Diablo Canyon nuclear power plant to be shut down

California-Nuclear-Plant-Closure

Closing the plant should be cheaper than operating the facility through 2044 as planned, meaning the utility probably won’t have to increase rates, PG&E; said. PG&E; plans to retrain workers during the plant’s decommissioning process and offer a severance package.

The latest twist writes a beginning of the end of the nuclear plant at Diablo Canyon, whose development in the late 1970s and early 1980s inspired an award-winning motion picture, “The China Syndrome”, and an entrenched collection of anti-nuclear citizens’ action groups in San Luis Obispo County.

Diablo Canyon has been in operation since 1985. That estimate presupposed that the plant would be replaced by natural gas. “In District 4 alone, this closure will affect more than 400 head-of-household jobs”. But the closure isn’t all good news.

Not all environmentalists will be happy to see Diablo Canyon go.

(PG&E;), labor unions and various environmental groups to replace the Diablo Canyon Nuclear Power Plant in California with zero-emissions energy – including wind and solar power – within nine years.

The last reactor there shut three years ago but is becoming an even more acute potential terrorist target than it was when EnviroReporter.com’s 2013 exposé Black Swan SONGS was published, due to plans to place spent nuclear fuel in thin-skinned metal containers in direct site of Pacific waters. The commission meets next week. “This is an absolutely historic agreement”, said Damon Moglen, a senior strategist with the Friends of the Earth, who participated in the negotiations.

CPUC confirmation that PG&E;’s investment in DCPP will be recovered by the time the plant closes in 2025.

Federal regulators had been weighing whether to extend Diablo’s operating life for another 20 years after its initial licenses expire in 2024 and 2025. It also recently doubled energy efficiency goals, and it has championed Community Choice Aggregation, a state policy that enables local governments to aggregate electricity demand within their jurisdictions to procure alternative energy supplies while maintaining services from an existing transmission and distribution provider.

PG&E; will immediately cease any efforts on its part to renew the Diablo Canyon operating licenses and will ask the NRC to suspend consideration of the pending Diablo Canyon license renewal application pending withdrawal with prejudice of the NRC application upon California Public Utilities Commission (CPUC) approval of the Joint Proposal Application. “That’s wrong, of course, and now we have the proof”. “Given the state policies, this is the best decision for us”.

In Japan’s Fukushima Daiichi nuclear power disaster struck after an earth quake when risky levels of radiation flowed out damaged reactors. On Tuesday, members expressed disappointment.

“It lays out an effective roadmap for a nuclear phase-out in the world’s sixth largest economy, while assuring a green energy replacement plan to make California a global leader in fighting climate change”, Picha said. PG&E;’s decision highlights the shift in our nation’s energy landscape – one that is moving more and more toward a clean, renewable energy future.

“We don’t believe we need the full output of Diablo”, Williams said.

Cloud Security – New Report Available “Securing Cloud Services”

cloud securityEly, England, 5 September 2012 – A new book from IT Governance Publishing, the specialist publishing arm of IT Governance, is helping companies protect business information in the Cloud.

Securing Cloud Services: A pragmatic approach to security architecture in the Cloud explains how to establish an appropriate set of controls to manage the risks.

The book’s author, Lee Newcombe, is an experienced enterprise architect currently working at Capgemini, one of the world’s foremost providers of consulting, technology and outsourcing services.

Newcombe says: ‘There are many benefits to Cloud Computing, which include reducing, or even removing, the need to invest in the hardware, software and staff needed to support equivalent on-premise services. However, the flexibility the Cloud brings in IT service deployment, alongside an opaqueness in the delivery of those services, introduces security risks that need to be understood and addressed.’

Alan Calder, Chief Executive of IT Governance, adds: ‘Plenty of material simply states the risks of adopting the Cloud model. Securing Cloud Services, however, not only identifies the risks, but also reveals how to use architectural techniques to derive appropriate ways of managing those risks.’

Securing Cloud Services is aimed at all business decision makers who work with Cloud services, from senior IT stakeholders to enterprise architects and information security professionals.

Securing Cloud Services can be ordered online now, in multiple formats, for £29.95 (usually £39.95) at www.itgovernance.co.uk/products/3896 (UK) or for $39.95 at www.itgovernanceusa.com/product/2571.aspx (US).

– Ends –

FOR FURTHER INFORMATION:
80:20 Communications
+44 (0)20 7664 6310

Susie Lunt
slunt@8020comms.com

Marc Cornelius
mcornelius@8020comms.com

NOTES TO EDITORS:

IT Governance Ltd is the single-source provider for books, tools, training and consultancy for governance, risk management and compliance. The company is a leading authority on data security and IT governance for business and the public sector. IT Governance is ‘non-geek’, approaching IT issues from a non-technology background and talking to management in its own language. The company’s customer base spans Europe, the Americas, the Middle East and Asia. More information is available at:http://www.itgovernance.co.uk.

Lee Newcombe is an enterprise architect with commercial experience at numerous high-profile companies, including Capgemini. He has been writing about, presenting on, and working with Cloud technologies since 2007.

24% of mobile users bank from a phone

With NFC* gathering momentum, the use of modern mobile phones to simplify and add convenience to tasks such as banking and shopping is here to stay, says BullGuard. However, with the majority of mobile users still slow to consider security for a handheld, many could be leaving their financial details vulnerable to third party attack.

A recent survey conducted by BullGuard showed that 24% of internet users banked online from their mobile device, and many also admitted to storing sensitive data such as bank details, credit card numbers, URLs, logins and passwords and saved PIN numbers as reminders. All of this could potentially be exploited by third parties either by a malwareinfection or if the phone were lost or stolen and fell into the wrong hands.

mobile banking

“It appears as though modern mobile users are quick to appreciate the convenience and easy access to services offered from handhelds but slow to recognise the potential threat to smartphones in a time when mobile malware on some platforms has risen by up to 400% in the last six months,” says Claus Villumsen, mobile security expert with BullGuard. “It is concerning that mobile users are storing such sensitive data, but even more concerning is that our survey revealed many consumers seem apathetic about the potential dangers of mobile use at present, ignoring even the most basic security measures,” he continues.

The BullGuard survey revealed that 62% opted against using a basic PIN or password to protect a phone from being instantly accessed by others – a simple yet effective way to deter many thieves or novice hackers. When it comes to more sophisticated protective measures, 53% were unaware that dedicated mobile security is available, 21% believed it isn’t necessary and 42% had not considered using it.

It is clear from the BullGuard survey results that more needs to be done to educate mobile phone users on the risks and potential dangers of storing personal and sensitive data and leaving phones unprotected. 27% of those polled have had their mobile phone lost or stolen in the past and 55% of respondents were still unaware that a phone can contract a virus. Security software is the best preventative measure against third party security threats, argues BullGuard, particularly when considering the prevalence of spyware, which is almost impossible to spot without dedicated software and according to a survey by BullGuard industry partners Juniper Networks, accounted for 61% of all infections in 2010.

“What consumers need to be made aware of is that many mobile threats go undetected,” says Claus Villumsen. “Some attacks are specifically designed to “mine data” from a phone without the user’s knowledge, which could be disastrous if this were to include sensitive information such as financial data or secure documents”.

When it comes to emerging technologies with more direct application such as NFC, consumers are rightly demonstrating more caution, which could be a sign that the security dangers posed by mobile devices will soon be taken more seriously. When quizzed about the new payment standard, 59% were concerned that sensitive data could be intercepted, 64% were concerned about the security of this data in the event of loss or theft and 54% were worried about third parties accessing their bank or credit card details.

The BullGuard survey of 2,000 Brits who are online was carried out by market researchers www.OnePoll.com between 28th April to 9th May 2011.