Infrastructure Defects: ASCE’s Report Card (Spoiler: America gets a D+) (news note)

Note: this blog post was originally published March 19, 2013.  

How many bridges do you drive over on your way to work each day?  Probably a bunch, if you have the typical commute of 32 round trip miles per day.  Now, how many of them are *not* structurally sound?  Probably more than you realize.

The American Society of Civil Engineers (ASCE) has just released its American Infrastructure Report Card.  Overall, the nation scored a miserable overall D+. Here’s the breakdown for the Transportation categories:

        Aviation       D
        Bridges       C+
        Inland Waterways       D-
        Ports       C
        Rail       C+
        Roads       D
        Transit       D

    In the breakout for North Carolina,

  • 2,192 of the 18,165 (12.1%) bridges in North Carolina are considered structurally deficient.
  • 3,296 of the 18,165 (18.1%) bridges in North Carolina are considered functionally obsolete.

The report has a ton of interactive information, including a nation-wide county by county deficient bridges look up, identifying infrastructure defects in detail.  Currently, much of the planned infrastructure improvements is in limbo while the sequester is in effect.  However, our nation’s system of deficient bridges must be a priority.  Will it take another event similar to Minnesota’s I-35 bridge collapse before we fix our nation’s infrastructure?  Let’s hope not.

Your turn.  What are your thoughts about the current infrastructure of America’s roads and bridges?

When Running a Project, Don’t Think Like an Architect! (guest post)(Tue Tip)

Today, we welcome back Christopher G. Hill as guest author.  Chris is a LEED AP, Virginia Supreme Court certified mediator, lawyer and owner of the Richmond, VA firm, The Law Office of Christopher G. Hill, PC. Chris has been nominated and elected by his peers to Virginia’s Legal Elite in the Construction Law category on multiple occasions and is a member of the Virginia Super Lawyers “Rising Stars” for 2011 and 2012. He concentrates his practice on mechanic’s liens, contract review and consulting, occupational safety issues (VOSH and OSHA), and risk management for construction professionals.  

Chris authors the Construction Law Musings blog where he discusses legal and policy issues relevant to construction professionals. Additionally, Chris is active in the Associated General Contractors of Virginia and the Board of Governors of Construction Law and Public Contracts Section of the Virginia State Bar.  Most importantly, Chris’ blog was a personal inspiration to me as I set about my own blog back in 2009.  Welcome Chris!

Chris Hill
First and foremost, thanks to my pal Melissa for the opportunity to post here at her great blog.

Now that the formalities are out of the way, I will explain the title of this guest offering.  When Melissa first contacted me for my thoughts on poor project management from the contractor’s perspective, my first thought on how to avoid causing friction was “Don’t think like an architect.”

Before you flip the switch and head off for another post, possibly even another blog, hear me out.  Yes, I know that much of the audience for this piece is likely to be architects and other design professionals.  Yes, I know that all of you try hard.  But no, not all of you can run a job smoothly when acting as an Owner’s representative on a project (as opposed to designing a great building).  I’m here to help with my “musings” (see how I did that?) gained from years of representing the folks that you all seem to think are trying to ruin a project:  contractors and subcontractors.

The main thing that both “sides” of this equation need to remember is that you are all in this together.  Without your approval, the GC (and by extension the subcontractors and suppliers) on the project won’t get paid.  Without the GC and its cohorts, you, the architect, will have to listen to an Owner complain about the pace of the project and the fact that you aren’t running the project how that Owner wants it run.  See? All of us are in the same boat.

Failing to row in the same direction (to continue to beat this metaphor over the head) as the GC and seeing the GC as one that seeks to undermine your beautiful and artistic design sensibilities can only undermine those sensibilities.  GC’s and subcontractors, if asked nicely early on, can give you great insights into the scheduling, proper materials, and even the best and most efficient building design.

For example, an HVAC subcontractor can help you with the ductwork design in the beginning so that later on you aren’t barking at the GC because the subcontractor requested a change order (now waiting on your desk for approval) due to the fact that a load bearing wall would have to be moved in order for the ducts to go where you wanted them.  This minor bit of early discussion avoids the issue and keeps the GC and its subs happy, keeps the project on track and avoids messy things like liens and bond claims.

Failure to consult early and often, in a cooperative manner, leads to grumpy GC’s, ticked off subs, and a project that slows to a glacial pace.  This keeps everyone, including you, from being paid.

I could continue to rant, but you are smart folks.  You can do all of that engineering type math and all of that geometry and work with CAD that I decided was too hard so I went to law school.  You get the point: you and those that perform the construction at your project are not adversaries.  Yes, you represent the owner and want to make sure that the building is built right.  However, the best way to do this is to consult early and often.  Free information flow is the best way to keep everyone happy and everyone paid.

Thanks again to Melissa for letting me rant.

Thanks, Chris.  Ranting with a purpose is always welcome on my blog!  Readers, it is your turn.  Questions, comments, or rants for Chris or me?  Comment below.

How is the Carnival Cruise Ship Disaster Like Some Construction Projects?

cruise shipNow that I have your attention:  Have you followed the “cruise from hell” story, in which Carnival Cruise passengers were forced to make do on a ship with no working power or lavatory facilities for the better part of a week?

Think this has nothing to do with construction projects?

On the contrary, this story serves as a reminder that if something can go wrong, eventually, it WILL go wrong.

No where is this more true than on a construction project.

Read my guest post on today’s Construction Law Musings to find out how you can prepare for the unexpected on your construction projects.  While you are there, browse around and check out the wealth of information on Chris Hill’s Virginia-based construction law blog.

~ Melissa

PS:  New to this blog?  Please sign up for email delivery and your free white paper on 7 Critical Mistakes made by architects & engineers.

Photo:  (c) Roger Wollstadt

Gone Fishin’ (& Easy Email Tip to Prevent Lawsuits!) (Tue Tip)

fishing poleThis post was originally published on January 22, 2013.  It comes to us from Audrey Thomas of Organized Audrey.

Here’s Audrey’s “Etiquette Nugget:  Listen to Your Gut”:

If you’ve ever found yourself about to press send, but you get a feeling in your gut that is telling you not to, listen to your gut. There’s a reason why it’s speaking to you.

Perhaps you find yourself thinking these thoughts:

“This is probably going to tick him off.”

“This will put her over the edge.”

“I hope my client doesn’t misinterpret the pricing I’ve laid out for them.”

“I hope they read through this twice before responding back to me.”

If you’ve ever had these or similar thoughts, don’t press send. Instead, have a voice-to-voice conversation regarding the matter by picking up the phone or visiting the person face-to-face.

Another option for those emails that might be a bit “edgy,” is to put them in your drafts folder overnight. It’s amazing what rest can do for your mind and your gut.

I whole-heartedly agree.  I will add:  never put anything in writing (including email) that you wouldn’t want your Grannie to read.  Stay safe out there!

Photo (c) Greenbay.

 

Engineers: Here’s how to Securing your Mobile Device from Cyber-Attacks (guest post)

smartphone iconToday, a very important post from guest blogger Silvia Brook.  Silvias writes about home and cyber security for homesecurity.org. When she’s not writing, Silvia enjoys biking with her friends or cooking a new recipe from her compendium of cookbooks.

————————-

Believe it or not, cyber security is still a big issue in the tech industry. It seems as though every year a new electronic device is released by one of the major hardware developers, and yet every year consumers who buy those same devices fall prey to a host of viruses, glitches, and malware. A tablet released this year may get hit with just as many (if not more) viruses as they model that preceded it the year before.

Part of why that’s the case is because malicious applications are changing and evolving at the same rate as the new devices that they target. Developers on both sides of the equation are fighting to make the better application—those who design security apps and protection software will try to keep your information, while hackers will try just as hard to take it away.

A recent assessment of the Android OS’s newest virus protection software might explain this problem. The new smartphone OS—Android 4.2—has a built-in malware scanner for apps. A computer scientist at North Carolina State University decided to see how this new scanning software stacked up third-party virus protection apps in a test that pits them all against the latest malware targeting smartphones. The study found that the Android OS app scanner caught malware content only about 20% of the time. The third-party security apps fared much better, some of which caught malware nearly every time.

What are we supposed to do with this information? Google seems to have trouble designing a competent virus scanning application for its own line of smartphones, all of which seem at least vulnerable to potential viruses according to the above report. If that’s the case, then how can people expect to put sensitive information (emails, finances, photos, etc.) on their smartphones?

I think the most important takeaway is that cyber security should be taken seriously by people who use mobile devices on a regular basis. There really are malicious apps out there that could do some serious damage to smartphones and tablets.  Design professionals such as engineers and architects who rely on their electronics for mobile work  are best off defending themselves from such annoyances with third-party apps designed by professionals with a proven track record.

Below are two apps by such developers which have received nothing but glowing reviews from critics.

Avast!

Avast! is a comprehensive software that addresses many key cyber security concerns. For one thing, the software will help users track their smartphones or tablets should they ever get lost or stolen. Avast! will let users locate their misplaces phones via GPS and send SMS messages to it should they want to address whoever has it. Of course the software also protects mobile devices from malware apps and websites that could be packing a nasty virus by scanning every app before it’s loaded. Avast! also allows users to build a firewall for their mobile devices should they suspect that hackers want to tamper with their data. In other words, Avast! is the whole security package for the Android, and it’s free!

F-Secure Mobile Security

F-Secure is an acclaimed security software company, protecting both home computers and mobile devices all sorts of cyber security threats. F-Secure will ensure that mobile users can browse the web safely without fear of encountering malware; the service will also scan incoming apps and data for any potential viruses that could compromise the safety of the device. Like Avast!, F-Secure also has a feature that will help users track down their mobile device should it be misplaced or stolen (and users can erase their data remotely it they suspect that someone has access to their information). F-Secure has a subscription fee, and it’s only available for Android users.

Melissa here again.  What about you?  Do you have a favorite cyber security app?  Depending on how much you work in the Cloud, you should!  

Share your recommendations in the comment section, below.  Just remember, I’m a luddite, so talk in plain and simple terms!

Photo (c) Lora Williams