{"id":2334,"date":"2004-06-02T00:00:00","date_gmt":"2004-06-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/06\/02\/reuters-reports-the-potential-for-power-failures-in-the-midwest\/"},"modified":"2021-12-30T11:41:06","modified_gmt":"2021-12-30T11:41:06","slug":"reuters-reports-the-potential-for-power-failures-in-the-midwest","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/06\/02\/reuters-reports-the-potential-for-power-failures-in-the-midwest\/","title":{"rendered":"Reuters reports the potential for power failures in the Midwest"},"content":{"rendered":"<p>The potential for power failures in the Midwest due to high energy demand and rough weather poses the biggest threat to the region&#8217;s fuel production this summer, the head of Marathon Ashland Petroleum LLC (MAP) said on Wednesday.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Coming into summertime and with the violent storms we have seen, it is clear to us the power grid is stretched,&#8221; said MAP President Gary Heminger in a conference call.<\/p>\n<p>The bulk of its operations are in the Midwest, a region that has been strafed by deadly storms over the past couple of weeks and which is particularly sensitive to refinery problems due to a shortfall in the region&#8217;s fuel production capacity.  Oil refinery operations can be brought to a swift and sometimes damaging halt during a power grid failure.  He said he expects strong refining margins through the summer due to a lack of U.S. refining capacity and strong demand despite record high gasoline prices.  Heminger said MAP is on track to increase refining capacity at its Detroit, Michigan, refinery from 74,000 bpd to 100,000 bpd by the end of 2005.<\/p>\n<p>More info: http:\/\/biz.yahoo.com\/rc\/040602\/energy_map_refineries_1.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2334","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2334"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2334\/revisions"}],"predecessor-version":[{"id":4821,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2334\/revisions\/4821"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}