Future trends in Cloud Computing (IaaS, PaaS, SaaS, Storage & Internal Clouds)


iStock_000018660718Medium_cropCloud computing continues to gain more mainstream adoption as more companies move into the cloud. This article focuses on where the cloud space stands in the market and the future driving trends in these five specific areas: Infrastructure as a Service, Platform as a Service, Software as a Service, Cloud Storage and Private/Internal Clouds.

Commodity Infrastructure as a Service

IaaS

 

Infrastructure as a Service (IaaS) is what most IT professionals think about when they talk about the cloud. IaaS is also referred as Cloud Infrastructure service and is considered as the core of cloud computing.

Forrester, an analyst firm predicts it will generate greater revenue potential which can clearly be seen from Amazon Web Services, the undisputed commodity IaaS revenue leader. An estimate of the revenue development of Amazon Web Services cloud computing and hosting solutions from 2012 until 2015 is 2 in 2012, 3.8 in 2013, 6.2 in 2014, and 8.8 in 2015 (in billions). AWS reveals that its S3 storage service hosts doubled as it now hosts more than 262 billion objects.

Rackspace, the second largest commodity IaaS provider also reveals an increase in its revenue. With its Cloud Servers and Cloud Files, they reported an 18.1 percent increase from $31.4 million to $37.1 million for the first quarter of 2011. In recent months, investors have gotten less optimistic about Rackspace earnings, cutting 20% from their first-quarter estimates and 10% to 15% from their full-year 2014 and 2015 projections. The stock has plunged, falling 29% since early February.

Both AWS and Rackspace’s rapid revenue growth can be credited from the growing usage of the IaaS. Despite this reported growth, some are still reluctant to consider commodity IaaS for mission-critical applications in the cloud. A recent survey showed that 52 percent responded that security concerns are holding them back from using the cloud.

Large organizations rely on commodity IaaS for testing and developing new applications, and for hosting applications that are less-critical, while small businesses use it for mission-critical applications.

Future Trend

Commodity IaaS will continue to shape up and take on more enterprise workloads. Enterprise-focused clouds will look to further specialize their offerings. Survey respondents cited the need for more insights from operational data and more control. Cloud users and providers cited “analytics” and “automation” as a service they’d like to have.

Enterprise IaaS

Providing on-demand access to computing and storage resources is the main focus of Enterprise IaaS clouds. One difference between the two is the difficulty to distinguish enterprise IaaS adoption rates and market size from those of commodity IaaS. Enterprise IaaS clouds don’t need to attract a number of users as they are dealing mostly with revenues from larger deals.

iaas_categories_hitechSource

Even though adoption rates and market size can be hard to distinguish at Enterprise IaaS, it is still doing fine among its target audience.  Instead of taking the scale-out approach of commodity IaaS, enterprise IaaS providers build their clouds using high-end gear.

One of trend in Enterprise IaaS is running VMware at the hypervisor layer. This aims to capitalize the frequency of VMware within many corporate data centers. A survey of IT executives shows that hybrid cloud as the top priority. Through this, organizations won’t commit entirely to public cloud resources and private cloud resources as they can use either model.

Future Trend

On top of the core enterprise IaaS platform, the entrance of IBM into the enterprise IaaS adds diverse services. This includes tools to enable dynamic application development to advanced analytics services. As part of IBM’s SmartCloud offering, it has promised Hadoop processing service in addition to its existing WebSphere and Cognos services.

For enterprise IaaS providers, one challenge would be to harden their clouds for enterprise applications. In order to attract more enterprise developers, they have to loosen access to their platforms. The hybrid model for IaaS developers could be another option.


Platform as a Service (PaaS)

whatisthecloudpaasIn PaaS, the operating system and application platform, for the most part, are abstracted away from the user (Java or web developer). I say “for the most part” because aspects of the application platform, such as language version or framework, certainly matter to the developer but underlying aspects of the platform that aren’t exposed in the form of APIs, programmatic interfaces, or language features don’t.

One of the greatest benefits of a PaaS is its ability to create a bright line between what’s “operations” and what’s “development”. In other words, what’s “yours” and what’s “theirs”.

Things get complicated and expensive when that line blurs: developers demand tweaks to kernel settings, particular hardware, etc. which fly in the face of any standardization or automation effort. Operations, on the other hand, creates inflexible rules for development platforms that prevent developers from doing their jobs. PaaS decouples these two, and permits each group to do what they’re good at.

paas-model

If you’ve outsourced your operations or development, this problem gets worse because any idiosyncrasies on the ops or the development side create friction when sourcing work to alternate vendors.

By using a PaaS, you make it perfectly clear who’s responsible for what: above the PaaS line, developers can do whatever they like in the context of the PaaS platform, and it will automatically comply with operations standards. Below the line, operations can implement whatever they like, choose whatever vendors they like, as long as they’re delivering a functional PaaS environment.

We spend a lot of time talking about why PaaS is great for developers. I think it’s even better for procurements, architecture, and budget.

The huge financial investment that PaaS gained in the past years proved that is continues to gain popularity. Everyone needs a service that promises to fundamentally alter the way applications are developed, deployed and managed.  Still, it remains to be dependent on individual developers, web startups and enterprise developers. Developers are flocking to Paas for their enterprise applications.

Microsoft’s Windows Azure platform is at the center of its cloud efforts that has attracted a number of customers. Among them are Toyota, the Associated Press and Intuit.

On the first half of 2011, PaaS providers address the concern about lack of control and lack of choice. Based from the survey, “Complexity” is the major issue that PaaS seeks to eliminate; followed by Interoperability” and “Lock-in.”

Future Trend

The convergence of these trends – the investments by large vendors, the advances in control and choice, and the increasing popularity of web and mobile applications – are the biggest drivers of PaaS adoption.

Microsoft’s success with Windows Azure suggests the possibility of success for VMware, Red Hat and Salesforce.com as they continue to use PaaS application platforms.

It is also interesting to see Google App Engine as PaaS adoption picks up. Google promises more features will make their way into the standard App Engine.


 Software as Service

SecureAuth_For_SaaS-v1

In terms of users and revenues, Software as a Service, has the biggest share. Software and services on demand debuted in fourth place on the National Association of State Chief Information Officers (NASCIO) 2010 list of top 10 policy and technology priorities for CIOs.

One good example is the CRM service of Salesforce.com’s multi-billion dollar business. SAP and Oracle are also embracing SaaS for their heavy-duty applications.

Some reported that SaaS has inspired Everything as a Service, where any IT process or application or business function is available as a service.  Gartner estimated SaaS to reach $10.7 billion in 2011. Another analyst firm, IDC, predicts a $72.9 billion cloud services market by 2015.

GigOM’s survey reveals that 61 percent derive their revenues primarily from SaaS subscription fees; and 74 percent identified a SaaS offering as the cloud computing services they are using.

Business strategy and customer expectation

CxOs (CEO, COO, CFO, CIO, CTO, and so on) want to improve their business processes and to have more profitable operations. Their expectations for cloud computing are:

  • Business process standardization, which is matured at the global level
  • Total cost of ownership (TCO) reduction (effect of standardization, sharing and automation)
  • Risk mitigation of entrance of new markets

CxOs want to increase their revenue from the international business area. In this case, the SaaS vendors have already been able to service the global area, and have standardized the business processes within the industry of their target business area. Furthermore, their industry frequently increases alliances with many companies. The international industry standards become complex business processes because alliances increase. Customers cannot modify the IT system themselves without the help from the SaaS vendor.  Also, they expect the TCO reduction by third-party IT management. Customers want to both minimize the risk of entrance into new markets, with agility, and also have easy withdrawal.

Microsoft offers a variety of outstanding SaaS services to address the customer needs. Microsoft Business Productivity Online Suite delivers a suite of services for hosted communication and collaboration.
Dedicated cloud offerings for organizations can deliver integrated communications with high availability, comprehensive security, and simplified IT management. Microsoft Exchange Online delivers your email with protection, plus calendar and contacts. Microsoft SharePoint Online creates a highly secure, central location for collaboration, content, and workflow. Microsoft Office Communications Online provides real-time, person-to-person communication with text, voice, and video, across agencies. Microsoft Office Live Meeting delivers hosted web conferencing. Microsoft Exchange Hosted Services are attached services that include filtering, archiving, encryption, and continuity. Microsoft Dynamics CRM Online, with minimal configuration, offers constituent relationship management (CRM) and other extended CRM solutions to help you automate workflow and centralize information. Windows Live services help developers connect their applications, experiences, and customers to more than 500 million Windows Live users.

 

Future Trend

Aside from the endless emergence of new applications, SaaS will focus on integration of data and services. This integration could prove to be a valuable offering that will address the growing number of cloud services.

Most survey results reveal that users of multiple SaaS applications plan to increase their usage over time; which is both a challenge and an opportunity for data-integration vendors.

As SaaS use grows, data virtualization can pick up its momentum by incorporating data from mobile devices and other end-user derived sources. SaaS providers must also find ways to work tightly in integrating data among applications.


 Cloud Storage

storage_img01

 

Take control of your files and apps by using unlimited cloud storage. You can access your corporate information anywhere and from any device.

Cloud storage is defined as the independent storage services in the cloud and is the most widely deployed cloud services.  It is currently being used to backup data, although it also serves as primary file- or content-storage options for web applications, like for Amazon’s Simple Storage Service (S3).

Cloud storage is risk-free as data is already stored elsewhere without the need to be accessed by production applications. However, it is not really good at primary storage as it needs high levels of features, network performance and availability

There are many companies making a name in primary cloud storage. Few of them are, Microsoft SkyDrive (SkyDrive’s upload from PC option includes two-factor authentication to make it safer.) Amazon Cloud Drive, Apple iCloud, Box, Dropbox, Google Drive, MediaFire, Mega, SpiderOak, and Ubuntu One

It uses a virtual gateway to route files securely and reliably to cloud storage infrastructure from a number of providers.

Looking forward

The innovation on cloud storage will focus on primary storage for enterprise applications in the cloud. As vendors such as HP and Dell have storage businesses and public clouds, they could benefit from leveraging their storage expertise to make primary cloud storage a reality.

However, companies deciding for primary cloud storage must innovate on data-transport front. It won’t be attractive for customers if they rely only on the public Internet for uploading and downloading primary data.

Cloud storage providers will also push for new privacy regulations.


 Private Cloud

 

Print

A private cloud is a particular model of cloud computing that involves a distinct and secure cloud based environment in which only the specified client can operate. As with other cloud models, private clouds will provide computing power as a service within a virtualised environment using an underlying pool of physical computing resource. However, under the private cloud model, the cloud (the pool of resource) is only accessible by a single organisation providing greater control and privacy.

cloud-big Private cloud is considered as the delivery model choice of large enterprises and other risk-averse businesses. GigaOM survey reveals 63 percent of respondents utilize private clouds or hybrid clouds as the focus of their cloud strategies. More traditional businesses are also emerging as private-cloud customers.

Over the past years, these four most-prominent private cloud startups – Nimbula, Eucalyptus Systems, Cloud.com and Abiquo – have raise a combined total of $73 million.

It has been noted that there are 2 interesting trends taking place – the advent of PaaS software designed to run on private clouds, and the OpenStack.

Future Trend

Private clouds are here to stay whether as a whole or part of a hybrid cloud environment.  For private cloud vendors, choosing to rely on their partners or building their own features will be a big decision.


Future

Two major trends can be expected in the coming years – advanced hybrid cloud capabilities, and a wave of innovation around higher-level features and specialized functions.

At the end companies with a good balance of centralized and ambient will be the winners in their respective industries because they will be able to lower the cost of their infrastructure and make it faster at the same time. Microsoft, the owner of the distributed desktop OS, is racing towards centralized clouds with Azure, while Google, the king of centralized, is racing towards ambient with Chrome and Android, for instance.

The companies that achieve the right balance of centralized vs. ambient clouds are the ones that will emerge as winners as the young cloud computing industry matures.microsoft-cloud-strategy

As for Windows Azure Infrastructure Services, the goal is to provide customers with scalable on-demand virtual infrastructure so organizations can extend their data centers to the cloud in a secure manner. According to Bill Hilf, Microsoft general manager of Product Management for its cloud computing platform, the new services are about providing IaaS and PaaS, as well as “hybrid cloud scenarios.”

MSFT Cloud Scale

url

Microsoft, AWS, and Google  and some of the other cloud players are already at such a scale that small increases in performance or small reductions in cost can make a huge difference in profitability. Ambient clouds that are the most cost effective, and in many cases the best performing. No matter which cloud provider ends up on top, every cloud-connected device you touch is a part of dozens of clouds. It’s up to you to decide which ones.

Advertisements
Image

Apple’s Latest Product Lineup 2014


Apple is set to release a slew of new products during the third quarter of 2014 according to KGI securities analyst Ming Chi Kuo, who often provides reliable information on Apple’s product lineup.

In a 2014 product roadmap, Kuo suggests Apple will introduce its first new product of the year, a lower-cost iMac, during the second quarter. Soon after, during the third quarter, Kuo predicts Apple will introduce an upgraded iPad Air and iPad mini, followed by an iWatch in two separate sizes, and a 4.7-inch iPhone.

Apple-2014_roadmap
An upgraded Apple TV set-top box will come somewhat later, as will the rumored 12-inch ultra slim MacBook and upgraded Retina MacBook Pros. Later, in the fourth quarter, Apple will introduce the 5.5-inch iPhone, which is said to be delayed due to issues with in-cell display technology. Along with his roadmap, Kuo also gives specific information on each of Apple’s upcoming products.

iWatch

iwatch_concept_apple_2014
iWatch: Kuo believes the iWatch will ship during the end of the third quarter, offering biometric functionality, integration with the iPhone, iPad, and Mac, and a “fashionable appearance.” As has been previously suggested, he predicts the device will come in two sizes, with a 1.3-inch and 1.5-inch flexible AMOLED display. It will also include a sapphire cover lens, biometric recognition, an NFC chip, wireless charging, a 200 to 250 mAh battery, and a slim and light design. Kuo also believes that Apple will offer the iWatch at multiple price points, with the most expensive version costing upwards of $1,000.


iPhone 6

apple-iphone6
iPhone 6: Supporting previous iPhone 6 rumors, Kuo believes the device will come in two sizes: 4.7 and 5.5-inches, with resolutions of 1334×750 (326ppi) and 1920 x 1080 (401 ppi), respectively. Both models will come with an A8 processor, 1GB of RAM, LTPS display panels, optical image stabilization, and Touch ID. Kuo points to a 10 to 20 percent narrower bezel, a 6.5–7.0mm thickness, metal casings, and NFC integration. Mass shipments of the 4.7-inch version are expected in September, with the 5.5-inch version shipping later. Kuo suggests that only the 64GB 5.5-inch version will use sapphire displays.


iPad Air 2

iPad_Air_2
iPad Air 2: The second-generation iPad Air is expected to adopt Touch ID, an A8 processor, and an improved camera with a resolution of eight megapixels. Kuo believes the second iPad Air could come earlier in the year than the previous iPad Air, which was released in October.


iPad mini with Retina Display

ipad-mini-retina-iphone-5s-2
iPad mini with Retina Display: Like the iPad Air, a new Retina mini could gain an A8 processor and Touch ID, but Kuo believes it will retain the same form factor. He also suggests that the older iPad mini with Retina display could be sold at a lower cost.


 12.9-inch iPad Pro

iPad pro
12.9-inch iPad Pro: Kuo believes that Apple is indeed working on a 12.9-inch iPad, but he does not expect it to be launched in 2014.


 12-inch MacBook Air

12 inch macbook air

12-inch MacBook Air: As rumored, Apple is believed to be preparing an ultrathin MacBook Air that incorporates a touchpad without buttons and functions without a fan. It is also expected to include a higher-resolution display.


 iMac for Mid Market

imac 2014

iMac: A lower-priced iMac is believed to be on the horizon, which Kuo says could help boost iMac shipments by up to 23 percent. It could be Apple’s first product launch of the year.


 Apple iTV

Apple iTV

Apple TV: Apple is not expected to launch a full television set this year, but an upgraded set top box with an App Store and motion control technology is expected.

While Kuo’s predictions do include many rumors that have previously surfaced over the past several months from a variety of sources, his roadmap gives a solid overview of what we might expect from Apple in 2014.  We don’t know much about Kuo. He’s not an analyst that appears on TV, or sends out his reports to dozens of reporters. His firm, KGI Securities, is based in Taiwan.

Harmful Oral and Skin Care Ingredients – Touch Me Not List


mup

This is a list of carcinogenic ingredients found in our personal care, make up and skin care.  If you see any one of these ingredients on the list, Be Smart!  Do your homework!  A label reading ” Natural or/and Organic, doesn’t mean it is safe from toxic chemicals!

The following are all harmful ingredients that many companies put in their Oral, skin and hair care products (and cosmetics). We recommend that you do NOT use products containing any of the following ingredients:

* Mineral Oil
* Petrolatum (Petroleum Jelly)
* Sodium Lauryl (Laureth) Sulfate
* Alcohol
* Propylene Glycol (PG) / Sorbital
* Polyethylene Glycol (PEG)
* Calamine
* Ascorbic Acid
* Parabens (Methyl, Propyl, Butyl and Ethyl Parabens)
* Imidazolidinyl Urea, Diazolidinyl Urea and/or DMDM Hydantoin
* Diethanolamine (DEA), Triethanolamine (TEA) and/or Monoethanolamine (MEA)
* Artificial (Synthetic) Colors
* Fragrances
* Lanolin
* Talc / Talcum Powder
* Glycerin
* Aluminum
* Isopropyl Palmitate, Acetylated Lanolin, Carmine and Pentahydrosqualene

* Mineral Oil is a petroleum derrived preservative and is the chief cause of that greasy after-feel on the skin. A liquid mixture of hydrocarbons obtained from petroleum, mineral oil can attract dirt and causes blackheads and eruptions. It can accelerate free radical damage, thus speeding up the aging process, because it causes toxins to build up in the skin.

Mineral Oil is an extremely cheap ingredient (much cheaper than any natural oil) and is colourless and odorless, it is used in many skin care products to fill up space in a bottle and to make the shelf life last between 3-5 years. It has no proven benefit to the skin whatsoever.

Mineral oil can not be absorbed by the skin therefore leaving mineral oil in the pores which retards the absorption of emollient (moisture) creams. To add insult to injury, mineral oil is not water soluble so it cannot be rinsed off. It sits on the skin, drying your skin out and clogging the pores, causing acne. Instead of penetrating the skin, Mineral Oil coats and wraps your skin like plastic wrap. Your skin literally suffocates because oxygen can’t penetrate it and it can’t breathe, therefore, it starts to die and/or age prematurely.

* Petrolatum (Petroleum Jelly) is a grease made from petroleum. It is used in industry as a grease component. Manufacturers use petrolatum because it is unbelievably cheap. Petrolatum exhibits many of the same potentially harmful properties as mineral oil. While attempting to hold moisture in your skin, it traps the toxins and wastes that are inside your skin’s layers. Your skin smothers and can’t breathe, which leads to prematurely aged skin. You are using a product that creates the very problem that you are attempting to alleviate.

* Sodium Lauryl (Laureth) Sulfate is a harsh detergent found mainly in products that “foam.” Research has shown that Sodium Lauryl Sulfate may be one of the most dangerous ingredients found in personal care products. It is used in industrial engine degreasers, garage floor cleaners, water softeners, and auto cleaning products, as well as many skin and hair care products. It is often disguised in so-called “Natural” products as (in parenthesis) as a coconut derivative.

It is considered to be a potent irritant, and is the standard irritancy substance used (meaning it is assumed it will net an irritated reaction) to measure and compare the irritancy potential of other ingredients. Because it’s such a strong and efficient degreaser, Sodium Lauryl Sulfate dries the skin and hair. It strips your skin and hair of its natural oils. It may even damage the immune system causing the layers of your skin to inflame and separate. Sodium Lauryl Sulfate has been linked to eye damage, intestinal damage, breathing problems, skin spots, and cysts. It can cause cataracts in adults and prevent children’s eyes from developing properly.

Every wonder why more women are getting male pattern baldness these days? According to the Journal of American College of Toxicology, Sodium Lauryl Sulfate corrodes and damages the hair follicles. It can actually cause your hair to fall out!

After exposure, Sodium Lauryl Sulfate can stay in your body for up to 7 days. It penetrates easily into your skin and then lingers around in your heart, liver, lungs, and brain. In fact, according to the American Academy of Dermatology (www.aad.org), these surfactant molecules stay on your skin long after you think you’ve washed them off and as they sit there, they literally strip-away fatty acids, moisture and amino acids from your hair and skin.

* Alcohol is another cheap ingredient and is very drying and potentially irritating to the skin. Alcohol strips natural moisture from the skin and can contribute to the formation of premature wrinkles. If you swallow or inhale Isopropyl Alcohol, it may cause headaches, dizziness, nausea, vomiting, coughing, wheezing, abdominal pain, mental depression, hallucinations, narcosis, and coma. The fatal ingested dose is about one fluid ounce.

* Propylene Glycol (PG) / Sorbital, which are commonly used in moisturizers as humectants, should be avoided. Chemically derived from alcohol, Propylene Glycol binds repels moisture from the skin, therefore the skin ends up not receiving any benefit at all from the moisturizer.

Propylene Glycol is the main active ingredient in anti-freeze. There is no difference between the Propylene Glycol used in anti-freeze and the Propylene Glycol used in personal care products. It can also be found in brake fluid and hydraulic fluid.

The Material Safety Data Sheet (MSDS) warns companies who put Propylene Glycol into their products that it:
o May cause skin and eye irritation
o May be harmful if inhaled or ingested
o Can cause nausea, vomiting, headaches, gastrointestinal disturbances, and depression
o Can inhibit skin cell growth. This means that your cells will not be able to reproduce normally. If your body cannot make new cells, then the cells will get old and wrinkled. Did you know that some wrinkle creams can make you look older, rather than younger? Propylene Glycol may be the reason.
o Can damage the skin and muscle tissue. Propylene Glycol is a chemical used in food processing. The Environmental Protection Agency (EPA) requires food workers to wear protective gloves, clothing, and goggles when working with Propylene Glycol. This is because Propylene Glycol quickly penetrates into your skin.
o And Propylene Glycol is linked to Contact Dermatitis, Liver and Brain Abnormalities, and Kidney Damage

* Polyethylene Glycol (PEG) is used in cleansers to dissolve oil and grease, as well as to thicken products. Because of its effectiveness, PEGs are often used in caustic spray-on oven cleansers. PEGs can destroy the natural functioning of your skin which help keep it soft and moist. And what’s worse, products with Polyethylene Glycol are likely to be contaminated with 1,4-dioxane, a carcinogen (cancer causing chemical). Studies show that dioxane easily penetrates into your skin.

* Calamine contains about 5% Zinc Oxide (which can clog pores) and a good deal of Phenol, which is extremely toxic to skin. In 1992, the FDA actually tried banning calamine altogether, but that didn’t happen.

* Ascorbic Acid is considered to be the most irritating and least stable of any of the forms of vitamin C. Because it deteriorates so easily, it can quickly lose it’s effectiveness in Vitamin C creams and just become and irritant. Sensitive skins especially should avoid this ingredient.

* Parabens (Methyl, Propyl, Butyl and Ethyl Parabens) an be found in almost all of your personal care products. They are the most commonly used preservatives in the United States. The sole purpose of preservatives in cosmetics is not to protect you from bacteria, but to protect and extend the shelf life of the cosmetic. Parabens have caused many allergic reactions, skin rashes, and are known to be highly toxic. They can also have an estrogenic or feminizing affect on your body, meaning it can make men more feminine.

In the book Organic Beauty by Josephine Fairley states that “concern is raised over parabens in skin care products absorbed throught the skin of pregnant women. Research has shown that they may affect the future fertility of male babies. Professor John Sumpter or Brunel University, England – and expert on estrogenic chemicals in the environment – believes the result could be significant, because over the last few decades, paraben use has been very widespread in the cosmetic industry. The chemical preservatives might just play a role in falling sperm counts and rising breast cancer rates.”

* Imidazolidinyl Urea, Diazolidinyl Urea and/or DMDM Hydantoin are the most commonly used cosmetic preservatives after the Parabens. They are just three of the many preservatives that release formaldehyde. Nearly all brands of skin, body and hair care products, antiperspirants, and nail polish found in stores contain formaldehyde releasing ingredients. According to the Mayo Clinic, formaldehyde can irritate the respiratory system, cause skin irritations, and trigger heart palpitations. Exposure to formaldehyde releasing products may also cause allergies, nose congestion, nausea, headaches, dizziness, ear infections, chronic fatigue, depression, asthma, chest pains, and loss of sleep. But more seriously, formaldehyde is toxic to the immune system, a human mutagen, and is carcinogenic.

* Diethanolamine (DEA), Triethanolamine (TEA) and/or Monoethanolamine (MEA) are usually listed on ingredient labels with the compound being neutralized. So look for names like Cocamide DEA or MEA, Lauramide DEA, TEA Sodium Lauryl Sulfate, etc. Neither DEA nor TEA is carcinogenic. However, if products contain nitrites (as a preservative or contaminant), chemical reactions can occur as products are sitting on the store shelves. This reaction leads to the formation of nitrosamines, which are carcinogenic. Large amounts of nitrates may enter your bloodstream after just one shampooing. The FDA did two studies showing that 27 out of 29 cosmetics contained high levels of Nitroso-Diethanolamine. “Repeated skin applications have resulted in a major increase in liver and kidney cancers,” states Dr. Samuel Epstein of the National Toxicology Program.

* Artificial (Synthetic) Colors will be labeled FD&C (Food, Drug or Cosmetics) or D&C (Drugs or Cosmetics). This designation will be followed by a color and then a number. Some examples are FD&C Red No. 6, D&C Green No. 6, or FD&C Blue No. 1. Is your shampoo blue or green? If it is, you can bet on it that it contains a coal tar color. Artificial Colors are made from coal tar, a coal derivative. There is a great deal of controversy about the use of coal tars. Almost all of the coal tar colors cause cancer. Some artificial colors even contain heavy metal impurities such as arsenic and lead. Both of these metals are carcinogens.

* Fragrances are the number one common cause of allergies and irritant reactions to cosmetics. The FDA does not require manufacturers to list the ingredients of a “fragrance.” When you see the word “fragrance,” it can have as many as 4,000 separate chemicals. Some problems you may experience when exposed to these chemicals may be: headaches, dizziness, nausea, vomiting, fatigue, forgetfulness, irritability, hyperactivity, visual problems, clumsiness, watery eyes, stuffy nose, skin rash, skin discoloration, depression, mood changes, inability to concentrate, and sleep problems. Remember that a product labeled “unscented” may in fact contain a fragrance to mask other chemical odors. A product must be marked “fragrance-free” or “without perfume” to indicate nothing has been added to make it smell good. Some fragrance reactions occur only when the skin is exposed to sunlight.

Because the FDA does not require manufacturers to list hazardous chemicals in their fragrances, you have no way of knowing whether it contains carcinogens. For example, methylene chloride is one of the most common “fragrance” ingredients and is a confirmed carcinogen.

* Lanolin, an animal by-product, is made from the fatty secretions from sheep’s wool. Lanolin is not used in its pure from because of its allergy causing potential. Nonetheless, cosmetic grade lanolin may be contaminated with carcinogenic pesticides such as dieldrin, lindane, and DDT. The FDA recognizes that the contamination of lanolin in skin care products is a problem. Pesticides are likely to migrate through your skin into your bloodstream to do their damage.

* Talc / Talcum Powder causes cancer in laboratory animals and using it in the female genital area increases your chance of ovarian cancer. Talc enters the reproductive tract if used this way. And inhaling talc may be harmful too. Never use talc on babies. Not only is it a possible carcinogen, but inhaling it may cause acute respiratory distress and result in death.

* Glycerin is synthetically made from propylene alcohol or naturally from vegetable oils. Unless the humidity of the air is over 65%, glycerin will draw moisture from the lower layers of your skin and hold it on the surface. Glycerin dries your skin from the inside out. It is also a human mutagen.

* Aluminum has been linked to Alzheimer’s Disease. Since your body has no useful purpose for aluminum, it considers it a toxin. Studies show that regular use of products with aluminum compounds can increase your risk of Alzheimer’s by 300%!

* Finally, watch out for: Isopropyl Palmitate and Acetylated Lanolin, which are both known for clogging pores. Carmine and Pentahydrosqualene are insect shells and shark liver oil, respectively.

Every morning are you putting chemicals, toxics, additives, detergents and sweeteners in your mouth?


timthumb

My family is using this green and natural tooth paste since past 6 month and we are seeing drastic positive changes in our oral hygiene. I have suggested this paste to my friends and family members, and feedbacks are positive. After doing thoughtful research (online and offline) I found mentioned below information which might be of your interest:-

Most Off-the-shelf toothpastes contain a laundry list of chemicals, toxic additives, detergents and even sweeteners. Warning labels on toothpaste say “Keep out of reach of children under the age of six”. The same warning shows up on baby toothpaste, and they don’t even have the ability to spit it out like older children do.

 SkullIngredient #1: Propylene glycol. This is a solvent that is the main component in antifreeze and is used in toothpaste and mouthwash. 45% of propylene glycol produced is used as chemical feedstock for the production of unsaturated polyester resins. In this regard, propylene glycol reacts with a mixture of unsaturated maleic anhydride and isophthalic acid to give a copolymer. This partially unsaturated polymer undergoes further crosslinking to yield thermoset plastics. Related to this application, propylene glycol reacts with propylene oxide to give oligomers and polymers that are used to produce polyurethanes.

Research has suggested that individuals who cannot tolerate propylene glycol probably experience a special form of irritation, but that they only rarely develop allergic contact dermatitis. Other investigators believe that the incidence of allergic contact dermatitis to propylene glycol may be greater than 2% in patients with eczema.

Patients with vulvodynia and interstitial cystitis may be especially sensitive to propylene glycol. Women suffering with yeast infections may also notice that some OTC creams can cause intense burning. Post menopausal women who require the use of an estrogen cream may notice that brand name creams made with propylene glycol often create extreme, uncomfortable burning along the vulva and perianal area.

A Swedish study published in 2010 strongly suggests a connection between airborne concentrations of propylene glycol in houses and development of asthma and allergic reactions, such as rhinitis, in children. Read More: A Guide to Glycols – http://bit.ly/11J8RaY

 SkullIngredient #2: Fluoride. Fluoride is a toxic chemical that can be potentially toxic if ingested in high quantities, so why would anybody want to ingest it in small quantities? Fluoride has also shown to create gum pockets. Just one tube of toothpaste contains enough fluoride to kill a small child. Poison control must be called if a child eats more toothpaste then what he can put on his brush.

Skull Ingredient #3: Sodium Lauryl Sulfate: This is a cleaning agent that creates lather and is mostly used in soaps and detergents however it is also in toothpaste. While it is not considered toxic by the FDA it is known to cause microscopic tears in our mouth that lead to canker sores as well as disrupting the protein in cells causing the membranes to absorb the chemical into the blood stream.

Skull Ingredient #4: Chlorine Titanium dioxide: this is an industrial bleach used for making your toothpaste white. Titanium dioxide is incompatible with strong reducing agents and strong acids.Violent or incandescent reactions occur with molten metals that are very electropositive, e.g. aluminium, calcium, magnesium, potassium, sodium, zinc and lithium. Titanium dioxide accounts for 70% of the total production volume of pigments worldwide. It is widely used to provide whiteness and opacity to products such as paints, plastics, papers, inks, foods, and toothpastes. It is also used in cosmetic and skin care products, and it is present in almost every sunblock, where it helps protect the skin from ultraviolet light. Many sunscreens use nanoparticle titanium dioxide (along with nanoparticle zinc oxide) which, despite reports of potential health risks, is not actually absorbed through the skin.Other effects of titanium dioxide nanoparticles on human health are not well understood.Nevertheless, allergy to topical application has been confirmed. Read More: http://bit.ly/kh1279

Skull Ingredient #5: Glycerin – Vegetable based glycerin is the base for many liquid soaps and on the body isn’t as much as a problem, however, in the mouth, glycerin creates a coat or film that won’t rinse away. Many natural dentists say this glycerin film on teeth can prevent the teeth from being able to remineralize thereby weakening the teeth.

earthpaste

What makes this earth paste different?

Earthpaste delivers all the benefits you expect from toothpaste without any chemicals or unnatural additives. You’ll see the difference on your and feel the difference in your mouth from the first use.

  1. No fluoride
  2. No propylene glycol
  3. No sodium lauryl sulfate
  4. No chlorine dioxide
  5. No glycerine

Ingredients used:

healthy Xylitol – used to help flavour the paste but it also helps to prevent tooth decay. Health Benefit of Xylitol: http://en.wikipedia.org/wiki/Xylitol#Health_benefits
Food grade Redmond Clay – a non-abrasive polishing cleanser with antibacterial properties that has been used for centuries to promote health.
Sea Salt – enhances the flavor and also lends to the antibacterial properties associated with salt
Tea Tree Oil – a natural essential oil with anti-viral, anti-fungal properties.
Peppermint, Menthol, Cinnamon – essential oils used for flavouring and also promote fresh breath and a healthy immune system.

This toothpaste always leaves your mouth and gums feeling tingly and fresh. You can eat the whole tub and won’t need to call poison control! Use it on your children and feel rest assured that you are not causing any harm.

earthpaste-info

Facts and Information:-

  1. What is toothpaste MADE of? http://totalhealthmagazine.com/articles/dental-health/what-is-toothpaste-made-of.html
  2. Health Warning – Fluoride Toothpaste Dangerous – Facts Analysis – http://www.hoaxorfact.com/Health/health-warning-fluoride-toothpaste-dangerous.html
  3. Top 10 Dangers of Fluoride http://www.cheeseslave.com/top-10-dangers-of-fluoride/
  4. The Dangers of Fluoride in Toothpaste? – http://undergroundscience.blogspot.ca/2006/06/dangers-of-fluoride-in-toothpaste.html
  5. Dangers of Fluoride in Toothpaste and Water – http://www.globalhealingcenter.com/health-hazards-to-know-about/where-the-yellow-went
  6. Use of Fluoride in drinking water and toothpaste is causing dental fluorosis. what is Dental fluorosis? –  http://en.wikipedia.org/wiki/Dental_fluorosis
  7. Toothpaste And Mouth Sores – http://www.sideeffectsupport.com/survivors-caregivers/your-toothpaste-and-mouth-sores.html
  8. What Ingredients in toothpaste Can Cause Oral Discomfort? –  http://helpmehygienist.com/can-toothpaste-make-your-mouth-sore/

Organisations to follow, books to read and videos to watch:

  1. The Fluoride Action Network (FAN) seeks to broaden awareness about the toxicity of fluoride compounds among citizens, scientists, and policymakers. – http://www.fluoridealert.org/
  2. Few Videos to watch and books to read:
    1. Shocking fluoride documentary ‘The Fluoride Deception’: http://bit.ly/K0KLja
    2. Book ‘The Case against Fluoride’: http://amzn.to/1b0ALp7
    3. Drinking water is now fluoridated in many countries, including the United States, Canada, New Zealand, Australia, Singapore, Hong Kong, United Kingdom, Ireland, Spain, Turkey, Italy, India and Chili. http://en.wikipedia.org/wiki/Fluoridation_by_country
    4.  Documentary on The Dangers of Fluoride – http://bit.ly/15SWUil

Solutions:

  1. Use herbal tooth Paste: Green, herbal and sustainable oral products to be used. An article to read on how to remineralize Teeth Naturally: http://wellnessmama.com/3650/how-to-remineralize-teeth-naturally/
  2. Install Water filter in homeAquasana AQ-4000 Drinking Water System

Products in Market to address this problem:

There are many products in the market, claim to be green and herbal but they are not 100% green. It’s true that most of them do not use Fluoride as a paste base nevertheless they are still using other foaming agents such as sodium lauryl sulfate or SLS. They are marketing their brand as “Natural” but they still contain some of the ingredients listed above.

On the other hand Earthpaste uses only few ingredient such as Purified Water, Redmond Clay, Xylitol, Essential Oil (Cinnamon, Wintergreen or Peppermint), Real Salt, Tea Tree Essential Oil, Menthol (Only in the Wintergreen & Peppermint varieties).

Where to buy:

In Canada you can order online from amazon.ca

Secret of Happiness in this FAST pace world


HappyHappiness can be a paradox: The more you reach for it, the more it seems to slip through your fingers. “Ask yourself if you’re really happy.

How could this be true? Could it be you’re looking for happiness in all the wrong places? Do you think happiness is what you get when you get what you want? Some say happiness is a little like falling in love, that you can’t make it happen. If that’s the case, then how can you become happier?

At the 2008 Happiness & Its Causes Conference in San Francisco, a wide range of people — from scientists, doctors, and psychologists to artists, philosophers, and Tibetan Buddhists — offered their thoughts on the topic. Here are a few of their tips for overcoming six common barriers to happiness.

Happiness Barrier No. 1: Complexity

Solution: Simplify

“Simplicity is the ultimate sophistication– Steve Jobs turned this into the slogan behind an early Mac advertising campaign. Which doesn’t make it less true.”

Jobs, who was also ‘strictly business’ at work, suffered no waste of time. In one interview, he explained that it was why he wore the same thing everyday, his famous black mock turtleneck: so he didn’t have to waste time picking what to wear every morning. There are several explanations as to how he ended up wearing so many turtlenecks. In the biography Steve Jobs, Isaacson recalls Jobs explaining, “So I asked Issey [Miyake] to make me some of his black turtlenecks that I liked, and he made me like a hundred of them. […] That’s what I wear. I have enough to last for the rest of my life.” John Lasseter remembered a slightly different story: “He found this one really great black turtleneck which he loved – I think it was Issey Miyake – so tried to buy another one and they didn’t have any more. He called the company and asked if they would make another one, and they refused. So he said: ‘Fine, how many do you have to make before I can buy them?’ So they made them – I think he has a closet full of them.'”

A Joy of Tech comic on Steve Jobs’s clothing habits

Schooled in Buddhist monasteries since childhood, Thupten Jinpa, PhD, knows a thing or two about the benefits of simplicity. Why do you think monks and nuns shave their heads, he asks? For one, it simplifies their lives.

A principal English translator to the Dalai Lama, Jinpa is no longer a monk. But he still holds on to some of the lifestyle’s spartan values. “My family has a one-car policy,” he says, pointing out the hassles of owning more than one — the costs, the maintenance, and the time managing the details. Multiple credit cards? They don’t create freedom or happiness, he argues — although, these days, he might get less of an argument about that.

Modern life has elevated individual choice to the highest level, he says, but these choices come at a big price. “We often conflate quality of life with standard of life,” Jinpa says, “but after a point, the connection [between the two] disappears.”

If you simplify your life, you create more space in your day, making it possible to reflect on your life.

Happiness Barrier No. 2: A Breakneck Pace

Solution: Take a Pause

The same culture that entangles you in a web of complexity may also have you on the constant chase, Jinpa says. “That kind of tension takes a toll on your soul and your psyche.” Whether you call it meditation, silence, or prayer, taking a “pause” just a few minutes a day can help you “recharge your batteries” and make you feel happier. A good time to do this is in the morning. Without it, your life may feel out of control.

Venerable Robina Courtin, a Buddhist nun and organizer of the Happiness & Its Causes Conference, recommends spending these minutes practicing mindful meditation. “During the day, we’re completely absorbed by our senses,” she says, “so we don’t pay attention to our minds.” Sit in a quiet place and simply anchor your mind on your breathing. When your mind wanders, bring it back to your breath. Through this process, you learn to observe what your mind is saying.

Happiness Barrier No. 3: Negativity

Solution: Let go

“Your prison is nothing in comparison with the inner prison of ordinary people: the prison of attachment, the prison of anger, the prison of depression, the prison of pride.” wrote Lama Zopa Rinpoche to a California prisoner, a student of the Liberation Prison Project, which offers Buddhist teachings to people in prison.

Some might view this statement as a bit of an exaggeration. But negative, compulsive thoughts do have a quality of stickiness to them, Jinpa says. How you see things and the way you experience the world are strongly linked, making it critical to adopt a positive outlook. “You interact with the world through your senses and mind,” he says. “If you can find a way to stand at the doorway of your senses, you can have a say in how you experience the world.”

In our culture, though, we take it as natural that people are angry, depressed, or dejected, Courtin says. “No wonder we get depressed — it’s a depressing world view. It says you can’t do anything about it.” If you believe your abusive boss, father, or partner is the main cause of your suffering, for example, then you’ve tied your own hands and risk becoming imprisoned by toxic thoughts.

The Buddhist view, by contrast, is that happiness is what you get when you give up a neurotic state of mind, Courtin says. It’s empowering, she says, because knowing you can change it gives you the courage to look inside, pay attention, and take responsibility for your thoughts. Rather than judging negative thoughts, Courtin advises observing them with compassion. Then ask yourself, “What can I do about this?”

Techniques like mindful meditation can help with this, but may not be for everyone, especially those experiencing severe depression, says Philippe R. Goldin, PhD, research associate in the department of psychology at Stanford University.

But there are other simple steps you can take to counteract negativity and enhance your happiness. Practicing gratitude is one. People appear to have a certain set point for happiness, a range that’s influenced by genetics. But those who regularly practice gratitude can enhance this set point by as much as 25%, reports Robert Emmons, PhD in his book, Thanks!: How Practicing Gratitude Can Make You Happier. Through his research, Emmons found that people who kept gratitude journals felt better about their lives, exercised more, and were more optimistic.

Happiness Barrier No. 4: Despair

Solution: Stay hopeful

Did a parent attempt to protect you as a child by saying, “Don’t get your hopes up”? There’s no evidence that hope is hurtful, says David B. Feldman, PhD, assistant professor of counseling psychology at Santa Clara University in California. Instead, hope can greatly enhance happiness in people.

Happiness Barrier No. 4: Despair continued…

But genuine hope isn’t a yellow smiley face or the denial of death at the bedside of a loved one in hospice, says Feldman, who’s pursued research and clinical work addressing the question: “How do people maintain hope and meaning in the face of adversity?

Three components are essential for hope to thrive, Feldman says. They are having goals, as well as a plan and the motivation to achieve them. “Those who succeed don’t internalize the blame game, either internally or externally,” he says, “They ask, ‘what now?’”

In addition to reaching goals, these people perform better in sports and school, Feldman says. They have a greater tolerance for pain. They use health-promoting behaviors. They also have a lower risk for depression, anxiety, and heart disease.

Feldman advises setting personally meaningful goals and checking to see where your hope falters — is it with the plan or the motivation? Allow yourself to daydream, he says. It’s a wonderful source of hope and, therefore, happiness.

Happiness Barrier No. 5: Suppressing sadness

Solution: Feel the real

Having a positive outlook doesn’t mean you never allow yourself to feel sadness. The parents who try to protect their children from dashed hopes — or any kind of sadness — may actually produce the opposite effect than is intended, says James R. Doty, MD, director of the Center for Compassion and Altruism Research and Education at Stanford University. Some suffering, he says, makes you a whole person and allows you to acclimate and move forward in your life. Doty speaks from experience. He had an alcoholic father and invalid mother. He lived on public assistance for much of his youth.

“Happiness is not the absence of sadness,” says David Spiegel, MD, medical director of the Center for Integrative Medicine at Stanford University School of Medicine. It is not a stiff upper lip or the pop psychology mantra, intoning “always stay upbeat” in the face of cancer. “Phony happiness is not good.” By suppressing sadness, you suppress other, more positive emotions, as well, he says, so people who try to suppress emotions actually become more anxious and depressed.

By finding outlets for sadness and frustration, you gain some measure of control, Spiegel says. Using others as a sounding board — not as a toxic dumping ground — can help convert generalized anxiety and depression into targeted feelings you can address with specific solutions.

Happiness Barrier No. 6: Navel-gazing

Solution: Connect with others

How important are social networks to your happiness? Perhaps even more important than you realized. A recent 20-year study of more than 4,000 people showed that happiness is influenced not just by your immediate friends and family. The happiness of a friend of a friend of a friend — someone you’ve never even met — can also influence your happiness. It turns out that happiness can spread through social networks, like a virus.

Happiness Barrier No. 6: Navel-gazing continued…

Unfortunately, many people spend so much time by themselves navel gazing, they don’t benefit from this positive “contagion.”

The more self-absorbed you are, the more your world closes in, and the less realistic you become, all of which produces a vicious circle. “You become oblivious to the needs of others, and the world shrinks still more, making you less able to see outside yourself.” If asked, ‘Why are your problems so special?” says Jinpa, you might respond, “Because they’re mine!”

“If you have such a huge ego, you’re setting yourself up as a huge target, which can easily get hit,” Jinpa says. But using a “wide-angle lens” instead helps you see connections you wouldn’t otherwise see, such as the universality of suffering. All it may take is having a loved one diagnosed with a serious disease to realize how many people are grappling with similar challenges. Feeling joined by others on this journey provides some comfort and happiness.

The straightest path to making connections like these? Compassion and caring for others.

Even primates seem to understand this, says Robert M. Sapolsky, PhD, author of Why Zebras Don’t Get Ulcers and research associate with the Institute of Primate Research at the National Museum of Kenya. Primates that groom each other after a stressful event experience a reduction in blood pressure. The clincher? Grooming others has a greater impact than getting groomed, says Sapolsky.

Compassion engages us with others, removes isolation, builds resilience, and leads to deep fulfillment, says Doty. “Without compassion, happiness is simply short-lived pleasure.”

Tenzin Gyatso, the 14th Dalai Lama, may have said it best: “If you want others to be happy, practice compassion; if you want to be happy, practice compassion.”

Business Etiquette—Tips on Making a Good First Impression….


Make sure your first impression is a good one. Whether you are
a teen applying for an after school job or a college grad applying
for your first “full-time” job, the following tips can help you
make the best first impression.

Pre-Interview Checklist

  • Your shoes are clean and/or polished.
  • Your clothes are pressed and stain-free.
  • Your nails are clean and neat.
  • Your hair is neat.
  • You have removed all extra jewelry.
  • You have clean copies of your resume.
  • You have the address and phone number
    of the meeting place.
  • You know how to get there and how long
    it will take. (BEING ON TIME IS CRITICAL)
  • You know the names of everyone you are
    meeting and how to pronounce them.
  • You have a notebook and pen (that works!)
  • Your bag has essentials only—nothing
    bulky or extra.
  • You are prepared for rain, sleet or
    snow, and your coat is in good condition.
  • Ladies—you have a lipstick, powder
    compact and an extra pair of pantyhose.

Do the next five things with everyone you
meet and you are well on your way to success!

  • Look them in the eye.
  • Give a firm handshake.
  • Greet them – “How do you do?” or “How
    do you do, Mrs. ________”
  • When saying your name, say it slowly
    and clearly.
  • and yes, Don’t forget to Smile!
By Hi-Tech Spiritual Life Posted in Blogroll

Essential Manners for Men: Men’s Top Five Mistakes


Men can screw up in a lot of places in their lives and, frankly, they can probably get away with it. But here are five essentials which raise the hackles on the backs of the peoples’ necks. Guard against these issues and your life will take a turn for the better.

1. Table manners. For whatever reason people judge people by their table manners. Eat like a slob, people will think of you as a slob.

And, if you want one table manner above all others to be careful about: don’t chew food with your mouth open. It’s disgusting.

The fact is eating is really a social activity, a time when we join a special someone, our family, friends, co-workers, prospects or clients in a setting where we can talk and have a good time. So focus on the people you are with, think about making their experience with you the very best possible. And then act accordingly. You can bet they’ll want to be with you again.

2. The toilet seat. Raise it to do your business and then put it back down.

Here’s why. Look at that rim the next time you go. Would you want to sit on it? Neither does she.

So you think, “Hey, why doesn’t she put it down and share the load.” Because if it’s the middle of the night or she forgets to look, she’s the one that’s sitting on it, and honestly, I wouldn’t want to have to face her afterwards. Neither do you.

It’s simply a matter of being considerate. Anyway, why let something like this potentially turn her off to you. It doesn’t make sense. Put it down.

3. Speaking of being inconsiderate, avoid actions that put people around you down.

Like failing to introduce your significant other to people you are talking to at a party. Instead, let the others know you’re proud to be with her. Or like hogging the remote and watching only what you want to watch on TV.

Do those little things that make her smile when she thinks of you. Like putting dishes in the dishwasher instead of leaving them on the table or in the sink. Like cleaning out the sink after you shave. Like opening the car door for her or holding her coat for her or standing when she approaches the table in a restaurant.

4. Looking vs. staring. You know what I’m talking about.

That head snapping stare doesn’t impress anyone you are with. It’s a matter of focus. If an attractive woman happens by while I’m with my wife, to be sure I notice her. But I don’t let my noticing interfere with the focus of my attention which remains on my wife. The minute my focus shifts to the person I’m looking at, then I’m staring, and I’m going to have a problem.

5. What your mother always tried to teach you; say “please” and “thank you.”

It sounds trite, but it’s some of the best advice you’ll ever get. Think of it this way:

When you say “please,” you turn a demand into a request. When you say “thank you,” you turn expecting someone to do something into appreciating what someone is doing for you. People like to be asked to do something and people really like being appreciated.

Where does this work for you? Everywhere. It’s not just at home. It’s with your friends as well. And it’s with your co-workers, prospects, clients, and suppliers. It’s with your children. You can’t expect them to do the things you ask of them if you don’t model the behaviors yourself.

Saying “please” and “thank you” costs you literally nothing, yet it can make the people you are with think very highly of you and want to do things for you and want be with you.

That’s it. Five little things you can work on to improve your relationships at home with friends and special people, and at work. Bottom line: that’s what etiquette is really about. Knowing what to do and say to build great relationships. I think we all want to be liked, we like to be liked. Etiquette will help us to leave an impression of, “What a great guy he is. I really like being with him.”

By Hi-Tech Spiritual Life Posted in Blogroll

Everyday Etiquette—Parents’ Etiquette Tips…..


Here are some etiquette tips to keep in mind when minding your children:

1. Please and Thank You
“Please” and “Thank You” are still the magic words they’ve always been, and you will be doing your child a favor if you insist that she use them until they become a habit. Everyone likes to be appreciated, and “Thank You” is the accepted way of showing appreciation. “Please” can turn a demand into a request and indicates an option—it can turn an unpopular request into a more palatable one.

2. Greetings
Teach your children, as soon as they are old enough to understand, to greet people by name. Learning early on to look someone in the eye and say “Hello Mr. Kelly”—instead of “Hi” mumbled at the ground—is a valuable lesson for the future.

3. Table Manners
Table manners for children should be the same as they are for adults, with one exception: young children should be permitted to be excused from the table, if the meal is an extended one. Expecting a young child to sit quietly through a protracted meal when his food is gone is an unreasonable demand on his patience and ability to sit still without wiggling, fiddling, and noisemaking to help pass the time.

4. Privacy
In order to teach your children to respect your privacy, you must respect theirs.

  • Don’t try to involve yourself in their conversations
  • Don’t listen in on their telephone conversations
  • Don’t go through their belongings
  • Don’t pry
  • Knock and wait for a “come in” before entering their room

5. Interrupting
Teach your children not to interrupt. This is part of learning to respect other people’s rights. It is up to you to teach your child to wait for a break in the conversation to speak. The mother who invariably stops and says, “What is it, dear?” when her daughter interrupts is helping her to establish a habit that will do her a disservice all her life.

6. Thank You Notes
It is not necessary to write a thank you note, when a gift is opened and the donor is thanked personally at the time of opening. If the gifts are not opened in front of the donors, the child must write a personal note mentioning the gift by name to each donor.

7. Fair Play
Fair play among children is really just good sportsmanship and respect for others. It includes the practice of kindness, taking turns and sharing. One of the best ways to teach fair play is by example. Parents who take turns, treat their children with kindness and share with others will be teaching their children fair play, just by their actions.

8. Shaking Hands
Teaching your child to shake hands is a good way to get them used to greeting people appropriately. Practice with them. Show your child how to shake hands and exchange greetings by looking you in the eye and greeting you by name.

9. Telephone Manners
A child’s first experience with the phone will be saying “Hi” to a relative or close friend. Good phone manners that children will learn over time include speaking clearly, identifying themselves, taking messages, and not dominating phone use.

10. Out and About
Children need to learn that good manners are used everywhere, not just at their grandparents. Table manners, please and thank you, polite greetings, and respectful conversation are called for at home, at friends’ homes, in restaurants, at school, and even in the mall. If children learn to make good manners a habit at home, they will use them everywhere.

What is costochondritis?


Costochondritis is a condition that causes chest pain due to inflammation of the cartilage and bones in the chest wall. Also called Tietze’s Syndrome, costochondritis occurs when there is inflammation at the junction of the rib bone and breastbone (sternum). At this junction, there is cartilage joining these bones. This cartilage can become irritated and inflamed. Depending on the extent of the inflammation, costochondritis can be quite painful.

What causes costochondritis?

It is often difficult to identify a single cause of costochondritis. This condition is thought to be boost commonly due to repetitive microtrauma, or overuse. This means that activities are causing repeated damage to the cartilage of the chest wall leading to inflammation. The most frequently affected age group is young adults between 20 and 40 years old. Costochondritis can also been found as an overuse injury in athletes, in particular this condition has been identified in competitive rowers.

Costochondritis can also be found after a traumatic injury. For example, a car accident where the driver’s chest strikes the steering wheel can cause costochondritis by injuring the ribs and cartilage on the front of the chest. Viral infections, usually upper respiratory infections, have also been identified as a cause of costochondritis.

What are the symptoms of costochondritis?

Most patients with costochondritis experience pain over the front of the upper chest (the area of the sternum). Because of serious conditions, most importantly conditions related to heart problems, costochondritis should only be diagnosed after excluding other more serious problems.

Costochondritis pain is usually worsened by activity or exercise. Often the pain is worsened when taking a deep breath. This stretches the inflamed cartilage and can cause significant pain. Touching the area involved by costochondritis can be extremely painful for the patient.

Because of the many nerves that branch away from the chest, pain may be experienced in the shoulder or arms as well. When called Tietze’s Syndrome, the pain from costochondritis is accompanied by redness and or swelling in the areas most tender.

Costochondritis usually responds well to some simple treatment steps. It is helpful is the cause of costochondritis can be determined, and any activities that may have led to the inflammation can be avoided.

•Rest

In order to decrease the inflammation, you will have to avoid activities that cause pain and exacerbation of the costochondritis. Exercise, deep breathing, and strain on the muscles of the chest may worsen the symptoms of pain and slow the healing process. As a general rule of thumb, avoid or limit activities that worsen your symptoms.

•Heat Applications

Applying hot packs to the chest can be helpful in relieving symptoms of costochondritis. Apply heat several times each day, especially before activities that may irritate your symptoms. While ice application can hep with most conditions of inflammation, applying ice to the chest can be quite uncomfortable.

•Anti-Inflammatory Medications

Nonsteroidal anti-inflammatory medications (e.g. Motrin, Advil) help with two aspects of costochondritis. First, they help decrease symptoms of pain making patients more comfortable. Second, these medications help to decrease inflammation, which is the primary problem. Check with your doctor before taking anti-inflammatory as they have potential side effects.

•See Your Doctor

While these symptoms usually improve within a few weeks, and resolve completely within a few months, there are patients in whom this problem persists for some time. See your doctor to ensure nothing more serious is going on. Occasionally, costochondritis will be treated with cortisone injections, but this must be discussed with your doctor.

Will the symptoms return?

Most of the time, the pain associated with costochondritis significantly improves within the first 4-8 weeks. While some pain may persist, it is usually mild and only associated with strenuous activity. All symptoms of pain should resolve within six months.

Costochondritis may return, but it is unlikely to do so. Having the condition once does not increase your chances of experiencing the symptoms again.

Quick Computer Maintenance – Speed Up your Computer


ambulance1One of the most common complaints heard by IT helpdesks is: “My computer is running too slowly – what can I do?” There are actually a number of reasons why this could be happening, and luckily, a number of ways to solve the problem. Here are our top five recommendations to help boost your desktop or notebook PC’s speed and performance.

1. Clean up your hard drive
A typical hard drive is crammed full of files you really don’t need. The less stuff that’s on your hard drive, the faster your computer will be.

The best way to free up space on your PC is with the Windows® Disk Cleanup utility. To access it, go to Start -> All Programs -> Accessories -> System Tools, and then click Disk Cleanup. You might need to specify which drive you want to clean.

In the Disk Cleanup box, scroll through the content of the Files to delete list and check the items you want to remove. If you’re not sure what to get rid of, the safest bets are temporary Internet files and programmes you’ve installed that you no longer use. When you’re done, click OK.

If you don’t want to delete files altogether, such as things like photos and music or video files,  consider moving them to an external hard drive.

2. Get rid of visual effects
Windows Vista® comes with some cool visual effects, but they can drain system resources. Disabling some will speed your system. To do this, click on the Start button, and then Control Panel > System and Maintenance > Performance Information and Tools.

Click on Adjust Visual Effects. You may be asked to enter an administrator password. Then click on the Visual Effects tab, and select Adjust for Best Performance. Then click OK.

3. Scan for viruses and spyware
One of the main culprits of sluggish PC performance is malware: viruses, spyware, Trojan horses, worms, and other kinds of malicious unwanted software. If you don’t already have some kind of antivirus protection installed, you should do so right away! Consider using Microsoft Windows Defender, which is included in Windows Vista, and is available as a free download for Microsoft XP SP2. Make sure to schedule an automatic virus scan at least once a month. You should also always keep a firewall running to help block malware from getting to your PC in the first place.

4. Add more RAM (the easy way)
Adding system memory (also known as RAM, or random access memory) can be a good way to improve a PC’s performance. However, upgrading memory can sometimes be difficult and costly. Windows Vista now offers Windows ReadyBoost, which allows you to add memory without having to install anything. It allows you to use a flash memory device, such as a USB flash drive or a secure digital (SD) memory card, as an additional memory cache.

5. Run a defragmentation utility
Disk Defragmenter is a Windows utility that consolidates files and folders on your computer’s hard disk so that each occupies a single space, which in turn speeds up reading and writing to the disk.

To defragment your hard drive, go to Start > All Programs > Accessories > System Tools > Disk Defragmenter, then select the drive you want to defragment. Then go to Settings and make sure there’s a tick beside the two options in the section When defragmenting my hard drive, then click OK twice to begin. When the defragmentation is done, you’ll probably have to reboot your computer.

After following these tips, you should notice an improvement in your computer’s performance.

Microsoft, Windows and Windows Vista are US registered trademarks of Microsoft Corporation.

Avoid Identity Theft and Online Fraud


“How to safeguard yourself from online fraud – an overview and precautions”

“Computers make it easier to do a lot of things, but most of the things they make it easier to do don’t need to be done”. This famous quote by Andy Rooney elucidates the significance of online computing and its wise usage.

It has seen that computer usage is proportionately linked with social responsibility and social responsiveness; it is same as pharmacokinetics and pharmacodynamics in medicine science; what medicine can do to human body and how human body can react for or against that particular medicine composition.

According to Forrester, report online frauds are growing by 20% each year.

I rarely use online transaction, and if I use them then I make sure that the transaction is completed without any compromises or shortfall. Recently I was planning to buy another Digital SLR to add value to my photography passion. I wanted to buy Nikon D60 with Lens kit. After checking all the online and offline options, I found out that the Bestbuy stores are selling these Cameras at very reasonable price than any other vendors such as Tigerdirect, Future-shop, Sears, Black’s and Wal-Mart. Nevertheless curiosity being my second nature I wanted to get much better online deal.

I googled the phrase “cheepest nikon D60”.
1
It routed me to this website where I was getting Nikon D60 Body @ US$ 279.00 and Nikon D60 body w/ 18 – 55mm VR lens kit @ US$359.00. It was unbelievable offer. It was really too good to be true. Therefore, I wanted to do some online research about this site. I clicked on the first link..

2
Ideally, whenever I perform online transaction I either go with reputed brand or do my standard procedure of scrupulous research. I suggest everyone to follow mentioned below steps for scam free safe online transaction:

Step One:
Type this phrase in the Google search bar “Fraud or scam+company name”.

3

As above, you can see that Goggle has populated 12,500 pages in .09 sec.

Step Two:
Click on the first page that exactly matches the word in phrase. These pages depict live experience of the user or victim. They convey their message via Forum, blog or some portal. Please note; It may possible that the company is not fraud or related to direct scam nevertheless mentioned below remarks are genuine customer experiences. This shows that their processes are not streamlined and they are less concern about TCE (Total Customer Experince).

Few user comments are print screened here.

4

5

6

Above-mentioned steps are the primary, easiest and inexpensive way to save ourselves, and fight against online scam and fraud.

Analysts and pundits agree that cyber crime, fraud and scam remains a serious, costly and growing problem. Fraud solutions that focus only on the behaviour of the criminal fall short because they neglect a critical dimension of the problem: the identification of the device used to perpetrate the crime. The emergence of social awareness is must for customers and companies to reliably capture first-time fraud while at the same time accurately recognize valuable returning customers.

Few facts, which you should know about online fraud, scams and con artists, are mentioned below:

FACT # 1: Fraud is the number one crime against seniors.
RIGHT – Some seniors are lonely, vulnerable, home during the day and trusting. Moreover, they are perceived to have money. This makes them very good targets for frauds and scams. However, fraud no longer discriminates based on age. Anyone is a target and could become a victim.

FACT # 2: Con artists target people with lots of money to lose.
WRONG – Con artists do not care how much money you have. They just want all of it. If they can get $100 from 100 people that is $10,000. Not bad for a day or two of work. Billions of dollars are lost every year to frauds and scams.

FACT # 3: Con artists give the impression that they are friendly, helpful and trustworthy and will not usually use physical violence.
RIGHT: True The old saying, “You catch more flies with honey than with vinegar” certainly applies. While a con artist may pester someone to buy something or convince them to invest hard earned savings, he or she does not want to be noticed by police. Physical violence will usually bring the police. The con artist knows an easier target is always around the corner.

FACT # 4: When a company gives information in writing you can be sure no fraud will occur.
WRONG: Anyone with a computer can create official looking documents designed to convince people a company is legitimate. Ask to see a business license and references and then CHECK IT OUT. Call information. Check the yellow pages. Visit the offices of the company if you can. Make sure you know who you are doing business or buying stuffs with.

FACT # 5: If I only lose a small amount of money, then I am not a victim. I just made a mistake and should learn a lesson.
WRONG: All frauds should be reported, even if you are embarrassed or feel the amount of money is too small to worry about. You may not get your money back but the more information the fraud investigators have the easier it is to start tracking people down and put a case together. Report frauds to your local police or PHONEBUSTERS. If you have a concern about a business transaction, contact your local provincial consumer ministry or bank for more inforamation.

Scams such as Spoofing and Phishing to commit identity theft are becoming more prevalent these days. Protecting your personal information from identity theft is a crucial matter and there are many ways the unscrupulous can gain access to such information. Identity theft involves the use of your personal information – such as your name, Social Security number, credit card or bank account numbers, or other identifying information – by someone else, to commit fraud or other crimes.

•    E-mail Phishing – Involves you receiving an e-mail that appears to be from a legitimate company, such as Bank or social networking sites. It may even include the company’s logo and a link to an Internet address that looks appropriate. This e-mail directs you to link to a website where you are to supply account or personal information. However, simply clicking the link could secretly install software on your computer. The software may infect your computer with a virus or record and transmit everything you type, including passwords.

Additionally, the website you link to may be spoofing the correct Internet site.

•    Website Spoofing – Involves you trying to visit a website but accidentally keying-in or linking-to a different address. This may lead you to a website that mimics the legitimate site that you were trying to visit. The spoof Internet site may route whatever information you provide to criminals. This can include your account numbers, Social Security Numbers, credit card information, passwords and personal identification numbers. To make spoof sites seem legitimate, criminals may use the logos, graphics, names and code of the real company’s site. They also may attempt to fake the URL that appears in the address field at the top of your browser window and the padlock that appears in the lower right corner.

Take Control

The best advice is to be cautious and take control of your personal information.

Protect Yourself Online
•    Do not reply to an e-mail or pop-up message asking for personal or financial information. Legitimate companies will never ask for personal or financial information via an e-mail or pop-up message.
•    Don’t e-mail personal or financial information. If you initiate a transaction, look for indicators that the message is secured, which can be validated by a lock icon. Most e-mail programs do not provide confidentiality via encryption.
•    Use bookmarks to access known sites to avoid being lured to imposter sites
•    Use updated anti-virus software. Some phishing emails contain viruses and software that can harm your computer.

Other Ways To Protect Yourself
•    Shred unwanted documents that contain personal information.
•    Review credit card and bank statements immediately for unauthorized charges and contact the company if statements are more than a few days late.
•    Don’t leave mail in your mailbox.
•    Memorize your Social Security number instead of carrying it with you.
•    Don’t write down your passwords, and don’t use birth dates or names of family members as passwords.
•    Take your receipts from ATMs, gas pumps, etc.
•    Report lost or stolen credit and debit cards immediately!

Review Your Credit Report
Every citizen should obtain a copy of their credit report for review at least once a year:
•    Equifax – http://www.equifax.com; 1-800-685-1111
•    Experian – http://www.experian.com; 1-888-397-3742
•    TransUnion – http://www.transunion.com; 1-800-916-8800

Get More Information
For additional information on phishing and identity theft, go to the Federal Trade Commission’s Website at http://www.ftc.gov/bcp/edu/microsites/idtheft.

Important Contact Information if You’ve Been a Victim of Identity Theft

U.S. Government Agencies

•    Federal Trade Commission
Identity Theft Clearing House
Hotline: 877-438-4338
IDD: 202-326-2502
Website: http://www.consumer.gov/idtheft/
•    Social Security Administration
Fraud Hotline: 800-269-0271
Credit Reporting Agencies
•    Experian
To request a credit report and/or to report fraud: 888-397-3742
Website: http://www.experian.com
•    Equifax
To request a credit report: 800-685-1111 Option 4
To report fraud: 800-525-6285
Website: http://www.equifax.com
•    TransUnion Corporation
To request a credit report: 800-916-8800
To report fraud: 800-680-7289
Website: www.transunion.com

Careful next time when you use Networking Site: Orkut, Facbook and Twitter


phishingThere is a new phishing scam making the hoola hoop at Twitter, Facebook, and other social networking sites.

What is Phishing?

It is an act of sending an e-mail or message to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has.

The Web site, however, is bogus and set up only to steal the user’s information. These latest phishing frauds tempt you to click on a link with a message that goes something like, “hey! Check out this funny blog about you…” When you click on the link to the website, it will look like the login page for a legitimate website (say, Twitter, facebook or orkut), and asks you for your username and password. The result is the scammer hijacks your account.

A Facebook or Orkut member (let’s say you) receives a message that appears to come from a friend and tells you how amazing you look in a new video. To see that video, you are told to click on a link, which deviously takes you away to a compromised site that tricks you into updating your Flash software to upoad a FLV file or SWF file. Your attempt at an honest update enables an executable file that installs the Koobface worm, which installs a proxy server that redirects Web searches and enables ad hijacking and click fraud.

What is Koobface Worm?

Koobface spreads when a user accesses his/her MySpace or Facebook account. The worm creates a range of commentaries to friends’ accounts. Net-Worm.Win32.Koobface.b, which targets Facebook users, creates spam messages and sends them to the infected users’ friends via the Facebook site. The messages and comments include texts such as Paris Hilton Tosses Dwarf On The Street; Examiners Caught Downloading Grades From The Internet; Hello; You must see it!!! LOL. My friend catched you on hidden cam; Is it really celebrity? Funny Moments and many others.

Messages and comments on MySpace and Facebook include links to http://youtube.%5Bskip%5D.pl. If the user clicks on this link, she or hkaboome is redirected to http://youtube.%5Bskip%5D.ru, a site that ostensibly contains a video clip. If the user tries to watch it, a message appears saying that s/he needs the latest version of Flash Player in order to watch the clip. However, instead of the latest version of Flash Player, a file called codecsetup.exe is downloaded to your machine; this file is also a network worm. The result is that users who have come to the site via Facebook will have the MySpace worm downloaded to their machines, and vice versa.

While the end result of the Twitter and Facebook phishing scams do different things — one hijacks your Twitter account, one downloads malicious software to your computer — the initial hook is similar. They both send you a message from a “friend”, claiming to have seen a photo or video of you. This hook is especially effective because it piques victims’ curiosity (who wouldn’t want to see videos of themselves?) while preying on their trust of social networking “friends”.

To protect yourself from this and other phishing scams please follow the mentioned below URL or click the image:-

http://www.tippingpoint.com/pdf/resources/datasheets/400951-001_Phishing.pdf

capture

 

 

USB Missile Launcher..


usb_missile_center_200_14741.gif

I know Friends!!! Just what you’ve always wanted…a missile launcher that plugs directly into the USB port of your computer to relieve the extreme boredom of your working day!

What better way to waste away the hours in the office or get some of your own back on the office idiot or a colleague you need a bit of retribution with? In fact, we think this USB missile launcher is so nasty looking, you won’t even need to fire it to keep the pests away from your desk, the look of it will be deterrent enough!

Shoooooooooooooot NOW………..

The USB missile launcher stands at a massive 20cm tall x 15cm wide, which is pretty big by USB toy size as far as we’re concerned (and we would know of course)! Just mount the USB missile Launcher in a sturdy place, such as desktop or even on top of your monitor and bombs, or rather missiles, away!!! There is some ingenious software included to ensure your missile navigation doesn’t end up with the weapon in your boss’ coffee and is capable of panning 180 degrees and tilting up to 45 degrees…. ideal for hard to reach targets or stealth missions.

usb_missile_right_100_5349.jpg

This little desktop launcher even has real firing sound effects when launched and can fire missiles up to 5m!! Please note that the missiles themselves are made from soft foam, so no real harm can be done…maybe just some bruised egos!

What comes in a box:

  • Software included and is compatible with Windows 2000 and Windows XP.
  • Recommended for age 10 years and above.
  • Requires 3 x AA batteries.

Everyday Etiquette—When You Are Invited…


Whether it is to a wedding, a dinner party, shower or gala event, an invitation comes with some important obligations. Here’s a quick guide to keep you on the guest list.

1. RSVP
From the French, it means “Répondez, s’il vous plaît,” or, “Please reply.” This little code has been around for a long time and it’s definitely telling you that your hosts want to know if you are attending. Reply promptly, within a day or two of receiving an invitation.

2. How do I respond? Reply in the manner indicated on the invitation.

  • RSVP and no response card: a handwritten response to the host at the return address on the envelope.
  • Response Card: fill in and reply by the date indicated and return in the enclosed envelope.
  • RSVP with phone number: telephone and make sure to speak in person – answering machines can be unreliable.
  • RSVP with email: you may accept or decline electronically.
  • Regrets only: reply only if you cannot attend. If your host doesn’t hear from you, he is expecting you!
  • No reply requested? Unusual, but it is always polite to let someone know your intentions. A phone call would be sufficient.

3. Is that your final answer?

  • Changing a ‘yes’ to a ‘no’ is only acceptable on account of: illness or injury, a death in the family or an unavoidable professional or business conflict. Call your hosts immediately.
  • Canceling because you have a “better” offer is a sure fire way to get dropped from ALL the guest lists.
  • Being a “no show” is unacceptable.
  • Changing a ‘no’ to a ‘yes’ is OK only if it will not upset the hosts’ arrangements.

4. “May I bring…”
Don’t even ask! An invitation is extended to the people the hosts want to invite—and no one else.

  • …a date. Some invitations indicate that you may invite a guest or date (Mr. John Evans and Guest) and when you reply, you should indicate whether you are bringing someone, and convey their name.
  • …my children. If they were invited, the invitation would have said so.
  • … my houseguest. It’s best to decline the invitation, stating the reason. This gives your host the option to extend the invitation to your guests, or not.

5. Say “Thank You.”
Make sure to thank your hosts before you leave, and then again by phone or note the next day.

Dengue Fever and It’s Management.


MOSQUITO AEDES AEGYPTI

Aedes aegypti, the mosquito that spreads Dengue fever.

THE FACT: There is no vaccine to prevent Dengue

Dengue is diagnosed only by a blood test.

OVERVIEW

Dengue fever is an infectious disease carried by mosquitoes and caused by any of four related dengue viruses. This disease used to be called “break-bone” fever because it sometimes causes severe joint and muscle pain that feels like bones are breaking, hence the name. Health experts have known about dengue fever for more than 200 years.

Worldwide, more than 100 million cases of dengue infection occur each year.

aedes_aegypti_larvae

CAUSE

Dengue fever can be caused by any one of four types of dengue virus: DEN-1, DEN-2, DEN-3, and DEN-4. You can be infected by at least two, if not all four types at different times during your lifetime, but only once by the same type.

Aedes_aegypti_biting_human

TRANSMISSION

You can get dengue virus infections from the bite of an infected Aedes mosquito. Mosquitoes become infected when they bite infected humans, and later transmit infection to other people they bite. Two main species of mosquito, Aedes aegypti and Aedes albopictus, have been responsible for all cases of dengue transmitted in this country. Dengue is not contagious from person to person.

Dengue

SYMPTOMS

Symptoms of typical uncomplicated (classic) dengue usually start with fever within 5 to 6 days after you have been bitten by an infected mosquito and include

  • High fever, up to 105 degrees Fahrenheit
  • Severe headache
  • Retro-orbital (behind the eye) pain
  • Severe joint and muscle pain
  • Nausea and vomiting
  • Rash

The rash may appear over most of your body 3 to 4 days after the fever begins. You may get a second rash later in the disease.

Symptoms of dengue hemorrhagic fever include all of the symptoms of classic dengue plus

  • Marked damage to blood and lymph vessels
  • Bleeding from the nose, gums, or under the skin, causing purplish bruises

This form of dengue disease can cause death.

Symptoms of dengue shock syndrome-the most severe form of dengue disease-include all of the symptoms of classic dengue and dengue hemorrhagic fever, plus

  • Fluids leaking outside of blood vessels
  • Massive bleeding
  • Shock (very low blood pressure)

This form of the disease usually occurs in children (sometimes adults) experiencing their second dengue infection. It is sometimes fatal, especially in children and young adults.

DIAGNOSIS

Your health care provider can diagnose dengue fever by doing two blood tests, 2 to 3 weeks apart. The tests can show whether a sample of your blood contains antibodies to the virus. In epidemics, a health care provider often can diagnose dengue by typical signs and symptoms.

AG

TREATMENT

There is no specific treatment for classic dengue fever, and like most people you will recover completely within 2 weeks. To help with recovery, health care experts recommend

  • Getting plenty of bed rest
  • Drinking lots of fluids
  • Taking medicine to reduce fever

CDC advises people with dengue fever not to take aspirin. Acetaminophen or other over-the-counter pain-reducing medicines are safe for most people.

For severe dengue symptoms, including shock and coma, early and aggressive emergency treatment with fluid and electrolyte replacement can be lifesaving.

PREVENTION

The best way to prevent dengue fever is to take special precautions to avoid contact with mosquitoes. Several dengue vaccines are being developed, but none is likely to be licensed by the Food and Drug Administration in the next few years.

When outdoors in an area where dengue fever has been found

  • Use a mosquito repellant containing DEET, picaridin, or oil of lemon eucalyptus
  • Dress in protective clothing-long-sleeved shirts, long pants, socks, and shoes

Because Aedes mosquitoes usually bite during the day, be sure to use precautions especially during early morning hours before daybreak and in the late afternoon before dark.

Other precautions include

  • Keeping unscreened windows and doors closed
  • Keeping window and door screens repaired
  • Getting rid of areas where mosquitoes breed, such as standing water in flower pots, containers, birdbaths, discarded tires, etc.

Water-filled tyres are used as breeding sites for Aedes aegypti, the mosquito vector of dengue. Increased international trade in tyres has resulted in the introduction of dengue vectors into several countries in Europe, the Americas, Africa and Asia.

COMPLICATIONS

Most people who develop dengue fever recover completely within 2 weeks. Some, however, may go through several weeks to months of feeling tired and/or depressed.

Some more facts: FAQ’s

Dengue

·Dengue [DEN-ghee] is a flu-like viral disease spread by the bite of infected mosquitoes. Dengue hemorrhagic fever is a severe, often fatal, complication of dengue.

·Dengue occurs in most tropical areas of the world. Most U.S. cases occur in travelers returning from abroad, but the Dengue risk is increasing for persons living along the Texas-Mexico border and in other parts of the southern United States.

·There is no specific treatment for Dengue.

·Prevention centers on avoiding mosquito bites in areas where Dengue occurs or might occur and eliminating breeding sites.

What is Dengue fever? What is Dengue hemorrhagic fever?

Dengue fever is a flu-like illness spread by the bite of an infected mosquito.

Dengue hemorrhagic fever is a severe, often fatal, complication of Dengue fever.

What is the infectious agent that causes Dengue?

Dengue and Dengue hemorrhagic fever are caused by any of the Dengue family of viruses. Infection with one virus does not protect a person against infection with another.

How is Dengue spread?

Dengue is spread by the bite of an Aedes mosquito. The mosquito transmits the disease by biting an infected person and then biting someone else.

Where is Dengue found?

Dengue viruses occur in most tropical areas of the world. Dengue is common in Africa, Asia, the Pacific, Australia, and the Americas. It is widespread in the Caribbean basin. Dengue is most common in cities but can be found in rural areas. It is rarely found in mountainous areas above 4,000 feet.

The mosquitoes that transmit Dengue live among humans and breed in discarded tires, flower pots, old oil drums, and water storage containers close to human dwellings. Unlike the mosquitoes that cause malaria, Dengue mosquitoes bite during the day.

What are the signs and symptoms of Dengue fever and dengue hemorrhagic fever?

Dengue fever usually starts suddenly with a high fever, rash, severe headache, pain behind the eyes, and muscle and joint pain. The severity of the joint pain has given dengue the name “breakbone fever.” Nausea, vomiting, and loss of appetite are common. A rash usually appears 3 to 4 days after the start of the fever. The illness can last up to 10 days, but complete recovery can take as long as a month. Older children and adults are usually sicker than young children.

Most Dengue infections result in relatively mild illness, but some can progress to Dengue hemorrhagic fever. With Dengue hemorrhagic fever, the blood vessels start to leak and cause bleeding from the nose, mouth, and gums. Bruising can be a sign of bleeding inside the body. Without prompt treatment, the blood vessels can collapse, causing shock (Dengue shock syndrome). Dengue hemorrhagic fever is fatal in about 5 percent of cases, mostly among children and young adults.

How soon after exposure do symptoms appear?

The time between the bite of a mosquito carrying Dengue virus and the start of symptoms averages 4 to 6 days, with a range of 3 to 14 days. An infected person cannot spread the infection to other persons but can be a source of Dengue virus for mosquitoes for about 6 days.

How is Dengue diagnosed?

Dengue is diagnosed by a blood test.

Who is at risk for Dengue?

Anyone who is bitten by an infected mosquito can get Dengue fever. Risk factors for Dengue hemorrhagic fever include a person’s age and immune status, as well as the type of infecting virus. Persons who were previously infected with one or more types of Dengue virus are thought to be at greater risk for developing Dengue hemorrhagic fever if infected again.

What is the treatment for Dengue and Dengue hemorrhagic fever?

There is no specific treatment for Dengue. Persons with Dengue fever should rest and drink plenty of fluids. They should be kept away from mosquitoes for the protection of others. Dengue hemorrhagic fever is treated by replacing lost fluids. Some patients need transfusions to control bleeding.

How common is Dengue?

In tropical countries around the world, Dengue is one of the most common viral diseases spread to humans by mosquitoes. Tens of millions of cases of Dengue fever and up to hundreds of thousands of cases of Dengue hemorrhagic fever occur each year.

In the United States, approximately 100 cases of Dengue are reported each year in travelers returning from tropical areas. Many more cases probably go unreported. A few persons have become infected with Dengue while living in the United States. Aedes mosquitoes are found in Texas, Florida, and other southern states, and locally acquired dengue has been reported three times since 1980 in southern Texas.

Is Dengue an emerging infectious disease?

Yes. All types of Dengue virus are re-emerging worldwide and causing larger and more frequent epidemics, especially in cities in the tropics. The emergence of Dengue as a major public health problem has been most dramatic in the western hemisphere. Dengue fever has reached epidemic levels in Central America and is threatening the United States.

Several factors are contributing to the resurgence of Dengue fever:

·No effective mosquito control efforts are underway in most countries with Dengue.

·Public health systems to detect and control epidemics are deteriorating around the world.

·Rapid growth of cities in tropical countries has led to overcrowding, urban decay, and substandard sanitation, allowing more mosquitoes to live closer to more people.

·The increase in non-biodegradable plastic packaging and discarded tires is creating new breeding sites for mosquitoes.

·Increased jet air travel is helping people infected with Dengue viruses to move easily from city to city.

Dengue hemorrhagic fever is also on the rise. Persons who have been infected with one or more forms of Dengue virus are at greater risk for the more severe disease. With the increase in all types of virus, the occurrence of Dengue hemorrhagic fever becomes more likely.

To summarize, dengue is a rapidly expanding disease problem. Epidemics worldwide have become larger and more frequent. Incidence of the severe and fatal form of disease, DHF, has increased dramatically in Asia in recent years and has moved into the developed countries as well. Two factors are primarily responsible for this change in epidemiology: increased air travel and a total lack of effective mosquito control in tropical urban centers.

The only option we have to prevent the dengue problem from becoming progressively worse is to reduce incidence of disease, and the only way to achieve that is to control Ae. aegypti. Unfortunately, the conventional methods that have been used over the past 20 years are not very effective. Thus, we have a very real crisis on our hands.

New leaders are urgently required. Moreover, we must educate health planners, most of whom have little or no knowledge of or interest in vector-borne diseases other than malaria, but who determine where and on what diseases the health dollars are to be spent.

History has taught us that the “top down” approach to Ae. aegypti control has no lasting impact after government support is withdrawn. The “bottom up” approach, on the other hand, is very slow and may take years before results are observed. It is my opinion, therefore, that neither a “top down” nor a “bottom up” approach alone is ideal for controlling Ae. aegypti-borne diseases in the 2000s. What we urgently need today are integrated control strategies that utilize the best of both approaches in the initial phase, with more emphasis directed to the community-based approach as the program progresses. This should insure relatively rapid success, but also that the programs will be sustainable, and that the next generation will understand and, hopefully, accept its responsibility to help maintain Ae. aegypti control in the community. Citizens of each community must be given more responsibility for their own health destiny.

Everyday Etiquette—Forms of Address


Addressbook, cup of tea and stationery at the ready, you start addressing
invitations for your husband’s fortieth birthday party. All of a sudden
you realize you are in a potential etiquette minefield. Jane and John
are married, but she does not want to be addressed as “and Mrs. John
Kelly;” Sam and Sue are not married, but live together; and Tanya is
separated but not yet divorced. What are the correct forms of address
for each of these invitations?

Help is on the way! Simply refer to our handy chart and take the mystery out
of addressing your social correspondence correctly.

Situation Options/Notes
Addressing a Woman
Maiden name Ms. Jane Johnson Miss Jane Johnson* *usually ‘Miss’ is for girls under 18
Married, keeping maiden name Ms. Jane Johnson
Married, uses husband’s name socially Mrs. John Kelly Mrs. Jane Kelly* *Nowadays this is acceptableMs. Jane Kelly
Separated, not divorced Mrs. John Kelly Mrs. Jane KellyMs. Jane Kelly
Divorced Mrs. Jane Kelly Ms. Jane KellyMs. Jane Johnson (maiden name)
Widowed Mrs. John Kelly* *If you don’t know the widow’s preference, this is
the traditional and preferred form
Mrs. Jane KellyMs. Jane Kelly
Addressing a Couple
Married, she uses her husband’s name socially Mr. and Mrs. John Kelly
NOTE:
Traditionally, a man’s name preceded a woman’s on an envelope adddress,
and his first and surname were not separated (Jane and John Kelly).
Nowadays, the order of the names—whether his name or hers comes
first—does not matter and either way is acceptable. The exception is
when one member of the couple ‘outranks’ the other—the one with the
higher rank is always listed first.

Married, she prefers Ms.

Mr. John Kelly and Ms. Jane Kelly
Ms. Jane Kelly and Mr. John Kelly
*Do not link Ms. to the husband’s name:
Mr. and Ms.John Kelly is incorrect
Married, informal address Jane and John Kelly
John and Jane Kelly
Married, she uses maiden name Mr. John Kelly and Ms. Jane Johnson
Ms. Jane Johnson and Mr. John KellyIf you can’t fit the names on one line:
Mr. John Kelly
and Ms. Jane Johnson
*Note the indent, either name may be used first
Unmarried, living together Mr. John Kelly
Ms. Jane Johnson
Note: Use two lines, do not indent and do not link the names with ‘and’. Either name may be used first.
A woman who outranks her husband:
elected office, military rank
The Honorable Jane Kelly and Mr. John KellyIf you can’t fit both names on one line (note indent):
The Honorable Jane Kelly
and Mr. John Kelly
A woman who outranks her husband:
professional or educational degree
Dr. Jane Kelly and Mr. John Kelly
Both are doctors (PhD or medical) and use the same last name The Doctors Kelly (omit first names)
Drs. Jane and John Kelly / Drs. John and Jane Kelly
Dr. John Kelly and Dr. Jane Kelly / Dr. Jane Kelly and Dr. John Kelly
Both are doctors (PhD or medical), she uses her maiden name Dr. Jane Johnson and Dr. John Kelly
Dr. John Kelly and Dr. Jane Johnson
Business
Woman Ms. is the default form of address, unless you know positively that a woman wishes to be addressed as Mrs.
Professional designations—use only for business Jane Kelly, CPA
Note: Do not use Ms. or Mr. if using a professional designation.
Socially, drop the professional designation and use Mr., Ms., or Mrs.: Ms. Jane Kelly
Esquire:
Attorneys and some court officials
Jane Kelly, Esquire
Note: If using Esquire, do not use Ms. or Mr.
In conversation or socially, ‘Esquire’ is not used; use Mr. or Ms.: Ms. Jane Kelly
Attorney at Law Ms. Jane Kelly
Attorney at Law
This is an alternative to ‘Esquire’ for attorneys. Use Mr. or Ms. and use two lines with no indent.

USB Fan for Notebooks…


usbfan_cen_500_34736.jpg

Stay cool at your desk this summer with the space-saving flexible fan that plugs into your PC!

Stuck in a stuffy office with no air-conditioning all summer? Desk miles from the window? Don’t sweat – cool down with your own ultra-convenient, and unique, personal fan. This is a fan that doesn’t need batteries or a plug, because it plugs directly into your PC’s USB port! There’s no need for any installation; just switch it on and feel it cool you down.

The USB Fan is designed to save you both hassle and space. Its head is small but powerful, the rubber blades whirring at a surprisingly rapid speed for a pleasantly refreshing breeze. Best of all, the slim flexible metal cord allows you to direct the breeze in any direction or at any angle. You can fold the whole thing almost flat for simple storage, and if the weather goes cold, you can twist it into different shapes to amuse yourself, desktop sculpture style.

usbfan_left_500_23877.jpg

With the USB Fan you don’t have to fork out a fortune in batteries, and there’s no need to worry about having a free plug socket or whether the cable will stretch. It’s ideal for small desks or office cubicles, and of course for making sweaty colleagues green with envy. Cool down and enjoy taunting co-workers with one gadget – that’s what we call value for money.

Measures 36cm when straight.