Tuesday, May 25, 2010

Domain Name

A domain name is an identification label that defines a realm of administrative autonomy, authority, or control on the Internet, based on the Domain Name System (DNS).

Domain names are used in various networking contexts and application-specific naming and addressing purposes. They are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains com, net and org, and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet, run web sites, or create other publicly accessible Internet resources. The registration of these domain names is usually administered by domain name registrars who sell their services to the public.

Individual Internet host computers use domain names as host identifiers, or hostnames. Hostnames are the leaf labels in the domain name system usually without further subordinate domain name space. Hostnames appear as a component in Uniform Resource Locators (URLs) for Internet resources such as web sites (google.com).

Domain names are also used as simple identification labels to indicate ownership or control of a resource. Such examples are the realm identifiers used in the Session Initiation Protocol (SIP), the DomainKeys used to verify DNS domains in e-mail systems, and in many other Uniform Resource Identifiers (URIs).

An important purpose of domain names is to provide easily recognizable and memorizable names to numerically addressed Internet resources. This abstraction allows any resource (e.g., website) to be moved to a different physical location in the address topology of the network, globally or locally in an intranet. Such a move usually requires changing the IP address of a resource and the corresponding translation of this IP address to and from its domain name.

Domain names are often referred to simply as domains and domain name registrants are frequently referred to as domain owners, although domain name registration with a registrar does not confer any legal ownership of the domain name, only an exclusive right of use.

This article primarily discusses the group of domain names that are offered by domain name registrars for registration by the public. The Domain Name System article discusses the technical facilities and infrastructure of the domain name space and the hostname article deals with specific information about the use of domain names as identifiers of network hosts.

Dedicated Hosting

A dedicated hosting service, dedicated server, or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc. Server administration can usually be provided by the hosting company as an add-on service. In some cases a dedicated server can offer less overhead and a larger return on investment. Dedicated servers are most often housed in data centers, similar to colocation facilities, providing redundant power sources and HVAC systems. In contrast to colocation, the server hardware is owned by the provider and in some cases they will provide support for your operating system or applications.

Web Hosting

A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their own website accessible via the World Wide Web. Web hosts are companies that provide space on a server they own or lease for use by their clients as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet for servers they do not own to be located in their data center, called colocation.

The scope of hosting services varies widely. The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) or a Web interface. The files are usually delivered to the Web "as is" or with little processing. Many Internet service providers (ISPs) offer this service free to their subscribers. People can also obtain Web page hosting from other, alternative service providers. Personal web site hosting is typically free, advertisement-sponsored, or inexpensive. Business web site hosting often has a higher expense.

Single page hosting is generally sufficient only for personal web pages. A complex site calls for a more comprehensive package that provides database support and application development platforms (e.g. PHP, Java, Ruby on Rails, ColdFusion, and ASP.NET). These facilities allow the customers to write or install scripts for applications like forums and content management. For e-commerce, SSL is also highly recommended.

The host may also provide an interface or control panel for managing the Web server and installing scripts as well as other services like e-mail. Some hosts specialize in certain software or services (e.g. e-commerce). They are commonly used by larger companies to outsource network infrastructure to a hosting company.

Work-at-home

A Work-at-Home scheme is a get-rich-quick scheme in which a victim is lured by an offer to be employed at home, very often doing some simple task in a minimal amount of time with a large amount of income that far exceeds the market rate for the type of work. The true purpose of such an offer is for the perpetrator to extort money from the victim.

Work-at-home schemes have been around for decades. Originally found as ads in newspapers or magazines, they have expanded to more high-tech media, such as television and radio ads, and on the Internet.

Legitimate work-at-home opportunities do exist, and many people do their jobs in the comfort of their own homes. But anyone seeking such an employment opportunity must be wary of accepting a home employment offer, as only about one in 42 such ads have been determined to be legitimate [1]. Most legitimate jobs at home require some form of post-high-school education, such as a college degree or certificate, or trade school, and some experience in the field in an office or other supervised setting. Additionally, many legitimate at-home jobs are not like those in schemes are portrayed to be, as they are often performed at least some of the time in the company's office, require more self discipline than a traditional job, and have a higher risk of firing.

Saturday, May 22, 2010

Spy cam

A Spy Cam is a type of micro DVR which is built into a deceptive package and made to resemble a small object, such as a key fob, a wrist watch, or a lipstick case. Known by numerous terms such as cam stick, gum cam, thumb cam, etc., these devices will often function according to their apparent purpose, as in a pen cam that actually writes.

Starting in 2008, spy cams became increasingly popular due to their falling prices. This was a consequence of advances in flash memory technology, which made available cheap, surface-mount chips of over a gigabyte capacity, which meant that the cams could typically record over an hour of video onto built-in memory before needing to offload their recorded content.

A typical spy cam runs off of a rechargeable lithium ion or lithium polymer battery, has small, colored LEDs to indicate its operational status, and is controlled by switches and/or buttons on its surface. It may also have a slot/receptacle for a micro SD flash memory card which will expand it's recording capacity by several hours. In order to offload the recorded video, it must be connected to a computer's USB port, at which point it will function as a conventional thumb drive that contains standard video files.

Spyware

Spyware is a type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

While the term spyware suggests that software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.

Spam Filter

Bayesian spam filtering (pronounced /ˈbeɪzi.ən/ BAY-zee-ən, after Rev. Thomas Bayes) is a statistical technique of e-mail filtering. It makes use of a naive Bayes classifier to identify spam e-mail.

The first known mail-filtering program to use a Bayes classifier was Jason Rennie's iFile program, released in 1996. The program was used to sort mail into folders. The first scholarly publication on Bayesian spam filtering was by Sahami et al. (1998). Variants of the basic technique have been implemented in a number of research works and commercial software products.

Bayesian spam filtering has become a popular mechanism to distinguish illegitimate spam email from legitimate email (sometimes called "ham" or "bacn"). Many modern mail clients implement Bayesian spam filtering. Users can also install separate email filtering programs. Server-side email filters, such as DSPAM, SpamAssassin, SpamBayes, Bogofilter and ASSP, make use of Bayesian spam filtering techniques, and the functionality is sometimes embedded within mail server software itself.

Voice over Internet Protocol

Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks. Other terms frequently encountered and synonymous with VOIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.

Internet telephony refers to communications services — voice, facsimile, and/or voice-messaging applications — that are transported via the Internet, rather than the public switched telephone network (PSTN). The basic steps involved in originating an Internet telephone call are conversion of the analog voice signal to digital format and compression/translation of the signal into Internet protocol (IP) packets for transmission over the Internet; the process is reversed at the receiving end.

VOIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an audio stream. Codec use is varied between different implementations of VOIP (and often a range of codecs are used); some implementations rely on narrowband and compressed speech, while others support high fidelity stereo codecs.

Distance Learning

Distance education, or distance learning, is a field of education that focuses on the pedagogy, technology, and instructional system designs that aim to deliver education to students who are not physically "on site" in a traditional classroom or campus। It has been described as "a process to create and provide access to learning when the source of information and the learners are separated by time and distance, or both." other words, distance learning is the process of creating an educational experience of equal quality for the learner to best suit their needs outside the classroom. Distance education courses that require a physical on-site presence for any reason (including taking examinations) is considered a hybrid or blended course of study. This emerging technology is becoming widely used in universities and institutions around the globe.With the recent trend of technological advance, distance learning is becoming more recognized for its potential in providing individualized attention and communication with students internationally. The most widely cited[citation needed] pedagogical theory of distance education is that of "transactional distance".

Thursday, May 20, 2010

Weight Loss

Intentional weight loss refers to the loss of total body mass in an effort to improve fitness and health, and to change appearance.

Therapeutic weight loss, in individuals who are overweight or obese, can decrease the likelihood of developing diseases such as diabetes, heart disease, high blood pressure, stroke, osteoarthritis, and certain types of cancer.

Attention to diet in particular can be extremely beneficial in reducing the impact of diabetes and other health risks of an overweight or obese individual.

Weight loss occurs when an individual is in a state of negative energy balance. When the body is consuming more energy (i.e. in work and heat) than it is gaining (i.e. from food or other nutritional supplements), it will use stored reserves from fat or muscle, gradually leading to weight loss.[citation needed]

It is not uncommon for some people who are currently at their ideal body weight to seek additional weight loss in order to improve athletic performance, and/or meet required weight classification for participation in a sport. However, others may be driven by achieving a more attractive body image. Consequently, being underweight is associated with health risks such as difficulty fighting off infection, osteoporosis, decreased muscle strength, trouble regulating body temperature and even increased risk of death

Education and educ

Medical education is a lifelong process embracing premedical experience, undergraduate education, general clinical training, specialist or vocational training, subspecialty training, and continuing medical education. Although medical education was once seen as the province of medical schools and teaching hospitals, large and increasing numbers of practitioners now provide teaching and promotion of learning outside the traditional environment.

Over the past decade both the university sector and the NHS have seen considerable change and increased accountability for their activities, and all the signs suggest that the next 10 years will be no different. Simultaneously, medical schools are having to acknowledge the implementation of new curricula, the consequences of new health service priorities, an increase in the number of medical students, and the implications of the report from the National Committee of Enquiry into Higher Education, chaired by Sir Ron Dearing.1

Investing in the world

Investment is the commitment of money or capital to purchase financial instruments or other assets in order to gain profitable returns in form of interest, income, or appreciation of the value of the instrument. is related to saving or deferring consumption. Investment is involved in many areas of the economy, such as business management and finance no matter for households, firms, or governments. An investment involves the choice by an individual or an organization such as a pension fund, after some analysis or thought, to place or lend money in a vehicle, instrument or asset, such as property, commodity, stock, bond, financial derivatives (e.g. futures or options), or the foreign asset denominated in foreign currency, that has certain level of risk and provides the possibility of generating returns over a period of time.

Investment comes with the risk of the loss of the principal sum. The investment that has not been thoroughly analyzed can be highly risky with respect to the investment owner because the possibility of losing money is not within the owner's control. The difference between speculation and investment can be subtle. It depends on the investment owner's mind whether the purpose is for lending the resource to someone else for economic purpose or not.

In the case of investment, rather than store the good produced or its money equivalent, the investor chooses to use that good either to create a durable consumer or producer good, or to lend the original saved good to another in exchange for either interest or a share of the profits. In the first case, the individual creates durable consumer goods, hoping the services from the good will make his life better. In the second, the individual becomes an entrepreneur using the resource to produce goods and services for others in the hope of a profitable sale. The third case describes a lender, and the fourth describes an investor in a share of the business. In each case, the consumer obtains a durable asset or investment, and accounts for that asset by recording an equivalent liability. As time passes, and both prices and interest rates change, the value of the asset and liability also change.



Tuesday, May 18, 2010

Cash Advance

Short term loans provide the needed cash to meet immediate short-term cash flow problems.

They are not a solution for longer term financial problems for which other kinds of financing (such as credit cards, an overdraft loan or a loan from friends or family) may be more appropriate and affordable.

You may want to discuss your financial situation with a non profit credit counseling service available to consumers experiencing financial problems in your community.

Lenders check your credit report, your credit score, and your debt analysis to make credit and loan decisions about you. Find out what's on your report.

private jets

Private Jets is a power pop quartet from Sweden, founded in 2001 by twin brothers Erik Westin and Per Westin.

The band started out as a song writing project, the brothers curious to see if they could mix their influences of pop, rock and jazz into their own brand of power pop with ambiguous lyrics and smart arrangements. When pushed by pop enthusiasts to record some of the songs, they realized that they had to put a band together. Janne Hellman was recruited as lead vocalist together with Mikael Olsson on bass, Olsson who had previous worked with the brothers in the hi-speed pop outfit Revolver Bop Agents.

First release Private Jets released the debut EP “A Four Leaf Clover in E-Major” on May 27, 2002 on Sparkplug Records. It contained four songs and a short snippet and was well received by the power pop community. The songs were written, arranged, produced and to a large extent performed by the brothers. Lead vocals was provided by Janne Hellman on all tracks and Olsson played bass on the song Millionseller.

In a radio interview on Swedish Radio, Erik Westin explained that the band were basically writing what they wanted to hear but couldn’t really seem to find anywhere. He also said that the ambition with the band is to write the ultimate pop song over and over again.

Second release After the release of “A Four Leaf Clover in E-Major” the brothers started to work on a new album. The band bio states that they wrote 43 new songs to be able to make an album filled with singles only. It says that they would strive for nothing less than power pop perfection. Of the songs written, the band chose to record twelve, and the result can be heard on the album “Jet Sounds”, released on May 26, 2008.

Live gigs In May 2008 Private Jets made their live debut at the Cavern Club in Liverpool, playing the International Pop Overthrow. An extra show was added.

On Saturday November 7, 2008, the band played at the International Pop Overthrow in New York City, performing at Kenny’s Castaways in Greenwich Village.

Acne vulgaris

Acne vulgaris (commonly called acne) is a common human skin disease, characterized by areas of skin with multiple noninflammatory follicular papules or comedones and by inflammatory papules, pustules, and nodules in its more severe forms। Acne vulgaris mostly affects the areas of skin with the densest population of sebaceous follicles; these areas include the face, the upper part of the chest, and the back. Severe acne is inflammatory, but acne can also manifest in noninflammatory forms.Acne lesions are commonly referred to as pimples, blemishes, spots, zits, or simply acne. Acne lesions are caused by changes in pilosebaceous units, skin structures consisting of a hair follicle and its associated sebaceous gland, changes which require androgen stimulation.

Acne occurs most commonly during adolescence, affecting more than 96% of teenagers, and often continues into adulthood. In adolescence, acne is usually caused by an increase in male sex hormones, which people of both genders accrue during puberty. most people, acne diminishes over time and tends to disappear—or at the very least decrease—after one reaches one's early twenties. There is, however, no way to predict how long it will take to disappear entirely, and some individuals will carry this condition well into their thirties, forties and beyond.

Credit card

A credit card is part of a system of payments named after the small plastic card issued to users of the system. It is a card entitling its holder to buy goods and services based on the holder's promise to pay for these goods and services. The issuer of the card grants a line of credit to the consumer (or the user) from which the user can borrow money for payment to a merchant or as a cash advance to the user. Usage of the term "credit card" to imply a credit card account is a metonym.

A credit card is different from a charge card, where a charge card requires the balance to be paid in full each month। In contrast, credit cards allow the consumers to 'revolve' their balance, at the cost of having interest charged. Most credit cards are issued by local banks or credit unions, and are the shape and size specified by the ISO/IEC 7810 standard as ID-1. This is defined as 85.60 × 53.98 mm (33/8 × 21/8 in) in size.



AntiVirus Protection

Over 100 million people have avast protecting their computers, making avast one of the world’s leading – and most trusted – antivirus programs। They also like us, regularly placing avast at the top of user ranking charts over other antivirus products.

what people say
"Hi avast! team, after some internet research and reading good reviews of your antivirus software, I plumped for AVAST. Both my wife and I really like the simplicity of AVAST and feel reassured when the AVAST voice notifies us when the updates have been completed rather than having to go through a sequence of button pushing to clear the screen. I have also noticed that our computers are allowed to do what they do best, without the irritating interruptions or slow downs. KEEP UP THE GOOD WORK and grateful thanks for your free Home software

Monday, May 17, 2010

car insurance

  • There are many automobile insurance companies in the UAE but ask around for personal opinions - like anywhere in the world, there is a huge variety of levels of customer service and satisfaction. Ask friends and colleagues for opinions on claims made. Most, if not all, insurance companies are much more helpful when they want your money than when you need your car repaired.
  • Nissan Maximas are difficult to insure, find out if you can get it insured first before buying one (they seem to be involved in a disproportionately high number of accidents). Sports/fast/luxury cars are expensive to get insured.
  • Drivers under 25, especially males, will find insurance difficult and/or more expensive.
  • Cars older than 5 (or 7 depending on the company) years may be difficult to get comprehensive insurance for.
  • Some policies do not insure cars when driven off-road. This might include parking your vehicle on the sand behind the building. This might also just be urban legend but potential for disagreement with your insurance company is there.
  • Even if an insurance policy insures vehicles for off-road driving, don't expect it to apply if you damage your 2wd Toyota Echo while dune-bashing in the Liwa Sands.
  • Drinking + driving + crashing = no insurance (including the 200,000 dhs blood money you have to pay if someone dies).
  • A car cannot be registered until it's insured. A car can be insured without being registered - check policy carefully but it would be unusual that an unregistered car is not covered unless there is something preventing registration eg worn or old tyres/tires).
  • There are 3 or 4 motor vehicle insurance types:
    • TPFT (Third Party, Fire & Theft) which is the legal minimum you are required to have - and is the cheapest. In an accident, your insurance company will not pay for damage to your own car - someone else's might if they're to blame.
    • Comprehensive or Fully Comprehensive (basic level) - there is a legal obligation for insurance companies to provide this at a certain maximum price level of about 3-5% of the value of the car. It covers damage to your own car but expect lots of restrictions and loopholes or get-out clauses.
    • Comprehensive with options - for extra cost you get options like dealer repair, free hire car, free insurance in Oman and other GCC countries, recognition of no claims bonuses (either UAE and/or from overseas). Expect to pay 3-10% of the value of the car depending on company and no claims bonus.
    • Comprehensive, premium level - for even more money you get options similar to previous level. Usually there are some restrictions on who can buy this level of insurance. Expect to pay an extra 1 or 2% of the value of the car.

Sunday, May 16, 2010

consolidate student loans

Managing Existing Student Loan Debt Obligations:

1. If you're having trouble meeting your student loan payments, contact your loan servicer. You may qualify for a deferment, forbearance, or repayment alternative that is more affordable.
2. Consolidation can help by extending your loan's repayment term beyond the standard ten years. While this will increase the total interest charges, the monthly payments will become more manageable.
3. Watch your expenses! Just as you need to be cautious when you're in school, you need to be aware of your expenses after you leave school.
4. Limit credit card usage to absolute necessities. Remember you'll pay more for every charged item because of the credit card's finance charges.
5. If you must have student credit cards, shop around for low interest rates or call existing credit card providers and ask them for a lower rate.
6. If you are delinquent or in default, visit our Student Loan Default Assistance page for more help.