Common Mistakes in Bridge Construction

Common Mistakes in Bridge Construction

The best way to avoid bridge failures is to expect them to happen and develop a good risk management strategy. Don’t just wait to cross that bridge when you get there. This is the only way to protect the public from injuries, loss of life, property damage and destruction. Some bridge collapses are mysteries when they first happen. It isn’t until a detailed investigation is completed that the true cause is revealed.

I am going to list a few common mistakes in bridge construction:

1. Poor Bridge Maintenance: The collapsing of bridges could be prevented with more strict inspections and frequent routine maintenance. Rusted parts must be replaced, drainage areas cleared in case of natural disasters and reinforcements added especially when the use of the bridge has increased. The Connecticut Turnpike over the Mianus River collapsed due to the failure of steel pins that had corroded. I can not believe the lack of bridge maintenance! Can’t get over it.

2. Cheap Materials: A bridge is only as strong as what it’s built with. No one likes to spend money, but excessive cost-cutting can leave the bridge vulnerable to collapses. Not only is the bridge put in a more precarious situation, but saving money on materials can also lead to more costly repairs down the line.

3. Design Defect: While some bridges are constructed perfectly with high-end materials, they can still fail if the design is flawed. Bridges with a poor design could fail to hold enough weight or withstand natural conditions. There are bridges whose collapse was unpreventable before the bridge was ever built.

4. Natural Disasters: Today’s changing climate and the extreme weather events associated with it is causing chaotic weather. Most collapses happen on bridges that were built a long time ago when designers couldn’t imagine the kind of storms they’d have to withstand today. We can’t control the weather, but we can build structures strong enough to withstand such natural disasters. There is always room for improvement.

5. Accidents: Whether it’s a truck hitting a support post, a train falling off the tracks or a boat colliding into a foundation, accidents are one of the leading reasons bridges are damaged or come down. Bridge engineers must plan for all types of incidents. They will have to also bear in mind what the future holds for us. Will there be driverless cars, larger ocean tankers, and cruise ships, along with pilotless drones that could impact bridges in the near and distant future? I think it’s possible, most of it is already happening.

I am definitely no expert in any of these aspects, but keep these failures in mind next time you sitting in your car under a train bridge and the robot for you to go is red.

Sources:
Wikipedia
Civil Digital
Asset Works
Engineers Journal


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Articles, please visit our Leads 2 Business Blog.

About Sonet van Wygaard

I started working at Leads 2 Business in 2014. I was part of the Tenders Africa team and have now recently moved to Private Projects. I love every second of it!

How To: Transfer/Copy Monitor Projects & Tenders

Do you need to Manage your Monitor’s Projects and Tenders? Transfer or Copy leads from one Monitor to another Monitor.
– here’s a quick video tutorial from “The How To Series”.

(Duration 1m17s)


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more How To Video’s, please visit our Leads 2 Business Blog.

About Sasha Anderson

Millennial Mom + wife living the hash-tag life. Remember: If You Fail - Fail Forward

Featured Tender: Supply of Professional and Accredited Laboratory Services

Featured Tender: Supply of Professional and Accredited Laboratory Services

Contract Number:

NC065/T14/2019 – Hantam Local Municipality

Description:

Tenders are invited for the Supply of Professional and Accredited Laboratory Services to Hantam Municipality for the Analysis of Water and Waste Water for a period of 36 months.

Category Industry
Consultants Water
Region Site Inspection
Northern Cape (027) No Details
Closing Date Contract Period
08 August 2019 at 12:00 36 months

 


Please visit Leads 2 Business for more information on this Tender Notice.
If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
For assistance on how to use our website, please visit Leads 2 Business Wiki.
To view more Featured Tenders, please visit our Leads 2 Business Blog.

About Antonette Claassens

I am a fanatical researcher who takes immense pride in the information I publish and those all-important finer details. When I'm not "researching up a storm", I love the ocean, fab music, and fine dining.

How to Secure your Server like a Pro

posted in: General, Safety 0

 

In today’s fast-paced connected environment having a secure server is vital for your business’s needs, without addressing the security needs of your infrastructure you could run into devastating consequences down the line.

In this blog, I will list 5 security practices that can help your server stay secure.

1. Password Security: Use passwords with at least 8 characters, they should be complex including numbers, symbols and punctuation. You should use a variety of passwords for different accounts or roles.

2. Public Key Infrastructure and SSL/TLS Encryption: This refers to a system that is designed to create, manage and validate certificates for identifying individuals and encrypting communication. This can prevent man in the middle attacks where an attacker imitates a server in your infrastructure to intercept traffic.

3. Update your system frequently: Keeping your software up to date is the single biggest security precaution you can take for any operating system. Software updates range from critical vulnerability patches to minor bug fixes, and many software vulnerabilities are actually patched by the time they become public.

4. Configure a Firewall: Using a firewall to block unwanted traffic to your server provides a highly effective security layer. Be very specific about the type of traffic you allow in, only allow the traffic you need and deny everything else.

5. Web Application Security: You should scan your web applications regularly and have any custom code reviewed for security issues. Make sure to use coding frameworks with a good security history and secure web application admin areas with IP based restrictions. Specify permissions when creating files and limit file upload creation activities to specific directories.

Following these 5 tips will help you secure your server like a pro.


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Articles, please visit our Leads 2 Business Blog.

About Barry West

I am a software developer.

How To: Add & Remove Monitors

Do you need to Add and Remove Monitors from your Leads 2 Business Profile?
– here’s a quick video tutorial from “The How To Series”.

(Duration 1 min, 27 sec)


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Events, please visit our Leads 2 Business Blog.

About Sasha Anderson

Millennial Mom + wife living the hash-tag life. Remember: If You Fail - Fail Forward

Featured Company: EasiShoppe

posted in: Featured Company 0

Who’s who in your Industry?

This week we are featuring EasiShoppe, based in Cape Town, Western Cape. Lizelle Woest, is the Sales Consultant for Easishoppe, wholesale distributor for Easigas and you can read what she has to say here …

Easishoppe

If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Featured Companies, please visit our Leads 2 Business Blog.

 

About Gudrun Anke

I am an Account Executive for Leads 2 Business who assists professionals, contractors, sub contractors and anyone needing to learn about new projects and tenders in the construction industry and help build their business by getting more clients. Before Leads to Business, I spent well over ten years in the fashion industry and after a successful career designing and managing fashion brands I decided it was time to make a change and entered the construction sector. I enjoy trying new sports (archery, anyone?) and am a mom.

Industry Events: Africa August 2019

Industry Events: Africa August 2019

Event:

Zimbabwe Mining Investment Conference

Date:

01 to 02 August 2019

Event Location:

The Kingdom Hotel, Victoria Falls, Zimbabwe

Event Description:

The Zimbabwe Mining Investment Conference is open for business and it provides the attendees with the opportunity to meet key stakeholders, government officials, corporates and investors. The attendees also get the opportunity to gain information relating to the investment opportunities in gold, platinum, coal, chrome, nickel, copper, lithium, tin, tantalite, iron ore, coal bed methane, natural gas, and much more.

Event Details:
Website
Registration

 

 

 

Event:

Ibadan Sustainable Development Summit

Date:

19 to 21 August 2019

Event Location:

University Of Ibadan, Ibadan, Nigeria

Event Description:

The Annual Ibadan Sustainable Development Summit will cover areas like Clean Energy and Sustainable Infrastructure,Ending Poverty and Narrowing Inequality. This event’s key success story Summit is the breaking of silos and the forging of partnerships among various stakeholders in achieving the SDGs. The success of the SDGs requires partnerships among governments, the academia, the private sector and civil society organisations. Strategic partnerships that are built upon principles and values, shared vision, and shared goals that place people and the planet at the centre are needed at the global, regional, national and local levels.

Contact Details:

Tel: +234 802 325 5741
Email: o.olaniyan@ui.edu.ng; lanreolaniyan@yahoo.co.uk

Event Details:
Website
Registration

 

 

Event:

African Real Estate Conference & Awards

Date:

28 August 2019

Event Location:

Landmark Event Centre, Lagos, Nigeria

Event Description:

The African Real Estate Conference & Awards is the foremost gathering of the industry’s finest minds, top-level business leaders and decision-makers. At the conference & awards, industry experts, leaders & government authorities will share major insights concerning the African real estate market, as well as proffer solutions to these issues. The Africa Real Estate Awards finalists will also be announced and recognized before speakers, delegates, media & participating organizations across the globe. Join 800+ delegates from real estate, design, architecture, finance, thought leaders, trend setters to refresh thinking, exchange ideas and connect with other stakeholders & decision makers.

Contact Details:

Tel: +234 (0)700 777 7777
Email: info@LandmarkLagos.com

Event Details:
Website

 

 

 

Event:

Mega Clima East Africa

Date:

28 to 29 August 2019

Event Location:

Kenyatta International Convention Centre, Nairobi, Kenya

Event Description:

The three-day annual shows, considered as their own region’s largest industry platform. Manufacturers, distributors and many other brands have already reserved their places at the show, with many companies expecting to unveil all-new HVACR products and latest technology.

Contact Details:

Tel: +90 212 273 18 18
Email: info@elanexpo.net

Event Details:
Website

 

 

Event:

Egypt Property & Investment Show

Date:

28 to 31 August 2019

Event Location:

Egypt International Exhibition Center, Cairo, Egypt

Event Description:

After the huge success of EPIS in it’s first round, it’s time to break the expectation in it’s second round. The event will bring you the latest Real Estate projects in Egypt, under the sponsorship of the Ministry of Housing, Utilities & Urban Communities, Etisalat Misr, QNB Bank, Uber, OLX and Automobile.

Contact Details:

Tel: (+2) 0122 332 9450
Email: enaba1963@hotmail.com

Event Details:
Website

 


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Events, please visit our Leads 2 Business Blog.

About Sasha Anderson

Millennial Mom + wife living the hash-tag life. Remember: If You Fail - Fail Forward

Best Security Tips Ever

Security, Safety and Protection are things that we will always struggle with, no matter who you are, regardless of the kind of house you live in, or where you live – security will always be a concern.

Security Threats can find you anywhere, at any time and everyone is vulnerable. We blindly look to technology, believing its efficient and all we need to protect us, but as much as that is true, the equivalent [if not more] works in favour of the same threats we need protection from.
Crime evolves with technology. It equips criminals with better, more efficient tools and creative ways to carry out their crimes. No surprise there!

We no longer have the luxury of concerning ourselves with just home and body safety – there is a big dark cyber world out there, and their attacks are more severe and lasting than any home burglary. And with today’s social media obsession, who’s really to blame? We put ourselves out there, documenting every detail of our lives for anyone and everyone to see, risking personal information/details that you think is safe, but easily accessible to those who know where and what to look for!

Fact: South Africans spend an average of 8 hours online per day, a third of which is on social media.

Point: Protecting yourself online is important, more than you might think.

One of the many threats out there is Identity Theft.

It is real and serious and it’s an ever growing and terrifying danger that you have to protect yourself from.

It is easy to laugh off and think, this will never happen to me, but just one wrong click on the internet, or 1 fake telesales call where you are distracted and divulge some personal info you should not have and WHAM – that comfortable ‘I would never be so stupid’ rug is swept from under your feet and before you even comprehend what just happened, it’s gone… its all gone – your life, your money, your credit, your Identity!

Ever lose your wallet, or had it stolen? I have.
It’s a massive pain and so inconvenient and time-consuming, having to run around and cancel cards, get new cards, replace your ID or Drivers license [which means hours at home affairs] and of course, let’s not forget – buying a new wallet!.

Now, think what its like when your whole life is stolen, your identity – which is all you have that is actually yours, something that no one is supposed to ever be able to take from you – but they do, they have, and they will continue to do so – and anyone can be next.

Losing a wallet or having it stolen is unpleasant, disruptive and inconvenient.
Having your personal info/identity stolen/hacked is, without measure, WAY worse

So today I am sharing 5 Basic security tips [thats not as basic as it sounds because so many don’t think of it] to protect you from Identity theft:

1. Keep your Tax Info, Bank Statements, and financial docs in a secure place.

2. NEVER EVER give anyone your ID number or any other personal information unless you initiated the contact or you are sure that you know who you are dealing with

3. Your cellphone is not safe! NEVER EVER save sensitive information such as ID Numbers, Bank Login Details or PINS etc on your mobile.
Fingerprint and password-protected phones are never full proof – there’s always a way around it to unlock the phone.
If your phone is stolen with sensitive information stored on it, you have literally handed your identity to criminals all wrapped up with a pretty bow on top – to do with as they see [pro]fit!

4. Tighten up on your social networking security settings. It is known that Criminals can make use of the information obtained on social media platforms,
And do not ever respond to emails that provide you with a website link which requires you to either log in with a password, or update personal information

5. Protect your computer/phone/laptop from hackers by keeping your software up to date, install security apps and keep them up to date to help keep your devices more resilient against automated hacking tools.
Create complex Passwords on everything, and change them regularly. And do not save said passwords anywhere on any of your devices either!

It can never be emphasized enough: Always Protect your Personal and Financial Information.

 

Sources:
Businesstech
SARS
Kaspersky
CreativeBloq
Locklatch
TomsGuide


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Articles, please visit our Leads 2 Business Blog.

About Jackie Van Zyl

My epic journey at Leads 2 Business started September 2008, as a Researcher / Data Capturer in the Tenders Africa Department. I joined Customer Relations in 2011, where I have had the great pleasure of being part of the Dynamic L2B Admin Department [From 2011 to present]. I deal with the Registration and Administration details of New Account Activations, and Existing Account Upgrades, etc. I also assist with client & staff queries. I’m a ‘think-out-of-the-box’ individual and an excellent problem solver. I am hardworking, meticulous, efficient, friendly and always happy to help! I look forward in assisting you with any queries you might have

How To: Resend Advisories

Do you need to Resend your Leads 2 Business – Daily Advisories for one or multiple days?
– here’s a quick video tutorial from “The How To Series”.

(Duration 1 min)


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more How To Video’s, please visit our Leads 2 Business Blog.

About Sasha Anderson

Millennial Mom + wife living the hash-tag life. Remember: If You Fail - Fail Forward

Project Infographic: Mining – Africa

Project Infographic: Mining – Africa

Get the inside scoop…


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Infographics, please visit our Leads 2 Business Blog.

About Marlaine Andersen

Leads 2 Business Advertising Co-ordinator and Digital Designer

1 69 70 71 72 73 74 75 124