Oil or Grease Lubrication?

Written by Thomas Yoon


Continued from page 1

Although it is very convenient to use grease for lubrication of rolling contact bearings, where some bearings come pre-packed with grease ready for use, grease lubrication becomes unsuitable ifrepparttar operating temperature becomes high.

The high temperature may be because of high ambient temperature environment, or becauserepparttar 133405 heat evolved inrepparttar 133406 bearing due to friction from high speed or heavy loading. Sometimesrepparttar 133407 use of oil becomes more logical ifrepparttar 133408 lubricating intervals for grease lubrication becomes too short, perhaps due to leakage from seals.

In oil lubrication,repparttar 133409 heat generated fromrepparttar 133410 bearings are able to be transfered to a larger volume of oil which in turn can be pumped through heat exchangers for cooling. In this way, repparttar 133411 oil functions both as a lubricating agent as well as a cooling agent.

Oils can also have additives to improve their properties. Some examples are anti-oxidants, corrosion protection additives, anti-foaming additives, surface tension additives, wetting agents, and extreme pressure additives. These additives are put in according torepparttar 133412 application ofrepparttar 133413 oil.

Compared to greases, oils can enable bearings to be operated at a wider range of temperatures. However, there are limits to this, especially at higher temperatures. At high temperatures of 90 degree C and above, mineral oils oxidize rapidly and they lose their properties to lubricate. Synthetic oils are increasingly being used for higher temperature applications.

Which to use? Oil or grease? The choice is yours!

"The Next Best Thing To Dazzling Tricks" Tune up, Recondition Your Autos, Bikes, Boats, Trucks, Tractors Engines and Boost Your Power! Learn from Experts. Expert Engine Books

Many years of working experience in Marine, Facilities, Construction has given the author material for writing e-books and articles related to engineering, and management. Subscribe to facworld ezine More information at Marine and M & E


The Risks of Desktop Security Software - Part 1

Written by Tim Klemmer


Continued from page 1

This information is generally available all overrepparttar web and in manuals for operating systems, especially manuals on such subjects asrepparttar 133404 Windows Registry. But havingrepparttar 133405 software teach you where things belong to be effective is powerful knowledge.

Lastly, and perhaps most significantly, isrepparttar 133406 issue of forebearance. The anti-virus vendors usually know more aboutrepparttar 133407 potential exploits inherent in programs than virus authors but they are bound byrepparttar 133408 fact that should they try to prevent them beforerepparttar 133409 exploits occur, they could be branded as irresponsible for teaching virus authors about these very exploits.

For example, when Microsoft first releasedrepparttar 133410 macro capabilities of Word, anti-virus vendors immediately realizedrepparttar 133411 potential for danger in macros, but they were handcuffed. If they released software that disabled macros beforerepparttar 133412 first macro virus was ever released, they would signal to virus authorsrepparttar 133413 inherent destructive powers of macros. They chose instead to wait, handcuffed byrepparttar 133414 limitations of desktop software.

Untilrepparttar 133415 Internet there really has been no better medium for delivering virus solutions than desktop software. It was relatively inexpensive to deploy (either marketrepparttar 133416 software and sell it in stores or provide free downloads on bulletin boards and web sites). It is, however, expensive to keep updated in terms of time and effort, even with automated update systems.

The Internet caused several things to happen: by becoming a powerful medium for sharing files, whole families of viruses disappeared practically overnight (boot sector viruses, for example); by becomingrepparttar 133417 option of choice for sharing files, it was easier to infect a single file and have thousands download it.

A better solution is to placerepparttar 133418 security software in an offsite appliance of its own making. All Internet, intranet, networking connections flow throughrepparttar 133419 appliance.

Selling offrepparttar 133420 shelf hardware appliances with built-in security software is better than a desktop software solution but it still suffers –to a lesser extent- fromrepparttar 133421 pratfalls that desktop software falls prey to.

Even better is to create a service that a 3rd party vendor manages in a secure environment. In such an instance bothrepparttar 133422 software andrepparttar 133423 hardware are away fromrepparttar 133424 prying eyes ofrepparttar 133425 malicious software authors. This further reducesrepparttar 133426 opportunity for malicious authors to discoverrepparttar 133427 tricks and techniques employed byrepparttar 133428 security vendors to protect you.

Tim Klemmer CEO, OnceRed LLC http://www.checkinmyemail.com Tim Klemmer has spent the better part of 12 years designing and perfecting the first patented behavior-based solution to malicious software.




    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use