional phishing email because users typically can't read or verify the encoded web address. Even though QR codes normally include human-readable text, attackers can modify this text to deceive users into trusting the link and the website it directs to. The best defense against them is to not scan unwanted or unexpected QR codes and look for ones that display the URL address when you scan it. Brewer says cybercriminals have also been leveraging QR codes to infiltrate critical networks. "There are also credible reports that nation-state intelligence agencies have used QR codes to compromise messaging accounts of military personnel, sometimes using software like Signal that is also open to consumers," Brewer said. Nation-state attackers have even used QR codes to distribute remote access trojans (RATs) — a type of malware designed to operate without a device owner's consent or knowledge — enabling hackers to gain full access to targeted devices and networks. Still, one of the most dangerous aspects of QR codes is how they are part of the fabric of everyday life, a cyberthreat hiding in plain sight. "What's especially concerning is that legitimate flyers, posters, billboards, or official documents can be easily compromised. Attackers can simply print their own QR code and paste it physically or digitally over a genuine one, making it nearly impossible for the average user to detect the deception," Brewer said. Rob Lee, chief of research, AI, and emerging threats at the cybersecurity training focused SANS Institute, says that QR code compromise is just another tactic in a long line of similar strategies in the cybercriminal playbook. "QR codes weren't built with security in mind, they were built to make life easier, which also makes them perfect for scammers," Lee said. "We've seen this playbook before with phishing emails; now it just comes with a smiley pixelated square. It's not panic-worthy yet, but it's exactly the kind of low-effort, high-return tactic attackers love to scale."