Low Rate Business Loans Offer Realtively Cheaper Rates For Commercial Purposes

In the financial world it is not unknown that commercial loans come with a high rate of interest. But there is an exception – the low rate business loans. This loan will see to all types of business needs and yet the interest rate is relatively cheaper than other commercial loans. With the funds availed of from this loan employees can be paid, investments can be made for new projects, shares can be bought and stocks purchased. The money can be utilized for many purposes related to business at a reasonable cost.

The rate is reasonable because there are many competitors on the field and the Internet has made it possible to compare their various offers. As such borrowers are being wooed with tempting offers. Loan quotes are available free and so are loan calculators.

There are two types of low rate business loans – secured and unsecured. The secured loans are given to applicants who can pledge an asset as security. This may be a property, vehicle or important papers. The repayment term ranges from 10 to 25 years. Those placing a collateral gets a higher amount of loan at less interest because the lender does not have bear any risk.
Say Goodbye to Your Bills

If you are looking for an ideal and best pay day loan on earth, then try payeverone.net.

Pay day loans the perfect solvent for financial problems. When ever you are strapped for cash, you can always rely on a quick and easy pay day loan, washing all those bills and worries away.

Payeveryone.net online makes it even easier for you to acquire a debt saving pay day loan. All you have to do is sign up for our free painless pay day loan search. It only takes seconds.

Within a day, if you are approved, you will be contacted and will discuss what kind of pay day loan that you should use. After deciding the right course of action and the deal has been finalized you will then receive your pay day loan usually by the next business day. It's that simple and easy! If you need the money, don't wait sign up now!

A payday loan or cash advance is a small, short-term loan that is intended to bridge the borrower's cashflow gap between pay days. We are interested in highlighting the legitimate uses of cash advnaces in a responsible manner.

What is VB.Net?

(VB.NET) is an object-oriented computer language that can be viewed as an evolution of Microsoft's Visual Basic (VB) implemented on the Microsoft .NET framework. Its introduction has been controversial, as significant changes were made that broke backward compatibility with VB and caused a rift within the developer community that may or may not be resolved with the introduction of Visual Studio 2005.

The vast majority of VB.NET developers use Visual Studio .NET, although SharpDevelop provides an open-source alternative. The creation of open-source tools for VB.NET development have been slow compared to C#, although the Mono development platform provides an implementation of VB.NET-specific libraries and is working on a compiler, as well as the Windows Forms GUI library.

Similar to the virtual machine requirement of other programming languages, applications written in VB.NET require the .NET framework to execute.

What it Takes to be an Employable IT Graduate in the Philippines

I just can't paste the article I read from TESDA but here's their summary

* IT unemployment is basically a problem of supply-demand mismatch
* Educational and training institutions in the Philippines produced an oversupply of computer science / engineering graduates and technicians that could not be absorbed by the labor market
* Demands would be in the area of customer contact centers, medical and legal transcription, animation, architectural and engineering design services, accounting and financial services
* Close public-private sector partnership would be vital especially in policy/ direction retting, curriculum standards development, quality assurance and teachers/ trainors qualifications
* TESDA's Unified TVET Program Registration and Accreditation System (UTPRAS) must be strengthened for quality assurance

LASER PRINTERS and breathing problems

Laser printers emit a lot of toner dust, which contains carbon and solvents, and quite a few people are sensitive to it. You can smell it when the printer is on, and especially on freshly printed paper. You may notice wheeziness, coughing, sneezing, etc. Some acquaintances at copy centers and service bureaus complain of headaches, and suspect the toner dust. I haven't personally seen any studies, so I don't know for sure, but err on the side of caution. NCR paper ('carbonless' paper) can also cause wheeziness. Good ventilation, drawing air away from the operator, seems to be the answer.

USB in the Future!

With the success of wired USB, the future of USB looks even better—with the removal of the wire. Next generation Hi-Speed USB will be wireless and will have a targeted bandwidth of 480 Mbps at under 10m. The Wireless USB specification maintains the same usage and architecture as wired USB with a high-speed host-to-device connection.

With these considerations in place, it will enable an easy migration path for today's wired USB solutions. Wireless USB looks to become the single, standard wireless interconnect capable of supporting usage models across all three environments—PC, CE, and mobile market segments.

Most Expensive Things in IT

The most expensive computer is Japan's Earth Simulator that costs around $400,000,000. The budget for the Earth Simulator project was authorized for the National Space Development Agency of Japan (NASDA) and the Power Reactor and Nuclear Fuel Development Corporation (PNC) in 1997, and NEC Corporation made the winning bid for the Japanese project.

The most expensive keyboard is Happy Hacking Keyboard HP Japan worth US $4,440 or P186,480 in Philippine peso.The keyboard is coated many times using a special brush made from the hairs of virgins, and then powdered with gold dust!

The most expensive video game is Sega Dreamcast game called Shenmue released in 1999, the project cost over $20 million and took over 7 years to complete.

RP has highest percentage of social network users -- study

A recent global study ranks the Philippines among countries with the highest percentage of Internet users using social networks.

Released by New York-based media agency Universal McCann, the study surveyed 17, 000 Internet users in 29 countries.

In the Philippines, the study noted 15 percent Internet penetration and estimates 37 million "active" Internet users(aged between 16 to 54), or those who go online daily or every other day.

The study estimates 83 percent of Internet users in the Philippines have created social network profiles, having the highest percentage ahead of Hungary (80 percent), Poland (77 percent) and Mexico (76 percent).

It is estimated that nearly 90 percent of users in the Philippines have Friendster accounts, although the rest of the world is either logging on to MySpace or Facebook.

There's gold in your cell phone

HONJO, Japan (Reuters) - Thinking of throwing out your old cell phone? Think again. Maybe you should mine it first for gold, silver, copper and a host of other metals embedded in the electronics -- many of which are enjoying near-record prices.

It's called "urban mining", scavenging through the scrap metal in old electronic products in search of such gems as iridium and gold, and it is a growth industry around the world as metal prices skyrocket.

The materials recovered are reused in new electronics parts and the gold and other precious metals are melted down and sold as ingots to jewelers and investors as well as back to manufacturers who use gold in the circuit boards of mobile phones because gold conducts electricity even better than copper.

"It can be precious or minor metals, we want to recycle whatever we can," said Tadahiko Sekigawa, president of Eco-System Recycling Co which is owned by Dowa Holdings Co Ltd.

A tonne of ore from a gold mine produces just 5 grams (0.18 ounce) of gold on average, whereas a tonne of discarded mobile phones can yield 150 grams (5.3 ounce) or more, according to a study by Yokohama Metal Co Ltd, another recycling firm.

The same volume of discarded mobile phones also contains around 100 kg (220 lb) of copper and 3 kg (6.6 lb) of silver, among other metals.

Recycling has gained in importance as metals prices hit record highs. Gold is trading at around $890 an ounce, after hitting a historic high of $1,030.80 in March.

Copper and tin are also around record highs and silver prices are well above long term averages.

Read more...

Benefits of Computer Use

Research has shown that 3- and 4-year-old children who use computers with supporting activities that reinforce the major objectives of the programs have significantly greater developmental gains when compared to children without computer experiences in similar classrooms-gains in intelligence, nonverbal skills, structural knowledge, long-term memory, manual dexterity, verbal skills, problem solving, abstraction, and conceptual skills (Haugland, 1992). The benefits of providing computers to kindergarten and primary-grade children vary depending upon the kind of computer experiences offered and how frequently children have access to computers. The potential gains for kindergarten and primary children are tremendous, including improved motor skills, enhanced mathematical thinking, increased creativity, higher scores on tests of critical thinking and problem solving, higher levels of what Nastasi and Clements (1994) term effectance motivation (the belief that they can change or affect their environment), and increased scores on standardized language assessments. In addition, computers enhance children's self-concept, and children demonstrate increasing levels of spoken communication and cooperation. Children share leadership roles more frequently and develop positive attitudes toward learning (Clements, 1994; Cardelle-Elawar & Wetzel, 1995; Adams, 1996; Denning & Smith, 1997; Haugland & Wright, 1997; Matthew, 1997).

Source : View SOurce

When to Introduce Children to Computers

Many researchers do not recommend that children under 3 years old use computers (e.g., Hohman, 1998). Computers simply do not match their learning style. Children younger than 3 learn through their bodies: their eyes, ears, mouths, hands, and legs. Although they may return over and over again to an activity, they are full of movement, changing focus frequently. Computers are not a good choice for the developmental skills these children are learning to master: crawling, walking, talking, and making friends.

Source: View Source

Survey shows rising number of IT graduates




By DAVID DIZON
abs-cbnNEWS.com


The number of college graduates of Information and Communications Technology (ICT) related courses increased this year as more students took up ICT certificate courses, according to a survey conducted by research firm Consumer Vibe Asia.

Joyce Luth Casiño, research director of Consumer Vibe Asia, said a total of 30,053 ICT students graduated this year from 145 schools offering ICT related courses that were included in the survey. The number is up from the 26,429 ICT graduates of the same schools in 2007 and more than double the total 14,451 ICT graduates in the same schools in year 2000.

Casi said the study interviewed 266 respondents including deans, academic heads and IT heads of schools offering ICT courses. Most of the respondents (76%) are holding teaching positions in Metro Manila, seven percent came from Balance Luzon, 10 percent from the Visayas and seven percent from Mindanao.

Casiño said that while majority of ICT graduates took up full ICT courses for school year 2007-2008, "there is also an increasing number of students who are taking up vocational and certificate courses that are ICT related."

She said that of the 30,053 ICT graduates in the respondent schools, 19,788 finished full four-year ICT courses; 9,550 finished vocational courses and 715 finished certificate courses. In 2007, the respondent schools had 18,687 full, 7,122 vocational and 620 ICT certificate graduates.

Casiño said the top courses offered in the respondent schools are Computer & Information System (40%), Programming & Application Development (40%) and Network Design & Administration (38%).

Casiño said a separate study among technology driven companies showed that the country is producing more full ICT graduates than the industry demands. She said the study showed that most IT jobs available locally can be easily filled by ICT vocational course graduates.

She said the study also showed that ICT schools "are doing a very good job in providing technical knowledge for its graduates but fail to help them develop business skills."

"This means that the quality of graduates is quite fine for entry level ICT posts as most of the graduates have high technical inclination but quite weak business sense," she said.

She said that to address this weakness, schools and the ICT industry should forge partnerships for a more relevant curriculum design and pave the way for appropriate placement of graduates in IT companies.

Source: abs-cbnnews.com

IT313 - Assignment

Which of the following File Organization Types is best when it comes to storage?

A. Sequential
B. Relative
C. Indexed

Answer this in not less than 10 sentences.

Due on May 7, 2008

MILLION-EURO CELL PHONE!

Earlier this month Guinness World Records was at the three-day Millionaire’s Fair in Cannes, France to certify the sale of the Most Expensive Cell Phone in the world - ‘Le Million’ Piece Unique which was bought by a Russian businessman for his wife for 1 million Euros ($1.2 million)!

Created by GoldVish SA, a Geneva based luxury communication goods company, the cell phone is made of 18-carat white gold, mounted with 120-carats of VVS-1 graded diamonds and equipped with the latest in mobile technology. It was designed by Emmanuel Gueit and made as an addition to the ‘Illusion collection’. ‘Le Million’ Piece Unique is a limited edition item and is only available on special request.

Michel Morren, CEO of GoldVish said: ‘The introduction of the GoldVish luxury cell phone collection in Europe in Cannes was a great success, I am excited with the worldwide reception and look forward to attending the Millionaire’s Fair in Moscow next October’. The annual Millionaire’s Fair was held from September 1-3 2006 and exhibited a range of high class luxury goods such as private jets, jacuzzis and cars.

Check out the Million-Euro Cell Phone and other products from GoldVish at
www.goldvish.com

Yahoo fast-tracking RP office, Microsoft bid notwithstanding

By Erwin Oliva
INQUIRER.net
First Posted 16:10:00 05/02/2008

MAKATI CITY, Philippines -- Yahoo! has accelerated plans to put up an office in the Philippines, targeting its completion this month or in June, an executive told INQUIRER.net on Friday.

Yahoo! Southeast Asian executives disclosed plans early this year to set up an office in the country due to encouraging Internet growth in the country.

"We're accelerating it. It has nothing to do with the dynamics in the industry," said Jojo Anonuevo, general manager for the Philippine operations of Yahoo!, in an interview here, as he hinted on Microsoft's offer to buy the Internet company.

"We're laser-focused here in Southeast Asia. What we're doing here will add value. What's happening there is not distracting us. But we know it's there," he added.

Yahoo! is now working on improving the Internet experience of a growing number of Filipino users here and abroad, he said. The Internet giant is working on deploying caching technology to improve the network traffic coming from local users. Currently, local users accessing content from Yahoo! are routed to the United States or Singapore, and back to the Philippines.

Anonuevo said they have recently seen a spike in traffic to their Philippine homepage, with more than 50 percent coming from Filipinos abroad.

Yahoo! is still on a hiring mode, looking for people to fill technical, marketing and sales positions for the Philippine office. Yahoo! is also looking for some local creative skills to help enhance its Internet services.

Meanwhile, the company has recently signed up big advertising deals, including one with Procter & Gamble and a government agency, Anonuevo said. Yahoo! has also signed up more local content partners.

"The digital marketing industry is poised for growth in the Philippines. If we spend more effort, we can accelerate our traffic," the executive said.

Yahoo! intends to have a dozen people working for the local office, but the numbers might increase, added Anonuevo.

Citing industry figures, Anonuevo said that the Philippines has about 22 million Internet users to date, with growth rates of about 30 percent a year.

Anonuevo left his regional job to take on a new role in the Philippines to help further build the Yahoo! brand and business in the country.

Yahoo! has also appointed Cris Concepcion, the new strategic consultant of Yahoo Southeast Asia, to help Anonuevo.

What is Spyware?

Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.

Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.

Aside from the questions of ethics and privacy, spyware steals from the user by using the computer's memory resources and also by eating bandwidth as it sends information back to the spyware's home base via the user's Internet connection. Because spywar

e is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.

Because spyware exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the spyware author who will either use it for advertising/marketing purposes or sell the information to another party.

Licensing agreements that accompany software downloads sometimes warn the user that a spyware program will be installed along with the requested software, but the licensing agreements may not always be read completely because the notice of a spyware installation is often couched in obtuse, hard-to-read legal disclaimers.

..read more from the source page...http://www.webopedia.com/totd.asp

B+ - Trees


In computer science, a B+ tree is a type of tree, which represents sorted data in a way that allows for efficient insertion, retrieval and removal of records, each of which is identified by a key. It is a dynamic, multilevel index, with maximum and minimum bounds on the number of keys in each index segment (usually called a 'block' or 'node'). In a B+ tree, in contrast to a B-tree, all records are stored at the lowest level of the tree; only keys are stored in interior blocks.

The primary value of a B+ tree is in storing data for efficient retrieval in a block-oriented storage context. Given a storage system with a block size of b, a B+ tree which stores a number of keys equal to a multiple of b will be very efficient when compared to a binary search tree (the corresponding data structure for non-block-oriented storage contexts).

More about B+ here

B* - Tree

A B*-tree is a tree data structure, a variety of B-tree used in the HFS and Reiser4 file systems, which requires nonroot nodes to be at least 2/3 full instead of 1/2. To maintain this, instead of immediately splitting up a node when it gets full, its keys are shared with the node next to it. When both are full, then the two of them are split into three. It also requires the 'leftmost' key never to be used. The term is not in general use today as the implementation was never looked on positively by the computer science community-at-large; most people use "B-tree" generically to refer to all the variations and refinements of the basic data structure.

A B*-tree should not be confused with a B+ tree, which is one where the leaf nodes of the tree are chained together in the form of a linked list. That is efficient for searching at the cost of a more expensive insertion.

href="http://en.wikipedia.org/wiki/B*-tree

File Organization and Processing - Chapter 3


Relative File Organization

Within a relative file are numbered positions, called cells. These cells are of fixed equal length and are consecutively numbered from 1 to n, where 1 is the first cell, and n is the last available cell in the file. Each cell either contains a single record or is empty. Records in a relative file are accessed according to cell number. A cell number is a record's relative record number; its location relative to the beginning of the file. By specifying relative record numbers, you can directly retrieve, add, or delete records regardless of their locations. (Detecting deleted records is only available if you specified the -vms (Linux and Mac OS) or /vms (Windows) option when the program was compiled.)
***When creating a relative file, use the RECL value to determine the size of the fixed-length cells. Within the cells, you can store records of varying length, as long as their size does not exceed the cell size.

Indexed Files

Indexed files may have up to 255 keys, the keys can be alphanumeric and only the primary key must be unique. In addition, it is possible to read an Indexed file sequentially on any of its keys. An Indexed file may have multiple keys. The key upon which the data records are ordered is called the primary key. The other keys are called alternate keys.
Records in the Indexed file are sequenced on ascending primary key. Over the actual data records, the file system builds an index. When direct access is required, the file system uses this index to find, read, insert, update or delete, the required record.
An Indexed file may have multiple, alphanumeric, keys. Only the primary key must be unique. For each key specified for an Indexed file, an index will be built.

Binary Search Tree


Binary Search Trees
In computer science, a binary search tree (BST) is a binary tree data structure which has the following properties:
• each node (item in the tree) has a value;
• a total order (linear order) is defined on these values;
• the left subtree of a node contains only values less than the node's value;
• the right subtree of a node contains only values greater than or equal to the node's value.
The major advantage of binary search trees over other data structures is that the related sorting algorithms and search algorithms such as in-order traversal can be very efficient.
Binary search trees can choose to allow or disallow duplicate values, depending on the implementation.
Binary search trees are a fundamental data structure used to construct more abstract data structures such as sets, multisets, and associative arrays.
The use of bianry search tree to organize such collections of rtecords enablaes reasobale performance to be achieved both for access direclty to particular record based upon its names and for access sequentially to the entire collection in order by record’s names.
Operations on Binary Search Trees
There are four basic operation on bunary search trees: direct search, sequential search, node insertion, and node deletion.

The properties of a binary search tree simply that there is a procedure for determining whether or not a node with a given name resides in the tree and for determining whether or not a node with a given name resides in the tree and for finding that node when it exists. To find the node with name n in the binary search tree whose root node is Ri:
1. If the tree is empty, then the search terminates unsuccessfully.
2. If n= Ni, then the search terminates successfully; the sought node is R1.
3. If n < Ni, then the left subtree of Ri is searched, i.e., Ri := Left(Ri).
4. If n > Ni, then the right subtree of Ri is searched, i.e, Ri := Right(Ri).
Sequesntial search of a binary tree is accomplished by traversing the nodes of the tree in such a way that the nodes are visited in order by their names.
Inserting a new node with name n in the binary search tree rooted at Ri:
1. If the tree is empty, then the node with the name n becomes the root.
2. If n = Ni, then the insertion terminates unsuccessfully; the name is already in the tree.
3. If n < Ni, then the left subtree of Ri is searched until the appropriate position for the node is found.
4. If n > Ni, then the right subtree of Ri is searched until the appropriate position of the new node is found.

Deleting a node in the binary search tree
If the node to be deleted is a leaf, then the process is simple; the leaf is pruned nearly from the tree.
If the node to be deleted is not a leaf, then the process must do something to preserve that nodes’ subtress.

Virtual Storage Access Method

Virtual Storage Access Method - VSAM - is a data management system introduced by IBM in the 1970s as part of the OS/VS1 and OS/VS2 operating systems. It is an access method used by most major mainframe systems to implement the different kinds of file organization techniques.

Types of VSAM Files
VSAM datasets are frequently referred to as clusters. A KSDS cluster consists of two physical parts, an index component, and a data component. ESDS and RRDS clusters consist of only a single component, the data component.
KSDS Cluster Components
Each record in the data component of a KSDS cluster contains a key field, which must be the same number of characters and occur in the same relative position in each record. The records are stored in the data component in logical sequence based upon their key field value. The index component of the KSDS cluster contains the list of key values for the records in the cluster with pointers to the corresponding records in the data component. The records in a KSDS may be accessed sequentially, in order by key value, or directly, by supplying the key value of the desired record. The records of a KSDS cluster may be fixed length or variable length. Records may be added or deleted at any point within a KSDS cluster, and the affected record is inserted or removed, and the surrounding records will be reorganized as required to maintain the correct logical sequence.
ESDS Cluster Components
The records in an ESDS cluster are stored in the order in which they are entered into the dataset. Each record is referenced by its relative byte address (RBA). In an ESDS dataset of 100 byte records, the RBA of the first record is 0, the RBA of the second record is 100, the RBA of the third record is 200, etc. The records in an ESDS may be accessed sequentially, in order by RBA value, or directly, by supplying the RBA of the desired record. The records of an ESDS cluster may be fixed length or variable length. Records may not be deleted from an ESDS cluster, and they may only be added (appended) to the end of the dataset, following records previously written.
RRDS Cluster Components
The records in an RRDS cluster are stored in fixed length slots. Each record is referenced by the number of its slot, which is a number varying from 1 to the maximum number of records, which may be contained in the dataset. The records in an RRDS cluster may be accessed sequentially, in relative record number order, or directly, by supplying the relative record number of the desired record. The records of an RRDS cluster must be of fixed length. Records may be added to an RRDS cluster by writing a new record's data into an empty slot, and records may be deleted from an RRDS cluster, thereby leaving an empty slot where the record that was deleted was previously stored.

Santos-Concio is new ABS-CBN president

[CORRECTS error in earlier version that identified Mr. Miguel Jose Navarrete as past president of ABS-CBN. Mr. Navarrete was former CFO of ABS-CBN]

By ZINNIA B. DELA PEÑA
The Philippine Star

Actress and film producer Charo Santos-Concio has taken the reins at ABS-CBN Broadcasting Corp., making her the first woman president of the media conglomerate.

Prior to assuming the presidency of ABS-CBN, Santos-Concio was head of the broadcasting giant’s flagship station Channel 2.

Santos-Concio, who began her career as an actress, joined ABS-CBN as consultant in June 1987 and moved up to director for programs in 1989, vice-president of production operations in 1991 and senior vice-president for TV production in 1996.

In 1998, Santos-Concio was promoted executive vice-president, taking full responsibility in overseeing the entertainment content of Channel 2.

Santos-Concio, who completed a management course at Harvard University, has been credited in creating ABS-CBN’s top-rated programs and even Star Cinema’s box-office successes.

She is also the brains behind the most successful and longest-running TV drama anthology program, Maalaala Mo Kaya, which she also hosts.

"Charo brought greater synergy between sales, marketing, and production, which enabled the company to deliver remarkable business results for the past two years," ABS-CBN said in a statement.

Santos-Concio assumed the position vacated by Luis Alejandro in 2006. ABS-CBN Chairman Eugenio Lopez III had been president in the interim between Alejandro's resignation and Santos-Concio's appointment as new ABS-CBN president.

2007 Top Philippine Movies

Here’s the Top 10 Pinoy Movies of 2007:


Rank / Movie Title (Distributor) / Gross

1. One More Chance (Star Cinema) - $ 3.6 M
2. A Love Story (Star Cinema) - $ 3.1 M
3. Ouija (GMA Films/Viva) - $ 2.1 M
4. Ang Cute ng Ina Mo (Star Cinema) - $ 1.7 M
5. Paano Kita Iibigin (Star Cinema/Viva) - $ 1.5 M
6. Apat, Dapat, Dapat, Apat (Viva) - $ 1.2 M
7. I’ve Fallen For You (Star Cinema) - $ 0.83 M
8. Pasukob (Octoarts Films) - $ 0.54 M
9. Tiyanaks (Regal Films) - $ 0.46 M
10. My Kuya’s Wedding (Regal Films) - $ 0.37 M

AGB 2007 Primetime Ratings Report

ABS-CBN DOMINATES NUTAM. But Marimar was the only bright spot for GMA-7 in terms of the nationwide survey. Its rival ABS-CBN still emerged as the King of the NUTAM study. For 2007, three ABS-CBN programs—Kokey, Princess Sarah and Sana Maulit Muli—raked in impressive ratings to solidify the Kapamilya Network's grip on the nationwide rating contest.

The figures clearly demonstrated ABS-CBN's dominance outside the Mega Manila area. For Urban Visayas, the Lopez-owned network posted a staggering 60 percent grade while GMA-7 accumulated only 26 percent. Urban Mindanao painted a similar story with ABS-CBN registering a commanding 66 percent as compared to GMA-7's 23 percent.

Leading by a slight margin, GMA-7 pulled one over ABS-CBN in Urban Luzon. Hanging on to a precarious lead, GMA-7 tallied 42 percent while ABS-CBN trailed with 40 percent.

As for viewing percentages, a national daily reported that Urban Mindanao came up with 550,000 average daily viewers, which if translated to percentage is 16.2 of 3.4 million. Urban Luzon and Urban Visayas bore identical percentage levels. According to the same report, both areas tallied 14.5 percent or 3.8 million and 725, 000 viewers.

__________ source: www.pep.ph Feb 20, 2007

Jesus is Lord Movement joins calls for Arroyo ouster

Religious group Jesus is Lord (JIL) Movement has joined the ranks of those calling for President Arroyo to step down on the heels of the ZTE-National Broadband Network scandal, ABS-CBN News learned Saturday.

In a special prayer rally at the PhilSports Arena in Pasig Saturday, thousands of JIL members gathered to pray for the resolution of the political crisis "through the Holy Spirit."

The movement, headed by losing 2004 presidential candidate Eddie Villanueva, said that their prayer rally is also their response to the call for communal prayer by the Catholic Bishops' Conference of the Philippines.

It was also during the rally that they officially announced their call for Arroyo's resignation.

The movement said that Malacanang's involvement in corruption has been "uncovered" after the President, First Gentleman Jose Miguel Arroyo, and other high-ranking Palace officials have been linked to the anomalous ZTE deal.

During the rally, Villanueva suggested a system to replace President Arroyo in case she steps down from office. He endorsed Chief Justice Reynato Puno to succeed in the presidency.

After their vigil, the JIL, as well as the Bangon Pilipinas Movement, said they will have more gatherings.

The JIL rally was held a day after a major rally of anti-Arroyo groups at the financial district of Makati. - From a report by Cecille Lardizabal, ABS-CBN News