You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@
4
4
|:--:|
5
5
|*Image generated by Stable Duffision open model SDXL 1.0*|
6
6
7
-
### The tutorials are oriented to power system practitioners. Personas include power system engineers, enterprise architect, data analysts, data scientists, ML engineers, business intelligence analysts.
7
+
### The tutorials are oriented to power system related personas, including but not limited to power system engineer, enterprise architect, energy market analyst, data analyst, data scientist, ML engineer, business intelligence analyst, etc.
8
8
9
9
> **Disclaimer**: the tutorials don't aim to provide any general guidance or CSP-specific best practices to address the cyber security and regulatory compliance concerns for the power industry stakeholders. Instead, it is developed to demonstrate the cloud advantages and readiness for unleashing the unseen values from power system businesses. We are **NOT** suggesting the configurations, permissions and policies shown in the demo cases for your production deployment. For detailed guidance on how to adopt cloud securely and reliably, please refer to the cloud provider's documentation and work with your IT, Cyber Security and Enterprise Architecture teams. You can also read our paper [Practical Adoption of Cloud Computing in Power Systems- Drivers, Challenges, Guidance, and Real-world Use Cases][IEEE-paper] for reference.
0 commit comments