How to Buy Real Estate in USA
If you're brand new to the US real estate market, then buying real estate in USA will not be an easy process at first. While you can find some great deals in the US market today, there is still the possibility of making some costly mistakes.
That shouldn’t stop you from investing, however. It should just make you more aware of the importance of due diligence. Below are the two most important things to consider.
How To Buy Real Estate In USA:
1. Be aware of the tax implications for foreign investors: Your choice to invest in US real estate will most likely depend on the amount of tax that you need to pay when purchasing the property. This includes property, capital gains, and transfer tax.
As a non-citizen of the US, there are certain tax implications that will be involved when you purchase real estate in USA - and additional ramifications when a foreigner sells property in the US.
It’s not all bad news though. There may actually be tax breaks available to you as well. The US is doing its best to encourage foreign investment at this time especially given the tough economic climate.
The main thing you need to know about how to buy real estate in USA is exactly what your tax implications will be, good or bad. This will help you make a well informed bid, and keep your purchase in line with your budget.
2. Look at the local economy: When it comes to investing in US real estate, the local situation is more important than the overall one. Currently, pretty much every city in the USA has been affected by the recession, so your goal is to find one that is bucking the trend.
That means a decent economy, low crime and good schools. What’s even more important than the actual figures, is whether there’s been an increase or decrease in positive economic news compared to prior years. Basically, when looking at how to buy real estate in USA, look for a town that is poised for recovery, not sinking further into depression.
A good indicator of this is whether there is a healthy migration of new citizens moving into the city. According to the National Association of Realtors, some of the hottest US markets for foreign investors are in Florida, Texas, Arizona and California.
If you keep these 2 things in mind when looking at how to buy real estate In USA, you’ll be able to avoid costly mistakes and make a well informed, and profitable long term investment.
You can buy real estate in USA today with assistance from experienced investors in the US real estate market. Contact the Real Estate In USA team through our website.
jeudi 29 octobre 2009
Measuring the Humidity in Your Home
Measuring the Humidity in Your Home
Humidity is something that people tend to associate with the weather outside, especially in the summer months when it can become very hot and humid. However, absolutely everyone has humidity in their house whether they realise it or not.
This is the amount of moisture or water vapour in the air and it can be caused by many different factors. People and pets breathing, plants in the house, cooking, showering and doing the laundry are all things which can contribute to the amount of humidity present in a house. Although most people don't even notice it and it's not a problem as we need humidity for our comfort and health, but too much or too little can cause problems. One way to ensure that the humidity levels in your house are at the right temperature is to use hygrometers to measure the humidity levels in your home.
A lot of people don't realise that they have too much or too little humidity in their homes because they don't know what the symptoms are and the damage they are causing to the house and the people living there. A few examples of a home with too much humidity include condensation on the windows, musty smells and wet stains on walls and ceilings. If you have noticed any of these things in your house then chances are you have humidity levels that are too high. Hygrometers are a good way of double checking this so you can be sure that humidity is what is causing the problems.
You can also have too little humidity in your home and some of the symptoms of this include having problems with electronic equipment, noticing that you have chapped skin and lips and it can even cause breathing difficulties. These are all very good reasons why it can be so important to use hygrometers in order to test that they humidity levels in your home are correct. By doing this you can easily prevent any of the above problems which will benefit both you and the environment you live in.
Quite scarily, having too high or too low levels of humidity in your house can cause long term effects. Some of these include damage to your house and furniture, developing allergies and other health problems as well. As more people are becoming aware of how important it is to check the levels of humidity in their homes, it is becoming easier to purchase hygrometers. They can be bought online which means that you don't even have to leave your home in order to get one. As well as this, they are not as expensive as people would think as they are a simple yet effective tool.
There are various other things that can be used in order to control humidity as well as using hygrometers. Dehumidifiers are helpful at resolving the problem as well as other methods such as simply remembering to open and close windows and doors depending on the current humidity levels in your home.
Humidity is something that people tend to associate with the weather outside, especially in the summer months when it can become very hot and humid. However, absolutely everyone has humidity in their house whether they realise it or not.
This is the amount of moisture or water vapour in the air and it can be caused by many different factors. People and pets breathing, plants in the house, cooking, showering and doing the laundry are all things which can contribute to the amount of humidity present in a house. Although most people don't even notice it and it's not a problem as we need humidity for our comfort and health, but too much or too little can cause problems. One way to ensure that the humidity levels in your house are at the right temperature is to use hygrometers to measure the humidity levels in your home.
A lot of people don't realise that they have too much or too little humidity in their homes because they don't know what the symptoms are and the damage they are causing to the house and the people living there. A few examples of a home with too much humidity include condensation on the windows, musty smells and wet stains on walls and ceilings. If you have noticed any of these things in your house then chances are you have humidity levels that are too high. Hygrometers are a good way of double checking this so you can be sure that humidity is what is causing the problems.
You can also have too little humidity in your home and some of the symptoms of this include having problems with electronic equipment, noticing that you have chapped skin and lips and it can even cause breathing difficulties. These are all very good reasons why it can be so important to use hygrometers in order to test that they humidity levels in your home are correct. By doing this you can easily prevent any of the above problems which will benefit both you and the environment you live in.
Quite scarily, having too high or too low levels of humidity in your house can cause long term effects. Some of these include damage to your house and furniture, developing allergies and other health problems as well. As more people are becoming aware of how important it is to check the levels of humidity in their homes, it is becoming easier to purchase hygrometers. They can be bought online which means that you don't even have to leave your home in order to get one. As well as this, they are not as expensive as people would think as they are a simple yet effective tool.
There are various other things that can be used in order to control humidity as well as using hygrometers. Dehumidifiers are helpful at resolving the problem as well as other methods such as simply remembering to open and close windows and doors depending on the current humidity levels in your home.
Family Traditions - Make One Today
Family Traditions - Make One Today
Family traditions are one of the most important things you can pass down to your children. They, in turn, pass them on to their children and soon, the family cannot even remember where it started - but everyone respects the traditions.
This provides cohesiveness within the family, not only joining the blood relatives, but also those that join the family by marriage. This allows your family members to operate in concert with one another. If you think you have no family traditions - pose this question to the grown children in your family - most of us are surprised by the answer. Even if you do not know what they are, your children can generally remind you of the things which they consider a family tradition. These customs and traditions strengthen the family, and can warm your heart.
In our family - we have a black stew pot tradition - it goes like this:
As far back as anyone could remember - it was always kept in the same place. My grandma kept it there, as did her mother, and her mother before her. They treated it like it was a valuable piece of art. Though it transferred to different houses as it was passed down, it was always on top of the refrigerator of the oldest matriarch.
That big black stew pot was made of cast iron - it seemed to weigh a ton. There was always a groan from the one that had to bring it down from its perch. From the time every family member was a toddler, we learned what it meant when it was placed on the stove.
There were only two reasons to start that huge pot of stew. Either someone was getting married or buried. The boys used to joke that it was really the same thing - but the moms never found that very funny. That pot signified there would be a family gathering. Uncles, aunts, cousins, nephews, nieces - all the people you hardly ever saw would be showing up by the end of the day. And the stew would be ready. A long-time family recipe, homemade beef stew, biscuits, real butter and jam - this was how we experienced family.
By the time the stew was cooking, we had been told whether it was a funeral or a wedding, but not in words. Grandma pulled out that old record player and we heard an Elvis Presley record cranking up. If grandma sang along with "Nearer My God to Thee" we knew a family member had gone home to be with Jesus. Any other song, there was a wedding coming up. There was no problem knowing what grandma was telling you, she was from the 'old school' where you said what you meant. As one grandma passed and another took her position as matriarch and keeper of the black stew pot, the new one took on the same persona. When the stew pot was placed into service: playing the same record, singing the appropriate song, setting the mood for the house.
When people started arriving by mid-afternoon, the stew was done - the biscuits were coming out of the oven at the same time the front door started swinging. The hugs from rarely seen aunts and uncles came first, then the cousins' discussions about who was now the tallest, who was getting the best grades and any other thing we could think of to pass the time. Soon grandma stood in the doorway and yelled "Soup's on" - we all filed into the dining room. Of course, there weren't enough chairs, but there were plenty of bowls. Grandma was busy putting a biscuit into the bottom of each bowl and then covering it with plenty of beef stew. Just a sideboard lined up with bowls and spoons. All the while, the men stood on one side of the room as if to make an important decision. Discussing who would ask the blessing - it really was a moot discussion - the oldest man there was the one who got to pray. It was a highly honored tradition, and likely why some of the old men came even though they didn't feel like it - they hoped to lead the prayer.
During the prayer was the first time that anyone said out loud what the gathering was about. Whoever led was in charge of bringing it to the Lord's attention why we were all there. This was the affirmation of our family. Praying together was the family tradition we had and we all knew how important it was. No one - from the youngest to the oldest - spoke except the one who was praying. We kept our heads down and our eyes closed, this was what we were taught and expected to do - until it was time to say "Amen" which was repeated reverently by everyone in the room.
Once the prayer was finished, we got to the business of eating - talking about the one who had passed on - or meeting the stranger in our midst. The one that was getting ready to join our family - it was time to learn about our most honored tradition. No matter which it was, this was a celebration, someone went home to be with the Lord, or someone was getting married.
Soon, the black stew pot was washed and put back on top of the refrigerator. It would be back in service soon enough.
Sometimes we forget just how important traditions are to us and all other family members. They are the backbone of our childhood memories, it is a wonderful thing to pass on traditions and customs to our children.
Family traditions are one of the most important things you can pass down to your children. They, in turn, pass them on to their children and soon, the family cannot even remember where it started - but everyone respects the traditions.
This provides cohesiveness within the family, not only joining the blood relatives, but also those that join the family by marriage. This allows your family members to operate in concert with one another. If you think you have no family traditions - pose this question to the grown children in your family - most of us are surprised by the answer. Even if you do not know what they are, your children can generally remind you of the things which they consider a family tradition. These customs and traditions strengthen the family, and can warm your heart.
In our family - we have a black stew pot tradition - it goes like this:
As far back as anyone could remember - it was always kept in the same place. My grandma kept it there, as did her mother, and her mother before her. They treated it like it was a valuable piece of art. Though it transferred to different houses as it was passed down, it was always on top of the refrigerator of the oldest matriarch.
That big black stew pot was made of cast iron - it seemed to weigh a ton. There was always a groan from the one that had to bring it down from its perch. From the time every family member was a toddler, we learned what it meant when it was placed on the stove.
There were only two reasons to start that huge pot of stew. Either someone was getting married or buried. The boys used to joke that it was really the same thing - but the moms never found that very funny. That pot signified there would be a family gathering. Uncles, aunts, cousins, nephews, nieces - all the people you hardly ever saw would be showing up by the end of the day. And the stew would be ready. A long-time family recipe, homemade beef stew, biscuits, real butter and jam - this was how we experienced family.
By the time the stew was cooking, we had been told whether it was a funeral or a wedding, but not in words. Grandma pulled out that old record player and we heard an Elvis Presley record cranking up. If grandma sang along with "Nearer My God to Thee" we knew a family member had gone home to be with Jesus. Any other song, there was a wedding coming up. There was no problem knowing what grandma was telling you, she was from the 'old school' where you said what you meant. As one grandma passed and another took her position as matriarch and keeper of the black stew pot, the new one took on the same persona. When the stew pot was placed into service: playing the same record, singing the appropriate song, setting the mood for the house.
When people started arriving by mid-afternoon, the stew was done - the biscuits were coming out of the oven at the same time the front door started swinging. The hugs from rarely seen aunts and uncles came first, then the cousins' discussions about who was now the tallest, who was getting the best grades and any other thing we could think of to pass the time. Soon grandma stood in the doorway and yelled "Soup's on" - we all filed into the dining room. Of course, there weren't enough chairs, but there were plenty of bowls. Grandma was busy putting a biscuit into the bottom of each bowl and then covering it with plenty of beef stew. Just a sideboard lined up with bowls and spoons. All the while, the men stood on one side of the room as if to make an important decision. Discussing who would ask the blessing - it really was a moot discussion - the oldest man there was the one who got to pray. It was a highly honored tradition, and likely why some of the old men came even though they didn't feel like it - they hoped to lead the prayer.
During the prayer was the first time that anyone said out loud what the gathering was about. Whoever led was in charge of bringing it to the Lord's attention why we were all there. This was the affirmation of our family. Praying together was the family tradition we had and we all knew how important it was. No one - from the youngest to the oldest - spoke except the one who was praying. We kept our heads down and our eyes closed, this was what we were taught and expected to do - until it was time to say "Amen" which was repeated reverently by everyone in the room.
Once the prayer was finished, we got to the business of eating - talking about the one who had passed on - or meeting the stranger in our midst. The one that was getting ready to join our family - it was time to learn about our most honored tradition. No matter which it was, this was a celebration, someone went home to be with the Lord, or someone was getting married.
Soon, the black stew pot was washed and put back on top of the refrigerator. It would be back in service soon enough.
Sometimes we forget just how important traditions are to us and all other family members. They are the backbone of our childhood memories, it is a wonderful thing to pass on traditions and customs to our children.
mercredi 28 octobre 2009
The Best Ways to Speed Up Your Computer - 3 Expert Tips
The Best Ways to Speed Up Your Computer - 3 Expert Tips
It is not inevitable that as your computer gets older then it will get slower too. In this article, I'll share with you my top expert tips on the best ways to speed up your computer (I used to work in Tech Support for many years).
Free Up Space on C Drive
Chances are that it is your C drive that contains your installation of Windows.
For Windows to operate quickly, it needs plenty of free space on this drive. If you get to the 2 Gig mark and less then it will suddenly slow to a halt.
Better to free up more space, at least 5 Gigs in my opinion.
Quicker Shutdown
Did you know that you don't necessarily have to wait up to 5 minutes for your computer to shut down? You can shut it down in just 2 seconds if you follow this tip.
When ready, press Ctrl-Alt-Del. This will bring up Task Manager. Now go to "Shutdown" and "Turn Off". As you click "Turn Off", make sure that you are holding down the Ctrl button on your keyboard.
Wiping Tools
Sometimes I notice that my browser is really, really slow. It seems to take the computer 10 seconds to "think" before it responds to my mouse clicks.
When this happens I use the browser options to delete all personal data. But still this is not enough.
So I have also used an "evidence eraser" application. I don't have anything to hide but I find that this gets at those hard to reach places and really speeds up my computer.
These days I just rely on a registry cleaner. These will clean your registry and other parts of your system (just like the evidence eraser), optimize your PC and much, much more. I now consider this to be essential in my computer "toolkit".
Turbocharge your computer to go faster than ever before here: Make My Computer Faster
It is not inevitable that as your computer gets older then it will get slower too. In this article, I'll share with you my top expert tips on the best ways to speed up your computer (I used to work in Tech Support for many years).
Free Up Space on C Drive
Chances are that it is your C drive that contains your installation of Windows.
For Windows to operate quickly, it needs plenty of free space on this drive. If you get to the 2 Gig mark and less then it will suddenly slow to a halt.
Better to free up more space, at least 5 Gigs in my opinion.
Quicker Shutdown
Did you know that you don't necessarily have to wait up to 5 minutes for your computer to shut down? You can shut it down in just 2 seconds if you follow this tip.
When ready, press Ctrl-Alt-Del. This will bring up Task Manager. Now go to "Shutdown" and "Turn Off". As you click "Turn Off", make sure that you are holding down the Ctrl button on your keyboard.
Wiping Tools
Sometimes I notice that my browser is really, really slow. It seems to take the computer 10 seconds to "think" before it responds to my mouse clicks.
When this happens I use the browser options to delete all personal data. But still this is not enough.
So I have also used an "evidence eraser" application. I don't have anything to hide but I find that this gets at those hard to reach places and really speeds up my computer.
These days I just rely on a registry cleaner. These will clean your registry and other parts of your system (just like the evidence eraser), optimize your PC and much, much more. I now consider this to be essential in my computer "toolkit".
Turbocharge your computer to go faster than ever before here: Make My Computer Faster
Securing Your Machine of Spyware - Common Practices
Securing Your Machine of Spyware - Common Practices
There is no ideal way of securing a computer from spyware threats. There is no end to the number of spyware programs on the internet. They exploit every possible loophole in firewall programs and web browsers to install themselves on host machines. In most cases, users can't do anything but haplessly watch whatever is happening to their machines. In order to deter spyware, users need to do certain other things in addition to getting antispyware installed on their machines.
Change Your Web Browser
Do you know that the Internet Explorer carries with it, a greater risk of infection from spywares owing to its extensive user base and other vulnerabilities like Active X? In order to counter this, many web browsers install other web browsers as well. Some of the lesser known ones are Opera, Mozilla Fire Fox and Google Chrome.
Using Web Proxies and Network Firewalls
Some organisations, especially colleges and universities are employing a different approach to counter spyware. Along with using antispyware software, most of them are making use of their web proxies andnetwork firewalls to block websites that are known for spyware infections, along with other suspected sites.
Hosts File
A number of users make use of large 'hosts file' that may prevent the computer from establishing connection with known spyware related web addresses. Spyware software though, has found a loophole in this arrangement as well. Instead of connecting to the domain name, the spyware connects itself to the IP address thereby bypassing this kind of arrangement.
Downloading from Trusted Sources
Malicious software may get installed though a number of shareware programs as well that are frequently offered for download. Along with using spyware blockers, is a good way to increase protection against spyware in order to download content from the reputed sources only.
Removing Spyware from your Computer
System Lockdown
A state of system lockdown can be achieved in a number of ways such as:
Using good-quality anti-virus software.
Disconnecting your computer from the network. Disconnecting your computer from the network will inhibit spyware controllers from gaining remote access to your computer.Using an Antispyware
After you've disconnected your machine from the internet, the next step would be to locate it on your computer and remove it manually, if possible. Another good way to go about doing it is to make use of good ant-spyware software. After you've treated your machine of all infections, you may go online but remember not to deal with potentially threatening websites.
Taking a birds-eye view of the situation, you'll clearly be able to see what this is all about: You buy a computer, computer gets infected with spyware, spyware authors pay software to infect your computer and the same software comes up with antispyware programs you need to buy in order to keep your machine clean. It's a thoroughly planned industry, an industry you can neither live with, nor live without!
For any help on Web filter, check out the info available online; these will help you learn to find the best spyware!
There is no ideal way of securing a computer from spyware threats. There is no end to the number of spyware programs on the internet. They exploit every possible loophole in firewall programs and web browsers to install themselves on host machines. In most cases, users can't do anything but haplessly watch whatever is happening to their machines. In order to deter spyware, users need to do certain other things in addition to getting antispyware installed on their machines.
Change Your Web Browser
Do you know that the Internet Explorer carries with it, a greater risk of infection from spywares owing to its extensive user base and other vulnerabilities like Active X? In order to counter this, many web browsers install other web browsers as well. Some of the lesser known ones are Opera, Mozilla Fire Fox and Google Chrome.
Using Web Proxies and Network Firewalls
Some organisations, especially colleges and universities are employing a different approach to counter spyware. Along with using antispyware software, most of them are making use of their web proxies andnetwork firewalls to block websites that are known for spyware infections, along with other suspected sites.
Hosts File
A number of users make use of large 'hosts file' that may prevent the computer from establishing connection with known spyware related web addresses. Spyware software though, has found a loophole in this arrangement as well. Instead of connecting to the domain name, the spyware connects itself to the IP address thereby bypassing this kind of arrangement.
Downloading from Trusted Sources
Malicious software may get installed though a number of shareware programs as well that are frequently offered for download. Along with using spyware blockers, is a good way to increase protection against spyware in order to download content from the reputed sources only.
Removing Spyware from your Computer
System Lockdown
A state of system lockdown can be achieved in a number of ways such as:
Using good-quality anti-virus software.
Disconnecting your computer from the network. Disconnecting your computer from the network will inhibit spyware controllers from gaining remote access to your computer.Using an Antispyware
After you've disconnected your machine from the internet, the next step would be to locate it on your computer and remove it manually, if possible. Another good way to go about doing it is to make use of good ant-spyware software. After you've treated your machine of all infections, you may go online but remember not to deal with potentially threatening websites.
Taking a birds-eye view of the situation, you'll clearly be able to see what this is all about: You buy a computer, computer gets infected with spyware, spyware authors pay software to infect your computer and the same software comes up with antispyware programs you need to buy in order to keep your machine clean. It's a thoroughly planned industry, an industry you can neither live with, nor live without!
For any help on Web filter, check out the info available online; these will help you learn to find the best spyware!
The Windows 8 Operating System
The Windows 8 Operating System
Now that Microsoft has released Windows 7, it is time to focus on Windows 8. Microsoft always starts working on the next operating system as soon as one is released. In Microsoft Windows 8, the user interface will be completely changed.
The new operating system may be called Midori, but there isn't any confirmation at this time what the actual name is going to be. At this point, it is referred to as Windows Operating System 8.
Window Operating System 8 is currently not scheduled to be released until late 2011 or early 2012. Basically that's 2-3 years after the release of the current operating system which is Windows 7. It is most likely, however, that Microsoft will ship the new Windows8 sooner than 2011.
At this point, it is not totally know what will be included in Windows Operating System 8. The Windows team has announced some features that will be included but not all. The actual list will be finalized in late 2010 when Microsoft will probably release the first beta version available to the public.
Currently, Windows operating systems operate on either 32-bit or 64-bit. It is too cumbersome on software developers to maintain dual processor codes. It is rumored that Windows Operating System 8 will be offered in 64-bit and 128-bit versions as well. Virtually every modern processor supports 64-bit computing. Many people are hoping that 32-bit support will be dropped from Windows 8. However, this probably will not happen. By the time Windows 8 is ready to launch, the cost of 128-bit chips will still be too expensive for the average consumer to purchase. Most likely, 128-bit processors will only be used in Windows 8 servers.
Also, at this point computer users wouldn't get any use from 128-bit support. There won't be any software written for it for many years, as right now most software is still only written to support 32-bit. Full 64-bit software support is only just now beginning to appear and it offers no additional benefits to the average computer user or computer gamer.
Another possible new feature of Windows 8 will be a new Hibernate/Resume engine. This means that the computer will have even faster hibernation and resume times than currently is available.
In addition, Windows 8 will also have new networking and security features built-in. It is possible that the new operating system will have a new PatchGuard system that stops viruses from changing system files. This feature was not released in Windows 7.
It will also have better multimonitor support. Many computer users today are using two monitors to better multitask. It is also rumored there may even be support for three or more screens.
It is also being said that Windows 8 will run on what is called the ARM chip, which is what is commonly used in smartphones. With this type of chip, it is possible that a mobile version of Windows may be available. It could be run with much lower system specifications than those currently required on PCs.
The new operating system will also have what is called DFSR service or Distributed File System Replication. This will be a feature used in Windows 8 Server. It is a folder system engine that will allow for folder synchronization across multiple servers.
Many computers users are very excited about the release of Windows Operating System 8 because Windows 7 was basically an upgrade to Vista. Windows 8 is supposed to open up a whole, new world in terms of Microsoft Windows Operating Systems.
Windows 8 News is a technology site dedicated to Microsoft's upcoming operating system Windows 8. It features the latest news, rumors and media.
Now that Microsoft has released Windows 7, it is time to focus on Windows 8. Microsoft always starts working on the next operating system as soon as one is released. In Microsoft Windows 8, the user interface will be completely changed.
The new operating system may be called Midori, but there isn't any confirmation at this time what the actual name is going to be. At this point, it is referred to as Windows Operating System 8.
Window Operating System 8 is currently not scheduled to be released until late 2011 or early 2012. Basically that's 2-3 years after the release of the current operating system which is Windows 7. It is most likely, however, that Microsoft will ship the new Windows8 sooner than 2011.
At this point, it is not totally know what will be included in Windows Operating System 8. The Windows team has announced some features that will be included but not all. The actual list will be finalized in late 2010 when Microsoft will probably release the first beta version available to the public.
Currently, Windows operating systems operate on either 32-bit or 64-bit. It is too cumbersome on software developers to maintain dual processor codes. It is rumored that Windows Operating System 8 will be offered in 64-bit and 128-bit versions as well. Virtually every modern processor supports 64-bit computing. Many people are hoping that 32-bit support will be dropped from Windows 8. However, this probably will not happen. By the time Windows 8 is ready to launch, the cost of 128-bit chips will still be too expensive for the average consumer to purchase. Most likely, 128-bit processors will only be used in Windows 8 servers.
Also, at this point computer users wouldn't get any use from 128-bit support. There won't be any software written for it for many years, as right now most software is still only written to support 32-bit. Full 64-bit software support is only just now beginning to appear and it offers no additional benefits to the average computer user or computer gamer.
Another possible new feature of Windows 8 will be a new Hibernate/Resume engine. This means that the computer will have even faster hibernation and resume times than currently is available.
In addition, Windows 8 will also have new networking and security features built-in. It is possible that the new operating system will have a new PatchGuard system that stops viruses from changing system files. This feature was not released in Windows 7.
It will also have better multimonitor support. Many computer users today are using two monitors to better multitask. It is also rumored there may even be support for three or more screens.
It is also being said that Windows 8 will run on what is called the ARM chip, which is what is commonly used in smartphones. With this type of chip, it is possible that a mobile version of Windows may be available. It could be run with much lower system specifications than those currently required on PCs.
The new operating system will also have what is called DFSR service or Distributed File System Replication. This will be a feature used in Windows 8 Server. It is a folder system engine that will allow for folder synchronization across multiple servers.
Many computers users are very excited about the release of Windows Operating System 8 because Windows 7 was basically an upgrade to Vista. Windows 8 is supposed to open up a whole, new world in terms of Microsoft Windows Operating Systems.
Windows 8 News is a technology site dedicated to Microsoft's upcoming operating system Windows 8. It features the latest news, rumors and media.
How to Know When You Should Use Windows Repair Software
How to Know When You Should Use Windows Repair Software
Most of us tend to take our computer for granted - once we load the applications of our choice, we expect it to work satisfactorily and never give us any trouble. What most of us tend o forget that a computer is like any other piece of machinery or equipment. You need to take care of it periodically - yes, I mean you have to get your hands dirty once in a while.
You may need to open it up and use a vacuum cleaner to remove dust particles, make sure the airways are not clogged and that there is proper ventilation. This will reduce the chances of failure of the computer and keep it in working condition. This is not all - hardware maintenance is only part of the routine. Since software is an important part of a computer, it is equally, if not more important to ensure that your applications are consistent and that there are no errors. This is where Windows repair software can help you.
How does a Windows repair software help? What this kind of software does is that it checks the registry for errors and inconsistencies. The registry is a database in Windows Operating Systems that includes information about software applications available in the computer.
Why should the registry develop errors, you ask? This is because most applications use some common files and as you add and remove software, there are chances that these shared files might get deleted or corrupt. Then other programs that use them will stop working. Depending upon how crucial that program is; you may experience mild to severe computer malfunction. Windows repair software can help you correct these inconsistencies and resolve errors in the registry.
Windows repair software can also help you analyze your registry - you can use such software to see if your registry has issues. You can then decide whether you want to correct those errors. It is a good practice to check your registry for errors periodically, especially if you add/remove applications frequently. Getting a cleaner is easy - a Web search should give you several options.
Want to know which registry repair program our research found to be the best of all? Want to get your slow computer back to full speed quickly and easily? Try Registry Easy and see the difference in your system's performance
Most of us tend to take our computer for granted - once we load the applications of our choice, we expect it to work satisfactorily and never give us any trouble. What most of us tend o forget that a computer is like any other piece of machinery or equipment. You need to take care of it periodically - yes, I mean you have to get your hands dirty once in a while.
You may need to open it up and use a vacuum cleaner to remove dust particles, make sure the airways are not clogged and that there is proper ventilation. This will reduce the chances of failure of the computer and keep it in working condition. This is not all - hardware maintenance is only part of the routine. Since software is an important part of a computer, it is equally, if not more important to ensure that your applications are consistent and that there are no errors. This is where Windows repair software can help you.
How does a Windows repair software help? What this kind of software does is that it checks the registry for errors and inconsistencies. The registry is a database in Windows Operating Systems that includes information about software applications available in the computer.
Why should the registry develop errors, you ask? This is because most applications use some common files and as you add and remove software, there are chances that these shared files might get deleted or corrupt. Then other programs that use them will stop working. Depending upon how crucial that program is; you may experience mild to severe computer malfunction. Windows repair software can help you correct these inconsistencies and resolve errors in the registry.
Windows repair software can also help you analyze your registry - you can use such software to see if your registry has issues. You can then decide whether you want to correct those errors. It is a good practice to check your registry for errors periodically, especially if you add/remove applications frequently. Getting a cleaner is easy - a Web search should give you several options.
Want to know which registry repair program our research found to be the best of all? Want to get your slow computer back to full speed quickly and easily? Try Registry Easy and see the difference in your system's performance
Common Issues and Solutions If Windows Update Will Not Install
Common Issues and Solutions If Windows Update Will Not Install
You were running a Windows program. You tried to install the updates through the Microsoft Update website or from the yellow shield in my notification tray. You received an error message that states the update or the updates were not installed successfully. The conditions are true to the following situations:
• You try to update a computer which is running a Windows XP.
• The Windows XP was repaired using the Windows XP CD.
• A new installation of Windows XP Service Pack 2 (SP2) was performed.
• There was an immediate performance update to Windows XP Service Pack 3 (SP3) and visited the windows update site directly.
The best things you can do are the following:
• Check your Windows version and make sure you have the latest one. If the product key is invalid, the window installed is known to be used heavily on pirated versions of Windows XP. To check if the product is true, try to visit microsoft.com/resources/howtotell/ww/windows/default.mspx
• There might be a blockage on the Background Intelligent Transfer Service (BITS) service. It means that you cannot install the updates that you download from the windows update website. To resolve this problem, restart BITS service and follow the steps: Click Start, Run, type services.msc in the open field and click OK. Double-click Background Intelligent Transfer Service under the list services. In the Startup type list, click Automatic and then click Start. Click Apply then click OK. Restart Computer in the end.
• View the update log in on your Windows. You may check all transaction information to the following log file: %windir%\windowsupdate.log. If an error message appears on the Microsoft Windows Update website or from the Automatic Updates service, you can use the information in the Windows log file to troubleshoot the issue. To view the log files: Click Start, then click Run. In the Open box, type windowsupdate.log, then click OK.
Best Registry Cleaners: Serving Over 6 Million IT Professionals Worldwide Protect your investment and ensure maximum PC speed and performance with RegCure registry cleaner. Top Registry Cleaner: As Seen on CNET: Compatible with all Microsoft products and third party applications, RegCure seeks out and repairs those issues in your registry that lead to poor performance such as remnants left behind on your registry from failed installations, incomplete un-installations, disabled drivers, and spyware applications.
You were running a Windows program. You tried to install the updates through the Microsoft Update website or from the yellow shield in my notification tray. You received an error message that states the update or the updates were not installed successfully. The conditions are true to the following situations:
• You try to update a computer which is running a Windows XP.
• The Windows XP was repaired using the Windows XP CD.
• A new installation of Windows XP Service Pack 2 (SP2) was performed.
• There was an immediate performance update to Windows XP Service Pack 3 (SP3) and visited the windows update site directly.
The best things you can do are the following:
• Check your Windows version and make sure you have the latest one. If the product key is invalid, the window installed is known to be used heavily on pirated versions of Windows XP. To check if the product is true, try to visit microsoft.com/resources/howtotell/ww/windows/default.mspx
• There might be a blockage on the Background Intelligent Transfer Service (BITS) service. It means that you cannot install the updates that you download from the windows update website. To resolve this problem, restart BITS service and follow the steps: Click Start, Run, type services.msc in the open field and click OK. Double-click Background Intelligent Transfer Service under the list services. In the Startup type list, click Automatic and then click Start. Click Apply then click OK. Restart Computer in the end.
• View the update log in on your Windows. You may check all transaction information to the following log file: %windir%\windowsupdate.log. If an error message appears on the Microsoft Windows Update website or from the Automatic Updates service, you can use the information in the Windows log file to troubleshoot the issue. To view the log files: Click Start, then click Run. In the Open box, type windowsupdate.log, then click OK.
Best Registry Cleaners: Serving Over 6 Million IT Professionals Worldwide Protect your investment and ensure maximum PC speed and performance with RegCure registry cleaner. Top Registry Cleaner: As Seen on CNET: Compatible with all Microsoft products and third party applications, RegCure seeks out and repairs those issues in your registry that lead to poor performance such as remnants left behind on your registry from failed installations, incomplete un-installations, disabled drivers, and spyware applications.
How a Variable Annuity Can Contribute to Your Retirement
How a Variable Annuity Can Contribute to Your Retirement
A variable annuity is similar to a 401k in some respects. You can choose which investments you would like to add into your portfolio. The premium can be divided with portions being used to fund several subaccounts that are diversified according to risk. These separate investments may include an ultra conservative money market fund, bonds, mutual funds, and more risky areas such as international equities. When purchasing these products, you have the choice of either making a full premium payment upfront or investing into the fund by making your payments over a set period of time.
You can typically expect the following features from a variable annuity:
* A flexible premium that is paid either in a simple upfront payment or invested in gradually over time.
* Offer more equitable investments such as stocks and mutual funds as opposed to CDs.
* You choose the risk level of your investments and allocate among them however you like.
* You are able to shift your investments without penalty as you wish in order to adjust to the market.
* You receive checks every month with a rate of return depending on the performance of your investments.
* Generally, you are free to invest as much as you like tax free.
If you are interested in getting the maximum return on your investment, then it is recommended that you choose a variable annuity as opposed to the fixed rate alternative. They have provided higher yields historically, with the catch being that there is greater risk over short and medium time periods. It is impossible predict just how risky investments will perform, but judging from the past they can typically be expected to yield up to 12 percent over a period of 10 years or more.
Although this is a very trusted and widely used investment, it is a good idea to become familiar with the disadvantages of these annuities as well. For example, if you make any withdrawals for income before you reach the age of 59.5 you will be charged a 10 percent tax penalty. In addition, they are not considered to be a capital gain so although the growth is deferred, you will still be taxed according to the regular income tax rates. There are also certain fees associated with these accounts such as management and annual contract fees to cover certain expenses.
If you would like to find the variable annuity that will give you the highest yields, you will first have to be experienced in managing flexibility in your investments. The right financial advisor can help you to choose the investments that will make you the most money.
Lisa Cintron is Executive Vice President at AdvisorWorld.com.
http://www.AdvisorWorld.com will help you find the best advisor for you from a comprehensive database of financial professionals who are ranked based on the feedback of users just like you. They offer this service completely for free and with no obligation on your part.
A variable annuity is similar to a 401k in some respects. You can choose which investments you would like to add into your portfolio. The premium can be divided with portions being used to fund several subaccounts that are diversified according to risk. These separate investments may include an ultra conservative money market fund, bonds, mutual funds, and more risky areas such as international equities. When purchasing these products, you have the choice of either making a full premium payment upfront or investing into the fund by making your payments over a set period of time.
You can typically expect the following features from a variable annuity:
* A flexible premium that is paid either in a simple upfront payment or invested in gradually over time.
* Offer more equitable investments such as stocks and mutual funds as opposed to CDs.
* You choose the risk level of your investments and allocate among them however you like.
* You are able to shift your investments without penalty as you wish in order to adjust to the market.
* You receive checks every month with a rate of return depending on the performance of your investments.
* Generally, you are free to invest as much as you like tax free.
If you are interested in getting the maximum return on your investment, then it is recommended that you choose a variable annuity as opposed to the fixed rate alternative. They have provided higher yields historically, with the catch being that there is greater risk over short and medium time periods. It is impossible predict just how risky investments will perform, but judging from the past they can typically be expected to yield up to 12 percent over a period of 10 years or more.
Although this is a very trusted and widely used investment, it is a good idea to become familiar with the disadvantages of these annuities as well. For example, if you make any withdrawals for income before you reach the age of 59.5 you will be charged a 10 percent tax penalty. In addition, they are not considered to be a capital gain so although the growth is deferred, you will still be taxed according to the regular income tax rates. There are also certain fees associated with these accounts such as management and annual contract fees to cover certain expenses.
If you would like to find the variable annuity that will give you the highest yields, you will first have to be experienced in managing flexibility in your investments. The right financial advisor can help you to choose the investments that will make you the most money.
Lisa Cintron is Executive Vice President at AdvisorWorld.com.
http://www.AdvisorWorld.com will help you find the best advisor for you from a comprehensive database of financial professionals who are ranked based on the feedback of users just like you. They offer this service completely for free and with no obligation on your part.
PNC Bank Online Banking
PNC Bank Online Banking
PNC Bank Online Banking is the service offered by PNC Bank to its customers and accountholders. Through this service, the bank helps you:
Access your PNC Banking accounts any time of the day, from anywhere in the world.
Save on time by performing various banking functions over the net.
Banking Facilities Offered by PNC-Bank Online Banking
The Bank has provided its customers and accountholders several facilities through the Internet Banking service. This free-of-cost online banking service helps account holders:
Stay in touch with their finances by providing them a comprehensive summary of their PNC personal, business and investment accounts.
View their monthly statements and print and download the statements for the period of up to 36 months.
Access their accounts, check their account balances and review recent transactions for accuracy and authenticity.
Transfer funds from one account to another over the net. The transfer of money can be done between two PNC Bank accounts or between a valid PNC-Bank account and a valid account at any other financial institution.
Receive their bills online. This reduces probability of customers incurring a fine due to delay in bills.
Save time and money by enabling them to pay their bills online.
Toremaininformed about every event related to their accounts and bills through e-mail notifications.
Additional Facilities Offered by the PNC-Bank Online Banking Service
Through the Internet Banking service of PNC Bank, accountholders can also:
Change their personal information
Order for checkbook
Make request for stop payments and copies of deposit slips, cleared checks or account statements
Sign in for additional services such as Verified by Visa and PNC FYIs & Deals
Locate ATMs or branches of PNC Banks
Explore product information, tools, articles and special offers.
However, to use PNC Bank Online Banking, accountholders need to register for the service. They can do so over the net through the bank's website.
Kitz is and internet marketing professional & is working with Veda Informatics, a content development services & web development services company. Kitz also is a social media geek, having vast social network presence over several social media sites.
PNC Bank Online Banking is the service offered by PNC Bank to its customers and accountholders. Through this service, the bank helps you:
Access your PNC Banking accounts any time of the day, from anywhere in the world.
Save on time by performing various banking functions over the net.
Banking Facilities Offered by PNC-Bank Online Banking
The Bank has provided its customers and accountholders several facilities through the Internet Banking service. This free-of-cost online banking service helps account holders:
Stay in touch with their finances by providing them a comprehensive summary of their PNC personal, business and investment accounts.
View their monthly statements and print and download the statements for the period of up to 36 months.
Access their accounts, check their account balances and review recent transactions for accuracy and authenticity.
Transfer funds from one account to another over the net. The transfer of money can be done between two PNC Bank accounts or between a valid PNC-Bank account and a valid account at any other financial institution.
Receive their bills online. This reduces probability of customers incurring a fine due to delay in bills.
Save time and money by enabling them to pay their bills online.
Toremaininformed about every event related to their accounts and bills through e-mail notifications.
Additional Facilities Offered by the PNC-Bank Online Banking Service
Through the Internet Banking service of PNC Bank, accountholders can also:
Change their personal information
Order for checkbook
Make request for stop payments and copies of deposit slips, cleared checks or account statements
Sign in for additional services such as Verified by Visa and PNC FYIs & Deals
Locate ATMs or branches of PNC Banks
Explore product information, tools, articles and special offers.
However, to use PNC Bank Online Banking, accountholders need to register for the service. They can do so over the net through the bank's website.
Kitz is and internet marketing professional & is working with Veda Informatics, a content development services & web development services company. Kitz also is a social media geek, having vast social network presence over several social media sites.
Why Do People Pay to Pay Their Bills?
Why Do People Pay to Pay Their Bills?
Admit it, paying your bills is just about as fun as pulling your teeth. It's like throwing $100 bills into a toilet and watching it go slowly down the drain. Maybe that is a little dramatic, but it is still one of the least enjoyed events of the month. Why is it that so many people continue to make it even more excruciating by spending time and money doing it?
If everyone would simply take a few minutes to set up bill payment online, they would be pain-free. Most banks offer free online bill pay as a service to their customers. They offer this free service to ad value to their customers because competition with banks is so heavy. Online bill pay is a useful service that is not used to its capacity.
Online bill pay is great, but it is not the greatest solution to paying for your monthly expenses. The best solution is auto-pay. Auto-pay is not offered by all companies, but most of them are starting to add this as a service to their members. It works by setting up a credit card, debit card, or even a bank account with the service provider so that they will automatically bill withdraw the amount owed out of your account.
Most of your monthly bills like insurance, utilities, cable, internet, and phone can be set up on auto-pay. It will take you a few minutes to contact your provider to provide them with the necessary information, but you will save huge amounts of time in the future! Your time is valuable, why waste it paying your bills?
For the bills that you cannot use auto-pay, just use the online bill pay with your bank so that you are not paying for postage, licking stamps, and spending twice as long filing paper work. Start paying for your bills online to make your life easier and save a little money at the same time!
Admit it, paying your bills is just about as fun as pulling your teeth. It's like throwing $100 bills into a toilet and watching it go slowly down the drain. Maybe that is a little dramatic, but it is still one of the least enjoyed events of the month. Why is it that so many people continue to make it even more excruciating by spending time and money doing it?
If everyone would simply take a few minutes to set up bill payment online, they would be pain-free. Most banks offer free online bill pay as a service to their customers. They offer this free service to ad value to their customers because competition with banks is so heavy. Online bill pay is a useful service that is not used to its capacity.
Online bill pay is great, but it is not the greatest solution to paying for your monthly expenses. The best solution is auto-pay. Auto-pay is not offered by all companies, but most of them are starting to add this as a service to their members. It works by setting up a credit card, debit card, or even a bank account with the service provider so that they will automatically bill withdraw the amount owed out of your account.
Most of your monthly bills like insurance, utilities, cable, internet, and phone can be set up on auto-pay. It will take you a few minutes to contact your provider to provide them with the necessary information, but you will save huge amounts of time in the future! Your time is valuable, why waste it paying your bills?
For the bills that you cannot use auto-pay, just use the online bill pay with your bank so that you are not paying for postage, licking stamps, and spending twice as long filing paper work. Start paying for your bills online to make your life easier and save a little money at the same time!
What is Peer to Peer Lending
What is Peer to Peer Lending
Peer to peer lending could also be called people to people lending. At the very simplest this is a way for ordinary people to request a loan and for other everyday ordinary people to partially or fully fund the loan. So how does peer to peer lending work?
Usually it's administered by a company like Lending Club or Prosper. If you will imagine these companies acting as the central marketplace where lenders and borrowers come to meet. Just like if a borrow were to request a loan online from a bank, they would go to one of the previously mentioned websites and request a loan. Here is where things take a turn for the better. Instead of some big powerful bank with unlimited power determining whether a loan will be approved or not, it is left up to the community of peers who are also lenders/investors in these private loans.
Each of the investors are able to review loans submitted as well as any credit report information provided with the loan. Investors choose to lend as little as $25 up to the full amount of the loan. When the loan is funded and the identity is verified by the administration company (Lending Club for example). Then the borrower will receive the funds and begin making monthly payments to the administration company; who will redistribute funds proportionally to each investor plus the interest earned for providing the loan.
To recap peer to peer lending is a model of lending based on receiving loans form a community of individuals versus directly from a bank. There are huge advantages to this model for the borrows and the lenders both.
Jackie O'Quinn, is a home based entrepreneur who also carries a high degree of cutting edge financial knowledge. Mr. O'Quinn, is a fan of Peer to Peer Lending and is an investor on Lendng Club.
Peer to peer lending could also be called people to people lending. At the very simplest this is a way for ordinary people to request a loan and for other everyday ordinary people to partially or fully fund the loan. So how does peer to peer lending work?
Usually it's administered by a company like Lending Club or Prosper. If you will imagine these companies acting as the central marketplace where lenders and borrowers come to meet. Just like if a borrow were to request a loan online from a bank, they would go to one of the previously mentioned websites and request a loan. Here is where things take a turn for the better. Instead of some big powerful bank with unlimited power determining whether a loan will be approved or not, it is left up to the community of peers who are also lenders/investors in these private loans.
Each of the investors are able to review loans submitted as well as any credit report information provided with the loan. Investors choose to lend as little as $25 up to the full amount of the loan. When the loan is funded and the identity is verified by the administration company (Lending Club for example). Then the borrower will receive the funds and begin making monthly payments to the administration company; who will redistribute funds proportionally to each investor plus the interest earned for providing the loan.
To recap peer to peer lending is a model of lending based on receiving loans form a community of individuals versus directly from a bank. There are huge advantages to this model for the borrows and the lenders both.
Jackie O'Quinn, is a home based entrepreneur who also carries a high degree of cutting edge financial knowledge. Mr. O'Quinn, is a fan of Peer to Peer Lending and is an investor on Lendng Club.
FUEL TRIM(MING) DIAGNOSTIC TIME
FUEL TRIM(MING) DIAGNOSTIC TIME
No matter what the driveability issue happens to be, beginning by checking the PCM's fuel trim decisions can get you pointed in the right direction, and may end up cutting your diagnostic time in half.
The year is 2006, and for those who may have overlooked it, this is the 10th anniversary of On-Board Diagnosties II (OBD II). I believe its cause for celebration. Here's an example of how it used to be: I was recently called to help a shop with a 1992 Subaru. In order to retrieve the diagnostic trouble codes (DTCs), I had to remove the driver's kick panel, visit a vehicle repair information source for the instructions on how to jumper the diagnostic connector, then count the flashes of the malfunction indicator light (MIL). The final step was looking up the DTC description. Total time from start to finish was approximately 15 minutes. If this had been an OBD II vehicle, I would have had the information in under 30 seconds. The standardization associated with OBD II, which gives us easy access to fuel trim data, has really simplified the diagnostic process.
What is fuel trim? Fuel trim is a window that allows you to see what the computer is doing to control fuel delivery and determine how the PCM's adaptive strategy is operating.
Why was fuel trim created? In order for vehicle manufacturers to comply with EPA emissions regulations, catalytic converters were added to reduce tailpipe emissions. Catalytic converters need a stoichiometric air/fuel ratio of approximately 14.7:1 to obtain the greatest emissions reductions. Vehicle engineers designed closed-loop engine control systems to maintain that ratio, adjusting injector pulse width based on information from die oxygen sensor and other inputs. Short-term fuel trim (STFT) and long-term fuel trim (LTFT) are expressed as a percentage, and the ideal range should be within ±5%.
Positive fuel trim percentages indicate that the powertrain control module (PCM) is attempting to richen the fuel mixture, to compensate for a perceived lean condition. Negative fuel trim percentages indicate the PCM is attempting to lean out the fuel mixture, to compensate for a perceived rich condition. STFT and LTFT percentages are the adjustments made by the PCM to maintain the 14.7:1 ratio.
No matter what the driveability issue happens to be, the fuel trim window should be used first to check the STFT and LTFT parameters.
There are two basic fuel control systems used on most vehicles: speed density systems, which use rpm, manifold absolute pressure (MAP) and barometric pressure (BARO) to calculate engine load, and mass airflow systems, which use the mass airflow sensor (MAF) and rpm. to calculate engine load. In both cases, the PCM begins with a standard injector pulse width calculation, based on various inputs and internal fuel cell tables.
The equation used by early Chrysler speed density OBD II vehicles to establish initial pulse width is: Injector Pulse Width = (RPM × MAP/BARO) × TPS × ECT × IAT × Battery Volts × O2 (Short Term x Long Term). Once the vehicle is running and the engine control system enters closed-loop, the PCM relies primarily on feedback from, the oxygen sensor to determine if the stoichiometric air/fuel ratio is being maintained.
Think of closed-loop operation as a Sense-Decide-React sequence. The Closed Loop System Operation sequence in Fig. 1 on page 66 provides an explanation of the Sense-DecideReact process. The PCM determines the base injector pulse width as described above. Once the system enters closed-loop, the Sense phase begins, and is handled by the oxygen sensor. In the Decide phase, the PCM uses the oxygen sensor data to determine if the proper 14.7:1 air/fuel ratio is being maintained. If the ratio is correct, the PCM decides that no change should be made to the injector pulse width. In this scenario, the React phase maintains the same injector pulse width. However, if the air/fuel ratio is 16.1:1 (lean) during the Sense phase, the PCM makes the decision to increase the injector pulse width to correct the lean air/fuel ratio condition. In the React phase, the PCM commands the fuel injector to stay open longer. The Sense-Decide-React sequence continues throughout closed-loop operation, maintaining the proper air/fuel ratio.
During closed-loop operation, the PCM reports changes in fuel trim calculations via the OBD II generic data parameters short-term and long-term fuel trim. STFT for most vehicles will normally sweep rapidly in response to the oxygen sensor. In many cases, if you graph Bank 1 STFT and BlSl O2 sensor, you'll see the oxygen sensor go rich and STFT go lean to adjust the air/fuel ratio. The oxygen sensor will then go lean and STFT will go rich.
LTFT for most vehicles will remain more stable, adjusting over a longer period of time. On some vehicles, if STFT has reached the specified limit, LTFT will change in a few seconds. On other vehicles it may take 15 to 20 seconds before a change occurs. The LTFT calculation is normally kept in memory, so the PCM is ready to use the last known injector pulse width following a restart. STFT will normally begin at 0% and adjust to the current conditions. Both STFT and LTFT will normally reset when all trouble codes are cleared.
No matter what the driveability issue happens to be, beginning by checking the PCM's fuel trim decisions can get you pointed in the right direction, and may end up cutting your diagnostic time in half.
The year is 2006, and for those who may have overlooked it, this is the 10th anniversary of On-Board Diagnosties II (OBD II). I believe its cause for celebration. Here's an example of how it used to be: I was recently called to help a shop with a 1992 Subaru. In order to retrieve the diagnostic trouble codes (DTCs), I had to remove the driver's kick panel, visit a vehicle repair information source for the instructions on how to jumper the diagnostic connector, then count the flashes of the malfunction indicator light (MIL). The final step was looking up the DTC description. Total time from start to finish was approximately 15 minutes. If this had been an OBD II vehicle, I would have had the information in under 30 seconds. The standardization associated with OBD II, which gives us easy access to fuel trim data, has really simplified the diagnostic process.
What is fuel trim? Fuel trim is a window that allows you to see what the computer is doing to control fuel delivery and determine how the PCM's adaptive strategy is operating.
Why was fuel trim created? In order for vehicle manufacturers to comply with EPA emissions regulations, catalytic converters were added to reduce tailpipe emissions. Catalytic converters need a stoichiometric air/fuel ratio of approximately 14.7:1 to obtain the greatest emissions reductions. Vehicle engineers designed closed-loop engine control systems to maintain that ratio, adjusting injector pulse width based on information from die oxygen sensor and other inputs. Short-term fuel trim (STFT) and long-term fuel trim (LTFT) are expressed as a percentage, and the ideal range should be within ±5%.
Positive fuel trim percentages indicate that the powertrain control module (PCM) is attempting to richen the fuel mixture, to compensate for a perceived lean condition. Negative fuel trim percentages indicate the PCM is attempting to lean out the fuel mixture, to compensate for a perceived rich condition. STFT and LTFT percentages are the adjustments made by the PCM to maintain the 14.7:1 ratio.
No matter what the driveability issue happens to be, the fuel trim window should be used first to check the STFT and LTFT parameters.
There are two basic fuel control systems used on most vehicles: speed density systems, which use rpm, manifold absolute pressure (MAP) and barometric pressure (BARO) to calculate engine load, and mass airflow systems, which use the mass airflow sensor (MAF) and rpm. to calculate engine load. In both cases, the PCM begins with a standard injector pulse width calculation, based on various inputs and internal fuel cell tables.
The equation used by early Chrysler speed density OBD II vehicles to establish initial pulse width is: Injector Pulse Width = (RPM × MAP/BARO) × TPS × ECT × IAT × Battery Volts × O2 (Short Term x Long Term). Once the vehicle is running and the engine control system enters closed-loop, the PCM relies primarily on feedback from, the oxygen sensor to determine if the stoichiometric air/fuel ratio is being maintained.
Think of closed-loop operation as a Sense-Decide-React sequence. The Closed Loop System Operation sequence in Fig. 1 on page 66 provides an explanation of the Sense-DecideReact process. The PCM determines the base injector pulse width as described above. Once the system enters closed-loop, the Sense phase begins, and is handled by the oxygen sensor. In the Decide phase, the PCM uses the oxygen sensor data to determine if the proper 14.7:1 air/fuel ratio is being maintained. If the ratio is correct, the PCM decides that no change should be made to the injector pulse width. In this scenario, the React phase maintains the same injector pulse width. However, if the air/fuel ratio is 16.1:1 (lean) during the Sense phase, the PCM makes the decision to increase the injector pulse width to correct the lean air/fuel ratio condition. In the React phase, the PCM commands the fuel injector to stay open longer. The Sense-Decide-React sequence continues throughout closed-loop operation, maintaining the proper air/fuel ratio.
During closed-loop operation, the PCM reports changes in fuel trim calculations via the OBD II generic data parameters short-term and long-term fuel trim. STFT for most vehicles will normally sweep rapidly in response to the oxygen sensor. In many cases, if you graph Bank 1 STFT and BlSl O2 sensor, you'll see the oxygen sensor go rich and STFT go lean to adjust the air/fuel ratio. The oxygen sensor will then go lean and STFT will go rich.
LTFT for most vehicles will remain more stable, adjusting over a longer period of time. On some vehicles, if STFT has reached the specified limit, LTFT will change in a few seconds. On other vehicles it may take 15 to 20 seconds before a change occurs. The LTFT calculation is normally kept in memory, so the PCM is ready to use the last known injector pulse width following a restart. STFT will normally begin at 0% and adjust to the current conditions. Both STFT and LTFT will normally reset when all trouble codes are cleared.
TRANSFER CASE STUDIES: DIAGNOSING GM's 4WD SYSTEM
TRANSFER CASE STUDIES: DIAGNOSING GM's 4WD SYSTEM
Access to DTCs can simplify any system diagnosis. But as two separate cases on GM's 4WD system reveal, these codes are not always 100% accurate.
GM has used many different four-wheeldrive control systems in its vehicles over the years, ranging from pure mechanical to electronically controlled. Each has its own diagnostic procedures, and the best source for understanding how these systems work will always be your information system.
Some later model 4WD systems have scan tool capabilities along with diagnostic trouble codes (DTCs) to help locate and diagnose many of the problems associated with them.
We looked at twu GM K 1500 trucks that have the NVG 246 two-speed transfer case. One is a 1999 model, the other a 2000. Both use the same controls and happen to have stored the same DTC. The basic system consists of a transfer case motor and encoder, Front differential actuator, trans for case module, speed sensors, switches and park input and output to the PCM. It seems logical to use case studies to show how these systems can he repaired.
The transfer case module data can be accessed with a scan tool such as the Tech 2, which is GM's official scan tool. To get to the proper screens, you must choose the Powertrain selection, then navigate your way to the ATC selections. ATC is the GM acronym for acMoe transfer case. As with any module/computer-based diagnostic strategy, it's always a good idea to make checking DTCs one of the first steps in your diagnosis. These two trucks have 19 possible DTCs, including those for input, motor, encoder and even VIN codes.
Selecting "F1" on the menu got us where we needed to be. Both trucks had one DTC stored: B2725 (active transfer case mode switch malf'unction). A Tech 2 information screen will also let you know whether certain 4WD systems do not allow scan tool access.
The dash-mounted transfer case mode control is a set of normally open switches that vary the voltage supplied by the transfer case module when closed. The transfer case mod- ule sends 8 volts to the switches, then monitors the return circuit to deter- mine whether any of the switches is depressed. It can determine this because each switch has a different resistor in series with the circuit. Since both trucks have mode switch trouble codes, it seems logical to start there.
On the 2000 GM truck, the com- plaint was no four-wheel drive, and the 4WD light in the IPC (instrument panel cluster) came on at times. (This warning light, located in the left-side LED indicator, can display various messages, from "Security" to "Low Fuel" and even "4WD/AWD.") Any ATC system malfunction will turn on this light to alert the driver of a problem. A trouble code is also stored at that time.
Armed with the complaint and DTC B2725, I was ready to continue my diagnosis. I simply pressed the buttons while watching the scan data. As I pressed various buttons, the scan data would not indicate the proper input. Pressing "4HI" or "4LO" would not always result in the data stream reflecting that condition. Also, the LEDs on the switch would randomly go on and off.
The easiest way to confirm this problem is to tap on the button and watch the scan data along with the switch LEDs. When we did this, it caused all kinds of random lights and data readings. At one point, it even turned on the 4WD warning indicator. It was obvious the switch had a mind of its own and needed replacement.
It's always nice to have such an easy diagnosis, but should we assume that all B2725 DTCs indicate the need for a switch replacement? After all, General Motors TSB No. 02-0421-004 indicates a known problem with this switch assembly.
Before we look at the other truck, it might be useful to see what GM's ESI website (www.acdelcotds.com) information says about B2725, to get a better understanding of the systems design characteristics. The following description comes from document ID No. 375434:
"The transfer case shift control module constantly monitors this signal voltage to determine the condition of the mode switch circuit. If no buttons are pressed, and the transfer case shift control module detects a voltage level outside the possible range (approx. 0.5-1.0 volts) for longer than 5 minutes, the transfer case shift control module will set this DTC if a button is held down or sticks for a period longer than 5 minutes. When each of the switches is depressed they will complete a circuit through their own specific resistor. The transfer case shift control module continuously monitors the switch input to determine whether the 4HI, AUTO 4WD, 2HI, and 4LO button selections are made by the driver."
Now we move on to the 1999 model K 1500 truck. The customer complained of no 4WD operation. He did not mention any warning lights, but it seemed like a good idea to check DTCs anyway. As mentioned earlier, this one had the same DTC B2725 stored. A quick check of the switches did not indicate any problem with the inputs from the switch to the module while monitoring scan data. However, the front wheels would not engage when the 4WD button was selected. A problem was obviously occurring, but the DTC did not seem to match the system malfunction.
Access to DTCs can simplify any system diagnosis. But as two separate cases on GM's 4WD system reveal, these codes are not always 100% accurate.
GM has used many different four-wheeldrive control systems in its vehicles over the years, ranging from pure mechanical to electronically controlled. Each has its own diagnostic procedures, and the best source for understanding how these systems work will always be your information system.
Some later model 4WD systems have scan tool capabilities along with diagnostic trouble codes (DTCs) to help locate and diagnose many of the problems associated with them.
We looked at twu GM K 1500 trucks that have the NVG 246 two-speed transfer case. One is a 1999 model, the other a 2000. Both use the same controls and happen to have stored the same DTC. The basic system consists of a transfer case motor and encoder, Front differential actuator, trans for case module, speed sensors, switches and park input and output to the PCM. It seems logical to use case studies to show how these systems can he repaired.
The transfer case module data can be accessed with a scan tool such as the Tech 2, which is GM's official scan tool. To get to the proper screens, you must choose the Powertrain selection, then navigate your way to the ATC selections. ATC is the GM acronym for acMoe transfer case. As with any module/computer-based diagnostic strategy, it's always a good idea to make checking DTCs one of the first steps in your diagnosis. These two trucks have 19 possible DTCs, including those for input, motor, encoder and even VIN codes.
Selecting "F1" on the menu got us where we needed to be. Both trucks had one DTC stored: B2725 (active transfer case mode switch malf'unction). A Tech 2 information screen will also let you know whether certain 4WD systems do not allow scan tool access.
The dash-mounted transfer case mode control is a set of normally open switches that vary the voltage supplied by the transfer case module when closed. The transfer case mod- ule sends 8 volts to the switches, then monitors the return circuit to deter- mine whether any of the switches is depressed. It can determine this because each switch has a different resistor in series with the circuit. Since both trucks have mode switch trouble codes, it seems logical to start there.
On the 2000 GM truck, the com- plaint was no four-wheel drive, and the 4WD light in the IPC (instrument panel cluster) came on at times. (This warning light, located in the left-side LED indicator, can display various messages, from "Security" to "Low Fuel" and even "4WD/AWD.") Any ATC system malfunction will turn on this light to alert the driver of a problem. A trouble code is also stored at that time.
Armed with the complaint and DTC B2725, I was ready to continue my diagnosis. I simply pressed the buttons while watching the scan data. As I pressed various buttons, the scan data would not indicate the proper input. Pressing "4HI" or "4LO" would not always result in the data stream reflecting that condition. Also, the LEDs on the switch would randomly go on and off.
The easiest way to confirm this problem is to tap on the button and watch the scan data along with the switch LEDs. When we did this, it caused all kinds of random lights and data readings. At one point, it even turned on the 4WD warning indicator. It was obvious the switch had a mind of its own and needed replacement.
It's always nice to have such an easy diagnosis, but should we assume that all B2725 DTCs indicate the need for a switch replacement? After all, General Motors TSB No. 02-0421-004 indicates a known problem with this switch assembly.
Before we look at the other truck, it might be useful to see what GM's ESI website (www.acdelcotds.com) information says about B2725, to get a better understanding of the systems design characteristics. The following description comes from document ID No. 375434:
"The transfer case shift control module constantly monitors this signal voltage to determine the condition of the mode switch circuit. If no buttons are pressed, and the transfer case shift control module detects a voltage level outside the possible range (approx. 0.5-1.0 volts) for longer than 5 minutes, the transfer case shift control module will set this DTC if a button is held down or sticks for a period longer than 5 minutes. When each of the switches is depressed they will complete a circuit through their own specific resistor. The transfer case shift control module continuously monitors the switch input to determine whether the 4HI, AUTO 4WD, 2HI, and 4LO button selections are made by the driver."
Now we move on to the 1999 model K 1500 truck. The customer complained of no 4WD operation. He did not mention any warning lights, but it seemed like a good idea to check DTCs anyway. As mentioned earlier, this one had the same DTC B2725 stored. A quick check of the switches did not indicate any problem with the inputs from the switch to the module while monitoring scan data. However, the front wheels would not engage when the 4WD button was selected. A problem was obviously occurring, but the DTC did not seem to match the system malfunction.
Pep Boys Now Sells Auto Parts and Accessories Online
Pep Boys Now Sells Auto Parts and Accessories Online
The Pep Boys-- Manny, Moe & Jack, said it is now selling automotive parts and accessories on its website, pepboys.com. The Pep Boys online shopping experience enables customers to conduct a detailed search by either the name brand or specific part they desire. There is also a section featuring the latest in car and truck accessories, the company said.
There are approximately 400 major brands and over 120,000 parts available through the website. Brands include: American Racing, manufacturer of custom wheels; APC, manufacturer of appearance accessories such as gauges and carbon fiber hoods; along with traditional lines such as Edelbrock, manufacturer of engines and intake manifolds and Westin, a truck and SUV manufacturer of bumpers, grill guards, running boards and tail light guards, Pep Boys said.
According to Mitchell G. Leibovitz, Pep Boys Chief Executive Officer, "In addition to satisfying the needs of our in-store customers, pepboys.com greatly expands our geographic reach and broadens our customer appeal."
Pep Boys has 629 stores and more than 6,500 service bays in 36 states and Puerto Rico.
COPYRIGHT 2002 Ron DeMarines
COPYRIGHT 2008 Gale, Cengage Learning
The Pep Boys-- Manny, Moe & Jack, said it is now selling automotive parts and accessories on its website, pepboys.com. The Pep Boys online shopping experience enables customers to conduct a detailed search by either the name brand or specific part they desire. There is also a section featuring the latest in car and truck accessories, the company said.
There are approximately 400 major brands and over 120,000 parts available through the website. Brands include: American Racing, manufacturer of custom wheels; APC, manufacturer of appearance accessories such as gauges and carbon fiber hoods; along with traditional lines such as Edelbrock, manufacturer of engines and intake manifolds and Westin, a truck and SUV manufacturer of bumpers, grill guards, running boards and tail light guards, Pep Boys said.
According to Mitchell G. Leibovitz, Pep Boys Chief Executive Officer, "In addition to satisfying the needs of our in-store customers, pepboys.com greatly expands our geographic reach and broadens our customer appeal."
Pep Boys has 629 stores and more than 6,500 service bays in 36 states and Puerto Rico.
COPYRIGHT 2002 Ron DeMarines
COPYRIGHT 2008 Gale, Cengage Learning
The browning hi-power today:
The browning hi-power today: dominant high-capacity pistol no longer, the hi-power offers other virtues
In November of 1926, John Moses Browning dropped dead while working in his office at Fabrique Nationale headquarters in Herstal, Belgium. The project in front of him when he collapsed was the finalization of his Superposed shotgun, but if you ask most students of firearms what his last design was, they will most likely reply, "The Hi-Power pistol!"
Well, not exactly. Browning was certainly responsible for the Hi-Power's little known predecessor, the Grand Rendement (loosely translated, "High Capacity") pistol, developed for the French military and tested by them in 1922. When one looks at Browning's last patent, which bears U.S. Patent Office Number 1,618,510, and was filed on June 28, 1923--it's clear that the pistol depleted is the Grand Rendement, complete with such fen lures as a breech bolt running through the slide from the rear, which never made it to the pistol we know today as the Hi-Power.
The 16 shot Grand Rendement 9mm Parabellum was a large gun with an ungainly appearance and overly long grip-frame. The man who brought the pistol down to a manageable size was Dieudonne Saive. Two years away from becoming head of all small arms production for FN, Salve was the company's most gifted gun designer in the absence of Browning, and was up to the task.
Making Of A Masterpiece
He shortened the pistol at the front and at the butt, streamlining the gun and reducing weight. He brought the magazine down to 13 rounds in a reasonably compact size, mad did away with the breech bolt design in favor a system that would allow a similar takedown to John Browning's already-proven 1911 .45. The older 9mm's manual safety, an awkward thing at the grip tang area, was replaced with one that worked similar to that of the Colt pistol.
It would not be too simplistic to say that John Moses certainly did create the concept, but Monsieur Salve was the one who most assuredly shaped it into what became its classic form. Pretty much finalized by 1930, the Grand Puissance ("High Power", known to Europeans later as the "GP" for short) was not formally introduced until 1935, creating its other famous synonym, P-35.
The gun was delayed by sluggish market conditions caused by the world-wide depression. Once announced, however, it was an instant hit. The GP was available with plain fixed sights or a tangent adjustable which, with wild optimism for a 9mm pistol, was graded for sighting distances up to 500 meters. It was also offered with wooden shoulder stock, a popular accessory among the military handgun purchasers of Europe.
Serial number 36,000 had been produced, says gun historian R. Blake Stevens, before Salve redesigned the barrel lug's cam slot to cure a spate of breakages that had occurred with early models after heavy shooting. (1)
Into The Crucible
Then came Hitler's invasion of the Low Countries. Belgium was quickly conquered, and the FN factory annexed to the Third Reich's cause. Salve and some of his colleagues managed to flee to free countries. Salve was instrumental in founding a production line at the John Inglis Company in Canada, where the Hi-Power would be produced throughout World War II for Canada, England, China, and other Allied nations.
Meanwhile, some 319,000 Belgian Hi-Powers were manufactured by the Nazis during their occupation. By the time the Allies liberated Herstal, the German occupying forces had had to resort to forced labor, and the guns they were producing were the worst Brownings of all time, with ugly finishes and often poor fit.
Time marched on. In the second half of the 20th Century, the Browning Hi-Power became the overwhelming choice of service pistol for most of the NATO nations and virtually all of the British Commonwealth countries. It was said that the Hi-Power was the only firearm in common use on both Allied and Axis sides in World War II. Nor would this be the last time men with Brownings would face other men with Brownings in battle. The P-35 was the standard sidearm of both sides in the Falklands intervention, and many were used by both Israeli and Arab forces in the Middle East.
Copies would be licensed by FN from factories in Canada and Argentina. Unlicensed copies would emerge from Hungary. Israel, and even Indonesia. (An agreement was in place for England to build them at Enfield during the war years, but the project never got off the ground.) Hi-Powers assembled in Portugal began earning a reputation for superior functionality in the 1980s. Stevens estimates that FN alone had produced 1.5 million of these pistols by the mid 1990s.
The P-35 has been produced in other calibers, notably .30 Luger and, in the 1990s, .40 S&W. Various double action models have been offered to the market, one designed by Monsieur Saive himself in 1952. The most mechanically intriguing of these options was the FA, or Fast Action design, which survives today as the SFS (Super Fast Safety) retrofit offered for both Hi-Powers and 191 Is by Bill Laughridge's Cylinder & Slide Shop (800-448-1713; www.cylinder-slide.com). A lightweight aluminum alloy frame, also designed by a then-aging Salve in the 1950s, was offered commercially but never caught on.
In November of 1926, John Moses Browning dropped dead while working in his office at Fabrique Nationale headquarters in Herstal, Belgium. The project in front of him when he collapsed was the finalization of his Superposed shotgun, but if you ask most students of firearms what his last design was, they will most likely reply, "The Hi-Power pistol!"
Well, not exactly. Browning was certainly responsible for the Hi-Power's little known predecessor, the Grand Rendement (loosely translated, "High Capacity") pistol, developed for the French military and tested by them in 1922. When one looks at Browning's last patent, which bears U.S. Patent Office Number 1,618,510, and was filed on June 28, 1923--it's clear that the pistol depleted is the Grand Rendement, complete with such fen lures as a breech bolt running through the slide from the rear, which never made it to the pistol we know today as the Hi-Power.
The 16 shot Grand Rendement 9mm Parabellum was a large gun with an ungainly appearance and overly long grip-frame. The man who brought the pistol down to a manageable size was Dieudonne Saive. Two years away from becoming head of all small arms production for FN, Salve was the company's most gifted gun designer in the absence of Browning, and was up to the task.
Making Of A Masterpiece
He shortened the pistol at the front and at the butt, streamlining the gun and reducing weight. He brought the magazine down to 13 rounds in a reasonably compact size, mad did away with the breech bolt design in favor a system that would allow a similar takedown to John Browning's already-proven 1911 .45. The older 9mm's manual safety, an awkward thing at the grip tang area, was replaced with one that worked similar to that of the Colt pistol.
It would not be too simplistic to say that John Moses certainly did create the concept, but Monsieur Salve was the one who most assuredly shaped it into what became its classic form. Pretty much finalized by 1930, the Grand Puissance ("High Power", known to Europeans later as the "GP" for short) was not formally introduced until 1935, creating its other famous synonym, P-35.
The gun was delayed by sluggish market conditions caused by the world-wide depression. Once announced, however, it was an instant hit. The GP was available with plain fixed sights or a tangent adjustable which, with wild optimism for a 9mm pistol, was graded for sighting distances up to 500 meters. It was also offered with wooden shoulder stock, a popular accessory among the military handgun purchasers of Europe.
Serial number 36,000 had been produced, says gun historian R. Blake Stevens, before Salve redesigned the barrel lug's cam slot to cure a spate of breakages that had occurred with early models after heavy shooting. (1)
Into The Crucible
Then came Hitler's invasion of the Low Countries. Belgium was quickly conquered, and the FN factory annexed to the Third Reich's cause. Salve and some of his colleagues managed to flee to free countries. Salve was instrumental in founding a production line at the John Inglis Company in Canada, where the Hi-Power would be produced throughout World War II for Canada, England, China, and other Allied nations.
Meanwhile, some 319,000 Belgian Hi-Powers were manufactured by the Nazis during their occupation. By the time the Allies liberated Herstal, the German occupying forces had had to resort to forced labor, and the guns they were producing were the worst Brownings of all time, with ugly finishes and often poor fit.
Time marched on. In the second half of the 20th Century, the Browning Hi-Power became the overwhelming choice of service pistol for most of the NATO nations and virtually all of the British Commonwealth countries. It was said that the Hi-Power was the only firearm in common use on both Allied and Axis sides in World War II. Nor would this be the last time men with Brownings would face other men with Brownings in battle. The P-35 was the standard sidearm of both sides in the Falklands intervention, and many were used by both Israeli and Arab forces in the Middle East.
Copies would be licensed by FN from factories in Canada and Argentina. Unlicensed copies would emerge from Hungary. Israel, and even Indonesia. (An agreement was in place for England to build them at Enfield during the war years, but the project never got off the ground.) Hi-Powers assembled in Portugal began earning a reputation for superior functionality in the 1980s. Stevens estimates that FN alone had produced 1.5 million of these pistols by the mid 1990s.
The P-35 has been produced in other calibers, notably .30 Luger and, in the 1990s, .40 S&W. Various double action models have been offered to the market, one designed by Monsieur Saive himself in 1952. The most mechanically intriguing of these options was the FA, or Fast Action design, which survives today as the SFS (Super Fast Safety) retrofit offered for both Hi-Powers and 191 Is by Bill Laughridge's Cylinder & Slide Shop (800-448-1713; www.cylinder-slide.com). A lightweight aluminum alloy frame, also designed by a then-aging Salve in the 1950s, was offered commercially but never caught on.
One gun, no hands: the Marcus Young incident
One gun, no hands: the Marcus Young incident
Situation: The criminal emptied a .38 into you, leaving your gun arm paralyzed and your other hand torn apart--and now, he's reaching for a machine gun.
Lesson: Never give up. Be resourceful. Focus on neutralizing the threat and worry about how badly hurt you are after it's over.
March 7, 2003. Sgt. Marcus Young is midway through an evening shift, working patrol for the Ukiah, California Police Department. He's a Navy vet, second-degree black belt in Shorinryu karate, 18 years on the force. With him is a 17-year-old police cadet named Julian Covella. Young likes the kid. A devoted husband and father, the 40-year-old sergeant serves as president of a local school board. His own young son is thinking about going the police cadet route and Marcus is particularly interested in how it's working out for Julian. Then comes the seemingly routine call: a shoplifter at the Wal-Mart Superstore. Young wheels the patrol car in that direction.
In the next few minutes, he and his young cadet ride-along will save each other's lives.
The Incident
2148 hours, 9:48 PM.
As the cadet watches, Sgt. Young takes custody of the wan-looking suspect. Monica Winnie is only 18, but she could pass for 10 or 15 years older. Wal-Mart security guard Brett Schott watches as Young politely escorts her to the patrol car and puts her into the back seat.
Now comes a medium-sized man who moves rapidly and purposefully toward them through the darkened parking lot, his hands ominously thrust into his jacket pockets. He wears the face of Satan and it's not a trick of the light.
Neal Beckman, Winnie's companion, is a 35-year-old Caucasian with a long, bad history. He is a member of a gang called the Nazi Low Riders and is wanted in connection with a $100,000 home invasion robbery. He has carefully cultivated the Satanic image, his sculpted mustache and goatee set off by small devil horns tattooed on his forehead. Unseen by the cop is his full backpack tattoo of the devil himself. In his pockets, also unseen by Young, are a fixed-blade hunting knife in his left hand and a late Smith & Wesson Model 637 stainless Airweight in his right, all five chambers loaded.
Beckman has made it to close range when Young says in command voice, "Take your hands out of your pockets." There is no response. Young repeats the command and Beckman answers, "I have a knife."
The blade comes out, held as if its wielder means business. Young reacts instantly in accordance with his training as both policeman and martial artist. He grabs the knife-hand and pivots off mid-line, wrenching the suspect's arm into the double-ninety-degree configuration known in California police circles as a twist-lock. He can feel something snapping and popping in the arm, but the knife-wielder does not let go. Both of them slam into the side of the car.
And suddenly, there is a bright flash and a searing heat and Sgt. Marcus Young realizes he has just been shot in the face at close range.
Near-Fatal Flurry
In the swirl of movement that follows, things happen fast even though it seems to the cop as if everything has gone into slow motion. More bullets hammer into him. The burning sensations tear through his right arm and his back, and something smashes into his left side as if he has been struck in the rib cage with an aluminum baseball bat. Through it all, the sergeant is aware of the young woman screaming wordlessly in the back seat of the patrol unit.
Brett Schott, the unarmed security guard, leaps into the fight. He barrels into Beckman, grabs the revolver and wrenches it away. He does not realize he is holding an empty gun. Beckman has fired all five shots and four of them have struck the cop.
The man with the face that mimics Satan shifts the hunting knife from his left hand to his right and sinks it viciously into the side of the security guard. The blade plunges deep into the left side of the guard's chest, almost immediately collapsing the lung and opening a wound so big that lung tissue is visible. He levers the blade and tears the wound wider, completely severing the deltoid muscle.
Schott disengages, instantly weakened by the massive wound, realizing he is hemorrhaging massively and perhaps fatally. He tries to make his way to another car for cover.
Meanwhile, Young has regained his feet and reached for his own gun. Yet it does not rise into line of sight in the movement he has practiced so many times. He tries again and realizes his right arm is not responding to his mental command. The humerus has been shattered and there is nerve damage. His gun arm is paralyzed.
The Ukiah PD firearms instructors are thorough. They have taught Young how to draw weak-handed if his gun arm is taken out. He makes the attempt but his left hand isn't working right, either. Glancing down, he sees that it has been ripped open, literally torn apart, its separated ten dons visible through the opened skin.
And now, the suspect is on his feet, tearing open the right front door of the patrol car and closing it behind him as he jumps in. He's not trying to drive away. Instead, he drops down on the seat on his left side as he claws for the switch he knows is hidden there somewhere. The switch that will release into his murderous hands a fresh weapon and a deadlier one.
Situation: The criminal emptied a .38 into you, leaving your gun arm paralyzed and your other hand torn apart--and now, he's reaching for a machine gun.
Lesson: Never give up. Be resourceful. Focus on neutralizing the threat and worry about how badly hurt you are after it's over.
March 7, 2003. Sgt. Marcus Young is midway through an evening shift, working patrol for the Ukiah, California Police Department. He's a Navy vet, second-degree black belt in Shorinryu karate, 18 years on the force. With him is a 17-year-old police cadet named Julian Covella. Young likes the kid. A devoted husband and father, the 40-year-old sergeant serves as president of a local school board. His own young son is thinking about going the police cadet route and Marcus is particularly interested in how it's working out for Julian. Then comes the seemingly routine call: a shoplifter at the Wal-Mart Superstore. Young wheels the patrol car in that direction.
In the next few minutes, he and his young cadet ride-along will save each other's lives.
The Incident
2148 hours, 9:48 PM.
As the cadet watches, Sgt. Young takes custody of the wan-looking suspect. Monica Winnie is only 18, but she could pass for 10 or 15 years older. Wal-Mart security guard Brett Schott watches as Young politely escorts her to the patrol car and puts her into the back seat.
Now comes a medium-sized man who moves rapidly and purposefully toward them through the darkened parking lot, his hands ominously thrust into his jacket pockets. He wears the face of Satan and it's not a trick of the light.
Neal Beckman, Winnie's companion, is a 35-year-old Caucasian with a long, bad history. He is a member of a gang called the Nazi Low Riders and is wanted in connection with a $100,000 home invasion robbery. He has carefully cultivated the Satanic image, his sculpted mustache and goatee set off by small devil horns tattooed on his forehead. Unseen by the cop is his full backpack tattoo of the devil himself. In his pockets, also unseen by Young, are a fixed-blade hunting knife in his left hand and a late Smith & Wesson Model 637 stainless Airweight in his right, all five chambers loaded.
Beckman has made it to close range when Young says in command voice, "Take your hands out of your pockets." There is no response. Young repeats the command and Beckman answers, "I have a knife."
The blade comes out, held as if its wielder means business. Young reacts instantly in accordance with his training as both policeman and martial artist. He grabs the knife-hand and pivots off mid-line, wrenching the suspect's arm into the double-ninety-degree configuration known in California police circles as a twist-lock. He can feel something snapping and popping in the arm, but the knife-wielder does not let go. Both of them slam into the side of the car.
And suddenly, there is a bright flash and a searing heat and Sgt. Marcus Young realizes he has just been shot in the face at close range.
Near-Fatal Flurry
In the swirl of movement that follows, things happen fast even though it seems to the cop as if everything has gone into slow motion. More bullets hammer into him. The burning sensations tear through his right arm and his back, and something smashes into his left side as if he has been struck in the rib cage with an aluminum baseball bat. Through it all, the sergeant is aware of the young woman screaming wordlessly in the back seat of the patrol unit.
Brett Schott, the unarmed security guard, leaps into the fight. He barrels into Beckman, grabs the revolver and wrenches it away. He does not realize he is holding an empty gun. Beckman has fired all five shots and four of them have struck the cop.
The man with the face that mimics Satan shifts the hunting knife from his left hand to his right and sinks it viciously into the side of the security guard. The blade plunges deep into the left side of the guard's chest, almost immediately collapsing the lung and opening a wound so big that lung tissue is visible. He levers the blade and tears the wound wider, completely severing the deltoid muscle.
Schott disengages, instantly weakened by the massive wound, realizing he is hemorrhaging massively and perhaps fatally. He tries to make his way to another car for cover.
Meanwhile, Young has regained his feet and reached for his own gun. Yet it does not rise into line of sight in the movement he has practiced so many times. He tries again and realizes his right arm is not responding to his mental command. The humerus has been shattered and there is nerve damage. His gun arm is paralyzed.
The Ukiah PD firearms instructors are thorough. They have taught Young how to draw weak-handed if his gun arm is taken out. He makes the attempt but his left hand isn't working right, either. Glancing down, he sees that it has been ripped open, literally torn apart, its separated ten dons visible through the opened skin.
And now, the suspect is on his feet, tearing open the right front door of the patrol car and closing it behind him as he jumps in. He's not trying to drive away. Instead, he drops down on the seat on his left side as he claws for the switch he knows is hidden there somewhere. The switch that will release into his murderous hands a fresh weapon and a deadlier one.
Scope mounting and sighting in: here's how to do it right the first time
Scope mounting and sighting in: here's how to do it right the first time
Warped and bent scope bodies, scarred and marred finishes, cracked lens, lost turret caps, at least one scope mounted backwards, and certainly the wrong mounts and rings. Every year prior to hunting season, gun shops and gunsmiths are faced with doctoring the mistakes of incorrectly mounted scopes. Unfortunately, scope mounting faux pas like these are more common than you might imagine.
Degrees in nuclear science, physics, or engineering are not required to successfully mount optics on your hunting rifle. Anyone possessing basic motor skills (I barely fail into this category), and the ability to follow simple instructions can achieve professional results the first time.
All that's needed is a few simple tools, a place to work, and the desire to do it right. Let's examine the steps required to successfully and professionally mount your favorite optics on a hunting rifle. When we've completed this task, we'll visit the range and learn how to properly sight in our rifle.
A Clean, Well-Lighted Place
To start, we need a place to work. If you don't have a corner of the house that belongs to you, boldly commandeer the wife's kitchen table -- just make sure she's not home. Next, we'll require a sturdy platform to work from. Having your brother-in-law hold the rifle steady while you work is asking for trouble, hurt feelings and scratched firearms. Gun vises abound on the market and are relatively inexpensive. Just make sure you choose one that holds the firearm securely and will not scratch your expensive investment.
Most rifles leave the factory with filler screws resting in the scope base holes. Remove them using a properly fitting screwdriver. Next, we'll want to clean any grease or oil that may have accumulated in the holes to insure the base screws thread securely. Aerosol gun scrubbers and blasters, manufactured by Birchwood Casey, Break-Free and others work well for this chore. It's also a wise idea after you've done this, to apply a thin coat of oil onto the receiver where the mount will rest, to prevent possible rust.
Quality Pays
There are many successful designs of scope mounts and bases on the market today. Most are very rugged and durable, sadly, some are not. Insist on nothing less than the best and forget about the cost. A quality set of mounts and rings is much cheaper than a missed shot on a Boone and Crockett whitetail.
By far, the most popular scope bases and rings are those manufactured by Redfield, Burris, Leupold, and Millett. The front scope ring twists into the base mount for a rock solid perch, while two large windage adjustment screws secure the rear scope ring. Due to their popularity and quality, we'll mount a set of these on our rifle.
Open the package containing the bases for your weapon and wipe them off with a rag. Apply a thin coat of oil to the underside of the mount as well. More than likely, a proper fitting allen wrench was included with your bases. If not, make sure you use the correct size to prevent damaging the screws.
Base screws are rarely the same length, and instructions often neglect to inform us where each one should fit. So how do we determine what goes where? An easy solution is to drop the screws into the base holes, hold them up where you can see the threaded portion of the screws, and make sure there is an equal amount of each screw protruding from the base. They should all be approximately the same length. This method is far from scientific, but actually works well.
Now it's time to secure the bases to the receiver. Scope bases have an uncanny ability to work loose under heavy recoil, which obviously wreaks havoc with accuracy. Murphy's Law dictates we only become aware of this after we've missed the buck of a lifetime, and watch him saunter over the horizon waving his white tail in salute. This malady is entirely preventable.
Place the front and rear base mounts in their proper place on the receiver. Before inserting and tightening the base screws, dab a little Loctite on the threads. This will prevent them from working loose under recoil. If you're out of Loctite, reach for a bottle of your wife's clear nail polish. It will suffice in a pinch.
Step Two: Rings
With our bases securely in place, it's time to mount the scope rings. Using your properly fitting wrench, remove the screws from the rings. Place them along with their corresponding ring halves on your workbench. The forward ring mounts in a rotary dovetail. For a smooth installation, wipe a light coating of any good grease over the "feet" of the forward ring before inserting it into the base hole. You will notice it rests perpendicular to the mount.
Unless you were blessed with the power of Hercules, it's quite obvious you can't turn the ring with your bare hands. So what's the easiest way to perform this task? Brownells offers a 4-Way Scope Ring Wrench (part number 813-100-004) that includes slots for Leupold, Burr, Millett/Redfield, and 30mm Leupold rings.
Slide the correct slot over the ring and gently rotate to the proper position. The large handle provides plenty of comfortable twisting power. I've personally used one to mount well over 1,000 scopes in my shop. They are very durable. If you don't have one of these tools on hand and can't wait, try cutting a one-inch wooden dowel to approximately twelve inches. While not as fancy, this works equally well.
Warped and bent scope bodies, scarred and marred finishes, cracked lens, lost turret caps, at least one scope mounted backwards, and certainly the wrong mounts and rings. Every year prior to hunting season, gun shops and gunsmiths are faced with doctoring the mistakes of incorrectly mounted scopes. Unfortunately, scope mounting faux pas like these are more common than you might imagine.
Degrees in nuclear science, physics, or engineering are not required to successfully mount optics on your hunting rifle. Anyone possessing basic motor skills (I barely fail into this category), and the ability to follow simple instructions can achieve professional results the first time.
All that's needed is a few simple tools, a place to work, and the desire to do it right. Let's examine the steps required to successfully and professionally mount your favorite optics on a hunting rifle. When we've completed this task, we'll visit the range and learn how to properly sight in our rifle.
A Clean, Well-Lighted Place
To start, we need a place to work. If you don't have a corner of the house that belongs to you, boldly commandeer the wife's kitchen table -- just make sure she's not home. Next, we'll require a sturdy platform to work from. Having your brother-in-law hold the rifle steady while you work is asking for trouble, hurt feelings and scratched firearms. Gun vises abound on the market and are relatively inexpensive. Just make sure you choose one that holds the firearm securely and will not scratch your expensive investment.
Most rifles leave the factory with filler screws resting in the scope base holes. Remove them using a properly fitting screwdriver. Next, we'll want to clean any grease or oil that may have accumulated in the holes to insure the base screws thread securely. Aerosol gun scrubbers and blasters, manufactured by Birchwood Casey, Break-Free and others work well for this chore. It's also a wise idea after you've done this, to apply a thin coat of oil onto the receiver where the mount will rest, to prevent possible rust.
Quality Pays
There are many successful designs of scope mounts and bases on the market today. Most are very rugged and durable, sadly, some are not. Insist on nothing less than the best and forget about the cost. A quality set of mounts and rings is much cheaper than a missed shot on a Boone and Crockett whitetail.
By far, the most popular scope bases and rings are those manufactured by Redfield, Burris, Leupold, and Millett. The front scope ring twists into the base mount for a rock solid perch, while two large windage adjustment screws secure the rear scope ring. Due to their popularity and quality, we'll mount a set of these on our rifle.
Open the package containing the bases for your weapon and wipe them off with a rag. Apply a thin coat of oil to the underside of the mount as well. More than likely, a proper fitting allen wrench was included with your bases. If not, make sure you use the correct size to prevent damaging the screws.
Base screws are rarely the same length, and instructions often neglect to inform us where each one should fit. So how do we determine what goes where? An easy solution is to drop the screws into the base holes, hold them up where you can see the threaded portion of the screws, and make sure there is an equal amount of each screw protruding from the base. They should all be approximately the same length. This method is far from scientific, but actually works well.
Now it's time to secure the bases to the receiver. Scope bases have an uncanny ability to work loose under heavy recoil, which obviously wreaks havoc with accuracy. Murphy's Law dictates we only become aware of this after we've missed the buck of a lifetime, and watch him saunter over the horizon waving his white tail in salute. This malady is entirely preventable.
Place the front and rear base mounts in their proper place on the receiver. Before inserting and tightening the base screws, dab a little Loctite on the threads. This will prevent them from working loose under recoil. If you're out of Loctite, reach for a bottle of your wife's clear nail polish. It will suffice in a pinch.
Step Two: Rings
With our bases securely in place, it's time to mount the scope rings. Using your properly fitting wrench, remove the screws from the rings. Place them along with their corresponding ring halves on your workbench. The forward ring mounts in a rotary dovetail. For a smooth installation, wipe a light coating of any good grease over the "feet" of the forward ring before inserting it into the base hole. You will notice it rests perpendicular to the mount.
Unless you were blessed with the power of Hercules, it's quite obvious you can't turn the ring with your bare hands. So what's the easiest way to perform this task? Brownells offers a 4-Way Scope Ring Wrench (part number 813-100-004) that includes slots for Leupold, Burr, Millett/Redfield, and 30mm Leupold rings.
Slide the correct slot over the ring and gently rotate to the proper position. The large handle provides plenty of comfortable twisting power. I've personally used one to mount well over 1,000 scopes in my shop. They are very durable. If you don't have one of these tools on hand and can't wait, try cutting a one-inch wooden dowel to approximately twelve inches. While not as fancy, this works equally well.
Income statements transparency and firms' characteristics of companies listed on the Bursa Malaysia
Income statements transparency and firms' characteristics of companies listed on the Bursa Malaysia
INTRODUCTION
Financial statements should always provide reliable information to assist users in decision making. The statement should disclose relevant, reliable, comparable and understandable information. To be understood clearly, the presentation should not be misleading. Readers should be able to understand the information presented without undue effort according to International Accounting Standards (IAS) 1. To achieve this, the annual reports should contain full disclosure and higher level of transparency. As Thompson and Yeung (23) stressed that for a company to be transparent, disclosure means providing a full and frank account of a company's activities. In addition, as far as corporate transparency is concerned, it should be defined as the widespread availability of relevant, reliable information about the periodic performance, financial position, investments opportunities, governance, value and risk of publicly traded firm (3).
Comprehensive disclosure of financial statement has been a world wide issue for a long decade. Malaysian market is currently promoting good corporate governance practices as a result of debacle of many big conglomerates in US as well as in Malaysia. As users of financial statement specifically income statement demanding for better disclosure of quality information and found that there are big amount of expenses portion goes to other operating expenses. The income statement is important because it reports on the operating performance of the company. The greater the transparency of income statement the more useful it will be for current and potential investor to make investment decision. In other words, the more the companies disclose, concerning the figures founding the financial statement, the greater the level of transparency. The current reform of the accounting and financial reporting in Malaysia which aims to promote transparency and to deliver high quality annual report is enhance through comprehensive disclosure. This change has contributed to the accounting standards setting and laws regarding financial reporting produced by local organizations.
The Section 167 and Ninth Schedule of the Companies Act 1965 govern the disclosure in the financial statements of companies in Malaysia. Under Section 167, states that each company must keep a proper set of books and accounts and the financial statements must contain at a minimum Profit and Loss Account, a Balance Sheet, a Cash Flow Statement and accompanying notes to the account. Schedule 9, details the item that the companies must include in the financial statements. Until the introduction of Financial Reporting Act 1997, the items in Schedule 9 represent the minimum statutory disclosure requirement for companies. It must be noted that the accounting standards issued by the Malaysian Institute of Accountants (MIA) and other professional bodies remains 'voluntary' disclosure requirement. In the case of listed companies, the regulatory agency that responsible is the Securities Commission (SC), the registrar of companies and the Central Bank of Malaysia. Their functions are to administering in public listed companies, administering companies incorporated in Malaysia and administering financial institutions respectively. This is to ensure enterprise financial reporting meeting the minimum requirements, if necessary go beyond that to achieve a fair presentation. The companies listed on the Bursa Malaysia must also meet the accounting and reporting guidelines as per issued by SC (22). Each company that going to public market should administer good corporate governance by discloses full information necessary to make informed users investment decisions.
The Malaysian Code of Corporate Governance (MCCG 2002) had been introduced to promote greater transparency and adopt professional business ethics as well as convey this via their annual reports. The National Annual Corporate Report Awards (NACRA) held by the collaboration of Bursa Malaysia, MIA and the MICPA to help Malaysian companies aim for the greatest standards in annual reporting. Study of disclosures begins with research done by Cerf (5). He constructed disclosure index by specifying and weighting some related items which might appear in annual reports. The index scores were positively correlated with firm characteristics namely asset size, number of shareholders and profitability (21). Buzby (4) was consistent with other researcher but add listing status as one of the variable to explain disclosure level.
Disclosures indexes tend to based upon lists of selected items if accounting information which may be disclosed in corporate annual reports and seek to measure the extent of disclosure by using numerical weights on items of accounting information. Extensive accounting literature relating to the use of disclosure indexes by way of measure the quality of information and it is vary among different studies. Inchausti (13) reported that in some studies, only voluntary information were considered (7), (9), (19) whilst in other studies rating for both compulsory and voluntary items was being included in an index (5), (6), (8). Studies also differ in the aspects of items included in index from 17, Barret (1), 39 Buzby (4) and 224, Cooke (8). In some studies, they compared the transparency or disclosure of accounting information in cross-countries (2), (3).
INTRODUCTION
Financial statements should always provide reliable information to assist users in decision making. The statement should disclose relevant, reliable, comparable and understandable information. To be understood clearly, the presentation should not be misleading. Readers should be able to understand the information presented without undue effort according to International Accounting Standards (IAS) 1. To achieve this, the annual reports should contain full disclosure and higher level of transparency. As Thompson and Yeung (23) stressed that for a company to be transparent, disclosure means providing a full and frank account of a company's activities. In addition, as far as corporate transparency is concerned, it should be defined as the widespread availability of relevant, reliable information about the periodic performance, financial position, investments opportunities, governance, value and risk of publicly traded firm (3).
Comprehensive disclosure of financial statement has been a world wide issue for a long decade. Malaysian market is currently promoting good corporate governance practices as a result of debacle of many big conglomerates in US as well as in Malaysia. As users of financial statement specifically income statement demanding for better disclosure of quality information and found that there are big amount of expenses portion goes to other operating expenses. The income statement is important because it reports on the operating performance of the company. The greater the transparency of income statement the more useful it will be for current and potential investor to make investment decision. In other words, the more the companies disclose, concerning the figures founding the financial statement, the greater the level of transparency. The current reform of the accounting and financial reporting in Malaysia which aims to promote transparency and to deliver high quality annual report is enhance through comprehensive disclosure. This change has contributed to the accounting standards setting and laws regarding financial reporting produced by local organizations.
The Section 167 and Ninth Schedule of the Companies Act 1965 govern the disclosure in the financial statements of companies in Malaysia. Under Section 167, states that each company must keep a proper set of books and accounts and the financial statements must contain at a minimum Profit and Loss Account, a Balance Sheet, a Cash Flow Statement and accompanying notes to the account. Schedule 9, details the item that the companies must include in the financial statements. Until the introduction of Financial Reporting Act 1997, the items in Schedule 9 represent the minimum statutory disclosure requirement for companies. It must be noted that the accounting standards issued by the Malaysian Institute of Accountants (MIA) and other professional bodies remains 'voluntary' disclosure requirement. In the case of listed companies, the regulatory agency that responsible is the Securities Commission (SC), the registrar of companies and the Central Bank of Malaysia. Their functions are to administering in public listed companies, administering companies incorporated in Malaysia and administering financial institutions respectively. This is to ensure enterprise financial reporting meeting the minimum requirements, if necessary go beyond that to achieve a fair presentation. The companies listed on the Bursa Malaysia must also meet the accounting and reporting guidelines as per issued by SC (22). Each company that going to public market should administer good corporate governance by discloses full information necessary to make informed users investment decisions.
The Malaysian Code of Corporate Governance (MCCG 2002) had been introduced to promote greater transparency and adopt professional business ethics as well as convey this via their annual reports. The National Annual Corporate Report Awards (NACRA) held by the collaboration of Bursa Malaysia, MIA and the MICPA to help Malaysian companies aim for the greatest standards in annual reporting. Study of disclosures begins with research done by Cerf (5). He constructed disclosure index by specifying and weighting some related items which might appear in annual reports. The index scores were positively correlated with firm characteristics namely asset size, number of shareholders and profitability (21). Buzby (4) was consistent with other researcher but add listing status as one of the variable to explain disclosure level.
Disclosures indexes tend to based upon lists of selected items if accounting information which may be disclosed in corporate annual reports and seek to measure the extent of disclosure by using numerical weights on items of accounting information. Extensive accounting literature relating to the use of disclosure indexes by way of measure the quality of information and it is vary among different studies. Inchausti (13) reported that in some studies, only voluntary information were considered (7), (9), (19) whilst in other studies rating for both compulsory and voluntary items was being included in an index (5), (6), (8). Studies also differ in the aspects of items included in index from 17, Barret (1), 39 Buzby (4) and 224, Cooke (8). In some studies, they compared the transparency or disclosure of accounting information in cross-countries (2), (3).
Design and development of sensor based traffic light system
Design and development of sensor based traffic light system
Abstract: The main object of this study was to design and implement a suitable algorithm and its simulation for an intelligent traffic signal simulator. The system developed is able to sense the presence or absence of vehicles within certain range by setting the appropriate duration for the traffic signals to react accordingly. By employing mathematical functions to calculate the appropriate timing for the green signal to illuminate, the system can help to solve the problem of traffic congestion. The simulation of the algorithm of the traffic signal system was done using MATLAB software. Hardware simulation tests were successfully performed on the algorithm implemented into a controller. The new timing scheme that was implemented promises an improvement in the current traffic light system and this system is feasible, affordable and ready to be implemented especially during peak hours. A countdown timer interfacing according to the traffic system using Lab VIEW software was also created.
Key words: Traffic signal system, sensor based traffic light system, traffic congestion
INTRODUCTION
Many traffic light systems operate on a timing mechanism that changes the lights after a given interval. An intelligent traffic light system senses the presence or absence of vehicles and reacts accordingly. The idea behind intelligent traffic systems is that drivers will not spend unnecessary time waiting for the traffic lights to change. An intelligent traffic system detects traffic in many different ways [1].
The older system uses weight as a trigger mechanism [2]. Current traffic systems react to motion to trigger the light changes. Once the infrared object detector picks up the presence of a car, a switch causes the lights to change. In order to accomplish this, algorithms are used to govern the actions of the traffic system. While there are many different programming languages today, some programming concepts are universal in Boolean Logic.
We need to understand the function of traffic signals so that we can improve driving habits by controlling the speed in order to reduce the number of associated traffic accidents. The more number of drivers who know about the operation of traffic signals, the less frustrated they are going to be while waiting for the lights to change. The main aim in designing and developing of the Intelligent Traffic Signal Simulator is to reduce the waiting time of each lane of the cars and also to maximize the total number of cars that can cross an intersection given the mathematical function to calculate the waiting time.
The traffic signal system consists of three important parts. The first part is the controller, which represents the brain of the traffic system. It consists of a computer that controls the selection and timing of traffic movements in accordance to the varying demands of traffic signal as registered to the controller unit by sensors [3]. The second part is the signal visualization or in simple words is signal face. Signal faces are part of a signal head provided for controlling traffic in a single direction and consist of one or more signal sections. These usually comprise of solid red, yellow, and green lights. The third part is the detector or sensor. The sensor or detector is a device to indicate the presence of vehicles. One of the technologies, which are used today, consists of wire loops placed in the pavement at intersections. They are activated by the change of electrical inductance caused by a vehicle passing over or standing over the wire loop. Recent technology utilization is video detection. A camera feeds a small computer that can "see" if a vehicle is present.
Experimental setup: In order to implement the Intelligent Traffic Signal Simulator, one needs to setup and assemble the hardware components and write a program to control the intelligent traffic signal simulator.
The layout of the Intelligent Traffic Signal Simulator is displayed in Figure 1. The blocks, which are labeled N1, N2, N3, E1, E2, E3, S1 and W1 are the infrared object detectors.
Hardware components: The traffic light system consists of four important components: the controller which is the brain to the system, the sensors which detect the presence of vehicles, the light emitting diodes (LED) which act as the actuator and the countdown timers which is displayed in Lab VIEW.
BASIC STAMP 2 (BS2) is used as the microcontroller of the traffic signal. The BS2, which needs to be plugged to the Board of Education (BoE), is directly attached to the computer in order to program it. The wiring for the output and input signals is done from this board. Figure 2 shows the Board of Education to which a 9V DC power is supplied. There is also a DB9 connector, that is connected to the COM port of computer using RS-232 serial cable, for BS2 programming and serial communication during runtime. Next to the BS2, there is a breadboard. The breadboard has many strips of copper, which run underneath the board in a horizontal fashion. These strips connect the sockets to each other.
Abstract: The main object of this study was to design and implement a suitable algorithm and its simulation for an intelligent traffic signal simulator. The system developed is able to sense the presence or absence of vehicles within certain range by setting the appropriate duration for the traffic signals to react accordingly. By employing mathematical functions to calculate the appropriate timing for the green signal to illuminate, the system can help to solve the problem of traffic congestion. The simulation of the algorithm of the traffic signal system was done using MATLAB software. Hardware simulation tests were successfully performed on the algorithm implemented into a controller. The new timing scheme that was implemented promises an improvement in the current traffic light system and this system is feasible, affordable and ready to be implemented especially during peak hours. A countdown timer interfacing according to the traffic system using Lab VIEW software was also created.
Key words: Traffic signal system, sensor based traffic light system, traffic congestion
INTRODUCTION
Many traffic light systems operate on a timing mechanism that changes the lights after a given interval. An intelligent traffic light system senses the presence or absence of vehicles and reacts accordingly. The idea behind intelligent traffic systems is that drivers will not spend unnecessary time waiting for the traffic lights to change. An intelligent traffic system detects traffic in many different ways [1].
The older system uses weight as a trigger mechanism [2]. Current traffic systems react to motion to trigger the light changes. Once the infrared object detector picks up the presence of a car, a switch causes the lights to change. In order to accomplish this, algorithms are used to govern the actions of the traffic system. While there are many different programming languages today, some programming concepts are universal in Boolean Logic.
We need to understand the function of traffic signals so that we can improve driving habits by controlling the speed in order to reduce the number of associated traffic accidents. The more number of drivers who know about the operation of traffic signals, the less frustrated they are going to be while waiting for the lights to change. The main aim in designing and developing of the Intelligent Traffic Signal Simulator is to reduce the waiting time of each lane of the cars and also to maximize the total number of cars that can cross an intersection given the mathematical function to calculate the waiting time.
The traffic signal system consists of three important parts. The first part is the controller, which represents the brain of the traffic system. It consists of a computer that controls the selection and timing of traffic movements in accordance to the varying demands of traffic signal as registered to the controller unit by sensors [3]. The second part is the signal visualization or in simple words is signal face. Signal faces are part of a signal head provided for controlling traffic in a single direction and consist of one or more signal sections. These usually comprise of solid red, yellow, and green lights. The third part is the detector or sensor. The sensor or detector is a device to indicate the presence of vehicles. One of the technologies, which are used today, consists of wire loops placed in the pavement at intersections. They are activated by the change of electrical inductance caused by a vehicle passing over or standing over the wire loop. Recent technology utilization is video detection. A camera feeds a small computer that can "see" if a vehicle is present.
Experimental setup: In order to implement the Intelligent Traffic Signal Simulator, one needs to setup and assemble the hardware components and write a program to control the intelligent traffic signal simulator.
The layout of the Intelligent Traffic Signal Simulator is displayed in Figure 1. The blocks, which are labeled N1, N2, N3, E1, E2, E3, S1 and W1 are the infrared object detectors.
Hardware components: The traffic light system consists of four important components: the controller which is the brain to the system, the sensors which detect the presence of vehicles, the light emitting diodes (LED) which act as the actuator and the countdown timers which is displayed in Lab VIEW.
BASIC STAMP 2 (BS2) is used as the microcontroller of the traffic signal. The BS2, which needs to be plugged to the Board of Education (BoE), is directly attached to the computer in order to program it. The wiring for the output and input signals is done from this board. Figure 2 shows the Board of Education to which a 9V DC power is supplied. There is also a DB9 connector, that is connected to the COM port of computer using RS-232 serial cable, for BS2 programming and serial communication during runtime. Next to the BS2, there is a breadboard. The breadboard has many strips of copper, which run underneath the board in a horizontal fashion. These strips connect the sockets to each other.
Design and development of sensor based traffic light system
Design and development of sensor based traffic light system
Abstract: The main object of this study was to design and implement a suitable algorithm and its simulation for an intelligent traffic signal simulator. The system developed is able to sense the presence or absence of vehicles within certain range by setting the appropriate duration for the traffic signals to react accordingly. By employing mathematical functions to calculate the appropriate timing for the green signal to illuminate, the system can help to solve the problem of traffic congestion. The simulation of the algorithm of the traffic signal system was done using MATLAB software. Hardware simulation tests were successfully performed on the algorithm implemented into a controller. The new timing scheme that was implemented promises an improvement in the current traffic light system and this system is feasible, affordable and ready to be implemented especially during peak hours. A countdown timer interfacing according to the traffic system using Lab VIEW software was also created.
Key words: Traffic signal system, sensor based traffic light system, traffic congestion
INTRODUCTION
Many traffic light systems operate on a timing mechanism that changes the lights after a given interval. An intelligent traffic light system senses the presence or absence of vehicles and reacts accordingly. The idea behind intelligent traffic systems is that drivers will not spend unnecessary time waiting for the traffic lights to change. An intelligent traffic system detects traffic in many different ways [1].
The older system uses weight as a trigger mechanism [2]. Current traffic systems react to motion to trigger the light changes. Once the infrared object detector picks up the presence of a car, a switch causes the lights to change. In order to accomplish this, algorithms are used to govern the actions of the traffic system. While there are many different programming languages today, some programming concepts are universal in Boolean Logic.
We need to understand the function of traffic signals so that we can improve driving habits by controlling the speed in order to reduce the number of associated traffic accidents. The more number of drivers who know about the operation of traffic signals, the less frustrated they are going to be while waiting for the lights to change. The main aim in designing and developing of the Intelligent Traffic Signal Simulator is to reduce the waiting time of each lane of the cars and also to maximize the total number of cars that can cross an intersection given the mathematical function to calculate the waiting time.
The traffic signal system consists of three important parts. The first part is the controller, which represents the brain of the traffic system. It consists of a computer that controls the selection and timing of traffic movements in accordance to the varying demands of traffic signal as registered to the controller unit by sensors [3]. The second part is the signal visualization or in simple words is signal face. Signal faces are part of a signal head provided for controlling traffic in a single direction and consist of one or more signal sections. These usually comprise of solid red, yellow, and green lights. The third part is the detector or sensor. The sensor or detector is a device to indicate the presence of vehicles. One of the technologies, which are used today, consists of wire loops placed in the pavement at intersections. They are activated by the change of electrical inductance caused by a vehicle passing over or standing over the wire loop. Recent technology utilization is video detection. A camera feeds a small computer that can "see" if a vehicle is present.
Experimental setup: In order to implement the Intelligent Traffic Signal Simulator, one needs to setup and assemble the hardware components and write a program to control the intelligent traffic signal simulator.
The layout of the Intelligent Traffic Signal Simulator is displayed in Figure 1. The blocks, which are labeled N1, N2, N3, E1, E2, E3, S1 and W1 are the infrared object detectors.
Hardware components: The traffic light system consists of four important components: the controller which is the brain to the system, the sensors which detect the presence of vehicles, the light emitting diodes (LED) which act as the actuator and the countdown timers which is displayed in Lab VIEW.
BASIC STAMP 2 (BS2) is used as the microcontroller of the traffic signal. The BS2, which needs to be plugged to the Board of Education (BoE), is directly attached to the computer in order to program it. The wiring for the output and input signals is done from this board. Figure 2 shows the Board of Education to which a 9V DC power is supplied. There is also a DB9 connector, that is connected to the COM port of computer using RS-232 serial cable, for BS2 programming and serial communication during runtime. Next to the BS2, there is a breadboard. The breadboard has many strips of copper, which run underneath the board in a horizontal fashion. These strips connect the sockets to each other.
Abstract: The main object of this study was to design and implement a suitable algorithm and its simulation for an intelligent traffic signal simulator. The system developed is able to sense the presence or absence of vehicles within certain range by setting the appropriate duration for the traffic signals to react accordingly. By employing mathematical functions to calculate the appropriate timing for the green signal to illuminate, the system can help to solve the problem of traffic congestion. The simulation of the algorithm of the traffic signal system was done using MATLAB software. Hardware simulation tests were successfully performed on the algorithm implemented into a controller. The new timing scheme that was implemented promises an improvement in the current traffic light system and this system is feasible, affordable and ready to be implemented especially during peak hours. A countdown timer interfacing according to the traffic system using Lab VIEW software was also created.
Key words: Traffic signal system, sensor based traffic light system, traffic congestion
INTRODUCTION
Many traffic light systems operate on a timing mechanism that changes the lights after a given interval. An intelligent traffic light system senses the presence or absence of vehicles and reacts accordingly. The idea behind intelligent traffic systems is that drivers will not spend unnecessary time waiting for the traffic lights to change. An intelligent traffic system detects traffic in many different ways [1].
The older system uses weight as a trigger mechanism [2]. Current traffic systems react to motion to trigger the light changes. Once the infrared object detector picks up the presence of a car, a switch causes the lights to change. In order to accomplish this, algorithms are used to govern the actions of the traffic system. While there are many different programming languages today, some programming concepts are universal in Boolean Logic.
We need to understand the function of traffic signals so that we can improve driving habits by controlling the speed in order to reduce the number of associated traffic accidents. The more number of drivers who know about the operation of traffic signals, the less frustrated they are going to be while waiting for the lights to change. The main aim in designing and developing of the Intelligent Traffic Signal Simulator is to reduce the waiting time of each lane of the cars and also to maximize the total number of cars that can cross an intersection given the mathematical function to calculate the waiting time.
The traffic signal system consists of three important parts. The first part is the controller, which represents the brain of the traffic system. It consists of a computer that controls the selection and timing of traffic movements in accordance to the varying demands of traffic signal as registered to the controller unit by sensors [3]. The second part is the signal visualization or in simple words is signal face. Signal faces are part of a signal head provided for controlling traffic in a single direction and consist of one or more signal sections. These usually comprise of solid red, yellow, and green lights. The third part is the detector or sensor. The sensor or detector is a device to indicate the presence of vehicles. One of the technologies, which are used today, consists of wire loops placed in the pavement at intersections. They are activated by the change of electrical inductance caused by a vehicle passing over or standing over the wire loop. Recent technology utilization is video detection. A camera feeds a small computer that can "see" if a vehicle is present.
Experimental setup: In order to implement the Intelligent Traffic Signal Simulator, one needs to setup and assemble the hardware components and write a program to control the intelligent traffic signal simulator.
The layout of the Intelligent Traffic Signal Simulator is displayed in Figure 1. The blocks, which are labeled N1, N2, N3, E1, E2, E3, S1 and W1 are the infrared object detectors.
Hardware components: The traffic light system consists of four important components: the controller which is the brain to the system, the sensors which detect the presence of vehicles, the light emitting diodes (LED) which act as the actuator and the countdown timers which is displayed in Lab VIEW.
BASIC STAMP 2 (BS2) is used as the microcontroller of the traffic signal. The BS2, which needs to be plugged to the Board of Education (BoE), is directly attached to the computer in order to program it. The wiring for the output and input signals is done from this board. Figure 2 shows the Board of Education to which a 9V DC power is supplied. There is also a DB9 connector, that is connected to the COM port of computer using RS-232 serial cable, for BS2 programming and serial communication during runtime. Next to the BS2, there is a breadboard. The breadboard has many strips of copper, which run underneath the board in a horizontal fashion. These strips connect the sockets to each other.
Performance analysis of shell and tube heat exchanger using miscible system
Performance analysis of shell and tube heat exchanger using miscible system
A heat exchanger is a device in which energy is transferred from one fluid to another across a solid surface. Exchanger analysis and design therefore involve both convection and conduction. Two important problems in heat exchanger analysis are (1) rating existing heat exchangers and (ii) sizing heat exchangers for a particular application. Rating involves determination of the rate of heat transfer, the change in temperature of the two fluids and the pressure drop across the heat exchanger. Sizing involves selection of a specific heat exchanger from those currently available or determining the dimensions for the design of a new heat exchanger, given the required rate of heat transfer and allowable pressure drop. The LMTD method can be readily used when the inlet and outlet temperatures of both the hot and cold fluids are known. When the outlet temperatures are not known, the LMTD can only be used in an iterative scheme. In this case the effectiveness-NTU method can be used to simplify the analysis. The choice of heat exchanger type directly affects the process performance and also influences plant size, plant layout, length of pipe runs and the strength and size of supporting structures. The most commonly used type of heat exchanger is the shell-and-tube heat exchanger, the optimal design of which is the main objective of this study. Computer software marketed by companies such as HTRI and HTFS are used extensively in the thermal design and rating of HEs. These packages incorporate various design options for the heat exchangers including the variations in the tube diameter, tube pitch, shell type, number of tube passes, baffle spacing, baffle cut, etc. A primary objective in the Heat Exchanger Design (HED) is the estimation of the minimum heat transfer area required for a given heat duty, as it governs the overall cost of the HE. But there is no concrete objective function that can be expressed explicitly as a function of the design variables and in fact many numbers of discrete combinations of the design variables are possible as is elaborated below. The tube diameter, tube length, shell types etc. are all standardized and are available only in certain sizes and geometry. And so the design of a shell-and-tube heat exchanger usually involves a trial and error procedure where for a certain combination of the design variables the heat transfer area is calculated and then another combination is tried to check if there is any possibility of reducing the heat transfer area. Since several discrete combinations of the design configurations are possible, the designer needs an efficient strategy to quickly locate the design configuration having the minimum heat exchanger cost. Thus the optimal design of heat exchanger can be posed as a large scale, discrete, combinatorial optimization problem (13). Most of the traditional optimization techniques based on gradient methods have the possibility of getting trapped at local optimum depending upon the degree of non-linearity and initial guess. Hence, these traditional optimization techniques do not ensure global optimum and also have limited applications. In the recent past, some experts studied on the design, performance analysis and simulation studies on heat exchangers(12),(13), (15), (16), (18). Modeling and Simulation of Shell and Tube Heat Exchangers Under Milk Fouling was carried out (15). Dynamic Model for Shell and Tube Heat Exchangers was discussed [12). Shell and Tube heat exchangers are applied where high temperature and pressure demands are significant and can be employed for a process requiring large quantities of fluid to be heated or cooled. Due to their design, these exchangers offer a large heat transfer area and provide high heat transfer efficiency in comparison with others. Modeling is a representation of physical or chemical process by a set of mathematical relationships that adequately describe the significant process behavior. Improving or understanding chemical process operation is a major objective for developing a process model. These models are often used for Process design, Safety system analysis and Process control. The simulation of an industrial system on a computer involves mathematical representation of the physical process undergone by the various components of the system, by a set of equations, which are in turn solved. Simulation is much cheaper than setting up big experiments or building prototypes of physical system and variables on the behavior of the system. A steady state model for the outlet temperature of both the cold and hot fluid of a shell and tube heat exchanger will be developed and simulated, which will be verified with the experiments conducted. Based on these observations correlations to find film heat transfer coefficients will be developed.
MATERIALS AND METHODS
Experimental Studies
Experimental Set up: Experiments were conducted on a 1-1 Shell and Tube Heat Exchanger. The Fig. 1 shows the schematic diagram of the heat exchanger
A heat exchanger is a device in which energy is transferred from one fluid to another across a solid surface. Exchanger analysis and design therefore involve both convection and conduction. Two important problems in heat exchanger analysis are (1) rating existing heat exchangers and (ii) sizing heat exchangers for a particular application. Rating involves determination of the rate of heat transfer, the change in temperature of the two fluids and the pressure drop across the heat exchanger. Sizing involves selection of a specific heat exchanger from those currently available or determining the dimensions for the design of a new heat exchanger, given the required rate of heat transfer and allowable pressure drop. The LMTD method can be readily used when the inlet and outlet temperatures of both the hot and cold fluids are known. When the outlet temperatures are not known, the LMTD can only be used in an iterative scheme. In this case the effectiveness-NTU method can be used to simplify the analysis. The choice of heat exchanger type directly affects the process performance and also influences plant size, plant layout, length of pipe runs and the strength and size of supporting structures. The most commonly used type of heat exchanger is the shell-and-tube heat exchanger, the optimal design of which is the main objective of this study. Computer software marketed by companies such as HTRI and HTFS are used extensively in the thermal design and rating of HEs. These packages incorporate various design options for the heat exchangers including the variations in the tube diameter, tube pitch, shell type, number of tube passes, baffle spacing, baffle cut, etc. A primary objective in the Heat Exchanger Design (HED) is the estimation of the minimum heat transfer area required for a given heat duty, as it governs the overall cost of the HE. But there is no concrete objective function that can be expressed explicitly as a function of the design variables and in fact many numbers of discrete combinations of the design variables are possible as is elaborated below. The tube diameter, tube length, shell types etc. are all standardized and are available only in certain sizes and geometry. And so the design of a shell-and-tube heat exchanger usually involves a trial and error procedure where for a certain combination of the design variables the heat transfer area is calculated and then another combination is tried to check if there is any possibility of reducing the heat transfer area. Since several discrete combinations of the design configurations are possible, the designer needs an efficient strategy to quickly locate the design configuration having the minimum heat exchanger cost. Thus the optimal design of heat exchanger can be posed as a large scale, discrete, combinatorial optimization problem (13). Most of the traditional optimization techniques based on gradient methods have the possibility of getting trapped at local optimum depending upon the degree of non-linearity and initial guess. Hence, these traditional optimization techniques do not ensure global optimum and also have limited applications. In the recent past, some experts studied on the design, performance analysis and simulation studies on heat exchangers(12),(13), (15), (16), (18). Modeling and Simulation of Shell and Tube Heat Exchangers Under Milk Fouling was carried out (15). Dynamic Model for Shell and Tube Heat Exchangers was discussed [12). Shell and Tube heat exchangers are applied where high temperature and pressure demands are significant and can be employed for a process requiring large quantities of fluid to be heated or cooled. Due to their design, these exchangers offer a large heat transfer area and provide high heat transfer efficiency in comparison with others. Modeling is a representation of physical or chemical process by a set of mathematical relationships that adequately describe the significant process behavior. Improving or understanding chemical process operation is a major objective for developing a process model. These models are often used for Process design, Safety system analysis and Process control. The simulation of an industrial system on a computer involves mathematical representation of the physical process undergone by the various components of the system, by a set of equations, which are in turn solved. Simulation is much cheaper than setting up big experiments or building prototypes of physical system and variables on the behavior of the system. A steady state model for the outlet temperature of both the cold and hot fluid of a shell and tube heat exchanger will be developed and simulated, which will be verified with the experiments conducted. Based on these observations correlations to find film heat transfer coefficients will be developed.
MATERIALS AND METHODS
Experimental Studies
Experimental Set up: Experiments were conducted on a 1-1 Shell and Tube Heat Exchanger. The Fig. 1 shows the schematic diagram of the heat exchanger
Design a commission plan that drives sales - Sales Commissions
Design a commission plan that drives sales - Sales Commissions
If you establish and oversee the commission package for your company's sales force, you should consider numerous components to create a plan that both fairly compensates and adequately motivates the sales team. Ultimately, your plan should keep your salespeople happy while supporting and advancing company goals.
GROUND RULES
You will find that methods for creating a compensation plan vary widely and often reflect industry-specific standards. However, some ground rules cut across industries and they can provide a framework for establishing or reviewing your company's sales incentive package. Some of the more important rules include:
* Start with the outcomes and behaviors you want to foster;
Most PopularCBS MoneyWatch.com Articles
5 Rules for Immediate Annuities
Death in the Family: 12 Things to Do Now
The New Job Market: Who Wins and Who Loses?
6 Online Networking Mistakes to Avoid
29 Fees We Hate Most
* Prioritize behaviors;
* Keep the incentives flexible so that they can evolve along with your company's goals;
* Make the compensation plan easy for everyone to understand;
* Benchmark your competition to stay competitive; and
* Review regularly for relevance.
START WITH RESULTS
Of fundamental importance is to determine what results you want to encourage and to design your plan from there.
A sales team's goals should reflect the company's larger goals. Consider reprinting corporate goals in your sales agreements to underscore a unity of purpose. For additional clarity, you may want to include work objectives, even if they are not tied to commissions.
SOME CARROTS ARE LARGER THAN OTHERS
Every incentive in a commission plan is a carrot, but some carrots can be larger than others depending on the behavior they reward. Prioritize the behaviors you want from your sales force. You then can set up a system of rewards that encourages top-priority behavior, as well as motivates salespeople for situations that are clearly distinguishable.
For example, you may want to commission third-party products at a different rate. You also might consider commissioning services differently than products.
You can implement an accelerator plan, which provides flexibility in the commission percentage earned and paid. In this case salespeople are paid at a lower rate until they meet their target.
After that, they are compensated at a more accelerated rate for every dollar they generate in excess of the target.
KEEP IT SIMPLE
A commission plan needs to be easy for your sales team to understand. Not only do sales people need to see clearly what is motivating them, but you don't want to spend your time haggling over commission payments.
Clearly identify how commissions are earned and keep the calculation formulas straightforward.
You can check your plan's simplicity by creating a few sales scenarios and asking the sales team to derive the compensation. If the plan is easily understood, everyone should come up with the same numbers. If different figures are calculated, consider reworking the plan.
KNOW YOUR COMPETITION
If you want to retain a top-level sales force, your plan needs to be competitive. Gather intelligence on how your competitors compensate their sales professionals. You can figure out what commission levels are reasonable and competitive for your industry or profession through an Internet search at a source such as www.salary.com.
Human resource specialists in an industry often can help you locate surveys with compensation information; or sales professionals always know what their industry pays and can share documentation. You also can tap in to your industry's professional association or ask your peers how they structure their commission contracts.
COMMISSION STRUCTURES
At the core of any incentive plan is determining what role commissions play in the overall sales compensation package. Four of the most common commission structures are:
* Commission only;
* Commission plus salary;
* Commission plus bonus; or
* Commission plus salary, plus bonus.
Although industry standards carry significant weight when creating a commission structure, ultimately your budget and priorities will determine how you pay sales professionals.
Again, when you hire sales professionals, they should immediately understand their earnings potential. For example, if you are paying commission only, you can specify that the commission will be X percent of the net sale, less any discounts. Or, you can define a base salary along with a target commission amount--the amount the salesperson would earn at 100 percent of quota. You might pay 50 percent base and 50 percent commission, or 80 percent salary and 20 percent commission.
If you pay bonuses, you'll need to determine not only the percentage, but if they are based on company-wide goals, individual goals or both.
DIFFERENT PAY FOR DIFFERENT PEOPLE?
If multiple salespeople do the same job, their commission compensation should be equal. On the other hand, if job responsibilities really are different, these expectations should be spelled out and compensated for appropriately.
You might want to reward salespeople through higher base salaries for length of service, experience or stellar performance. Most importantly, be clear with your sales staff and apply any differences consistently.
If you establish and oversee the commission package for your company's sales force, you should consider numerous components to create a plan that both fairly compensates and adequately motivates the sales team. Ultimately, your plan should keep your salespeople happy while supporting and advancing company goals.
GROUND RULES
You will find that methods for creating a compensation plan vary widely and often reflect industry-specific standards. However, some ground rules cut across industries and they can provide a framework for establishing or reviewing your company's sales incentive package. Some of the more important rules include:
* Start with the outcomes and behaviors you want to foster;
Most PopularCBS MoneyWatch.com Articles
5 Rules for Immediate Annuities
Death in the Family: 12 Things to Do Now
The New Job Market: Who Wins and Who Loses?
6 Online Networking Mistakes to Avoid
29 Fees We Hate Most
* Prioritize behaviors;
* Keep the incentives flexible so that they can evolve along with your company's goals;
* Make the compensation plan easy for everyone to understand;
* Benchmark your competition to stay competitive; and
* Review regularly for relevance.
START WITH RESULTS
Of fundamental importance is to determine what results you want to encourage and to design your plan from there.
A sales team's goals should reflect the company's larger goals. Consider reprinting corporate goals in your sales agreements to underscore a unity of purpose. For additional clarity, you may want to include work objectives, even if they are not tied to commissions.
SOME CARROTS ARE LARGER THAN OTHERS
Every incentive in a commission plan is a carrot, but some carrots can be larger than others depending on the behavior they reward. Prioritize the behaviors you want from your sales force. You then can set up a system of rewards that encourages top-priority behavior, as well as motivates salespeople for situations that are clearly distinguishable.
For example, you may want to commission third-party products at a different rate. You also might consider commissioning services differently than products.
You can implement an accelerator plan, which provides flexibility in the commission percentage earned and paid. In this case salespeople are paid at a lower rate until they meet their target.
After that, they are compensated at a more accelerated rate for every dollar they generate in excess of the target.
KEEP IT SIMPLE
A commission plan needs to be easy for your sales team to understand. Not only do sales people need to see clearly what is motivating them, but you don't want to spend your time haggling over commission payments.
Clearly identify how commissions are earned and keep the calculation formulas straightforward.
You can check your plan's simplicity by creating a few sales scenarios and asking the sales team to derive the compensation. If the plan is easily understood, everyone should come up with the same numbers. If different figures are calculated, consider reworking the plan.
KNOW YOUR COMPETITION
If you want to retain a top-level sales force, your plan needs to be competitive. Gather intelligence on how your competitors compensate their sales professionals. You can figure out what commission levels are reasonable and competitive for your industry or profession through an Internet search at a source such as www.salary.com.
Human resource specialists in an industry often can help you locate surveys with compensation information; or sales professionals always know what their industry pays and can share documentation. You also can tap in to your industry's professional association or ask your peers how they structure their commission contracts.
COMMISSION STRUCTURES
At the core of any incentive plan is determining what role commissions play in the overall sales compensation package. Four of the most common commission structures are:
* Commission only;
* Commission plus salary;
* Commission plus bonus; or
* Commission plus salary, plus bonus.
Although industry standards carry significant weight when creating a commission structure, ultimately your budget and priorities will determine how you pay sales professionals.
Again, when you hire sales professionals, they should immediately understand their earnings potential. For example, if you are paying commission only, you can specify that the commission will be X percent of the net sale, less any discounts. Or, you can define a base salary along with a target commission amount--the amount the salesperson would earn at 100 percent of quota. You might pay 50 percent base and 50 percent commission, or 80 percent salary and 20 percent commission.
If you pay bonuses, you'll need to determine not only the percentage, but if they are based on company-wide goals, individual goals or both.
DIFFERENT PAY FOR DIFFERENT PEOPLE?
If multiple salespeople do the same job, their commission compensation should be equal. On the other hand, if job responsibilities really are different, these expectations should be spelled out and compensated for appropriately.
You might want to reward salespeople through higher base salaries for length of service, experience or stellar performance. Most importantly, be clear with your sales staff and apply any differences consistently.
FAS 109
FAS 109: a primer for non-accountants - Financial Accounting Standards Board's "Statement 109: Accounting for Income Taxes"
Introduction
Income tax provisions and Schedule M-1(1) of Form 1120 (Corporation Income Tax Return) bridge the financial accounting world and the Internal Revenue Code. The benefit of understanding an income tax provision and an M-1 is that a preparer can bridge the gap between these two worlds.
This will in turn allow the preparer to talk intelligently with auditors, controllers, chief financial officers, corporate tax consultants, and tax return preparers. Because many controllers and CFOs do not have a tax background, it is important to learn at least the fundamentals of accounting for income taxes for financial accounting purposes.
Most PopularCBS MoneyWatch.com Articles
5 Rules for Immediate Annuities
Death in the Family: 12 Things to Do Now
The New Job Market: Who Wins and Who Loses?
6 Online Networking Mistakes to Avoid
29 Fees We Hate Most
This article does not discuss every situation that may arise on an income tax provision. What follows is intended to cover the purpose of a provision and the components of a provision, including deferred tax assets and liabilities as well as effective tax rate. The article concludes with an income tax provision template with the formulas footnoted.
Purpose of an Income Tax Provision
The Financial Accounting Standards Board issued "Statement 109: Accounting for Income Taxes" (FAS 109) in February 1992. The purpose of FAS 109 is to recognize (a) the amount of taxes payable or refundable for the current year and (b) the deferred tax liabilities and assets for the future tax consequences of events that have been recognized in a corporation's financial statements or tax returns. In essence, FAS 109 requires public companies to disclose a reconciliation of the reported amount of income tax expense to the amount of income tax expense that would result from applying domestic federal statutory rates to pretax financial income.
Deferred Tax Assets/Liabilities: How Do They Work?
Technically, deferred tax assets/liabilities are timing or temporary differences multiplied by the tax rate, also known as "tax effected." Temporary differences arise where the tax treatment of an item is temporarily different from its financial accounting treatment. For example, for a specific account, GAAP may allow a $20,000 expense and the Internal Revenue Code may allow only an $8,000 tax deduction. In this case, there will be a temporary difference if the Internal Revenue Code allows for the remaining $12,000 to be deducted in subsequent years.
A deferred tax asset/liability is the sum of the temporary differences for the ending balance in that account multiplied by the tax rate. The ending balance is relevant because FAS 109 takes a balance sheet approach. "Balance sheet approach" means that in arriving at a deferred tax asset or liability, the ending balance amount is the relevant number. Therefore, in the example above, if the account had a prior-year ending balance for tax purposes of $30,000 and $65,000 for book purposes and a current-year ending balance of $38,000 for tax purposes and $85,000 for book purposes then the temporary difference would be $47,000.
To further illustrate, assume the above balances are accrued vacation. Thus, at the end of the prior year (i.e., prior-year ending balance) there was a $65,000 accrual of vacation for book purposes. This means that, as of the end of the year, there was $65,000 of vacation expense that was owed to the employees, but the employees had not taken the vacation days by year-end. For tax purposes, the balance was $30,000. The difference in the treatment results from a tax rule that allows a deduction for accrued vacation used within 2-1/2 months after yearend.(2) In the example, the employees took $30,000 of the $65,000 vacation accrual within the requisite time period. Therefore, of the $65,000 vacation for book purposes, $30,000 can be deducted-for tax purposes. As a result, at the end of the prior year, there existed a $35,000 temporary difference. This represents the amount expensed for book purposes but disallowed as a deduction for tax purposes.
At the end of the current year there exists an $85,000 balance in the vacation accrual account. This means that $85,000 worth of vacation days is owed to the company's employees but these days have not been taken. For tax purposes, $38,000 is the deduction. The deferred tax asset would be $47,000 multiplied by the tax rate. Schedule M-1 focuses on the income statement numbers; that is to say, the flux between the prior year's temporary difference and the current year's balance will be the Schedule M-1 entry. This is the current-year activity.Account 12/31/98 Current-year
Balance Activity
Vacation Book 65,000 20,000
Accrual Tax (30,000) (8,000)
35,000 12,000
Net Deferred
Tax Asset/
(Liability)
Account 12/31/99 Tax Deferred Tax
Balance Rate Asset/(Liability)
Vacation 85,000 X % 85,000 x X%
Accrual (38,000) X % (38,000) x X%
47,000
Net Deferred
Tax Asset/ X
(Liability)
1. Tax Rate
The tax rate used in the previous illustration, is the federal statutory rate plus the state tax rate, net of federal benefit. The federal statutory rate is set forth in section 11(b) of Internal Revenue Code. The state tax rate net of federal benefit, however, takes several calculations. First, if the company is only subject to tax in one state, then that income tax rate is used as the starting point. Most public companies, however, are subject to state tax in many states. Therefore, an estimate must be used by looking at total state taxes paid as a percentage of taxable income. For example, if 50 percent of Company X's income comes from New York (9 percent income tax rate) and 50 percent comes from Colorado (4.75 percent income tax rate), then the blended rate will be 6.875 percent. For more complicated provisions, rather than using a blended rate, separate components of the provision are calculated for each state based on projected apportionment factors.
Introduction
Income tax provisions and Schedule M-1(1) of Form 1120 (Corporation Income Tax Return) bridge the financial accounting world and the Internal Revenue Code. The benefit of understanding an income tax provision and an M-1 is that a preparer can bridge the gap between these two worlds.
This will in turn allow the preparer to talk intelligently with auditors, controllers, chief financial officers, corporate tax consultants, and tax return preparers. Because many controllers and CFOs do not have a tax background, it is important to learn at least the fundamentals of accounting for income taxes for financial accounting purposes.
Most PopularCBS MoneyWatch.com Articles
5 Rules for Immediate Annuities
Death in the Family: 12 Things to Do Now
The New Job Market: Who Wins and Who Loses?
6 Online Networking Mistakes to Avoid
29 Fees We Hate Most
This article does not discuss every situation that may arise on an income tax provision. What follows is intended to cover the purpose of a provision and the components of a provision, including deferred tax assets and liabilities as well as effective tax rate. The article concludes with an income tax provision template with the formulas footnoted.
Purpose of an Income Tax Provision
The Financial Accounting Standards Board issued "Statement 109: Accounting for Income Taxes" (FAS 109) in February 1992. The purpose of FAS 109 is to recognize (a) the amount of taxes payable or refundable for the current year and (b) the deferred tax liabilities and assets for the future tax consequences of events that have been recognized in a corporation's financial statements or tax returns. In essence, FAS 109 requires public companies to disclose a reconciliation of the reported amount of income tax expense to the amount of income tax expense that would result from applying domestic federal statutory rates to pretax financial income.
Deferred Tax Assets/Liabilities: How Do They Work?
Technically, deferred tax assets/liabilities are timing or temporary differences multiplied by the tax rate, also known as "tax effected." Temporary differences arise where the tax treatment of an item is temporarily different from its financial accounting treatment. For example, for a specific account, GAAP may allow a $20,000 expense and the Internal Revenue Code may allow only an $8,000 tax deduction. In this case, there will be a temporary difference if the Internal Revenue Code allows for the remaining $12,000 to be deducted in subsequent years.
A deferred tax asset/liability is the sum of the temporary differences for the ending balance in that account multiplied by the tax rate. The ending balance is relevant because FAS 109 takes a balance sheet approach. "Balance sheet approach" means that in arriving at a deferred tax asset or liability, the ending balance amount is the relevant number. Therefore, in the example above, if the account had a prior-year ending balance for tax purposes of $30,000 and $65,000 for book purposes and a current-year ending balance of $38,000 for tax purposes and $85,000 for book purposes then the temporary difference would be $47,000.
To further illustrate, assume the above balances are accrued vacation. Thus, at the end of the prior year (i.e., prior-year ending balance) there was a $65,000 accrual of vacation for book purposes. This means that, as of the end of the year, there was $65,000 of vacation expense that was owed to the employees, but the employees had not taken the vacation days by year-end. For tax purposes, the balance was $30,000. The difference in the treatment results from a tax rule that allows a deduction for accrued vacation used within 2-1/2 months after yearend.(2) In the example, the employees took $30,000 of the $65,000 vacation accrual within the requisite time period. Therefore, of the $65,000 vacation for book purposes, $30,000 can be deducted-for tax purposes. As a result, at the end of the prior year, there existed a $35,000 temporary difference. This represents the amount expensed for book purposes but disallowed as a deduction for tax purposes.
At the end of the current year there exists an $85,000 balance in the vacation accrual account. This means that $85,000 worth of vacation days is owed to the company's employees but these days have not been taken. For tax purposes, $38,000 is the deduction. The deferred tax asset would be $47,000 multiplied by the tax rate. Schedule M-1 focuses on the income statement numbers; that is to say, the flux between the prior year's temporary difference and the current year's balance will be the Schedule M-1 entry. This is the current-year activity.Account 12/31/98 Current-year
Balance Activity
Vacation Book 65,000 20,000
Accrual Tax (30,000) (8,000)
35,000 12,000
Net Deferred
Tax Asset/
(Liability)
Account 12/31/99 Tax Deferred Tax
Balance Rate Asset/(Liability)
Vacation 85,000 X % 85,000 x X%
Accrual (38,000) X % (38,000) x X%
47,000
Net Deferred
Tax Asset/ X
(Liability)
1. Tax Rate
The tax rate used in the previous illustration, is the federal statutory rate plus the state tax rate, net of federal benefit. The federal statutory rate is set forth in section 11(b) of Internal Revenue Code. The state tax rate net of federal benefit, however, takes several calculations. First, if the company is only subject to tax in one state, then that income tax rate is used as the starting point. Most public companies, however, are subject to state tax in many states. Therefore, an estimate must be used by looking at total state taxes paid as a percentage of taxable income. For example, if 50 percent of Company X's income comes from New York (9 percent income tax rate) and 50 percent comes from Colorado (4.75 percent income tax rate), then the blended rate will be 6.875 percent. For more complicated provisions, rather than using a blended rate, separate components of the provision are calculated for each state based on projected apportionment factors.
7 tips for effective listening: productive listening does not occur naturally.
7 tips for effective listening: productive listening does not occur naturally. It requires hard work and practice - Back To Basics - effective listening is a crucial skill for internal auditors
TO BE SUCCESSFUL AT THEIR job, internal auditors must be able to write, speak, and listen effectively. Of these three skills, effective listening may be the most crucial because auditors are required to do it so often. Unfortunately, listening also may be the most difficult skill to master.
Effective listening is challenging, in part, because people often are more focused on what they're saying than on what they're hearing in return. According to a recent study by the Harvard Business Review, people think the voice mail they send is more important than the voice mail they receive. Generally, senders think that their message is more helpful and urgent than do the people who receive it.
Additionally, listening is difficult because people don't work as hard at it as they should. Listening seems to occur so naturally that putting a lot of effort into it doesn't seem necessary. However, hard work and effort is exactly what effective listening requires.
Internal auditors must listen to explanations, rationales, and defenses of financial practices and procedures. They are constantly communicating with fellow employees whose backgrounds range from accounting to finance to marketing to information systems. In addition, explanations by fellow employees of any "unusual" practices often pose a significant challenge to an internal auditor's listening skills. Auditors can use the following techniques to improve these skills.
1. CONCENTRATE ON WHAT OTHERS ARE SAYING. When listening to someone, do you often find yourself thinking about a job or task that is nearing deadline or an important family matter? In the middle of a conversation, do you sometimes realize that you haven't heard a word the other person has said? Most individuals speak at the rate of 175 to 200 words per minute. However, research suggests that we are very capable of listening and processing words at the rate of 600 to 1,000 words per minute. An internal auditor's job today is very fast and complex, and because the brain does not use all of its capacity when listening, an auditor's mind may drift to thinking of further questions or explanations rather than listening to the message at hand. This unused brainpower can be a barrier to effective listening, causing the auditor to miss or misinterpret what others are saying. It is important for internal auditors to actively concentrate on what others are saying so that effective communication can occur.
2. SEND THE NONVERBAL MESSAGE THAT YOU ARE LISTENING. When someone is talking to you, do you maintain eye contact with that person? Do you show the speaker you are listening by nodding your head? Does your body language transmit the message that you are listening? Are you leaning forward and not using your hands to play with things? Most communication experts agree that nonverbal messages can be three times as powerful as verbal messages. Effective communication becomes difficult anytime you send a nonverbal message that you're not really listening.
3. AVOID EARLY EVALUATIONS. When listening, do you often make immediate judgments about what the speaker is saying? Do you assume or guess what the speaker is going to say next? Do you sometimes discover later that you failed to interpret correctly what the speaker was telling you? Because a listener can listen at a faster rate than most speakers talk, there is a tendency to evaluate too quickly. That tendency is perhaps the greatest barrier to effective listening. It is especially important to avoid early evaluations when listening to a person with whom you disagree. When listeners begin to disagree with a sender's message, they tend to misinterpret the remaining information and distort its intended meaning so that it is consistent with their own beliefs.
4. AVOID GETTING DEFENSIVE. Do you ever take what another person says personally when what her or she is saying is not meant to be personal? Do you ever become angry at what another person says? Careful listening does not mean that you will always agree with the other party's point of view, but it does mean that you will try to listen to what the other person is saying without becoming overly defensive. Too much time spent explaining, elaborating, and defending your decision or position is a sure sign that you are not listening. This is because your role has changed from one of listening to a role of convincing others they are wrong. After listening to a position or suggestion with which you disagree, simply respond with something like, "I understand your point. We just disagree on this one." Effective listeners can listen calmly to another person even when that person is offering unjust criticism.
5. PRACTICE PARAPHRASING. Paraphrasing is the art of putting into your own words what you thought you heard and saying it back to the sender. For example, a subordinate might say: "You have been unfair to rate me so low on my performance appraisal. You have rated me lower than Jim. I can do the job better than him, and I've been here longer." A paraphrased response might be: "I can see that you are upset about your rating. You think it was unfair for me to rate you as I did." Paraphrasing is a great technique for improving your listening and problem-solving skills. First, you have to listen very carefully if you are going to accurately paraphrase what you heard. Second, the paraphrasing response will clarify for the sender that his or her message was correctly received and encourage the sender to expand on what he or she is trying to communicate.
TO BE SUCCESSFUL AT THEIR job, internal auditors must be able to write, speak, and listen effectively. Of these three skills, effective listening may be the most crucial because auditors are required to do it so often. Unfortunately, listening also may be the most difficult skill to master.
Effective listening is challenging, in part, because people often are more focused on what they're saying than on what they're hearing in return. According to a recent study by the Harvard Business Review, people think the voice mail they send is more important than the voice mail they receive. Generally, senders think that their message is more helpful and urgent than do the people who receive it.
Additionally, listening is difficult because people don't work as hard at it as they should. Listening seems to occur so naturally that putting a lot of effort into it doesn't seem necessary. However, hard work and effort is exactly what effective listening requires.
Internal auditors must listen to explanations, rationales, and defenses of financial practices and procedures. They are constantly communicating with fellow employees whose backgrounds range from accounting to finance to marketing to information systems. In addition, explanations by fellow employees of any "unusual" practices often pose a significant challenge to an internal auditor's listening skills. Auditors can use the following techniques to improve these skills.
1. CONCENTRATE ON WHAT OTHERS ARE SAYING. When listening to someone, do you often find yourself thinking about a job or task that is nearing deadline or an important family matter? In the middle of a conversation, do you sometimes realize that you haven't heard a word the other person has said? Most individuals speak at the rate of 175 to 200 words per minute. However, research suggests that we are very capable of listening and processing words at the rate of 600 to 1,000 words per minute. An internal auditor's job today is very fast and complex, and because the brain does not use all of its capacity when listening, an auditor's mind may drift to thinking of further questions or explanations rather than listening to the message at hand. This unused brainpower can be a barrier to effective listening, causing the auditor to miss or misinterpret what others are saying. It is important for internal auditors to actively concentrate on what others are saying so that effective communication can occur.
2. SEND THE NONVERBAL MESSAGE THAT YOU ARE LISTENING. When someone is talking to you, do you maintain eye contact with that person? Do you show the speaker you are listening by nodding your head? Does your body language transmit the message that you are listening? Are you leaning forward and not using your hands to play with things? Most communication experts agree that nonverbal messages can be three times as powerful as verbal messages. Effective communication becomes difficult anytime you send a nonverbal message that you're not really listening.
3. AVOID EARLY EVALUATIONS. When listening, do you often make immediate judgments about what the speaker is saying? Do you assume or guess what the speaker is going to say next? Do you sometimes discover later that you failed to interpret correctly what the speaker was telling you? Because a listener can listen at a faster rate than most speakers talk, there is a tendency to evaluate too quickly. That tendency is perhaps the greatest barrier to effective listening. It is especially important to avoid early evaluations when listening to a person with whom you disagree. When listeners begin to disagree with a sender's message, they tend to misinterpret the remaining information and distort its intended meaning so that it is consistent with their own beliefs.
4. AVOID GETTING DEFENSIVE. Do you ever take what another person says personally when what her or she is saying is not meant to be personal? Do you ever become angry at what another person says? Careful listening does not mean that you will always agree with the other party's point of view, but it does mean that you will try to listen to what the other person is saying without becoming overly defensive. Too much time spent explaining, elaborating, and defending your decision or position is a sure sign that you are not listening. This is because your role has changed from one of listening to a role of convincing others they are wrong. After listening to a position or suggestion with which you disagree, simply respond with something like, "I understand your point. We just disagree on this one." Effective listeners can listen calmly to another person even when that person is offering unjust criticism.
5. PRACTICE PARAPHRASING. Paraphrasing is the art of putting into your own words what you thought you heard and saying it back to the sender. For example, a subordinate might say: "You have been unfair to rate me so low on my performance appraisal. You have rated me lower than Jim. I can do the job better than him, and I've been here longer." A paraphrased response might be: "I can see that you are upset about your rating. You think it was unfair for me to rate you as I did." Paraphrasing is a great technique for improving your listening and problem-solving skills. First, you have to listen very carefully if you are going to accurately paraphrase what you heard. Second, the paraphrasing response will clarify for the sender that his or her message was correctly received and encourage the sender to expand on what he or she is trying to communicate.
Inscription à :
Articles (Atom)