News by Professionals 4 Professionals

facebook

Florida substation goes up in flames

An explosion at the Hebbard Street substation in Florida has left one person injured and various areas without electricity. Power should be fully restored within the next 24 hours. One of the transformers at the substation exploded at about 6.45pm on the evening of 24 April, causing a fire in the transformer bay. This caused a power outage in various areas of Florida, Lea Glen, Robertville, Stormill and Fleurhof. It is believed that one of the security guards who were deployed to guard the substation was also injured. The guard was injured by the impact of the blast and the ensuing flames and smoke. Our thoughts and prayers are with her. It is believed she is recovering well at a medical facility, said the councillor for Ward 70, Caleb Finn.

Also read: Power outage as substation burns[1]

Florida Substation Goes Up In Flames

The damaged transformer. Photos: Supplied

City Power technicians, together with the City of Johannesburg Emergency Medical Services (EMS) were immediately dispatched to the scene, and worked tirelessly to put out the fire, and clean the ash and debris from the electrical components. This allowed them to switch on the second transformer, restoring power to the Florida, Florida North and Florida Glen substations, Finn said. Finn added that extensive damage was done to the Lea Glen cable terminals and other components, requiring the attention of a specialised technician. Unfortunately this will result in a delay in the restoration of the power supply to parts of Fleurhof, Robertville, Stormill and Lea Glen. City Power and CBI (African Cables (contractor)) will work as fast as they can to restore supply to the affected areas., he said.

He added that the incident was unexpected and unfortunate. Transformers can run for years without an issue, but unfortunately, if they cease or explode, the damage is severe, he said.

Florida Substation Goes Up In Flames

Flames shooting into the night sky at the substation. City Power s spokesperson, Virgil James, said that the explosion was caused by a severe fault on the network at the cable termination point. There are circuit breakers along the network to prevent electrical faults from occurring but in this case it was severe enough to bypass the circuit breakers, resulting in the fire. Technicians suspect that this may have happened due to contractors digging in the area and damaging a high voltage cable, he said. He added that, although power has been restored to parts of the affected areas, there are still areas without power. Lea Glen and especially the industrial areas of Robertville, Stormill and parts of Fleurhof are still without power. According to the area manager, they had to call in specialist technicians to undertake the repairs. It is estimated that power should be restored in the next 24 hours, James said.

Florida Substation Goes Up In Flames

After-effects of the explosion.

He urged residents and business owners to be patient as the repairs will take a while to complete, and also apologised for any inconvenience caused. City Power tries to eliminate incidents such as these by undertaking planned power outages to do maintenance and ensure a safe and reliable power supply. However, incidents do occur outside of City Power s control which may severely affect and disrupt power supply, he concluded.

Do you perhaps have more information pertaining to this story? Email us at (remember to include your contact details) or phone us on 011 955 1130.

For free daily local news on the West Rand, also visit our sister newspaper websites

Randfontein Herald[3]

Krugersdorp News[4]

Get It Joburg West Magazine[5]

Remember to visit our Facebook[6], Twitter[7] and Instagram[8] pages to let your voice be heard!

References

  1. ^ Power outage as substation burns (roodepoortrecord.co.za)
  2. ^

Killer of Brooklyn security guard forgiven by victim’s mother

A gunman got sentenced Monday to 76 years to life in prison for callously murdering a hardworking father of six and permanently injuring another man.

He also got something else grace from the heartbroken mother of the man he killed.

I ll forgive you, but I will never forget what you did, Cheryl Locklear, the mother of Aaron Locklear, told killer Antonio Mahon.

Locklear, 30, and trainee James Merced, 28, were taking a lunch break from their job as security guards on Nov. 28, 2014, when Mahon walked passed them on Dumont Ave. in Brownsville. Then Mahon turned around and opened fire.

Killer Of Brooklyn Security Guard Forgiven By Victim's Mother

Cheryl Locklear, mother of murdered Aaron Locklear, forgave her son’s killer.

(Jesse Ward/for New York Daily News)

My son left behind six children, you took them away from him. You took him away from his family. I m praying you seek a Christian life while in prison, but I have forgiven you, Cheryl Locklear said in Brooklyn Supreme Court.

Mahon, 22, admitted he thought Locklear and Merced were his enemies and was on drugs at the time of the shooting. Merced now uses a wheelchair.

I must say this, I never thought in my life as a judge, did I think I d have to impune a sentence like this to anyone, Supreme Court Justice ShawnDya Simpson said before giving Mahon 76 years to life.

Killer Of Brooklyn Security Guard Forgiven By Victim's Mother

Aaron Locklear was shot outside the housing complex where he worked by Antonio Mahon.

(instagram )

Prior to the shooting, Mahon chased after a young man armed with the murder weapon and pointed the same gun at a maintenance worker.

This is a very sad case. It pains my heart. It pains my soul that three young mens lives are ruined, but two really good men s lives are ruined, said Simpson.

Mahon told detectives he always walked around with a gun because he has problems with several gangs, including the HoodStarz, in the neighborhood.

Clayton Gravenhise, 22, a HoodStarz member, was on a revenge-fueled crime spree in 2014 after his brother Nathaniel Gravenhise was killed. Gravenhise suspected Mahon was the killer, sources said.

Tags: gun violence[1] new york murders[2]

New Guidelines: End Frequent Password Changes

The agency that develops information security standards for the U.S. federal government is recommending significant changes to password guidelines, essentially reversing some long-held best practices. Changes to the Digital Identity Guidelines are managed by officials at the National Institute of Standards and Technology[1] (NIST), a division of the U.S. Department of Commerce. While NIST standards are not binding except on federal, non-military agencies the guidelines are frequently looked to by private-sector professionals as best practices for creating security policies for businesses and other organizations.

The full draft report[2] is available at NIST, but in an article[3] for VentureBeat.com, information security expert Slava Gomzin said the new rules call for relying less on frequent password changes and more on encouraging use of longer, irregular passwords.

1. End periodic password changes: It wasn t all that long ago that virtually every organization would prompt users to change their passwords every three months. But there s long been debate about whether such policies do more harm than good, since employees will often try to make those passwords too simple in an effort to make them easier to remember. Other times, users will write them down raising other security issues.

The new guidelines indicate that government experts have come down on the side of deeming frequent password changes as more trouble than they re worth not to mention less secure.

2. Dump rudimentary password complexity restriction: This is aimed at the basketball fan who loves Michael Jordan and regularly uses chicagobulls23 as their favorite password. Security software can impose complexity rules that require every password also have an upper-case letter and a symbol, for instance. But the government research found that changing the above Jordan fan s password to ChicagoBulls23! offers only a slight modicum of additional complexity and could actually provide a false sense of security.

3. Do stringent new password validation: Using this security feature, every password is compared against lists of overused or previously compromised passwords.

Users will be prevented from setting passwords like password, 12345678, etc., which hackers can easily guess, Gomzin wrote in the VentureBeat piece.

In a world of ideal password security, administrators should aim to set validation criteria to require long, random and complicated expressions.

Serious passwords these days are long — think 16 characters or more — and have a pattern that is not likely to be guessed even by the cleverest of tools, according to an article[4] in Computerworld.com.

A truly strong password, that piece suggests, looks something like: j0MxmoNnEUg9JIflizGU.

Send tips and news to .[5]

References

  1. ^ National Institute of Standards and Technology (www.nist.gov)
  2. ^ full draft report (pages.nist.gov)
  3. ^ article (venturebeat.com)
  4. ^ article (www.computerworld.com)
  5. ^