protect A Comprehensive Global Guide for AI Data Protection in the Workplace By www.littler.com Published On :: Fri, 19 Apr 2024 14:30:57 +0000 Zoe Argento, Kwabena Appenteng, Alyssa Daniels, Philip Gordon, Rajko Herrmann, Soowon Hong, Renata Neeser, Naomi Seddon, Christina Stogov and Grace Yang share a comprehensive guide for how employers can ensure data protection as they implement artificial intelligence. Corporate Compliance Insights View Full Article
protect New Colorado Law Protects Consumer Biological and Neural Data By www.littler.com Published On :: Fri, 19 Jul 2024 20:49:49 +0000 Zoe Argento talks about the new compliance requirements for employers under Colorado’s biometric privacy law. Law Week Colorado View (Subscription required) Full Article
protect World Standards Day 2020: STANDARDS ARE ESSENTIAL TO PROTECT THE PLANET By www.etsi.org Published On :: Fri, 06 May 2022 07:26:49 GMT World Standards Day 2020: STANDARDS ARE ESSENTIAL TO PROTECT THE PLANET On 14 October 2020, CEN, CENELEC and ETSI, the three official European Standardization Organizations, join the international standardization community in celebrating World Standards Day. By focusing on the environment, this year’s edition aims to raise awareness on the potential of standards to help tackle the climate crisis. Read More... Full Article
protect ETSI releases the first Group Report on Encrypted Traffic Integration, protecting end users from malicious attacks By www.etsi.org Published On :: Wed, 01 Sep 2021 08:43:38 GMT ETSI releases the first Group Report on Encrypted Traffic Integration, protecting end users from malicious attacks Sophia Antipolis, 1 September 2021 ETSI’s Industry Specification Group on Encrypted Traffic Integration (ISG ETI) has concluded the early part of its work, by identifying problems arising from pervasive encrypted traffic in communications networks. Read More... Full Article
protect ETSI releases World First Protection Profile for Quantum Key Distribution By www.etsi.org Published On :: Thu, 27 Apr 2023 07:58:49 GMT Sophia Antipolis, 27 April 2023 ETSI has just released a Protection Profile (PP) for the security evaluation of quantum key distribution (QKD) modules, ETSI GS QKD 016. This Protection Profile is a first and anticipates the need for quantum safe cryptography. The ETSI specification will help manufacturers to submit pairs of QKD modules for evaluation under a security certification process. Read More... Full Article
protect ETSI Protection Profile for securing smartphones gains world-first certification from French Cybersecurity Agency By www.etsi.org Published On :: Fri, 12 Apr 2024 09:05:05 GMT Sophia Antipolis, 12 January 2024 In a significant step highlighting the critical importance of security for mobile device users, the French National Cybersecurity Agency (ANSSI) has certified ETSI's Consumer Mobile Device Protection Profile under the Common Criteria global certification framework. This represents the first certification by a national administration of a comprehensive suite of specifications for assessing the security of smartphones. Read More... Full Article
protect How To Protect Your Cloud Environments and Prevent Data Breaches By www.tenable.com Published On :: Thu, 24 Oct 2024 09:00:00 -0400 As organizations create and store more data in the cloud, security teams must ensure the data is protected from cyberthreats. Learn more about what causes data breaches and about the best practices you can adopt to secure data stored in the cloud.With the explosion of data being generated and stored in the cloud, hackers are creating new and innovative attack techniques to gain access to cloud environments and steal data. A review of recent major data breaches shows us that data thieves are using social engineering, hunting for exposed credentials, looking for unpatched vulnerabilities and misconfigurations and employing other sophisticated techniques to breach cloud environments.A look at recent cloud data-breach trendsHere are some takeaways from major data breaches that have occurred this year:Managing the risk from your third-parties – partners, service providers, vendors – has always been critical. It’s even more so when these trusted organizations have access to your cloud environment and cloud data. You must make sure that your third-parties are using proper cloud-security protections to safeguard their access to your cloud data and to your cloud environment.Secure your identities. We’ve seen major data breaches this year tracked down to simple missteps like failing to protect highly-privileged admin accounts and services with multi-factor authentication (MFA). Adopt best practices to prevent ransomware attacks, and to mitigate them if you get hit by one. Ransomware gangs know that a surefire way to pressure victims into paying ransoms is to hijack their systems and threaten to expose their sensitive data. So, how can you strengthen your data security posture against these types of attacks?Implement a "zero trust" security framework that requires all users, whether inside or outside the organization, to be authenticated, authorized and continuously validated before being granted or maintaining access to data. This framework should allow only time-limited access and be based on the principle of least privilege, which limits access and usage to the minimum amount of data required to perform the job.Use a cloud data security posture management (DSPM) solution to enforce the security framework through continuous monitoring, automation, prioritization and visibility. DSPM solutions can help organizations identify and prioritize data security risks based on their severity, allowing them to focus their resources on the most critical issues.Regularly conduct risk assessments to detect and remediate security risks before they can be exploited by hackers. This can help prevent data breaches and minimize the impact of any security incidents that do occur.Train employees on security best practices, including how to create strong passwords, how to identify risks and how to report suspicious activity.By following these recommendations, organizations can significantly reduce their risk of a data breach and improve handling sensitive data belonging to their organization. As more and more data moves to the cloud and hackers become more sophisticated, it's essential to prioritize security and take proactive measures to protect against data risks. Learn moreWebinar: Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?Data Sheet: Data Security Posture Management (DSPM) Integrated into Tenable Cloud SecurityData Sheet: Securing AI Resources and Data in the Cloud with Tenable Cloud SecurityInfographic: When CNAPP Met DSPMVideo: Demo Video: Data Security Posture Management and AI Security Posture Management Full Article
protect Do social protection programs reduce conflict risk? Evidence from a large-scale safety net program in rural Ethiopia By essp.ifpri.info Published On :: Wed, 06 Nov 2024 09:10:32 +0000 PSNP is largest public works program in Africa • Started in 2005 in four main highland regions • Approximately 8 million participants • We examine the effect of PSNP on both high-intensity and low-intensity conflict • Using Govt. of Ethiopia administrative PSNP records and geocoded data on conflict events (Armed Conflict Location & Event Data […] Source: IFPRI Ethiopia: Ethiopia Strategy Support Program Full Article News Presentations Publications
protect Maintaining Data Protection Controls By www.tenable.com Published On :: Fri, 24 Jun 2022 12:32:58 -0400 Many data protection regulations, such as PCI DSS and HIPAA, levy heavy fines for data breaches of sensitive information. Effective data protection controls are necessary to avoid breaches of regulatory, statutory, or contractual obligations related to sensitive data. Organizations that handle sensitive data, such as healthcare and credit card information, are required to audit data protection controls on an annual basis. Leveraging Tenable reports enables organizations to protect data in accordance with business risk posture for Confidentiality, Integrity and Availability (CIA). The National Institute of Standards (NIST) Special Publication 800-53 provides comprehensive guidance for a secure infrastructure, including guidance on data protection and encryption. The information provided in Tenable dashboards and reports enables Risk Managers and Chief Privacy Officers to demonstrate to third parties and regulatory bodies that sensitive data is protected in accordance with Data Loss Prevention requirements. The NIST Cybersecurity Framework (CSF) is a control framework, which has high level controls that align with ISO 27001, NIST SP 800-53, and others. The Cybersecurity Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security. Many regulating bodies accept evidence documentation of compliance with the NIST CSF as assurance that the organization has effective controls in place to meet their security requirements. The HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework is an example of a regulation aligning with NIST. The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report is located in the Tenable.sc Feed under the category Threat Detection & Vulnerability Assessments. The report requirements are: Tenable.sc 5.9.0 Nessus 10.2.0 Leveraging Tenable reports enables operations teams to verify that appropriate protections are in place for data at rest, data in transit, and removable media. Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Chapters Executive Summary: This chapter provides a summary view on the state of protections controls relating to Certificates, Encryption, and Confidentiality and Protected Information. Data Protection Details – This chapter provides details on the state of protection controls in the environment for Certificates, Encryption, and Confidentiality and Protected Information, which are described below. Certificates – This section displays findings for hosts with expired certificates, certificates that are expiring soon, untrusted certificates and self-signed certificates. Expired certificates and other certificate problems cause a denial of service, man-in-the-middle, and trust-related concerns for organizations. SSL/TLS Vulnerability Summary – This section provides an overview of systems and vulnerabilities related to SSL/TLS. The SSL/TLS Vulnerabilities by Type element displays a count of systems and vulnerabilities related to SSLv2 and SSLv3 in the first two rows. From the third row down, information is provided on all the systems running any version of TLSv1 and higher. Encryption – This section provides an overview of systems and vulnerabilities related to SSL/TLS and Encryption/Cryptographic Compliance. Information presented in this section highlights issues such as weak hashing algorithms and keys as well as the use of insecure encryption ciphers. Many of these issues are the result of misconfigurations or use of outdated encryption methods. This detailed information also highlights vulnerabilities that can be exploited by attackers. Tenable recommends that security teams review the data to determine the risk to the organization. Confidentiality of Protected Information – This section provides an overview of systems and vulnerabilities related to Security Requirement 3.13.16 in the NIST Special Publication 800-171. Revision 2 provides guidance to protect the confidentiality of Controlled Unclassified Information (CUI) at rest and maps to Security Control SC-28 of NIST Special Publication 800-53. File Content Audit Results – The following section displays File Content Audit Results. The first two rows of the File Contents Audit Results Compliance Checks provide the total count of Passed checks, Failed checks, and checks requiring a manual review. The first row, ‘Check Count’, provides a count of the current checks per check status. The second row, ‘Check Ratio’, provides a ratio view of check status. The three columns together total 100%. The last two rows provide a system count analysis. The third row, ‘System Count’, provides the number of systems with at least one audit check in the applicable state. The last row, ‘System Ratio’, provides a percentage of systems with at least one audit check in the applicable state. Full Article
protect How the Navy came to protect cargo ships By www.npr.org Published On :: Fri, 16 Feb 2024 22:05:48 +0000 The Genco Picardy is not an American ship. It doesn't pay U.S. taxes, none of its crew are U.S. nationals, and when it sailed through the Red Sea last month, it wasn't carrying cargo to or from an American port. But when the Houthis, a tribal militant group from Yemen, attacked the ship, the crew called the U.S. Navy. That same day, the Navy fired missiles at Houthi sites.On today's show: How did protecting the safe passage of other countries' ships in the Red Sea become a job for the U.S. military? It goes back to an idea called Freedom of the Seas, an idea that started out as an abstract pipe dream when it was coined in the early 1600s – but has become a pillar of the global economy. This episode was hosted by Alex Mayyasi and Nick Fountain. It was produced by Sam Yellowhorse Kesler, edited by Molly Messick, fact-checked by Sierra Juarez, and engineered by Valentina Rodríguez Sánchez, with help from Maggie Luthar. Alex Goldmark is Planet Money's executive producer. Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
protect New research Chair for investor rights—the first of its kind—to investigate better protections for Canadians By media.utoronto.ca Published On :: Wed, 27 Jan 2016 17:00:55 +0000 Toronto, ON — Professor Anita Anand, a corporate law and governance expert, is the new J. R. Kimber Chair in Investor Protection and Corporate Governance at the University of Toronto Faculty of Law—the first research chair for investor rights in North America—thanks to a generous gift from well-known philanthropist, the Hon. Hal Jackman, LLB 1956, […] Full Article Business & Finance Law Media Releases
protect The Moth Radio Hour: Love, Serve, and Protect By play.prx.org Published On :: Tue, 28 Feb 2023 05:00:00 -0000 In this hour, stories of heroes, mentors, and our greatest supporters. A Coast Guard rescue swimmer considers his career, a lawyer learns the meaning of justice, and a songstress pens lyrics for her loved one. Hosted by The Moth's Senior Director, Meg Bowles. The Moth Radio Hour is produced by The Moth and Jay Allison of Atlantic Public Media. Hosted by: Meg Bowles Storytellers: Rob Simpson takes us behind the scenes of life as a Coast Guard Rescue Swimmer. Sheila Calloway searches for fairness and empathy in the justice system. Beth Nielsen Chapman finds magic in the writing of a song. Full Article mothradiohour
protect MidOpt SiLWIR Silicon Protective Windows for Industrial Imaging By www.qualitymag.com Published On :: Sun, 06 Oct 2024 08:00:00 -0400 The cost and lead times for Germanium optical components have skyrocketed. Full Article
protect Improving Indoor Air Quality: Protecting the Air We Breathe By www.achrnews.com Published On :: Sat, 29 Jan 2022 07:00:00 -0500 IAQ has become a very important topic as the COVID-19 global pandemic has continued to evolve. Full Article
protect Oil Traps Protect the Compressor By www.achrnews.com Published On :: Fri, 08 Apr 2022 07:00:00 -0400 Even though the circulated refrigerant is the working fluid required for cooling, lubricant or oil is needed for lubrication of the compressor’s moving mechanical parts. Full Article
protect Loophole May Undercut Biden Proposal to Protect Workers From Heat By www.achrnews.com Published On :: Mon, 19 Aug 2024 07:00:00 -0400 As extreme heat becomes more common, more of a spotlight is being put on worker safety, and a new app may be able to help. Full Article
protect How to Protect HVAC Vehicles From Extreme Weather By www.achrnews.com Published On :: Wed, 08 Jun 2022 07:00:00 -0400 It goes without saying that HVAC work shifts with the seasons. But did you know that the same mentality can apply to your company vehicles? Full Article
protect As Summer Swelters, Can Workers Get Heat Protections? By www.yesmagazine.org Published On :: Mon, 01 Jul 2024 14:00:00 +0000 As temperatures continue to rise, California workers, worker protection groups, and state regulators are making progress on implementing heat regulations. Full Article Social Justice Climate Environment Progress 2025: Climate and Environment California Climate Change worker rights Cal/OSHA Heat Standards
protect Progress 2025: Protecting Voting Rights and Democracy By www.yesmagazine.org Published On :: Thu, 26 Sep 2024 14:00:00 +0000 Instead of Project 2025's white supremacist vision for voting rights, Progress 2025 envisions universal early voting, a national federal holiday and more. Full Article Clean elections Local power Democracy Progress 2025 Cliff Albright Donald Trump Voter Suppression voting rights YES! Presents: Rising Up with Sonali Project 2025 Progress 2025: Voting Rights
protect We’re All Responsible for Protecting Public Libraries By www.yesmagazine.org Published On :: Tue, 03 Sep 2024 19:38:14 +0000 In this excerpt from “That Librarian,” Amanda Jones offers a blueprint to battle book censorship in public libraries. Full Article Books Social Justice Education Censorship Book Bans Libraries Public Libraries public library Amanda Jonrs
protect Protecting Workers in a Warming Climate By www.yesmagazine.org Published On :: Fri, 12 Jul 2024 14:00:00 +0000 At a time of extreme heat, a new proposed OSHA rule could protect millions of American workers from heat-related stresses and even fatalities. Full Article Climate Environment Social Justice Jobs Climate Change Labor YES! Presents: Rising Up with Sonali Organized Labor Summer Heat Standards OSHA
protect Labor Unions Prepare to Protect Workers, No Matter What By www.yesmagazine.org Published On :: Wed, 25 Sep 2024 14:00:00 +0000 Can organized labor continue its recent momentum into the next presidential administration? Full Article Jobs Economy Progress 2025: Labor and Capital Unions Progress 2025 Donald Trump NLRB Joe Biden 2024 Election workers Organized Labor Project 2025
protect How Black Women Can Protect Their Peace This Election Cycle By www.yesmagazine.org Published On :: Tue, 20 Aug 2024 22:03:02 +0000 In the months prior to Vice President Kamala Harris’ nomination to the Democratic presidential ticket, I felt a lingering fear in my body about what it would mean for Black Full Article Health & Happiness Racial Justice Gender justice Mental health Women Body Politics Misogynoir 2024 Election Black Women Kamala Harris
protect Protecting Black Pregnant People’s Health—and Data By www.yesmagazine.org Published On :: Tue, 27 Aug 2024 18:43:57 +0000 Birth workers serving Black pregnant people maintain the holistic methods—and data privacy—that distinguish doula care from the medical-industrial complex. Full Article Health & Happiness Racial Justice Health care data privacy Dobbs v. Jackson Women’s Health Organization doulas Dobbs maternal mortality Black maternal mortality Black birthing crisis data pregnancy data Reproductive Justice surveillance
protect Schematics and docs needed for communication systems of substation protective relaying system By electrical-engineering-portal.com Published On :: Wed, 09 Jun 2021 07:17:14 +0000 Communication systems of electric utilities have become increasingly critical to electric system protection, operation, and maintenance. For fast tripping and clearing of system faults, communication-aided relaying has become a common protection scheme, particularly in line protection. Control centers depend on... Read more The post Schematics and docs needed for communication systems of substation protective relaying system appeared first on EEP - Electrical Engineering Portal. Full Article Power Substation Premium Content Protection SCADA Substation Automation communication system layout communication systems electric utilities ethernet fast tripping fiber optic ieds irig-b microwave radio of substation protective relaying system scada scada documentation substation automation system
protect Twelve ultimate mistakes when selecting circuit protection for low-voltage equipment By electrical-engineering-portal.com Published On :: Mon, 08 Jan 2024 08:26:38 +0000 To be honest, a circuit breaker is fairly simple device. However, the process of specifying circuit protection is often complicated and unclear, leading many engineers to either include insufficient or excessive protection in their equipment designs. Insufficiently protected circuits expose... Read more The post Twelve ultimate mistakes when selecting circuit protection for low-voltage equipment appeared first on EEP - Electrical Engineering Portal. Full Article Energy and Power Low Voltage Power Substation Protection breaker breaker interrupting capacity cb rating circuit breaker circuit protection excessive heating fuse in-rush current ip protection degree low-voltage equipment magnetic circuit breakers nuisance tripping over specifying switch terminal thermal-magnetic circuit breakers transient current tripping withstand voltage
protect Design issues in HV busbar protection systems (substation topology and DC power supply) By electrical-engineering-portal.com Published On :: Mon, 27 Sep 2021 07:29:59 +0000 This technical article discusses criteria and requirements for designing protection systems for busbars in HV/EHV networks. One of the most critical requirements is reliable busbar relay protection to assure power system integrity during fault conditions. This requirement is further emphasized because... Read more The post Design issues in HV busbar protection systems (substation topology and DC power supply) appeared first on EEP - Electrical Engineering Portal. Full Article High Voltage Power Substation Protection Transmission and Distribution backup protection batteries bbp bus coupler busbar fault busbar protection busbar protection design busbar protection relay circuit breaker dc power supply double busbar fault clearance feeders numerical centralized arrangement protection zone single busbar substation topology transfer bus trip circuits triple busbar
protect Mastering stability test of power transformer: Differential and Restricted Earth Fault (REF) protection By electrical-engineering-portal.com Published On :: Mon, 25 Sep 2023 05:55:16 +0000 This technical article discusses the essentials of transformer differential protection and restricted earth fault protection schemes, contrasting the two and elaborating on why the latter is necessary. Furthermore, it reveals the outcomes of stability tests performed on a 502 MVA... Read more The post Mastering stability test of power transformer: Differential and Restricted Earth Fault (REF) protection appeared first on EEP - Electrical Engineering Portal. Full Article Premium Content Protection Testing and Commissioning Transformers differential protection differential protection scheme failure fault hv windings injecting fault lv side primary current lv side secondary current lv windings measured primary currents measured secondary currents ref ref protection restricted earth fault protection stability test stable condition transformer differential protection transformer restricted earth fault protection tv windings unit protection scheme unstable condition
protect IP Protection Degree (IEC 60529) Explained By electrical-engineering-portal.com Published On :: Sat, 19 Feb 2011 07:03:53 +0000 The protection of enclosures against ingress of dirt or against the ingress of water is defined in IEC529 (BSEN60529:1991). Conversely, an enclosure which protects equipment against ingress of particles will also protect a person from potential hazards within that enclosure,... Read more The post IP Protection Degree (IEC 60529) Explained appeared first on EEP - Electrical Engineering Portal. Full Article IEC Standards degree enclosures iec 60529 IEC529 ip protection nema 250 water
protect Protection Relay – ANSI Standards By electrical-engineering-portal.com Published On :: Tue, 22 Feb 2011 05:27:12 +0000 In the design of electrical power systems, the ANSI Standard Device Numbers denote what features a protective device supports (such as a relay or circuit breaker). These types of devices protect electrical systems and components from damage when an unwanted... Read more The post Protection Relay – ANSI Standards appeared first on EEP - Electrical Engineering Portal. Full Article Energy and Power IEC Standards 49rms 50/51 ansi standards current device numbers frequency protection protective relay voltage
protect How to control and protect capacitor banks before something goes wrong By electrical-engineering-portal.com Published On :: Wed, 24 Jan 2018 07:06:20 +0000 The purpose of a capacitor bank’s protective control is to remove the bank from service before any units or any of the elements that make up a capacitor unit are exposed to more than 110% of their voltage rating. When... Read more The post How to control and protect capacitor banks before something goes wrong appeared first on EEP - Electrical Engineering Portal. Full Article Energy and Power Monitoring Protection capacitor bank capacitor unit grounded banks grounded neutral neutral current protect capacitor protection scheme voltage unbalance
protect The true art of control, monitoring and protection provided by Substation Automation Systems By electrical-engineering-portal.com Published On :: Mon, 01 Jul 2024 06:19:46 +0000 The Substation Automation Systems, often known as SASs, are responsible for a tremendous variety of tasks. These include some extremely important actions, such as clearing faults in a timely manner in order to maintain the physical condition of power system... Read more The post The true art of control, monitoring and protection provided by Substation Automation Systems appeared first on EEP - Electrical Engineering Portal. Full Article Monitoring Power Substation Protection Substation Automation alarming messages bay controller bay level circuit breaker control disconnectors external disturbances handling events iec 61850 interlocking interlocking conditions monitoring primary switchgear protection sas sas control functions sas monitoring sas protection sf6 gas substation automation systems switching command synchrocheck transformers trip circuit supervision voltage regulation voltage synchronization
protect Four special connections of current transformers in relay protection applications By electrical-engineering-portal.com Published On :: Mon, 02 Dec 2019 07:34:32 +0000 As you should already know, current transformers are used for metering and relay protection purposes. When we are talking about current transformers used for metering, their performance is of interest during normal loading conditions. Metering transformers may have very significant... Read more The post Four special connections of current transformers in relay protection applications appeared first on EEP - Electrical Engineering Portal. Full Article Metering Protection Transformers auxiliary cts ct secondary current transformers flux-summing ct primary current turns ratio zero sequence current
protect Few advice for improving integrity of protective conductor By electrical-engineering-portal.com Published On :: Fri, 14 Aug 2015 05:34:20 +0000 Most modern electronic equipment uses switched mode power supplies (SMPS) which draw pulses of current from the mains supply rather than a continuous sinusoidal current. The fast rise time edges of the current waveform contain high frequencies that can cause serious radio frequency... Read more The post Few advice for improving integrity of protective conductor appeared first on EEP - Electrical Engineering Portal. Full Article Electrical Lectures Electronics continuity test cross sectional area earth iec 7671 improving integrity leakage current protective conductor
protect How to handle overvoltages before any damage is done? Surge protection in a nutshell. By electrical-engineering-portal.com Published On :: Mon, 11 Apr 2022 07:10:55 +0000 Prevention is better than cure, we all know this, and this is true not only for people, but also for the health of your electrical and electronic components and equipment. Smart and cost-effective strategies demand an investment in surge protection.... Read more The post How to handle overvoltages before any damage is done? Surge protection in a nutshell. appeared first on EEP - Electrical Engineering Portal. Full Article Energy and Power Low Voltage Protection Safety capacitive coupling conductive coupling earthing electrical panel electrostatic discharges faulty switching fuse protection inductive coupling interference voltages lightning nh fuses overvoltages power supply surge protection switching operations transients unsymmetrical interference
protect Switchgear interlocking system and arc protection that you MUST consider in the design By electrical-engineering-portal.com Published On :: Mon, 30 Jan 2023 06:23:26 +0000 There are at least two safety requirements that medium-voltage switchgear MUST fulfil: an interlocking system and an arc protection system. Yes, these two systems are crucial in terms of safety because they protect not only the operator and other substation... Read more The post Switchgear interlocking system and arc protection that you MUST consider in the design appeared first on EEP - Electrical Engineering Portal. Full Article Power Substation Premium Content Protection Safety arc protection auxiliary contacts bus coupler circuit breakers earth switch electrical interlocking feeder circuit breaker incomer circuit breaker incomers interlocks internal arc medium voltage normally closed auxiliary contact normally closed contact switchgear switchgear interlocking switchgear interlocking system test position
protect Mastering Distance Protection and Calculations Part 1: Advice and Serious Warnings By electrical-engineering-portal.com Published On :: Mon, 09 Sep 2024 06:16:12 +0000 In 2004, I embarked on an intensive nine-month training program in protection and instrumentation. This experience laid the foundation for my deep understanding of substation protection systems, combining both theoretical knowledge and practical application. The first protection scheme we delved... Read more The post Mastering Distance Protection and Calculations Part 1: Advice and Serious Warnings appeared first on EEP - Electrical Engineering Portal. Full Article Power Substation Premium Content Protection Transmission and Distribution circuit breaker distance protection fault current indiscriminate tripping line angle line impedance overcurrent protection proper relay coordination relay relay coordination relay coordination study relay settings source impedance time coordination transmission lines
protect Mastering Distance Protection and Calculations Part 2: Never Mess Up Protection Accuracy By electrical-engineering-portal.com Published On :: Mon, 23 Sep 2024 06:10:07 +0000 The first part of this article series delved into the fundamentals of overcurrent protection, exploring the intricacies of relay coordination, the impact of source impedance, and the application of distance protection. These foundational concepts laid the groundwork for understanding how... Read more The post Mastering Distance Protection and Calculations Part 2: Never Mess Up Protection Accuracy appeared first on EEP - Electrical Engineering Portal. Full Article Power Substation Premium Content Protection Transmission and Distribution arc resistance cascading line tripping distance protection distance protection schemes distance relay p543 fault fault condition ground distance relays impedance transformation impedances line angle load encroachment long transmission lines overcurrent protection overreaching protection schemes relay settings sotf switch-on-to-fault transmission line tripping underreaching
protect Failures, Testing and Protections Associated with Field Winding of a Generator By electrical-engineering-portal.com Published On :: Wed, 30 Oct 2024 13:07:21 +0000 Generator field winding is an integral part of the generator set which is responsible for generating the magnetic field that induces the stator emf when the rotor rotates. Regulation of current in this winding with the help of an AVR... Read more The post Failures, Testing and Protections Associated with Field Winding of a Generator appeared first on EEP - Electrical Engineering Portal. Full Article Power Substation Protection Testing and Commissioning brushless excitation failures field ground relay field winding generator generator field winding ground-fault insulation resistance loss of excitation minimum insulation resistance rotor slip rings slip rings surface testing
protect Capacitor banks in substations: Schemes, relay settings, and protective measures By electrical-engineering-portal.com Published On :: Mon, 27 Nov 2023 08:28:53 +0000 Let’s discuss capacitor banks, but this time, not the basics. Let’s study the double-star capacitor bank configuration and protective techniques used in the substations. How important is to choose the right current transformer ratio, calculate rated and maximum overload currents,... Read more The post Capacitor banks in substations: Schemes, relay settings, and protective measures appeared first on EEP - Electrical Engineering Portal. Full Article Medium Voltage Power Substation Premium Content Protection capacitor bank capacitor bank feeder capacitor bank protection settings capacitor banks capacitor unit current transformer double-star configuration fault current neutral overcurrent protection neutral overcurrent differential protection outgoing feeder overcurrent differential protection overvoltage protection power factor relay settings schemes single line diagram substation surge arrestor
protect Weather and Sun Protection Gear Announced By www.randrmagonline.com Published On :: Mon, 15 Apr 2024 11:51:49 -0400 Personal protection against effects of hot weather and sun exposure. Full Article
protect Advanced PPE Techniques and Protection for Restorers By www.randrmagonline.com Published On :: Thu, 23 Jun 2022 09:00:00 -0400 Use these techniques to minimize risk at jobsites and prevent the bringing home of hazardous materials. Full Article
protect How To Lay Hard Surface Floor Protection By www.randrmagonline.com Published On :: Wed, 14 Aug 2024 09:00:00 -0400 This week for our weekly How-To’s powered by KnowHow, we learn how to lay hard-surface floor protection. Full Article
protect Enhancing consumer & investor protection from ICO scams By soundcloud.com Published On :: Tue, 12 Nov 2019 01:35:25 +0000 The rise of new technologies is changing the way companies raise funds. Along with increased popularity of crowdfunding in recent years, a new form of funding has emerged – that is, the use of Initial Coin Offerings, or ICOs. In 2017, companies in the United States raised over $4 billion through ICOs; in 2018, more than $21 billion has been raised. ICOs generate many challenges for securities regulators, and also give rise to other issues including corporate governance, data protection, anti-money laundering and insolvency. Assistant Professor Aurelio Gurrea-Martínez from the SMU School of Law has conducted legal research on financial regulation. In this podcast, he shares his recent comparative and interdisciplinary study which addresses the issue of ICOs and makes recommendations to regulators and policy makers in a way that aims to promote innovation and firms’ access to finance without harming investor protection, market integrity and the stability of the financial system. Full Article
protect Artificial Intelligence & data protection in Singapore By soundcloud.com Published On :: Wed, 08 Apr 2020 03:04:36 +0000 Data has emerged as the most important driver for modern economic development. New industries have arisen from the use of data with personal information as the core asset, while many traditional models of business are ‘disrupted’ or drastically transformed. Artificial Intelligence (A.I.) has also become an integral tool for the management and processing of data, including personal data, as it provides greater accuracy and capability. How should the use of A.I. in data management be regulated and should it be treated any differently under the data protection regime? What role can A.I. play in regulating the use of personal data and as a cybersecurity tool? Is creating a form of propertisation of personal data and ‘data ownership’ useful? These are just some of the lingering questions that regulators and organisations are currently grappling with. Central to the issue is how A.I. can best serve and safeguard humanity’s interests. Warren Chik is Associate Professor of Law at SMU School of Law, and concurrently Deputy Director at SMU’s Centre for AI and Data Governance. In this podcast, he shares his recent research into Artificial Intelligence and Data Protection in Singapore, which takes a deeper look into consumers’ trust, organisational security and government regulation. Full Article
protect Iwata Label USA to Showcase Protective Labels for Vials at PACK EXPO 2024 By www.packagingstrategies.com Published On :: Tue, 01 Oct 2024 11:51:56 -0400 At its Booth W-19027, the company will showcase Vial Protect Pack II, a robust, multilayer vial protection/labeling solution for high-value or high-potency drug applications whose container breakage rates must be near-zero. Full Article
protect Rising shipping costs: How custom packaging protects your brand and bottom line By www.packagingstrategies.com Published On :: Wed, 26 Jul 2023 07:30:00 -0400 Custom packaging can help offset rising freight costs by optimizing packaging size and weight, reducing damage, streamlining logistics, and enhancing brand recognition. Full Article
protect To Protect and Serve By www.packagingstrategies.com Published On :: Thu, 13 Jun 2019 17:25:00 -0400 While the growth in online purchasing drives changes from product design, to package changes, picking, fulfilling and shipping, product protection stands alone as the main issue, according to the E-Commerce: Think Inside the Box report by PMMI, The Association for Packaging and Processing Technologies. Full Article
protect The Promise of Connected Packaging: From brand protection to consumer engagement By www.packagingstrategies.com Published On :: Mon, 14 Sep 2020 22:24:00 -0400 It is now well accepted that virtually all brands, from the utmost recognized to the newly eager, face an unprecedented onslaught of counterfeiting and gray market trading. In emerging countries, this menace is bold and audacious, with outright fakes appearing in the open marketplace. In developed countries, the problem is equally insidious due to online propagation of counterfeit products through e-commerce platforms. Full Article
protect Protective Paper-Based Wrapping System By www.packagingstrategies.com Published On :: Fri, 25 Jun 2021 14:26:00 -0400 HexcelPack’s Mini Packing Station can be used to dispense the company’s sustainable HexcelWrap cushioning paper. Full Article