Published Nationally ®
Southeast Edition
June 16 2021
$3.00
Vol. XXXIII • No. 12
“The Nation’s Best Read Construction Newspaper… Founded 1957.” 470 Maryland Drive • Ft. Washington, PA 19034 • 215-885-2900 • Toll Free 800-523-2200 • www.constructionequipmentguide.com
Inside
NCDOT photo
New Tools Help Ideal Landscaping ‘Make the Grade’...14
North State Takes On U.S. Ecosystem Restoration...22
In an effort to improve traffic, construction crews in North Carolina are working on a stretch of I-40 from Raleigh to the I-40/NC 42 interchange in Clayton. The $360 million project was designed to help ease congestion and delays, make travel safer throughout the area and better accommodate motorists due to future growth. “This 11-mile section of I-40 is designated as a strategic highway cor-
By Cindy Riley
CEG CORRESPONDENT
New Facility Puts Parman’s Operation Under One Roof...26
ridor by the North Carolina Department of Transportation [NCDOT], and is identified as a regionally significant project in the Capital Area Metropolitan Planning Organization [CAMPO] 2040 Metropolitan Transportation Plan,” said NCDOT Division Five engineer Joey Hopkins. “Current traffic conditions on I-40 throughout the entire length of the study corridor are often very crowded and subject to frequent delays due see NCDOT page 70
Staying Ahead of Hackers Astec Industries Launches Major Rebrand…68
Though Construction Hasn’t Been Hit, Yet, Potential for Damage Is There Challenge-junkie cybercriminals have moved on from hacking personal information. Now corporate intelligence, infrastructure and even heavy equipment are targets. Though currently cybersecurity threats are incidental in the construction industry, the potential for widespread damage exists. What can contractors do to protect their company data and heavy machinery assets? “We’ve crossed the rubicon,” said Erol Ahmed; director of communications of Built Robotics, San Francisco. Cybercrime is “now moving on to crit-
By Lucy Perry
CEG CORRESPONDENT
Table of Contents ................4 Paving Section ............ 35-53 Auction Section ..........82-87 Business Calendar ............84 Advertisers Index ..............86
Though people want to be able to access data from anywhere, in reality the fewer places data lives the safer it is.
ical infrastructure, pipelines and potentially heavy equipment.” Ahmed believes these large-scale operations make more attractive targets because the software used to run them is easy and accessible to criminals. “So, it’s important to provide the right protection for users as much as possible.” The bottom line, said Ahmed is yes, “we’re seeing an increase in ransomware and hacking, but we have the capabilities to fight back and keep our equipment running smoothly and safely.” see HACKERS page 72