Pages

Sunday, October 9, 2011

Problem with your DELL laptop showing the Modular Bay error message?


Problem with your DELL laptop showing the Modular Bay error message?

Problem with your DELL laptop showing the Modular Bay error message?
Since I have discover the problem on the DELL Inspiron laptops, I am shocked that people have faced the same problem as I do too. Some said, they have changed or updated the version of the BIOS as well as some complains on one of the forum in [ www.techspot.com/vb/topic86568.html ] . People are searching the solution with the Modular Bay error problem, and yet there were no answer for this matter. The error message is written as below:

"The Device in the system modular bay cannot be identified. It may not be completely inserted or may have some other problem. Please read and complete the following steps."

1. Press the device completely and firmly into the bay.
2. Press the ESC-key -- wait for the system to power down.
3. Press the power button to retry detecting the device.

Else, it might look as same as figure below that I have taken from one of my client.


In what mine scenario that had caused this error occur, since my client requested for upgrading the capacity of the physical memory module (RAM) for 512MB to 2GB. After a few minutes of troubleshoot, I have came out with a solution that it might be working for you or might not either. Hopefully, it working for everyone who have the same problem, that you might be cannot get rip of those ignoring error message as well as asking user to press F1, F2 and etc.
The solution steps are as follows:
  1. Once you see the above figure modular bay error, RESTART your laptop.
 

2. Then, press F2 to enter the BIOS mode like figure below.

 

4. Choose the "Modular Bay Devices" in selection just like figure above shown.

 

5. Inside the "Modular Bay Devices" section, you need to turn OFF the modular bay function,
just like figure below.

 

6. Then, press ESC and select "Save/Exit" to exit the BIOS setup mode as like figure below.

 

7. Then, restart the laptop and check once again whether the system will logon to the windows,
as it does usually.

Tuesday, October 4, 2011

AMAZING FOOD FOR HEALTH (HEALTH IS WEALTH)

 AMAZING FOODS HEALTH IS WEALTH

These are foods that should be in everyone's kitchen because they contain a wealth of disease-fighting substances. But, keep in mind that it takes more than even 10 terrific foods to make a healthy diet. Ideally, these nutritious nibbles should replace other less healthy foods, helping you to cut calories while boosting the nutrition in your diet.

Berries

Reach for berries for a powerful dose of health-protecting antioxidants - blueberries, cranberries, blackberries, raspberries, and strawberries. The color of berries comes from the pigment anthocyanin, an antioxidant that helps neutralize "free radicals" that can help lead to chronic diseases, including cancer and heart disease. Berries, particularly cranberries, may also help ward off urinary tract infections.

 
Dairy

Dairy products are not only the best food source of dietary calcium, but also have plenty of protein, vitamins including vitamin D, and minerals. Having three daily servings of low-fat dairy products, as well as doing weight-bearing exercise helps to keep the bones strong and prevent osteoporosis. If you can't tolerate dairy and other calcium-containing foods include legumes, dark green leafy vegetables, and bananas.

 
Low-fat dairy foods make excellent snacks because they contain both carbohydrates and protein.

Fish

The fat found in fish is rich in omega-3 fatty acids, which can help protect your heart. The power of omega-3s appears to be their ability to lower blood fats and prevent blood clots associated with heart disease.
 
Dark, Leafy Greens

Dark, leafy greens - everything from spinach, methi, radish greens, mustard greens and amaranth to dark lettuce - are enriched with vitamins, minerals, beta-carotene, vitamin C, folate, iron, magnesium, carotenoids, phytochemicals, and antioxidants. A Harvard study found that eating magnesium-rich foods such as spinach can reduce the risk of developing type 2 diabetes.
 
Make your next salad with assorted greens, including super-nutritious spinach or other dark-colored greens.

Whole Grains

Whole grains include the nutritional components that are typically stripped away from refined grains. They contain follic acid, selenium, and B vitamins, and are important to heart health, weight control, and reducing the risk of diabetes. Their fiber content helps keeps you feeling full between meals as well and promotes digestive health.

 
So, include more whole wheat like lapsi (thuli or dalia), ragi, bajra and jowar in your diet.

EATING BEFORE SLEEPING IS INJURIOUS TO HEALTH SPREAD IT (URDU)

EATING BEFORE SLEEPING IS INJURIOUS TO HEALTH SPREAD IT (URDU)

Monday, October 3, 2011

DENGUE SYMTOMS INFO IN URDU MUST READ AND SPREAD

KILL THE DENGUE

DUA FOR THE PROTECTION OF DENGUE

 DUA FOR THE PROTECTION OF DENGUE


#1.Hazrat Abu Hurarah RWA se marvi hay kay aik sakhs Messenger of Allah swt kay pass aaya aur keha,"RasoolAllah SAW !Mujhe bari takleef ha iss bichoo se jis ne mujhe kal raat kaata",Aap SAW ne farmaya:Ager tum sham ko yeh kehtay"Panah leyta hoon Mae Allah kay tamaam kalmaat kii tamaam maqhlooq ki shararatoon se",tu tum..

I seek refuge in the totality of the words of Allah from the evil of creation.

#2.Usman Bin Affan RA sa marvi ha k mein nay rasul Allah SAW sa sunna k yeh dua Aap SAW Farmatay thay k jo shaks yeh kehay "In the name of Allah, with Whose name nothing can cause harm on earth nor in the Heavens, and he is the ALL_SEEING, the All-knowing'... tu uss ko koee naghani bala na poonchay ge ...phir Abban BIN Usman ko jo ess Hadith k ravi hain Falij ka aarza howa..tu jis hsaks nay enn sa yeh hadith sunni thi ...woh en ki taraf dekhnay laga --ABBAN NAY KAHA TU KIA DEKHTA HA MARI TARAF khuda ki QASAM mein nay jhoot nahi bandha na Usman par aur na Usman nay jhoot bandan Nabi karim SAw par lakin jis din yeh arza howa uss din mein ghussay mein tha aur ess dua ka parhna bhol gya ...(sana abi daud ...#5088)

In the name of Allah, with Whose name nothing can cause harm on earth nor in the heavens, and He is The All-Seeing, The All-Knowing.

NATURAL TREATMENTS FOR BROWN SPOTS


NATURAL TREATMENTS FOR BROWN SPOTS

Brown patches of pigmentation as a result are the visible result of a locally circumscribed overproduction and accumulation of the pigment melanin, which is responsible for skin color. Melanin pigment-forming cells of the skin, the melanocytes formed and passed on to the surrounding skin cells. The strength of melanin formation is both hereditary and determined by the age of the people and depends on various environmental conditions (eg the UV rays of the sun), or inflammation or irritation of the skin.



• Sun exposure:

An overabundance of sunlight caused not only premature skin aging but also pigment irregularities. Certain substances called photosensitizers (perfumes, certain medications, St. John's wort), pimples, boils, abscesses, burns, surgery, laser treatments and sclerotherapy for varicose veins increase the risk pied hyperpigmented skin areas.

• Age:


From the 40th Age occur in clusters in the melanin formation of irregularities. With inadequate protection, the so-called liver spots increase in number, size and intensity with age.

• Pregnancy / Birth control pill / hormone replacement treatments:

Hormonal changes, eg during pregnancy, and estrogen treatments also favor the occurrence of pregnancy hyperpigmented areas of the face patches (chloasma, melasma =). The skin areas where the brown stains occur most often are the cheeks, forehead, upper lip and chin area, which is of smaller individual patches to all the areas mentioned anything is possible.

4 quick tips on how to lose weight quickly without exercises

4 quick tips on how to lose weight quickly without exercises

Most of us seem to be already occupied with a lot of things in those days. And it is not surprising that physical activities are rarely included on our to-do list, even if we consider the fact that we continuously recorded on the extra pounds by the day. This is when we look at different ways how to lose weight fast without exercise and easily learn to incorporate these tips into our daily lives trying.

Although it is difficult for some people believe that we will lose weight fast without exercise, there is still some that such possibilities are not implausible to exist. One can not deny that the rate of metabolism in our body plays a very important role to burn fat and cut some excess pounds.

How can we increase our metabolic rate so that we are able to help us lose weight fast without exercise?

Here are 4 quick tips on how to fast weight without exercise, you start to implement and integrate into your daily life can be lost.

Tip No. # 1 - Eat breakfast every day

Yes, many people simply ignore the fact that breakfast is the most important meal of the day. And it is not surprising that people who eat breakfast regularly those slimmer than those who do not appear. Your metabolism can be slowed down if your first meal in the morning or during lunch time is taken. Now this is a basic tip is to learn if you really want to lose weight fast without exercise, do not you think?

Tip No. # 2 - Stay away from sugar

Try to keep your intake of sugar-based food minimized. Sugar gives the body permission to store fat and it is recommended that if you lose weight without exercise will, you have to food to preserve and consume even level of blood sugar levels helps.

Tip No. # 3 - eat spicy foods

Hot cuisine with peppers can increase metabolism and help, burn fat faster than you think. I would not mind filling my stomach full of hot and spicy foods once in a while, just to be able to lose weight quickly without exercises.

Tip # 4 # - Sleep More

This is definitely one of the better tips, especially for natural born lazy people like me. Studies have shown that people who do not sleep enough tend to gain weight faster. In fact, muscles are during the last few hours of sleep regenerates.

Would you like the formula of an amazing breakthrough diet that can actually get you to lose 9 pounds in 11 days, without breaking a sweat in the gym and on without your favorite food

13 USEFULL TIPS FOR LOSING WEIGHT NATURALLY

13 TIPS FOR LOSING WEIGHT NATURALLY

 


Weight loss Tip # 1 

Include plenty of fruits and vegetables in your diet. They are high nutrition healthy foods that are very low in calories. So if you know how to weight lose fast, of course know , you make sure you fruits and vegetables in at least two meals to eat .


 Weight loss Tip # 2

Lean meat to eat . Go for steamed, broiled or roasted meat. Never fried, as it adds the calories and most of the nutrients in meat obtained by cooking it lost in this method.

Weight loss Tip # 3

Eating five small meals you one day, evenly distributed at equal intervals. Binge in this way the tendency is reduced, plus greatly improved digestion.
 

Weight loss Tip # 4

One of the most important tip to lose weight , naturally and quickly - eat no processed foods, fried and fatty foods and high sugar foods . Don't have soft drinks and alcohol if you are serious about your healthy weight -loss goals.

Weight loss Tip # 5

Drink water all day, even between exercise. Water keeps the body hydrated. It improves digestion and makes sure that all waste received at the time eliminated from the body.

Weight loss Tip # 6

How to lose weight naturally speaking, the answer lies in a variety of foods, including in your daily diet. This ensures that your body the right blend of all essential nutrients receives. Include high protein and high fiber foods in your diet every day, like the stomach full for a longer period and so you won t keep you hungry for some quiet time after dinner .

Weight loss Tip # 7

Eat negative calorie foods such as tomatoes and cucumbers. Your body burns more calories to digest in you, as these foods actually contain!

Weight loss Tip # 8

Take an egg breakfast every day. Eggs are not only rich in protein and calcium, but also contain vitamin B12, which, according to research in weight loss from the body helps .

Weight loss Tip # 9

Want to know how natural to weight loss follow this simple rule - if your breakfast, the heaviest meal of the day. Dinner should be very easy . Take your dinner two hours before going to bed so that your body has enough time to digest it.

Weight loss Tip # 10

Avoid always stressed. Plan and plan your day properly leave enough time for socializing and with your family. For at least seven hours sleep, and take short breaks between work. If possible, do yoga and meditation as they are known to mental stress reduction . With a calm mind, you are likely to avoid emotional eating, which is often seen in people who are overweight.

Weight loss Tip # 11

The quickest way to lose weight naturally is by combining healthy eating with an exercise routine. Exercise at least half an hour every day. However, to lose some serious amount of weight, you associate a fitness studio.

Weight loss Tip # 12

Cardiovascular exercises such as swimming, jogging, aerobics and walking are a must for natural decline . This should be done at least three times per week for natural weight loss.

Weight loss Tip # 13

Resistance training , weight lifting and floor exercises are done each day, targeting a specific body part each day. So, if you want to know "how to reduce weight naturally and tone of a particular body part? As an occupation, the right mix of these will suggest exercises to train each individual body as needed.

Wednesday, September 28, 2011

What is an IP address/IP Address Classes/

What is an IP address

IP stands for Internet Protocol. An IP address is a logical identifier that is used to distinguish network devices. Much like a phone number identifies a telephone, an IP address identifies a network device. An IP address consists of four octets that are represented in decimal form and are separated by a period. For example, 10.1.20.145.

What Does an IP Address Do?

One of the most powerful features of modern computers is that they are able to communicate i] !E (0@  Uk Ucation between devices allows people to share information such as this web page. The IP address is used to identify which machine is to be accessed.

Despite rarely seeing an IP address, computer users utilize IP addresses every time that they access information or an applications that are not hosted on the local machine. IP addresses are masked by DNS (Domain Name Service) names which make the service legible. Without DNS users would have to type IP addresses into the Internet Explorer address bar. 
There are three types of IP addresses

Unicast – The most popular form of transmission. This type of address is used for 1 to 1 communication between two hosts. When an IP device sends its traffic directly to another IP device this type of traffic is known as unicast traffic. For example, a computer requests a web page from a web server (such as the web page you are currently reading!). The requests are sent directly from the computer to the web server and in return the web server replies directly to the requester.

Multicast – This type of address is used as an efficient way of sending the same data from one sender to many receivers.

Broadcast – 

This type of address is used as a discovery mechanism. IP broadcasts are used when there is one sender and all other devices on the network are the intended recipients.

Because IP is a logical address defined in Layer 3 of the OSI (Open Systems Interconnection) model, packets are encapsulated with Layer 2 headers. Not all Layer 2 technologies support broadcasts, frame relay is one such example. 

The most popular layer 2 technology in the world, Ethernet, does support broadcasts. When Ethernet encapsulates an IP broadcast it generally sets the destination to the special MAC address FF:FF:FF:FF:FF:FF.

Unicast addresses are either Private or Public

Private – 

Private addresses are not usable on any public networks such as the Internet. 
Private IP addresses are defined by RFC 1918.
Private address ranges include 10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16

Public – 

Public addresses are used by public networks such as the internet. The Internet Assigned Numbers Authority is responsible for the global coordination of public address allocation.

IP Address Classes

Class A - 

Any network where the first octet is between 0 - 126. 
The classful boundary is N.H.H.H
For example 10.25.105.3

Class B - Any network where the first octet is between 128 - 191. 
The classful boundary is N.N.H.H
For example 172.16.200.109

Class C - 

Any network where the first octet is between 192 - 223. 
The classful boundary is N.N.N.H
For example 202.3.126.178

Class D -

Reserved for Multicast Traffic. The first octet is between 224 - 239.
For example 224.1.1.1

Class E -

 Experimental - used for research. The first octet is between 240 - 254.

Network Diagram Basics/network Key Icons and Shapes

Network Diagram Basics

Network diagrams can represent a number of different aspects about a network so it is important prior to starting to understand what the diagram will be used for. The best diagrams speak for themselves and require very little explanation. Some common uses include:

Document physical equipment and connections
Show routing path or switching path 
Show logical connections or logical relationships between systems
Document carrier or third party connections

Key Icons and Shapes

Using high quality icons is essential for developing professional looking network diagrams. If you need network icons here are some sites that provide good free resources:
Router Icon - Represented by a circle with four arrows engraved on top. This icon is used to represent Layer 3 routing devices only. 

Router Icon - Represented by a circle with four arrows engraved on top. This icon is used to represent Layer 3 routing devices only. 


Switch Icon - Represented by a rectange with four arrows engraved on top. This icon is used to represent Layer 2 switching devices.



Multilayer Switch Icon - Multilayer switches are a hybrid between routers and switches. In other words they are switches that have routing capabilities.



Dedicated Firewall - Used to represent devices that have the sole function of acting as a firewall.





Switch with Firewall Module - Some high end switches are able to run firewall modules allowing the device to double as a switch and a firewall. 

Key Connectors

Most connection points are represented using lines. You may vary the width of the line to represent greater or lesser bandwidth accross the link if required.
 
Link -  Network connections are represented by lines connecting to each device.


Etherchannel - A number of links grouped together into a single logical link. Negotiated ethercannels  use the LACP or PAGP protocols.

Cloud - Clouds represent any third party network not under your direct administrative control. The internet, for example, may be represented using a cloud.
 
Sample Physical Connections Diagram

This diagram shows the physical connection points in a small network. The diagram shows interface assignments, speed, router hostnames and management addresses.
 
Sample Routing Diagram

This diagram shows routing parameters in this small network. OSPF Area 0 is configured on the Fa0/2 interfaces of Router 1 and Router 2. OSPF Area 1, configured as a stub area is applied to Fa0/1 of Router 1 and Router 3. Router 3 redistributes its directly connected networks into OSPF. The OSPF router roles are also shown as well as non-OSPF routing functions such as directly connected routes and the trunk port to the switch.

If a network engineer was given the task of configuring routing on this network this diagram would give him/her the necessary information to apply a complete routing configuration on every device.
 
Third Party Connections 

Third party managed networks such as an Internet connection can be shown as a cloud. In this instance a layer 3 switch with a Firewall module connects this small office to the Internet. 
 

How to Keep Your Kids Safe Online

How to Keep Your Kids Safe Online

Even a five year old kid today knows what Google is and what social networking means. However, there are a lot of rogues out there - people as well as websites. How to protect your kids from the world wide web? Learn as you read on...
Internet is no longer a privilege - it is a necessity. It is something we have heavily come to depend on. Sometimes it is hard to believe that till just about a few decades ago, completing a project meant take the time out to go to a library, armed with a notebook and all kinds of drawing and writing materials, and going through piles of books to compile decent amount of information, which would then go into a project. Gone are the days when an assignment meant creating working models. Everybody has become tech-savvy, so that now we would rather prefer animation to working models, power-point presentations to actual flow-charts. As with everything in the world, this has several pros and cons (personally, more cons, I think). However, one inevitable outcome of all this is - everybody is on the internet. However, the immediate concern that arises in the mind is, everything on the internet is accessible to everyone! How then, can you protect your child and ensure his/her safety online?

5 Point Plan to Ensure Your Child's Online Safety

Here are five very basic and easy to implement ways in which you can protect your child from bad influences on the internet.

Internet Hours
Fix up a time in the day when you child can access the internet. Do not let your child access the internet during any other times of the day. However, be fair when you are doing this. The child should not feel like you are bossing on him/her or are being unreasonable or rude. It should be a fair game. The main reason behind this is - if you child develops a rebellious attitude, he/she is going to want to break the rules! This may in turn, fuel a situation to arise where things go out of control. Also, decide on a time when you will be in the house. You need not pull up a chair and sit behind your child and monitor each and every page he/she visits. But the fact that you are around will prevent your child from being naughty. Also insist on leaving the door to your child's room ajar, if not completely open. Do not let him/her bolt the doors from inside the room.

 Passwords
Make sure you computer is well protected. Put passwords on programs that you think are harmful for your child. You can even store games within password protected folders. Make sure you create a secure password. Passwords are a good way to keep your children out of stuff that you think is inappropriate for them. However, if you do create a password, make sure you know how to recover your data from an event of password hacking. Kids nowadays, know more than we can imagine! So keep yourself updated on the various hacking software, and make sure your child does not lay hands on any of them.

 Parental Control
Block access to all those websites that may contain content - including the actual content on the website as well as advertisements of products and services - that you think is inappropriate for your child. Also, never edit the settings when you want to use the computer. You can access all the websites you want in other ways. Create different user profiles for the computer with different internet settings. Again, remember to protect the user profiles with suitable password.

 Limit Purchases
Online shopping makes life a lot easy - with books, clothes and all sorts of things available online. You may want to purchase a few goods for your kids; a limited edition book, or a special edition CD or DVD of a movie, etc. Make all these purchases yourself. Do not reveal your PayPal details and credit card details to your kids. You will hence be able to keep a tab on what your kids buy online. Allowing you child to make individual purchases online could be twice as dangerous. Firstly, you do not know what they are purchasing and whether it is alright for them to purchase it or not. Second, you will not have any control over how much money your child spends online! This will include membership fees to websites, actual purchases, and a lot of other things.

Inculcate Responsibility
The best way to restrict your kids online is to make them responsible and to make them understand WHY they should not do certain things online. Gain their confidence. Do not simply lay down rules - make them understand why you are doing what you are doing. Kids nowadays, belong to the Y Generation - they always want to know why. This is not a part of being audacious or rebellious. This is just the way kids are coming to be now. But most of the times, parents do not know how to deal with this constant questioning, and this is when they bring in the whole authority issue. Understand this, and act accordingly.

I believe this has given you some hope about your child's safety online. Educating yourself and your kids about internet safety should be the top most thing on your list when you are introducing the world wide web to your child. Making your child grow up to be a responsible individual of the society will take care of most problems regarding safety in all sense - even on the internet. Do not use force - it will only drive your child further in the direction of misbehaving and overthrowing your authority. Instead, stress more on using logic and convince your kids about your points of view. All the best!

Internet and its Uses in Our Daily Life

Internet and its Uses in Our Daily Life


The impact of the Internet on our life is obvious and cannot be sidelined. It has use in almost each and every domain of business. The popular uses of the Internet have been discussed in detail in the following article.
How difficult our life would have been if there was no Internet. Think about it. To find some information, we all have acquired the habit of 'Googling' it on the web; within a few seconds the screen displays the desired information. You want to book tickets for a movie night with friends, you can book them at the click of a button, again through the Internet media. Many of us cannot imagine life without the social networking sites. The Internet has indeed made the world a small place and living life easier. And the rapid progress of technology has made it possible to access the Internet from anywhere through plenty of means. It has such a plethora of uses in our daily life that we use it for one purpose or the other almost daily. The routine uses and some positive effects of the Internet in various sectors have been discussed in detail below.

The Uses of the Internet in Daily Life

For Information:
For a layman, Internet is nothing but a collection of websites. And there are innumerable websites that serve a variety of purposes. There are news websites, social networking websites, websites that provide information and websites of various businesses and organizations. These websites are updated frequently to provide information to the user. You can find everything of anything on the web just by browsing through a few websites. You can also use emails, blogs, IM chat, social networking websites and communication software for sharing your information with the world. The Internet has made access to information cheaper and easier and this is its most common use in daily life.

Business & Advertising:
Almost all the businesses these days have websites, through which they promote and advertise themselves. This medium these days has been used extensively for promotional campaigns. Not only promoting your business but you can also effectively advertise your event or any cause on this medium. There are many businesses that depend on the Internet for their survival like stocks and call centers, to name a few. It has promoted faster access to necessary information which strengthens the business processes.

Education:
Internet also is a popular medium used by students. Many students use it for educational purposes, like for finding study material or for applying to some college or university. It is now a virtual world and all the applications are done online through the website of the concerned educational body. Students use websites for these and many other purposes like checking exam results, exam schedule, application procedure to any course, etc. Students also take the help of the Internet for project help and for obtaining the required images. Everything on the Internet is a click away from us.

Communication & Networking:
The use of the Internet for networking is very popular among all age groups. There are many good social networking websites that are used by people for communication. These websites provide an effective and easy platform that facilitates interaction. In daily life, it is widely used as a means of communication through means like networking websites, chat websites, blogs, etc. Through these websites you can also share your photographs with your near and dear ones. The Internet is widely used by job seekers for job applications and job searching. Facilities like video conferencing has made it possible to conduct interviews online.

Entertainment:
Another popular use of the Internet in daily life is for entertainment. Facilities like listening to online music, downloading music and movies provides a platform for entertainment. There are plenty of other ways through which you can entertain yourselves on the Internet. You can play online games, view sports matches, or watch videos of your choice. It is a trusted means of entertainment for these kinds of purposes and is extensively used for the same.

Other Popular Uses:
It is popularly used for banking. Almost all the banking transactions are possible through this medium. Apart from these common uses, it can also be used for shopping. Online shopping is very popular among masses and on the Internet you can buy any thing and get it delivered at home. There are also many people who use it to work from home.

These were some of the chief common uses of the Internet in our daily life. It is a boon for us and has made our life easy by facilitating so many uses. But it is also prone to attacks of many kinds that threaten safety over the Internet. To protect the Internet from these attacks we should all use it carefully and also protect ourselves from various privacy intrusions. The Internet as a tool for communication will always remain its most powerful use. The array of uses of the Internet is vast and with the progress of technology new uses will get added to the list of uses continuously.


latest vacancy/jobs click here

www.orbittutorials.com provide jobs from all newspapers in pakistan like: All Paper Jobs, Paper PK Jobs, Jang newspaper jobs, Dawan newspaper jobs, express newspaper jobs and nawaiwaqt newspaper jobs. The basic reason of this site is to provide daily published jobs from all newspaper at one place to all job seekers. 



Monday, September 26, 2011

Gold forecast to beat $2,000 in the next year 2012-2015



Gold forecast to beat $2,000 in the next year

The gold market is revving up to reach new record highs in excess of $2,000 an ounce in the next year, according to the average forecast of bankers, traders and investors at the gold industry’s largest annual gathering.

The bullish prediction, if correct, suggests that the gold bull market remains intact, despite the price of the metal having already gained almost 30 per cent this year and 600 per cent over the past decade.

Central banks return as gold buyers

The widespread optimism at the London Bullion Market Association conference in Montreal, the largest gathering of the gold industry, comes as the gold market has been transformed from a backwater dominated by jewellery demand to one of the hottest investment assets.

The conference, which enjoyed a record attendence in excess of 500, predicted that gold would be trading at $2,019 a troy ounce at the time of next year’s meeting in November 2012. That would mark a fresh nominal record for gold, although it is still below the inflation-adjusted peak touched in 1980, which translates to more than $2,400 in today’s money.

The delegates at the LBMA conference have a strong record of predicting the trajectory of the gold price, although their forecasts have traditionally been overcautious. Last year, with gold trading at $1,298 an ounce, the conference predicted a price of $1,450. On Tuesday, bullion was trading at $1,805.70, down from a record peak of $1,920 in early September.

The forecasts, if accurate, bode well for hedge fund managers such as John Paulson of Paulson & Co and David Einhorn of Greenlight Capital, who bought gold in the financial crisis as a means of betting that governments and central banks would fail to safeguard their economies from the market turmoil.

Many hedge fund investors believe a sharp appreciation in the gold price is likely as they expect the eurozone debt crisis to deepen.

Despite the optimistic price predictions, traders were wary of growing volatility in the gold market, which has experienced some of the sharpest swings on record in recent weeks. Asked whether the market was in a bubble, 39 per cent of the traditionally bullish audience replied that it was. A growing number expect the market to accelerate in the next year or two and peak above $2,500.

“We expect to see $2,500 some time in the next 12 months,” said Som Seif, chief executive of Claymore Investments, a Canadian asset manager.

The most bullish forecast came from Pierre Lassonde, chairman of Franco-Nevada, who predicted that gold would reach parity with the Dow Jones Industrial Average index, at present trading at 11,400, within the next four to six years. “This bull market is far from over,” said Mr Lassonde, whose predictions are optimistic even by the standards of market bulls.

A drop below $1,600 an ounce could mark the end of the rally for the next few months, traders believe – although many expect demand from Asian investors and central banks to prop up prices above that level.

Mr Lassonde said: “I think there’s going to be a strong correction at some point and it’s going to set up the last phase that will take the market to numbers that few people can imagine.”

The bullish sentiment has been underpinned by the strength of demand for coins and small bars from retail investors from Germany to China.

Steven Nathan, marketing director at the Rand Refinery in South Africa, said that sales of the popular gold krugerrand coin were at a record level: “Demand is insatiable. It’s the strongest period ever right now.”

A comparable surge in demand was reported by other mints, refiners and coin dealers. “I just can’t see the price coming down,” said one senior precious metals banker. “Physical demand is incredibly strong.”

It may be tempting to push the analysis even further and question if gold is a safe haven from market volatility and fears, or it’s just a popular buy among Chinese and Indians worried about inflation. 

The reasoning for this is that gold’s rally this year has been driven primarily by retail investors in China and India, as well as central bank buying. 

And it may well be Chinese and Indian consumers are enough to rescue gold from falling off the same cliff that oil did after the 2008 crude bubble popped in spectacular fashion in the last global financial crisis. 

Of course, there has been more to gold’s rally in 2011 than Asian buyers with some additional demand from so-called sophisticated investors in the form of paper gold futures and exchange-traded funds, but this pales when compared to the buying in the form of jewellery and bars and coins.
Gold surged 35 percent from the start of the year to the Sept 6 peak, before slumping as the dollar gained when investors sought the ultimate safety of US Treasuries amid fears of a new global recession. 

Gold has dropped some 14 percent so far this September, its worst monthly performance in almost three years. Of course, part of this is just the recent strength of the US dollar. In euro terms, gold is down about 1.6 percent since its recent peak on Sept.9 and in Australian dollar terms it’s down 6 percent since the recent peak on Aug 22. 

Bullish gold bets on COMEX were cut by almost 14 percent to 160,322 contracts last week as hedge funds and other speculators rushed for the exits, their haste being aided by an increase in the margin requirements to hold gold lots. 
The ETFs fared better, with the largest, the SPDR Gold Trust, remaining relatively stable with 1,252 tonnes of the yellow metal at the end of last week. 

This is down from the Aug. 8 peak of 1,309 tonnes and from the 1,280 that the fund started the year holding. 
The COMEX Gold Trust, which has been taking market share from the SPDR, ended last week with about 168 tonnes of gold, up from 117 tonnes at the start of the year. 

Wednesday, September 21, 2011

WHAT IS Wireless Fidelity Wi-Fi


Wireless Fidelity Wi-Fi


A typical Wi-Fi setup contains one or more Access Points (APs) and one or more clients. An AP broadcasts its SSID (Service Set Identifier, "Network name") via packets that are called beacons, which are usually broadcast every 100 ms. The beacons are transmitted at 1 Mbit/s, and are of relatively short duration and therefore do not have a significant effect on performance. Since 1 Mbit/s is the lowest rate of Wi-Fi it assures that the client who receives the beacon can communicate at least 1 Mbit/s. Based on the settings (e.g. the SSID), the client may decide whether to connect to an AP. If two APs of the same SSID are in range of the client, the client firmware might use signal strength to decide which of the two APs to make a connection to.

The Wi-Fi standard leaves connection criteria and roaming totally open to the client. This is a strength of Wi-Fi, but also means that one wireless adapter may perform substantially better than the other. Since Wi-Fi transmits in the air, it has the same properties as a non-switched ethernet network.
 

Wi-Fi Devices

Wireless Access Point (WAP)

A wireless access point (AP) connects a group of wireless stations to an adjacent wired local area network (LAN). An access point is similar to an ethernet hub or switch, but instead of relaying LAN data only to other LAN stations, an access point can relay wireless data to all other compatible wireless devices as well as to a single (usually) connected LAN device, in most cases an ethernet hub or switch, allowing wireless devices to communicate with any other device on the LAN.
 

Wireless Routers

A wireless router integrates a wireless access point with an IP router and an ethernet switch . The integrated switch connects the integrated access point and the integrated ethernet router internally, and allows for external wired ethernet LAN devices to be connected as well as a (usually) single WAN device such as cable modem or DSL modem . A wireless router advantageously allows all three devices (mainly the access point and router) to be configured through one central configuration utility, usually through an integrated web server .

Wireless Ethernet Bridge

A wireless Ethernet bridge connects a wired network to a wireless network. This is different from an access point in the sense that an access point connects wireless devices to a wired network at the data-link layer . Two wireless bridges may be used to connect two wired networks over a wireless link, useful in situations where a wired connection may be unavailable, such as between two separate homes.
 

Advantages of Wi-Fi

  • Allows LANs to be deployed without cabling, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs.
  • Wi-Fi silicon pricing continues to come down, making Wi-Fi a very economical networking option and driving inclusion of Wi-Fi in an ever-widening array of devices.
  • Wi-Fi products are widely available in the market. Different brands of access points and client network interfaces are interoperable at a basic level of service. Products designated as Wi-Fi CERTIFIED by the Wi-Fi Alliance are interoperable and include WPA2 security.
  • Wi-Fi networks support roaming, in which a mobile client station such as a laptop computer can move from one access point to another as the user moves around a building or area.
  • Wi-Fi networks support roaming, in which a mobile client station such as a laptop computer can move from one access point to another as the user moves around a building or area.
  • Wi-Fi is a global set of standards. Unlike cellular carriers, the same Wi-Fi client works in different countries around the world.
 

Disadvantages of Wi-Fi

  • Wi-Fi can be interrupted by other devices, notably 2.4 GHz cordless phones and microwave ovens.
  • Power consumption is fairly high compared to some other standards, making battery life and heat a concern.
  • The most common wireless encryption standard, Wired Equivalent Privacy or WEP, has been shown to be breakable even when correctly configured.
  • Wi-Fi Access Points typically default to an open ( encryption -free) mode. Novice users benefit from a zero configuration device that works out of the box but might not intend to provide open wireless access to their LAN.
  • Wi-Fi networks have limited range. A typical Wi-Fi home router using 802.11b or 802.11g with a stock antenna might have a range of 45 m (150 ft) indoors and 90 m (300 ft) outdoors. Range also varies with frequency band, as Wi-Fi is no exception to the physics of radio wave propagation. Wi-Fi in the 2.4 GHz frequency block has better range than Wi-Fi in the 5 GHz frequency block, and less range than the oldest Wi-Fi (and pre-Wi-Fi) 900 MHz block. Outdoor range with improved antennas can be several kilometres or more with line-of-sight.
  • Wi-Fi networks can be monitored and used to read and copy data (including personal information) transmitted over the network when no encryption such as VPN is used.