Monday, August 10, 2009

Credit Cards - Points to remember

Credit cards and debit cards are the most common items in most of our lives. People who are working the MNCs or even government companies are most aware of Credit Cards as well as Debit cards. Where as most of the students who are away from their parents access the money from the ATMs using the debit cards only.

Debit and credit cards look alike, but they’re two entirely different payment methods. While a credit card is a "buy-now, pay-later" tool, a debit card draws funds from your bank account. Since your purchase is automatically deducted from your bank account, make sure you have the money available now to cover what you buy .
Credit Cards and Most important points to remember

Credit cards lets you to spend money without having it to be with you. You will have to pay the money later as specified by the contract between you and your bank. So you should be more careful while dealing with the credit cards. Card Agreement Note the grace period, annual fees, cash advance fees, finance charges etc. Look for the cards which offer free for lifetime. Once you received your credit card, read carefully all documents bank sent.

Make sure to up to date with your contact details
If you change your name or address, notify your lending institution immediately. You don’t want to risk a late payment. Also contact your lender if you cannot make a payment on your account for any reason and convince them that you will pay the dues after some time. They might be able to arrange special payment options that help you avoid credit problems.

Use the credit available to you with care
Keep track of your purchases and use your card wisely. Do not use the card to the full extent of available limit. You will face problems in paying the amount if you overuse and their by you will attract high interest rates.

Do not exceed the credit limit
Exceeding your credit limit is considered a violation of your account agreement and may result in additional fees or penalties, or the freezing or cancellation of your account. So do not use the card exceeding your credit limit.

Pay off your balance within the grace period
Always try to pay off the entire amount in the same month you spend. So that you can avoid the interest rates which will ranges from 30% - 50% per annum.

Make more than the minimum payment
If you can not pay off your total balance each month, then at least try to pay more than the minimum required. If you pay only minimum amount all the time, you may need more than 3-5 years to pay the full amount and may require you to pay interest than the amount you have spent.

Never delay payments, you may incur huge penalties
Be sure to get your payment in before the due date to avoid a late fee and possible credit damage.You may face problems in future for getting loans etc. if you do not pay the dues on time for many number of times. You may be declared as default in case you continuously stop paying the dues.

Tuesday, July 21, 2009

small business lawyer

If you own a small business, at some point you're going to need a lawyer. Contrary to popular perception, lawyers do more than solve problems. An experienced small-business lawyer can help you start your business, look over and negotiate proposed leases, and prepare contracts. Attorneys help you comply

With so many lawyers running around these days, you'd think it would be easy to find a great one for your small business. Unfortunately, a surplus of trained legal professionals doesn't mean they all have the expertise you need. You're going to have to search to find just the right legal expert. Start with referrals from accountants, bankers, successful small-business owners, and trusted friends. Bar associations offer referral services as well, but they don't tell you much about the lawyer — just that they're a member of the bar.

Also, make sure you are up to speed on the relationship that you will have with your lawyer. For more information, read The Attorney-Client Relationship.

Once you've compiled a list of candidates, narrow your choices with the information available in the Martindale-Hubbell Law Directory. The easiest way to access the directory is through Lawyers.com. The site lists most practicing lawyers, and offers brief biographical sketches, including information about experience and specialties. Almost every lawyer is rated according to confidential opinions solicited from lawyers and judges.

Travel insurance

Travel insurance is insurance that is intended to cover medical expenses and financial (such as money invested in nonrefundable pre-payments) and other losses incurred while traveling, either within one's own country,annual travel or internationally.

Temporary travel insurance can usually be arranged at the time of the booking of a trip to cover exactly the duration of that trip, or a more extensive, continuous insurance can be purchased from travel insurance companies, travel agents or directly from travel suppliers such as cruiselines or tour operators. However, travel insurance purchased from travel suppliers tends to be less inclusive than insurance offered by insurance companies n travel medical insurance.

Travel insurance often offers coverage for a variety of travelers. Student travel, business travel, leisure travel, adventure travel, cruise travel, and international travel are all various options that can be insured for travel vacations.

The most common risks that are covered by travel insurance are:

Medical expenses
Emergency evacuation/repatriation
Overseas funeral expenses
Accidental death, injury or disablement benefit
Cancellation
Curtailment
Delayed departure
Loss, theft or damage to personal possessions and money (including travel documents)
Delayed baggage (and emergency replacement of essential items)
Legal assistance
Personal liability and rental car damage excess
Some travel policies will also provide cover for additional costs, although these vary widely between providers.

In addition, often separate insurance can be purchased for specific costs such as:

pre-existing medical conditions (e.g. asthma, diabetes)
sports with an element of risk (e.g. skiing, scuba-diving)
travel to high risk countries (e.g. due to war or natural disasters or acts of terrorism)

Common Exclusions:

pre-existing medical conditions
war or terrorism - but some plans may cover this risk
injury or illness caused by alcohol or drug use
Usually, the insurers cover pregnancy related expenses, if the travel occurs within the first trimester. After that, insurance coverage varies from insurer to insurer.[1]

Travel insurance can also provide helpful services, often 24 hours a day, 7 days a week that can include concierge services and emergency travel assistance.

Typically travel insurance for the duration of a journey costs approximately 5-7% of the cost of the trip.

Friday, January 9, 2009

Short message service

Short Message Service (SMS) is a communications protocol allowing the interchange of short text messages between mobile telephone devices. SMS text messaging is the most widely used data application on the planet, with 2.4 billion active users, or 74% of all mobile phone subscribers sending and receiving text messages on their phones.The SMS technology has facilitated the development and growth of text messaging. The connection between the phenomenon of text messaging and the underlying technology is so great that in parts of the world the term "SMS" is used as a synonym for a text message or the act of sending a text message, even when a different protocol is being used.
SMS as used on modern handsets was originally defined as part of the GSM series of standards in 1985 as a means of sending messages of up to 160 characters (including spaces), to and from GSM mobile handsets.Since then, support for the service has expanded to include alternative mobile standards such as ANSI CDMA networks and Digital AMPS, as well as satellite and landline networks. Most SMS messages are mobile-to-mobile text messages, though the standard supports other types of broadcast messaging as well.

SMS as part of GSM
The idea of adding text messaging to the services of mobile users was latent in many communities of mobile communication services at the beginning of the 1980s. The person attributed for inventing the idea is Matti Makkonen then of Telecom Finland in 1984, who received the Economist Award for Innovation for this contribution in 2008. Mostthought of SMS as providing a means to alert the individual mobile user, for example, of a deposited voice mail, whereas others had more sophisticated applications in their minds, such as telemetry. However, few believed that SMS would be used as a means for sending text messages from one mobile user to another.
As early as February 1985, after having already been discussed in GSM subgroup WP3, chaired by J. Audestad, SMS was considered in the main GSM group as a possible service for the new digital cellular system. In GSM document "Services and Facilities to be provided in the GSM System", both mobile originated and mobile terminated short messages appear on the table of GSM teleservices.
The discussions on the GSM services were then concluded in the recommendation GSM 02.03 "TeleServices supported by a GSM PLMN".Here a rudimentary description of the three services was given:
Short message Mobile Terminated (SMS-MT)/ Point-to-Point: the ability of a network to transmit a Short Message to a mobile phone. The message can be sent by phone or by a software application.
Short message Mobile Originated (SMS-MO)/ Point-to-Point: the ability of a network to transmit a Short Message sent by a mobile phone. The message can be sent to a phone or to a software application.
Short message Cell Broadcast.
This was handed over to a new GSM body called IDEG (the Implementation of Data and Telematic Services Experts Group), which had its kickoff in May 1987 under the chairmanship of Friedhelm Hillebrand. The technical standard known today was largely created by IDEG (later WP4) as the two recommendations GSM 03.40 (the two point-to-point services merged together) and GSM 03.41 (cell broadcast).
The Mobile Application Part (MAP) of the SS7 protocol included support for the transport of Short Messages through the Core Network from its inception.MAP Phase 2 expanded support for SMS by introducing a separate operation code for Mobile Terminated Short Message transport.Since Phase 2, there have been no changes to the Short Message operation packages in MAP, although other operation packages have been enhanced to support CAMEL SMS control.
From 3GPP Releases 99 and 4 onwards, CAMEL Phase 3 introduced the ability for the Intelligent Network (IN) to control aspects of the Mobile Originated Short Message Service, while CAMEL Phase 4, as part of 3GPP Release 5 and onwards, provides the IN with the ability to control the Mobile Terminated service.CAMEL allows the gsmSCP to block the submission (MO) or delivery (MT) of Short Messages, route messages to destinations other than that specified by the user, and perform real-time billing for the use of the service. Prior to standardized CAMEL control of the Short Message Service, IN control relied on switch vendor specific extensions to the Intelligent Network Application Part (INAP) of SS7.
The first SMS message was sent over the Vodafone GSM network in the United Kingdom, from Neil Papworth of Sema Group using a personal computer to Richard Jarvis of Vodafone using an Orbitel 901 handset. The text of the message was "Merry Christmas".The first SMS typed on a GSM phone is claimed to have been sent by Riku Pihkonen, an engineering student at Nokia, in 1993.
Initial growth was slow, with customers in 1995 sending on average only 0.4 messages per GSM customer per month. One factor in the slow takeup of SMS was that operators were slow to set up charging systems, especially for prepaid subscribers, and eliminate billing fraud which was possible by changing SMSC settings on individual handsets to use the SMSCs of other operators
Over time, this issue was eliminated by switch-billing instead of billing at the SMSC and by new features within SMSCs to allow blocking of foreign mobile users sending messages through it. By the end of 2000, the average number of messages reached 35 per user per month,and by Christmas Day 2006, over 205m texts were sent in the UK alone.
It is also alleged that the fact that roaming customers, in the early days, rarely received bills for their SMSs after holidays abroad had a boost on text messaging as an alternative to voice calls

Embedded system

An embedded system is a special-purpose computer system designed to perform one or a few dedicated functions,often with real-time computing constraints. It is usually embedded as part of a complete device including hardware and mechanical parts. In contrast, a general-purpose computer, such as a personal computer, can do many different tasks depending on programming. Embedded systems control many of the common devices in use today.
Since the embedded system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product, or increasing the reliability and performance. Some embedded systems are mass-produced, benefiting from economies of scale.
Physically, embedded systems range from portable devices such as digital watches and MP3 players, to large stationary installations like traffic lights, factory controllers, or the systems controlling nuclear power plants. Complexity varies from low, with a single microcontroller chip, to very high with multiple units, peripherals and networks mounted inside a large chassis or enclosure.
In general, "embedded system" is not an exactly defined term, as many systems have some element of programmability. For example, Handheld computers share some elements with embedded systems — such as the operating systems and microprocessors which power them — but are not truly embedded systems, because they allow different applications to be loaded and peripherals to be connected.

CPU platforms
Embedded processors can be broken into two broad categories: ordinary microprocessors (μP) and microcontrollers (μC), which have many more peripherals on chip, reducing cost and size. Contrasting to the personal computer and server markets, a fairly large number of basic CPU architectures are used; there are Von Neumann as well as various degrees of Harvard architectures, RISC as well as non-RISC and VLIW; word lengths vary from 4-bit to 64-bits and beyond (mainly in DSP processors) although the most typical remain 8/16-bit. Most architectures come in a large number of different variants and shapes, many of which are also manufactured by several different companies.
A long but still not exhaustive list of common architectures are: 65816, 65C02, 68HC08, 68HC11, 68k, 8051, ARM, AVR, AVR32, Blackfin, C167, Coldfire, COP8, eZ8, eZ80, FR-V, H8, HT48, M16C, M32C, MIPS, MSP430, PIC, PowerPC, R8C, SHARC, ST6, SuperH, TLCS-47, TLCS-870, TLCS-900, Tricore, V850, x86, XE8000, Z80, etc.

Ready made computer boards
PC/104 and PC/104+ are examples of available ready made computer boards intended for small, low-volume embedded and ruggedized systems. These often use DOS, Linux, NetBSD, or an embedded real-time operating system such as MicroC/OS-II, QNX or VxWorks.
In certain applications, where small size is not a primary concern, the components used may be compatible with those used in general purpose computers. Boards such as the VIA EPIA range help to bridge the gap by being PC-compatible but highly integrated, physically smaller or have other attributes making them attractive to embedded engineers. The advantage of this approach is that low-cost commodity components may be used along with the same software development tools used for general software development. Systems built in this way are still regarded as embedded since they are integrated into larger devices and fulfill a single role. Examples of devices that may adopt this approach are ATMs and arcade machines.

ASIC and FPGA solutions
A common configuration for very-high-volume embedded systems is the system on a chip (SoC) which contains a complete system consisting of (multiple) processors, multipliers, caches and interfaces on a single chip. SoCs can be implemented as an application-specific integrated circuit (ASIC) or using a field-programmable gate array (FPGA).

Peripherals
Embedded Systems talk with the outside world via peripherals, such as:
Serial Communication Interfaces (SCI): RS-232, RS-422, RS-485 etc
Synchronous Serial Communication Interface: I2C, SPI, SSC and ESSI
Universal Serial Bus (USB)
Networks: Ethernet, Controller Area Network, LonWorks, etc
Timers: PLL(s), Capture/Compare and Time Processing Units
Discrete IO: aka General Purpose Input/Output (GPIO)
Analog to Digital/Digital to Analog (ADC/DAC)
Debugging: JTAG, ISP, ICSP, BDM Port, ...

Tools
As for other software, embedded system designers use compilers, assemblers, and debuggers to develop embedded system software. However, they may also use some more specific tools:
In circuit debuggers or emulators.
utilities to add a checksum or CRC to a program, so the embedded system can check if the program is valid.
For systems using digital signal processing, developers may use a math workbench such as Scilab / Scicos, MATLAB / Simulink, MathCad, or Mathematica to simulate the mathematics. They might also use libraries for both the host and target which eliminates developing DSP routines as done in DSPnano RTOS and Unison Operating System.
Custom compilers and linkers may be used to improve optimisation for the particular hardware.
An embedded system may have its own special language or design tool, or add enhancements to an existing language such as Forth or Basic.
Another alternative is to add a Real-time operating system or Embedded operating system, which may have DSP capabilities like DSPnano RTOS.
Software tools can come from several sources:
Software companies that specialize in the embedded market
Ported from the GNU software development tools
Sometimes, development tools for a personal computer can be used if the embedded processor is a close relative to a common PC processor
As the complexity of embedded systems grows, higher level tools and operating systems are migrating into machinery where it makes sense. For example, cellphones, personal digital assistants and other consumer computers often need significant software that is purchased or provided by a person other than the manufacturer of the electronics. In these systems, an open programming environment such as Linux, NetBSD, OSGi or Embedded Java is required so that the third-party software provider can sell to a large market.

Debugging
Embedded Debugging may be performed at different levels, depending on the facilities available. From simplest to most sophisticated they can be roughly grouped into the following areas:
Interactive resident debugging, using the simple shell provided by the embedded operating system (e.g. Forth and Basic)
External debugging using logging or serial port output to trace operation using either a monitor in flash or using a debug server like the Remedy Debugger which even works for heterogeneous multicore systems.
An in-circuit debugger (ICD), a hardware device that connects to the microprocessor via a JTAG or NEXUS interface. This allows the operation of the microprocessor to be controlled externally, but is typically restricted to specific debugging capabilities in the processor.
An in-circuit emulator replaces the microprocessor with a simulated equivalent, providing full control over all aspects of the microprocessor.
A complete emulator provides a simulation of all aspects of the hardware, allowing all of it to be controlled and modified, and allowing debugging on a normal PC.
Unless restricted to external debugging, the programmer can typically load and run software through the tools, view the code running in the processor, and start or stop its operation. The view of the code may be as assembly code or source-code.
Because an embedded system is often composed of a wide variety of elements, the debugging strategy may vary. For instance, debugging a software- (and microprocessor-) centric embedded system is different from debugging an embedded system where most of the processing is performed by peripherals (DSP, FPGA, co-processor). An increasing number of embedded systems today use more than one single processor core. A common problem with multi-core development is the proper synchronization of software execution. In such a case, the embedded system design may wish to check the data traffic on the busses between the processor cores, which requires very low-level debugging, at signal/bus level, with a logic analyzer, for instance.

Reliability
Embedded systems often reside in machines that are expected to run continuously for years without errors, and in some cases recover by themselves if an error occurs. Therefore the software is usually developed and tested more carefully than that for personal computers, and unreliable mechanical moving parts such as disk drives, switches or buttons are avoided.
Specific reliability issues may include:
The system cannot safely be shut down for repair, or it is too inaccessible to repair. Examples include space systems, undersea cables, navigational beacons, bore-hole systems, and automobiles.
The system must be kept running for safety reasons. "Limp modes" are less tolerable. Often backups are selected by an operator. Examples include aircraft navigation, reactor control systems, safety-critical chemical factory controls, train signals, engines on single-engine aircraft.
The system will lose large amounts of money when shut down: Telephone switches, factory controls, bridge and elevator controls, funds transfer and market making, automated sales and service.
A variety of techniques are used, sometimes in combination, to recover from errors -- both software bugs such as memory leaks, and also soft errors in the hardware:
watchdog timer that resets the computer unless the software periodically notifies the watchdog
subsystems with redundant spares that can be switched over to
software "limp modes" that provide partial function
Immunity Aware Programming

High vs Low Volume
For high volume systems such as portable music players or mobile phones, minimizing cost is usually the primary design consideration. Engineers typically select hardware that is just “good enough” to implement the necessary functions.
For low-volume or prototype embedded systems, general purpose computers may be adapted by limiting the programs or by replacing the operating system with a real-time operating system.

Advanced Micro Devices

Advanced Micro Devices, Inc. (AMD) (NYSE: AMD) is an American multinational semiconductor company based in Sunnyvale, California, that develops computer processors and related technologies for commercial and consumer markets. Its main products include microprocessors, motherboard chipsets, embedded processors and graphics processors for servers, workstations and personal computers, and processor technologies for handheld devices, digital television, and game consoles.
AMD is the second-largest global supplier of microprocessors based on the x86 architecture after Intel Corporation, and the third-largest supplier of graphics processing units. It also owns 21 percent of Spansion, a supplier of non-volatile flash memory. In 2007, AMD ranked eleventh among semiconductor manufacturers in terms of revenue.

AMD chipsets
Before the launch of Athlon 64 processors in 2003, AMD designed chipsets for their processors spanning the K6 and K7 processor generations. The chipsets include the AMD-640, AMD-751 and the AMD-761 chipsets. The situation changed in 2003 with the release of Athlon 64 processors, and AMD chose not to further design its own chipsets for its desktop processors while opening the desktop platform to allow other firms to design chipsets. This is the "Open Platform Initiative". The initiative was proven to be a success, with many firms such as Nvidia, ATI, VIA and SiS developing their own chipset for Athlon 64 processors and later Athlon 64 X2 and Athlon 64 FX processors, including the Quad FX platform chipset from Nvidia.
The initiative went further with the release of Opteron server processors as AMD stopped the design of server chipsets in 2004 after releasing the AMD-8111 chipset, and again opened the server platform for firms to develop chipsets for Opteron processors. As of today, Nvidia and Broadcom are the sole designing firms of server chipsets for Opteron processors.
As the company completed the acquisition of ATI Technologies in 2006, the firm gained the ATI design team for chipsets which previously designed the Radeon Xpress 200 and the Radeon Xpress 3200 chipsets. AMD then renamed the chipsets for AMD processors under AMD branding (for instance, the CrossFire Xpress 3200 chipset was renamed as AMD 580X CrossFire chipset). In February 2007, AMD announced the first AMD-branded chipset since 2004 with the release of the AMD 690G chipset (previously under the development codename RS690), targeted at mainstream IGP computing. It was the industry's first to implement a HDMI 1.2 port on motherboards, shipping for more than a million units. While ATI had aimed at releasing an Intel IGP chipset, the plan was scrapped and the inventories of Radeon Xpress 1250 (codenamed RS600, sold under ATI brand) was sold to two OEMs, Abit and AsRock. Although AMD states the firm will still produce Intel chipsets, Intel had not granted the license of 1333 MHz FSB to ATI. Considering the rivalry between AMD and Intel, AMD is less likely to release more Intel chipset designs in the foreseeable future.
On November 15, 2007, AMD has announced a new chipset series portfolio, the AMD 7-Series chipsets, covering from enthusiast multi-graphics segment to value IGP segment, to replace the AMD 480/570/580 chipsets and AMD 690 series chipsets. Marking AMD's first enthusiast multi-graphics chipset. Discrete graphics chipsets were launched on November 15, 2007 as part of the codenamed Spider desktop platform, and IGP chipsets were launched at a later time in Spring 2008 as part of the codenamed Cartwheel platform.
AMD will also return to the server chipsets market with the next-generation AMD 800S series server chipsets, scheduled to be released in 2009 timeframe.

Production and fabrication
AMD produces their own processors in wholly owned semiconductor Fabrication Plants, called "FABs". AMD uses a "FAB x" naming convention for their production facilities, where "x" is the number of years that have passed between the founding of AMD and the date the FAB opened.
At their Fabrication facilities, AMD utilizes a system called Automated Precision Manufacturing (APM). APM is a collection of manufacturing technologies AMD has developed over their history (many of which AMD holds patents for), which are designed to enhance the microprocessor production process, primarily in terms of yield. Much of APM is related to removing the "human equation" from the manufacturing process by isolating in-process wafers in containers that are only exposed to clean room facilities. AMD claims that the technologies that combine to make APM are unique to the industry and make it the foremost semiconductor manufacturer in the world - a fact which is lent some credence by their current agreement with Chartered Semiconductor Manufacturing based in Singapore.
AMD currently has a production agreement with foundry Chartered Semiconductor Manufacturing which allows Chartered access to AMD Automated Precision Manufacturing (APM) process technology, in exchange for which Chartered will act as extra production capacity for AMD.
Through the acquisition of ATI, AMD also has manufacturing agreements with TSMC to produce ATI's lines of graphics and chipset processors. It is currently unclear how much of ATI's manufacturing needs will be moved to AMD's own fabs and how much will remain outsourced to other foundry companies, but AMD has announced plans for future processors to be outsourced to TSMC, while coincidently TSMC had announced it had received orders to fabricate x86 processors.
AMD Saxony in Dresden, Germany is the major wafer production site.
AMD's main microprocessor manufacturing and design facilities are located in Dresden, Germany. Additionally, highly integrated microprocessors are manufactured in Taiwan made by third-party manufacturers under strict license from AMD. Between 2003 and 2005, they constructed a second manufacturing plant (300 mm 90 nm process SOI) in the same complex in order to increase the number of chips they can produce, thus becoming more competitive with Intel. The new plant has been named "Fab 36", in recognition of AMD's 36 years of operation, and is expected to reach full production in mid-2007. AMD recently announced that they have just completed the conversion of Fab 36 from 90 nm to 65 nm and have now shifted their focus to the 45 nm conversion.AMD has planned expansions in their production capacity. In addition to the completion of Fab 36 in Dresden, AMD is planning to upgrade Fab 30 (adjacent to Fab 36) in Dresden from 200 mm 90 nm process SOI to a 300 mm 65 nm process SOI facility and rename it Fab 38. Originally, Fab 30 was supposed to begin 65 nm production in late 2007 but AMD recently announced they would slow down the upgrade to reduce capital expenditures. Because of US$5 billion in long-term debt, during summer of 2008 AMD has tried and failed to sell both Dresden plants for which there has not been buyers
Packaging and testing facilities for its microprocessor products are located in Singapore, Malaysia and China.
Furthermore, AMD announced plans to open a new $3.2 billion facility at the Luther Forest Technology Campus across the towns of Malta and Stillwater in Saratoga County, New York. This new Fab 4x will likely produce 300 mm 32 nm process SOI production, with construction taking place from 2009 to 2010. Some speculation exists as to whether this facility will use high-K/metal gate technology that AMD obtained from IBM.
AMD has also invested $3billion to build a chip fabrication plant in India. Currently, AMD is manufacturing chips in India as a result of their partnership with SemIndia, a group of investors aiming at building a wafer fab, as well as assembly and test operation centers. "AMD ponders over new chip plant in India"
In June 2006, Chartered Semiconductor began shipments of manufactured AMD microprocessors, many of which are shipped from Singapore to Taiwanese and Chinese OEM/ODM manufacturing companies that build computers for companies like Lenovo and Dell.
AMD maintains major design facilities in Fort Collins, CO, Sunnyvale, CA, Austin, TX, Boxborough, MA and Bangalore, India. With the acquisition of ATI Technologies, the company gained ownership over major design facilities in Markham, ON and Santa Clara, CA.

Acronis True Image 2009 Home

Acronis True Image Home 2009 provides the maximum flexibility to ensure you are adequately protected and can recover from unforeseen events such as viruses, unstable software downloads, and hard drive failures. Create an exact copy of your PC for a full backup or backup only your important data and application settings ? your choice!
You've accumulated a lifetime of memories on your home PC, in addition to important personal documents, such as tax returns and resumes, not to mention all the applications you have installed and unique settings for each family member that took countless hours to set up. Acronis True Image Home 2009 helps makes certain that you are adequately protected; ensuring that you can recover your precious data in case your PC fails or your computer hard disk is damaged by a virus.

*One-click? protection
Initially, you decide what, where and when to back up. After that, backups occur automatically or with just one click.

*Full text search
You will be able to search for files through multiple archives by name or by a part of the name and then restore individual files easily and quickly. You can also perform searches of the files content.

*Zip archive format support available
In addition to Acronis' powerful TIB data compression backup format, one of the most densely compressed backup file types available to consumers, Acronis True Image Home 2009 also supports the popular ZIP® format.

*Windows Vista® -style interface
The new, sleek interface of this product works on Microsoft® Windows XP and Vista operating systems.

*Auto backup based on destination availability
Users can decide to back up automatically or as soon as a destination drive is available. Works jointly with existing scheduling.

*Automatic computer shutdown after backup or restoration finishes
You can now perform a backup at night and go to sleep without bothering about turning off the computer. The PC will shut down when the back up is complete.

*Archive to various places
You can save full, incremental and differential backups almost anywhere. You now you have ultimate flexibility in choosing a place to store from the same data series: on a network share, CD/DVD, USB stick, FTP-server, any local internal or external hard drive. You can now also give meaningful names to incremental and differential backups, for example, "C-drive-before-repartitioning".

*Making reserve copies of your backups
You can make reserve copies of your backups and save them on a network drive, or a USB storage device. You have a choice of making a reserve copy as regular (flat) files, a zip compressed file, and a tib file.

*Consolidation
You can define rules for consolidating your archives to reduce storage space. Merge an older full backup with several incremental backups to quickly create a new full backup; subsequent backups are based on the newly-created full backup.

*Exclude Files and Folders
Back up only the data you want to keep and save disk space.

*Migration tools
Make upgrades easier with built-in PC cloning and migration tools.

*Migration tools make upgrades easier
PC cloning or adding a new disk is simple with Acronis True Image Home 2009's built-in migration tools. No longer must you reinstall the operating system, applications, or re-key user settings when you clone your PC or increase its storage capacity.

*Security, performance and privacy tools
When you replace a hard drive on your PC, Acronis ensures you don't inadvertently give personal or organizational data to cyber thieves. Acronis Drive Cleanser, a $50 value is included at no charge. It protects sensitive data from view by wiping a disk clean of all data. If you don't need to erase the entire disk, File Shredder safely destroys individual files so they can't be resurrected. A System clean-up utility restores system efficiency.

Download
http://rapidshare.com/files/172435370/TrueImage2009_d_en.exe
Serial Number :
http://rapidshare.com/files/172442484/TrueImage2009_d_en.exe_Ser.txt
Acronis.True.Image.Home.2009.v12.0.9646.Patch.Under.SEH.Team.rar
http://rapidshare.com/files/176889047/maeT.HES.rednU.hctaP.6469.0.21v.9002.emoH.egamI.eurT.sinorcA.rar