Electricity – Ground Fault or Arc Fault

If you were asked, "Who discovered electricity?" What would be your answer? I'm almost positive (a little electric humor) that Benjamin Franklin and his kite flying tale comes to your mind. It was not electricity that Ben discovered in 1752. It was the lightning rod. In 1800, Alessandro Volta manufactured the first battery capable to deliver a constant electric current. It was Volta, not Franklin, to discover electricity.

Many of the ways we use and deliver electricity today are still the same as in the days of Franklin and Volta. Differences in electrical potential between materials cause current to flow between them. Charges can be produced by rubbing fur or cloth over a non metallic surface. Metal wires are used to transmit electrons over long distances; but one property stands out the most. Electricity can kill!

Today, we have developed many ways to protect ourselves from the harmful effects of exposure to electric current. We use circuit breakers, surge protectors, arch fault, ground fault, and equipment grounding to safely control the flow of electrons from one place to another. Two of these safely systems generate a lot of questions. What is the difference between ground fault and arc fault?

Ground fault circuit interrupt (GFCI) protection has been around for a few decades. It is most commonly seen in areas where water is present. For instance, in modern homes, you will find GFCI protection in the kitchen near the sink, in the bathroom near the water sources, in garages, and any receptacles outside of your home. This type of protection guards against injury by monitoring how much current is flowing through it. If the GFCI detects a difference between the amounts of current leaving as opposed to returning, it shuts off. The missing current has to be going somewhere other than its intended destination. It's going to ground. A horrible place if you happened to be in the middle of the current as it's headed to ground.

Arc fault circuit interrupt (AFCI) protection has only been available to consumers for a few years. Like its parent GFCI, AFCI is designed to detect when electricity is not traveling to its intended destination. Unlike GFCI, AFCI is not protecting against the loss of current to ground. It is guarding against a broken conductor. These broken conductors are the primary cause of home fires in America today.

Primarily, AFCI is required in bedrooms. Bedrooms are notorious for having corded appliances, such as computers, alarm clocks, and desk or floor lamps in them. Many times the cords of these appliances are routed under beds, dressers, or carpets. This is not as safe as it looks. Cords are often cut by the items placed on them. Once severed, the broken conductor will arc. This arcing will continue until the metal is burned through or a circuit breaker trips. Often, the time between the initial cutting of the conductor and the tripping of the breaker is not quick enough and a fire breaks out. AFCI was designed to detect the initial arc caused by the severed conductor and immediately turn the power off.

In conclusion, electricity is the flow of electrons between items with differenting potential. If not properly controlled, this difference can have horrible repercussions, when people or property is in the way. Modern industry has taken great measures to protect us while using one of the most fundamental properties of nature – electricity.

Local Internet Advertising Can Be Your Best Friend

Advertising online for a business is no longer the wave of the future. The future is now. Online exposures an industry to thousands of people with the click of a button. Most people will see a company's name on the web faster than anywhere in the advertising marketplace. Online has a variety of different advertising methods that one can utilize. There are national sites, as well as local sites. Free listings, paid ads, text, pictures, blogs, and pop ups are just a few methods. One can spend as much money or as little money, as they want to on promotional campaigns.

The type of business needing advertisements can help determine which sites to display. For example, when selling cars, a good placement is a website that sells auto parts or auto insurance. Any site connected to automobiles, including parts, service, or information is a good target site.

Public blog sites are an option that gets many hits. Place blogs about the company on public websites. There are local blog sites as well as national ones. Companies can also create their own blog page to boost content, links and visibility. A smaller business is well-suited to advertising online locally to reach the public sector they wish to reach. There is no need to advertise nationally without the business operates nationwide.

A key to advertising local online is to use search engine optimization (SEO). This is a method of taking the words a person may use in a search, and applying them to the advertisement text. The more search words used in the advertisement, the more people that will hit on the targeted site. If the desire is local advertising, add the preferred location so it will appear on a local search.

Utilize all the free listings, and place as many free ads as possible. The more times a business manages to place a listing, the higher it will rank. This ranking determinates in what order the site will come up compared to others when a search is launched.

Every company also needs a web page. Create one, even if it is only one page. The more colorful and graphic the page is, the more attention it will draw. Anytime a business places an ad, a picture should accompany the text if possible. Use photos that promote the business, but will also grab attention. It will not matter what the text says, unless the public is enticed to read it. Keyword research and careful selection of terms will help target potential clients. Learn to grab public attention, and the rest will follow.

Public Relations Jobs – 7 Steps to Landing a Public Relations Internship

You have been waiting for this your entire college career and here is the blissful summer. This is the season for internships: the season of Ice tea, cool swimming pools, cold beverages and with all of that, thousands of fresh graduating looking for their long awaited internship in public relations career. Following the 7 steps for landing that internship you have been waiting for might give you an edge over your tough competitors.

1. First things first. You need to redo your resume so that it does not look like some ordinary template out there which is being used by everyone else. An employer will hate looking at the boring template and this might be your chance to get his attention. Tweak your CV wherever possible and make it reflect what you want to do with that position.

2. The next step would be decorating and renovating your social networking profile. After you are done making it look like pro link it to your network. Others will find easy to help you out find your dream job. Public relations saleries are something huge these days, but do not hanker for it too much to make it very blatant.

3. Start a twitter account if you want a job in PR, marketing, advertising and the likes. Use your account responsibly.

4. You need to clean up your other profiles in social networks. Remember your employers do check your profile if you think it is not public. Remember PR jobs are based in how you deal with people and your sloppy Facebook profile can be your biggest loophole.

5. Reach out to the people at the top of the hierarchies. Most people do not do this because they think they do not care. It is just the opposite. It makes a favorable impression if you are respectful to their time.

6. Make yourself a nice portfolio. Remember ports are not only for designers. If you want to be a manager your employer might want to look at your past glory and it might help you to get in the spotlight. Do not forget you will be awed by your fellow interns in every way possible and you must awe them as well.

7. Be flexible. Being willing is the largest asset you can come up with. A lot of times you will be faced with the question of getting an unpaid internship. Take it without the slightest hesitation. Prove your merit to people who matter. Be loyal. Showcase ethical loyalty as your largest personality trait. Go for entry level PR jobs if you are not experienced enough.

With all of these in mind and the correct social circle with the flexible education you might find yourself in the best PR career surrounding possible. Public relations career has internships based on entry level public relations jobs. Do not let that disappoint you a bit. Get your way to the top. Get to know people, get the hang of the field and once that happens there will be no stopping you.

Examples Of Spyware And What They Are

Spyware is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first.

Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information.

That does not mean all software that provides ads or tracks your online activities is bad. For example, you might sign up for a free music service, but you “pay” for the service by agreeing to receive targeted ads. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You might also agree to let the company track your online activities to determine which ads to show you.

Other kinds of Spyware make changes to your computer that can be annoying and can cause your computer slow down or crash.

These programs can change your Web browsers home page or search page, or add additional components to your browser you don’t need or want. These programs also make it very difficult for you to change your settings back to the way you originally had them.

The key in all cases is whether or not you (or someone who uses your computer) understand what the software will do and have agreed to install the software on your computer.

There are a number of ways Spyware or other unwanted software can get on your computer. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

Any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with SpyWare. Once installed, the Spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers

Aside from the questions of ethics and privacy, SpyWare steals from the user by using the computer’s memory resources and also by eating bandwidth as it sends information back to the spy ware’s home base via the user’s Internet connection. Because SpyWare is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.

Because SpyWare exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other SpyWare programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the SpyWare author who will either use it for advertising/marketing purposes or sell the information to another party.

Licensing agreements that accompany software downloads sometimes warn the user that a SpyWare program will be installed along with the requested software, but the licensing agreements may not always be read completely because the notice of a SpyWare installation is often couched in obtuse, hard-to-read legal disclaimers.

Examples of SpyWare

These common SpyWare programs illustrate the diversity of behaviors found in these attacks. Note that as with computer viruses, researchers give names to SpyWare programs which may not be used by their creators. Programs may be grouped into “families” based not on shared program code, but on common behaviors, or by “following the money” of apparent financial or business connections. For instance, a number of the SpyWare programs distributed by Claria are collectively known as “Gator”. Likewise, programs which are frequently installed together may be described as parts of the same SpyWare package, even if they function separately.

o CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer’s hosts file to direct DNS lookups to these sites.

o Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.

o Zango (formerly 180 Solutions) transmits detailed information to advertisers about the Web sites which users visit. It also alters HTTP requests for affiliate advertisements linked from a Web site, so that the advertisements make unearned profit for the 180 Solutions Company. It opens pop-up ads that cover over the Web sites of competing companies.

o HuntBar, aka WinTools or Adware,WebSearch was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other SpyWare programs-an example of how SpyWare can install more SpyWare. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements.

oZlob Trojan or just Zlob, Downloads itself to your computer via ActiveX codec and reports information back to Control Server. Some information can be as your search history, the Websites you visited, and even Key Strokes.