|By PR Newswire||
|February 28, 2014 10:30 AM EST||
MORRISTOWN, N.J., Feb. 28, 2014 /PRNewswire/ -- Jersey Central Power & Light (JCP&L) will be using helicopter patrols beginning March 3, 2014, to conduct transmission line inspections throughout its northern and central New Jersey service areas.
"Completing these routine inspections via helicopter is an effective way to assure our high voltage system remains reliable," said Anthony Hurley, vice president, Operations, JCP&L. "The helicopter can provide workers with a clear view of our overhead equipment far more quickly and easily than workers on the ground using trucks and aerial devices."
JCP&L's transmission lines are patrolled at least twice each year. The patrols typically take 12 – 15 days to complete, depending on weather and other conditions and scheduling requirements. Local law enforcement agencies will be notified before the helicopter inspections take place.
During the inspection process, helicopters will hover low in areas near substations and transmission lines. When an issue is identified, a notification, along with a photograph, is forwarded to the appropriate operations area so the repair can be made.
The aerial transmission line patrols are part of JCP&L's $251 million investment in 2014 to expand and strengthen its infrastructure to enhance reliability of service.
JCP&L is a subsidiary of FirstEnergy Corp. (NYSE: FE). JCP&L serves 1.1 million New Jersey customers in the counties of Burlington, Essex, Hunterdon, Mercer, Middlesex, Monmouth, Morris, Ocean, Passaic, Somerset, Sussex, Union and Warren. Follow JCP&L on Twitter @JCP_L, on Facebook at www.facebook.com/JCPandL, or online at www.jcp-l.com.
Forward-Looking Statements: This news release includes forward-looking statements based on information currently available to management. Such statements are subject to certain risks and uncertainties. These statements include declarations regarding management's intents, beliefs and current expectations. These statements typically contain, but are not limited to, the terms "anticipate," "potential," "expect," "will," "intend," "believe," "estimate" and similar words. Forward-looking statements involve estimates, assumptions, known and unknown risks, uncertainties and other factors that may cause actual results, performance or achievements to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. Actual results may differ materially due to the speed and nature of increased competition in the electric utility industry, in general, and the retail sales market in particular; the ability to experience growth in the Regulated Distribution and Regulated Transmission segments and to continue to successfully implement our direct retail sales strategy in the Competitive Energy Services segment; the accomplishment of our regulatory and operational goals in connection with our transmission plan and planned distribution rate cases and the effectiveness of our repositioning strategy; the impact of the regulatory process on the pending matters before the Federal Energy Regulatory Commission and in the various states in which we do business including, but not limited to, matters related to rates and pending rate cases or the West Virginia Citizen Action Group's pending appeal of the Generation Resource Transaction; the uncertainties of various cost recovery and cost allocation issues resulting from American Transmission Systems, Incorporated's realignment into PJM Interconnection LLC; economic or weather conditions affecting future sales and margins such as the polar vortex or other significant weather events; regulatory outcomes associated with storm restoration, including but not limited to, Hurricane Sandy, Hurricane Irene and the October snowstorm of 2011; changing energy, capacity and commodity market prices including, but not limited to, coal, natural gas and oil, and availability and their impact on retail margins; the continued ability of our regulated utilities to recover their costs; costs being higher than anticipated and the success of our policies to control costs and to mitigate low energy, capacity and market prices; other legislative and regulatory changes, and revised environmental requirements, including possible greenhouse gas emission, water discharge, water intake and coal combustion residual regulations, the potential impacts of Cross-State Air Pollution Rule, Clean Air Interstate Rule (CAIR), and/or any laws, rules or regulations that ultimately replace CAIR, and the effects of the United States Environmental Protection Agency's Mercury and Air Toxics Standards rules including our estimated costs of compliance; the uncertainty of the timing and amounts of the capital expenditures that may arise in connection with any litigation, including New Source Review litigation or potential regulatory initiatives or rulemakings (including that such expenditures could result in our decision to deactivate or idle certain generating units); the uncertainties associated with the deactivation of certain older regulated and competitive fossil units including the impact on vendor commitments, and the timing thereof as they relate to, among other things, Reliability Must-Run arrangements and the reliability of the transmission grid; adverse regulatory or legal decisions and outcomes with respect to our nuclear operations (including, but not limited to the revocation or non-renewal of necessary licenses, approvals or operating permits by the Nuclear Regulatory Commission or as a result of the incident at Japan's Fukushima Daiichi Nuclear Plant); issues arising from the indications of cracking in the shield building and steam generator replacement at Davis-Besse; the impact of future changes to the operational status or availability of our generating units; the risks and uncertainties associated with litigation, arbitration, mediation and like proceedings, including, but not limited to, any such proceedings related to vendor commitments; replacement power costs being higher than anticipated or not fully hedged; the ability to comply with applicable state and federal reliability standards and energy efficiency and peak demand reduction mandates; changes in customers' demand for power, including but not limited to, changes resulting from the implementation of state and federal energy efficiency and peak demand reduction mandates; the ability to accomplish or realize anticipated benefits from strategic and financial goals including, but not limited to, the ability to reduce costs and to successfully complete our announced financial plans designed to improve our credit metrics and strengthen our balance sheet, including but not limited to, the benefits from our announced dividend reduction and our proposed capital raising and debt reduction initiatives; our ability to improve electric commodity margins and the impact of, among other factors, the increased cost of fuel and fuel transportation on such margins; changing market conditions that could affect the measurement of certain liabilities and the value of assets held in our Nuclear Decommissioning Trusts, pension trusts and other trust funds, and cause us and our subsidiaries to make additional contributions sooner, or in amounts that are larger than currently anticipated; the impact of changes to material accounting policies; the ability to access the public securities and other capital and credit markets in accordance with our announced financial plans, the cost of such capital and overall condition of the capital and credit markets affecting us and our subsidiaries; actions that may be taken by credit rating agencies that could negatively affect us and our subsidiaries' access to financing, increase the costs thereof, and increase requirements to post additional collateral to support outstanding commodity positions, letters of credit and other financial guarantees; changes in national and regional economic conditions affecting us, our subsidiaries and our major industrial and commercial customers, and other counterparties including fuel suppliers, with which we do business; the impact of any changes in tax laws or regulations or adverse tax audit results or rulings; issues concerning the stability of domestic and foreign financial institutions and counterparties with which we do business; the risks and other factors discussed from time to time in our United States Securities and Exchange Commission filings, and other similar factors. The foregoing review of factors should not be construed as exhaustive. New factors emerge from time to time, and it is not possible for management to predict all such factors, nor assess the impact of any such factor on FirstEnergy's business or the extent to which any factor, or combination of factors, may cause results to differ materially from those contained in any forward-looking statements. FirstEnergy expressly disclaims any current intention to update, except as required by law, any forward-looking statements contained herein as a result of new information, future events or otherwise.
SOURCE FirstEnergy Corp.
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
Jul. 29, 2015 05:30 PM EDT
"We specialize in testing. DevOps is all about continuous delivery and accelerating the delivery pipeline and there is no continuous delivery without testing," noted Marc Hornbeek, Sr. Solutions Architect at Spirent Communications, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 29, 2015 05:15 PM EDT Reads: 360
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at @DevOpsSummit, Haseeb Budhani, CEO and Co-founder of Soha, shared five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the friction an...
Jul. 29, 2015 04:30 PM EDT Reads: 497
"Alert Logic is a managed security service provider that basically deploys technologies, but we support those technologies with the people and process behind it," stated Stephen Coty, Chief Security Evangelist at Alert Logic, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 29, 2015 04:15 PM EDT Reads: 321
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
Jul. 29, 2015 04:00 PM EDT Reads: 1,066
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to tran...
Jul. 29, 2015 03:15 PM EDT Reads: 368
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.
Jul. 29, 2015 03:15 PM EDT Reads: 237
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Jul. 29, 2015 03:00 PM EDT Reads: 466
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of pro...
Jul. 29, 2015 03:00 PM EDT Reads: 1,254
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
Jul. 29, 2015 02:30 PM EDT
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
Jul. 29, 2015 02:30 PM EDT Reads: 321
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect t...
Jul. 29, 2015 02:00 PM EDT Reads: 1,167
"Our biggest growth area has been the security services, the managed services - the things that differentiate us in the market that there is no client that's too small and there's no client that's too big," explained Paul Mazzucco, Chief Security Officer at TierPoint, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 29, 2015 02:00 PM EDT Reads: 372
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Jul. 29, 2015 01:45 PM EDT Reads: 422
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Jul. 29, 2015 01:00 PM EDT Reads: 1,059