Forex

Wednesday, December 30, 2009
Forex is the market where one currency is traded for another. It is one of the largest markets in the world. Some of the participants in this market seeking to exchange a foreign currency for their own, like multinational corporations which must pay wages and other expenses in different nations than they sell products in. However, a large part of the market is made up of currency traders, who speculate on movements in exchange rates, much like others would speculate on movements of stock prices. Currency traders try to take advantage of even small fluctuations in exchange rates.
In the foreign exchange market there is little or no 'inside information'. Exchange rate fluctuations are usually caused by actual monetary flows as well as anticipations on global macroeconomic conditions. Significant news is released publicly so, at least in theory, everyone in the world receives the same news at the same time.

Market size and liquidity

The foreign exchange market is the largest and most liquid financial market in the world. Traders include large banks, central banks, currency speculators, corporations, governments, and other financial institutions. The average daily volume in the global foreign exchange and related markets is continuously growing. Daily turnover was reported to be over US$3.2 trillion in April 2007 by the Bank for International Settlements. Since then, the market has continued to grow. According to Euromoney's annual FX Poll, volumes grew a further 41% between 2007 and 2008.

Of the $3.98 trillion daily global turnover, trading in London accounted for around $1.36 trillion, or 34.1% of the total, making London by far the global center for foreign exchange. In second and third places respectively, trading in New York accounted for 16.6%, and Tokyo accounted for 6.0%.In addition to "traditional" turnover, $2.1 trillion was traded in derivatives.

Exchange-traded FX futures contracts were introduced in 1972 at the Chicago Mercantile Exchange and are actively traded relative to most other futures contracts.

Several other developed countries also permit the trading of FX derivative products (like currency futures and options on currency futures) on their exchanges. All these developed countries already have fully convertible capital accounts. Most emerging countries do not permit FX derivative products on their exchanges in view of prevalent controls on the capital accounts. However, a few select emerging countries (e.g., Korea, South Africa, Indiahave already successfully experimented with the currency futures exchanges, despite having some controls on the capital account.

FX futures volume has grown rapidly in recent years, and accounts for about 7% of the total foreign exchange market volume, according to The Wall Street Journal Europe (5/5/06, p. 20).Foreign exchange trading increased by 38% between April 2005 and April 2006 and has more than doubled since 2001. This is largely due to the growing importance of foreign exchange as an asset class and an increase in fund management assets, particularly of hedge funds and pension funds. The diverse selection of execution venues have made it easier for retail traders to trade in the foreign exchange market. In 2006, retail traders constituted over 2% of the whole FX market volumes with an average daily trade volume of over US$50-60 billion (see retail trading platforms).

Because foreign exchange is an OTC market where brokers/dealers negotiate directly with one another, there is no central exchange or clearing house. The biggest geographic trading centre is the UK, primarily London, which according to IFSL estimates has increased its share of global turnover in traditional transactions from 31.3% in April 2004 to 34.1% in April 2007. Due to London's dominance in the market, a particular currency's quoted price is usually the London market price. For instance, when the IMF calculates the value of its SDRs every day, they use the London market prices at noon that day.

The ten most active traders account for almost 80% of trading volume, according to the 2008 Euromoney FX survey.These large international banks continually provide the market with both bid (buy) and ask (sell) prices. The bid/ask spread is the difference between the price at which a bank or market maker will sell ("ask", or "offer") and the price at which a market taker will buy ("bid") from a wholesale or retail customer. The customer will buy from the market-maker at the higher "ask" price, and will sell at the lower "bid" price, thus giving up the "spread" as the cost of completing the trade. This spread is minimal for actively traded pairs of currencies, usually 0–3 pips. For example, the bid/ask quote of EURUSD might be 1.2200/1.2203 on a retail broker. Minimum trading size for most deals is usually 100,000 units of base currency, which is a standard "lot".

These spreads might not apply to retail customers at banks, which will routinely mark up the difference to say 1.2100/1.2300 for transfers, or say 1.2000/1.2400 for banknotes or travelers' checks. Spot prices at market makers vary, but on EURUSD are usually no more than 3 pips wide (i.e., 0.0003). Competition is greatly increased with larger transactions, and pip spreads shrink on the major pairs to as little as 1 to 2 pips.

Market participants

Unlike a stock market, the foreign exchange market is divided into levels of access. At the top is the inter-bank market, which is made up of the largest commercial banks and securities dealers. Within the inter-bank market, spreads, which are the difference between the bid and ask prices, are razor sharp and usually unavailable, and not known to players outside the inner circle. The difference between the bid and ask prices widens (from 0-1 pip to 1-2 pips for some currencies such as the EUR). This is due to volume. If a trader can guarantee large numbers of transactions for large amounts, they can demand a smaller difference between the bid and ask price, which is referred to as a better spread. The levels of access that make up the foreign exchange market are determined by the size of the "line" (the amount of money with which they are trading). The top-tier inter-bank market accounts for 53% of all transactions. After that there are usually smaller banks, followed by large multi-national corporations (which need to hedge risk and pay employees in different countries), large hedge funds, and even some of the retail FX-metal market makers. According to Galati and Melvin, “Pension funds, insurance companies, mutual funds, and other institutional investors have played an increasingly important role in financial markets in general, and in FX markets in particular, since the early 2000s.” (2004) In addition, he notes, “Hedge funds have grown markedly over the 2001–2004 period in terms of both number and overall size” Central banks also participate in the foreign exchange market to align currencies to their economic needs.



The Gold Exchange and the Bretton Woods Agreement
In 1967 Chicago bank refused Milton Friedman a loan in pound sterling because he had intended to use the funds to short the British currency. Friedman, who had perceived sterling to be priced too high against the dollar, wanted to sell the currency, then later buy it back to repay the bank after the currency declined, thus pocketing a quick profit. The bank’s refusal to grant the loan was due to the Bretton Woods Agreement, established twenty years earlier, which fixed national currencies against the dollar, and set the dollar at a rate of $35 per ounce of gold.

Domain

Monday, November 23, 2009
A domain name is an identification label that defines a realm of administrative autonomy, authority, or control in the Internet, based on the Domain Name System (DNS).

Domain names are used in various networking contexts and application-specific naming and addressing purposes. They are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains com, net and org, and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet, run web sites, or create other publicly accessible Internet resources. The registration of these domain names is usually administered by domain name registrars who sell their services to the public.

Individual Internet host computers use domain names as host identifiers, or hostnames. Hostnames are the leaf labels in the domain name system usually without further subordinate domain name space. Hostnames appear as a component in Uniform Resource Locators (URLs) for Internet resources such as web sites.

Domain names are also used as simple identification labels to indicate ownership or control of a resource. Such examples are the realm identifiers used in the Session Initiation Protocol (SIP), the DomainKeys used to verify DNS domains in e-mail systems, and in many other Uniform Resource Identifiers (URIs).

An important purpose of domain names is to provide easily recognizable and memorizable names to numerically addressed Internet resources. This abstraction allows any resource (e.g., website) to be moved to a different physical location in the address topology of the network, globally or locally in an intranet. Such a move usually requires changing the IP address of a resource and the corresponding translation of this IP address to and from its domain name.

Domain names are often referred to simply as domains and domain name registrants are frequently referred to as domain owners, although domain name registration with a registrar does not confer any legal ownership of the domain name, only an exclusive right of use.

This article primarily discusses the group of domain names that are offered by domain name registrars for registration by the public. The Domain Name System article discusses the technical facilities and infrastructure of the domain name space and the hostname article deals with specific information about the use of domain names as identifiers of network hosts.

Computer Virus

Sunday, October 18, 2009
A virus is simply a computer program that is intentionally written to attach itself to other programs or disk boot sectors and replicate whenever those programs are executed or those infected disks are accessed. Viruses, as purely replicating entities, will not harm your system as long as they are coded properly. Any system damage resulting from a purely replicating virus happens because of bugs in the code that conflict with the system's configuration. In other words, a well-written virus that only contains code to infect programs will not damage your system. Your programs will contain the virus, but no other harm is done. The real damage--the erasing of files, the formatting of hard drives, the scrambling of partition tables, etc.--is caused by intentional destructive code contained within the virus. Generally, the destructive part of a virus is programmed to execute when certain conditions are met, usually a certain date, day, time, or number of infections. An example is the now infamous Michelangelo virus. This virus can run rampant on your computer for months and you won't notice that anything is wrong. That is because even though your hard disk's master boot record is infected with the virus, the destructive code has not yet been executed. The virus is programmed to trigger its destructive code on March 6, Michelangelo's birthday. Therefore, if Michelangelo contained no destructive code, nothing bad would happen to your computer even though it was infected with a virus.
An important thing to remember is that not all virus attacks produce catastrophic results. For example, one of the most common viruses in the world is called Form. I got Form from a floppy disk given to me by a friend who didn't know he had the virus. In fact, I didn't know I had it either until I received a call from a company to whom I mailed my resume using that floppy disk. They called me, not to tell me that I got the job, of course, but rather that my computer had the Form virus. How embarrassing! Apparently, Form had been on my computer for a long time, but its effects were so slight that I never noticed it. The only peculiarity I encountered was a clicking sound that emitted from my PC speaker every time I pressed a key, but this only happened for one day. Later, I learned that Form is programmed to trigger this action on the 18th of every month. Other than that, it doesn't contain any destructive code.
The only other time my system actually became infected was considerably more serious. It happened only a few months ago on the job. I was scanning a large stack of diskettes for viruses when I was distracted by a phone call. After completing the lengthy call I turned my computer off and took a short break. When I returned I booted my computer, forgetting that I had left a diskette in the A drive. I discovered my error when the floppy drive began to spin. At that point I also noticed that the disk was being accessed far too much for a non-system disk. Upon rebooting from the hard drive, I quickly realized my mistake. A virus called Junkie was all over my hard drive. It had infected command.com, as well as my screen reading software and all associated drivers. The Junkie virus was alive in the boot sector of the diskette that I inadvertently left in the drive, and it ran wild when I accidentally tried to boot from it. Junkie is a perfect example of a virus that, if written properly, would not have damaged my system. It contains no destructive code. It simply replicates by infecting .com files. However, not all .com files are structurally accurate. Without getting too technical, .com files are raw binary data read by your computer, and .exe files need to be interpreted first. There are some files, particularly ones used by memory management software, that have .com extensions, but that are actually written more like .exe files. When Junkie infects one of these types of files, it becomes corrupted because it is essentially an .exe file, but Junkie has appended .com-like instructions to it; similar to repairing a can opener with parts from a toaster.
After the near heart attack I had during my battle with the Junkie virus, I began to study the phenomenon very seriously, and since then, though I have run into many viruses on the job, none of them has infected my computer. This is because I now have an effective antivirus strategy in place.

online degrees

Wednesday, October 7, 2009
The term The term online degrees refers to college degrees (sometimes including high school diplomas and non-degree certificate programs) that can be earned primarily or entirely through the use of an Internet-connected computer, rather than attending college in a traditional campus setting. Improvements in technology and the increasing use of the Internet worldwide have led to a proliferation of online colleges that award associate’s, bachelor’s, master’s and doctoral degrees. refers to college degrees (sometimes including high school diplomas and non-degree certificate programs) that can be earned primarily or entirely through the use of an Internet-connected computer, rather than attending college in a traditional campus setting. Improvements in technology and the increasing use of the Internet worldwide have led to a proliferation of online colleges that award associate’s, bachelor’s, master’s and doctoral degrees.

Quality of Learning Online

Online education is a proven model for learning, with a lengthy track record. It enables accredited higher learning for individuals living with physical disabilities, busy working class people, soldiers and those living abroad, and stay at home parents to mention a few. There is fundamentally little difference between physically sitting in an auditorium listening to lectures versus watching a webcasted video of the professor.

The recognition of the quality of online degrees compared to on-campus degrees varies. While most major online colleges are regionally accredited, the public perception of their quality is in dispute. Some experts argue that degrees in certain fields are more accepted online than in others, while some programs are less suited for online-only schools.

A survey by the Distance Education and Training Council found that 100 percent of employers who responded felt that distance education program graduates performed better on the job as a result of their degree (as compared to their previous performance). Additionally, employers felt that an employee receiving a distance education degree compared favorably, in terms of knowledge learned, to someone with a resident degree.On the other hand, The Chronicle of Higher Education reported in January 2007 on a Vault Inc. survey that found 55 percent of employers preferred traditional degrees over online ones. 41%, however, said they would give "equal consideration to both types of degrees."

The Sloan Consortium, an organization funded by the Alfred P. Sloan Foundation to maintain and improve the quality of distance education, publishes regular reports on the state of distance education in the U.S. In its 2006 report "Making the Grade: Online Education in the United States, 2006," it stated that "in 2003, 57 percent of academic leaders rated the learning outcomes in online education as the same or superior to those in face-to-face. That number is now 62 percent, a small but noteworthy increase."

In some instances, an online degree may be no different than a degree earned in a campus-based program. The instruction is often exactly the same, and the online degree contains no special designation. An example of this is the degree offered to Columbia University students who earn a degree through the Columbia Video Network (CVN) versus the campus-based program

cheap auto insurance

Friday, September 4, 2009
we all would like to find it and pay cheap rates to keep our expenses low. The reality of that question is that there really is no single company that's the cheapest one of them all, but there is a tool to help you compare rates from multiple auto insurance companies and make a choice based on the cheap auto insurance for you particularly.
There are many factors to look car inusrance companies other than just price. One should make sure that they also take these other factors into consideration because price is not the only important factor.
With Best Cheap Auto Insurance it only take three steps to get low cost auto insurance :
*Fill out the quote form – Unlike other auto insurance forms ours is short and to the point. You don’t need to fill out pages and pages of personal information with us. Just simply give us a few details. It will take you less than a minute to fill out.
*Choose the best quote without obligation – One concern people have is whether or not they are obligated to any insurance company when they fill out our form. You have no obligation to buy car insurance with any agent that contacts you. In fact, it’s good policy to not go with the first offer you get.
*Get insured for less – Once you have done step one and two you won’t have to wait long before you receive several low cost car quotes, and can choose the best one for you.

NOTEBOOK DATA RECOVERY

Wednesday, August 19, 2009
Notebook Data Recovery services is a fully equipped lab for all your data recovery needs. No matter how you lose you data, we at notebook data recovery services can help you get your precious data back. We use advanced techniques and software developed by our technical staff to recover data form all kind of disk drives, removable media, raids tapes or hand held PDAs with any operating system.

In today's competitive business environment, data is the life line of any business, small or large corporate or individual. If your business or home computer or any other memory storage devices has lost the data, we can help to get your data back. We use advanced data recovery technologies and techniques to recover inaccessible data from all types of Notebook disk drives, desktop disk drives. Whether you need a solution for logical or physical problem with disk drive, We can help. Notebook Data Recovery Services has experienced and trained staff to work upon your disk drive. Notebook Data Recovery Services, fully understand the situation of a company or a person involved in a data lost scenario. Our prime object is to provide Data Recovery on a competitive price to ease the burden of our clients.
Stop Immediately & shut down your computer, If you detect any problem or hear any clicking grinding scratching noise coming from the disk drive.. You need professional help. Call 1-800-580-4959.
Notebook Data Recovery Services has highly qualified and experienced data recovery Engineers having worked on all brand of hard disk drives, RAID Arrays, Tapes, PDAs, and removable media.