Search

Thursday, December 20, 2007

High Speed Internet Service

High Speed Internet Service

INTRODUCTION

The Internet is a global network of computers.

There are many different types of computers on

the Internet – PCs, Macintoshes, and others – and

many of these computers are parts of smaller

networks, which are also just as varied. The Internet

is based upon a common language that

allows all these computers to talk to each other.

USES OF THE INTERNET

Companies, individuals, and institutions use the Internet in many ways. Companies use the Internet for electronic commerce, also called e-commerce, including advertising, selling, buying, distributing products, and providing customer service. In addition, companies use the Internet for business-to-business transactions, such as exchanging financial information and accessing complex databases. Businesses and institutions use the Internet for voice and video conferencing and other forms of communication that enable people to telecommute (work away from the office using a computer). The use of electronic mail (e-mail) speeds communication between companies, among coworkers, and among other individuals. Media and entertainment companies use the Internet for online news and weather services and to broadcast audio and video, including live radio and television programs. Online chat allows people to carry on discussions using written text. Instant messaging enables people to exchange text messages in real time. Scientists and scholars use the Internet to communicate with colleagues, perform research, distribute lecture notes and course materials to students, and publish papers and articles. Individuals use the Internet for communication, entertainment, finding information, and buying and selling goods and services.

The Internet can also be used to transfer telephone calls using an application known as IP-telephony. This application requires a special phone that digitizes voice and sends it over the Internet to a second IP telephone. Another application, known as the File Transfer Protocol (FTP), is used to download files from an Internet site to a user’s computer. The FTP application is often automatically invoked when a user downloads an updated version of a piece of software. Applications such as FTP have been integrated with the World Wide Web, making them transparent so that they run automatically without requiring users to open them. When a Web browser encounters a URL that begins with ftp:// it automatically uses FTP to access the item.


History of the Internet

At the beginning of the 1960s, an American researcher

had already developed the theoretical

basis for networking computers. Some years

later, the Advanced Research Projects Agency,

ARPA, a research institute of the American military,

developed such a computer network. In

October 1969, two computers in two scientific

institutes in the U.S. were connected with one

another.

After a few months, two more computers were

connected to this network, which was called the

ARPANet. In 1972 – when the network included

23 computers – electronic mail, or e-mail, was

developed. At the end of the 1970s, the discussion

groups called newsgroups came into existence.

Between the 1970s and 1983, the ARPANet was

connected to further networks. The large new

network that resulted from these connections was

called the Internet since it connected several

networks with one another. Also in this year, an

address system was established that allowed

computers on the Internet to have names rather

than the numbers by which they had previously

been identified.

Gradually, more and more countries connected to

the Internet, and by 1988, more than 50,000

computers were connected to this network. Until

this point, the Internet was used primarily by the

academic world. In 1989, an Englishman invented

web pages, that is, pages on the World

Wide Web. In 1993, a graphical web browser

was invented that allowed users to navigate easily

from one place to another on the Internet.

Thanks to this invention, more and more people

outside of the academic world began to use the

Internet – such as entrepreneurs the world over,

who set up web sites and used electronic mail.

At the beginning of the year 2000, there are more

than 200 million Internet users, and on the web

it’s possible to find information of every kind,

shopping opportunities, online games, old and

new friends – or you can take advantage of investment

and banking capabilities, hear music

and radio programs, see TV programs and films,

and much, much more.

BROADBAND

Computers store all information as binary numbers. The binary number system uses two binary digits, 0 and 1, which are called bits. The amount of data that a computer network can transfer in a certain amount of time is called the bandwidth of the network and is measured in kilobits per second (kbps) or megabits per second (mbps). A kilobit is 1 thousand bits; a megabit is 1 million bits. A dial-up telephone modem can transfer data at rates up to 56 kbps; DSL and cable modem connections are much faster and can transfer at several mbps. The Internet connections used by businesses often operate at 155 mbps, and connections between routers in the heart of the Internet may operate at rates from 2,488 to 9,953 mbps (9.953 gigabits per second) The terms wideband or broadband are used to characterize networks with high capacity and to distinguish them from narrowband networks, which have low capacity.

Higher-speed Internet transmission facilities, known as broadband, are also helping improve response times. Broadband technologies include Asymmetrical Digital Subscriber Line (ADSL), which works over telephone wiring, and cable modems, which work over cable TV wiring. Each technology allows data to flow from an Internet service provider to a user's computer hundreds of times faster than traditional dialup modems.

Monday, December 17, 2007

LAWYER

LAWYER



a professional person authorized to practice law; conducts lawsuits or gives legal advice


A lawyer, according to Black's Law Dictionary, is "a person learned in the law; as an attorney, counsel or solicitor; a person licensed to practice law."[1] Law is the system of rules of conduct established by the sovereign government of a society to correct wrongs, maintain stability, and deliver justice. Working as a lawyer involves the practical application of abstract legal theories and knowledge to solve specific individualized problems, or to advance the interests of those who retain (i.e., hire) lawyers to perform legal services.Terminology

In practice, legal jurisdictions exercise their right to determine who is recognized as being a lawyer; as a result, the meaning of the term "lawyer" may vary from place to place.

* In Australia, the word "lawyer" is used to refer to both barristers and solicitors (whether in private practice or practising as corporate in-house counsel) but not people who do not practice the law.

* In England, "lawyer" is used loosely to refer to a broad variety of law-trained persons. It includes practitioners such as barristers, solicitors, legal executives and licensed conveyancers; and people who are involved with the law but do not practice it on behalf of individual clients, such as judges, court clerks, and drafters of legislation.

* In Scotland, the word "lawyer" refers to a more specific group of legally trained people. It would specifically include [Advocates]and[Solicitors]. In a generic sense it may also include judges, and legally trained support staff.

* In Canada, the word "lawyer" only refers to individuals who have been called to the bar or have qualified as civil law notaries in the province of Quebec. Common law lawyers in Canada may also be known as "barristers and solicitors", but should not be referred to as "attorneys", since that term has a different meaning in Canadian usage. However, in Quebec, civil law advocates (or avocats in French) often call themselves "attorney" and sometimes "barrister and solicitor".

* In the United States of America, the term generally refers to attorneys who may practice law.

* Other nations tend to have comparable terms for the analogous concept.

Responsibilities

In most countries, particularly civil law countries, there has been a tradition of giving many legal tasks to a variety of civil law notaries, clerks, and scriveners.[3] These countries do not have "lawyers" in the American sense, insofar as that term refers to a single type of general-purpose legal services provider;[4] rather, their legal professions consist of a large number of law-trained persons, known as jurists, of which only some are advocates who are licensed to practice in the courts.[5][6] It is difficult to formulate accurate generalizations that cover all the countries with multiple legal professions, because each country has traditionally had its own peculiar method of dividing up legal work among all its different types of legal professionals.[7]

Notably, England, the mother of the common law jurisdictions, emerged from the Dark Ages with similar complexity in its legal professions, but then evolved by the 19th century to a single dichotomy between barristers and solicitors. An equivalent dichotomy developed between advocates and procurators in some civil law countries, though these two types did not always monopolize the practice of law as much as barristers and solicitors, in that they always coexisted with civil law notaries.[8][9][10]

Several countries that originally had two or more legal professions have since fused or united their professions into a single type of lawyer.[11][12][13][14] Most countries in this category are common law countries, though France, a civil law country, merged together its jurists in 1990 and 1991 in response to Anglo-American competition.[15] In countries with fused professions, a lawyer is usually permitted to carry out all or nearly all the responsibilities listed below.

Oral argument in the courts

Arguing a client's case before a judge or jury in a court of law is the traditional province of the barrister in England. However, the boundary between barristers and solicitors has evolved. In England today, the barrister monopoly covers only appellate courts, and barristers must compete directly with solicitors in many trial courts.[16] In countries like the United States that have fused legal professions, there are trial lawyers who specialize in trying cases in court, but trial lawyers do not have a de jure monopoly like barristers.

In some countries, litigants have the option of arguing pro se, or on their own behalf. It is common for litigants to appear unrepresented before certain courts like small claims courts; indeed, many such courts do not allow lawyers to speak for their clients, in an effort to save money for all participants in a small case.[17] In other countries, like Venezuela, no one may appear before a judge unless represented by a lawyer.[18] The advantage of the latter regime is that lawyers are familiar with the court's customs and procedures, and make the legal system more efficient for all involved. Unrepresented parties often damage their own credibility or slow the court down as a result of their inexperience.[19][20]

Research and drafting of court papers

Often, lawyers brief a court in writing on the issues in a case before the issues can be orally argued. They may have to perform extensive research into relevant facts and law while drafting legal papers and preparing for oral argument.

In England, a solicitor gets the facts of the case from the client and briefs a barrister in writing. The barrister then researches, drafts, and files the necessary court pleadings, and orally argues the case.[21]

In Spain, the procurator merely signs and presents the papers to the court, but it is the advocate who drafts the papers and argues the case.[22]

In some countries, like Japan, a scrivener or clerk may fill out court forms and draft simple papers for lay persons who cannot afford or do not need attorneys, and advise them on how to manage and argue their own cases.[23]

Advocacy (written and oral) in administrative hearings

In most developed countries, the legislature has granted original jurisdiction over highly technical matters to executive branch administrative agencies which oversee such things. As a result, some lawyers have become specialists in administrative law. In a few countries, there is a special category of jurists with a monopoly over this form of advocacy; for example, France formerly had conseil juridiques (who were merged into the main legal profession in 1991).[24] In other countries, like the United States, lawyers have been effectively barred by statute from certain types of administrative hearings in order to preserve their informality.[25]

Client intake and counseling (with regard to pending litigation)

In England, only solicitors were traditionally in direct contact with the client.[26] The solicitor retained a barrister if one was necessary and acted as an intermediary between the barrister and the client. In most cases a barrister would be obliged, under what is known as the "cab rank rule", to accept instructions for a case in an area in which they held themselves out as practising, at a court at which they normally appeared and at their usual rates.[27][28]

Legal advice (with regard to all legal matters)

Legal advice is the application of abstract principles of law to the concrete facts of the client's case in order to advise the client about what they should do next. In many countries, only a properly licensed lawyer may provide legal advice to clients for good consideration, even if no lawsuit is contemplated or is in progress.[29][30][31] Therefore, even conveyancers and corporate in-house counsel must first get a license to practice, though they may actually spend very little of their careers in court. Failure to obey such a rule is the crime of unauthorized practice of law.

In other countries, jurists who hold law degrees are allowed to provide legal advice to individuals or to corporations, and it is irrelevant if they lack a license and cannot appear in court.[32][33] Some countries go further; in England and Wales, there is no general prohibition on the giving of legal advice. Sometimes civil law notaries are allowed to give legal advice, as in Belgium.[34] In many countries, non-jurist accountants may provide what is technically legal advice in tax and accounting matters.





Tuesday, November 20, 2007

Internet service provider

Internet service provider

An Internet service provider (abbr. ISP, also called Internet access provider or IAP) is a business or organization that provides consumers or businesses access to the Internet and related services. In the past, most ISPs were run by the phone companies. Now, ISPs can be started by just about any individual or group with sufficient money and expertise. In addition to Internet access via various technologies such as dial-up and DSL, they may provide a combination of services including Internet transit, domain name registration and hosting, web hosting, and colocation.

ISPs employ a range of technologies to enable consumers to connect to their network. For "home users", the most popular options include dial-up, DSL (typically ADSL), Broadband wireless access, Cable modem, and ISDN (typically BRI). For customers who have more demanding requirements, such as medium-to-large businesses, or other ISPs, DSL (often SHDSL or ADSL), Ethernet, Metro Ethernet, Gigabit Ethernet, Frame Relay, ISDN (BRI or PRI), ATM, satellite Internet access and SONET are more likely. With the increasing popularity of downloading music and online video and the general demand for faster page loads, higher bandwidth connections are becoming more popular.

Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. In the simplest case, a single connection is established to an upstream ISP using one of the technologies described above, and the ISP uses this connection to send or receive any data to or from parts of the Internet beyond its own network; in turn, the upstream ISP uses its own upstream connection, or connections to its other customers (usually other ISPs) to allow the data to travel from source to destination.

In reality, the situation is often more complicated. For example, ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and have connections to each one at one or more of their PoPs. ISPs may engage in peering, where multiple ISPs interconnect with one another at a peering point or Internet exchange point (IX), allowing the routing of data between their networks, without charging one another for that data - data that would otherwise have passed through their upstream ISPs, incurring charges from the upstream ISP. ISPs that require no downstream and have only customers and/or peers, are called Tier 1 ISPs, indicating their status as ISPs at the top of the Internet hierarchy. Routers, switches, Internet routing protocols, and the expertise of network administrators all have a role to play in ensuring that data follows the best available route and that ISPs can "see" one another on the Internet.

Internet service providers in India

Tata Indicom, Sify, Airtel, Reliance, Asianet, Bsnl, etc

Anti-virus

Antivirus


Virus{Definition}

Though it is unclear even within the anti-virus industry what actually constitutes a virus, one known element is that it is a program designed to replicate. Spread is achieved by infecting other files within a system. Viruses can also incorporate a payload, which is often malicious. The first PC virus was discovered in-the-wild in 1986, and today, there are over 54,000 viruses that are currently known. About 200 of the viruses that exist at any time are in-the-wild threats. Viruses have been made even more effective by being combined with worms and Trojans, to do more damage to a system while spreading faster.

Anti-virus

A software or hardware designed to identify and remove a known or potential computer virus, worm, or trojan horse. Or Program used to stop or prevent your computer being infected by a computer virus. A computer virus essentially acts like a biological virus and most usually gets into a computer system through unsolicited email.

Anti-virus is the term used for the technology and software that acts to detect malicious codes, prevent these codes or files from infecting and damaging your system, and to also remove any malicious codes that have gotten through. Anti-virus vendors, share information and keep in constant contact to make sure any malicious code outbreaks are quickly reported and dealt with. Anti-virus vendors also usually participate in independent tests to check and certify their products for speed and thoroughness when detecting and disinfecting viruses. The original versions of anti-virus software look through files for malicious code as they enter the system, or as the user requests it (manually). More recent versions of antivirus programs, such as NOD 32, often depends on integrity checking, and sometimes behavior blocking to prevent files from unauthorized modifications, or to stop various sequences of code from changing anything internally.

Antivirus software.

Antivirus software is a term used to describe a computer program that attempts to identify, neutralize or eliminate malicious software. This type of software is so named because the earliest examples were designed exclusively to combat computer viruses; however most modern antivirus software is now designed to combat a wide range of threats, including worms, phishing attacks, rootkits, trojan horses and other malware.

Antivirus software typically uses two different techniques to accomplish this:

Examining (scanning) files to look for known viruses matching definitions in a virus dictionary

Identifying suspicious behavior from any computer program which might indicate infection. Such analysis may include data captures, port monitoring and other methods.

Most commercial antivirus software uses both of these approaches, with an emphasis on the virus dictionary approach. { A utility that searches a hard disk for viruses and removes any that are found. Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered.

Anti-Spam

Anti-Spam

There’s a lot of argument as to which “anti-spam” techniques are legitimately so called. In this article, I’d like to consider what constitutes an anti-spam technique in an ideal sense, then consider the various practiced approaches to spam mitigation in that light, drawing conclusions as to how we should frame the “anti-spam” discussion. An ideal anti-spam system rejects messages which are both bulk and unsolicited, letting pass those messages which are of specific personal relevance to the recipient (not “bulk"), and those which the recipient has expressly requested (not “unsolicited"). When phrased in these terms, spam filtering is obviously a task for a well-informed intelligent agent of immense sophistication—quite beyond our current ability to construct. Anything less is a weak approximation at best.

The system described so far is ideal in the sense that it keeps spam out of a recipient’s inbox, but it says nothing of network and computing resources consumed in the process. A system that accepts all mail and then discards the portion which is spam wastes significant resources on mail that will ultimately be discarded. This is the hidden cost of spam, and it can be arbitrarily large, since it depends on how much spam other parties send to the recipient. An ideal system must address this cost: it must not only be perfectly accurate, but also perfectly efficient. In the ideal case, each incoming spam is rejected at no cost to the recipient. Only under these conditions is the system guaranteed to scale under increasing spam load.

To address this, the hypothetical intelligent agent could operate at the sender’s system, preventing unwanted data from entering the network at all. Unfortunately this seems practically untenable for several obvious reasons, not the least of which is the cost of replicating the agent at every prospective sender. But in order for the agent to operate from the recipient’s system without the waste inherent in the “accept then drop” approach, it would need to engage with each potential sender in a very light-weight protocol for determining whether a candidate message is personally relevant or requested, prior to accepting the actual text. I can’t even imagine how a protocol would meet these requirements, let alone be reliable in the face of a hostile sender. The situation seems intractable.

If an ideal anti-spam system is technically possible at all, it’s firmly in the realm of science fiction for now.

How ANTI-SPAM works

This page has fifty randomly generated email addresses (refresh and new ones will appear). At the bottom of the page is a link to this page again, essentially reloading it for programs to collect more fake email addresses. Email collecting programs (spam bots) will be sent into an infinite loop by following the link at the bottom of the page and will get more and more fake email addresses stuck in their databases.

Spam is the electronic world's biggest problem. A fool proof method of filtering out spam does not yet exist, but we don't have to sit back and take it. Anti-Spam pages like this one make spamming less profitable and is our way to help FIGHT SPAM.

Anti-Spam Software

A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox. Like other types of filtering programs, a spam filter looks for certain criteria on which it bases judgments. For example, the simplest and earliest versions (such as the one available with Microsoft's Hotmail) can be set to watch for particular words

A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox. Like other types of filtering programs, a spam filter looks for certain criteria on which it bases judgments. For example, the simplest and earliest versions (such as the one available with Microsoft's Hotmail) can be set to watch for particular words in the subject line of messages and to exclude these from the user's inbox. This method is not especially effective, too often omitting perfectly legitimate messages (these are called false positives) and letting actual spam through. More sophisticated programs, such as Bayesian filters or other heuristic filters, attempt to identify spam through suspicious word patterns or word frequency.

Thursday, September 20, 2007

Lending tree and eloan

Lending tree and eloan

LendingTree

LendingTree, LLC is an online lending exchange, providing a marketplace that connects consumers with lenders that compete for their business. LendingTree is a web-based company (LendingTree.com), operating a lead-generation business. A "lead" is a collection of information about a consumer interested in getting a loan. Lenders pay for these leads, and LendingTree is a source for them. The prospective borrower fills out a questionnaire on LendingTree.com detailing the loan request, property, personal finances, and contact information. They use this information to select the lenders to whom the information is sold. Lenders prepare an offer to the borrower based on the same information.

LendingTree customers are the lenders and mortgage brokers who can afford to buy these leads. They pay LendingTree for mortgage-loan leads to get this information on potential customers. These leads are sold to the highest bidder depending how good the information and credit standing is for each lead.

LendingTree has facilitated more than 20 million loan requests and $152 billion in closed loan transactions. LendingTree provides access to mortgages and refinance loans, home equity loans/lines of credit, auto loans, personal loans, online high yield savings accounts, and credit cards.

Launched in 1998 with headquarters in Charlotte, North Carolina, LendingTree is part of IAC Financial Services and Real Estate, an operating company of IAC (NASDAQ: IACI), which also owns or operates LendingTree Loans, LendingTree Settlement Services, GetSmart, RealEstate.com, Domania, and iNest Realty.

E-loan

E-Loan, Inc. is a financial services company that offers home mortgage, home equity, and auto loans, along with online high yield savings and certificates of deposit (CDs).

E-LOAN is currently headquartered in Pleasanton, CA, and employs more than 950 people. As of October 2006, the company has funded over $32 billion in loans.

Founded in 1997 by Janina Pawlowski and Chris Larsen, E-Loan, Inc. was established to provide customers with access to mortgage loans over the Internet.

As the company continued to evolve, more products and enhancements were introduced. In 1998, E-LOAN launched E-Track, a proprietary system that allows borrowers to securely check the status of their loans online. On September 2, 1998, E-LOAN received venture capital funding from Sequoia Capital. [1]

In 2000, E-LOAN became the first company to provide consumers with free access to their credit scores, allowing customers to check for possible incidents of identity theft or erroneous entries of credit debt. This was introduced at a time when many financial companies were reluctant to release this information.

Buoyed by this success, but still determined to improve public credit disclosures throughout the nation, Larsen helped form “Californians for Privacy Now” to lead the fight for stricter financial privacy protection. After collecting over 600,000 signatures, the measure was placed on the California ballot and passed into law in 2003.

Ownership of the company changed in 2005 when Popular, Inc. acquired E-Loan, Inc.

In 2006, E-LOAN branched out into online savings accounts and CDs, promising their CD rates would be among the highest in the nation.

At E-LOAN, "Radically Simple" says it all. We're dedicated to providing the best lending and savings service possible. We offer reduced paperwork; personalized service; the industry's strictest privacy policy; and no hidden costs.

Since our 1997 launch, E-LOAN has led the charge to protect consumers' financial privacy. We've lobbied Congress; we've helped change laws for the better. We've also assisted many in securing the loans they need. From its inception, E-LOAN has originated over $32 billion in consumer loans.

Two independent studies further tell the story. One, conducted by TRUSTe and The Ponemon Institute, ranked E-LOAN as one of the Top 20 most trusted companies for privacy in America. Another, conducted by The Customer Respect Group, awarded us their highest rating in "Online Customer Respect Study" for North America's largest financial services firms.

Monday, August 20, 2007

Broadband

Broadband

Broadband in telecommunications is a term that refers to a signaling method that includes or handles a relatively wide range of frequencies, which may be divided into channels or frequency bins. Broadband is always a relative term, understood according to its context. The wider the bandwidth, greater is the information carrying capacity. In radio, for example, a very narrow-band signal will carry Morse code; a broader band will carry speech; a still broader band is required to carry music without losing the high audio frequencies required for realistic sound reproduction. A television antenna described as "normal" may be capable of receiving a certain range of channels; one described as "broadband" will receive more channels. In data communications a modem will transmit a bandwidth of 64 kilobits per seconds (kbit/s) over a telephone line; over the same telephone line a bandwidth of several megabits per second can be handled by ADSL, which is described as broadband (relative to a modem over a telephone line, although much less than can be achieved over a fibre optic circuit, for example).

Broadband in data communications can refer to Broadband Networks or Broadband internet and may have the same meaning as above, so that data transmission over a fiber optic cable would be referred to as broadband as compared to a telephone modem operating at 600 bits per second.

However, broadband in data communications is frequently used in a more technical sense to refer to data transmission where multiple pieces of data are sent simultaneously to increase the effective rate of transmission, regardless of actual data rate. In network engineering this term is used for methods where two or more signals share a medium.[citation needed]

The various forms of Digital Subscriber Line (DSL) services are broadband in the sense that digital information is sent over a high-bandwidth channel above the baseband voice channel on a single pair of wires.[citation needed]

A baseband transmission sends one type of signal using a medium's full bandwidth, as in 100BASE-T Ethernet. Ethernet, however, is the common interface to broadband modems such as DSL data links, and has a high data rate itself, so is sometimes referred to as broadband. Ethernet provisioned over cable modem is a common alternative to DSL

The Broadband Revolution

The International Telecommunications Union recently issued a press release announcing with joy the release of “the first set of global standards for Internet Protocol TV (IPTV).” A key sentence:

A combination of voice, Internet and video services over a single broadband link and from a single provider is foreseen as the ultimate goal of the broadband revolution.

Those of you who lived through ‘What Is Broadband Good For?’ with me last summer (first post here) know that the word “broadband” is a pet bugaboo of mine. It’s a word that answers a lot of policy questions in a particular way. It connotes (and denotes) a speeded, managed “service” that happens to use the Internet Protocol but is ultimately completely within the discretionary control of the network provider. So when the ITU talks about “the broadband revolution,” they mean (I think) the rise of these speeded, managed “services” provided by telephone companies. And the stated goal—made express in this press release—is to combine “services” over single broadband links and “from” a single provider. Revolutionary! Remarkably similar to cable television with a cellphone overlay.

I’m not going to say “I told you so,” but this is why the AT&T/BellSouth merger conditions a year ago were not unmixed great news. I said at the time (so I guess I am saying I told you so) that AT&T’s promise as part of that merger to keep its “wireline broadband Internet access service” neutral didn’t actually cover its planned IPTV service, which it calls its “AT&T Yahoo! High Speed Internet U-verse Enabled” service. That won’t be neutral—ever—unless things change rather dramatically in this country. I think consumers will be offered “internet” as *part* of their subscription to IPTV, IPTV will definitely affect “bandwidth management,” and “internet” won’t be what we thought it was.

Sunday, May 20, 2007

Online Photo sharing

Online Photo sharing

Photo sharing is the publishing or transfer of a user's digital photos online, thus enabling the user to share them with others (whether publicly or privately). This functionality is provided through both websites and applications that facilitate the upload and display of images. The term can also be loosely applied to the use of online photo galleries that are setup and managed by individual users, including photoblogs.

The first photo sharing sites originated during the mid to late 1990s primarily from service providing online ordering of prints (photo-finishing), but many more came into being during the early 2000s with the goal of providing permanent and centralised access to a user's photos, and in some cases video clips too. This has resulted in different approaches to revenue generation and functionality amongst providers.

While photoblogs tend only to display a chronological view of user-selected medium-sized photos, most photo sharing sites provide multiple views (such as thumbnails, and slideshows), the ability to classify photos into albums as well as add annotations (such as captions or "tags") and comments. Some photo sharing sites provide complete online organisation tools equivalent to desktop photo-management applications.

Desktop photo-management applications may include their own photo-sharing features or integration with sites for uploading images to them. There are also desktop applications whose sole function is sharing photos, generally using peer-to-peer networking. Basic photo sharing functionality can be found in applications that allow you to email photos, for example by dragging and dropping them into pre-designed templates.

Photo sharing is not confined to the web and personal computers but is also possible from portable devices such as cameraphones, using applications that can automatically transfer photos as you take them, to photo sharing sites and photoblogs, either directly or via MMS. Some cameras now come equipped with wireless networking and similar sharing functionality themselves.

Snapping a huge number of photos with a digital camera is easy, but finding a practical way to print your pictures and show them to friends and family can be a hassle. Fortunately, there are many Web sites that allow you to upload your photos to online albums and other sharing tools and to order prints of them to be mailed to your home. The last couple of years have seen an explosion in the number of these photo-sharing and photo-printing sites, which means that print prices have dropped, and the range of services offered has expanded. Whether you have a handful of vacation shots or you're a serious photographer with a big image archive, there are plenty of sites that can make printing and sharing a pleasure. We tried out more than 40 of them to give you a snapshot of your options. Most sites offer both sharing and printing, but to make it easier to get a handle on a large amount of information, we've put the details on sharing and printing in separate sections.

Image sharing

The same technology that allows digital photographs to be shared can be used for other electronic image formats. This can include computer-generated art or scans of hand-drawn artwork or photographic prints just as easily as it can include digital photographs. Even though 'image sharing' is a more general term and would include photo sharing as a subset of the available options, the term 'photo sharing' is more widely known.

Friday, April 20, 2007

Dating, Dating sites

This summary is not available. Please click here to view the post.

Tuesday, February 20, 2007

Online degrees

Online degrees

The term online degrees refers to college degrees (sometimes including high school diplomas and non-degree certificate programs) that can be earned primarily or entirely through the use of an Internet-connected computer, rather than attending college in a traditional campus setting. Improvements in technology and the increasing use of the Internet worldwide have led to a proliferation of online colleges that award associate’s, bachelor’s, master’s and doctoral degrees to students.

The goal of accreditation, according to the U.S. Department of Education, is to ensure that programs provided by institutions of higher education meet acceptable levels of quality. In the area of online education, it is important to avoid diploma mills that offer fake degrees at a cost. Students seeking valid online degrees should obtain proof of accreditation from a regional or national/specialized accrediting body in the United States. Online colleges that are fully accredited have earned a widely recognized form of university accreditation from one of six regional accreditation boards.

Each of the six geographic regions of the United States has a non-governmental, regional agency that oversees and accredits degree-granting institutions headquartered in their areas. There are six regional accreditation boards:

Middle States Association of Colleges and Schools

Northwest Commission on Colleges and Universities

North Central Association of Colleges and Schools

New England Association of Schools and Colleges

Southern Association of Colleges and Schools

Western Association of Schools & Colleges

The Department of Education and the Council for Higher Education Accreditation (CHEA) recognize the Distance Education and Training Council (DETC) as the accrediting organization for distance learning institutions and education programs that offer online degrees. Places to find good accredited online degree programs are list on www.onlinedegreeforme.com

The recognition of the quality of online degrees compared to on-campus degrees varies. While most major online colleges are regionally accredited, the public perception of their quality is in dispute. Some experts argue that degrees in certain fields are more accepted online than in others, while some programs are less suited for online-only schools.

A survey by the Distance Education and Training Council found that 100 percent of employers who responded felt that distance education program graduates performed better on the job as a result of their degree (as compared to their previous performance). Additionally, employers felt that an employee receiving a distance education degree compared favorably, in terms of knowledge learned, to someone with a resident degree.[2] On the other hand, The Chronicle of Higher Education reported in January 2007 on a Vault Inc. survey that found 55 percent of employers preferred traditional degrees over online ones. 41%, however, said they would give "equal consideration to both types of degrees."

The Sloan Consortium, an organization funded by the Alfred P. Sloan Foundation to maintain and improve the quality of distance education, publishes regular reports on the state of distance education in the U.S. In its 2006 report "Making the Grade: Online Education in the United States, 2006," it stated that "[i]n 2003, 57 percent of academic leaders rated the learning outcomes in online education as the same or superior to those in face-to-face. That number is now 62 percent, a small but noteworthy increase."

In some instances, an online degree may be no different than a degree earned in a campus-based program. The instruction is often exactly the same, and the online degree contains no special designation. An example of this is the degree offered to Columbia University students who earn a degree through the Columbia Video Network (CVN) versus the campus-based program.

Health

Health


1 Physical Health

Physical fitness is good bodily health, and is the result of regular exercise, proper diet and nutrition, and proper rest for physical recovery.

2 Mental health


is a concept that refers to a human individual's emotional and psychological well-being. Merriam-Webster defines mental health as "A state of emotional and psychological well-being in which an individual is able to use his or her cognitive and emotional capabilities, function in society, and meet the ordinary demands of everyday life."

According to the World Health Organization, there is no one "official" definition of mental health. Cultural differences, subjective assessments, and competing professional theories all affect how "mental health" is defined. In general, most experts agree that "mental health" and "mental illness" are not opposites. In other words, the absence of a recognized mental disorder is not necessarily an indicator of mental health.

One way to think about mental health is by looking at how effectively and successfully a person functions. Feeling capable and competent; being able to handle normal levels of stress, maintain satisfying relationships, and lead an independent life; and being able to "bounce back," or recover from difficult situations, are all signs of mental health.

Encompassing your emotional, social, and—most importantly—your mental well-being; All these aspects—emotional, physical, and social—must function together to achieve overall health.

3 Exercise

Exercise is the performance of movements in order to develop or maintain physical fitness and overall health. It is often directed toward also honing athletic ability or skill. Frequent and regular physical exercise is an important component in the prevention of some of the diseases of affluence such as cancer, heart disease, cardiovascular disease, Type 2 diabetes, obesity and back pain.

Exercises are generally grouped into three types depending on the overall effect they have on the human body:
Flexibility exercises such as stretching improve the range of motion of muscles and joints.
Aerobic exercises such as walking and running focus on increasing cardiovascular endurance and muscle density.
Anaerobic exercises such as weight training or sprinting increase muscle mass and strength.

Saturday, January 20, 2007

Videoconferencing

Videoconferencing

A videoconference (also known as a videoteleconference) is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously. It has also been called visual collaboration and is a type of groupware. It differs from videophone in that it is designed to serve a conference rather than individuals.

Videoconferencing uses telecommunications of audio and video to bring people at different sites together for a meeting. This can be as simple as a conversation between two people in private offices (point-to-point) or involve several sites (multi-point) with more than one person in large rooms at different sites. Besides the audio and visual transmission of people, videoconferencing can be used to share documents, computer-displayed information, and whiteboards.

Simple analog videoconferences could be established as early as the invention of the television. Such videoconferencing systems consisted of two closed-circuit television systems connected via cable. During the first manned space flights, NASA used two radiofrequency (UHF or VHF) links, one in each direction. TV channels routinely use this kind of videoconferencing when reporting from distant locations, for instance. Then mobile links to satellites using special trucks became rather common.

This technique was very expensive, though, and could not be used for more mundane applications, such as telemedicine, distance education, business meetings, and so on, particularly in long-distance applications. Attempts at using normal telephony networks to transmit slow-scan video, such as the first systems developed by AT&T, failed mostly due to the poor picture quality and the lack of efficient video compression techniques. The greater 1 MHz bandwidth and 6 Mbit/s bit rate of Picturephone in the 1970s also did not cause the service to prosper.

It was only in the 1980s that digital telephony transmission networks became possible, such as ISDN, assuring a minimum bit rate (usually 128 kilobits/s) for compressed video and audio transmission. The first dedicated systems, such as those manufactured by pioneering VTC firms, like PictureTel, started to appear in the market as ISDN networks were expanding throughout the world. Video teleconference systems throughout the 1990s rapidly evolved from highly expensive proprietary equipment, software and network requirements to standards based technology that is readily available to the general public at a reasonable cost. Finally, in the 1990s, IP (Internet Protocol) based videoconferencing became possible, and more efficient video compression technologies were developed, permitting desktop, or personal computer (PC)-based videoconferencing. In 1992 CU-SeeMe was developed at Cornell by Tim Dorcey et al., IVS was designed at INRIA, VTC arrived to the masses and free services, web plugins and software, such as NetMeeting, MSN Messenger, Yahoo Messenger, SightSpeed, Skype and others brought cheap, albeit low-quality, VTC.

Web Conferencing Software

e/pop Web Conferencing – secure, web, VoIP and video conferencing. This web conferencing software goes far beyond traditional conferencing services (PowerPoint, application and desktop sharing), to include audio (VoIP) and video conferencing, remote control, and a complete set of real-time controls over layouts, users and bandwidth – all as standard, built-in features of the product.

e/pop is available as on-premise software and hosted service. For distributed networks, on-premise installation provides IT managers with maximum control over routing, performance and security. For example, internal web conferencing company requirements can be met by installing the server behind the firewall, eliminating the need to route any traffic outside the company network. For conferencing between internal and external users, e/pop supports SSL/TLS, and even supports using the customers own certificate and/or PKI for the highest level of secure web conferencing available.

e/pop online meeting software has no server prerequisites (other than the operating system and a static IP address), thereby dramatically reducing installation and maintenance time. According to PC Magazine (May 2004) , e/pop web conferencing installs in “5 minutes and 5 mouse clicks!” e/pop is covered by Wainhouse Research, Frost & Sullivan, Gartner, and many other research firms.

AIM (AOL Instant Messenger)- Free instant messaging and video software/service from America Online.

Skype- Offers free video & voice calls over the internet, as well as many other services.

Windows Live Messenger (formerly MSN Messenger)- Free Instant messaging and one-to-one video chat. Also allows making inexpensive calls to regular phone lines. Windows only.

Yahoo! Messenger-Free chat & instant messaging software and service. Includes video.

High Speed Internet Service

High Speed Internet Service

INTRODUCTION

The Internet is a global network of computers.

There are many different types of computers on

the Internet – PCs, Macintoshes, and others – and

many of these computers are parts of smaller

networks, which are also just as varied. The Internet

is based upon a common language that

allows all these computers to talk to each other.

USES OF THE INTERNET

Companies, individuals, and institutions use the Internet in many ways. Companies use the Internet for electronic commerce, also called e-commerce, including advertising, selling, buying, distributing products, and providing customer service. In addition, companies use the Internet for business-to-business transactions, such as exchanging financial information and accessing complex databases. Businesses and institutions use the Internet for voice and video conferencing and other forms of communication that enable people to telecommute (work away from the office using a computer). The use of electronic mail (e-mail) speeds communication between companies, among coworkers, and among other individuals. Media and entertainment companies use the Internet for online news and weather services and to broadcast audio and video, including live radio and television programs. Online chat allows people to carry on discussions using written text. Instant messaging enables people to exchange text messages in real time. Scientists and scholars use the Internet to communicate with colleagues, perform research, distribute lecture notes and course materials to students, and publish papers and articles. Individuals use the Internet for communication, entertainment, finding information, and buying and selling goods and services.

The Internet can also be used to transfer telephone calls using an application known as IP-telephony. This application requires a special phone that digitizes voice and sends it over the Internet to a second IP telephone. Another application, known as the File Transfer Protocol (FTP), is used to download files from an Internet site to a user’s computer. The FTP application is often automatically invoked when a user downloads an updated version of a piece of software. Applications such as FTP have been integrated with the World Wide Web, making them transparent so that they run automatically without requiring users to open them. When a Web browser encounters a URL that begins with ftp:// it automatically uses FTP to access the item.


History of the Internet

At the beginning of the 1960s, an American researcher

had already developed the theoretical

basis for networking computers. Some years

later, the Advanced Research Projects Agency,

ARPA, a research institute of the American military,

developed such a computer network. In

October 1969, two computers in two scientific

institutes in the U.S. were connected with one

another.

After a few months, two more computers were

connected to this network, which was called the

ARPANet. In 1972 – when the network included

23 computers – electronic mail, or e-mail, was

developed. At the end of the 1970s, the discussion

groups called newsgroups came into existence.

Between the 1970s and 1983, the ARPANet was

connected to further networks. The large new

network that resulted from these connections was

called the Internet since it connected several

networks with one another. Also in this year, an

address system was established that allowed

computers on the Internet to have names rather

than the numbers by which they had previously

been identified.

Gradually, more and more countries connected to

the Internet, and by 1988, more than 50,000

computers were connected to this network. Until

this point, the Internet was used primarily by the

academic world. In 1989, an Englishman invented

web pages, that is, pages on the World

Wide Web. In 1993, a graphical web browser

was invented that allowed users to navigate easily

from one place to another on the Internet.

Thanks to this invention, more and more people

outside of the academic world began to use the

Internet – such as entrepreneurs the world over,

who set up web sites and used electronic mail.

At the beginning of the year 2000, there are more

than 200 million Internet users, and on the web

it’s possible to find information of every kind,

shopping opportunities, online games, old and

new friends – or you can take advantage of investment

and banking capabilities, hear music

and radio programs, see TV programs and films,

and much, much more.

BROADBAND

Computers store all information as binary numbers. The binary number system uses two binary digits, 0 and 1, which are called bits. The amount of data that a computer network can transfer in a certain amount of time is called the bandwidth of the network and is measured in kilobits per second (kbps) or megabits per second (mbps). A kilobit is 1 thousand bits; a megabit is 1 million bits. A dial-up telephone modem can transfer data at rates up to 56 kbps; DSL and cable modem connections are much faster and can transfer at several mbps. The Internet connections used by businesses often operate at 155 mbps, and connections between routers in the heart of the Internet may operate at rates from 2,488 to 9,953 mbps (9.953 gigabits per second) The terms wideband or broadband are used to characterize networks with high capacity and to distinguish them from narrowband networks, which have low capacity.

Higher-speed Internet transmission facilities, known as broadband, are also helping improve response times. Broadband technologies include Asymmetrical Digital Subscriber Line (ADSL), which works over telephone wiring, and cable modems, which work over cable TV wiring. Each technology allows data to flow from an Internet service provider to a user's computer hundreds of times faster than traditional dialup modems.

Domain name

Domain name

A name that identifies a computer or computers on the internet. These names appear as a component of a Web site's URL, e.g. wikipedia.org. This type of domain name is also called a hostname.

The product that domain name registrars provide to their customers. These names are often called registered domain names.

Names used for other purposes in the Domain Name System (DNS), for example the special name which follows the @ sign in an email address, or the Top-level domain names like .com, or the names used by the Session Initiation Protocol (VoIP), or DomainKeys.

They are sometimes colloquially (and incorrectly) referred to by marketers as "web addresses".

The most common types of domain names are hostnames that provide more memorable names to stand in for numeric IP addresses. They allow for any service to move to a different location in the topology of the Internet (or an intranet), which would then have a different IP address.

By allowing the use of unique alphabetical addresses instead of numeric ones, domain names allow Internet users to more easily find and communicate with web sites and other server-based services. The flexibility of the domain name system allows multiple IP addresses to be assigned to a single domain name, or multiple domain names to be assigned to a single IP address. This means that one server may have multiple roles (such as hosting multiple independent Web sites), or that one role can be spread among many servers. One IP address can also be assigned to several servers, as used in anycast and hijacked IP space.

Hostnames are restricted to the ASCII letters "a" through "z" (case-insensitive), the digits "0" through "9", and the hyphen, with some other restrictions. Registrars restrict the domains to valid hostnames, since, otherwise, they would be useless. The Internationalized domain name (IDN) system has been developed to bypass the restrictions on character allowances in hostnames, making it easier for users of non-English alphabets to use the Internet. The underscore character is frequently used to ensure that a domain name is not recognized as a hostname, for example with the use of SRV records, although some older systems, such as NetBIOS did allow it. Due to confusion and other reasons, domain names with underscores in them are sometimes used where hostnames are required.

The following example illustrates the difference between a URL (Uniform Resource Locator) and a domain name:

URL: http://www.example.net/index.html

Domain name: www.example.net

Registered domain name: example.net

As a general rule, the IP address and the server name are interchangeable. For most Internet services, the server will not have any way to know which was used. However, the explosion of interest in the Web means that there are far more Web sites than servers. To accommodate this, the hypertext transfer protocol (HTTP) specifies that the client tells the server which name is being used. This way, one server with one IP address can provide different sites for different domain names. This feature goes under the name virtual hosting and is commonly used by Web hosts.

For example, as referenced in RFC 2606 (Reserved Top Level DNS Names), the server at IP address 192.0.34.166 handles all of the following sites:

example.com

www.example.com

example.net

www.example.net

example.org

www.example.org

When a request is made, the data corresponding to the hostname requested is served to the user.