Tuesday, July 6, 2010

Canada

Canada (play /ˈkænədə/) is a country occupying most of northern North America, extending from the Atlantic Ocean in the east to the Pacific Ocean in the west and northward into the Arctic Ocean. It is the world's second largest country by total area. Canada's common border with the United States to the south and northwest is the longest in the world.

The land occupied by Canada was inhabited for millennia by various groups of Aboriginal peoples. Beginning in the late 15th century, British and French expeditions explored, and later settled, along the Atlantic coast. France ceded nearly all of its colonies in North America in 1763 after the Seven Years' War. In 1867, with the union of three British North American colonies through Confederation, Canada was formed as a federal dominion of four provinces.[10][11] This began an accretion of provinces and territories and a process of increasing autonomy from the United Kingdom. This widening autonomy was highlighted by the Statute of Westminster of 1931 and culminated in the Canada Act of 1982, which severed the vestiges of legal dependence on the British parliament.

A federation consisting of ten provinces and three territories, Canada is governed as a parliamentary democracy and a constitutional monarchy with Queen Elizabeth II as its head of state. It is a bilingual nation with both English and French as official languages at the federal level. One of the world's highly developed countries, Canada has a diversified economy that is reliant upon its abundant natural resources and upon trade—particularly with the United States, with which Canada has had a long and complex relationship. It is a member of the G8, G-20, NATO, OECD, WTO, Commonwealth, Francophonie, OAS, APEC, and UN.

Windows Media Services

Windows Media Services (WMS) is a streaming media server from Microsoft that allows an administrator to generate streaming media (audio/video). Only Windows Media, JPEG, and MP3 formats are supported. WMS is the successor of NetShow Services.
In addition to streaming, WMS also has the ability to cache and record streams, enforce authentication, impose various connection limits, restrict access, use multiple protocols, generate usage statistics, and apply forward error correction (FEC). It can also handle a high number of concurrent connections making it ideal[weasel words] for content providers. Streams can also be distributed between servers as part of a distribution network where each server ultimately feeds a different network/audience. Both unicast and multicast streams are supported (multicast streams also utilize a proprietary and partially encrypted Windows Media Station (*.nsc) file for use by a player.) Typically, Windows Media Player is used to decode and watch/listen to the streams, but other players are also capable of playing unencrypted Windows Media content (Microsoft Silverlight, VLC, MPlayer, etc.)

64-bit versions of Windows Media Services are also available for increased scalability. The Scalable Networking Pack for Windows Server 2003 adds support for network acceleration and hardware-based offloading, which boosts Windows Media server performance. The newest version, Windows Media Services 2008, for Windows Server 2008, includes a built-in WMS Cache/Proxy plug-in which can be used to configure a Windows Media server either as a cache/proxy server or as a reverse proxy server so that it can provide caching and proxy support to other Windows Media servers. Microsoft claims that these offloading technologies nearly double the scalability, making Windows Media Services the industry's most powerful streaming media server.

Windows Media Services 2008 is no longer included with the setup files for the Windows Server 2008 operating system, but is available as a free download.

Broadband Internet access

Broadband Internet access, often shortened to just broadband, is a high data rate Internet access—typically contrasted with dial-up access using a 56k modem.

Dial-up modems are limited to a bitrate of less than 56 kbit/s (kilobits per second) and require the full use of a telephone line—whereas broadband technologies supply more than double this rate and generally without disrupting telephone use.

Although various minimum bandwidths have been used in definitions of broadband, ranging up from 64 kbit/s up to 2.0 Mbit/s, the 2006 OECD report is typical by defining broadband as having download data transfer rates equal to or faster than 256 kbit/s, while the United States (US) Federal Communications Commission (FCC) as of 2009, defines "Basic Broadband" as data transmission speeds exceeding 768 kilobits per second (Kbps), or 768,000 bits per second, in at least one direction: downstream (from the Internet to the user’s computer) or upstream (from the user’s computer to the Internet). The trend is to raise the threshold of the broadband definition as the marketplace rolls out faster services.

Data rates are defined in terms of maximum download because several common consumer broadband technologies such as ADSL are "asymmetric"—supporting much slower maximum upload data rate than download.

phone company

A telephone company (telco or telecommunications operator) is a service provider of telecommunications services such as telephony and data communications access. Many were at one time nationalized or state-regulated monopolies. These monopolies are often referred to, primarily in Europe, as PTTs.

Telcos are also known as common carriers, and in the United States as local exchange carriers. With the advent of cellular telephony, telcos now include wireless carriers, or mobile network operators.

Most telcos now also function as internet service providers (ISPs), and the distinction between telco and ISP may disappear completely over time, as the current trend for supplier convergence in the industry continues.

Telephone companies have a range of sizes. Microtelco is a small-scale telecom operator that combine local entrepreneurship, new business models, and low-cost technologies to offer ICT services in areas of little interest to large operators.See Village telco

Remote Desktop Services

Remote Desktop Services, formerly known as Terminal Services, is one of the components of Microsoft Windows (both server and client versions) that allows a user to access applications and data on a remote computer over a network. Terminal Services is Microsoft's implementation of thin-client terminal server computing, where Windows applications, or even the entire desktop of the computer running terminal services, are made accessible to a remote client machine. The client can either be a fully-fledged computer, running any operating system as long as the terminal services protocol is supported, or a barebone machine powerful enough to support the protocol (such as Windows FLP). With terminal services, only the user interface of an application is presented at the client. Any input to it is redirected over the network to the server, where all application execution takes place.[1] This is in contrast to appstreaming systems, like Microsoft Application Virtualization, in which the applications, while still stored on a centralized server, are streamed to the client on-demand and then executed on the client machine.

Bachelor of Ayurveda, Medicine and Surgery

Bachelor of Ayurveda, Medicine and Surgery ( B.A.M.S ) is a medical degree in India, conferred to those who have studied the integrated system of modern medicine and traditional ayurveda. The degree is of five and half years duration, including 1 year internship. The person having a BAMS degree can practice anywhere in India.There is also teaching of modern anatomy,physiology,principles of medicine,social and preventive medicine,pharmacology,toxicology,forensic medicine,botany,ENT,principles of surgery,etc along with ayurvedic topics. There are post graduate courses available after BAMS, such as M.A.Sc.

Ayurvedacharya title is given to the recipient of a Bachelor Degree of Ayurvedic Medicine and Surgery (BAMS) by an accredited University.

This Sanskrit word is composed of two parts, Ayurveda means Science of Life and Acharya (lit. master). The title denotes a master or expert in the understanding and practice of Ayurveda. Doctorate also awarded.

As per Indian heritage and science "Ayurveda" is a Upaveda or anexture of four main vedas(Knowledge Systems). The famous treaties of Ayurveda, "Charaka Samhita" by sage "agnivesa",which was later redacted by sage Charaka, details the general medicine of ayurveda . "Sushruta Samhita" of Sage "Sushruta" (compiled by Buddhist Monk Abbot Nagarjuna Bodhisattva) deals Ayurvedic surgical procedures . Finally is Vaghata's Astanga Hridayam and Astanga sangraha which are independent compilation work on above two.

In the Ayurvedic system, prevention of all types of diseases have a more prominent place,including restructuring of the patient's lifestyle to align with the course of nature and the six seasons, which will help with

Blue Cross and Blue Shield Association

Blue Cross and Blue Shield developed separately, with Blue Cross plans providing coverage for hospital services, while Blue Shield covered physicians' services.

Blue Cross is a name used by an association of health insurance plans throughout the United States. Its predecessor was developed in 1929, by Justin Ford Kimball, at Baylor University in Dallas, Texas.] The first plan guaranteed teachers 21 days of hospital care for $6 a year, and was later extended to other employee groups in Dallas, and then nationally.[6] The American Hospital Association (AHA) adopted the Blue Cross symbol in 1939 as the emblem for plans meeting certain standards. In 1960 the AHA commission was superseded by the Blue Cross Association. Affiliation with the AHA was severed in 1972.

The Blue Shield concept was developed at the beginning of the 20th century by employers in lumber and mining camps of the Pacific Northwest to provide medical care by paying monthly fees to medical service bureaus composed of groups of physicians. The first official Blue Shield Plan was founded in California in 1939. In 1948 the symbol was informally adopted by nine plans called the Associated Medical Care Plan, and was later renamed the National Association of Blue Shield Plans.

In 1982 Blue Shield merged with The Blue Cross Association to form the Blue Cross and Blue Shield Association.

Prior to the Tax Reform Act of 1986, organizations administering Blue Cross Blue Shield were tax exempt under 501(c)(4) as social welfare plans. However, the Tax Reform Act of 1986 revoked that exemption because the plans sold commercial-type insurance. They became 501(m) organizations, subject to federal taxation but entitled to "special tax benefits" under IRC 833. In 1994, the Blue Cross Blue Shield Association changed to allow its licensees to be for-profit corporations. Some plans[specify] are still considered not-for-profit at the state level.

Affiliate marketing

Affiliate marketing is a marketing practice in which a business rewards one or more affiliates for each visitor or customer brought about by the affiliate's marketing efforts. Examples include rewards sites, where users are rewarded with cash or gifts, for the completion of an offer, and the referral of others to the site. The industry has four core players: the merchant (also known as 'retailer' or 'brand'), the network, the publisher (also known as 'the affiliate') and the customer. The market has grown in complexity to warrant a secondary tier of players, including affiliate management agencies, super-affiliates and specialized third parties vendors.

Affiliate marketing overlaps with other Internet marketing methods to some degree, because affiliates often use regular advertising methods. Those methods include organic search engine optimization, paid search engine marketing, e-mail marketing, and in some sense display advertising. On the other hand, affiliates sometimes use less orthodox techniques, such as publishing reviews of products or services offered by a partner.

Affiliate marketing—using one website to drive traffic to another—is a form of online marketing, which is frequently overlooked by advertisers. While search engines, e-mail, and website syndication capture much of the attention of online retailers, affiliate marketing carries a much lower profile. Still, affiliates continue to play a significant role in e-retailers' marketing strategies.

Airport terminal

An airport terminal is a building at an airport where passengers transfer between ground transportation and the facilities that allow them to board and disembark from aircraft.

Within the terminal, passengers purchase tickets, transfer their luggage, and go through security. The buildings that provide access to the airplanes (via gates) are typically called concourses. However, the terms "terminal" and "concourse" are sometimes used interchangeably, depending on the configuration of the airport.

Smaller airports have one terminal while larger airports have several terminals and/or concourses. At small airports, the single terminal building typically serves all of the functions of a terminal and a concourse.

Some larger airports have one terminal that is connected to multiple concourses via walkways, sky-bridges, or underground tunnels (such as Denver International Airport). Some larger airports have more than one terminal, each with one or more concourses (such as New York's La Guardia Airport). Still other larger airports have multiple terminals each of which incorporate the functions of a concourse (such as Dallas/Fort Worth International Airport).

Most airport terminals are built in a plain style. However, some, such as Baghdad International Airport, are monumental in stature, while others are considered architectural masterpieces, such as Terminal 1 at Charles de Gaulle airport near Paris or Terminal 5 at New York's JFK Airport. A few are designed to reflect the culture of a particular area, some examples being the terminal at Albuquerque International Sunport in New Mexico, which is designed in the Pueblo Revival style popularized by architect John Gaw Meem, as well as the terminal at Bahías de Huatulco International Airport in Huatulco, Oaxaca, Mexico, which features some palapas that are interconnected to form the airport terminal.

Associate's degree

An associate's degree is an undergraduate academic degree awarded by community colleges, junior colleges, technical colleges and some four-year bachelors degree-granting colleges and universities upon completion of a course of study usually lasting two years. In the United States and, uncommonly, in Canada, an associate's degree is equivalent to the first two years of a four-year college or university degree. It is the lowest in the hierarchy of post-secondary academic degrees offered in these countries.

It is roughly equivalent to the foundation degree and the Business and Technology Education Council's Higher National Diploma in Britain, the two-year General Academic Studies Degree (French: diplôme d'études universitaires générales, DEUG) in France, the Further Education and Training Awards Council's Advanced Certificate and Higher Education and Training Awards Council's Higher National Certificate in the Republic of Ireland. In 2000, Hong Kong introduced associate's degrees, as an equivalence to higher diplomas. These programmes are mainly provided through affiliated colleges at universities. In 2004, Australia added "associate degree" to the Australian Qualifications Framework. This title was given to more academically focused advanced diploma courses. However, very few courses yet use the new title.

Thursday, July 1, 2010

Computer data storage

Computer data storage, often called storage or memory, refers to computer components and recording media that retain digital data used for computing for some interval of time. Computer data storage provides one of the core functions of the modern computer, that of information retention. It is one of the fundamental components of all modern computers, and coupled with a central processing unit (CPU, a processor), implements the basic computer model used since the 1940s.

In contemporary usage, memory usually refers to a form of semiconductor storage known as random-access memory (RAM) and sometimes other forms of fast but temporary storage. Similarly, storage today more commonly refers to mass storage — optical discs, forms of magnetic storage like hard disk drives, and other types slower than RAM, but of a more permanent nature. Historically, memory and storage were respectively called main memory and secondary storage (or auxiliary storage). Auxiliary storage (or auxiliary memory units) was also used to represent memory which was not directly accessible by the CPU (secondary or tertiary storage). The terms internal memory and external memory are also used.

The contemporary distinctions are helpful, because they are also fundamental to the architecture of computers in general. The distinctions also reflect an important and significant technical difference between memory and mass storage devices, which has been blurred by the historical usage of the term storage. Nevertheless, this article uses the traditional nomenclature.

Laser hair removal

Epilation by laser was performed experimentally for about 20 years before it became commercially available in the mid 1970s. Intense Pulsed Light (IPL) epilators, though technically not a laser, use xenon flash lamps that emit full spectrum light. Laser and light-based methods, sometimes called phototricholysis or photoepilation, are now most commonly referred to collectively as "laser hair removal". One of the first published articles describing laser hair removal was authored by the group at Massachusetts General Hospital in 1998.

The efficacy of laser hair removal is now generally accepted in the dermatology community, and laser hair removal is widely practiced. Many reviews of laser hair removal methods, safety, and efficacy have been published in the dermatology literature.

Domain name registry

A domain name registry, is a database of all domain names registered in a top-level domain. A registry operator, also called a Network Information Center (NIC), is the part of the Domain Name System (DNS) of the Internet that keeps the database of domain names, and generates the zone files which convert domain names to IP addresses. Each NIC is an organisation that manages the registration of Domain names within the top-level domains for which it is responsible, controls the policies of domain name allocation, and technically operates its top-level domain. It is potentially distinct from a domain name registrar.

Domain names are managed under a hierarchy headed by the Internet Assigned Numbers Authority (IANA), which manages the top of the DNS tree by administrating the data in the root nameservers.

IANA also operates the .int registry for intergovernmental organisations, the .arpa zone for protocol administration purposes, and other critical zones such as root-servers.net.

IANA delegates all other domain name authority to other domain name registries such as VeriSign.

Country code top-level domains (ccTLD) are delegated by IANA to national registries such as DENIC in Germany and Nominet in the United Kingdom

Mesothelioma

Mesothelioma, more precisely malignant mesothelioma, is a rare form of cancer that develops from the protective lining that covers many of the body's internal organs, the mesothelium. It is usually caused by exposure to asbestos.

Its most common site is the pleura (outer lining of the lungs and internal chest wall), but it may also occur in the peritoneum (the lining of the abdominal cavity), the heart, the pericardium (a sac that surrounds the heart) or tunica vaginalis.

Most people who develop mesothelioma have worked on jobs where they inhaled asbestos particles, or they have been exposed to asbestos dust and fiber in other ways. It has also been suggested that washing the clothes of a family member who worked with asbestos can put a person at risk for developing mesothelioma. Unlike lung cancer, there is no association between mesothelioma and smoking, but smoking greatly increases the risk of other asbestos-induced cancers. Compensation via asbestos funds or lawsuits is an important issue in mesothelioma (see asbestos and the law).

The symptoms of mesothelioma include shortness of breath due to pleural effusion (fluid between the lung and the chest wall) or chest wall pain, and general symptoms such as weight loss. The diagnosis may be suspected with chest X-ray and CT scan, and is confirmed with a biopsy (tissue sample) and microscopic examination. A thoracoscopy (inserting a tube with a camera into the chest) can be used to take biopsies. It allows the introduction of substances such as talc to obliterate the pleural space (called pleurodesis), which prevents more fluid from accumulating and pressing on the lung. Despite treatment with chemotherapy, radiation therapy or sometimes surgery, the disease carries a poor prognosis. Research about screening tests for the early detection of mesothelioma is ongoing.

Internet marketing

The Internet has brought media to a global audience. The interactive nature of Internet marketing in terms of providing instant response and eliciting responses, is a unique quality of the medium. Internet marketing is sometimes considered to have a broader scope because it not only refers to the Internet, e-mail, and wireless media, but it includes management of digital customer data and electronic customer relationship management (ECRM) systems.

Internet marketing ties together creative and technical aspects of the Internet, including: design, development, advertising, and sales.

Internet marketing also refers to the placement of media along many different stages of the customer engagement cycle through search engine marketing (SEM), search engine optimization (SEO), banner ads on specific websites, e-mail marketing, and Web 2.0 strategies. In 2008 The New York Times, working with comScore, published an initial estimate to quantify the user data collected by large Internet-based companies. Counting four types of interactions with company websites in addition to the hits from advertisements served from advertising networks, the authors found the potential for collecting data upward of 2,500 times on average per user per month.

Mobile phone radiation and health

The effect mobile phone radiation has on human health is the subject of recent interest and study, as a result of the enormous increase in mobile phone usage throughout the world (as of June 2009[update], there were more than 4.3 billion users worldwide). Mobile phones use electromagnetic radiation in the microwave range, which some believe may be harmful to human health. A large body of research exists, both epidemiological and experimental, in non-human animals and in humans, that shows overall no evidence for harmful effects. Other digital wireless systems, such as data communication networks produce similar radiation.

The World Health Organization, based upon the consensus view of the scientific and medical communities, has stated that cancer is unlikely to be caused by cellular phones or their base stations and that reviews have found no convincing evidence for other health effects. The WHO expects to make recommendations about mobile phones in 2010. Some national radiation advisory authorities have recommended measures to minimize exposure to their citizens as a precautionary approach.

i-broker

An i-broker is a "banker for data" or "ISP for identity services" — a trusted third party that helps individuals and organizations share private data the same way banks help exchange funds and ISPs help exchange e-mail and files. The term was introduced in the Social Web paper describing how a new layer of Internet infrastructure is possible based on the OASIS XRI and XDI specifications. However the concept of an i-broker is not specific to any one technology or protocol, but rather a business and social function, similar to that of a bank or an ISP.

Just as banks offer a wide range of financial services associated with an account, and ISPs a wide range of Internet services, i-brokers will offer a wide range of identity and data sharing applications. As with e-mail and web hosting, some i-brokers will specialize in services for personal account holders, some will concentrate on the business and government market, and some will be full-service brokers handling all types of accounts. In all cases, the sensitivity of the data involved will demand of i-brokers the same high standards of accountability and trust demanded in the global banking system. Unlike the banking system, however, it is unlikely i-brokers will be highly regulated. Instead good behavior is more likely to be enforced by online reputation systems.

Just as people use different banking and brokerage accounts for different financial services, they are likely to use multiple i-brokers for sharing different sets of data (personal, financial, medical, vocational, etc.). However with data sharing technology such as XDI link contracts, an account holder can choose to link all of their i-broker accounts, or selected accounts, or none at all — the same way a web site author determines which pages on the site link to each other.

As more digital identity protocols and standards come to market, other types of service providers will be in a position offer i-brokering services, including social networks, portals, domain name registrars, internet service providers (ISPs), banks, insurance companies, wired and wireless phone companies and e-commerce sites.

XDI.org is the first public trust organization for i-brokers. XDI.org maintains a set of Global Services Specifications (GSS) governing i-broker accreditation and policy management, and a set of I-Services Specifications (ISS) defining interoperable identity services.

I-Brokers are sometimes referred to as a homesite, or PIP (Personal Identity Provider), or IdP (Identity Provider)

Friday, June 4, 2010

Laptop Computer

A laptop is a personal computer designed for mobile use and small and light enough to sit on a person's lap while in use. A laptop integrates most of the typical components of a desktop computer, including a display, a keyboard, a pointing device (a touchpad, also known as a trackpad, and/or a pointing stick), speakers, and often including a battery, into a single small and light unit. The rechargeable battery (if present) is charged from an AC adapter and typically stores enough energy to run the laptop for three to five hours in its initial state, depending on the configuration and power management of the computer.

Laptops are usually notebook-shaped with thicknesses between 0.7–1.5 inches (18–38 mm) and dimensions ranging from 10x8 inches (27x22cm, 13" display) to 15x11 inches (39x28cm, 17" display) and up. Modern laptops weigh 3 to 12 pounds (1.4 to 5.4 kg); older laptops were usually heavier. Most laptops are designed in the flip form factor to protect the screen and the keyboard when closed. Modern tablet laptops have a complex joint between the keyboard housing and the display, permitting the display panel to swivel and then lie flat on the keyboard housing.

Laptops were originally considered to be "a small niche market" and were thought suitable mostly for "specialized field applications" such as "the military, the Internal Revenue Service, accountants and sales representatives". But today, there are already more laptops than desktops in businesses, and laptops are becoming obligatory[clarification needed][citation needed] for student use and more popular for general use. In 2008 and 2009 more laptops than desktops were sold in the US

Email Hosting

An e-mail hosting service is an Internet hosting service that runs e-mail servers.

E-mail hosting services usually offer premium e-mail at a cost as opposed to advertising supported free e-mail or free webmail. E-mail hosting services thus differ from typical end-user e-mail providers such as webmail sites. They cater mostly to demanding e-mail users and Small and Mid Size (SME) businesses, while larger enterprises usually run their own e-mail hosting service. E-mail hosting providers allow for premium e-mail services along with custom configurations and large number of accounts. In addition, hosting providers manage user's own domain name, including any e-mail authentication scheme that the domain owner wishes to enforce in order to convey the meaning that using a specific domain name identifies and qualifies e-mail senders.

Most e-mail hosting providers offer advanced premium e-mail solutions hosted on dedicated custom e-mail platforms. The technology and offerings of different e-mail hosting providers can therefore vary with different needs. E-mail offered by most webhosting companies is usually more basic standardized POP3 based e-mail and webmail based on open source webmail applications like Horde or SquirrelMail. Almost all webhosting providers offer standard basic e-mail while not all e-mail hosting providers offer webhosting.

Videoconferencing

Videoconferencing uses telecommunications of audio and video to bring people at different sites together for a meeting. This can be as simple as a conversation between two people in private offices (point-to-point) or involve several sites (multi-point) with more than one person in large rooms at different sites. Besides the audio and visual transmission of meeting activities, videoconferencing can be used to share documents, computer-displayed information, and whiteboards.

Simple analog videoconferences could be established as early as the invention of the television. Such videoconferencing systems usually consisted of two closed-circuit television systems connected via cable. An example of that was the German Reich Postzentralamt (Post Office) network set up in Berlin and several other cities from 1936 to 1940.

During the first manned space flights, NASA used two radiofrequency (UHF or VHF) links, one in each direction. TV channels routinely use this kind of videoconferencing when reporting from distant locations, for instance. Then mobile links to satellites using specially equipped trucks became rather common.

This technique was very expensive, though, and could not be used for applications such as telemedicine, distance education, and business meetings. Attempts at using normal telephony networks to transmit slow-scan video, such as the first systems developed by AT&T, failed mostly due to the poor picture quality and the lack of efficient video compression techniques. The greater 1 MHz bandwidth and 6 Mbit/s bit rate of Picturephone in the 1970s also did not cause the service to prosper.

It was only in the 1980s that digital telephony transmission networks became possible, such as ISDN, assuring a minimum bit rate (usually 128 kilobits/s) for compressed video and audio transmission. The first dedicated systems started to appear in the market as ISDN networks were expanding throughout the world. Video teleconference systems throughout the 1990s rapidly evolved from highly expensive proprietary equipment, software and network requirements to standards based technology that is readily available to the general public at a reasonable cost.

Finally, in the 1990s, IP (Internet Protocol) based videoconferencing became possible, and more efficient video compression technologies were developed, permitting desktop, or personal computer (PC)-based videoconferencing. In 1992 CU-SeeMe was developed at Cornell by Tim Dorcey et al. In the 2000s, VTC finally arrived for the masses via free services, web plugins and on-line telecommunication programs which brought cheap, albeit low-quality, videoconferencing to almost every home with an Internet connection.

Credit counseling

Credit counseling (known in the United Kingdom as debt counseling) is a process offering education to consumers about how to avoid incurring debts that cannot be repaid through establishing an effective Debt Management Plan and Budget. Credit counseling is usually less typified by functions of credit education or the psychology of spending habits, rather credit counseling establishes a planned method of debt relief, typically through a Debt Management Plan.

Credit counseling often involves negotiating with creditors to establish a debt management plan (DMP) for a consumer. A DMP may help the debtor repay his or her debt by working out a repayment plan with the creditor. DMPs, set up by credit counselors, usually offer reduced payments, fees and interest rates to the client. Credit counselors refer to the terms dictated by the creditors to determine payments or interest reductions offered to consumers in a debt management plan.

Credit (finance)

Credit is the provision of resources (such as granting a loan) by one party to another party where that second party does not reimburse the first party immediately, thereby generating a debt, and instead arranges either to repay or return those resources (or material(s) of equal value) at a later date. It is any form of deferred payment. The first party is called a creditor, also known as a lender, while the second party is called a debtor, also known as a borrower.

Movements of financial capital are normally dependent on either credit or equity transfers. Credit is in turn dependent on the reputation or creditworthiness of the entity which takes responsibility for the funds.

Credit need not necessarily be based on formal monetary systems. The credit concept can be applied in barter economies based on the direct exchange of goods and services, and some would go so far as to suggest that the true nature of money is best described as a representation of the credit-debt relationships that exist in society (Ingham 2004 p.12-19).

Credit is denominated by a unit of account. Unlike money (by a strict definition), credit itself cannot act as a unit of account. However, many forms of credit can readily act as a medium of exchange. As such, various forms of credit are frequently referred to as money and are included in estimates of the money supply.

Credit is also traded in the market. The purest form is the credit default swap market, which is essentially a traded market in credit insurance. A credit default swap represents the price at which two parties exchange this risk – the protection "seller" takes the risk of default of the credit in return for a payment, commonly denoted in basis points (one basis point is 1/100 of a percent) of the notional amount to be referenced, while the protection "buyer" pays this premium and in the case of default of the underlying (a loan, bond or other receivable), delivers this receivable to the protection seller and receives from the seller the par amount (that is, is made whole).

Online Banking

The precursor for the modern home online banking services were the distance banking services over electronic media from the early '80s. The term online became popular in the late '80s and referred to the use of a terminal, keyboard and TV (or monitor) to access the banking system using a phone line. ‘Home banking’ can also refer to the use of a numeric keypad to send tones down a phone line with instructions to the bank. Online services started in New York in 1981 when four of the city’s major banks (Citibank, Chase Manhattan, Chemical and Manufacturers Hanover) offered home banking services using the videotex system. Because of the commercial failure of videotex these banking services never became popular except in France where the use of videotex (Minitel) was subsidised by the telecom provider and the UK, where the Prestel system was used.

The UK’s first home online banking services was set up by Bank of Scotland for customers of the Nottingham Building Society (NBS) in 1983 ("History of the Nottingham". http://www.thenottingham.com/main.asp?p=1710. Retrieved 2007-12-14. ). The system used was based on the UK's Prestel system and used a computer, such as the BBC Micro, or keyboard (Tandata Td1400) connected to the telephone system and television set. The system (known as 'Homelink') allowed on-line viewing of statements, bank transfers and bill payments. In order to make bank transfers and bill payments, a written instruction giving details of the intended recipient had to be sent to the NBS who set the details up on the Homelink system. Typical recipients were gas, electricity and telephone companies and accounts with other banks. Details of payments to be made were input into the NBS system by the account holder via Prestel. A cheque was then sent by NBS to the payee and an advice giving details of the payment was sent to the account holder. BACS was later used to transfer the payment directly.

Stanford Federal Credit Union was the first financial institution to offer online internet banking services to all of its members in Oct, 1994.

Today, many banks are internet only banks. Unlike their predecessors, these internet only banks do not maintain brick and mortar bank branches. Instead, they typically differentiate themselves by offering better interest rates and online banking features.

Satellite television

The first satellite television signal was relayed from Europe to the Telstar satellite over North America in 1962. The first geosynchronous communication satellite, Syncom 2, was launched in 1963. The world's first commercial communication satellite, called Intelsat I (nicknamed Early Bird), was launched into synchronous orbit on April 6, 1965. The first national network of satellite television, called Orbita, was created in Soviet Union in 1967, and was based on the principle of using the highly elliptical Molniya satellite for re-broadcasting and delivering of TV signal to ground downlink stations. The first domestic North American satellite to carry television was Canada’s geostationary Anik 1, which was launched in 1972.[1] ATS-6, the world's first experimental educational and Direct Broadcast Satellite, was launched in 1974. The first Soviet geostationary satellite to carry Direct-To-Home television, called Ekran, was launched in 1976.

Satellite

In the context of spaceflight, a satellite is an object which has been placed into orbit by human endeavor. Such objects are sometimes called artificial satellites to distinguish them from natural satellites such as the Moon.

The first artificial satellite, Sputnik 1, was launched by the Soviet Union in 1957. By 2010 thousands of satellites have been launched into orbit around the Earth. These originate from more than 50 countries and have used the satellite launching capabilities of ten nations. A few hundred satellites are currently operational, whereas thousands of unused satellites and satellite fragments orbit the Earth as space debris. A few space probes have been placed into orbit around other bodies and become artificial satellites to the Moon, Venus, Mars, Jupiter and Saturn.

Satellites are used for a large number of purposes. Common types include military and civilian Earth observation satellites, communications satellites, navigation satellites, weather satellites, and research satellites. Space stations and human spacecraft in orbit are also satellites. Satellite orbits vary greatly, depending on the purpose of the satellite, and are classified in a number of ways. Well-known (overlapping) classes include low Earth orbit, polar orbit, and geostationary orbit.

Satellites are usually semi-independent computer-controlled systems. Satellite subsystems attend many tasks, such as power generation, thermal control, telemetry, attitude control and orbit control.

Web hosting service

A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their own website accessible via the World Wide Web. Web hosts are companies that provide space on a server they own or lease for use by their clients as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet for servers they do not own to be located in their data center, called colocation.

The scope of hosting services varies widely. The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) or a Web interface. The files are usually delivered to the Web "as is" or with little processing. Many Internet service providers (ISPs) offer this service free to their subscribers. People can also obtain Web page hosting from other, alternative service providers. Personal web site hosting is typically free, advertisement-sponsored, or inexpensive. Business web site hosting often has a higher expense.

Single page hosting is generally sufficient only for personal web pages. A complex site calls for a more comprehensive package that provides database support and application development platforms (e.g. PHP, Java, Ruby on Rails, ColdFusion, and ASP.NET). These facilities allow the customers to write or install scripts for applications like forums and content management. For e-commerce, SSL is also highly recommended.

The host may also provide an interface or control panel for managing the Web server and installing scripts as well as other services like e-mail. Some hosts specialize in certain software or services (e.g. e-commerce). They are commonly used by larger companies to outsource network infrastructure to a hosting company.

Tuesday, May 25, 2010

Domain Name

A domain name is an identification label that defines a realm of administrative autonomy, authority, or control on the Internet, based on the Domain Name System (DNS).

Domain names are used in various networking contexts and application-specific naming and addressing purposes. They are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains com, net and org, and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet, run web sites, or create other publicly accessible Internet resources. The registration of these domain names is usually administered by domain name registrars who sell their services to the public.

Individual Internet host computers use domain names as host identifiers, or hostnames. Hostnames are the leaf labels in the domain name system usually without further subordinate domain name space. Hostnames appear as a component in Uniform Resource Locators (URLs) for Internet resources such as web sites (google.com).

Domain names are also used as simple identification labels to indicate ownership or control of a resource. Such examples are the realm identifiers used in the Session Initiation Protocol (SIP), the DomainKeys used to verify DNS domains in e-mail systems, and in many other Uniform Resource Identifiers (URIs).

An important purpose of domain names is to provide easily recognizable and memorizable names to numerically addressed Internet resources. This abstraction allows any resource (e.g., website) to be moved to a different physical location in the address topology of the network, globally or locally in an intranet. Such a move usually requires changing the IP address of a resource and the corresponding translation of this IP address to and from its domain name.

Domain names are often referred to simply as domains and domain name registrants are frequently referred to as domain owners, although domain name registration with a registrar does not confer any legal ownership of the domain name, only an exclusive right of use.

This article primarily discusses the group of domain names that are offered by domain name registrars for registration by the public. The Domain Name System article discusses the technical facilities and infrastructure of the domain name space and the hostname article deals with specific information about the use of domain names as identifiers of network hosts.

Dedicated Hosting

A dedicated hosting service, dedicated server, or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc. Server administration can usually be provided by the hosting company as an add-on service. In some cases a dedicated server can offer less overhead and a larger return on investment. Dedicated servers are most often housed in data centers, similar to colocation facilities, providing redundant power sources and HVAC systems. In contrast to colocation, the server hardware is owned by the provider and in some cases they will provide support for your operating system or applications.

Web Hosting

A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their own website accessible via the World Wide Web. Web hosts are companies that provide space on a server they own or lease for use by their clients as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet for servers they do not own to be located in their data center, called colocation.

The scope of hosting services varies widely. The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) or a Web interface. The files are usually delivered to the Web "as is" or with little processing. Many Internet service providers (ISPs) offer this service free to their subscribers. People can also obtain Web page hosting from other, alternative service providers. Personal web site hosting is typically free, advertisement-sponsored, or inexpensive. Business web site hosting often has a higher expense.

Single page hosting is generally sufficient only for personal web pages. A complex site calls for a more comprehensive package that provides database support and application development platforms (e.g. PHP, Java, Ruby on Rails, ColdFusion, and ASP.NET). These facilities allow the customers to write or install scripts for applications like forums and content management. For e-commerce, SSL is also highly recommended.

The host may also provide an interface or control panel for managing the Web server and installing scripts as well as other services like e-mail. Some hosts specialize in certain software or services (e.g. e-commerce). They are commonly used by larger companies to outsource network infrastructure to a hosting company.

Work-at-home

A Work-at-Home scheme is a get-rich-quick scheme in which a victim is lured by an offer to be employed at home, very often doing some simple task in a minimal amount of time with a large amount of income that far exceeds the market rate for the type of work. The true purpose of such an offer is for the perpetrator to extort money from the victim.

Work-at-home schemes have been around for decades. Originally found as ads in newspapers or magazines, they have expanded to more high-tech media, such as television and radio ads, and on the Internet.

Legitimate work-at-home opportunities do exist, and many people do their jobs in the comfort of their own homes. But anyone seeking such an employment opportunity must be wary of accepting a home employment offer, as only about one in 42 such ads have been determined to be legitimate [1]. Most legitimate jobs at home require some form of post-high-school education, such as a college degree or certificate, or trade school, and some experience in the field in an office or other supervised setting. Additionally, many legitimate at-home jobs are not like those in schemes are portrayed to be, as they are often performed at least some of the time in the company's office, require more self discipline than a traditional job, and have a higher risk of firing.

Saturday, May 22, 2010

Spy cam

A Spy Cam is a type of micro DVR which is built into a deceptive package and made to resemble a small object, such as a key fob, a wrist watch, or a lipstick case. Known by numerous terms such as cam stick, gum cam, thumb cam, etc., these devices will often function according to their apparent purpose, as in a pen cam that actually writes.

Starting in 2008, spy cams became increasingly popular due to their falling prices. This was a consequence of advances in flash memory technology, which made available cheap, surface-mount chips of over a gigabyte capacity, which meant that the cams could typically record over an hour of video onto built-in memory before needing to offload their recorded content.

A typical spy cam runs off of a rechargeable lithium ion or lithium polymer battery, has small, colored LEDs to indicate its operational status, and is controlled by switches and/or buttons on its surface. It may also have a slot/receptacle for a micro SD flash memory card which will expand it's recording capacity by several hours. In order to offload the recorded video, it must be connected to a computer's USB port, at which point it will function as a conventional thumb drive that contains standard video files.

Spyware

Spyware is a type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

While the term spyware suggests that software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.

Spam Filter

Bayesian spam filtering (pronounced /ˈbeɪzi.ən/ BAY-zee-ən, after Rev. Thomas Bayes) is a statistical technique of e-mail filtering. It makes use of a naive Bayes classifier to identify spam e-mail.

The first known mail-filtering program to use a Bayes classifier was Jason Rennie's iFile program, released in 1996. The program was used to sort mail into folders. The first scholarly publication on Bayesian spam filtering was by Sahami et al. (1998). Variants of the basic technique have been implemented in a number of research works and commercial software products.

Bayesian spam filtering has become a popular mechanism to distinguish illegitimate spam email from legitimate email (sometimes called "ham" or "bacn"). Many modern mail clients implement Bayesian spam filtering. Users can also install separate email filtering programs. Server-side email filters, such as DSPAM, SpamAssassin, SpamBayes, Bogofilter and ASSP, make use of Bayesian spam filtering techniques, and the functionality is sometimes embedded within mail server software itself.

Voice over Internet Protocol

Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks. Other terms frequently encountered and synonymous with VOIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.

Internet telephony refers to communications services — voice, facsimile, and/or voice-messaging applications — that are transported via the Internet, rather than the public switched telephone network (PSTN). The basic steps involved in originating an Internet telephone call are conversion of the analog voice signal to digital format and compression/translation of the signal into Internet protocol (IP) packets for transmission over the Internet; the process is reversed at the receiving end.

VOIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an audio stream. Codec use is varied between different implementations of VOIP (and often a range of codecs are used); some implementations rely on narrowband and compressed speech, while others support high fidelity stereo codecs.

Distance Learning

Distance education, or distance learning, is a field of education that focuses on the pedagogy, technology, and instructional system designs that aim to deliver education to students who are not physically "on site" in a traditional classroom or campus। It has been described as "a process to create and provide access to learning when the source of information and the learners are separated by time and distance, or both." other words, distance learning is the process of creating an educational experience of equal quality for the learner to best suit their needs outside the classroom. Distance education courses that require a physical on-site presence for any reason (including taking examinations) is considered a hybrid or blended course of study. This emerging technology is becoming widely used in universities and institutions around the globe.With the recent trend of technological advance, distance learning is becoming more recognized for its potential in providing individualized attention and communication with students internationally. The most widely cited[citation needed] pedagogical theory of distance education is that of "transactional distance".

Thursday, May 20, 2010

Weight Loss

Intentional weight loss refers to the loss of total body mass in an effort to improve fitness and health, and to change appearance.

Therapeutic weight loss, in individuals who are overweight or obese, can decrease the likelihood of developing diseases such as diabetes, heart disease, high blood pressure, stroke, osteoarthritis, and certain types of cancer.

Attention to diet in particular can be extremely beneficial in reducing the impact of diabetes and other health risks of an overweight or obese individual.

Weight loss occurs when an individual is in a state of negative energy balance. When the body is consuming more energy (i.e. in work and heat) than it is gaining (i.e. from food or other nutritional supplements), it will use stored reserves from fat or muscle, gradually leading to weight loss.[citation needed]

It is not uncommon for some people who are currently at their ideal body weight to seek additional weight loss in order to improve athletic performance, and/or meet required weight classification for participation in a sport. However, others may be driven by achieving a more attractive body image. Consequently, being underweight is associated with health risks such as difficulty fighting off infection, osteoporosis, decreased muscle strength, trouble regulating body temperature and even increased risk of death

Education and educ

Medical education is a lifelong process embracing premedical experience, undergraduate education, general clinical training, specialist or vocational training, subspecialty training, and continuing medical education. Although medical education was once seen as the province of medical schools and teaching hospitals, large and increasing numbers of practitioners now provide teaching and promotion of learning outside the traditional environment.

Over the past decade both the university sector and the NHS have seen considerable change and increased accountability for their activities, and all the signs suggest that the next 10 years will be no different. Simultaneously, medical schools are having to acknowledge the implementation of new curricula, the consequences of new health service priorities, an increase in the number of medical students, and the implications of the report from the National Committee of Enquiry into Higher Education, chaired by Sir Ron Dearing.1

Investing in the world

Investment is the commitment of money or capital to purchase financial instruments or other assets in order to gain profitable returns in form of interest, income, or appreciation of the value of the instrument. is related to saving or deferring consumption. Investment is involved in many areas of the economy, such as business management and finance no matter for households, firms, or governments. An investment involves the choice by an individual or an organization such as a pension fund, after some analysis or thought, to place or lend money in a vehicle, instrument or asset, such as property, commodity, stock, bond, financial derivatives (e.g. futures or options), or the foreign asset denominated in foreign currency, that has certain level of risk and provides the possibility of generating returns over a period of time.

Investment comes with the risk of the loss of the principal sum. The investment that has not been thoroughly analyzed can be highly risky with respect to the investment owner because the possibility of losing money is not within the owner's control. The difference between speculation and investment can be subtle. It depends on the investment owner's mind whether the purpose is for lending the resource to someone else for economic purpose or not.

In the case of investment, rather than store the good produced or its money equivalent, the investor chooses to use that good either to create a durable consumer or producer good, or to lend the original saved good to another in exchange for either interest or a share of the profits. In the first case, the individual creates durable consumer goods, hoping the services from the good will make his life better. In the second, the individual becomes an entrepreneur using the resource to produce goods and services for others in the hope of a profitable sale. The third case describes a lender, and the fourth describes an investor in a share of the business. In each case, the consumer obtains a durable asset or investment, and accounts for that asset by recording an equivalent liability. As time passes, and both prices and interest rates change, the value of the asset and liability also change.



Tuesday, May 18, 2010

Cash Advance

Short term loans provide the needed cash to meet immediate short-term cash flow problems.

They are not a solution for longer term financial problems for which other kinds of financing (such as credit cards, an overdraft loan or a loan from friends or family) may be more appropriate and affordable.

You may want to discuss your financial situation with a non profit credit counseling service available to consumers experiencing financial problems in your community.

Lenders check your credit report, your credit score, and your debt analysis to make credit and loan decisions about you. Find out what's on your report.

private jets

Private Jets is a power pop quartet from Sweden, founded in 2001 by twin brothers Erik Westin and Per Westin.

The band started out as a song writing project, the brothers curious to see if they could mix their influences of pop, rock and jazz into their own brand of power pop with ambiguous lyrics and smart arrangements. When pushed by pop enthusiasts to record some of the songs, they realized that they had to put a band together. Janne Hellman was recruited as lead vocalist together with Mikael Olsson on bass, Olsson who had previous worked with the brothers in the hi-speed pop outfit Revolver Bop Agents.

First release Private Jets released the debut EP “A Four Leaf Clover in E-Major” on May 27, 2002 on Sparkplug Records. It contained four songs and a short snippet and was well received by the power pop community. The songs were written, arranged, produced and to a large extent performed by the brothers. Lead vocals was provided by Janne Hellman on all tracks and Olsson played bass on the song Millionseller.

In a radio interview on Swedish Radio, Erik Westin explained that the band were basically writing what they wanted to hear but couldn’t really seem to find anywhere. He also said that the ambition with the band is to write the ultimate pop song over and over again.

Second release After the release of “A Four Leaf Clover in E-Major” the brothers started to work on a new album. The band bio states that they wrote 43 new songs to be able to make an album filled with singles only. It says that they would strive for nothing less than power pop perfection. Of the songs written, the band chose to record twelve, and the result can be heard on the album “Jet Sounds”, released on May 26, 2008.

Live gigs In May 2008 Private Jets made their live debut at the Cavern Club in Liverpool, playing the International Pop Overthrow. An extra show was added.

On Saturday November 7, 2008, the band played at the International Pop Overthrow in New York City, performing at Kenny’s Castaways in Greenwich Village.

Acne vulgaris

Acne vulgaris (commonly called acne) is a common human skin disease, characterized by areas of skin with multiple noninflammatory follicular papules or comedones and by inflammatory papules, pustules, and nodules in its more severe forms। Acne vulgaris mostly affects the areas of skin with the densest population of sebaceous follicles; these areas include the face, the upper part of the chest, and the back. Severe acne is inflammatory, but acne can also manifest in noninflammatory forms.Acne lesions are commonly referred to as pimples, blemishes, spots, zits, or simply acne. Acne lesions are caused by changes in pilosebaceous units, skin structures consisting of a hair follicle and its associated sebaceous gland, changes which require androgen stimulation.

Acne occurs most commonly during adolescence, affecting more than 96% of teenagers, and often continues into adulthood. In adolescence, acne is usually caused by an increase in male sex hormones, which people of both genders accrue during puberty. most people, acne diminishes over time and tends to disappear—or at the very least decrease—after one reaches one's early twenties. There is, however, no way to predict how long it will take to disappear entirely, and some individuals will carry this condition well into their thirties, forties and beyond.

Credit card

A credit card is part of a system of payments named after the small plastic card issued to users of the system. It is a card entitling its holder to buy goods and services based on the holder's promise to pay for these goods and services. The issuer of the card grants a line of credit to the consumer (or the user) from which the user can borrow money for payment to a merchant or as a cash advance to the user. Usage of the term "credit card" to imply a credit card account is a metonym.

A credit card is different from a charge card, where a charge card requires the balance to be paid in full each month। In contrast, credit cards allow the consumers to 'revolve' their balance, at the cost of having interest charged. Most credit cards are issued by local banks or credit unions, and are the shape and size specified by the ISO/IEC 7810 standard as ID-1. This is defined as 85.60 × 53.98 mm (33/8 × 21/8 in) in size.



AntiVirus Protection

Over 100 million people have avast protecting their computers, making avast one of the world’s leading – and most trusted – antivirus programs। They also like us, regularly placing avast at the top of user ranking charts over other antivirus products.

what people say
"Hi avast! team, after some internet research and reading good reviews of your antivirus software, I plumped for AVAST. Both my wife and I really like the simplicity of AVAST and feel reassured when the AVAST voice notifies us when the updates have been completed rather than having to go through a sequence of button pushing to clear the screen. I have also noticed that our computers are allowed to do what they do best, without the irritating interruptions or slow downs. KEEP UP THE GOOD WORK and grateful thanks for your free Home software

Monday, May 17, 2010

car insurance

  • There are many automobile insurance companies in the UAE but ask around for personal opinions - like anywhere in the world, there is a huge variety of levels of customer service and satisfaction. Ask friends and colleagues for opinions on claims made. Most, if not all, insurance companies are much more helpful when they want your money than when you need your car repaired.
  • Nissan Maximas are difficult to insure, find out if you can get it insured first before buying one (they seem to be involved in a disproportionately high number of accidents). Sports/fast/luxury cars are expensive to get insured.
  • Drivers under 25, especially males, will find insurance difficult and/or more expensive.
  • Cars older than 5 (or 7 depending on the company) years may be difficult to get comprehensive insurance for.
  • Some policies do not insure cars when driven off-road. This might include parking your vehicle on the sand behind the building. This might also just be urban legend but potential for disagreement with your insurance company is there.
  • Even if an insurance policy insures vehicles for off-road driving, don't expect it to apply if you damage your 2wd Toyota Echo while dune-bashing in the Liwa Sands.
  • Drinking + driving + crashing = no insurance (including the 200,000 dhs blood money you have to pay if someone dies).
  • A car cannot be registered until it's insured. A car can be insured without being registered - check policy carefully but it would be unusual that an unregistered car is not covered unless there is something preventing registration eg worn or old tyres/tires).
  • There are 3 or 4 motor vehicle insurance types:
    • TPFT (Third Party, Fire & Theft) which is the legal minimum you are required to have - and is the cheapest. In an accident, your insurance company will not pay for damage to your own car - someone else's might if they're to blame.
    • Comprehensive or Fully Comprehensive (basic level) - there is a legal obligation for insurance companies to provide this at a certain maximum price level of about 3-5% of the value of the car. It covers damage to your own car but expect lots of restrictions and loopholes or get-out clauses.
    • Comprehensive with options - for extra cost you get options like dealer repair, free hire car, free insurance in Oman and other GCC countries, recognition of no claims bonuses (either UAE and/or from overseas). Expect to pay 3-10% of the value of the car depending on company and no claims bonus.
    • Comprehensive, premium level - for even more money you get options similar to previous level. Usually there are some restrictions on who can buy this level of insurance. Expect to pay an extra 1 or 2% of the value of the car.

Sunday, May 16, 2010

consolidate student loans

Managing Existing Student Loan Debt Obligations:

1. If you're having trouble meeting your student loan payments, contact your loan servicer. You may qualify for a deferment, forbearance, or repayment alternative that is more affordable.
2. Consolidation can help by extending your loan's repayment term beyond the standard ten years. While this will increase the total interest charges, the monthly payments will become more manageable.
3. Watch your expenses! Just as you need to be cautious when you're in school, you need to be aware of your expenses after you leave school.
4. Limit credit card usage to absolute necessities. Remember you'll pay more for every charged item because of the credit card's finance charges.
5. If you must have student credit cards, shop around for low interest rates or call existing credit card providers and ask them for a lower rate.
6. If you are delinquent or in default, visit our Student Loan Default Assistance page for more help.