Friday, August 31, 2012

Legal Wiretap Transcription

In the Us, wiretapping or telephone tapping refers to the monitoring of the telephone or the Internet by a third party regularly in a inexpressive way. The United States Foreign brain Court of quote can authorize any federal agents to wiretap the telephone and Internet for use as evidence in court (better known as valid interception) which is regularly popular ,favorite only when other ways of detecting criminal operation is not possible. The wiretapped recorded conversation on the phone is often transcribed (converted into text form) by pro transcriptionists and these typed transcripts later signed become legally authorized documents that can be produced in court while litigation and trial. It is believed that it was wiretapping and intercepting of phone calls to his second wife in Beirut that led to locating the hideout and arrest of the Iraqi dictator Saddam Hussein.

Wiretap on a computer network was first ordered in 1996 when a hacker tried to enter the Harvard University and Us forces websites and computers. Recently there was a controversy after the Bush supervision authorized the National protection division (Nsa) to used legalized but warrant-less guard of suspected international Al Qaida terrorists within and surface the Us. Even though wiretap as evidence has been used in the Us since many years, in the Uk the government has only recently started inspecting the introduction of wiretap as court evidence after its latest quote of anti-terrorism legislation.

Besides wiretap there are many other types of specialized legal transcription services that are offered by pro legal transcription clubs along with transcription for,
Testimonies Trials Legal letter transcription Court proceeding Verbatim transcription General correspondence

Whenever legal transcription is outsourced one must make sure that the services are legally certified and notarized for court presentations. Also transcription should be done for varied legal documents like for study preparation, litigation support,
depositions, legal hearings, trials and more.

weblink Legal Wiretap Transcription weblink

Va Loans - Help to Home possession For Veterans

#1. Va Loans - Help to Home possession For Veterans

Va Loans - Help to Home possession For Veterans

Va loans (Veteran's Administration) are not undoubtedly loans. Instead, the Va Loan program is a warrant that is issued by the Veteran's administration to safe a lender from loss in the event that a loan enters into default (e.g. Foreclosure). Veteran's administration loan warrant programs wish exact paperwork that is provided by the veteran. There are other restrictions that may apply as well.

Va Loans - Help to Home possession For Veterans

Qualifying for a Va Loan warrant Va home loan benefits are granted to veterans if they served any time in active duty in any field of the armed forces after 9/15/40. All discharges must be under honorable removal (e.g. No dishonorably discharged members are eligible). Minimum time requirements are 181 days of continuous assistance while times of peace, or 90 days of assistance while times of war. For assistance members who enlisted after 9/7/80, or who entered as an officer after 10/16/81, continuous assistance of 24 months of active status is required. The exception to this is if they were called or ordered active for more than 90 days while war or 181 continuous days in times of peace. Extra requirements govern retain and National Guard service.

Much like other loan programs, a Veterans administration loan warrant must comply with basic minimum requirements. This means that the Veteran must be in compliancy with basic creditworthiness tests that the lender uses. The lender makes the final lending decision while the Va is merely guaranteeing the loan in the event of default.

Basic requirements include:

Minimum of two years employment history

Ongoing employment possibilities (e.g. The history cannot be from temporary assignments)

Credit worthiness as demonstrated on reputation report

Ability to make payments on loan, insurance, and meet family obligations

Debt to earnings ratio of less than 41% (including the loan)

Discharged under honorable conditions meeting old requirements

The Veterans administration loan warrant program does not allow for purchase of empty lots for development, unless it is part of a construction loan. Va loan guarantees do not cover industrial asset unless the asset is also to be residential, in which case the industrial asset must be less than 25% of the property. These guarantees will not cover venture properties purchased by the veteran. Properties must be busy by the veteran and/or spouse (in the event of active duty assistance members).

Va loan warrant programs do allow for joint possession of properties. However, the loan warrant portion will only cover the veteran's portion of the possession in the property. For example, if a husband (veteran) and wife (non-veteran) jointly purchase the property, the loan warrant would extend to only the 50% possession that is the veteran's portion. In these cases, the earnings and credit-worthiness of the veteran must be able to retain the entire mortgage payment. Va Loan guarantees also cover loans for multiple veterans that intend to occupy a property. In these instances, the asset may be multifamily properties and have individual units for each veteran. industrial asset may still not exceed more than 25% of the floor space of the property.

Va loans are required to meet minimum code requirements. There are waivers based on exact criteria that are decided between the lender, the veteran and the Veteran's Administration. Buying a home that is not up to minimum code requirements could follow in the loss of a veteran's loan guarantee. It is considerable that you characterize all of the requirements for codes when you are applying for a loan with a veterans guarantee.

The proper loan documentation together with form 1003 (residential loan application) will be required. Veterans are also required to contribute authorizations to verify credit, earnings and debt amounts. In addition, removal forms (typically Dd214) as well as a certificate of eligibility is required.

This is a mere summary of the Va loan warrant program. There are some requirements that have not been covered here. If you are considering applying for a loan with a Va guarantee, you need to characterize all of the requirements. Veterans have served our nation honorably and deserve our assistance. The Va loan warrant program is one way that we help ensure that they can reclaim their portion of the American dream.

share the Facebook Twitter Like Tweet. Can you share had me going Va Loans - Help to Home possession For Veterans.

Dolphin Scholarship Foundation

Dd214 Request - Dolphin Scholarship Foundation The content is nice quality and helpful content, That is new is that you simply never knew before that I know is that I even have discovered. Before the unique. It's now near to enter destination Dolphin Scholarship Foundation. And the content related to Dd214 Request.

Do you know about - Dolphin Scholarship Foundation

Dd214 Request! Again, for I know. Ready to share new things that are useful. You and your friends.

Do you have a relative that has served in the United States military? Have they served on a submarine for seven or more years? Well, then you most likely qualify for the Dolphin Scholarship!

What I said. It is not outcome that the true about Dd214 Request. You see this article for information on that need to know is Dd214 Request.

How is Dolphin Scholarship Foundation

We had a good read. For the benefit of yourself. Be sure to read to the end. I want you to get good knowledge from Dd214 Request.

This scholarship is one of the best soldiery scholarships available. You do not have to be going into the soldiery or planning on entering soldiery service in the hereafter in order to qualify. However, your sponsor must sign off on your application, and they must be a relative of yours. No one who is your neighbor or plainly a stranger is able to qualify as your sponsor.

The Dolphin Scholarship Foundation is the group which organizes the scholarship. They approve all applicants after they have submitted the initial information. You will then have to get several letters of recommendation, a copy of your sponsors Dd214, a copy of your Act/Sat scores and several other items sent in to the Dolphin Scholarship Foundation. Currently, the deadline is set for March 15th 2010, but does change from year to year.

After you have submitted all of the information, and have been compared with all of the candidates, you will whether be popular ,favorite or denied for the scholarship. Just as with any other program, there is only dinky funding available. Currently, the each year payout per popular ,favorite scholarship ask is ,400. This is a great scholarship to apply for, as long as you qualify. Do not pass up this awesome occasion to get a large whole of money in a relatively small niche!

I hope you will get new knowledge about Dd214 Request. Where you can offer used in your life. And most significantly, your reaction is Dd214 Request.Read more.. see Dolphin Scholarship Foundation. View Related articles related to Dd214 Request. I Roll below. I even have suggested my friends to help share the Facebook Twitter Like Tweet. Can you share Dolphin Scholarship Foundation.

stock spin - IronKey Usb Memory and Encryption

"Laptop theft is the second most coarse computer crime and less than 2 percent of those stolen laptops are ever recovered", agreeing to the Federal Trade Commission and the Federal Bureau of Investigations. "Four in five (81%) of Us firms have had at least one laptop stolen containing sensitive information agreeing to a recent study." In 2005, 32,771,838 and in 2006, 31,796,167, records were compromised when laptops were stolen from fellowships such as gas and energy, county, state and federal government agencies, retailers, colleges and universities, hospitals and banks. Well known corporate and government agencies top the list from the Veteran's administration and Navy to the Bank of America. Laptop theft is not limited to businesses or organizations, but in many instances laptops are stolen from individuals. These individuals may be contractors for businesses or just person like you or me, who use our laptop regularly. They can be stolen from offices, homes, cars, and during travel.

In 2008, the Nih had information from 2500 patients compromised with the loss of stolen laptops. In Nashville, Tn some 337,000 resident's information became ready for identity theft when county official realized that thieves had broken into the county construction and stolen laptops. The cost to the county will consist of over 1 million dollars as they provide identity theft protection to those affected by the theft. There have been roughly 217 million records stolen in the past three years, 2005-2008, agreeing to Paul Stevens, Director of procedure and Advocacy with Privacy rights Clearinghouse (a hidden advocacy group).

Thefts of laptops occur all around the world. It was so serious in the United Kingdom that in January of 2008, The Uk's Ministry of Defense began a recapitulate of information protection policies after a stolen laptop resulted in a major protection breach. The laptop, stolen from a car used by a military recruitment officer, had information on roughly 600,000 people. Much of the information was basic taste information but for 153,000 individuals more sensitive information was exposed along with passport information, National condition Services numbers, driver's license numbers and medical information. For an added 3, 700 people, financial and banking information had been stored on the laptop. To make matters worse, while all this confidential information was stored on the laptop, none of it was encrypted.

The information stored on both firm and personal computers is not all the time limited to corporate information, but may consist of information such as personal, banking, prestige card or investments. Also market on many computers are account numbers, passwords and information on friends and family. When this data falls into the wrong hands it can be used to apply for any estimate of financial opportunities under false names by identity thieves.

Your laptop does not have to be stolen, to gain information. How long do you think it would take person to passage the information on our computer, by plainly "borrowing" it, copy all of your information and return it? How often do we work on our computer completing on line bill payments and other personal "chores" in group such as the airport, coffee house, library or other places we happen to be? Identity thieves can have a great deal of information right at their fingertips as we leave our laptop open, work while sitting next to person or forget to close windows or log out and acquire our computer before we get up to get that second double espresso. How can we protect your laptop information and keep working in any place and in any place that we need to? IronKey offers a hardware-encrypted Usb flash drive to protect your acquire your most prominent conveyable data. No one can passage the data on your IronKey if it is ever stolen, lost or "borrowed."

IronKey offers the following features: drive contents encrypted using Aes Cbc-mode encryption, a true random estimate generator for the maximum protection generates encryption keys in hardware, securely market passwords, fast (30Mbps) read, fast (20Mbps) write, encased in a potted metal case- not plastic which makes it one of the strongest Usb keys around, exceeds military waterproofing standards, and has the potential to safely tunnel through insecure wireless networks.

IronKey does not require software, drivers, or administrator privileges. When the Us military needed conveyable storehouse secured, IronKey is the technology they chose to use. IronKey passwords are super protected; after 10 incorrect password attempts, the encryption chip self-destructs, development the contents of the flash drive totally unreadable. The flash drive itself does not self-destruct but the encryption chop does so the contents are completely unreadable.

IronKey utilizes a spoton die-casting metal process to design the Iron Key's metal casing to exact specifications for thickness, drive and durability. Iron and other metals are used to make the strong metal shell. IronKey is waterproof and tamperproof. No one can tamper with an IronKey without destroying or causing irreparable and noticeable damage.

IronKey has fine itself from the competition in its features like encryption, acquire browser, and full, protection features. IronKey has products for personal or firm use, from 1 Gb up to 8 Gb, with prices starting at .99. IronKey is like a personal "Fort Knox" for college students, businesses or anything who wants to protect their personal information and their identity.

sources tell me stock spin - IronKey Usb Memory and Encryption sources tell me

Thursday, August 30, 2012

Colorado Death Records

Dd214 Request - Colorado Death Records The content is nice quality and useful content, That is new is that you simply never knew before that I do know is that I actually have discovered. Prior to the unique. It is now near to enter destination Colorado Death Records. And the content associated with Dd214 Request.

Do you know about - Colorado Death Records

Dd214 Request! Again, for I know. Ready to share new things that are useful. You and your friends.

The Vital Records Section of the Colorado group of health and Environment has death records of the whole state since 1900. Obtaining death certificates can be of course done. You can go there in person while office hour from 8:30 am to 4:30 pm, Mondays to Fridays. Also, you may use their phone, mailing or good yet an online service, which is a more convenient and faster form of transaction.

What I said. It is not outcome that the actual about Dd214 Request. You look at this article for home elevators an individual need to know is Dd214 Request.

How is Colorado Death Records

We had a good read. For the benefit of yourself. Be sure to read to the end. I want you to get good knowledge from Dd214 Request.

In order to apply for a certified copy of a death certificate in Colorado, one is required to have a proof of connection or documentation to establish their legal interest such as marriage certificate, birth certificate, court orders etc. After, you may download and perfect the online forms then mail it with a copy of valid government-issued picture Id and personal check or money order to the Vital Records Section.

The standard fee required for getting a death certificate is .75 for the first copy. You may select to request for added copy of the same report ordered at the same time through adding another payment of for each copy. These fees are non-refundable. It is advisable not to send cash.

To strict or convert a Colorado Death Certificate, you must perfect the form from Vital Records with at least on item of documentary evidence such as certified birth report (state or county issued), Certified baptismal or other church records, School census or transcript records, military dismissal report (Dd214), assurance policy-application page, Employment records, social safety whole or Ss-5, and Marital status.

The easiest way to search death records is online from the privacy of your home. You will have to pay a fee, but you can get a repayment if the records are not found.

I hope you have new knowledge about Dd214 Request. Where you possibly can offer use within your everyday life. And most importantly, your reaction is Dd214 Request.Read more.. see page Colorado Death Records. View Related articles associated with Dd214 Request. I Roll below. I actually have recommended my friends to help share the Facebook Twitter Like Tweet. Can you share Colorado Death Records.

Illinois Veteran Grant - Veteran Services

Dd214 Request - Illinois Veteran Grant - Veteran Services The content is nice quality and helpful content, That is new is that you simply never knew before that I know is that I actually have discovered. Prior to the unique. It's now near to enter destination Illinois Veteran Grant - Veteran Services. And the content related to Dd214 Request.

Do you know about - Illinois Veteran Grant - Veteran Services

Dd214 Request! Again, for I know. Ready to share new things that are useful. You and your friends.

This is an astounding Illinois grant for any Illinois veteran, currently enlisted or getting out of the military, who wants to go to school! 120 Semester Hours are paid for with this Illinois grant, and it has a decent Gpa requirement in order to mouth your grant eligibility. Veterans must be a resident of Illinois within six months both before and after 1 year or more of active aid or who served on federal active duty aid in a foreign country while a time of hostilities in that country, and received an honorable discharge. When it comes to tuition assistance, this Illinois grant is by far the best in the country!

What I said. It isn't outcome that the true about Dd214 Request. You check out this article for facts about a person wish to know is Dd214 Request.

How is Illinois Veteran Grant - Veteran Services

We had a good read. For the benefit of yourself. Be sure to read to the end. I want you to get good knowledge from Dd214 Request.

This Illinois grant schedule pays eligible tuition and proper fees. While benefits are wee to use only at Illinois public colleges or society colleges, superior applicants may use this tuition assistance grant at the undergraduate or graduate level for the equivalent of four schoraly years of full-time enrollment! Illinois Veteran Grant units are based on the enrolled hours for a particular term, not the dollar amount of the benefits paid, so there is a cost savings occasion if you want to save the state some money.

If the recipient fails to enroll within this Illinois grant schedule for another term of a regular school year (not including summer), unless for reasons of being called to federal active duty service, only tuition and any mandatory fees will be paid while future periods of enrollment. Basically, they want you to stay focused on completing your course work, so that you can faultless your degree program.

Eligibility

To be eligible for the grant, you must have served in the armed forces, which is inclusive of the reserves and Illinois National Guard, for at least one year. If you are no longer serving within the armed forces, you must have received an honorable discharge. (Rotc members are not eligible for the grant.) If you do receive benefits from the Illinois Veteran Grant while serving in the armed forces, you must verify upon dismissal that you did receive an honorable discharge. Whatever other than honorable will wish that you reimbursement awarded grant funding back to the state.

You must also have been an Illinois resident before entering active duty, or be a pupil at an Illinois state funded college or university prior to entering service. If you were not an Illinois resident or a pupil at an Illinois college or university prior to entering service, you must compose or plan to compose Illinois residency within six months of your dismissal from the service. Spouses of forces services members can also apply, but the husband or wife serving within the forces must have met the residency criteria mentioned in this paragraph as well. They must either have been an Illinois resident or pupil prior to entering the service, or plan to become an Illinois resident within six month of their dismissal from the service.

Student performance, as well as financial responsibility, requirements are also considerable to receiving the Illinois Veteran Grant. You must first not have defaulted on any pupil loans, nor owe a reimbursement for any federal or state in case,granted grants. Secondly, your grade point midpoint must be maintained above the minimum Gpa requirements for the school that you are attending as well. If you received benefits

How to Apply

You can get an Ivg schedule application from your college's tuition assistance or financial aid office, or the Illinois division of Veterans' Affairs field offices. Submit your faultless application and required documentation as specified in the instructions. In order to ensure that your application is processed in a timely manner, be sure to thought about read the instructions, submit all required documentation, and caress a tuition assistance consultant if you are uncertain about what documentation is needed.

Illinois pupil assistance Commission(Isac) will send superior applicants a observation of Eligibility. It is foremost to keep a copy of the observation in order to present a copy to the college as needed. You must acquaint your college's financial aid or tuition assistance office of your eligibility status as soon as possible, but not later than the last scheduled day of classes in the term for which a grant is requested.

How Funds Are in case,granted to Grant Recipients

Illinois pupil assistance Commission(Isac) works in conjunction with the college to disburse funds from this program. The college certifies pupil eligibility and then submits a payment invite on behalf of the student. It may take up to eight weeks after the date that Isac processes the payment invite before funds are received at the college.

Depending on the college, students may be responsible for payment until schedule funds are received. superior applicants who are awaiting receipt of funds from this schedule should caress the Financial Aid Office or enterprise Office to determine the college's course concerning this definite Illinois grant.

Qualified grant applicants must acquaint their college's tuition assistance or financial aid office of their eligibility status as soon as possible, but not later than the last scheduled day of classes for the term for which a grant is requested. It is the grant applicant's accountability to get and submit all required documentation to allow the application to be processed so that the grant applicant can acquaint the college by the last scheduled day of classes. The college then works with Isac to get the funds, which are applied toward the superior applicant's eligible tuition and proper fees.

I hope you get new knowledge about Dd214 Request. Where you'll be able to put to utilization in your everyday life. And just remember, your reaction is Dd214 Request.Read more.. on Yahoo Illinois Veteran Grant - Veteran Services. View Related articles associated with Dd214 Request. I Roll below. I actually have counseled my friends to help share the Facebook Twitter Like Tweet. Can you share Illinois Veteran Grant - Veteran Services.

Saturday, August 4, 2012

How Can You Know If You Are Eligible For A Va Loan?

Dd214 - How Can You Know If You Are Eligible For A Va Loan? The content is good quality and useful content, That is new is that you just never knew before that I do know is that I actually have discovered. Prior to the unique. It is now near to enter destination How Can You Know If You Are Eligible For A Va Loan?. And the content associated with Dd214.

Do you know about - How Can You Know If You Are Eligible For A Va Loan?

Dd214! Again, for I know. Ready to share new things that are useful. You and your friends.

Va loans can be especially time intriguing and many times first-time homebuyers misconstrue how they work. It is imperative to know that the Veterans supervision (Va) guarantees the mortgage loans to veterans who meet exact qualification, however it does not act as the lending agent. Consult a credit counselor and find out what your credit rating is before you apply for any kind of loan. In this way, you can either accept or work on it and thus be ready before applying for the guaranty.

What I said. It isn't outcome that the actual about Dd214. You look at this article for facts about what you want to know is Dd214.

How is How Can You Know If You Are Eligible For A Va Loan?

We had a good read. For the benefit of yourself. Be sure to read to the end. I want you to get good knowledge from Dd214.

There is a mandatory Va funding fee for first-time homebuyers. The idea that the veteran is adding to the cost of his own mortgage and not relying on the taxpayer is the surmise for the obligatory fee. A fee of two percent is expensed for "no down payment" loans to first-time homeowners, but it is three percent for veterans purchasing a second home. The surmise for the greater fee for second-time owner is about presumed equity in the property and/or time to save up for the extra cost. Ration schedules for Va refinance loans do not differ.

For a disabled veteran who suffers from a service-related injury and receives compensation for such, exemption from the funding fee is possible. Spouses of soldiery men who died in the line of assistance or from injury complications connected to soldiery assistance are permitted to further legal exemptions as well. Each case is examined individually and final say on all exceptions is the right of the Va.

Va mortgage loans are amazingly flexible. You can buy a new home, do home improvements and enhance energy efficiency with the aid of a Va loan. It is all the time a great idea to ask about the limitations and allowances each Va loan can offer.

One of the most requisite factors in determining eligibility for a Va loan is the nature of the discharge. The mortgage loan experience becomes more and more difficult when a extraction is less than "honorable." A local Va office can sustain those who might have had other than an "honorable" extraction with filing the proper paperwork, finding out where to send them and knowing how to appeal a decision, if needed.

The proper papers confirming the true conditions of the extraction or its updated standing need to be in case,granted as well as some copies of the Dd214 paperwork. A home loan guaranty is not given to any veteran who is unable to voice monthly house payments.

I hope you receive new knowledge about Dd214. Where you'll be able to put to use in your daily life. And just remember, your reaction is Dd214.Read more.. her explanation How Can You Know If You Are Eligible For A Va Loan?. View Related articles associated with Dd214. I Roll below. I actually have recommended my friends to help share the Facebook Twitter Like Tweet. Can you share How Can You Know If You Are Eligible For A Va Loan?.

Time To Repeal Dadt?

The policy known as "Don't Ask Don't Tell" (Dadt) was passed by then President Clinton in 1993 as a compromise in dealing with assistance members who are whether gay, lesbian, or bisexual. Soldiery policy is currently to discharge from the assistance those members who serve openly as homosexual or bisexual. Practically 14,000 assistance men and woman have been discharged from active assistance under this policy since that time. However, the policy also states that the Soldiery cannot ask the assistance members about their sexual orientation.

There is a growing movement in the Country to end this ban, and President Obama himself has pledged that he will end this policy. Also, the Chairman of the Joint Chiefs of Staff for the Us Soldiery along with the Secretary of Defense have both called the ending of this practice. The House of Representatives has even adopted a portion that could, in time, lead to the repeal of Dadt as early as 2011. Under this measure, repeal will have to wait on a narrative of a Working Group who reports to the Defense Department. This group is essentially studying how to best implement the repeal of Dadt. The repeal of Dadt will come to be sufficient 60 days after the President, whoever he or she is, the Secretary of Defense and the Chairman of the Joint Chiefs of the Soldiery all respond that these new regulation have been properly ready and that they are consistent with the Soldiery readiness standards, Soldiery effectiveness, unit cohesion, as well as recruiting and keeping policies of the military.

There is growing retain both within the Soldiery and the country as a whole to repeal this law. Polls and surveys consistently show a strong retain all around to allow gays and bi-sexuals to openly serve within the military. This retain is particularly strong among the younger generations.

There are even those who even make the claim that Dadt genuinely is injurious to Soldiery readiness. The claim is that the Soldiery needs all of the recruits that it can possibly get, with over 70% of all of the young habitancy in the Us estimated to be ineligible to serve in the Us due to weight problems, poor education, or having criminal records. More and more "waivers" have been issued in the past few years, which essentially allow previously ineligible recruits into the assistance with special permission. Would it not be good to have a talented but openly gay recruit openly serve, rather than take recruits that are heterosexual, but that need waivers to overcome a criminal history?

It should also be pointed out that there are an estimated 66,000 gay or bisexual Soldiery men and women serving at this moment, with other estimated 1,000,000 veterans. Admiral Mullen himself has stated that he has served with gay assistance men and women since 1968.

get redirected here Time To Repeal Dadt? get redirected here

British War Medals - An Introduction to Collecting British forces Medals

British war medals are very collectible and can change hands for tens of thousands of pounds. The Uk has no equivalent of the U.S. Stolen Valor Act of 2005 and so there is no limitation upon their sale and buy by dealers and collectors. It is vital though for the novice accumulator to be aware of the substantive discrepancy between aid (or campaign) medals and gallantry medals.

Service medals, otherwise referred to as campaign medals, are awarded to every serviceman or woman who has taken part in a single friction or campaign. There is no requirement that the soldier, sailor or airman has behaved in a particular, simply that they were there. The most coarse and collectible are British aid medals from World War One, ordinarily sold in pairs, and unmistakably identifiable from their ribbons, assuming, of course, that the spoton ribbon has been attached!

Every soldier taking part in the Great War received a War Medal and a Victory Medal. The name, serial whole and regiment of the recipient of each medal will be stamped on the side and it will be potential to study details of his war article via the British group article Office and/or the Commonwealth War Graves Commission. It is even potential sometimes to trace the recipient's living relatives!

Other aid medals to look out for are the 1914 Mons Star, awarded to members of the primary British Expeditionary Force, and the 1915 Star. For those interested in the Anzac involvement in the Great War, the 1915 Gallipoli Star is also very prized. Be aware though that the recipients of these medals were far fewer in whole and, consequently, the medals become more costly to acquire.

A pair of War and Victory medals will change hands for something in the region of and the Mons Star possibly for . Collate this to the 0,000 you will need to pay for a Victoria Cross and you will immediately appreciate the discrepancy to the accumulator between aid and gallantry medals.

The Victoria Cross is, of course, the top award for gallantry in the British Armed Forces, equivalent to the U.S. Medal of Honor. It is rarely awarded and then, very often, posthumously. More often seen in a museum there are some very large collections of Victoria Crosses in underground hands.

The award of British gallantry medals is also intelligent in that a discrepancy is made between officers and other ranks. For the same act of bravery that would corollary in an officer receiving the soldiery Cross, a member of the ranks would receive the soldiery Medal. Similarly, in the Royal Air Force, where an officer might receive the mighty Flying Cross, a member of the other ranks would receive the mighty Flying Medal.

Collecting British War medals is a very rewarding and intelligent pastime and it is potential to build up a large variety of aid medals. Collecting gallantry medals requires far greater resources and, very often, attendance at devotee auctions.

click this British War Medals - An Introduction to Collecting British forces Medals click this

Friday, August 3, 2012

Flash Mobs Can Defeat International Terrorism

Flash Mobs Brought Down Evil Regime in China, Tomorrow they Will Be
the Biggest Innovation Against International Terrorists?

Power to the People, now and always. Flash Mobs are all the rage, yet they have not done much yet for the tasteless good here in the United States. Some random acts of kindness but more or less so far used for communal means, a few protests, but more or less only testing their capabilities.

As the natural evolutions of this new organizational recipe comes, we may find it has great potential. For instance helping in times of need, such is for the Hurricane Event. Possibly a Flash Mob can alert every person by way of Spam, not advertising Spam, but instant messaging spam to friends and also can be used by Police Authorities and First Responders? To help assist, by giving exact instructions. International Terrorist Attacks, or looking for a culprit or perpetrator of evil. Instant communications. Now with Fcc Powels new WiFi and Internet Telephones and VoIp. And with the future Video Cell Phones, deleting of digital divide thanks to Gate's and the current Bush Administrations goals and guidance for broadband passage everywhere. All this is possible. Instant data over a region or over the land and soon world wide instant information.

I had been recently contemplating a mobile network of neighborhood watch groups using small businesses in conjunction with citizens and police to curb crime, but by adding in the advantages of numbers and instant information, instant messaging with the use of Broadband mobile access, WiFi, etc. We could be united completely. Here is the schedule I designed for neighborhood watch:

http://www.lancewinslow.org/nmwp.shtml

But as this schedule got going and implicated citizens joined their own neighborhood local watch programs after 9-11 when the President said we need to all be on the look out. I had carefully adding the Terrorist Watch:

http://www.lancewinslow.org/ntw.shtml

Jfk once said in his "Ask not what your country can do for you, but what you can do for your country" And after 9-11 the people all joined together to do just that, some volunteered 2000 hours to help the tasteless good, some joined the troops to take the war on terror to those who wish us ill, others formed local groups, but all wanted to do something about it. The people responded, but many were confused at what to do, they did not know who to look out for? Neighbors suspecting neighbors, people in fear pulled back and were worried about privacy. Those who were worried the most looked guilty, thus an insidious vicious circle of bizarre behavior was witnessed, very much unbecoming of Americans and the American psyche. people sat behind their Tv sets and watched and the more they watched the more paranoid they became. They depleted vitamins in their bodies, worried, caused health issues and sat colse to void of exercise.

What can we do? How do we get back to the healthy psyche we need and the America we know? Well with these new technologies we can do anything, we do not need to fear. We can quickly mobilize and defeat any virus that hits our theory of flow. If an International Terrorist attacks our water supplies, power supplies, transportations systems, we can quickly mobilize forcing the International Terrorists to pick distinct methods and stopping them in their tracks as they try, plan or attempt. By having instant messaging, the Fbi can put out word to call to operation and the instant messaging friends and family, Mlm, Spam can alert millions with in minutes. An International Terrorist in route to commit an act is history, no opportunity in getting away or completing his evil mission against the many nation in the 10,000 years of recorded history of mankind. You know its true. Do not even deny it, this is a great nation and we are privileged to be the great people from strong blood lines living within it's borders, free and protected.

Fema should use such phone calling tree hybrids to help for volunteers, same with Salvation Army. Flash Mobs can react faster and without the bureaucracy. This is why Fema is successful, in essence they are above the government and can make real-time decisions, which helps them save lives and combat the troops of mom Nature.

Flash Mobs hosters and planners should be kept in the loop of catastrophe and in case of the need. Participators will feel they are doing something worthy and this all fits in well to the Presidents call for 2000 hours. Many people cannot volunteer due to time constraints, but they may be enticed to partake in Flash Mobs, which help people once in a while and feel good about their assistance to the country. They can feel good that they are on this team, the team of good and the team that will win. The power of each and every individual focused on the task at hand, the brain power their personal resources such as communication, transportation, knowledge or even in the event of a small business, a place for food, transported generators, lights water supplies, etc. You see?

Mobilization of an army, a benevolent militia. Power of the people. A force by the people and for the people with our government as the facilitator, with the trained professionals and tool all set up in enlarge for the problems which challenge any species living on the face of the planet. Small problems can be handled as normal, but when all hell breaks lose, we are called to operation to defeat evil. These types of scenarios work well and the tests and the flash mob congregations have shown, it works, 1,000 people in ten to fifteen minutes to a exact location. Some believe as more people join maybe 10,000 - 20,000 people in the same time. Or Possibly just those with the skill needed for that task.

That is like a swarm of ants, beehive, yet still with freedom of individuality. The citizens of this country are dedicated and want to help, let's accept the offer. They have asked what can We do for Our country? Well they can get a small gadget and stay informed. Join a network of a Flash Mob.

Flash Mobs are fast acting and we need to be prepared in this new era for fast acting club and absolute immediate response to important situations. Flash Mobs can also be educated on their important roles, given Cpr education after a fun event flash mob so that when a real important human need event appears, they are ready to fight terror, mom nature or other?

Rather than live in fear, we can live in the knowledge that we, together can do anything, that we are prepared and ready and we together will stand tall and defend our all we are and all we build. Flash Mobs and online wireless networked groups will be intertwined in that some will belong to many groups such is the communal interaction innate characteristics of humankind. We should be using this new technology to compliment what it is to be a member of the human species.

By designing a system, which fits the needs of the people, we can get the maximum participation and unite on and off line. Let's allow the technology to work for us and bring us back together as a team, let's not let it detach us so we no longer talk with every person else and withdraw into ourselves. If we are to unite the World, maybe we should unite our own, neighborhoods, regions and country first. We have so many advantages to this new technology and it is a tool. Flash Mobs are using the Technology to the full extreme, but new formats in flash mobs will in fact be forth coming, for instance this one I advise in the simplest of terms. There will be others who stumble over uses for this. We can build an Army of volunteers and helpers to support first responders at the drop of a hat. We, the people can deal with anything. Fear not the International Terrorists, they ought to be fearing us.

Flash Mobs Unite. We ought to be construction the infrastructures and systems to deal with these new technologies while retention in mind the possibilities of Flash Mob scenarios for instant assistance in that time of need. Enterprise and telecommunication industries can make these products with allowable protocols to all work together on one giant network. every person wins; the government can do their jobs more efficiently call upon us if and when needed. The new industries that such advanced technology will open will furnish jobs and profits (meaning incommunicable sector funding in prospect of shareholder equity increases and regular profits from the sales of devices and network It and hardware infrastructures). And we can rest assured that we are not alone and that we are united and that we can and will defeat anything thrown our way.

Mother Nature or Psychotic International Terrorists are no match for the informed Flash Mob. Power to the People, any thoughts? Post below as this is just an idea, with a microscopic passion behind it from a guy who is not from academia and only washes cars.

this post Flash Mobs Can Defeat International Terrorism this post

Violence - Where Do Children Learn It?

The saying "the children are our future" has been repeated so often it has become cliche, but there is truth in the words that echoes beyond the mundane. an additional one euphemism can be used when discussing our nation's youth, "we reap what we sow." This isn't meant as a threat or in a derogatory manner, rather, it is meant as a wake up call. A call to action.

Before delving into the meat of this first narrative let's begin with some perspective. The bullet points below are to make you pause and reflect on the direction we're taking as a society. (Long-term effects of repeated exposure to media violence in childhood. & Longitudinal relations in the middle of children's exposure to Tv violence and their aggressive and violent behavior in young adulthood)

- 8 hours a day: the approximate time spent on electronic media (Tv, smart phone, games, internet)

- 12.5 million: number of 2 - 19 year olds that are obese in the United States (17%)

- 1 in every 400 children have diabetes

- 5.2 million: children ever diagnosed with Adhd

- practically 1 in 4 high school graduates cannot pass the Asvab (basic Army test) with a minimum score

- 75% of 17 - 24 don't qualify for soldiery assistance due to being unfit, criminal record, didn't graduate high school

- 16% of all youth deaths: Homicide

- 12% of all youth death: Suicide

The numbers are telling and most are indicative of a worsening trend. It is not all doom and gloom however. It's not my intent to fear monger. Instead it's my intent to reflect on current trends and look at some of the root causes that lead to increased designate drug usage, obesity, violence, Add / Adhd, and whole uncontrollable behavior.

This narrative will look at the role of media and its influence on our youth. Children now spend on median eight hours a day watching Tv, surfing the internet, playing video games, texting, chatting etc. This is the same as a full work day! Assuming these children are going to school and not allowed while classroom hours to watch Tv and play games, then one can end a majority of time before and after class is spent in front of an electronic device. The majority of this off-time is one where a responsible adult is likely watching over them.

What are the problems of too much exposure to violent media? The first and most distinct response by many is that a lack of rehearsal often leads to increased weight gain. Sitting in front of a Tv, computer, game console, all involve a lack of movement on the participators part. Excessive stimulation makes it harder for a child to focus for longer periods. Exposure to graphic violence through media shapes young minds, influencing behavior, levels of violence, stress loads, and their ability to combine (This Is Your Brain On Violent Media). It is this last point where I'll spend the most time developing in this first article.

Multiple studies have been carried out in many countries, learning the effects of violent media exposure (and if you pay attentiveness it becomes apparent that a majority of our media is violent, violent games, violence in the news, violent Tv shows, violent movies, violent music). The sheer number of studies makes it harder to refute the clear preponderance of evidence. The evidence indicates Excessive exposure to media violence is detrimental to normal brain functioning and detrimental to the normal development of a child.

What are the effects of violent media on my child? Numerous studies have shown that exposure to violent media (of any form, although video games appear to be the worst) leads to increased levels of aggression, violent behavior, abnormal development of the brain, desensitization, and decreased levels of pity for others. A four-year-old cannot distinguish in the middle of fact and fantasy and will often imitate the violence they see. At risk youth, children in poverty, those with only one working parent, or those living in more violent neighborhoods, are more at risk.

Keep in mind there have been many independent studies showing the links in the middle of unwanted behavior and specific forms of media, but few studies have looked at the culminating effects of all violent media consumed by children over a longer duration of time. Base sense would dictate that if exposure to small amounts of violent media has short-term and long-term effects, then greater exposure to violent media would have detrimental effects that are worse in duration and magnitude.

Food for thought: Tvs didn't become Base in the household until the 1950s. while this time Tv programming was more strongly regulated by the Fcc. Most programming was house oriented. By the 1960s a slew of new shows came on the air and the introduction of more 'violent' (for the time) Tv shows was introduced. 1966 was the year of the first school massacre (shooting).

Are the effects reversible? There is good news here. The human body and mind are quite resilient. Most damage is rarely permanent. Investigate is ongoing into long-term effects, therefore the exact effects of distance of exposure and recovery time are still being understood. Despite the lack of longer-term studies, there have been studies showing the improvement of youngsters who sell out their violent media exposure. combine reduced media exposure with rehearsal and a good diet to see more drastic improvements in mental, emotional, and physical health of your child.

What can I do to help my child? You can sell out their exposure to media violence. Remember as a parent or guardian you are the one responsible for what they watch, play, and do. It is often easier to set a child in front of a television, keep them entertained and when they get too uncontrollable or overweight, seek out a pill to fix the problem. This "solution" and pattern can have long-term consequences for the personel child and for community as a whole. Instead play games, indoors and outdoors. Encourage non-violent-media associated entertainment. A great source for added information on how to help sell out media in your child's life: http://www.takethechallengenow.net.

What are the biggest challenges to reducing media exposure? Likely ourselves. We are our own worst enemies. As adults we generate excuses for our children (and ourselves). We account for their current levels of media exposure (and year after year this number has been increasing). We would rather watch Tv and eat evening meal than sit around a table and socialize. We think removing the Tv from a child's bedroom is unfair and a punishment.

How do I overcome the challenges of reducing media exposure? This is no small task for some. As a community we have become addicted to media of all sorts and either we will admit it or not, many of us are dependent upon media as a form of release. We pass this addiction on to our children and they become part of our rationalization. It is still inherent to make improvements and lead a happy life. First, try reducing the number of time in front of an electronic gismo by an hour each day. Gently growth that number as you comprehend there are other activities that are equally fun. Go outdoors! Try walking, playing Frisbee, catch, or any of a myriad of games that exist. Your kids will benefit from the exercise, fresh air, sunlight, and will literally grow to enjoy and prefer the attentiveness of their parents as opposed to that of a social media site. Try playing games. Many games force real human to human social interaction and have been shown to stimulate and help the developing mind. Set aside some quiet time to read a book. The quiet time helps the mind unwind, relax, and prepares the body for sleep.

1. Huesmann Lr, Miller Ls. Long-term effects of repeated exposure to media violence in childhood. In: Huesmann Lr, editor. Aggressive Behavior: Current Perspectives.New York: Plenum Press; 1994. Pp. 153-86.

2. Huesmann Lr, Moise-Titus J, Podolski Cl, et al. Longitudinal relations in the middle of children's exposure to Tv violence and their aggressive and violent behavior in young adulthood: 1977-1992. Dev Psychol. 2003;39:201-21.

3. "This Is Your Brain On Violent Media." ScienceDaily. ScienceDaily, 06 Dec. 2007. Web. 01 May 2012. 8. "Timeline of School Shootings." Us News. U.S.News & World Report, 15 Feb. 2008. Web. 01 May 2012.

total stranger Violence - Where Do Children Learn It? total stranger

military Funeral Honors

The rendering of soldiery funeral honors is a way to show the nation's deep gratitude to those who, in times of war and peace, have faithfully defended our country. This ceremonial paying of respect is the final demonstration a grateful nation can provide to the veterans' families. While these honors have always been in case,granted whenever possible, the law now mandates the rendering of soldiery Funeral Honors for an eligible veteran if requested by the family.

What happens at a soldiery Funeral Honors ceremony?

The group of Defense will provide an honor guard, consisting of at least two members of the Armed Forces, for the ceremony. At least one member of the information will be a member of the field in which the veteran served. During the ceremony, the honor guard will fold and present the United States flag to the veteran's family. Taps will be played by a bugler, if available, or by a recording. Depending on the field of service, supplementary elements may be added. A local Veterans aid assosication (Vso) may also participate in the ceremony, providing a firing party, for example. Richard Lamb Funeral aid staff can support you in making arrangements with the group of Defense and a local Vso, if available.

Who is eligible for soldiery Funeral Honors?

To demonstrate eligibility, the house must provide a removal document showing a removal other than dishonorable service. The favorite recipe for establishing eligibility is the Dd Form 214, known as Certificate of release or removal from Active Duty. A Dd 214 form can be obtained by completing a suitable Form 180, which is ready online at [http://www.nara.gov/publications/forms/sf180.pdf].

For information on eligibility for a burial flag, please see the group of Veterans Affairs website at. [http://www.cem.va.gov/bflags.htm].

What does the ceremony cost?

There is no cost to families for soldiery Funeral Honors.

How can a Presidential Memorial Certificate be obtained? Who is eligible?

Any deceased, honorably discharged veteran is eligible for the Certificate. To invite a Certificate, please visit your nearest Veterans Affairs regional office or send a invite by mail to the following address:

U.S. group of Veterans Affairs

National Cemetery Administration

810 Vermont Ave., Nw

Washington Dc

You can find more information about the Certificate online at [http://www.cem.va.gov/pmc.htm]

Where can I learn more about soldiery Funeral Honors?

A website is ready for supplementary information at http://www.militaryfuneralhonors.osd.mil/

from this source military Funeral Honors from this source

Thursday, August 2, 2012

Your family Tree - What Could I Add to individual Records?

As you begin to establish your house tree you likely have a house tree software program to help guide you to input information on each personel ancestor. Names. Birth Dates. Marriage Dates. Etc. There are many house tree programs available, some free, some inexpensive, some quite expensive. They all have their pros and cons, and if you have 10 population in a room talking about 10 programs, there are many arguments and discussions about the relative merits of each of the software programs! If you are beginning, I would advise you use a free program to start with, because it is relatively easy to move your house data to any other program using a specialized way of rescue it, called a Gedcom. All programs are able to use this principles of inviting house tree information, and will guide you in doing so.

Two frequently-used free house tree software programs in North America are from inheritance or from FamilySearch. Check online for these programs, and download one to your computer. Once you have installed it, you can immediately start entering individuals, beginning with yourself as a "home" person. Adding your parents is relatively easy, as most of us at least know our parents birth dates, marriage dates, mother's maiden name and some residences. But what then? What else should or could be added to an personel record?

Consider that each ancestor should have a source listed for Birth, Marriage, Divorce, Death, Burial. These are the core basics of information. For men, troops service and associated information can be added. But, after those basics, what could you add to make your ancestors come alive to you and others in your family?

The times: think your ancestors in the context of the times. What else was happening in their part of the world, that may have impacted them? What events happened in their lifetimes? How did they live? What were their occupations throughout their life? Could they read or write? How do you know? What do you know of how men and women lived and managed to survive in the 1700s or 1800s? Find out - look for diaries, journals, stories, histories and more.

Immigration: The vast majority of our ancestors in North America came from someone else country to settle. Some came because of religious persecution (Palatines, Pilgrims), others because of famine in their home country (Ireland is a prime example), others because of wars. Some came because of the possibility of adventure in a new country. Find out as best you can how and why your specific ancestors came to the new country. Maybe those relatives who settled in Nova Scotia had neighbours or relatives who came earlier; or a group of families organized to resettle from England to a specific area in Virginia. Find out how they came, which ship, when, how long did it take to arrive, and other details. Did population go back and forth from the new to the old country to visit relatives? demand everything.

Documents and Records: By checking documents of your ancestors, you may come across information that provides you with additional questions to ask and research. Milk every document and narrative you find for every information possible for future searches. If your great grandfather served in a war, look for troops information about him. Sometimes dismissal records comprise corporal descriptions or medals, or other stories. If your house stayed in one town, look to see what the rest of the house was doing in that town, or if the next generation moved away to conclude someone else place.

Gossip and Stories: There are oral records which can be very helpful for your house history. Often a story will help you verify when a ship may have brought your great grandparents from Europe to Canada, or that two brothers came together. Sometimes, it is only a story, and the details have come to be changed in the telling over any generations, manufacture it difficult to find out the actual truth. If you use a house story as a "source", make sure you mark it as such on the relevant ancestor.

In general, the following information will be very helpful to manufacture your ancestors come alive in your house tree:

- occupations

- extra interests or hobbies

- residences, particularly if there are pictures or sketches

- memberships in organizations (business, political, religious, service)

- curative information if detailed

- personal descriptions if possible (height, build, color of eyes or hair, etc.)

- published information on an ancestor (obit, history, legal issues, politics)

- handwriting; seeing your ancestor's signature (census) or handwriting (letters)

- stories, skills, talents

- photographs and other media

There are many other items that could be added to your ancestors, and as you come to be more skilled at research, you will begin to find additional details for specific individuals or whole families, at a inevitable time and place.

Note that every program will have a way to show you how to add a "source" for the information you put in. think that each date and event should have a "source", and begin now to learn how to add that information. It is much easier to add it at this early stage than when you have any hundred or more in your tree, and have to add source information for all! When population begin genealogy searching we commonly do not know what we are doing, and only later do we realize the point of adding sources to our data. Start now. You can get a book from the library on how to cite your sources, as there are specific ways to write out the references. Go to Cyndi's List (cyndislist.com) for more websites that offer source information you can use; some can be downloaded to your computer, others are good sites to bookmark for future reference, others will offer laminated sheets for a low fee.

Something to think right now: What history would your own grandchildren want to know about you and your siblings and parents? Take time once a month to add some small item to your own history. Maybe it was a fantastic trip you took one year when you were 15 or 35. Maybe it was a piece of poetry you wrote, or how much you loved playing the piano at sing-alongs. Or learning to drive a car when you were 23. How much you loved to orchad all your life, particularly herbs for cooking. Details. Short stories.

Find time to add color and flavor to your own history, and then see how some of that can be added to your ancestors. Later, when you begin to share your house tree study with your extended house members, you will find even more information from others, as they share theirs with you. One picture or story may well lead to many more inviting additions to your house tree.

he has a good point Your family Tree - What Could I Add to individual Records? he has a good point

Calibration Services

Almost all calibration laboratories' ability systems fulfill the standards set by Iso/Iec 17025:1999, and contain all functions that have an impact on the attribute of the 17025 calibration service, like equipment, personnel, calibration procedures and reporting.

17025 calibrations correspond to Iso 9000 for calibration and testing laboratories. However, certification to Iso 9000 does not necessarily mean the efficiency of the laboratory to churn out technically suitable data and results, but certification to 17025 inevitably furnishes that proof.

It is a guarantee to the clients regarding the precision, accuracy and repeatability of results. 17025 calibrations generally cover all on-site and regional calibration laboratories.

Most of the institutions and agencies providing calibration services are dedicated to ability by upholding conformity to Iso/Iec 17025:1999 ""Policy for the Competence of Testing and Calibration Laboratories.""

Calibration services contain heal services for all kinds of calibration, and testing and determination instruments. Wide-ranging metrology skill is put in place for every calibration that such assistance laboratories perform. Laboratories providing calibration services strictly contend ability registrations, thereby conforming to the standards of one's adored industry.

Calibration services also contain laboratory calibration in which items completed in the laboratory are subjected to the most contemporary metrology services. operation authentication and alterations, as required, are incorporated. The instrument's operation is checked to ascertain whether it adheres to the manufacturer's current stipulation. In case parameters prove to be erroneous, the ascertained values are recorded as critical to get the instrument within stipulation.

Regular troops and acceptable calibrations contain first-run operation exam calibrations to ascertain whether the instrument is within stipulations, first run data, listing of standards used, exterior cleaning, minor consumables (such as fuses and batteries), certificate of calibration stating tractability to N.I.S.T, and a calibration label showing date calibrated, date due, and technician.

great post to read Calibration Services great post to read

Alabama Records present - collective Records Alabama service

Are you searching for records of determined habitancy of interest? There are many communal records Alabama quest services ready on the internet, with one of the most reputable being Alabama-Records Info. In the past when these websites did not exist, only law compulsion and government agencies could passage records and communal domain information. Today, whatever who has passage to the World Wide Web will be able to find these records from any place and at any time they want.

1. Who Are The habitancy Most Likely To Use A communal Records quest Site Like Alabama Records?

The habitancy most likely to quest for records are commonly organizations who want to look at possible employees' records like the existence of criminal records or by government officials and law compulsion officials. Nowadays, there are more habitancy using it for communal purposes like locating their old classmates and friends and their house history.

2. What Types Of Records Will You Be Able To Find At The Alabama Records Website?

There is an impressive range of data ready that can be found about any singular person that you want to explore on the site. I was pleased with the assistance because I could find what I wanted to inside the database. Some of the types of data that can be found comprise court, criminal, cemetery, birth, address, phone number, inmate, marriage, death, obituary, bankruptcy, sex offender, troops records and many more.

3. What Are Some Factors To think When choosing A communal Records Alabama Service?

Before you pick to join any communal records service, you should make sure that your privacy is protected by a safe and confidential search. There are some services that do not safe your identity and I highly suggest you not to use them. Alabama Records website was able to make my quest underground and confidential; therefore I chose to use it and am glad that I did.

go here Alabama Records present - collective Records Alabama service go here

Why Americans Find Predatory Lending nasty

"Menis - the author translates as "indignant rage" - It is the kind of rage arising from social betrayal that impairs a person's dignity through violation of "what's right." (p21), Achilles In Viet Nam - Combat Trauma and the Undoing of Character, Jonathan Shay, M.D., Ph D.

"The vulnerable association between child and parent is a metaphor for the association between a soldier and his army. It is also more than a metaphor when we consider the formation and maintenance of good character. The parents betrayal themis - (the quality to feel good about oneself , self esteem, self image) - through incest, abuse, or neglect puts the child in mortal danger. Despite intellectual limitations, the small child commonly grasps the danger, although the child's mental representation of the danger differs from adults. The child's inner sense of protection in the world emerges from the trustworthiness, reliability, and uncomplicated competence of the family.

"Similarly, the child's acquisition of self-control, self esteem, and consideration of others depends upon the family. Absent inherited mental disorders, good parenting will yield good character and all the other adult resources of dignity and maturity, including ideals, respect for others, self respect, ambitions, self-care, pro-social rather than anti-social activity, reliable capacity to distinguish reality from fantasy, and so forth.

"Lurking behind these supposedly located truths is the platonic assertion that good character is a firm wall between a good person and evil acts, regardless of the betrayals of "what's right" and other blows, such as bereavement that may plainly happen to an adult. Often there is the indiscernible unstated assumption that those that hold power in society exhibit loyalty and care in fulfillment of themis. (p 32)

"If military custom tells soldiers that their emotions of love and grief - which are inseparable from their humanity - do not matter, then the civilian society that has sent them to fight on their profit should not be shocked by their "inhumanity" when they return to civilian life. (p 67)

"Viet Nam narratives review that the events that drive soldiers berserk are betrayal, insult, or humiliation by a leader; death of a friend-in-arms; being wounded; being overrun, surrounded, or trapped; finding dead comrades who have been mutilated by the enemy; and unexpected deliverance from positive death." (p 80)

Even in families without children the parents are leaders. Parents make financial decisions that impact the time to come of their children, their stature in the community, self worth, and dignity. There is nothing dignified about the effects of predatory financing. Yet there is an preliminary assumption that those who impact the reputation scores of Americans are exhibiting loyalty and care in fulfillment of their chosen occupation. Americans believe our laws and regulations such as Regulation "Z" protect their rights. There is a strong confidence that the law will work.

The economic downturn of 2000 through 2002 is firmly grounded in buyer spending and buyer debt. The real estate boom infused more disposable wage into the economy. Exportation of manufacturing and services sector jobs to foreign countries, plus the huge trade deficit add to our woes. In early 2003 the federal allocation deficit and the threat of war add to troubled economic times. Bankruptcies achieved report high levels. However, as with history and military battles, we must learn from the past to see the time to come and prevent time to come mistakes.

William F. Aldinger started his work with CitiGroup, learning speedily that sub-prime financing in the CitiFinancial subsidiary was a lucrative business. After leaving Citi, Aldinger went to Wells Fargo, and then to Household International as Ceo. All three fellowships are now classified as predatory financing companies, and all three have been forced to conclude with the states, government, and consumers. Household restated wage for the entire time that Aldinger was with the company. Hsbc has a four year trade with Aldinger to continue as Chairman and Ceo of Household under Hsbc, and then he will become chairman and Ceo of Hsbc North America, Inc and director of Hsbc Holdings. The past tells us the future. Hsbc contends that there will be no changes to their company model. Therefore it is safe to predict that Hsbc will become the largest global predatory lender ever witnessed by a civilized orderly society.

Those that managed to delude themselves into mental they are financiers providing a assistance to society, while masquerading as predators, argue that they are servicing a sector of society that would otherwise not receive adequate attention. Countering that argument, the society Reinvestment Act perhaps should be revisited and strengthened. perhaps federal and state governments should take off predatory abilities from the hidden sector while providing buildings and funding. Americans should not be abused by a law that is failing.

Historically, if we use the actions of predators to show us what areas need reform we can reverse the economic downturn we see today. Just like gangs, organized crime, and similar activities, the government should look for the cause of the problem while instituting prevention and removal of the opening for predators.

Credit cards are responsible for a huge measure of American debt. Easy reputation and the need for reputation is thinkable, in today's society. Again predators have an opportunity. Household International provides financing for, and ongoing compensation to merchants under their existing contracts. Again, there is an preliminary assumption that those who impact the reputation scores of Americans are exhibiting loyalty and care in fulfillment of their duties, that they will ensue Fair reputation Reporting and Fair reputation Billing, etc. With over twenty million transactions a day, and over sixty participating merchants, Household International impacts the lives and house values of many taxpaying Americans every day.

Consumer watchdog club Household Watch receives buyer complaints daily. Based on their web site log statistics Household Watch only receives complaints from 5% of those who visit. Many others get the data they need from their web site data. Over 400 people per day use the Household Watch web site to find links which enable them to pay their bill online.

The Federal Trade Commission, therefore, recognizes Household Watch and sister site BestBuyCard as a source of buyer help. Where predators see an opening the government should step in to stop them. When the government does not step in, buyer organizations step in to fill the gap. We sincerely hope, therefore, that the buyer organizations will be heard a loudly as the predators and the government when decisions are made. They speak for the public, with emphasis on the social that experiences violations of regulation "Z" and other areas where they thinkable, extra trust and confidence.

his comment is here Why Americans Find Predatory Lending nasty his comment is here

Direct Mail Marketing to Get Local maintain for Your Veterans Hall

Currently we live in the greatest nation ever created in the history of mankind. When you study the data and look at all the numbers and statistics the United States of America is clearly the greatest country ever built in all of human recorded history. Our republic has liberties and freedoms that no other nation can claim. But relaxation is not free and we need to remind our citizens of that fact.

Every town and city should have a veterans hall to honor those who have served in our forces to protect this great nation. Often getting withhold for a veterans hall is not difficult but everybody needs to be alerted of the veterans group in your area. One way to do this is to use collective service announcements on the radio and someone else great way we have found in supporting the veterans groups is to send out direct mail packages.

The simplest way to get volunteers for a veterans hall and collective withhold is to send out direct mail in those petite coupon packages that go out to population in specific zip does. If those coupon packages with the direct-mail marketing inside are sent to all the citizens within a 15-mile radius this will have a definite impact on the new volunteers advent into the assosication as well as donations and collective support. Please consider all this in 2006.

good Direct Mail Marketing to Get Local maintain for Your Veterans Hall good

Wednesday, August 1, 2012

Personal Finance Tips - How to Get a Va Loan If You Are a Veteran!

Dd214 - Personal Finance Tips - How to Get a Va Loan If You Are a Veteran! The content is good quality and useful content, That is new is that you never knew before that I do know is that I actually have discovered. Before the distinctive. It is now near to enter destination Personal Finance Tips - How to Get a Va Loan If You Are a Veteran!. And the content related to Dd214.

Do you know about - Personal Finance Tips - How to Get a Va Loan If You Are a Veteran!

Dd214! Again, for I know. Ready to share new things that are useful. You and your friends.

If you happen to be a person who is on active duty right now or are thought about a mighty veteran you could have a critical resource available to you in order for you to get a loan for a home. Va loans are for those who qualify to get a home loan from the department of Veterans Affairs. They are a department of the government that verily will keep your interests at heart when they are processing your loan. So it's a good idea to investigate your Va loan possibility before you go seeing for other lenders.

What I said. It is not outcome that the actual about Dd214. You read this article for information on what you want to know is Dd214.

How is Personal Finance Tips - How to Get a Va Loan If You Are a Veteran!

We had a good read. For the benefit of yourself. Be sure to read to the end. I want you to get good knowledge from Dd214.

You can do a self screening to see if you are a mighty veteran or if you are on active duty. However, if you are a veteran you need to have received an honorable dismissal or you may not be thought about eligible. So you should take anything soldiery identification that you have, down to your local Veteran's administration office to see if you are truly eligible before you get your hopes up.

You will need some sort of proof that you serviced in the military. This would be your Dd214, soldiery Id Card, soldiery narrative and any awards you might have for proof that you served in the U.S. Military. Even though your local Va may already have any of these items you still should make sure that you have your own copies.

You can also, if you wish, go to the website for the U.S. department of Veterans Affairs if you would rather try to apply online. You will click on the "Veteran Services" selection on the website where you will then click on "Home Loans". Then you can click on the "Certificate of Eligibility Veteran Registration Instructions" this way you can register for the site. You will need to do this in order to be able to apply for a loan online.

After you have done this you then go back and login. Go back to the "Veteran Services" and click on that, go to "Home Loans" and click on that. Once back to the options page for home loans you can then click on the "Va Loan Electronic Reporting Interface." Once you are there you will need to consequent all of the directions they wish for you to apply for the loan.

You will then need to go to your Va Office when the site directs you to. This is so that you can unblemished the whole loan processing. You will give the rep all of the paperwork that they are going to need like proof that your served, your real estate agent's palpate facts (understand that you already need to have a house in mind so that if they need to ask questions your real estate agent can riposte them for you) and any other facts that they might require. It's probably a very good idea for you to call them ahead of time to see exactly what they need from you to continue processing the loan.

After that, you will just need to wait for your loan to be processed and while you are waiting make sure to continue to update your agent about how far along the process is. They need to know that it's still in process so that they don't think that you've decided to not go through with it.

I hope you receive new knowledge about Dd214. Where you'll be able to put to easy use in your everyday life. And just remember, your reaction is Dd214.Read more.. his response Personal Finance Tips - How to Get a Va Loan If You Are a Veteran!. View Related articles associated with Dd214. I Roll below. I actually have recommended my friends to help share the Facebook Twitter Like Tweet. Can you share Personal Finance Tips - How to Get a Va Loan If You Are a Veteran!.

Can Symbian Brew Blackberry?

Perspectives of Wireless Marketing Wars - Who will Be the Winner?

According to the investigate held by analytics business Canalys the shop of "smart" mobile devices in Europe, Near East and Africa grows more rapidly than shop of mobile phones. Within the first half of 2005 9.6 million of smartphones and Pdas were sold compared to 3.6 million during the same period of the previous year. Such trend is observed worldwide - approximately 70 million full feature handsets are sold worldwide. Agreeing to analysts the two main processes in expand stipulate such growth at the moment. On the one hand, ordinary users interchange their old smartphones and Pdas to newer ones. On the other hand, there is an upsurge in interest in mobile E-mail and extended abilities of smart mobile devices from clubs and corporations.

Modern smart mobile systems are to be: all the time available (small sized / handy), all the time On (optimized memory usage, minimal battery use), extensible (new software can be added if necessary), affordable, and of varied form factors. Moreover, a smart mobile device should join the maximum of mobile technologies available at the moment: Gps, VoIp, Bluetooth, IrDa, Gprs/Edge, Wi-Fi, mobile E-mail, withhold of Http protocol, Mp3 etc. This is a vast domain for competition among manufacturers of execution systems for smartphones and Pdas.

There are some very large players in this market: Symbian Os, Brew Os, Blackberry Os, Windows mobile Os and Palm Os etc.

Experts' Area

Ulf Morys, general owner at Gameloft GmbH:

- Symbian: more important in the future, but still niche shop (Nokia shop share ca. 33 % overall; not more than 1/3 of this Symbian phones & some other Symbian phones). whole optimistic estimate: ca. 10 % of total newly sold phone base.

- BlackBerry: piquant for business / productivity applications; no mass market.

- WindowsCe: difficult to judge. Microsoft will keep pushing it's platform, but results were often unsatisfactory in the past; make sure that the partners can indubitably bill for applications delivered to this platform. We've seen problems with this.

- Brew: real mass shop inherent in Us and Chinese market, not very relevant for European market."

Symbian

Symbian - is a software licensing business that develops and supplies the advanced, open, standard operating principles - Symbian Os - for data-enabled mobile phones and Pdas.

As of September 2005 60 phones that run under Symbian Os from eight manufacturers are shipped worldwide and a further 56 phones from eleven manufacturers (among them Fujitsu, Mitsubishi, Nokia, Samsung, Sony Ericsson, BenQ and Motorola) were in development. Symbian Os is an undisputed sales leader in Europe and has a strong shop share in other countries. Currently Symbian's shop share is 55.9 per cent from worldwide sales (according to Idc analytics company), at that 82 per cent of devices were artificial by Nokia (in whole since 2005 starting there were sold approximately 34 million data enabled devices with Symbian Os on board).

Experts' Area

Philip Solis, Abi investigate senior analyst, author of the study "Smartphones: The shop for Smartphones and Smartphone Operating Systems":

"Symbian's chief advantages are that it is easy to build applications for, and that it has a large developer community. Disadvantages are that Symbian is primarily dinky to Nokia handsets, and its shop is concentrated in "Gsm-heavy" regions."

19 of 60 devices with Symbian Os withhold Wcdma. By the way, smartphone Nokia 6680 is recognized a 3G world bestseller telephone.

Key features of Symbian Os

Rich suite of application engines - the suite includes engines for contacts, schedule, messaging, browsing, utility and principles control; Obex for exchanging objects such as appointments (using vCalendar) and business cards (vCard); integrated Apis for data management, text, clipboard and graphics

Browsing - supports Wap 1.2.1 for mobile browsing

Messaging - multimedia messaging (Mms), enhanced messaging (Ems) and Sms; internet mail using Pop3, Imap4, Smtp and Mhtml; attachments; fax

Multimedia - audio and video withhold for recording, playback and streaming; image conversion

Graphics - direct passage to screen and keyboard for high performance; graphics accelerator Api

Communications protocols - wide-area networking stacks together with Tcp/Ip (dual mode Ipv4/v6) and Wap, personal area networking withhold include infrared (IrDa), Bluetooth® wireless technology and Usb; withhold is also in case,granted for multihoming capabilities and link layer

Quality-of-Service (QoS) on Gprs/Umts networks

Mobile telephony - Symbian Os is ready for the 3G shop with withhold for Gsm circuit switched voice and data (Csd and Edge Ecsd) and packet-based data (Gprs and Edge Egprs); Cdma circuit switched voice, data and packet-based data (Is-95, cdma2000 1x, and Wcdma); Sim, Ruim and Uicc Toolkit; other standards can be implemented by licensees straight through extensible Apis of the telephony subsystem

International withhold - conforms to Unicode standard version 3.0

Data synchronization - over-the-air (Ota) synchronization withhold using SyncMl; Pc-based synchronization over serial, Bluetooth® wireless technology, Infrared and Usb; a Pc Connectivity framework providing the capability to change files and synchronize Pim data

Security - full encryption and certificate management, derive protocols (Https, Wtls and Ssl and Tls), Wim framework and certificate-based application installation

Developing for Symbian Os - article development options include: C++, Java
(J2Me) Midp 2.0 and PersonalJava 1.1.1a (with JavaPhone 1.0 option), and Wap; tools are available for building C++ and Java applications and Roms with withhold for on-target debugging

User Inputs - generic input mechanism supporting full keyboard, 0-9*# (numeric mobile phone keypad), voice, handwriting recognition and predictive text input.

Brew

Brew - Binary Runtime Environment for Wireless is a blend Os, application platform, and marketing system. Brew started with Qualcomm-based Cdma chipsets and technology - a vast shop - but Brew is independent of the wireless technology utilized by a single handset or network and can withhold other wireless technologies. Ideally, Brew can work with any device, and Qualcomm is planning to port it to Global principles for mobile Communications (Gsm). Qualcomm is trying to remove the gap between Gsm and Cdma operators. As Cdma strengthened hand, the Gsm lobby propped its own version of Cdma which they named Wcdma (Wideband Cdma). Wcdma has been launched in a group of countries (80 operators in 29 countries), and many more are gearing to get underway it within this year, it is already successfully running in countries like Korea, Japan, China, India, Brazil and in some parts of North America.

So far prevalent in the Cdma domain, Brew is gently transiting to the Gsm bastion of Europe as the continent's operators introduce 3G services based on Wcdma (by the end of year 2005 the estimate of Wcdma networks users worldwide increased by 2,6 times compared to December 31, 2004 and reached 43,81 million users). Such a scenario could make Qualcomm a worldwide flag carrier in mobile market. In all, 40 industrial Brew device manufacturers (Audiovox, Kyocera, Lg, Motorola, Nokia, Samsung, BenQ etc.) offer over 135 Brew-enabled devices - as of January, 2006 Agreeing to Qualcomm. approximately 10% of all handsets shipped worldwide are Brew compatible and the estimate of application downloads (May 2005) exceeds 300 million. The success of Brew has been built on Cdma platforms of major mobile operators, together with Verizon Wireless, China Unicom, Telstra and Kddi.

Regardless of platform, Brew requires dinky memory (150Kb), which makes Brew applications workable even on low-end phones.

Brew provides basic capabilities for such industrialized services as Gps, VoIp, Bluetooth 1.1, Mp3 and Midi support, video recording and playback, multimedia streaming, e-mail. The set of Brew services includes transportation capabilities of Tcp/Udp sockets, Http protocol support, Sms-Mms services, extended telephony capabilities. Brew supports some programming languages together with Java, and via extensions Brew understands C/C++, interactive animation Flash and Xml.

The Wall street Journal paralleled Brew with Microsoft Windows in wireless transportation domain.

Experts' Area

Victoria Alexandrova, project Manager, Pda applications group of Qarea Company: "Who I see a winner? Symbian, of course. It is convenient, applicable, multi functional and easy for understanding. However, if I were in the Usa I certainly would rather use BlackBerry, since they furnish top capability service."

Blackberry

Blackberry - is a possession operating system, in case,granted by Rim (Research in Motion, Canada), for the BlackBerry devices and BlackBerry enabled devices (BlackBerry email is already on a few handsets together with Siemens Sk65, Nokia 6820/6822, Motorola Mpx220). BlackBerry is one of the important wireless solutions, which allows users to stay linked with wireless passage to email, corporate data, phone, web and organizer features. The true power of BlackBerry is mailbox integration. BlackBerry can join seamlessly with a user's existing corporate or personal email list providing a wireless extension of their regular e-mailbox.

The first BlackBerry was released in early 1999. The first BlackBerry with integrated cell phone, as well as the first BlackBerry sold covering of North America was released in 2001, using the European Gsm/Gprs standard. Rim at the moment has a very dominant position in the mobile email market. BlackBerry is used worldwide, available from 95 wireless carriers in 40 countries. In November 2004, Rim announced the estimate of subscribers to the BlackBerry assistance to have reached two million, having doubled within ten months. Proceeding their steady growth, Rim announced an further one million subscribers in May 2005, only six months after having reached two million.

Experts' Area

Rudy de Waele, Ceo at Random One (R1):

"The shop is going more Symbian due to the strategic moves Symbian did with S60 platform, delivering Symbian to varied devices of different brand manufacturers and Nokia's most recent partnership with Vodafone to growth the use of S60 as a standard software platform.
Windows mobile is going to catch up bit by bit, they have the shop advantage in Us and they can advantage from the Microsoft Pc/Mobile synchronization that becomes more and more popular and is a crucial element for the success of mobile data services, but I don't see them getting speedily at the same level of Symbian on a global level, it's going to take at least 4-5 years for them to catch-up, if ever they will...

Meanwhile I don't see a piquant hereafter for Palm Os, neither Brew, though Brew is still quite strong in the shop due to Qualcomm drive on the market.

Nobody can compete with Symbian as of now, their competitors will have to come up with a stronger Os and that doesn't look obvious.

At last, don't forget about Linux who has a lot of potential, specifically in mobile, I see a piquant and growing hereafter for them."

No wonder, Rim commerce a top notch device (with BlackBerry Os on board) that is secure, stable, and dominates shop share with state and local government, the military, and with industrial corporations. In 2005 Rim was the first largest Pda supplier, and their technology BlackBerry occupied the second place among Os manufacturers giving Microsoft product the go-by.

Rim develops its own software for its devices, using C++ and Java technology. Third party developers applications must be digitally signed, that guarantees the application authorship.
Available services are: Wireless Email Service, Wireless Calendar Service, Wireless Internet (Html and Wap formats) Services, Voice and Sms, mobile Data Service, Attachment Service, Instant Messenger, Gps Service, Bluetooth etc.

Diagram Year-on-year increment of devices shipments

Note Brew includes Cdma and Wcdma chipsets

The full feature handsets shop is hard to predict, however approximately all analysts predict steady and expanding growth of this shop (which is observed at the moment). Each manufacturer aspires to create a base Os to globalize and standardize application development, distribution and administration (as they say) to form applications for all but not for each inescapable device. Some habitancy welcome such chance and some are bothered by inherent monopolization and subsequent abuses in this domain. What is observed at the moment that each of the manufacturers had occupied a inescapable characteristic niche, where he is successful, and already from there with mixed success tries to "conquer" the mobile wireless world.

Experts' Area

Alexei Golovashov, Senior Qa Engineer, Qarea Group:

"BlackBerry? One of its main advantages is an industrialized ergonomics both of the device itself and its software. The user interface, as of today, I suppose, is one of the best among industrialized for Pda devices. While its main disadvantage is absence of memory card. Absence of the latter means that it can not be used for other purposes, it is narrow directed. I use my Symbian as Mp3 player and to watch movies. I will not be able to use BlackBerry for that even if I want to. BlackBerry is favorable only for business domain, I guess, while Symbian also can be used as a game platform, and its a rather needful part of users who use it that way. Brew, from my point of view, has no piquant hereafter at all. J2Me is that well-developed that nobody pays attentiveness to Brew. Furthermore, all Brew applications are to be certified, that complicates their usage and distribution," - says Alexei Golovashov, Qarea's Senior Qa Engineer.

What then

The whole world, and wireless shop in particular, moves toward high speeds, multiple functions and extended business possibilities. 3G networks is the next inescapable stage of mobile shop development. It provides abundance of capabilities both for business and entertainment, transportation and data transfer, Internet passage and mobile e-mailing. Most of 3G devices should join all available 3G technologies to be competitive. This factor will also affect the development of devices and operating systems for them. As we can see, the mobile shop requires a device that could fullest relate the capabilities of next generation mobile networks 3G and 4G. These numbers are dramatic confirmation of 3G important position: 173 industrial 3G Operators in 75 Countries worldwide (as of February 02, 2006), over 228 million reported 3G Cdma subscribers (as of November 30, 2005), 826 models of 3G devices worldwide. The commerce standard for 3G wireless networks consists of 5 operating modes - three of them are based on Cdma technology: Cdma2000, Wcdma (Umts) and Td-Scdma. In this light Brew Os has a great chance to become a leader, though Nokia 6680 under Symbian Os is a 3G world bestseller telephone. The services by 3G carriers are quite actual already - 80% of British mobile users are ready to pay for mobile Tv service, nothing to say about Gps, high-speed packet data passage and high capability voice services.

Still large companies, financial giants, transnational corporations and government institutions bind to the tried technologies - they use BlackBerry - undisputed leader in business mobile solutions for mobile professionals and seek no alternative for it. However, if You still want an alternative for You BlackBerry You should be set for paying a pretty penny of some 0 for a new device and a new association and it is not easy at all to find an equal substitution.

And let us don't forget that more players like Windows mobile Os and Linux Os are on their way and hit their stride.
Table yearly global sales gain and shop share of each Os
Note Brew Os is not included in the table


Os vendor 2004 % share 2005 % share
Symbian 14,365,850 61.2% 34,000,000 53,27
Linux 6,380,160 27.2% 9,300,000 14,57
Palm Source 1,210,090 5.2% 2,200,000 3,45
Microsoft 1,119,610 4.8% 14,000,000 21,94
Rim 135,180 0.6% 4,000,000 6,27
Others 277,520 1.2% 322,000 0,5
Total 23,488,410 63,822,000

Undoubtedly, there's still a long way to go: Symbian powered nearly 34 million devices last year, more than duplicate what Microsoft was able to ship, but the gap is narrowing.

Microsoft is making ready their new mobile operating principles Crossbow which is to replace Windows mobile 5.0 launched in May 2005. Crossbow will have both Push Email and built in Internet Pager, thus Crossbow will provoke competition to BlackBerry Os. Microsoft aspires to get over Symbian and Bb at a time and we know how this ordinarily results. New product will take time to be tested to make sure it runs smoothly in operator's networks. After all, will operators agree to update their software and servers for new applications to run properly?

Ms in case,granted an enough tool set for the developers to form software for their platform. In many ways they are helping to open up software innovation on devices. While developers for Symbian Os quite often complain of its being bad documented and too many Os versions. Microsoft's long heritage includes an insight of the Developer and providing Developers tools. Symbian is a newcomer. Still, we shouldn't forget about the power of open source: Why would a Developer want to restrict themselves into a platform with a possession software code? Some experts think that just the developer withhold is going to be key in who wins in the consumer shop place.

Much also depends on marketing and promotion: Symbian's operating principles is used in many top-end business phones today, because of its withhold for features such as Pim, voice-conferencing, push email and Web access. Nokia phone stands for world recognized brand and image phone - and it does pay dividends. To have Nokia's smartphone is approximately the same as to drive Mercedes.

The inherent of growing markets should also be considered: the examine for mobile phones in India, China, Eastern Europe and Africa is not a new phenomenon. Just in time enter a growing shop and you can lead the race (Industry analysts forecast that 80% of the next billion mobile phone customers will come from emerging markets).

This is a niche market, all around. We say Europe - we mean Symbian, we say Usa - we mean Windows Mobile, BlackBerry and Brew. Brew - is dinky to Cdma markets (Us and Chinese markets), Blackberry - is closely tied to business and corporate clients, Symbian is prevailing mainly in Europe: it turns out they have nothing to "brew". I hope none of them comes to dominate, since that is a recipe for stagnation; the 3 equally balanced would be excellent for fair competition and product development. We can not furnish enough predictions for someone's success or failure. It will be just a forecast.

All is left is to guess who to place stake on ...
http://www.qarea.com

my review here Can Symbian Brew Blackberry? my review here