Kamis, 31 Mei 2018

Six Ways to Embellish Your Office without Spending Too Much

Six Ways to Embellish Your Office without Spending Too Much

Image source: http://thirtysixmonths.com/wp-content/uploads/2013/03/Decorate_on_budget_cheap.jpg

Most of the organizations are much more concerns about what employees might do with their workspace. Perhaps because of aesthetics or to avoid possible damage to offices, and as employees it's essential to stick with rules of the company.

By applying traditional ways of decoration, there is a chance to cause damage at the work place. By using sticky tape there is a tendency to pinch some paint, if you are using the poster, then it could leave an oily residue on your wall or even could your lift paint, and thumbnails could leave ugly holes in walls.

Here we have discussed some alternative options for personalizing your office.

1. You could use magnets for dressing up your filing cabinet. It could be a memento magnet from your most recent holiday or just some amazing things which you like the look of having bought from a nearby shop. You could also use magnetic words of initials of your name, usually known as magnetic poetry/words. These ideas could be brilliant for people who love writing or anyone who like to play with words. By using magnets, you could create unfixed and attractive displays on whiteboards. Just keep in mind not to place magnets on your PC or any other electronic tools.

2. You can put a photograph in your office it could be a classic photo along with a frame. Usually, it is considered to be the best alternative for a workspace. However, don't worry if there is no free room present on your desk, do not despair. You can use an old or sticky strip of magnet that you could easily buy from a craft shop to hold fast your picture on the board. In this way, you could easily hang it on your filing cabinet as well. On the other hand, you can use a Velcro whish consist of an adhesive magnetic back. It will hold your picture correctly on any fabric partitions present in your office. For avoiding any damage to the image, you should use light photo frame for sticking the magnet or Velcro on it.

3. You could also use different paintings either done by children or by yourself, and you can also attach small ornaments to fabric partitions by only using a dress-making pin.

4. Usually, a cactus plant is considered to be the most amazing way if you want to give a natural touch to your office. Just because it typically prefers tenderness and require a tiny amount of water cactus are the safest plant which you could have around your documents and also electronic equipment. Usually, it is available in various shapes and sizes, even some of them are available with flower, and are available at very cheap rates.

5. You could use your computer in decorating your office or cabin. Just by selecting simple wallpaper and an excellent screensaver you could use your PC, in the decor of the room. If permitted by higher authorities, then you can also display pictures with your family, or I could be related to your holiday. You can upload these images to the hard drive of your PC and could set a truly modified slideshow. You can also use a small trinket or toy and place it at the top of your computer's CPU.

6. The decorating office is a good opportunity for people who use to have crafty preferences. It's amazing to combine the love of manufacturing things with the supplies desirable on a desk, for the complete satisfaction of resolution. You can create your personalized pen holder, business card container, or other functional desktop utility. It could include a cardboard, paper-Mache, tiny cardboard tubes, or goblet jars and you can transform all these into handy containers. You can use paint, stickers, beautiful papers, or other appealing things which are both practical and unique for decorating them. You can take lots of ideas from the internet as there are lots of ideas present there, which includes all the instructions and suggestions resources.

In this way, you can easily create impressive personalized work setup in your office with the help of office painting or cabin without compromising lots of surfaces. Firstly you should find out about the rules and regulations of the company in which you are working for analyzing what is acceptable or what you should avoid. After then, by considering all the guidelines, you can decorate your office space.

Singapore IT Jobs for Prosperous Future

Singapore IT Jobs for Prosperous Future

Image source: http://www.jobsdb.com.sg/StaticContent/SG/CareerEvents/images/jsnljan-feb2011.jpg

It is also beneficial to use social networking sites to find singapore it job . There are several websites and blogs where you can interact with other job seekers and providers. This gives you the opportunity to send your CV and a potential employer to see and offered an adequate job of IT in Singapore, which coincides with your area of expertise. Besides this, you need to be in touch with friends and colleagues. In order to get a job in Singapore, we also need to connect with people who can provide information about different jobs that are available. You should get references from family and friends have jobs in Singapore, including salary and the type of work offered.

If you are look for an excellent career in the IT sector, which can be very useful and profitable. You have to start a step in the correct direction and learn methods to obtain a leadership position in an organization. It is very essential to register with some recruitment agencies in Singapore of the information. You would have to pay registration fees and have your updated resume. It is well known that these people have contacts with companies looking for talented candidates.

Experts in areas related to information technology should be in high demand. Singapore employment agencies are conducting a lot of resources into the technology sector. So there are career opportunities in multimedia, Internet marketing, web development, commerce development, wireless networking and sales of strategic planning. Singapore is the ideal place to live and work. Many people seeking singapore it job over the Internet. The availability of jobs can be acquired from multiple sources, whether traditional or modern forms. Employers also are helping job seekers by advertising their jobs through multiple media, rather than one. This will allow them to go through the interview, with the hope of setting the right personality for the job.

Jobs data entry are among the most popular and easiest of jobs on-line, team-based. In fact, if you only have to know how to copy and paste into Microsoft Word and Microsoft Excel, you can do a lot of these jobs. Another great advantage of making these works is that you do not need to leave home to earn a living. All you need is a Pay Pal account and, credit card or debit card - and you're done! There are a number of websites dedicated to the Singapore-based jobs of data entry. If you are in Singapore, or if you want to make entry jobs for entrepreneurs in Singapore, you can simply search Google search. Career jet.sg and Singapore.recruit.net Are some websites that offer premium work data entry. Joining these networks will allow you to meet thousands of entrepreneurs, belonging not only to Singapore but also around the world.

Singapore is surrounded by more than 50 islands. The most visited places are Pulau Ubin, the island and the island of Kusu St.Johns. The interesting part is that you can hire a ferry and visit the islands on their own. You can get to Johor Bahru, Malaysia from Singapore through the 12 km road link. What you can buy in Singapore? There are many to buy, many shopping complexes and malls. Money people prefer to buy electronic goods and gold. So where can the electronic products available in Singapore? Most electronics available at Mustafa Center, Sim Lim Square, Orange Electronics. Interesting things are that they are willing to 3-4 months in Singapore, where you can get electronics at a very cheap price. Yellow gold offering to sell mainly to Mustafa Center and many shops in Little India, where, as Gold Silver is available in many resorts in Singapore.

Rabu, 30 Mei 2018

Silicon in the Modern Era

Silicon in the Modern Era

Image source: http://www.strictlyfitteds.com/sites/default/files/u816/san-francisco-giants-silicon-59fifty-fitted-cap-by-new-era-mlb-02.jpg

Silicon, denoted by its chemical formula Si, is a semiconducting material made from silica. It was discovered by a Swedish chemist, Jons Jacob Berzelius in 1824.

Silicon element is available in abundant, making up 27.7% of the Earths crust. It is found in the form of oxides or silicates, such as flint, jasper, mica, sand, mica clay, asbestos, quartz, amethyst and granite. Silicon is a non-metallic element and gray in color.

One of the major characteristics of silicon is that it can be combined with many other elements in order to make useful products, starting from soap, shampoo, glass materials, medical implants and enamel to most notably semiconductors. Pure Silicon is used in producing ultra-pure silicon wafers, which is used in semiconductor industry, such as electronics and photovoltaic applications (like solar panels).

Silicon is widely used for integrated circuits (ICs). This is because it remains a semiconductor even at very high temperatures, which is very beneficial for processors, power supplies and motherboards, where the temperature is usually high.

A silicon wafer is a thin slice of silicon crystal, which is used in fabricating integrated circuits or similar devices. This wafer is the base substance for microelectronic devices built in and over water. To become functional, it undergoes through many micro fabrication processes. They are available in different sizes, depending upon the application of the water itself. For a wafer to function properly, it should have a uniform specification, without any deviation or error. Flatness, edge and bow are some of the other factors which should be uniform. Earlier, these wafers were hand crafted, but with the advent of technology, the new technological devices allow computer controlled devices to manipulate these silicon wafers.

A typical Integrated Circuit has hundreds or thousands of wafers and layers, placed efficiently to get the maximum efficiency from an electronic component. With the introduction of the nanotechnology, these wafers and layers have become microscopically tiny, thus taking very less physical space. The first computers use to take space of a room, but nowadays, they can easily fit into the palm of our hands. To make a device perform faster and efficiently, it requires a lot of electricity, a consequence of current material use. This is clearly not beneficial for small devices such as laptops, notebooks and phones, where the energy provided by the battery is much lower than a household plug.

It is very important that each and every wafer should be particle-free. Even if there is a single particle on a polished wafer, its functionality will be impacted.  There are also different grades to classify wafers. Those which are greater than hundred and fifty millimeters are usually divided into process test and mechanical test varieties.

Manufacturing

The manufacturing process of silicon wafers is very complicated and tedious. A number of sequential processes are involved that are required to create an electronic circuit. As the demand for semiconductors continues to rise at a faster rate, the companies manufacturing the silicon wafers are finding it difficult to keep up with the demand.

Use of Silicon for Constructing Solar Panels

Though there are many materials available today to construct solar panels, silicon solar panel is the most reliable solar cell material. Moreover, it is most affordable to among other semiconductor materials. Even though the development of third-generation technology is occurring today, still the substances used for the first-generation models are being refined to make consumer solar panels perfect.

Pure crystalline silicon is never used in solar technology as silicon in pure form is a poor semiconductor of electricity. Thats why some impurities such as phosphorus are used to make it efficient in converting sunlight into electrical energy. Silicon doped with phosphorus is termed as N-type silicon, whereas when doped with boron, it is termed as P-type silicon.

Summing Up

The use of silicon in the modern era cannot be understated as it is being widely used in computers, mobile phones, televisions, satellites and solar panels. Moreover, Silicon Valley is named because of silicons amazing usefulness in the modern era.

Should the Legal Drinking Age Be Lowered

Should the Legal Drinking Age Be Lowered

Image source: http://genhejunyi.com/images/edward-abbey-essays_19667014.jpg

The 21 minimum legal drinking age (MLDA) law is currently one of the most scrutinized and debated laws in the US. This article presents the views of the different stakeholders in this issue.

The United States has the highest legal drinking age in the western world. This age limit was established by the National Minimum Drinking Age Act of 1984. This law was driven largely by the desire to reduce traffic fatalities associated with alcohol consumption.

This requires all states in the US to legislate and enforce a minimum legal age of 21 years for purchasing and publicly possessing alcoholic beverages. States that does not comply with the provisions of the act are subjected to a 10% percent decrease in its annual federal highway apportionment.

There are some ambiguities in the provisions of the law. This law "specifically requires states to prohibit purchase and public possession of alcoholic beverages. It does not require prohibition of persons under 21 (also called youth or minors) from drinking alcoholic beverages." There are also controversies in connection with the term "public possession" which basically do not apply to the following situations: - alcohol for established religious purposes, under adult supervision - alcohol for medical purposes, prescribed or administered by a licensed health care professional - alcohol use in private clubs or establishments - alcohol possession as part of a job with a "duly licensed manufacturer, wholesaler or retailer."

It is not surprising that parents and anti-drunken advocacy groups are the ones who are strongly against lowering the age limit. In the early 1970s, the minimum drinking age was reduced by several states between 18 to 20 years to closely align with the reduced military enlistment and voting age during the Vietnam War. Many studies show that this move resulted in increased traffic fatalities and injuries.

According to statistics compiled by Mothers Against Drunk Driving (MADD), annually alcohol drinking by college students ages 18 to 24 contributes to the following: - Approximately 1,700 student deaths - Almost 600,00 injuries - Almost 700,000 assaults - More than 90,000 sexual assaults - 474,000 engagement in unprotected sex

In 1998, 42% of crash fatalities among 18 to 20 year olds were alcohol-related. However, the drinking rates among the youth declined since the 21-MLDA law went into effect. According to National Highway Traffic Safety Administration (NHTSA), the 21 minimum drinking age law saved approximately 900 lives per year. This means more than 17,000 lives were saved since all states adopted the law in 1988. The 21 minimum age law is considered as one of the most effective public safety laws today. Many studies have been conducted to measure its effectiveness and they all have the same conclusion-the law saves lives.

One of the most influential supporters of the 21 legal age limit is MADD. This non-profit organization was established in 1980 with the mission of helping the victims of crimes caused by individuals driving under the influence of alcohol or drugs. It also aims to aid the families of the victims and to increase public awareness of the problem of drinking and drugged driving. MADD was considered as one of the most influential proponents in the signing of the minimum drinking age act in 1984.

The 21-MLDA is closely linked to the issue of college drinking. Alcohol abuse in colleges and universities in the US is becoming a major problem despite the existing MLDA law. In 2002, a report that reviews that state of science of college drinking was published in the Journal of Studies on Alcohol. According to the report, about 80% of college students drink and about 50% go on "episodic heavy drink" or better known as binge drinking.

Scientific evidence showed that drinking at an early age can lead to alcohol dependence later in life. A UK cohort study showed that teen binge drinkers are more likely to become heavy drinkers as adults, which can lead to social exclusion and criminality. In this more recent study in the US, "age at onset of drinking" is a major indicator of risk of alcohol dependence among American women.

Adults aged 18 to 20 years old who are not allowed to drink alcoholic beverages are obviously the number one opponents to the 21 MLDA. They raise concerns about the apparent inconsistency in prohibiting them to drink while being treated as adults in most areas of life. For example, American citizens are allowed to vote when they are 18 years of age. Eighteen-year old males are also required to render military service for possible drafting. This means that 18-year old males can go to war and carry guns. Eighteen-year olds can also be selected for jury duty. These youth groups are now questioning why they can be trusted to vote, serve the military and justice system, but can't be trusted to drink alcohol.

By portraying alcohol as a forbidden fruit, the MLDA law actually makes drinking more attractive to the young. This observation is not only restricted to alcohol but other substances such as illegal drugs. However, the big difference is that access to alcohol, albeit regulated by law, is easier and more affordable than drugs. Also, by coupling the law to age, it presents a challenge to the youth to prove their maturity and adulthood.

In addition, history proves that prohibition of alcohol, as was the case in the early part of the last century in many countries, including the US, encouraged periodic but excessive drinking.

Those who are for the lowering of MLDA claim that the current law actually worsened the drinking problem in colleges.

According to Indiana University professor Ruth Engs: - Students who are "vomiting after drinking" increased from 46% in 1982-87 to 50% after the age limit law has changed. - "Cutting classes after drinking" has increased from 9% to almost 12% - "Missing classes due to hangover" increased from 26% to 28% - "Getting low grades due to drinking" increased from 5% to 7% - "Been in a fight after drinking" went up from 12% to 17%

This increase in excessive and irresponsible drinking is due to "underground drinking" in student dormitories, fraternity basements and apartments without adult supervision. These young drinkers lack the knowledge of responsible drinking behaviors. By reducing the MLDA, young people can learn the proper norms of social drinking early, under supervision, thus helping resolve the problem of irresponsible drinking.

The Amethyst Initiative Support for the reduction of MLDA came from the most unexpected places - top officials of several American colleges. The Amethyst Initiative, launched in 2008, is an organization made up of over 100 university heads, including presidents and chancellors of prestigious institutions like Duke University, Dartmouth College and John Hopkins. The organization members claim, based on their campus experience that "twenty-one is not working" so that there is a need to examine the currently existing MLDA law.

The Amethyst Initiative points out that drinking problems start even before college. They are now calling upon legislatures to review current alcohol policies and develop new ideas to prepare young adults in becoming responsible alcohol drinkers.

According to a 2002 report by the International Center for Alcohol Policies (ICAP), the United States has the highest legal drinking age limit in the world. The five other countries that set a minimum drinking age of 21 are Chile, Egypt, Honduras, Russia and Samoa. In some countries, there are exemptions or special circumstances that may affect the age limit for alcohol consumption. Examples of these are: - In Norway, beer and wine may be consumed at age 18 and spirits at age 20. - In Canada, drinking age limit are legislated by each province. Three provinces set age 18 as the consumption age while the rest have set the limit at 19. In the United Kingdom, alcohol may be consumed from age 5 with parental consent. The opponents of 21 MLDA argue that Europeans have lower problems of alcoholism and alcohol-related vehicular accidents despite the lower minimum age limit.

The National Minimum Drinking Age Act of 1984 is full of loopholes and ambiguities. For example, provisions that prohibit purchase by, selling to and public possession but not consumption of alcohol by minors are confusing. While all states prohibit vendors to sell alcoholic beverages to minors, some states do not prohibit minors from purchasing alcohol. Some states allow minors to sell or serve alcoholic beverages without adult supervisions and the majority of the states do not prohibit minors from entering drinking establishments. Because of these loopholes, cross-state drinking excursions from strict states and less stringent states are frequent. It is also common for young people living close to the borders to Canada and Mexico to go binge drinking "abroad."

Drinking has been a government issue for years. Both the proponents as well as opponents of the 21 age limit agree that alcohol consumption is a serious problem among the youth but cannot agree on common solutions to resolve this.

Resolving the problem should probably start by addressing the previously mentioned loopholes in the MLDA. These loopholes weaken the enforcement of law in controlling underage drinking. In addition, there needs to be concerted collaboration between the major stakeholders and efforts toward additional research.

Selasa, 29 Mei 2018

Should I buy an electronic power tootbrush

Should I buy an electronic  power tootbrush

Image source: http://www.gethealthyteeth.com/wp-content/uploads/2014/05/electric-vs-manual-toothbrush.jpg

Been wondering if you should get an power toothbrush also known as a electric toothbrush ?
Studies shows that power toothbrushes with rotating-oscillating heads can remove significantly additional more plaque than a normal everyday toothbrush. As plaque hardens over time, it must be removed by a dentist, but if it is caught early, an electric toothbrush can completely remove existing plaque and ensure that no new plaque builds up thus protecting you in the future. While a normal toothbrush can do the same thing, the power brush can easily get into nooks and crannies near the gum line where plaque normally hides. Electric toothbrushes can reach back teeth and other difficult-to-reach spots without much hassle The area around the back molars and on the back of the front teeth is often missed when using a normal toothbrush. An power brush needs only to be passed over the area to do its work all on its own. This ensures a more thorough cleaning in those areas that often draw plaques and germs.

Power toothbrushes can also prevent gum disease Gum disease can be caused by plaque buildup at the gum line. In its earliest form, gingivitis, the buildup can cause the gums to turn red and swollen and lots of the time even bleeds. When gingivitis goes untreated, it becomes periodontitis, which is a serious infection of the gum tissue and the bone. It can cause loss of teeth and even more systemic infections. A power toothbrush removes plaque at the gum line with its oscillating action, preventing gingivitis.

Power toothbrushes can be gentler on enamel than normal brushes Surprisingly dentists found that most people brush their teeth too hard, not too soft. This can abrade the enamel on teeth and cause sensitivity. Because there is no need to press hard with an electric toothbrush, the enamel is protected. Electronic toothbrushes can help children brush more thoroughly without more work. Children are notorious for not brushing long enough or well enough even if they think they do. A power toothbrush can overcome some of these deficiencies because kids do not have to remember which way to brush.

Power toothbrushes do more work than normal toothbrushes in the exact same amount of time Power brushes are simply more efficient at the task than your hand could ever be. Because the rotating heads brush in different directions with different motions, they can more effectively clean the teeth than a straight up-and-down motion can. They also do it faster as the heads rotate more quickly than most people can brush. Power toothbrushes can clean dental appliances better than a manual brush People who have braces or wires bonded on to their teeth often find brushing difficult as food and plaque can build up around the devices. A power brush works in multiple directions and can clean around these barriers more effectively.

Power toothbrushes can stimulate blood flow in the gums Healthy gums needs good blood flow. A power brush massages gums and stimulates blood flow throughout the gums. Healthy gums safeguard teeth and keep them strong and healthy.

Power toothbrushes are gentler on dental work Dental work like crowns and caps require gentle handling with a toothbrush. Because manual brushing can be abrasive to teeth when done too vigorously, breakage and loosening of dental work can result. An electric toothbrush can ensure that the area is cleaned well with little pressure. Power toothbrushes can help those with mobility problems People with arthritis in the joints of their hands and other illnesses that make holding of a toothbrush hard find that an power brush is easier to use around the mouth and that they do not have to press as hard to get a better result

For more info about electronic / power toothbrushes visit. These you will also find in depth reviews on all the different electric toothbrushes power toothbrush

Senin, 28 Mei 2018

Shocking Training Dog Collar Guide

Shocking Training Dog Collar Guide

Image source: http://www.dogshockcollar.net/wp-content/uploads/2016/05/dog-shock-collar-training.jpg

All dogs need training so that they learn to behave appropriately, especially in a family environment. To this end, training collars have been created to help you with this process, and they have proven to be very effective in this role. As with many things however, in the wrong hands, dog training collars can be used to hurt and abuse dogs, so you need to understand how they work and what they do.

The prong collar looks like a medieval torture device, but is actually one of the gentler training collars being investigated here. When the leash is pulled, the prongs start to pinch the back of the dog's neck. The thinking behind this is to replicate the memory of the dog's mother's teeth nipping the scruff of the puppy's neck. The collar is quite safe to use, the only real problem occurring if the fit is poor. If your dog is one that pulls strongly at the leash though, the prong collar might not be suitable.

The fit of the prong collar should be snug against the dog's neck. There is usually some leeway with these types of collars in that you can add or remove prongs to adjust the fit. A ready guide for the fit is if you can fit your finger between the collar and the dog's neck. If the collar is looser than that, it will not do it's job properly.

The Gentle Leader dog collar (or Halti collar) looks more like a harness. It works by closing the dog's mouth when you pull on the leash. The method aims to control the dog's general movement by controlling it's head. The theory being that the body will follow where the head goes. This type of collar is well suited to aggressive animals that lunge or bite.

There is a downside to this type of collar though. Dog's, as a rule, do not like having restrainers on their face, and it might be quite a job to get your dog to accept a harness of this type. Care should also be taken bot to pull the head to hard, because the dog could suffer injuries to the neck or back.

The choke collar is one of those items that can raise some people's hackles. Those that like them point to how effective they are in controlling a dog. Those that don't like them, would say that the collars are inhumane. The answer to this probably lies in the people who use the collars. Used correctly, choke collars can be very effective. Used in an inappropriate manner, the choke collar can be quite brutal.

Correct use of a choke collar starts with correct fitting. They work by tightening around the dog's throat when the leash is pulled. Equally, the tightness should be released when the trainer eases up on the leash, but if the collar does not fit correctly, this might not happen resulting in undue distress to the animal. If your dog is one that continually pulls on the leash, then the choke collar is probably not the right collar to use.

One of the newest forms of dog collar are the electronic one's. They are considered to be a very humane way to train a dog, but equally can be abused in the wrong hands.

The electronic dog collars work by allowing trainers to give dogs small electric shocks via a remote control to control the behaviour of the dog. How much of a shock the dog gets is entirely in the hands of the trainer, so in good hands, the electronic dog trainer can be very flexible and very effective. As a rule of thumb, the shock that is applied should be just enough to make the dog's ears twitch, but obviously the amount of electricity involved will depend on the size of the dog. In any case however, if the dog cries out when the electricity is applied, then the setting is too high. Once again, this type of collar is only really suitable for experienced trainers.

SEXUAL HARASSMENT The Tipping Point

SEXUAL HARASSMENT The Tipping Point

Image source: https://cdn2.newsok.biz/cache/lead630_blur-712e569c5e2b395dbd17e5d402fa3c01.jpg

The print, electronic, and social media are going saliva-bubbling crazy these days over frenzied reports of sexual harassment like its some kind of new fad or phenomenon. Why, its practically the thing to do!
Excuse me, but are any of us really shocked to learn about the Hollywood (wink, wink) casting couch, powerful politicians preying on fawning interns and followers; and full-of-themselves media personalities using their influence to get up-and-comers to go round-heels? Im not suggesting their scumbag behavior is acceptable, but are any of us really surprised? I mean, REALLY???

Hollywood and liberal darling Harvey Weinstein was the tipping point for all the recent media attention; then the dominoes started to fall (#metoo). (Heres irony: Remember the dinner photo of Weinstein, Hillary Clinton, and Huma Abedin slobbering all over each other?) Most of the reported perpetrators at this early stage are either Democrats or staunch Democrat supporterslike Hollywood personnel. Be that as it mayand it is fun to observe the projection and denial spewing from such a holier-than-thou snobby, elitist, leftwing crowdthe behavior has to (and does) encompass all persuasions of politics and society. Witness a (former) rising political candidate aka Carlos Danger (Abedins ex), and a former NFL quarterback sending out pictures of their junk to females. Whatever possessed those guys to think male genitalia is attractive?

Anyway, I am not at all surprised based on observing human behavior for more decades than I care to admit. Also, it seems these days that allegation equals guiltdue process be damned. The lesson here, fellows, is not to tell a lady she has attractive eyes or a beautiful figure unless you want to get slapped with a law suit. You may ask, Then why do they dress provocatively? My (wild) guess is that women choose attire MAINLY for two reasons: 1) to feel good about themselves (read that in an article somewhere), and 2) to one-up other women. Another lesson learned for me was that ladies go to clubs primarily because they enjoy dancing, not necessarily to attract and meet menunless their bodies are in a state of ovulation of course. So, guys, act mellow, laid back, and self-assured. That behavior may be more attractive to her than a testosterone-induced aggressive come-on line fueled by (you think witty) sophomoric humor. Let her come to you.

In relatively recent history, we have Ted Kennedy fooling around with 29-year-old Mary Jo Kopechne, a liaison that cost her life; Kennedy and Chris Todd bragging (as reported in the Washington Post) about their waitress sandwiches in D.C.the late Carrie Fisher ratted them out as well; Bill Clinton nailing everything in sight (and receiving attaboys); FDR, Eisenhower; JFK, RFKand the list goes on. In the 1920s Fatty Arbuckle even got away with (allegedly) killing a girlsuffocating her with his weight during days of forced passion.

Im not questioning the outrage, but why now? Is it enough is enough? Slow news day? What?

It seems that some of the so-called victims initiate the action as well. Jacqueline Susan in her book THE LOVE MACHINE wrote about celebrity-bangers who keep track like a gunslinger notching her pistol. One I remember from the 1970s was Linda Huey who wrote in a national sports publication about nailing athletes in every town just for the pleasure of it. Chelsea Handler chronicled about sleeping her way to the middle. Women in every town wait outside locker rooms of athletes hoping to score with one or more.

I will admit that a predator using his/her influence to control a career is different than someone just looking for casual sexor is it? Do these Baseball Annies hanging around famous men after the game and at bars in it for just a quick roll-in-the-hay, or are their purposes more insidious? Are some hoping to extort money, become wives or girlfriends? What is motivating them? Im betting the root cause could be poor self-esteem, and the desire to become somebody. Ive also noticed womennot menhanging around outside women athletes locker rooms perhaps trying to find the next Billie Jean King affair. Again, for what purpose? Looking for love? Besides, are they not also guilty of sexual harassment? Lets see, if a guy asks a lady for her phone number its sexual harassment, but if females troll for men outside a locker room, its simply a social interchange. The lawyers have got to love the ambiguity. I mean, the USA has more ambulance chasers than the rest of the world combined, and the whole of American is consumed with money grabbing. The more black-and-white can be driven into gray, the more billable hourshonesty and integrity be damned.

I suppose that what constitutes sexual harassment, the root of the behavior, depends upon how the receiver perceives the attention. Is it unwanted? Is it forced? Or is the attention mutually desirable and beneficial? From what Ive read so far, time changes the situation; that is, some ladies were reluctant to speak up back-in-the-day for fear of reprisal. I have absolutely no doubt that was the case in many instances. BUThow many are phony; motivated by an opportunity to pile on for profit and/or attention? Who can say?

I like to think that all of us condemn intimacy forced by physical force and/or intimidation. Certainly those of us with daughters do, but keep in mind it goes both ways; i.e., as a twenty-two-year-old, I had a 40-something wife of a boss back me into a corner. Her cleavage, and scent of perfume mixed with alcohol were enticing to be sure. At the time, I felt more flattered than harassed, but the experience was a bit frightening, albeit from discovery rather than the act. Still, intimidation seems to be a natural ingredient of our DNA, and exists throughout the animal kingdom, as the contest to become the alpha is renewed eon after eon.

BUThow much is too much? Definitely to my way of thinking, an actress having to submit to a hairy, sweaty, semi-lard Harvey Weinstein gives me cause to empathize with the young ladies, and creeps me out big time. But how many trolled Weinstein, knowing his slobbering proclivity, simply to forward their own careers? That would be like the news conference where Colin Kaepernick whined about oppression while wearing a shirt featuring a Communist dictatora sweetheart of a guy who allegedly caused more deaths that Hitler.

Bottom line: none of this is new; none of this is welcome; none of this civilized. However, all of it is true to our human condition. We may not like the picture of humankind we see in the mirror, but warts and all, it is us.

Copyright 2018 by Gene Myers

Minggu, 27 Mei 2018

Selenium Automation Testing Guide For Beginners

Selenium Automation Testing Guide For Beginners

Image source: https://cdn.edureka.co/blog/wp-content/uploads/2017/04/selenium-ide.png

The product improvement area normally considers robotized testing to spare the bills of manual testing. In this post, experts will discuss Selenium mechanization testing instrument and its focal points. Since the cost of testing is a basic factor for any product advancement venture, organizations have begun offering inclination to open source selenium training in Bangalore test mechanization devices as opposed to putting resources into costly business testing apparatuses. Without authorizing costs, open source mechanization testing instruments offer aggressive highlights. These highlights are utilized by designers for mechanizing the testing of programming applications and online interfaces. Designers can have a whole scope of open source computerization testing apparatuses for a wide range of testing like practical, UAT, Web and execution.
Selenium is a free robotized testing suite and not a solitary apparatus. Each instrument of the Selenium provides food unmistakable testing needs of an organization. The present business patterns have demonstrated that there is a mass development towards robotizabest selenium training institute in Bangalore Redundant manual testing situations has raised a request to get the act of computerizing tion testing. Henceforth a group of these manual situations. Selenium is a standout amongst the most well known Automated Testing suites. Selenium is planned in such an approach to help and energize Automation Testing of practical parts of electronic applications and an extensive variety of programs and stages. Because of its reality in the open source group, it has turned out to be a standout amongst the most acknowledged instruments among the testing experts.

There are a few Benefits of executing Automation Test;
Supports execution of rehashed Test Cases
Aids in testing an expansive Test Matrix
Enables parallel execution
Encourages unattended execution
Improves exactness subsequently diminishing human-created mistakes
Saves time and cash

Significance of Selenium
Selenium Automation Testing is the best choice for present day days computerized testing. It is increasing more noteworthiness and the vast majority of the analyzers and organizations incline toward it for robotizing the electronic application testing for both the GUI and the usefulness. Selenium can likewise be connected as a unit testing device for JavaScript. Is there any approach to choose right Selenium device according to your requirement? Among four instruments of Selenium, there are conditions that assistance you in settling on choice of determination of Selenium device. We will examine the states of each instrument to help you in settling on better choice.

Selenium IDE You can pick Selenium IDE in the event that you need to-
Learn about the Selenium and its ideas identified with mechanized testing.
Create tests with bit or zero information in programming
Create simple test suites and experiments
Test web application just against Firefox
Selenium RC-You can pick the Selenium RC on the off chance that you need to-
Design a test with more expressive dialect
Run your test against programs on unmistakable OS
Deploy the tests all through a few conditions with Selenium Grid
Test applications against another program supporting JS
Test web applications with complex situations of Ajax
Selenium Grid-You can pick Selenium Grid on the off chance that you need to-
Run the contents of your Selenium RC in unmistakable programs and OS at the same time
Run a tremendous test suite to get it finish at the earliest opportunity
WebDriver-You can pick WebDriver in the event that you need to-
Use particular programming dialect to plan your experiment
Execute tests on HTMLUnit
Test AJAX-based functionalities rich applications
Customize test comes about

Selenium streamlines test robotization for web applications
In spite of the fact that written work mechanized tests may appear like a simple errand for designers and specialists, there is as yet the likelihood of winding up with ineffectively executed tests, and the high cost of code support in any deft procedure. Attempting to continually convey changes or highlights in any dexterous advancement undertaking can end up being expensive when tests are included. Transforming one component on a website page that 20 tests depend on will expect one to experience these 20 test schedules and refresh everyone to adjust to this recently presented change. Can this be truly tedious, as well as a genuine de-persuading factor with regards to actualizing robotized tests from the get-go. Be that as it may, imagine a scenario in which we could roll out the improvement in one place just, and have each applicable test routine utilize it. In this article, we will investigate computerized tests in Selenium, and how we can utilize Page Object models to compose viable and reusable test schedules.

Selenium Automation Testing Guide For Beginners

Selenium Automation Testing Guide For Beginners

Image source: http://wcc.co.uk/wp-content/uploads/2016/10/online-training-770x415.jpg

The item change territory regularly considers robotized testing to save the bills of manual testing. In this post, specialists will talk about Selenium motorization testing instrument and its central focuses. Since the cost of testing is a fundamental factor for any item progression wander, associations have started offering slant to open source selenium training in Bangalore test automation gadgets rather than placing assets into expensive business testing contraptions. Without approving costs, open source automation testing instruments offer forceful features. These features are used by architects for motorizing the testing of programming applications and online interfaces. Architects can have an entire extent of open source computerization testing contraptions for an extensive variety of testing like handy, UAT, Web and execution.

Selenium is a free robotized testing suite and not a lone mechanical assembly. Each instrument of the Selenium gives nourishment unmistakable testing needs of an association. The present business designs have shown that there is a mass advancement towards robotize best Selenium Courses in Bangalore Redundant manual testing circumstances has raised a demand to get the demonstration of mechanizing tion testing. From now on a gathering of these manual circumstances. Selenium is a champion among the most surely understood Automated Testing suites. Selenium is arranged in such a way to deal with help and empower Automation Testing of commonsense parts of electronic applications and a broad assortment of projects and stages. Due to its world in the open source gathering, it has ended up being a champion among the most recognized instruments among the testing specialists.

There are a couple of Benefits of executing Automation Test;

Supports execution of reiterated Test Cases
Aids in testing an extensive Test Matrix
Enables parallel execution
Encourages unattended execution
Improves precision in this way reducing human-made missteps
Saves time and money

Importance of Selenium:
Selenium Automation Testing is the best decision for introduce day days electronic testing. It is expanding more importance and by far most of the analyzers and associations slant toward it for robotizing the electronic application testing for both the GUI and the handiness. Selenium can in like manner be associated as a unit testing gadget for JavaScript. Is there any way to deal with pick right Selenium gadget as indicated by your necessity? Among four instruments of Selenium, there are conditions that help you in settling on decision of assurance of Selenium gadget. We will inspect the conditions of each instrument to help you in settling on better decision.

Selenium IDE You can pick Selenium IDE if you have to:
Learn about the Selenium and its thoughts related to motorized testing.
Create tests with bit or zero data in programming
Create straightforward test suites and analyses
Test web application just against Firefox

Selenium RC-You can pick the Selenium RC in case you have to:
Design a test with more expressive vernacular
Run your test against programs on unmistakable OS
Deploy the tests all through a couple of conditions with Selenium Grid
Test applications against another program supporting JS
Test web applications with complex circumstances of Ajax

Selenium Grid-You can pick Selenium Grid in case you have to:
Run the substance of your Selenium RC in unmistakable projects and OS in the meantime
Run a colossal test suite to get it complete at the most punctual open door
WebDriver-You can pick WebDriver if you have to-
Use specific programming lingo to design your investigation
Execute tests on HTMLUnit
Test AJAX-based functionalities rich applications
Customize test comes to fruition

Selenium streamlines test robotization for web applications:
Despite the way that composed work motorized tests may seem like a basic errand for fashioners and authorities, there are so far the probability of ending up with insufficiently executed tests, and the high cost of code bolster in any deft method. Endeavoring to consistently pass on changes or features in any apt progression undertaking can wind up being costly when tests are incorporated. Changing one part on a site page that 20 tests rely upon will anticipate that one will encounter these 20 test plans and invigorate everybody to acclimate to this as of late introduced change. Would this be able to be really monotonous, and in addition a bona fide de-influencing factor with respect to completing robotized tests from the get-go. In any case, envision a situation in which we could reveal the change in one place just, and have each pertinent test routine use it. In this article, we will examine electronic tests in Selenium, and how we can use Page Object models to make practical and reusable test plans.

Sabtu, 26 Mei 2018

Selenium - Web Based Testing Tool In Automation Testing

Selenium - Web Based Testing Tool In Automation Testing

Image source: http://www.xrmlabs.com/Portals/0/Images/new2.png

Introduction to Selenium:-

Selenium is an open source practical mechanization instrument for the electronic application. It was created by the "Thought Work" in 2004.It is an exceptional apparatus for utilitarian programming testing.

There are two renditions of Selenium:

1.Selenium 1.0
2.Selenium 2.0

Why Selenium?

The following are a couple of motivations to utilize Selenium:

Cost successful: It is an open source apparatus.
Language: Supports numerous dialects like Java, Ruby, and Python and C #.
Browser: Supports various programs like IE, Mozilla, Opera, Chrome and Safari so can be utilized for cross program testing and can be incorporated effortlessly to new propelled program.
Framework: Supports numerous casing - works like Junit, TestNG, Bromine, Nunit, Rspec which make the mechanization more hearty and can built up possess system.
Operating System: Supports numerous working frameworks like Windows, Apple, Linux and Android.
Time Saving: With the assistance of selenium framework, Parallel execution of the experiments should be possible.

Selenium Implementation:

Selenium has two variants, Selenium 1.0 and Selenium 2.0.Both the renditions have basic segments.

Selenium IDE:

Selenium IDE is module to Firefox so can be downloaded effectively .Selenium ide is utilized for record and play back usefulness, the default content is created in html and can play back in html organize just on Firefox. For beginning the Selenium IDE explore devices choice present in menu bar of the Firefox and tap on Selenium IDE alternative. Of course ,Selenium IDE is in recording mode and begin exploring the application on Firefox program and play out the activity ,every one of the activities are recorded and can be seen parallel into Selenium IDE.

There are two tabs introduce on it, "Table" and "Source " .Under Source Tab HTML organization or code of the chronicle can be investigated and under "Table" tab, there are three sections :

Command: It demonstrates the activity going to perform like Click, enter and so on.
Target: It is or protests property where the activity will perform.
Value: Any information esteem is appeared here.

Selenium IDE is additionally used to get the question properties of the application. There are some different devices through which question properties can be recognized like Firebug, IE Developer apparatus, Fire discoverer and Chrome engineer device.

In the wake of finishing the chronicle, Test case can be traded into various dialect by exploring choice File>>Export Test case AS ,In comparable way , numerous experiments can be recorded and sent out as the Test suite.

The HTML code can likewise be changed over straightforwardly to the distinctive diverse dialect without sending out the experiment, tap the choice Options>>Format and select the dialect in which need to change over the experiment.

Selenium RC Server:

Selenium RC is jolt record which gives the usefulness to dispatch the selenium test contents on various distinctive programs; it gets all charge from selenium customer and executes the contents .By default the server is keep running at 4444.

For running the selenium contents, Selenium RC separate is go through the summon incite,, explore the way where selenium rc server jostle document is available and run the charge "java bump seleniumserver.jar "

Selenium Client Server:

Selenium customer is nothing simply the jug records or say dialect through which upgrade of the contents is done and sends the demand to selenium rc server. For running the contents, selenium rc is go through the order provoke.

Selenium Grid:

Selenium Grid is most imperative part of the selenium. With the assistance of this, parallel execution should be possible on various distinctive stage with various program. It spares the time and expands the extent of the testing and gives the quality programming item.

Selenium 2.0:

Selenium 2.0 is the refreshed rendition of Selenium 1.0, it is otherwise called the Selenium WebDriver. It is totally in view of the question arranged API so expected to be more vigorous and can bolster in better route for the electronic testing. ,Selenium IDE and Selenium Grid are working in comparative path as actualized in selenium 1.0 however there is no compelling reason to run the selenium server for running the contents. Selenium server is required when need to perform parallel execution through selenium network or need to associate the remote machine.

WebDriver API makes the immediate call to dispatch the program utilizing program's local call. For each program, program's driver is available. The following is list for the same for Java.

Internet Explorer: WebDriver driver = new InternetExplorerDriver();
Firefox: FirefoxProfile profile = new FirefoxProfile();
Chrome : WebDriver driver = new ChromeDriver();
Opera : WebDriver driver = new OperaDriver();

Selenium WebDriver API likewise bolsters the Android and IOS working framework; it has isolate API to associate with it.

Detailing: Reporting is imperative angle for testing, In Selenium, there is predefined system like Junit, TestNG which produces the HTML reports and there are such huge numbers of API through which altered report is created. Selenium can coordinate with test administration device like QC and Test interface so report can be transported in from these apparatuses moreover.

SECURITIES FRAUD- DABBA TRADING- Applicability of Criminal Statute

SECURITIES FRAUD- DABBA TRADING- Applicability of Criminal Statute

Image source: http://robertjdegrootlaw.com/wp-content/uploads/2016/02/dreamstime_12976914.jpg

A "Dabba Trading" also known as "Bucketing" is the process used by brokers to route their client's trades outside the Stock/Commodity exchange. In such trading, the broker either does not execute any trade or matches and execute trades on its own terminal. "Dabba" has its origin in the developed markets where a system called bucketing prevails. Bucketing is an illegal practice where a stockbroker executes a customer's trade without taking it to a stock exchange with the hope of making some gains at a future date.
Essentially, bucketing involves the confirmation of an order from a client without actually executing the order on the client's behalf. The anticipation is that the broker will be able to realize enough profit to offset the difference to the client at a future date, either due to executing the order at a later date or through profits generated on other transactions. Bucketing can take place in a couple of different ways. While all forms of bucketing involve the broker or brokers confirmation the execution of orders to the client that have not actually been completed, some forms of bucketing involve the broker executing the transaction on his or her own investment account. If the price rises, the broker realizes a profit and then belatedly executes the order for the client, but charging the higher rate. With this arrangement, there is a good chance that the investor will simply assume the price rose between the time of the decision to execute the transaction and the confirmation received from the broker that the transaction is complete.

The broking house that engages in this activity are called bucket shops. Dabba trading operates essentially like the American bucket shops of the 1920s that existed before the Securities and Exchange Commission (SEC) was set up.

The mechanics or Modus Operandi of Dabba Trading

The "Dabba" means box and in modern context, a computer. A Dabba operator in the securities market's parlance is the trader/operator who executes "Dabba Transactions". His office is the replica of any broker office having number of customers executing the trade on the terminals linked to the exchange showing market rates/trades. Earlier, the "Dabba Operator" does not execute the investor's trade on the exchange but in his books. But now, the NSE & BSE has provided the facility for the investors to verify their trades on the NSE/BSE websites. This facility has made the broker vulnerable to be exposed to the investor's and can made him liable for civil & criminal remedy.

Now as the investor is sitting in the trading room of the broker or verifying the trades on the website of NSE/BSE using order/ trade number, the operators have developed a new and sophisticated view of doing "Dabba Trade". In this process, they develop a program which is embedded with the existing trading software whereby, the operator executes a transaction on the trading terminal where the client is sitting but the embedded software immediately execute the reverse transaction. For Ex; if a trader buy one lot of ACC, the embedded software make it possible to execute the reverse transaction, i.e. sale of one ACC lot. This process can also be executed manually. In the evening when the trade files and STT files are downloaded from the exchange, then the client code of the reverse transaction is being changed to some dummy client code. Thus, the consequent effect of this transactions result into nil position of the client on the exchange. But the broker/operator raises the invoice of the trades instructed by the clients and not of the reverse transactions. Thus, when an investor verifies the transaction on the exchange using order number only transaction pertaining to that order number is verified and investors did not know about the counter transactions.

Violation of Securities laws:

In the stock marker when the broker executes the Dabba Trading in the clients account without executing the order on an exchange, it is the violation of Section 13 of Securities Contract Regulation Act, 1956 which states that transaction has to be at recognized Stock Exchange between the two recognized stock brokers of the exchange unless it is exempted. Section 18 of SCRA exempts only spot transactions from the purview of section 13 of SCRA. The act of "Dabba Trading" by the broker is punishable offence under Section 23 of SCRA.

Further the practice of "Dabba Trading" is covered under Regulation 3 and 4 of SEBI (Prohibition of Fraudulent and Unfair Trade Practices relating to Securities Markets) Regulations, 2003 & is punishable under Section 15 HA of SEBI Act, 1992.

A Dabba Trading also attracts Indian Penal Code and Information Technology Act, 2000 apart from the provision of SEBI Act. As is generally understood rather fallacy lies in thinking that anything related to the securities and any violation related to securities is the domain of Securities Exchange Board of India and its laws and regulations. The fallacy also lie on the general misconception on the part of law enforcement agencies too which brush aside the complaint related to securities related frauds on the premise that same is the domain of SEBI and they do not have jurisdiction to deal with the complaints disclosing fraud played by the brokers or market intermediaries on the gullible investors.

It may so happen, the broker who flouts the SEBI Act, 2000 or its rules and regulations may also breach the provision of Indian Penal Code to cover up their misdeeds like they may try to give legitimate appearance to unauthorized fraudulent trades executed by them by making the fictitious entries in books of accounts, forgery and manipulation of books of accounts, forgery of contract notes & bills etc. with an intention to cheat the investor and thus commit the offence of criminal breach of trust in respect of funds & shares entrusted to the broker by the investor resulting in wrongful gain to broker & wrongful loss to the investor.

The malafide acts of the broker particularly Dabba Trading attracts the provision of Indian Penal Code and Information Technology Act as follows:-

(a) The broker by executing the transactions acts as an agent of the investor who is a principle. He is liable to account for all the transactions of the client on the exchange as a broker but when a broker executes a "Dabba Transactions" he acts as a principle with the investor. He becomes the counter party to the trade whereas he should be broker/agent who guarantees trade on the exchange on behalf of the investors. Thus, he can be held criminally liable within the meaning of Section 409 of India Penal Code.

(b) Now, with the levy of STT (Security Transaction Tax) this "Dabba Trading" also involves manipulation/forgery of STT which is a more serious offence, i.e. embezzlement of government revenue. Further, by changing the client code of the transactions, he commits forgery of the electronic records. The forgery of the electronic records and STT attracts the section 467/471 of IPC. The other staff, operators and accountants who incorporate the bogus transactions and accounting entries to manipulate the accounts in order to accommodate Dabba Transactions are also liable u/s 477-A of IPC and also for the conspiracy u/s 120-B IPC. Thus, the broker/operator and its staff who indulges in to the "Dabba Trading" can be prosecuted for the serious offences under the IPC which are punishable with imprisonment which may extend to 10 years.

(c) As the broker with a malafide intent to cause loss to the investors and corresponding gain to himself commits:-

(i) Manipulation of Electronic Records

(ii) Alteration of client codes in computer resource to fabricate transactions

The broker can be prosecuted for the offence u/s 66 Information Technology Act, 2000.

SEBI vis-A -vis prosecution under criminal statute

Thus, if broker or market intermediary who commits the offence of Dabba Trading which is a violation of provisions under SEBI Act then the criminal proceedings under penal statutes i.e. IPC, IT Act, 2000 can also be initiated at the same time. I. SEBI is a remedial statute: It may be pertinent to mention here that the SEBI Act, 1992 is a remedial statute. The SEBI Act , 1992 came into force with effect from 30th January, 1992 and the preamble of the Act explains the objective which is "an act to provide for the establishment of a Board to protect the interests of investors in securities and to promote the development of, and to regulate the security market and for matters connected therewith or incidental thereto" . So the SEBI was established to protect the interest of the investors in securities and also for regulating the security market. The SEBI Act and the Regulations are intended to regulate the Security Market and related aspects and redress the grievances of the investors. The Hon'ble Supreme Court in the case of SEBI v. SHRIRAM MUTUAL FUND & ANOTHER has categorically held that "for breaches of provisions of SEBI Act and Regulations, according to us, which are civil in nature, mens rea is not essential."

II. Offences under the IPC virtually imports the idea of "Men-rea" : On the other hand every offence under the Indian Penal Code virtually imports the idea of criminal intent or mens rea in some form or the other for the offences because the definitions of various offences contain expressly propositions as to the state of mind of the accused. The definitions state whether the act must have been done "intentionally", "Voluntarily", "knowingly", "dishonestly" or "fraudulently" or the like. For example; Mens rea is one of the essential ingredients of the offence of cheating under Section 420 IPC because in order to attract the provisions of Sections 420 IPC, the guilty intent, at the time of making the promise is a requirement and an essential ingredient thereto.

III. Indian Penal Code is a Penal Statute : The Indian Penal Code is a penal statute which is a complete statute which provides for prosecution of offender for any offence which is deemed to be committed against state. If there exists a right to prosecute under the Penal Code, such right cannot be impliedly taken away by the provision of another statute. Thus, the cognizable offences committed by the brokers under the Indian Penal Code or IT Act, 2000 may also entail certain acts which may also constitute violations of SEBI Act, 1992 or rules & regulations made thereunder, but that would not take investigation of the case out of realm of the provisions of Criminal Procedure Code.

IV. The purpose of SEBI Act and Penal statute is different: The purpose of the penal statute is to seek prosecution of the offenders for the offences committed under the Indian Penal Code which is entirely different from that under SEBI Act, 1992 r/w rules & regulations there under which provides for penalty for the violation of civil/statutory obligations mentioned therein which are neither criminal nor quasi criminal, although to some extent the both acts may be overlapping as the acts of the offenders may entail some violations of SEBI Act.

V. SEBI Act has no overriding effect as per the SEBI Act and Expert committee report: It would not be out of place to mention here that SEBI Act has no overriding effect and it no where bars the prosecution under the Indian Penal Code which is clear from the provisions of Section 21 of SEBI Act, 1992 itself which provides as follows:

"Nothing in this Act shall exempt any person from any suit or other proceedings which might, apart from this Act, be brought against him."

Thus, the reading of the Section 21 of SEBI Act, 1992 itself infers that a person is not immune from criminal proceedings which may be brought against him under Criminal Procedure Code r/w Indian Penal Code owing to the fact that investigation or proceedings under him are initiated against him under the SEBI Act, 1992. Thus, the procedure and scheme of penalty & adjudication under the scheme of SEBI Act and Regulations & rules thereunder is specifically envisaged as supplemental to any other proceedings provided by any law for the time being in force. Moreover, the perusal of the Report of the Expert group headed by Mr. Justice M. H. Kania (former Chief Justice of India) for suggesting amendments to SEBI, Act 1992 reveals that SEBI Act has no overriding effect over other laws in the matter of securities. Infact the Expert committee recommended that SEBI Act may not be amended for giving an overriding effect to the SEBI Act over other laws. Further, the Hon'ble Supreme Court decision in Radheyshyam Khemka Vs. State of Bihar (1993) 77 Com. Case 356(SC) throws enough light on the role of dual agencies where enforcement of power is found overlapping. In Khemka's case the criminal proceeding pending against the appellants was challenged on the ground that since the provisions of the Companies Act take care of the interest of Investors and they put restrictions on the misbehaviour of the promoter and the directors of the company, for any lapse on their part in such matters they cannot be summoned to stand trial for offences under Indian penal Code. Demolishing this contention the Supreme Court held that:

"it is true that Companies Act contains Provisions regarding the issuance of prospectus, applications for shares and allotment thereof and provides different checks over the misuse of the funds collected from the public for issuance of shares or debentures. But can it be said that where persons issue prospectus and collect moneys from the public assuring them that they intend to do business with the public money for their benefit and the benefit of such public, but the real intention is to do no business other than collecting the money from the public for their personal gain, still such persons are immune from the provisions of the Indian Penal Code? In such a situation the quashing of the prosecution pending against the appellants only on the ground that it was open to the applicants for shares to have recourse to the provisions of the Companies Act, cannot be accepted"

Conclusion:

Thus, the aforesaid discussion clearly points out that the SEBI has no exclusive domain and the prosecution under the penal statute can be initiated in the securities related frauds if it attracts the cognizable offences punishable under the Indian Penal Code or IT Act, 2000. If the prosecution under the penal statute is not launched in such cases it may well mean that the accused in such cases would then be well ensconced and insulated from the legal consequences of a proper and effective investigation. Criminal justice would be the serious casualty then and in this type of situation the police has merely to look askance at such accused brokers helplessly on the mere fallacious misinterpretation of law that an offence or breach of provision under SEBI Act is also involved and hence the criminal proceedings cannot be initiated in these circumstances.

Neeraj Aarora (Advocate)

Jumat, 25 Mei 2018

Secrets To Spend Less On A Vacation With Your Family

Secrets To Spend Less On A Vacation With Your Family

Image source: http://www.livingwellspendingless.com/wp-content/uploads/2014/03/25-Awesome-Staycation-Ideas-4-698x1024.jpg

With the price of everything around you skyrocketing like there is no tomorrow, it is not going to be easy to save up for a good vacation with your family. Of course, compare the airfares (If travelling by plane ) or maybe even plan to take the trip by road to save up on your cash. But there are more things out there, which you can take care of so, such that you don't end up spending too much on your vacation with your family.

Fasten your seat belt, and let us go for a "thrifty" ride.

Plan And Spend

When on a vacation, shelling out a lot of money for unnecessary items is something we are very good at. And there is no denying that this can actually increase many times when you travel with your family. To avoid such unwelcome scenarios decide upfront how much will you be spending on your vacation.

Make a list of all the possible places where you will have to go, along with your travel and accommodation charges. And once you have a rough figure, decide on whether you are spending a little too much, or do you still have room in your budget for some more dollars.

Your Credit Card Can Do Wonders

You have probably acquired those loyal points/rewards from the usage of our credit cards in either restaurants or grocery stores. Well, it is time to pull out the same cards again, and it is quite simple as well.

All you have to do is sign up for those rewards which would require you to meet some minimum spending requirements and pay your entire bill by the end of the month. Trust me, these rewards or points from the credit cards can help you save quite a bit of money when booking airfare or accommodation.

Technology - Your best friend for the vacation

What better way to get suggestions than from the technology itself? Whether you want to stop to grab a bite when you are on a road trip, or you need to know where a gas station is on the way, there are hundreds of apps out there which suggest  various deals that are on offer for your requirements. And then there is Google Maps which you can use to store all these key locations so that you don't have to break your head later trying to find them.

Reuse, Reduce, Recycle

I know most of you might disagree with me on this, but think of it again,  the "use and throw" goods may be cheaper and more convenient but you have to buy the same goods repeatedly. When you are out with your family, you will end up buying so much stuff that you will start wondering, have I come out for a vacation or shopping?

Instead of spending your cash on these items, purchase reusable goods for your vacation. It might be a pack of washable clothes instead of a paper roll, or substitute water bottles for all the plastic water bottles you buy. Make sure each time you buy something, you stop and think whether a reusable replacement is available for the same. You will also be contributing to the environment by keeping it cleaner with less plastic and other non-reusable waste.

Hotels? Think Again

One of the biggest expenses when traveling with your family is the accommodation. With innumerable options out there, you might be tempted to opt for the best hotel, or a famous hotel to live in, for a week or two? But with all of you cramped up in just one room, do you think you are going to end up with a pleasant experience. And if you are on a vacation with other family relatives as well, you can just imagine the resulting turmoil.

"Thank you for all the facilities you have, but no I prefer a vacation rental instead." This is what I tell most hotel owners or their associates who ask me if I need a hotel room. Just think of it, you have a whole house to yourself, where you can cook your own food, your kids have a lot of space to run around and have some fun of their own, and you will be entitled to your own free space as well. And the best part is: all this comes for a very affordable price.

SAP Services a Name to Trust since Decades

SAP Services a Name to Trust since Decades

Image source: https://blogs.sap.com/wp-content/uploads/2017/08/pic-16.png

With different facilities that bring convenience in almost every field of life, people have become habitual to get more amenities in life. They want ease in every work they do and need simple to use solutions for each work they perform. SAP is always there to assist its customers through providing them a new, renew and enable policy which can help the worthy clients with their UX challenges. The user experience services provided by SAP allow UX revivals from the customers.

Here is a brief list of all the solution based assistance provided by Andreas Hauser to his clients, lets have a look,

Nestls Experience

SAP introduced its first set of apps that constitute of 200 role based apps to the popular brand Nestl. This collection of SAP UX model is named as SAP Fiori which was made to improve user productivity and personalization. The information provided can be availed through any electronic device like laptop and mobile etc. no matter where the user is located at present, he or she can get a clear insight into his business and can get reasonable solutions to all the problems faced by them.

Nestle has distributed approximately 18 SAP Fiori apps to its more than 500 customers across the world and hence enjoys a friendly and supportive company- customer relationship with them.

Continuous positive feedback from the customers is the reason behind the popularity of SAP solutions as declared by Nestle.

Shells and SAPs Relationship

SAP provides different solutions based upon users experience of multiple software transactions. They redesigned the prevailing transaction based process of Shell because it was found to be quite lengthy and complex by the feedback provided from the clients. After thorough research and users experience, SAP derived a three phase approach towards every problem,

1 Discover

under this approach the user were interviewed in order to get first- hand knowledge about their personal experience.

2.Design

redesigning of the screens depending upon the users choice.

3 Develop

creating new screens for the company

SAP conducts deep research keeping in view the users experience and feedback from the company and its clients. During research and execution of screens they make it sure that everything is done in collaboration with the company and its employees and provide such screens that are easy to manage and use by the users. Users were in continuous contact during performing the operations.

Deliberate research and hard work results in condensing number of screens from 7 to 3 and 26 from 45. The further feedback from Shell was very appreciating and positive because it not only saved their time but also expenses. SAP always makes it confirm that their clients are contented with the services provided and whether all their services are according to the clients standards and meeting their needs.

Deliberate research and hard work results in condensing number of screens from 7 to 3 and 26 from 45. The further feedback from Shell was very appreciating and positive because it not only saved their time but also expenses. SAP always makes it confirm that their clients are contented with the services provided and whether all their services are according to the clients standards and meeting their needs.

If you have keen interest in SAPUI5 Training and SAP Training new modules of 2018 are updated at Tekvdo website.Visit and register yourself at the website at discounted price

Kamis, 24 Mei 2018

Samsung S8000 Jet - Feel the Power!

Samsung S8000 Jet - Feel the Power!

Image source: https://images.jet.com/md5/deecd1b69ecb8c19637fb0b5d69590a3.1500

Samsung is the electronic items manufacturer which has been able to be counted among the best manufacturers of mobile phones. It has brought gadgets with latest technology features in them and the Samsung S8000 Jet is one of the phones that is the result of its innovative minds. The handset comes with the measurements of 108.8 mm as length, 53.5 mm as breadth and 11.9 mm as the depth. It weighs a total of just 110 gm. The presence of the AMOLED resistive touchscreen having 16M colour effects for a great display. The screen size is found to be of 3.1 inches giving a large interface for the users to enjoy. Samsung S8000 Jet offers both the 2G and 3G connectivity to the people using this device. A resolution of 480 X 800 pixels gives an attractive display for users' experience.
An internal memory of 2 GB is available here and there also is an extra card that can be attached this memory storage. The card can be of up to 16 GB. Web browsing is enabled in the Jet with the GPRS and EDGE features available here. The gadget also comes with a HSCSD ability through which users get the facility of downloading files without any difficulty. Wireless network comes in hand through the WiFi feature available in the Samsung S8000 Jet. Bluetooth and USB are the connectivity options through which users can send and receive files to and from other similar gadgets. They can also help you transfer files to the laptops or desktops.

Snaps can be captured with the 5 MP camera provided in the phone. This camera is stuffed with other camera features for better snaps to be taken. Firstly, the autofocus is able to focus perfectly on the subject and that too automatically. Next is the LED flash for getting snaps even in dim light conditions and more of the Geo-tagging, face, smile and blink detection, wide dynamic range features aid snaps to be taken with maximum of users' comfort and to the best of quality. A secondary camera for videocalling is provided for the users to enjoy videos of the person he or she is talking to. The Samsung S8000 Jet has messaging facilities of SMS, MMS, Email, IM and Push Email. The SMS can enable you to write text messages, MMS to send multimedia messages and rest are for any kind of attachment mails. IM can offer you with the ability to chat with your friends and relatives who are available online.

Entertainment is taken care of through the radio and games provided here. Additionally, the music player and video player entertain by playing all formats of music and videos so that the users can enjoy. The games in Samsung S8000 Jet are few in inbuilt form but more of them can be downloaded from the internet whenever you want. These games really prove helpful for you when you are alone and you need to be entertained.The battery here is Standard battery, Li-Ion 1100 mAh offering users with a 3G talktime of 5 hours and a 3G standby time of 406 hours. With the presence of all these, the Samsung S8000 Jet is necessarily a gadget to enjoy. Every kind of enjoyment tool is provided here and also the nice battery gives the power to use all of the features that is available.

Adam Caitlin is expert author of Telecommunication industry. For Other Latest Samsung Phones Apart From Samsung S8000 Jet Like Samsung Tocco Lite, Visit Our Online Shopping And Comparison Portal Freecontractmobilephone.co.uk

Salon POS Systems

Salon POS Systems

Image source: http://www.aceii.com/en/wp-content/uploads/2016/03/pos-system-setup-singapore-hair-saloon-05.jpg

Salon POS systems are the salon software systems available in market. POS exactly means point of sale that is the name for the cash counter where you use to pay for your purchases. If you have a salon POS system then electronic calculation, credit card processing, automatic billing of day to day activities are just available on a single click of mouse.

The salon POS systems are widely used as they increase your accuracy and also leverage the accuracy and speed of bar code scanning equipment. They can easily produce the report at the end of the day.

Salon POS system includes both hardware as well as software. There are different salon POS systems available in market today but you should go for a salon POS system that is simple to use and must have easy data entry during sale. It should also provide service invoicing, customer tracking, and partial payments, quick and easy checkouts for customers. A good salon POS system should be simple to operate and understand so that a person with not much knowledge to computers can operate it.

Cost is also the matter of concern as everyone wants a salon POS system that can provide several facilities and should be of low cost. Data entry should be very easy and convenient process in salon POS system. A fine salon POS system should also provide you front end and reporting features and printing your own barcodes.

Salon POS system can add value to your salon software by giving your software a new level of functionality. It is the most comprehensives system for your business. By investing in your salon POS system you can add a better way to manage your salon business. They are the best choice for your salon business.

Salon POS systems are used to automate the business and protect themselves from theft and inventory loss at a price. With these systems, while working on customer's account you can get the receipt in just the single click of mouse. These salon systems are used in hair salons, tanning salons, nail salons, spas and other businesses that sells products and services and keep an appointment book.

By using right salon POS system you can be able to perform a lot of business enhancing functions that offers better customer services and user friendly operations.

The barcode scanner comes with salon POS systems are of different types. In single line scanner, you have to orient the barcode correctly for the scanner whereas omni directional scanners are able to read a barcode at any angle, and in counter scanners are omni directional.

A pole display attached with your system allows a customer to view the price and items and these are shown as they are being rung up on the side of the counter where the customer is.

Using a salon POS system to process credit card transaction allows you to keep the records of each and every transaction you process. With the high speed transaction on the internet processing time can reduced to 3-4 seconds per transactions.

It is important that you choose the right system for your salon otherwise you may find many troubles instead of benefits. Using a portable salon POS system can benefit your business in various ways, including line busting inside your salon and ringing up sales when away from your salon.

Rabu, 23 Mei 2018

Safe Use Of An Electronic Data Room Or Deal Rooms

Safe Use Of An Electronic Data Room Or Deal Rooms

Image source: http://www.safesworld.com/wp-content/uploads/2014/11/195JA.jpg

A data room can offer the ability for several people to work together and share files that have to be secure for various reasons. Rooms like this are also known as deal rooms. Information such as things for investment information or company audits as well as legal documents can be securely shared through an electronic data room.

These days organizations are discovering that even through the use of electronic storage, information can be difficult to share securely with people outside of the physical location. As a result many are turning to options found in an electronic data room or deals rooms on the internet for document sharing as well as data storage.

With the documents being guaranteed secure, law firms and other organizations use the electronic data room to send even highly sensitive information from their own office to others without fear of compromising securely or privacy. Litigation files, due diligence, financial transactions and many other types of documents can be stored and shared securely in deal rooms.

Deal rooms can provide an added measure of privacy and security to any document and file exchange. By using data rooms, a business has better control of documents to be shared as well as quicker access when the information is needed.

There can be many uses for deal rooms because of to privacy regulations. While the information may not be seen as sensitive, it still needs to be protected. Using an electronic data room the information will be secure and the privacy is protected.

Electronic data rooms can provide the ability to transfer information around the world securely. Corporations can use the electronic data room for sending financial information and a variety of other information without fear of compromising the privacy or security of the file.

There are many ways to protect the safety of any document. Using iDeals electronic deal rooms offer clients an additional measure towards securing the documents. When a document is viewed, there will be a watermark put on that document to protect against camera based security attacks. Placing the watermark in the background stamps the document is virtually with the user information and does not interfere with its use in any way.

The use of electronic data room and deal rooms is becoming both more popular and more become available today. As a result there is a reduction in the use of email and faxing to send important documents. Along with the added level of security found in deal rooms, the speed of transmitting is also very fast. This means that the data room provides nearly immediate access to documents and information.

Selasa, 22 Mei 2018

Safe Methods of Electronic Waste Disposal

Safe Methods of Electronic Waste Disposal

Image source: http://exigorecycling.com/images/process_images.png

Because of the speed of technological development most companies are finding that they have to replace their computers sooner than they have always done and sometimes so they can keep up with hardware and software advancements or just as a result of plain wear and tear. There are many reasons why it is no longer cost-effective for many businesses to keep on reusing their outdated machines and this is why Chicago computer recycling becomes such as viable option. Even though computer recycling and donation are great things for any company to do, they come accompanied with some inherent danger.

All machines that are slated for the electronics recycle program have to become sanitized through secure data destruction. Failure to do this carefully there will be a lot of corporate and customer information that will be vulnerable to falling in the wrong hands especially by hackers and data thieves. On the other hand, when computers are not disposed of on the right manner, there are two great risks that managers should be aware of: there is data security and corporate liability as well as the environmental risk because of toxic chemicals and components that could easily be released into the environment and cause a hazardous impact on the environment and the community.

Corporate liability risk: The correct form of computer recycling is more than being just environmentally friendly; there is also some responsibility you have in regards to the data that is contained in any old machine. You want to avoid having your company liable for any financial or customer information that could easily fall into the wrong hands once you are done with your computer recycle exercise.

Do-it-yourself data security: There are people who believe that erasing files from their computers is enough to keep away data thieves from getting access to any confidential information stored therein. You may want to use data wiping software to make the retrieval of the information more difficult but it may not necessarily be a solid guarantee of secure data destruction. You want to remember that when you begin running a data destruction program you may not be able to recover any such data; you want to work with a reputable electronics recycling company to ensure that the process is done safely.

Data theft: If you are donating your computers you want to ask yourself whether they contain any sensitive and confidential information that should not have the smallest chance of reaching the hands of a data thief or a hacker. This is why you may want to retrieve the hard drive and ensure that proper hard drive shredding has been done; this is one of the best ways of sanitizing your entire machine using secure processes that you can trust.

Safe Mail Services REVIEW - Simplest Way to Deliver Your Email Campaign

Safe Mail Services REVIEW - Simplest Way to Deliver Your Email Campaign

Image source: http://assets.reviews.com/uploads/2016/09/29163933/MailChimp-Initial-Set-up-21.png

Email delivery is a very powerful part of email marketing. After all, in case your email is not delivered, it will certainly not be read. Here are a few approaches to increase your email shipping and delivery when delivering mass e mail marketing campaigns.

Some people like these steps:

1. Clarify at the start that will customers or customers when to anticipate the emails you may be sending them. If you can be sending a newsletter, explain the dates and even the times that the subscriber should expect the emails. When sending obtain confirmations, explain how the mail system works and advise them may be repaired emails to expect based on their actions. Be sure you adhere to your published schedule.

2. Request the customer to supply the "from" address to their address book. Most email clients uses the address book to name approved senders and deliver the message in the inbox. If a message gets delivered to a bulk or junk folder it is subject to the person simply deciding to mark all emails during that folder as spam, which can negatively affect your electronic mail status. Do not regularly alter your from address, either; pick one and stay with it.

3. Validate customers. If somebody subscribes to receive your news letter or other email offer, ensure you make sure their subscription. This is simplest way to ensure that your listing contains people who genuinely wish to read your email messages. Incorrectly formatted email addresses can be weeded through your system, and it makes sure that other people do not sign up addresses that they don't really control.

4. Offer an opt-out substitute for your subscribers and honor unsubscribe asks for no matter how they are been given. According to the CAN-SPAM act of 2003 (U. S.), you have 10 days to get rid of someone from an emailing list. They can send you an e-mail request, call you or possibly use an unsubscribe device to request removal, and you should comply. If you continue in order to send emails to those who have requested removal, you will subject you to ultimately negative publicity, be defined as a spammer, and damage your email reputation. Enough complaints might land you in court for violating the CAN-SPAM work.

5. Follow all the actual CAN-SPAM requirements. Each email that quickly scans the blogosphere must also include your own company's physical mailing address along with a privacy policy statement. The complete privacy policy can be positioned in the message, but a website to the policy on your website will also suffice. Although the CAN-SPAM law is not really ideal, it is the only real law in the Oughout. S. currently addressing the growing spam issue.

6. Cleanse failed emails. When an email cannot be delivered it is said to have "bounced. " The bounce message can be described as failed delivery report posted out to you by the mail server by which you are sending. A permanently failed email message should trigger complete removal belonging to the address from your list. It will never work. Continuing to send emails that constantly fail is usually a surefire way to decrease email delivery. If a recipient's The internet Provider (ISP) sees some percentage of the emails you are attempting crash, your mail server may be greylisted (slowed down), blocked temporarily and / or blacklisted. Being blacklisted might affect delivery to other mail servers and negatively have an effect on your email reputation round the Internet.

7. Section your email lists to target email messages well. After collecting data on the clients in your email list, you should craft your emails to meet their specific interests. The more segmentation you do, the more personalized and effective your email messages become. Advancements to your messages and segmenting your mailing lists helps improve every single other areas previously but will sustain email reputation.

Now, lets discuss about Safe Mail Services from safemailservices.com and just how it might assist you. I hope this short Safe Mail Services Review will assist you to differentiate whether Safe Mail Services is Scam or perhaps a Real Deal.

Safe Mail Services is an email marketing server specially designed for small internet businesses. In using this effective and safe mail-blasting service, you can deliver campaigns to greater than 3 million aimed recipients every day. You will be sending emails to their safe-list opt-in subscribers thus you'll be able to assured of real persons receiving your mails - and like this you are also guaranteed that therell be zero spamming reports coming your way.

Safe Mail Services members will send out ads directly via her server so ISPs will be clueless about your using an email service. Using this service will help you and your business raise. You will be introduced to somewhat of a humongous amount of crowd and you can just imagine the significant surge of lucrative targeted visitors towards your business direction. This is what Safe Mail Services is all about.

Accessing Safe Mail Services will only have to have a registration and a inexpensive one-time payment. There will be no recurring charges and after that. Once you have done the enrollment stage, you have entry to server immediately and you will be reaching out to millions in no time. This is going a lifetime privilege given to any or all members. If you are a person who seeks for a low-budget advertising and marketing this mailing service might be a clever move. You dont have to pay much for massive exposure.

Senin, 21 Mei 2018

RUSTIC ARCHITECTURAL DESIGN POST AND BEAM CONSTRUCTION

RUSTIC ARCHITECTURAL DESIGN POST AND BEAM CONSTRUCTION

Image source: http://st.hzcdn.com/simgs/2ad106370669a344_4-9735/rustic-exterior.jpg

The use of trunks and trees in primitive cultures as building elements was the origin of this basic system, which is very striking architectural and structural technique.

The two basic elements in post and beam construction, as its own name proves are the post, which is an element that works at linear compression and is subject to crushing by vertical forces, and the beam which is basically a linear element subject to a transverse load. The beams must generate internal resistance to prevent excessive deflection. The structure of posts and beams requires the use of a secondary structural filler system to produce the surfaces of walls, floors, and ceilings.

The post and beam construction is an architectural design in which the structure is formed by post and beam forming porticos (although without continuity in the knots) quite spaced between them and united horizontally by belts.

With this system of post and beam construction, it is possible to create networks of poles separated from each other achieving open spaces that can be molded and can use elements of prefabricated enclosures. This system can be used for both one-level and two-level constructions as well as for major constructions of three or more floors.

The master structure of post and beam type is constituted by main pieces of a strong section with an important distance between the poles, which distinguishes it from the trusses and the frames. In larger buildings, a distance between poles can reach 25 feet and 16 feet between porticos. The materials mainly used in this type of structures are usually solid wood or many times (using modern techniques) may use laminated wood.

The post and beam construction system was originally designed to withstand uniform and relatively low weight load. When concentrated and relatively high weight loads are present it must be reinforced below to convey the loads to the beams.

In addition to being a functional structure, it is also decorative so you should take care of the finishes as the post and beam will be in sight of people.  On the other hand, it is difficult to hide the electrical and water installations in the ceilings of this type of structures, since, because they are solid materials, they do not have empty inner spaces, which forces them to install these services properly. For that, it is indispensable to have a design from the beginning.

As wood is the main building material in this type of structure, it is important to note that among the main limitations that are presented such as shape and size can be overcome by laminating and using adhesives. On the other hand, the dangers of the wood structure spreading fire, rotting, or being infested by insects can be retarded and even eliminated with the use of chemical impregnations specially made for those purposes.

In conclusion, we can assert that the system of post and beam construction as well as being a functional structure, contributes an excellent decorative element to the design of walls and ceilings If the finishes of the wood are properly made, giving a rustic appearance to the room.

Zinc Galvanizing Vs. Zinc Plating

Image source: http://images.woodmagazine.mdpcdn.com/sites/default/files/styles/width_550/public/image/migrated/wood/images/2013/06/nailchart...