Cooper Industries to lay off 2,200

By Fabricating & Metalworking


High Voltage Maintenance Training Online

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today
Cooper Industries Limited, a manufacturer of electrical products and tools, has posted a fourth-quarter 2008 net income of $111.1 million, down 38 percent compared with $179.3 million year over year, as a result of charges related to job cuts and severance packages.

Industrial Info Resources reports that Cooper Industries is now set to eliminate 2,244 positions – 8 percent of the company's salaried work force and 7 percent of its hourly employees, the company said in a statement.

"We've experienced many cycles, recessions, crises and have not only survived, but have prospered and adapted to changing market conditions and emerging technologies," said Kirk Hachigian, Chairman, CEO and President.

Revenues for the quarter totaled $1.52 billion, down slightly from 4Q07's $1.54 billion. Sales of electrical products in 4Q08 totaled $1.36 billion, and sales of tools totaled $165.1 million.

"Economic conditions deteriorated rapidly," Hachigian said. "In every business and in every market, all global regions, including developing markets, were down. And we were very limited with year-end customer pull-throughs or buys in electrical distribution, utility and retail. Essentially, nobody wanted to take additional inventory."

Cooper Industries has been in operation for 175 years. The company has 23 manufacturing facilities in 23 countries and serves the industrial, commercial, utility and residential markets.

Related News

Substation Maintenance Training

Substation Maintenance Training delivers live online instruction on testing switchgear, circuit breakers, transformers, protective relays, batteries, and SCADA systems, covering safety procedures, condition assessment, predictive maintenance, and compliance for utility substations.

 

Key Points

A live online course on testing and maintaining substation switchgear, breakers, transformers, relays, and batteries.

✅ Live instructor-led, 12-hour web-based training

✅ Covers testing: insulation resistance, contact resistance, TLI

✅ Includes 7 days of post-course email mentoring

 

Our Substation Maintenance Training course is a 12-Hour Live online instruction-led course that will cover the maintenance and testing requirements for common substation facilities, and complements VFD drive training for professionals managing motor control systems.

Electrical Transformer Maintenance Training

Substation Maintenance Training

Request a Free Training Quotation

Electrical Substation maintenance is a key component of any substation owner's electrical maintenance program. It has been well documented that failures in key procedures such as racking mechanisms, meters, relays and busses are among the most common source of unplanned outages. Electrical transmission, distribution and switching substations, as seen in BC Hydro's Site C transmission line work milestone, generally have switching, protection and control equipment and one or more transformers.Our electrical substation maintenance course focuses on maintenance and testing of switchgear, circuit breakers, batteries and protective relays.

This Substation Maintenance Training course will cover the maintenance and testing requirements for common substation devices, including power transformers, oil, air and vacuum circuit breakers, switchgear, ground grid systems aligned with NEC 250 grounding and bonding guidance, batteries, chargers and insulating liquids. This course focuses on what to do, when to do it and how to interpret the results from testing and maintenance. This Substation Maintenance course will deal with all of these important issues.

You Can Access The Live Online Training Through Our Web-Based Platform From Your Own Computer. You Can See And Hear The Instructor And See His Screen Live.

You Can Interact And Ask Questions, similar to our motor testing training sessions delivered online. The Cost Of The Training Also Includes 7 Days Of Email Mentoring With The Instructor.

 

LEARNING OBJECTIVES

  • Substation Types, Applications, Components And lightning protection systems safety procedures
  • Maintenance And Testing Methods For Medium-Voltage Circuit Breakers
  • How To Perform Insulation Resistance, Contact Resistance On Air, Oil And Vacuum Breakers, And Tank Loss Index On Oil Circuit Breaker And Vacuum Bottle Integrity Tests On Vacuum Breaker
  • Switchgear Arrangement, Torque Requirements, Insulation Systems, grounding guidelines And Maintenance Intervals
  • How To Perform Switchgear Inspection And Maintenance

 

WHO SHOULD ATTEND

This course is designed for engineering project managers, engineers, and technicians from utilities who have built or are considering building or retrofitting substations or distribution systems with SCADA and substation integration and automation equipment, and for teams focused on electrical storm safety in the field.

Complete Course Details Here:

https://electricityforum.com/electrical-training/substation-maintenance-training

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Electricity deal clinches $100M bitcoin mining operation in Medicine Hat

Medicine Hat Bitcoin Mining Deal delivers 42 MW electricity to Hut 8, enabling blockchain data centres, cryptocurrency mining expansion, and economic diversification in Alberta with low-cost power, land lease, and rapid construction near Unit 16.

 

Key Points

A pact to supply 42 MW and lease land, enabling Hut 8's blockchain data centres and crypto mining growth in Alberta.

✅ 42 MW electricity from city; land lease near Unit 16

✅ Hut 8 expands to 60.7 MW; blockchain data centres

✅ 100 temporary jobs; 42 ongoing roles in Alberta

 

The City of Medicine Hat has agreed to supply electricity and lease land to a Toronto-based cryptocurrency mining company, at a time when some provinces are pausing large new crypto loads in a deal that will see $100 million in construction spending in the southern Alberta city.

The city will provide electric energy capacity of about 42 megawatts to Hut 8 Mining Corp., which will construct bitcoin mining facilities near the city's new Unit 16 power plant.

The operation is expected to be running by September and will triple the company's operating power to 60.7 megawatts, Hut 8 said, amid broader investments in new turbines across Canada.

#google#

"The signing of the electricity supply agreement and the land lease represents a key component in achieving our business plan for the roll-out of our BlockBox Data Centres in low-cost energy jurisdictions," said the company's board chairman, Bill Tai, in a release.

"[Medicine Hat] offers stable, cost-competitive utility rates and has been very welcoming and supportive of Hut 8's fast-paced growth plans."

In bitcoin mining operations, rows upon rows of power-consuming computers are used to solve mathematical puzzles in exchange for bitcoins and confirm crytopcurrency transactions. The verified transactions are then added to the public ledger known as the blockchain.

Hut 8's existing 18.7-megawatt mining operation at Drumheller, Alta. — a gated compound filled with rows of shipping containers housing the computers — has so far mined 750 bitcoins. Bitcoin was trading Tuesday morning for about $11,180.

Medicine Hat Mayor Ted Clugston says the deal is part of the city's efforts to diversify its economy.

We've made economic development a huge priority down here because we were hit very, very hard by the oil and gas decline," he said, noting that being the generator and vendor of its own electricity puts the city in a uniquely good position.

"Really we're just turning gas into electricity and they're taking that electricity and turning it into blockchain, or ones and zeroes."

Elsewhere in Canada, using more electricity for heat has been urged by green energy advocates, reflecting broader electrification debates.

Hut 8 says construction of the facility is starting right away and will create about 100 temporary jobs. The project is expected to be finished by the third-quarter of this year.

The Medicine Hat mining operation will generate 42 ongoing jobs for electricians, general labourers, systems technicians and security staff.

 

Related News

View more

WEC Energy Group to buy 80% stake in Illinois wind farm for $345 million

WEC Energy Blooming Grove Investment underscores Midwest renewable energy growth, with Invenergy, GE turbines, and 250 MW wind power capacity, tax credits, PPAs, and utility-scale generation supplying corporate offtakers via long-term contracts.

 

Key Points

It is WEC Energy's $345M purchase of an 80% stake in Invenergy's 250 MW Blooming Grove wind farm in Illinois.

✅ 94 GE turbines; 250 MW utility-scale wind capacity

✅ Output contracted to two multinational offtakers

✅ Eligible for 100% bonus depreciation and wind tax credits

 

WEC Energy Group, the parent company of We Energies, is buying an 80% stake in a wind farm, as seen with projects like Enel's 450 MW wind farm coming online, in McLean County, Illinois, for $345 million.

The wind farm, known as the Blooming Grove Wind Farm, is being developed by Invenergy, which recently completed the largest North American wind build with GE partners, a company based in Chicago that develops wind, solar and other power projects. WEC Energy has invested in several wind farms developed by Invenergy.

With the agreement announced Monday, WEC Energy will have invested more than $1.2 billion in wind farms in the Midwest, echoing heartland investment growth across the region. The power from the wind farms is sold to other utilities or companies, as federal initiatives like DOE wind awards continue to support innovation, and the projects are separate from the investments made by WEC Energy's regulated utilities, such as We Energies, in wind power.

The project, which will consist of 94 wind turbines from General Electric, is expected to be completed this year, similar to recent project operations in the sector, and will have a capacity of 250 megawatts, WEC said in a news release.

Affiliates of two undisclosed multinational companies akin to EDF's offshore investment activity have contracted to take all of the wind farm's output.

The investment is expected to be eligible for 100% bonus depreciation and, as wind economics help illustrate key trends, the tax credits available for wind projects, WEC Energy said.

 

Related News

View more

Financial update from N.L energy corp. reflects pandemic's impact

Nalcor Energy Pandemic Loss underscores Muskrat Falls delays, hydroelectric risks, oil price shocks, and COVID-19 impacts, affecting ratepayers, provincial debt, timelines, and software commissioning for the Churchill River project and Atlantic Canada subsea transmission.

 

Key Points

A $171M Q1 2020 downturn linked to COVID-19, oil price collapse, and Muskrat Falls delays impacting schedules and costs.

✅ Q1 2020 profit swing: +$92M to -$171M amid oil price crash

✅ Muskrat Falls timeline slips; cost may reach $13.1B

✅ Software, workforce, COVID-19 constraints slow commissioning

 

Newfoundland and Labrador's Crown energy corporation reported a pandemic-related profit loss from the first quarter of 2020 on Tuesday, along with further complications to the beleaguered Muskrat Falls hydroelectric project.

Nalcor Energy recorded a profit loss of $171 million in the first quarter of 2020, down from a $92 million profit in the same period last year, due in part to falling oil prices during the COVID-19 pandemic.

The company released its financial statements for 2019 and the first quarter of 2020 on Tuesday, and officials discussed the numbers in a livestreamed presentation that detailed the impact of the global health crisis on the company's operations.

The loss in the first quarter was caused by lower profits from electricity sales and a drop in oil prices due to the pandemic and other global events, company officials said.

The novel coronavirus also added to the troubles plaguing the Muskrat Falls hydroelectric dam on Labrador's Churchill River, amid Quebec-N.L. energy tensions that long predate the pandemic.

Work at the remote site stopped in March over concerns about spreading the virus. Operations have been resuming slowly, with a reduced workforce tackling the remaining jobs.

Officials with Nalcor said it will likely be another year before the megaproject is complete.

CEO Stan Marshall estimates the months of delays could bring the total cost to $13.1 billion including financing, up from the previous estimate of $12.7 billion -- though the total impact of the coronavirus on the project's price tag has yet to be determined.

"If we're going to shut down again, all of that's wrong," Marshall said. "But otherwise, we can just carry on and we'll have a good idea of the productivity level. I'm hoping that by September we'll have a more definitive number here."

The 824 megawatt hydroelectric dam will eventually send power to Newfoundland, and later Nova Scotia, through subsea cables, even as Nova Scotia boosts wind and solar in its energy mix.

It has seen costs essentially double since it was approved in 2012, and faced significant delays even before pandemic-forced shutdowns in North America and around the world this spring.

Cost and schedule overruns were the subject of a sweeping inquiry that held hearings last year, while broader generation choices like biomass use have drawn scrutiny as well.

The commissioner's report faulted previous governments for failing to protect residents by proceeding with the project no matter what, and for placing trust in Nalcor executives who "frequently" concealed information about schedule, cost and related risks.

Some of the latest delays have come from challenges with the development of software required to run the transmission link between Labrador and Newfoundland, where winter reliability issues have been flagged in reports.

The software is still being worked out, Marshall said Tuesday, and the four units at the dam will come online gradually over the next year.

"It's not an all or nothing thing," Marshall said of the final work stages.
Nalcor's financial snapshot follows a bleak fiscal update from the province this month. The Liberal government reported a net debt of $14.2 billion and a deficit of more than $1.1 billion, even as a recent Churchill Falls deal promised new revenues for the province, citing challenges from pandemic-related closures and oil production shutdowns.

Finance Minister Tom Osborne said at the time that help from Ottawa will be necessary to get the province's finances back on track.

Muskrat Falls represents about one-third of the province's debt, and is set to produce more power than the province of about half a million people requires. Anticipated rate increases due to the ballooning costs and questions about Muskrat Falls benefits have posed a significant political challenge for the provincial government.

Ottawa has agreed to work with Newfoundland and Labrador on a rewrite of the project's financial structure, scrapping the format agreed upon in past federal-provincial loan agreements in order to ease the burden on ratepayers, while some argue independent planning would better safeguard ratepayers.

Marshall, a former Fortis CEO who was brought in to lead Nalcor in 2016, has called the project a "boondoggle" and committed to seeing it completed within four years. Though that plan has been disrupted by the pandemic, Marshall said the end is in sight.

"I'm looking forward to a year from now. And I hope to be gone," Marshall said.

 

Related News

View more

New clean energy investment in developing nations slipped sharply last year: report

Developing Countries Clean Energy investment fell as renewable energy financing slowed in China; solar and wind growth lagged while coal power hit new highs, raising emissions risks for emerging markets and complicating climate change goals.

 

Key Points

Renewables investment and power trends in emerging nations: solar, wind, coal shifts, and steps toward decarbonization.

✅ Investment fell to $133b; China dropped to $86b

✅ Coal power rose to 6,900 TWh; 47% generation share

✅ New coal builds declined to 39 GW, decade low

 

New clean energy investment slid by more than a fifth in developing countries last year due to a slowdown in China, while the amount of coal-fired power generation jumped to a new high, reflecting global power demand trends, a recent annual survey showed.

Bloomberg New Energy Finance (BNEF) surveyed 104 emerging markets and found that developing nations were moving towards cleaner, low-emissions sources in many regions, but not fast enough to limit carbon dioxide emissions or the effects of climate change.

New investment in wind, solar and other clean energy projects dropped to $133 billion last year from $169 billion a year earlier, mainly due to a slump in Chinese investment, even as electricity investment globally surpasses oil and gas for the first time, the research showed.

China’s clean energy investment fell to $86 billion from $122 billion a year earlier, with dynamics in China's electricity sector also in focus. Investment by India and Brazil also declined, mainly due to lower costs for solar and wind.

However, the volume of coal-fired power generation produced and consumed in developing countries increased to a new high of 6,900 terrawatt hours (TWh) last year, even as renewables are poised to eclipse coal globally, from 6,400 TWh in 2017.

The increase of 500 TWh is equivalent to the power consumed in the U.S. state of Texas in one year, underscoring how surging electricity demand is putting power systems under strain. Coal accounted for 47% of all power generation across the 104 countries.

“The transition from coal toward cleaner sources in developing nations is underway,” said Ethan Zindler, head of Americas at BNEF. “But like trying to turn a massive oil tanker, it takes time.”

Despite the spike in coal-fired generation, the amount of new coal capacity which was added to the grid in developing countries declined, with Europe's renewables crowding out gas offering a contrasting pathway. New construction of coal plants fell to its lowest level in a decade last year of 39 gigawatts (GW).

The report comes a week ahead of United Nations climate talks in Madrid, Spain, where more than 190 countries will flesh out the details of an accord to limit global warming.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified