There are two main types of corrosion: dry corrosion which occurs in the absence of moisture, and wet corrosion which occurs in the presence of a conducting medium. Some common forms of corrosion include uniform corrosion, localized corrosion such as pitting and crevice corrosion, intergranular corrosion, stress corrosion cracking, and galvanic corrosion. Methods to prevent corrosion include proper metal selection, equipment design considerations, coatings and linings, altering the environment, using corrosion inhibitors, and cathodic protection methods like sacrificial anodes or impressed current systems.
14 Types of Corrosion explained in an awesome manner
Update 26 June 2019: I have enabled the Download option and now everyone can download the "Types of corrosions" PPT and reuse the slides :) I wish I have done this earlier.
Follow my blogs at https://www.geekdashboard.com/
14 Types of Corrosion explained in an awesome manner
Update 26 June 2019: I have enabled the Download option and now everyone can download the "Types of corrosions" PPT and reuse the slides :) I wish I have done this earlier.
Follow my blogs at https://www.geekdashboard.com/
A presentation covering the various methods of prevention of corrosion. Material selection, design of structures, alteration of materials, alteration of environment, cathodic & anodic protection, and coatings are the different methods used. These are briefly described.
Distribution Law
What is Distribution law?
Immiscible liquids
Explanation
APPLICATION OF DISTRIBUTION LAW
Limitations of Distribution Law
Contrast and Comparison between separation through Separating funnel and Fractional Distillation
State of matter and properties of matter (Part-6)(Relative humidity, Liquid ...Ms. Pooja Bhandare
Â
RELATIVE HUMIDITY, Humidity, Wet and Dry Hygrometer, LIQUID COMPLEX, LIQUID CRYSTALS, Types of liquid crystals, GLASSY STATES, Characteristics glassy state, Types of glassy state, What is the Glass Transition Temperature?
A presentation covering the various methods of prevention of corrosion. Material selection, design of structures, alteration of materials, alteration of environment, cathodic & anodic protection, and coatings are the different methods used. These are briefly described.
Distribution Law
What is Distribution law?
Immiscible liquids
Explanation
APPLICATION OF DISTRIBUTION LAW
Limitations of Distribution Law
Contrast and Comparison between separation through Separating funnel and Fractional Distillation
State of matter and properties of matter (Part-6)(Relative humidity, Liquid ...Ms. Pooja Bhandare
Â
RELATIVE HUMIDITY, Humidity, Wet and Dry Hygrometer, LIQUID COMPLEX, LIQUID CRYSTALS, Types of liquid crystals, GLASSY STATES, Characteristics glassy state, Types of glassy state, What is the Glass Transition Temperature?
This topic describes two main categories of corrosion. It also explains the electrochemical corrosion phenomena and the differences between the types of corrosion. This topic also states the corrosion preventive steps.
An introductory presentation on corrosion and its prevention. Importance of corrosion, cost of corrosion, various forms of corrosion, and preventive methods are given.
A brief introduction to corrosion and types of corrosion, such as pitting corrosion.
Cavitations corrosion
Galvanic corrosion.
Fretting corrosion.
Crevice corrosion.
Intergranular and transgranular corrosion,
Stress corrosion
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Â
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Â
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Â
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Â
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder â active learning and UiPath LLMs for do...UiPathCommunity
Â
đĨ Speed, accuracy, and scaling â discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Miningâĸ:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing â with little to no training required
Get an exclusive demo of the new family of UiPath LLMs â GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
đ¨âđĢ Andras Palfi, Senior Product Manager, UiPath
đŠâđĢ Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Â
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
Â
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more âmechanicalâ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Â
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overviewâ
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Â
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But thereâs more:
In a second workflow supporting the same use case, youâll see:
Your campaign sent to target colleagues for approval
If the âApproveâ button is clicked, a Jira/Zendesk ticket is created for the marketing design team
Butâif the âRejectâ button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
Â
As AI technology is pushing into IT I was wondering myself, as an âinfrastructure container kubernetes guyâ, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefitâs both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Â
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties â USA
Expansion of bot farms â how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks â Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. CORROSION
ī Corrosion is defined as the reaction of metallic material
with its environment
ī It results measurable change to the material and can
result in a functional failure of the metallic component
or of a complete system
ī Corrosion is a natural process
ī Two types
īļDry corrosion
īļwet corrosion
Sruthiâs Pharma World
3. TYPES OF CORROSION
Dry corrosion Wet corrosion
Corrosion occurs in
the absence of
moisture
In the presence of
conducting medium
slow Rapid process
Corrosion products
are produced at the
site of corrosion
Corrosion occurs at
anode but rust is
deposited at
cathode.
Sruthiâs Pharma World
5. GENERAL CORROSION
ī UNIFORM ATTACK CORROSION
ī Most common type
ī It is caused by a chemical or electro chemical
reaction that damage the entire exposed surface
of the metal
ī Two types:
īļ Physico chemical corrosion
īļ Electro chemical corrosion
Sruthiâs Pharma World
6. TYPES OF CORROSION
Physico chemical
corrosion
Electro chemical
corrosion
ī The effects are
swelling, crazing
cracking softening etc
ī E.g. plastic
Non metallic
materials
ī This type of corrosion
occurs at discrete
points of metallic
surface when
electricity flows from
cathodic area to
anodic area
Sruthiâs Pharma World
7. LOCALISED CORROSION
ī It occurs numerous ways
SPECIFIC SITE CORROSION
Mechanically weak spots or dead spots in a
reaction vessel cause specific site corrosion
Sruthiâs Pharma World
8. INTERGRANULAR CORROSION
ī A chemical or electro
chemical attack on the
grain boundaries of a
metal cause inter
granular corrosion
ī Impurities present in
the metal near to the
grain boundaries
cause corrosion
Sruthiâs Pharma World
9. INTERGRANULAR CORROSION
ī Austenitic stainless steel
with nitric acid when
properly heated it cause
intergranular corrosion
due to precipitation of
grain boundary
Sruthiâs Pharma World
10. PITTING CORROSION
ī This type of corrosion
results in development
of pits and cavities
ī They range from deep
cavities of smaller
diameter to shallow
depressions
ī E.g. alloy of aluminum
or stainless steel in the
presence of aqueous
solution and chlorides
cause cavities.
Sruthiâs Pharma World
11. CREVICE CORROSION
ī Corrosion occurs at crevices
because solutions are
retained at such places
ī Which takes longer time to
dry out
ī Acidic conditions or
depletion of oxygen in a
crevice can cause crevice
corrosion
Sruthiâs Pharma World
12. STRESS INDUCED CORROSION
ī Residual internal stress in the metal or external
applied stress accelerates the corrosion.
ī Residual internal stress is produced by
īļdeformation during fabrication
īļstress induced by rivets, bolts, shrink fits
ī Eliminating high stress areas prevents this type of
corrosion
Sruthiâs Pharma World
13. STRESS CORROSION CRACKING
ī When tensile stress
is greater than yield
stress, then cracks
develop on the
surface
Sruthiâs Pharma World
14. FRETTING CORROSION
ī Fretting corrosion occurs
when metals slide over
each other and cause
mechanical damage to
one or both
Sruthiâs Pharma World
15. FLOW RELATED CORROSION
ī Liquid metals can cause corrosion
ī E.g. mercury attack on aluminum alloy
ī Molten zinc on stainless steel
Sruthiâs Pharma World
16. IMPINGEMENT CORROSION
ī It is also referred to as erosion
corrosion
Or velocity accelerated corrosion
ī Erosion is the destruction of a
metal by abrasion and attrition
caused by the flow of liquid/gas
with or with out suspended solids
Sruthiâs Pharma World
17. CAVITATION CORROSION
ī It occurs due to the
formation of vacuum
bubbles in liquid stream
when passed over the
surface.
ī This type of corrosion
generally occur around
propellers
Sruthiâs Pharma World
19. GALVANIC CORROSION
ī Occurs when two different
metals are found together
in a corrosive electrolyte
ī A galvanic cell is formed
between two metals
ī One metal become the
anode and the other metal
become the cathode
ī The anode corrodes and
deteriorates faster while
the cathode deteriorate
more slowly
20. FLUID CORROSION-
STRUCTURAL
ī Structural strength is reduced on account of
corrosion
ī This may occur when one component of the alloy
is removed or released in to the solution
ī The corrosion products may remain in the plant
ī Two types:
īļGraphite corrosion
īļDezincification
21. GRAPHITE CORROSION
ī Graphite is an
allotropy of carbon
ī Occurs in gray iron
ī In which metallic iron
get converted in to
corrosion product
leaving a residue of
intact graphite mixed
with iron corrosive
products and other
insoluble constituents
of cast iron
22. DEZINCIFICATION
ī This is observed in
brass which contain
more than 15% zinc
ī In brass the principal
product of corrosion is
metallic copper
ī Mechanism:
ī redeposition of copper
over the corrosion
products
ī Formation of zinc
corrosion products
leaving copper residue
23. DEZINCIFICATION
ī This type of corrosion can
be decreased by adding
little amount of arsenic,
antimony, phosphorous to
the alloy
24. BIOLOGICAL CORROSION
ī Occurs due to the metabolic activity of
microorganism which cause deterioration of the
metal
ī Due to
ī changing resistance to surface film
ī Developing electrolyte concentration cells on metal
surface
ī Developing corrosive environment
ī Altering rate of anodic/cathodic reaction
25. PREVENTION OF CORROSION
METAL SELECTION:
ī The corrosion metal has a strong relation with the
environment to which it is exposed
ī Rate of corrosive attack =
26. METAL SELECTION:
ī Proper knowledge of the nature of the
environment to which the material is exposed is
very important
27. DESIGN OF EQUIPMENT
ī Proper design reduce the time and cost required
for corrosion maintenance and repair
ī Corrosion frequently happen in dead space or
crevices so we can eliminate or minimize these
areas while designing
ī A direct contact between metal should be avoided
if they are separated widely in electrochemical
series
28. COATINGS AND LININGS
ī The metals are more prone to corrosion
ī Non metal coating and linings can be applied on
steel and other materials of construction to
prevent corrosion
ī Electroplating, cladding, organic coating are the
commonly used methods
29. COATINGS AND LININGS
ī Organic coatings are used as linings in the
equipment such as tanks, piping pumping lines
and shipping containers
ī E.g. ceramic, carbon bricks
30. COATINGS AND LININGS
linings uses
Tin coated steel Food containers
Lead coating roofing
Aluminum coated steel High temperature conditions
31. ALTERING ENVIORMENT
ī Corrosion can be combated or reduced by
īļremoving air from boiler feed water prevent the
influence of water on steel.
īļ Reducing temperature
īļ Eliminating moisture
īļ Reducing the velocity or turbulence
īļ Shortening the time of exposure
32. INHIBITORS
ī The corrosion inhibitors are added to the
environment to decrease the corrosion of metals
ī These inhibitors form a protective film
inhibitor Materials protected
in medias
Chromates, phosphates iron and steel in aqueous
solution
34. SACRIFICAL ANODE METHOD
ī In this method anodes
are kept in electrical
contact with the metal
to be
protected(cathode)
ī No external current is
used
ī The electric potential
difference between
the anode and
cathode cause current
to flow
ī So the anodes are
sacrificed and goes in
35. SACRIFICAL ANODE METHOD
ī Zinc, aluminium,
magnesium and their
alloys â sacrifical anodes
ī ADVANTAGES: no
external electric current
required
ī Easy to install
DISADVANTAGES:
Frequent monitoring and
replacement of anode
required
36. IMPRESSED EMF METHOD
ī Applied current system
ī External voltage is
impressed between tank
and electrodes
ī The âve terminal of power
supply is connected to the
material to be protected so
the anode is maintained
+ve
ī Therefore the natural
galvanic effect is avoided
37. IMPRESSED EMF METHOD
ī This method is used for
large tanks to store mild
corrosive liquors
ī simple and most effective
ī Inexpensive