Friday, July 31, 2009

Entry/Exit Requirements for a U.S. Citizen to India

U.S. citizens require a valid passport and valid Indian visa to enter and exit India for any purpose. Visitors, including those on official U.S. Government business, must obtain visas at an Indian Embassy or Consulate abroad prior to entering the country, as there are no provisions for visas upon arrival. Those arriving without a valid passport and valid visa are subject to immediate deportation. The U.S. Embassy and Consulates in India are unable to assist when U.S. citizens arrive without proper documentation. Each visitor should carry photocopies of the bio-data page of the traveler's U.S. passport and the page containing the Indian visa in order to facilitate obtaining an exit visa from the Indian government in the event of theft or loss of the passport. Replacing a lost visa in order to exit the country takes up to three business days.

Americans wishing to visit India are responsible for requesting the correct type of visa from the Indian Embassy or Consulate, as there generally are no provisions for changing one's immigration category (e.g., from tourist to work visa) once admitted. Tourists are generally given 6 months of legal stay upon entering India; the Government of India rarely grants extensions within the country but it is considered acceptable to depart India to a nearby country and then return. As of October 1, 2007, the Indian Embassy and Consulates in the U.S. outsourced the visa application process to Travisa Visa Outsourcing: http://indiavisa.travisaoutsourcing.com. Diplomatic and Official visa applications, however, are still accepted directly at the Indian Embassy and Consulates. Visitors whose primary purpose of travel is to participate in religious activities should obtain a missionary visa rather than a tourist visa. Indian immigration authorities have deported American citizens who entered India with a tourist visa and conducted religious activities. All U.S. government employees, including military personnel, are required to get country clearance for travel to India.

American travelers to India who work in “designated institutes and technology areas” will be subject to a two week waiting period in the visa application process and will be required to submit supplemental information with their visa application. Scholars planning to conduct research in India often need research clearances in addition to their visas. Specific information is available at the Indian Embassy and Consulates.

Foreign citizens who visit India to study, do research, work or act as missionaries, as well as all travelers planning to stay more than 180 days are required to register within 14 days of arrival with the Foreigners Regional Registration Office (FRRO) closest to where they will be staying. The FRRO maintains offices in New Delhi, Mumbai, Chennai (known as the "Chennai Immigration Office"), Kolkata and Amritsar. In other cities and small towns, the local police headquarters will normally perform this function. General information regarding Indian visa and immigration rules, including the addresses and telephone numbers for the FRRO offices, can be found at the Indian Ministry of Home Affairs website for its Bureau of Immigration at http://www.immigrationindia.nic.in.

If a foreign citizen (e.g., an American) overstays his or her Indian visa, or otherwise violates Indian visa regulations, the traveler may require a clearance from the Ministry of Home Affairs in order to leave the country. Such travelers generally must pay a fine, and in some cases, may be jailed until their deportation can be arranged. Visa violators seeking an exit clearance can visit the following office any weekday from 10 a.m. - 12 noon: Ministry of Home Affairs, Foreigners Division, Jaisalmer House, 26 Man Singh Road, New Delhi 110 011 (tel. +91-11-2338-5748).

For the most current information on entry and exit requirements, please contact the Embassy of India at 2536 Massachusetts Avenue NW, Washington, DC 20008, telephone (202) 939-9806 (http://www.indianembassy.org) or the Indian Consulates in Chicago (http://chicago.indianconsulate.com), New York (http://www.indiacgny.org), San Francisco (http://www.cgisf.org) or Houston (http://www.cgihouston.org). Outside the United States, inquiries should be made at the nearest Indian embassy or consulate.
Information about dual nationality and the prevention of international child abduction can be found on our web site. (Additional information on dual nationality in India appears below under "Special Circumstances.") For further information about customs regulations, please read our Customs Information sheet.

There are no disclosure requirements or restrictions for HIV/AIDS patients who enter India on a tourist visa. Disclosure regarding HIV/AIDS is required of anyone seeking a resident permit in India. Foreign residents found to be suffering from HIV/AIDS will be deported. Please verify this information with the Embassy of India at www.indianembassy.org before you travel.

Thursday, July 30, 2009

Technology shifts reflected in ‘shopping basket’

DVD recorders, satellite navigation (satnav) systems and digital (DAB) radios are among 20 items included for the first time in the “shopping basket” the Office for National Statistics (ONS) uses to measure inflation.

Changes in food consumption patterns also feature in the new basket, with broccoli and olive oil replacing Brussels sprouts and vegetable oil.

ONS collects about 120,000 prices every month for a “basket” of about 650 goods and services. The change in the prices of those items is used to compile the two main measures of inflation: the Consumer Prices Index (CPI) and Retail Prices Index (RPI). The Bank of England uses the CPI as its inflation target while the RPI is used to calculate increases in pensions and other state benefits.

The contents of the basket are reviewed every year, and changes can be made for a number of reasons. Some items enter the basket because spending on them has reached a level that demands inclusion to ensure that the basket represents consumer spending. Some are included to make collection easier or to improve coverage of particular categories.

Similarly, items are dropped for a variety of reasons. For example, diamond solitaire rings replace gemstone cluster rings for the simple, and unromantic, reason that it is easier to collect prices for them.

Among consumer technology items, spending on satnav systems has now reached a level that demands their inclusion. DAB radios, sales of which have grown steadily in recent years, replace radio/CD/ cassette players, on which expenditure has fallen.

The growing popularity of flat-panel TVs is illustrated by the inclusion of a second, smaller type in the basket, replacing portable TVs, while old- style deeper widescreen TVs drop out.

Digital cameras have been included in the basket since 2004. This year digital processing - now readily available at many shops and supermarkets - is included for the first time in place of mail order developing.

Wednesday, July 29, 2009

Keeping Your Car In Shape

Keep Your Engine Properly Tuned

Fixing a car that is noticeably out of tune or has failed an emissions test can improve its gas mileage by an average of 4 percent, though results vary based on the kind of repair and how well it is done.

Fixing a serious maintenance problem, such as a faulty oxygen sensor, can improve
your mileage by as much as 40 percent.


Fuel Economy Benefit: 4%
Equivalent Gasoline Savings: $0.10/gallon



Keep Tires Properly Inflated

You can improve your gas mileage by around 3.3 percent by keeping your tires inflated to the proper pressure. Under-inflated tires can lower gas mileage by 0.3 percent for every 1 psi drop in pressure of all four tires. Properly inflated tires are safer and last longer. The proper tire pressure for your vehicle is usually found on a sticker in the driver's side door jamb or the glove box and in your owner's manual. Do not use the maximum pressure printed on the tire's sidewall.

Fuel Economy Benefit: up to 3%
Equivalent Gasoline Savings: up to $0.07/gallon



Use the Recommended Grade of Motor Oil


You can improve your gas mileage by 1-2 percent by using the manufacturer's recommended grade of motor oil. For example, using 10W-30 motor oil in an engine designed to use 5W-30 can lower your gas mileage by 1-2 percent. Using 5W-30 in an engine designed for 5W-20 can lower your gas mileage by 1-1.5 percent. Also, look for motor oil that says "Energy Conserving" on the API performance symbol to be sure it contains friction-reducing additives.


Fuel Economy Benefit: 1-2%
Equivalent Gasoline Savings: $0.02-$0.05/gallon


Replacing a Clogged Air Filter on Modern Cars Improves Performance but Not MPG

A new study shows that replacing a clogged air filter on cars with fuel-injected, computer-controlled gasoline engines does not improve fuel economy but it can improve acceleration time by around 6 to 11 percent. This kind of engine is prevalent on most gasoline cars manufactured from the early 1980s onward.

Tests suggest that replacing a clogged air filter on an older car with a carbureted engine may improve fuel economy 2 to 6 percent
under normal replacement conditions or up to 14 percent if the filter is so clogged that it significantly affects drivability.

The effect of a clogged air filter on diesel vehicles will be tested in the near future.

Tuesday, July 28, 2009

Automotive Assistance Programme (AAP)

The Automotive Assistance Programme (AAP) is 'Open for Business'.

The advice and guidance shown below is designed to inform and assist businesses assess themselves against the eligibility criteria.

Eligible companies: an initial expression of interest can be raised that should also include a short overview covering the criteria and how they are met, a synopsis of the project or initiative under planning, and the level and type of financial support being sought. This should be sent electronically to the email address identified at the close of the guidance.

What is the purpose of this scheme?

The Government has been listening carefully to the concerns of the UK automotive industry.

New investment is vital to ensure that the industry emerges from the current downturn with the skills and technology base needed to be competitive in the global automotive market and to develop lower carbon transport.

The primary aim of this package is to support the continued delivery of that investment - investment that will create or sustain jobs, develop cutting-edge technology, bring special value to the UK, reduce CO2 emissions and maintain R&D in UK vehicle manufacturing.

Monday, July 27, 2009

Transportation Security Administration (TSA)


The Transportation Security Administration (TSA) announced nowadays that beginning May 15 the Secure Flight traveler vetting program will begin asking passengers to enter their name – as it appears on the management issued identification they will be traveling with – when making airline reservations.

This is the first publicly-noticeable step in implement the multi-phase Secure Flight program which shifts pre-departure watch list matching responsibilities from individual aircraft operators to TSA. The Secure Flight program satisfies a key recommendation of the 9/11 Commission, and congressional requirements from the Intelligence Reform and Terrorism Prevention Act of 2004 and the 9/11 Commission Act signed into law in 2007.

By attractive and reformation the watch list matching process, the Secure Flight program makes travel safer and easier for millions of Americans," said TSA Acting manager Gale Rossides. "During this phase of the Secure Flight program, passengers are encouraged to book their reservations using their name as it appears on the government-issued ID they will use while traveling.

The second phase of Secure Flight begins August 15, 2009 when passengers will be required to enter their date of birth and gender when booking airline flights.

Once Secure Flight's advanced technology is fully implemented in early 2010, enhanced watch list matching will be done by the government. Airlines will gather a passenger's name, date of birth, and gender when making an airline reservation to determine if the passenger is a match to the No Fly or Selectee lists. By providing the additional data fundamentals of gender and date of birth, Secure Flight will more effectively help prevent misidentification of passengers who have similar names to individuals on the watch list and better identify individuals that may pose a known or suspected threat to aviation.

Water proof Lap-Top

Friday, July 24, 2009

Understanding Hard Drives

A computer’s hard drive stores data, and maintains an index of files. When you save a file, especially a large one, it is scattered around the hard drive in bits and pieces. Files also are automatically created by browsers and operating systems. When you open a file, the hard drive checks the index, then gathers the bits and pieces and reconstructs them.

When you delete a file, the links between the index and the file disappear, signaling to your system that the file isn’t needed any longer and that hard drive space can be overwritten. But the bits and pieces of the deleted file stay on your computer until they’re overwritten, and they can be retrieved with a data recovery program. To remove data from your hard drive permanently, it needs to be wiped clean.

Thursday, July 23, 2009

Internet Shopping

Shopping on the Internet can be economical, convenient, and no less safe than shopping in a store or by mail. To help keep your online shopping experience a safe one:

  • Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have questions or problems.
  • Know exactly what you're buying. Read the seller's description of the product closely, especially the fine print.
  • Know what it will cost. Factor shipping and handling — along with your needs and budget — into the total cost of the order.
  • Pay by credit or charge card, for maximum consumer protections.
  • Check out the terms of the deal, like refund policies and delivery dates.
  • Print and save records of your online transactions.

Wednesday, July 22, 2009

Securing Your Wireless Network

Increasingly, computer users interested in convenience and mobility are accessing the Internet wirelessly. Today, business travelers use wireless laptops to stay in touch with the home office; vacationers beam snapshots to friends while still on holiday; and shoppers place orders from the comfort of their couches. A wireless network can connect computers in different parts of your home or business without a tangle of cords and enable you to work on a laptop anywhere within the network's range.

Going wireless generally requires a broadband Internet connection into your home, called an "access point," like a cable or DSL line that runs into a modem. To set up the wireless network, you connect the access point to a wireless router that broadcasts a signal through the air, sometimes as far as several hundred feet. Any computer within range that's equipped with a wireless client card can pull the signal from the air and gain access to the Internet.

The downside of a wireless network is that, unless you take certain precautions, anyone with a wireless-ready computer can use your network. That means your neighbors, or even hackers lurking nearby, could "piggyback" on your network, or even access the information on your computer. And if an unauthorized person uses your network to commit a crime or send spam, the activity can be traced back to your account.

Fortunately, there are steps you can take to protect your wireless network and the computers on it. As no one step is a complete fix, taking all of the following steps will help you be more secure.

Precautionary Steps

  1. Use encryption. The most effective way to secure your wireless network from intruders is to encrypt, or scramble, communications over the network. Most wireless routers, access points, and base stations have a built-in encryption mechanism. If your wireless router doesn't have an encryption feature, consider getting one that does.
    Manufacturers often deliver wireless routers with the encryption feature turned off. You must turn it on. The directions that come with your wireless router should explain how to do that. If they don't, check the router manufacturer's website.
    Two main types of encryption are available: Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP). Your computer, router, and other equipment must use the same encryption. WPA is stronger; use it if you have a choice. It should protect you against most hackers.
    Some older routers use only WEP encryption, which is better than no encryption. It should protect your wireless network against accidental intrusions by neighbors or attacks by less-sophisticated hackers. If you use WEP encryption, set it to the highest security level available. Learn how…
  2. Use anti-virus and anti-spyware software, and a firewall. Computers on a wireless network need the same protections as any computer connected to the Internet. Install anti-virus and anti-spyware software, and keep them up-to-date. If your firewall was shipped in the "off" mode, turn it on. Learn how…
  3. Turn off identifier broadcasting. Most wireless routers have a mechanism called identifier broadcasting. It sends out a signal to any device in the vicinity announcing its presence. You don't need to broadcast this information if the person using the network already knows it is there. Hackers can use identifier broadcasting to home in on vulnerable wireless networks. Note the SSID name so you can connect manually. Disable the identifier broadcasting mechanism if your wireless router allows it. Learn how…
  4. Change the identifier on your router from the default. The identifier for your router is likely to be a standard, default ID assigned by the manufacturer to all hardware of that model. Even if your router is not broadcasting its identifier to the world, hackers know the default IDs and can use them to try to access your network. Change your identifier to something only you know, and remember to configure the same unique ID into your wireless router and your computer so they can communicate. Use a password that's at least 10 characters long: The longer your password, the harder it is for hackers to break. Learn how…
  5. Change your router's pre-set password for administration. The manufacturer of your wireless router probably assigned it a standard default password that allows you to set up and operate the router. Hackers know these default passwords, so change it to something only you know. The longer the password, the tougher it is to crack. Learn how…
    Click here if you don't know or can't remember your base station password.
  6. Allow only specific computers to access your wireless network. Every computer that is able to communicate with a network is assigned its own unique Media Access Control (MAC) address. Wireless routers usually have a mechanism to allow only devices with particular MAC addresses access to the network. Some hackers have mimicked MAC addresses, so don't rely on this step alone. Learn how…
  7. Turn off your wireless network when you know you won't use it. Hackers cannot access a wireless router when it is shut down. If you turn the router off when you're not using it, you limit the amount of time that it is susceptible to a hack.
  8. Don't assume that public "hot spots" are secure. Many caf├ęs, hotels, airports, and other public establishments offer wireless networks for their customers' use. These "hot spots" are convenient, but they may not be secure. Ask the proprietor what security measures are in place.
  9. Be careful about the information you access or send from a public wireless network. To be on the safe side, you may want to assume that other people can access any information you see or send over a public wireless network. Unless you can verify that a hot spot has effective security measures in place, it may be best to avoid sending or receiving sensitive information over that network.

Tuesday, July 21, 2009

Laptop Protection

A laptop computer defines convenience and mobility. It enables you to work from home, a hotel room, a conference hall, or a coffee shop.

Maybe you've taken steps to secure the data on your laptop: You've installed a firewall. You update your antivirus software. You protect your information with a strong password. You encrypt your data, and you're too smart to fall for those emails that ask for your personal information. But what about the laptop itself? A minor distraction is all it takes for your laptop to vanish. If it does, you may lose more than an expensive piece of hardware. The fact is, if your data protections aren't up to par, that sensitive and valuable information in your laptop may be a magnet for an identity thief.

Chances are you've heard stories about stolen laptops on the news or from friends and colleagues. No one thinks their laptop will be stolen– at least not until they find the trunk of their car broken into, notice that their laptop isn't waiting at the other side of airport security, or get a refill at the local java joint only to turn around and find their laptop gone.

OnGuardOnline suggests keeping these tips in mind when you take your laptop out and about:

  • Treat your laptop like cash. If you had a wad of money sitting out in a public place, would you turn your back on it – even for just a minute? Would you put it in checked luggage? Leave it on the backseat of your car? Of course not. Keep a careful eye on your laptop just as you would a pile of cash.
  • Keep it locked. Whether you're using your laptop in the office, a hotel, or some other public place, a security device can make it more difficult for someone to steal it. Use a laptop security cable: attach it to something immovable or to a heavy piece of furniture that's difficult to move – say, a table or a desk.
  • Keep it off the floor. No matter where you are in public – at a conference, a coffee shop, or a registration desk – avoid putting your laptop on the floor. If you must put it down, place it between your feet or at least up against your leg, so that you're aware of it.
  • Keep your passwords elsewhere. Remembering strong passwords or access numbers can be difficult. However, leaving either in a laptop carrying case or on your laptop is like leaving the keys in your car. There's no reason to make it easy for a thief to get to your personal or corporate information.
  • Mind the bag. When you take your laptop on the road, carrying it in a computer case may advertise what's inside. Consider using a suitcase, a padded briefcase or a backpack instead.
  • Get it out of the car. Don't leave your laptop in the car – not on the seat, not in the trunk. Parked cars are a favorite target of laptop thieves; don't help them by leaving your laptop unattended. That said, if you must leave your laptop behind, keep it out of sight.
  • Don't leave it "for just a minute." Your conference colleagues seem trustworthy, so you're comfortable leaving your laptop while you network during a break. The people at the coffee shop seem nice, so you ask them to keep an eye while you use the restroom. Don't leave your laptop unguarded – even for a minute. Take it with you if you can, or at least use a cable to secure it to something heavy.
  • Pay attention in airports. Keep your eye on your laptop as you go through security. Hold onto it until the person in front of you has gone through the metal detector – and keep an eye out when it emerges on the other side of the screener. The confusion and shuffle of security checkpoints can be fertile ground for theft.
  • Be vigilant in hotels. If you stay in hotels, a security cable may not be enough. Try not to leave your laptop out in your room. Rather, use the safe in your room if there is one. If you're using a security cable to lock down your laptop, consider hanging the "do not disturb" sign on your door.
  • Use bells and whistles. Depending on your security needs, an alarm can be a useful tool. Some laptop alarms sound when there's unexpected motion, or when the computer moves outside a specified range around you. Or consider a kind of "lo-jack" for your laptop: a program that reports the location of your stolen laptop once it's connected to the Internet.
  • Where to turn for help. If your laptop is stolen, report it immediately to the local authorities. If it's your business laptop that's missing, also immediately notify your employer. You may also wish to review the FTC's information for businesses about data breaches. If it's your personal laptop and you fear that your information may be misused by an identity thief.

Monday, July 20, 2009

Seating Guides for Children in Flights

It is strongly recommended that infants be put into a child restraint system appropriate for their weight. Most Approved Australian Safety Standard child restraint seats designed for use in motor vehicles are suitable for use in an aircraft, if used in accordance with the seat manufacturer's instructions. For travellers from overseas, Canadian, European and USA standard motor vehicle child seats are acceptable. Additionally, dedicated aviation restraint systems approved by those Airworthiness Authorities are also acceptable. This includes a device from the USA marketed as the ‘Kidsflysafe CARES'.

Child booster seats are only allowed to be used in seats which incorporate a shoulder harness. For that reason, booster seats are not allowed to be used on standard airline seating. As a guide, once a child has outgrown their full harness child restraint, it is safe for them to use the aircraft seat & lap belt.

An airline may supply child restraint seats or may allow you to use your own. When making your booking, check to see what arrangements the airline you are travelling with has for the safe transport of your infant. Once you have confirmed the acceptable use of the child restraint, think about the following:

  • Find a way to conveniently carry the infant, bags and possibly a child restraint through airports and into and out of aircraft,
  • Check with the airline you are flying with and follow their recommendations for using child restraint systems,
  • Check whether it is a requirement of the airline you are travelling with, that child restraints are used.

Small children enjoy reaching out and exploring. If they are seated beside the aisle they could get hurt if their arms get bumped by a passing person or serving cart. Ideally, two responsible adults should sit one on either side of a small child.

Alternatively, the child can be seated on a row with a window on one side and a responsible adult on the other. If an infant is in a child restraint, that restraint should not impede another person making their way to the aisle so in that situation it is best that they be placed in the window seat.

Turbulence can happen at any time and without warning, so keep your child belted in as much as possible. If the child wants to get up and move around, let them do so only if the seat belt sign is off.

Friday, July 17, 2009

Layoffs in Cisco

Cisco Systems (CSCO) on Thursday continued decoration its workers at its San Jose , CA , headquarters. Sources close to the corporation say between 600 and 700 employees at the networking massive received layoff notices. “This limited reorganization is part of our continuing, targeted realignment of resources and was formerly discussed on our fiscal second and third quarter 2009 wages calls,” a statement issued by Cisco reads. Like just about every company, Cisco has seen its sales refuse in the face of the global recession.

With more than 66,000 workers worldwide, Thursday's cuts include about 1% of Cisco's workforce. The cuts are the latest in cost-cutting measures being implemented at Cisco universal. During the company's earnings call, Cisco CEO John Chambers said job cuts were likely to be earlier to the high side of the 1,500 to 2,000 the company previously announced. Still, Chambers does not view even 2,000 lost jobs as a bunch layoff.


“My own view is that if you have to do a layoff, and we try all probable to avoid them, it needs to be of critical mass to validate the loss of business momentum, impact on workers and disruption in key projects,” Chambers said during the Q2 earnings call. “Being very apparent, the definition of a layoff to me is at least 10% of your workers. In very straight terms, we are not going to consider a layoff at this point in time. And while there are no securities, we think the odds are sensible that if we execute effectively as outlined in this call, that we may be able to avoid large downsizing events.” Chambers is probable to update the company's layoff plan during its 4 th quarter earnings call in August. Cisco stock traded up approximately 2% for the day.

Thursday, July 16, 2009

UK 'yet to embrace space tourism'

 tourism

The UK is ill-prepared to exploit the emerging commercial spaceflight sector, says the president of Virgin Galactic. Will Whitehorn said Britain lacked the regulatory framework that would help the industry grow but which would also ensure the necessary safety standards. Speaking at a space tourism conference in London , he said current rules would prevent Virgin launches from the UK . Galactic expects to start taking fare-paying passengers on short space hops in the next few years. Its "Eve" carrier aircraft will lift a rocket plane to over 50,000ft (15km) before releasing it to make a dramatic climb more than 60 miles (100km) above the Earth. Virgin plans to put satellites in space with the service, as well as people. The Anglo-American company will operate initially from a dedicated spaceport in New Mexico , US, but then hopes to spread its operations across the globe.

Vision needed

Mr Whitehorn said Sweden and the Middle East were the likely locations for these other ventures - but not the UK , currently. Lossiemouth in Scotland has put itself forward as a possible spaceport, and the Virgin boss said it had great potential. Unfortunately, it was held back by inadequate legislation, he told the conference. Lossiemouth would be an ideal location for polar injection of satellites. It could give Britain its own responsive space capability. But the one thing that America has that nobody else has - although the Swedes are close to it - is the legislation which allows our system to be built and operated. That was the vision the United States fulfilled with the Commercialisation of Space Amendment Act, and a vision [the UK ] is failing to fulfil at the moment. The space industry in Britain should be saying to both government and the opposition, 'we've got to have some legislation to allow the new world of space to operate in this country. Mr Whitehorn said that the UK had some of the most innovative space companies in the world and they needed to be released into this exciting future.

For details about camping

source : bbc news


Wednesday, July 15, 2009

Shopping sprees linked to periods

shopping

Women may be able to blame impulse buys and extravagant shopping on their time of the month, research suggests.


In the 10 days before their periods began women were more likely to go on a spending spree, a study found. Psychologists believe shopping could be a way for premenstrual women to deal with the negative emotions created by their hormonal changes. Professor Karen Pine will present her work to a British Psychological Society meeting in Brighton later this week. She asked 443 women aged 18 to 50 about their spending habits. Almost two-thirds of the 153 women studied who were in the later stages of their menstrual cycle - known as the luteal phase - admitted they had bought something on an impulse and more than half said they had overspent by more than £25.
A handful of the women said they had overspent by more than £250. And many felt remorse later. Professor Pine, of the University of Hertfordshire , said: "Spending was less controlled, more impulsive and more excessive for women in the luteal phase. "The spending behaviour tends to be a reaction to intense emotions. They are feeling stressed or depressed and are more likely to go shopping to cheer themselves up and using it to regulate their emotions."


Hormonal

She said much of this could be explained by hormonal changes during the menstrual cycle. And the findings were exaggerated in the women with severe PMT. "We are getting surges and fluctuations in hormones which affect the part of the brain linked to emotions and inhibitory control. So the behaviour we found is not surprising." Another explanation might be that women are buying items to make themselves feel more attractive - coinciding with the time of ovulation when they are most fertile, typically around 14 days before the start of a period. Most of the purchases made by the women were for adornment, including jewellery, make-up and high heels.
Professor Pine said: "Other researchers have found there is an ornamental effect around the time of ovulation." Researchers have found women tend to dress to impress during their fertile days. Professor Pine, author of the book Sheconomics, said if women were worried about their spending behaviour they might avoid going shopping in the week before their period was due.
source : bbc news