Advantage of Using Battery Monitor for a Solar Energy System

After installing my battery monitor, it became very convenient now to get a reading for both voltage and current.  Just a few presses of a button and I could get the two values straightaway.  One more number the battery monitor displays is the percentage of the battery capacity.  Knowing how much energy is left on the batteries while running a large load is very useful just like during the power failure on the morning of Friday, February 21. In the past, I would run to my generator and start it and transfer the power of the office network to the generators.  Last Friday, I used my solar energy system and was able to support the load for the duration of the power failure.  Because my battery monitor showed me the percentage of charge left (I had the perimeter lights on the system the previous night), I knew the system can run on the batteries for at least five hours. At this time, my experiments on the solar energy system will be put on hold until I am able to acquire large solar panels.  If there are individuals or organizations who are willing to help me complete my setup and my experiments, please email me at jerome.auza@auza.net or call me at 09178898932 and we can discuss the details.  I hope my experiments can encourage the use of renewable energy systems and help reduce the cost of...

Tips on Securing Personal Information from Internet Hackers

By Jerome Auza The term ‘hackers’ used to mean something positive among computer programmers. If you are able to make a program that solves a complex computing problem, you will be called a hacker. It is a badge of honor. Until someone used the word hacker to describe someone that does malicious programs. Nowadays, people who make computer viruses and malware, or people who make attempts to defraud or steal sensitive personal information. Today’s work, entertainment and personal communications involve computers and mobile devices on a very large scale and it becomes very important to keep your personal information secure. In the 1990’s, computer viruses created by “hackers” were mostly created to destroy computer data and annoy users. Back then, computer networks is not common. In the present, most computers and mobile devices are connected to the Internet and the nature of “hacking” changed from data destruction and annoyance to fraud and theft of personal information. Software that does the work of the “hacker” is commonly termed malware. A lot of malware can be running on your computer without your knowledge because all it does is collect personal information and send that to its creator in a sneaky manner which is mostly undetected. The longer it stays there, the bigger chance it will be able to get your personal information that becomes useful to the “hacker”. Once your personal information is stolen, the “hacker” can then pretend to be you and maybe send emails to your contacts asking for money because “you” are in a foreign country and have lost all your things because you were mugged. Your helpful...