RF Cafe Software

RF Cascade Workbook 2005 - RF Cafe
RF Cascade Workbook

Calculator Workbook
RF Workbench
Smith Chartâ„¢ for Visio
Smith Chartâ„¢ for Excel
RF & EE Symbols Word
RF Stencils for Visio

About RF Cafe

Kirt Blattenberger - RF Cafe WebmasterCopyright
1996 - 2016
Webmaster:
Kirt Blattenberger,
 BSEE - KB3UON

RF Cafe began life in 1996 as "RF Tools" in an AOL screen name web space totaling 2 MB. Its primary purpose was to provide me with ready access to commonly needed formulas and reference material while performing my work as an RF system and circuit design engineer. The Internet was still largely an unknown entity at the time and not much was available in the form of WYSIWYG ...

All trademarks, copyrights, patents, and other rights of ownership to images and text used on the RF Cafe website are hereby acknowledged.

My Hobby Website:
 AirplanesAndRockets.com

Try Using SEARCH
to Find What You Need. 
There are 1,000s of Pages Indexed on RF Cafe !

Electronics World Cover,TOC,and list of posted Popular Electronics articles QST Radio & TV News Radio-Craft Radio-Electronics Short Wave Craft Wireless World About RF Cafe RF Cafe Homepage RF Cafe in Morse Code Google Search of RF Cafe website Sitemap Electronics Equations Mathematics Equations Equations physics Manufacturers & distributors Engineer Jobs Twitter LinkedIn Crosswords Engineering Humor Kirt's Cogitations Engineering Event Calendar RF Engineering Quizzes AN/MPN-14 Radar 5CCG Notable Quotes App Notes Calculators Education Magazines Software,T-Shirts,Coffee Mugs Articles - submitted by RF Cafe visitors Simulators Technical Writings RF Cafe Archives Test Notes RF Cascade Workbook RF Stencils for Visio Shapes for Word Thank you for visiting RF Cafe!

Career and Job Hunting Advice: Your Online Presence

Infogaphic: "How Private Is Your Privacy?" (SavvyIntern.com) - RF CafeThe world is a scary place. Someone or something, somewhere, is watching most of what you do in public (which nowadays includes the Internet). Whether it be a traffic or parking lot surveillance camera, a phone call, a text message or e-mail, it is safe to assume it is all connected to an NSA (USA), GCHQ (UK), MSS (China), GID (Saudi Arabia), or MID (Russia), a computer and/or human in one or more countries (see list of intelligence agencies) is privy to your activities. They know, for instance, that you are currently reading this article on RF Cafe.com.

This interesting 'infographic' appears on the SavvyIntern.com (graphic from LawQA.com), a website that specializes on offering advice to college students and recent graduates who are either looking for the right job or are paving the way for the right job once a degree is firmly in hand. Admonitions are given all the time about being careful what you voluntarily post online, since its lifetime is essentially forever. There are services that offer to 'clean up' your Internet presence, but depending on the extent of your presence, getting rid of everything is impossible. Celebrities pay huge amounts of money to rid websites of unauthorized pictures, text messages, and other unflattering artifacts. You and I don't have that kind of money, so the best cure is prevention; that is, don't create the opportunity in the first place.

According to the "Just How Private Is Your Privacy"" infographic, the Fair Credit Reporting Act (FCRA), employers, leasing agencies, and other entities with a potential vested interest in your financial and social background have legal access to a wealth of information about you without even having to troll for the slimy stuff that might be on websites most people never visit. While it does not apply to public domain data, employers are only permitted to judge your fitness based on the most recent seven years of your history. Access to your criminal background varies from state to state, and includes topics like driving records, criminal court records, education records, bankruptcy, past employment, incarceration, citizenship status, and military service records. An FBI background check can be requested as well. Independent investigative services can dig up stuff you thought either never existed, or was securely hidden from public access. Face recognition software, for example, can be used to sort though millions of online images in an attempt to identify you, and then the investigator can research further if deemed useful.

Here is a list of current engineering jobs listed on RF Cafe.
Here is a running list of job hunting and career advice from 2015.

 

 

Posted July 16, 2015