Benefits Of Cell Phone Directory

Submitted by: Robinson Luke

If you have already searched public records in order to track a number to no avail, you may consider taking advantage of cell phone directory.

You’ll be able to get through the number and trace it most likely. In fact, you will be able to get all the details about the cell phone number including name and address of the phone owner. Yes, you no longer need to stress yourself and avoid taking unknown calls as you can trace the call where it is coming from, find out who is troubling you, and take a legal action against the person.

Cell phones have added a lot of convenience in our lives, but there are some people who are always ready to misuse any new technology and trouble others. If you’re also sick of continuous unknown calls at odd hours, scary or abusive calls don’t worry or get frightened as now you can put an end to this irritating scene. You can find out complete information about the person and put him behind the bars. All you need to do is to follow a simple procedure.

YouTube Preview Image

Visit My Cell Phone Directory online and enter the phone number and search. You’ll be able to find first and last name of the caller, billing address, date of birth, date of registration, previous owner info, phone service provider, and associated phone numbers.

What else you want? Once you identify unknown phone number and get all details, you can put an end to prank phone calls, annoying telemarketers, harassing phone calls, and other unwanted phone calls.

This reverse lookup cell phone numbers facility offers you complete information about the caller. If you find it hard to believe, try viewing sample reverse phone lookup facility by entering your own or neighbor’s number. Once you get true information, you’ll be surprised to know how amazing it is. If somebody is disturbing you, use cell phone directory right now and find his complete information.

My cell phone directory also helps you in finding the cell phone numbers of your old friends, relatives, neighbors, school and college friends, lost love, classmates, and anybody else whose number you’ve been looking for. It has now become very simple to find the lost contact and get in touch with them.

In order to find their cell phone numbers, all you need to do is to enter their first and last name and state where they reside and search. You’ll be able to find their cell phone number easily. If you don’t believe what wonders this phone directory can do, you can try it. Simply enter the name and state of any of your acquaintances and search for their numbers. When you see the results with your own eyes, you’ll believe how helpful it is.

Cell phone directory contains national registry database with 311,327,890 cell phone numbers; 1,524, 567,920 landline numbers; 22,426,784 unpublished numbers; and 140,460 new phone numbers. It is a huge database and has almost all records. Therefore, it is not difficult to find the cell phone numbers of your old friends and lost love. If somebody is troubling you, you can also put an end to it by tracing the call.

About the Author: My Cell phone Directory is an online directory with huge database that allows you to find cell phone numbers of your lost contacts and details of unknown callers within a few moments. Visit

for more information .


Permanent Link:

Posted in Gates | Leave a comment

Millions of old New Zealand coins still to be handed in

Wednesday, October 25, 2006

On November 1, 2006 the old five, ten, twenty and fifty cent coins will be illegal tender, but the Reserve Bank of New Zealand says there are still at least 100 million still to be returned.

According to the Reserve Bank, most of the old coins have been lost in drains or buried in rubbish. “We think there is still another 100 million sitting around in people’s homes,” Brian Lang, currency manger for the Reserve Bank, said.

Lang said: “So far, just over 280 million coins have been returned, but there are more out there. Since 1967 the Reserve Bank has issued more than a billion of the old ‘silver’ coins. So if you don’t want to be stuck with loads of old coin – there’s never been a better time to empty your coin jars, sweep the car glove box and rummage behind the couch cushions.”

The coins still awaiting to be handed in, by either spending them, taking them to a bank or donating them to charity, are estimated to be worth between NZ$5 million and $50 million.

“A last-minute burst of publicity may convince people to bring the coins in. It’s a bit of a hassle though. Human nature being what it is, people just don’t care,” Lang said.The Karori Wildlife Sanctuary located in Wellington say that they have collected over $9,000 in old coins. Sanctuary spokesman, Alan Dicks said: “The campaign was particularly fitting because the old coins depicted tuataras and kiwis, both of which can be found living at the sanctuary. The money will go towards supporting general ecological restoration of the sanctuary. We want to get over ten grand, but the more the better.”

Lang said: “Though the coins will no longer be legal tender, banks will continue to exchange them until at least the end of the year,” and the Reserve Bank will always exchange them. “We are still getting people coming in with two-dollar notes,” Lang added.

Leave a comment

Information On Parental Monitoring Software

By IPRWire Staff Writer

We have entered the technological age. Parents may find that advances in technology make so many jobs easier. We now have vacuums that operate on their own or GPS systems that ensure one does not get lost. The latest devices in technology improve our lives in a specific way. The one downfall of the technological revolution is the question most parents ask. How is a parent supposed to monitor a child?

Children are now able to view any type of information on the internet. One of the scariest thoughts is that a child is able to talk to people on the internet. This leaves children open for a number of dangerous situations. Parental monitoring software tools enable a parent to monitor the type of web content that their children are viewing on the internet. IPOWER Applications Home Pow Wow is a great website that provides parents with information about this type of tools.

Parental internet monitoring software tools are designed to give parents control of what children view online. A parent is able to see who was online, what websites were visited and and/or used the most. Parental monitoring tools are one of the best ways to protect children while they are online. Every parent wants to protect their children for as long as possible.

YouTube Preview Image

SMS text message parental monitoring is another type of software tool that sends duplicate copies of ingoing and outgoing text messages. This type of tool can be installed into any cell phone that is currently on the market. This is a secret way to monitor the messages that children receive and send out to friends. Children seem to always be using their cell phones to communicate constantly with friends. Stay up to date on the information that your child sends and receives.

There are several different kinds of parental internet monitoring software tools that a parent can choose from. We live in the future age in which children are put into contact with inappropriate information or people each day. Make sure that this does not happen by investing in monitoring tools. It seems that each week there is a newspaper article or an announcement about a child who came into contact with the wrong type of person on the internet.

Children are an irreplaceable resource that we must work to protect. Keep your children safe while online. Learn more information about parental monitoring software tools at IPOWER Applications Home Pow Wow. This is a great online resource that explains the different types of monitoring equipment that parents can purchase. Visit

to find out more information about protecting children while online or when using cell phones.

About the Author:

is a leading provider of integrated ON-DEMAND applications for home content security and companies of all sizes. For more information on parental internet monitoring software and child internet monitoring please visit our site.


Permanent Link:

Posted in Scaffolding | Leave a comment

Listening to you at last: EU plans to tap cell phones

Monday, October 19, 2009

A report accidentally published on the Internet provides insight into a secretive European Union surveillance project designed to monitor its citizens, as reported by Wikileaks earlier this month. Project INDECT aims to mine data from television, internet traffic, cellphone conversations, p2p file sharing and a range of other sources for crime prevention and threat prediction. The €14.68 million project began in January, 2009, and is scheduled to continue for five years under its current mandate.

INDECT produced the accidentally published report as part of their “Extraction of Information for Crime Prevention by Combining Web Derived Knowledge and Unstructured Data” project, but do not enumerate all potential applications of the search and surveillance technology. Police are discussed as a prime example of users, with Polish and British forces detailed as active project participants. INDECT is funded under the European Commission’s Seventh Framework Programme (FP7), and includes participation from Austria, Bulgaria, Czech Republic, France, Germany, Hungary, Poland, Slovakia, Spain, and the United Kingdom.

Indicated in the initial trial’s report, the scope of data collected is particularly broad; days of television news, radio, newspapers, and recorded telephone conversations are included. Several weeks of content from online sources were agglomerated, including mining Wikipedia for users’ and article subjects’ relations with others, organisations, and in-project movements.

Watermarking of published digital works such as film, audio, or other documents is discussed in the Project INDECT remit; its purpose is to integrate and track this information, its movement within the system and across the Internet. An unreleased promotional video for INDECT located on YouTube is shown to the right. The simplified example of the system in operation shows a file of documents with a visible INDECT-titled cover taken from an office and exchanged in a car park. How the police are alerted to the document theft is unclear in the video; as a “threat”, it would be the INDECT system’s job to predict it.

Throughout the video use of CCTV equipment, facial recognition, number plate reading, and aerial surveillance give friend-or-foe information with an overlaid map to authorities. The police proactively use this information to coordinate locating, pursuing, and capturing the document recipient. The file of documents is retrieved, and the recipient roughly detained.

Technology research performed as part of Project INDECT has clear use in countering industrial and international espionage, although the potential use in maintaining any security and predicting leaks is much broader. Quoted in the UK’s Daily Telegraph, Liberty’s director, Shami Chakrabarti, described a possible future implementation of INDECT as a “sinister step” with “positively chilling” repercussions Europe-wide.

“It is inevitable that the project has a sensitive dimension due to the security focussed goals of the project,” Suresh Manandhar, leader of the University of York researchers involved in the “Work Package 4” INDECT component, responded to Wikinews. “However, it is important to bear in mind that the scientific methods are much more general and has wider applications. The project will most likely have lot of commercial potential. The project has an Ethics board to oversee the project activities. As a responsible scientists [sic] it is of utmost importance to us that we conform to ethical guidelines.”

Should the EU carry out this research without a wider public debate?
Add or view comments

Although Wikinews attempted to contact Professor Helen Petrie of York University, the local member of Project INDECT’s Ethics board, no response was forthcoming. The professor’s area of expertise is universal access, and she has authored a variety of papers on web-accessibility for blind and disabled users. A full list of the Ethics board members is unavailable, making their suitability unassessable and distancing them from public accountability.

One potential application of Project INDECT would be implementation and enforcement of the U.K.’s “MoD Manual of Security“. The 2,389-page 2001 version passed to Wikileaks this month — commonly known as JSP-440, and marked “RESTRICTED” — goes into considerable detail on how, as a serious threat, investigative journalists should be monitored, and effectively thwarted; just the scenario the Project INDECT video could be portraying.

When approached by Wikinews about the implications of using INDECT, a representative of the U.K.’s Attorney General declined to comment on legal checks and balances such a system might require. Further U.K. enquiries were eventually referred to the Police Service of Northern Ireland, who have not yet responded.

Wikinews’ Brian McNeil contacted Eddan Katz, the International Affairs Director for the Electronic Frontier Foundation (E.F.F.). Katz last spoke to Wikinews in early 2008 on copyright, not long after taking his current position with the E.F.F. He was back in Brussels to speak to EU officials, Project INDECT was on his agenda too — having learned of it only two weeks earlier. Katz linked Project INDECT with a September report, NeoConopticon — The EU Security-Industrial Complex, authored by Ben Hayes for the Transnational Institute. The report raises serious questions about the heavy involvement of defence and IT companies in “security research”.

On the record, Katz answered a few questions for Wikinews.

((WN)) Is this illegal? Is this an invasion of privacy? Spying on citizens?

Eddan Katz When the European Parliament issued the September 5, 2001 report on the American ECHELON system they knew such an infrastructure is in violation of data protection law, undermines the values of privacy and is the first step towards a totalitarian surveillance information society.

((WN)) Who is making the decisions based on this information, about what?

E.K. What’s concerning to such a large extent is the fact that the projects seem to be agnostic to that question. These are the searching systems and those people that are working on it in these research labs do search technology anyway. […] but its inclusion in a database and its availability to law enforcement and its simultaneity of application that’s so concerning, […] because the people who built it aren’t thinking about those questions, and the social questions, and the political questions, and all this kind of stuff. [… It] seems like it’s intransparent, unaccountable.

The E.U. report Katz refers to was ratified just six days before the September 11 attacks that brought down the twin towers of the World Trade Center. In their analysis of the never-officially-recognised U.S. Echelon spy system it states, “[i]n principle, activities and measures undertaken for the purposes of state security or law enforcement do not fall within the scope of the EC Treaty.” On privacy and data-protection legislation enacted at E.U. level it comments, “[such does] not apply to ‘the processing of data/activities concerning public security, defence, state security (including the economic well-being of the state when the activities relate to state security matters) and the activities of the state in areas of criminal law'”.

Part of the remit in their analysis of Echelon was rumours of ‘commercial abuse’ of intelligence; “[i]f a Member State were to promote the use of an interception system, which was also used for industrial espionage, by allowing its own intelligence service to operate such a system or by giving foreign intelligence services access to its territory for this purpose, it would undoubtedly constitute a breach of EC law […] activities of this kind would be fundamentally at odds with the concept of a common market underpinning the EC Treaty, as it would amount to a distortion of competition”.

Ben Hayes’ NeoConoptiocon report, in a concluding section, “Following the money“, states, “[w]hat is happening in practice is that multinational corporations are using the ESRP [European Seventh Research Programme] to promote their own profit-driven agendas, while the EU is using the programme to further its own security and defence policy objectives. As suggested from the outset of this report, the kind of security described above represents a marriage of unchecked police powers and unbridled capitalism, at the expense of the democratic system.”

Leave a comment

Toothpaste fills cavities without drilling

Thursday, February 24, 2005

A paste containing synthetic tooth enamel can seal small cavities without drilling. Kazue Yamagishi and colleagues at the FAP Dental Institute in Tokyo say that the paste can repair small cavities in 15 minutes.

Currently, fillers don’t stick to such small cavities so dentists must drill bigger holes. Hydroxyapatite crystals, of which natural enamel is made, bond with teeth to repair tiny areas of damage.

Yamagishi and colleagues have tested their paste on a lower premolar tooth that showed early signs of decay. They found that the synthetic enamel merged with the natural enamel. The synthetic enamel also appears to make teeth stronger which will improve resistance to future decay. As with drilling, however, there is still the potential for pain: The paste is strongly acidic to encourage crystal growth and causes inflammation if it touches the gums.

The paste is reported in the journal Nature.

Leave a comment

Feminist gathering in Tehran dispersed by police

Tuesday, June 13, 2006

Police dispersed a group of activists who had gathered at the Haft-e Tir square in Tehran on Monday, reportedly using pepper spray and beating up some of the protestors. The group was staging a demonstration calling for equal treatment for women under the Iranian law and better protection of their rights. The Iranian Justice minister Jamal Karimirad later said that 70 people were detained in connection with the event, of whom 42 were women.

He also said that the reports of police beating up the protestors were being reviewed.

The activists were protesting against gender discrimination in Iranian law, which is partly based on the Islamic Sharia law. Women have had the right to vote and be elected to the Majlis (parliament) since 1963, but under the prevailing laws, they are excluded from constitutional posts such as Judge and President and their testimony in court is only worth half of that of a man. Similarly, “Blood Money” or compensation paid to the family of a murdered woman is only half of that for a man. The protestors were calling for equal divorce and custody rights for women, reform of inheritance laws, as well as a ban on polygamy.

Leave a comment

Work Injury Prevention The Basic Concept Of Worker’s Protection Part 1

Submitted by: Stell Guino

Understanding Protection.

Protection here, is a protection system in the form of compensation that is not in the form of monetary or cash, either directly or indirectly, employed by companies to workers. This protection by providing a sense of security, both in the financial, health, and physical safety as workers, so workers can move quietly and can contribute positively to the enhancement value of the company. the protection of workers is a necessity for companies that are required by the government through rules and laws. In implementing protection programs, many employers are working with insurance companies that provide cover to possible health problems, financial or other problems encountered or experienced by workers and his families in the future. Practically, the granting of this protection is not the same quality for each worker, depending on each position and their work’s responsibility.

Factors That Determine Protection Provision of protection between each employee is influenced by various factors namely:


The higher the position an employee in a company, the greater the responsibility upon him. A CEO, a top leader in the enterprise, carry the greatest responsibility to the viability of business enterprises. The higher the responsibility carried by one, the higher the insurance coverage provided by the company. For example, a Manager of Treasury or the Branch Manager of the Bank have a higher responsibility than the Dealer who served in the Dealing Room. Therefore, the degree of protection provided by the company to the Manager of Treasury or the Branch Manager is higher than the Dealer, for example of the quality of health benefits.

YouTube Preview Image

Skill (Expertise)

For enterprise business continuity, companies need employees who have special expertise. for example, in the field of information technology, the company hire the information technology experts who mastered computer technology. Their expertise is very specific, so as to maintain to keep them working at the company, the company implemented a program worthy of protection and even sometimes above – average that what can be given by competitors. Protection’s program applied to workers who have specialized skills will be higher compared with workers that do not require special expertise, such as clerical workers

Mental Effort (l Brain / Mental)

Employees who rely on the ability of the brain work better. such as analysts, programmers, marketers, or accountant. The working class is often called the “White Collar” worker class is usually obtain a higher degree of protection compared with the working class who rely more on physical strength (Blue Collar)

Physical condition or effort

Employees who rely more on physical strength (Blue Collar), such as security guards (guard), janitors or construction workers. Usually the protection given by the company to them more focused in the form of protection for safety.

Work Conditions

The working conditions are expected by the worker to a single industry sector is often different. For example, working conditions for workers in the field of petroleum, which works in offshore will vary with the working conditions on the ground. The more heavy working conditions faced by workers, the higher the protection programs are implemented.

Government (Government Regulation)

Government as a regulator usually make regulations requiring employers or companies to provide adequate protection for workers. For example, the government oblige companies provide protection for workers through insurance.. Through insurance, the workers laid off, workers who experience accidents during work, will get proper compensation from the insurance. In addition, the government also requires companies to grant leave for worker’s physical and mental refreshment.

Next in part 2, I will explain more about compensation as a worker’s protection

About the Author: copyright(C) stell g tamvoe 2010 For more information about worker’s compensation, work’s injury and work accident compensation claim, visit our blog


Permanent Link:

Posted in It Services | Leave a comment

New Zealand Tsunami heroes to receive Special Service Medal

Monday, December 26, 2005

A new medal has been created for New Zealanders who helped in recovery efforts after the Boxing Day Tsunami.

Called the New Zealand Special Service Medal (Asian Tsunami) it recognises the work of New Zealanders who went to the region after the tsunami; locating the missing, identifying the dead, and assisting those left behind. Defence Minister Phil Goff says New Zealanders who served in the devastated areas in the first two months after the tsunami, are to receive the medal.

In a provisional list; which was released today; 163 New Zealanders are honoured in which 37 are non-military or police personnel (including aid workers).

Also, forty-seven police officers will receive the honour for their work identifying bodies in Thailand.

Prime Minister Helen Clark said the medal recognised “the special service of those New Zealanders who undertook often harrowing tasks in dangerous conditions”.

Leave a comment

Bangladesh security tightened following Pilkhana massacre and Bashundhara City fire

Friday, March 20, 2009

Following the Pilkhana massacre which occurred February 25 and 26 leaving 74 dead and the inferno at the Bashundhara City shopping mall complex March 13 leaving seven dead, Prime Minister Sheikh Hasina said security measures are being tightened countrywide across Bangladesh.

Fire drills will be enacted at all key-point installations (KPI). Fire fighting systems will be examined by the fire brigade and the public works department (PWD) to ensure functionality. Security measures will be enhanced supplementing areas under private security such as at the Bashundhara City Complex.

The Fire Service and Civil Defence Department requires modernization and needs new equipment to fight fires past the sixth floor of buildings. The Fire Brigade says it needs turntable ladders, snorkels, foam-tenders, lighting units, emergency tenders, fireproof uniforms, and rescue ropes for fire fighting and rescue operations. Transportation to fires is also an issue due to narrow roads, low electrical wires and congestion.

The Bangladesh National Building Code requires fire fighting equipment installed in buildings over seven floors. This code is to be monitored by authorities to ensure compliance with the new guidelines and to make sure buildings are being maintained.

The Bashundhara City Complex opened Monday for shoppers two days after Friday’s blaze. A probe is underway to determine the cause of the fire and to assess structural damage.

Loss of life was minimized as the blaze broke out on a Friday, the beginning of the weekend in Bangladesh, so offices in the upper floors were empty. The lower eight floors are used for shopping and the upper floors are all Bashundhara Group offices.

The mall is valued at Tk 7.0 billion (US$100 million). It is not known if the complex is covered by fire insurance.

It is estimated that it will take over two years to rebuild the area damaged by flames which were burned down to a skeleton. Bashundhara City’s technical advisor, Latifur Rahman, estimated damages at Tk 2.0 billion (US$29m).

Only one television cameraman has been allowed in to film the burnt area. None of the 2,500 shops, cinemas or cafes were burnt by the inferno. The seventh and eighth floors still experience smoke damage, and there was water damage to merchandise.

A three member committee is currently investigating the cause of the fire which will consist of Iqbal Khan Chowdhury, joint secretary of the ministry, representatives of the police, IGP Noor Muhammad, and fire brigade, Director General Abu Nayeem Md Shahidullah. The committee is required to report within the week with their findings. The forensics department is also sifting through the burnt remains.

The Dhaka Chamber of Commerce and Industries has also formed a committee which has begun interviewing witnesses and recording their testimony alongside the government committee.

It has been discovered that 150 closed circuit cameras were not being used when the fire started. Another mystery is why the mall fire fighting system has been found unused.

Why the fire burnt so fiercely is a matter to think….These matters seem to be mysterious

“In the shopping mall there is an ultra-technology elevator which runs even without electricity but we have found that locked,” Iqbal Khan Chowdhury, joint secretary (Police) of the home ministry, said. “Why the fire burnt so fiercely is a matter to think. We have to see if there was any incendiary substance there. These matters seem to be mysterious.”

Mall management has been asked to submit substances and items which would have been in the upper floors when the fire started. The fire erupted on the 17th floor and spread quickly to the two floors above and engulfed the three floors below. The aerial ladders belonging to the Fire Service and Civil Defence reached as high as the 13th floor of the 21-storey building.

Videos have been sent to the United States (US) for examination to assist in determining the cause of the fire and to help in the damage assessment. Experts from the US are expected to arrive soon.

Firefighters were brought to the rooftop of the 20-storey tower by helicopter. The only fatality in this operation was Baki Billa, a firefighter of Bashundhara City firefighting department, who fell when climbing down a rope from a helicopter to the roof of the building. Three other firefighters made the transition safely. At this same time, the chief security officer was safely rescued by the Bangladesh Air Force helicopter, a Bell 212. Six security officers of the complex also lost their lives.

Leave a comment

Benefits Of Social Media Marketing In Los Angeles

byAlma Abell

It is true that if you want your business to succeed you will need to use social media in some way. However, most people in Los Angeles have no idea about social marketing techniques or what to do and they believe they will see results quickly. In most cases, this doesn’t happen or it won’t overnight. It does take time to build up your social media platforms and sometimes it can be hard to see the benefits.

Brand Recognition

Social media is a great brand-building tool. You can potentially position your business and tell people what you want them to know. This can definitely help you build a reputation around your brand and company’s benefits, advantages and values.


Having followers join your community is a great feeling. This means that you have access to them and can find out more about what they want from you and others. This also means you have the potential to reach more people, if your followers share and like your posts.


There is an old saying that people must see your product six or eight times before they will decide to purchase it. With social media marketing in Los Angeles, you will definitely be able to give repeat exposure to your brand or service, though you shouldn’t over-expose yourself, either.


You want people to think of your brand when they think of a question or something specific. For example, if you own a cleaning business, you want people to think of you when they have dirty carpets. If you answer questions, give great content and serve the audience, then you will ultimately build a loyalty base.


When your audience grows, your influence will also grow. More and more people will want to see what your brand is about and they will visit your page on social media sites, go to your website and more.

Website Traffic

If you share blog posts and videos, along with other content from your website, you can interest the audience into clicking through the post and visiting your site. Once at your website, the potential customer can sign up for your newsletter, purchase an item, or give your company a call. It would be helpful to install traffic monitoring services to see just how much traffic you generate because of social media marketing, as it will help you understand the great benefit you have.

It can be tough to handle your own social media marketing in Los Angeles, but it doesn’t have to be. Visit Top Tier Media today to learn more about them.

Posted in Copywriting | Leave a comment